## In Proofs, We Trust: Part 2 of 3

Proof Systems are the engine behind blockchains. As long as the millions of untrusting bitcoiners are able to prove their bitcoin transactions to each other, the network lives on. In Part I, we »

Stratumn.com
## In Proofs, We Trust: Part 2 of 3

## Analyzing Performance in Blockchain-Based Systems

## In Proofs, We Trust – Part 1

## Beyond Decentralization: Prover-Verifier Systems

## Identity as a Process - Part II

## Identity as a Process - Part I

## The Three Mountains

## From Security to Trust

Proof Systems are the engine behind blockchains. As long as the millions of untrusting bitcoiners are able to prove their bitcoin transactions to each other, the network lives on. In Part I, we »

Blockchain technologies offer some of the slowest performance compared to centralized systems. For instance, the world’s best-known blockchain network, Bitcoin, can only confirm an average of about 3-4 transactions per second, whereas, »

Proof Systems are the engine behind blockchains. As long as the millions of untrusting bitcoiners are able to prove their bitcoin transactions to each other, the network lives on. Here, in Part I, »

Richard Caetano and I presented Stratumn research on Proof Systems at the Ethereum Developer Conference in Paris on 18th of February, 2017. It was titled, "Going Beyond Decentralization with Prover-Verifier Systems." This post »

This is part of a series on Identity. Part I is here. While identity is modeled as a noun in the old paradigm, in the new paradigm it is modeled as an active »

We can begin to consider a new paradigm for identity by thinking in terms of chains of processes. If a process can be digitally modeled as a chain then each step of the »

First mountains are mountains, rivers are rivers. Then rivers are not rivers, mountains are not mountains. Then rivers are rivers and mountains and mountains again. But the third mountain is not the same »

Security is about protecting the data from attacks that are external to the accepted participants in a network. Honesty is about ensuring the integrity of information provided by the participants. Security and honesty »