With the development of blockchain technology and blockchain-based applications, new problems are emerging. For example, the inability to scale when applying this technology in large-scale projects, the lack of support for different business scenarios and the inability to exchange information and assets between different blockchains. This hinders both the technology itself and the development of the ecosystem as a whole.
A blockchain is only a part of the cryptocurrency in these systems; it serves only its own cryptocurrency.
The main problem in the global community of blockchain system developers is the creation of a universal platform that can serve not only a single cryptocurrency, but also record logistic events, copyright tracking, arbitrating, storing data in a decentralized repository, as well as selfexecuting transactions (smart contracts) in any area of human activity. At the moment, the community is not yet able to provide such a universal platform. This is due to the fact that inertia of thinking does not allow one to go beyond the established stereotypes and opinions.
Large block size
It is not advisable to accommodate all transactions that cannot be placed in a single block in a single block. This leads to a decrease in the speed of data processing, a decrease in the speed of data transfer, as well as a decrease in the speed of searching for the necessary information.
There are some problems in the field of blockchain technology nowadays, and Relictum Pro blockchain can solve them in one way or another
- Using cryptocurrency as a reliable payment instrument
- Energy consumption
- Convenience and comfort
- Transaction rate
- Expensive transactions (the transaction price is 0 in the Relictum Pro blockchain)
- 51% attack problem (This problem is impossible here since each transaction has its own identifier, 1 block = 1 transaction
- Low throughput (Relictum Pro has reached 100,000 transactions per second)
- Defi Tokens (Wrapped Coins of Ethereum, Bitcoin, Litecoin, and Tether )
At the moment, they use the type of P2P network on which not only message transfer is built, but also storage of file fragments distributed storages (based on packet switching (Internet), which implies delivery confirmation, unnecessary headers in the packet body, and also uses the central processor for the assembly of fragments. P2P was used for transferring files for file sharing services. File sharing services were needed so that you could download movies, programs, and document.
One node connects to several and in parts downloads data from other nodes. Thus, the download speed was close to the maximum value of the network card and the speed of a provider.
Today, it does not allow to work with a large number of nodes. Having a large number of nodes, the P2P network starts working with segments. Until one segment closes, the second does not unfold. Segmentation constantly occurs and from different sides, the segments start overlapping, the transaction confirmation time by all nodes increases, this affects the speed of distribution and the time of data transfer.
The 51% attack (actually from 46%, since not all network participants are able to vote at some point of time) is a term that means that an attacker must have more power than the rest of a network, a kind of "controlling stake" of generating capacity. This is achieved due to the fact that the Network with a consensus makes the decision to conduct a transaction. For example, Ethereum network. (The larger is the network size, the lower is its performance) Many attempts were made to solve this problem using additional consensus. (For example, Casper in the air).
A private key and a public key. After signing a transaction with a private key, a public key is needed to verify and authenticate the signed transaction.