-
Cryptocurrencies
-
Exchanges
-
Media
All languages
Cryptocurrencies
Exchanges
Media
The Turbo Network was created by Chen Zhiqiang, former co-founder and CTO of Tron. It is committed to building cryptocurrencies that are used on a large scale in real business society. It is a HardDisk-based base currency that explores evolutionary routes. It uses the Proof of Time and Space (PoST) consensus mechanism to mine using hard disk capacity. VOL has the characteristics of green energy conservation and environmental protection, anti-centralization, and dual mining with storage projects.
The Turbo Network Volume Network is jointly created by the core technical team led by Chen Zhiqiang, former co-founder and CTO of Tron and CTO, and the Chinese version of Filecoin-Lambda team. It is a HardDisk-based base currency that explores the evolution route. It uses the Proof of Time and Space (PoST) consensus mechanism to mine using hard disk capacity.
The Turbo Network Project is committed to building cryptocurrencies that are applied on a large scale in the real business society. We firmly believe that the real large scale is that everyone can participate in mining and the total cost of network maintenance should be minimized.
The Turbo Network Project proposes a more energy-saving, environmentally friendly, low-threshold participation and security-resistant cryptocurrency-turbo network, which can be truly implemented in the commercial society on a large scale.
Energy saving and environmental protection
Energy-saving and environmentally friendly hard disk mining naturally resists ASIC.
Ultra-low threshold
Based on PoST space-time proof, you can start mining on a personal computer at home.
Community-driven
Turbine networks use a fully community-driven approach to advance projects, while 6% block rewards are used to promote the ecosystem.
POST consensus mechanism
Using the PoST consensus mechanism, PoST introduces time-dimensional operators based on the original spatial proof algorithm. Using the characteristics of delayed verification function (VDF), it forces miners to perform mathematical operations of a certain time intensity after obtaining the candidate block data, and then combines the two elements of fast verification results and candidate block data to select blocks, thus solving the security vulnerabilities such as selfish mining and rewrite attacks in the PoC algorithm.
*The above content is compiled by the official account of non-small accounts. If reprinted, please indicate the source.