The blockchain platform upon which Drachmae is built relies on the definition of trust roles enforced by cryptographically verifiable identities, secured in hardware modules.
All nodes – servers upon which the blockchain runs – are therefore permissioned and immune to network manipulation. Performance is exceptional and the platform scales in a near linear fashion as nodes are added.
Transaction speed and settlement of under a second, and throughput of millions of transactions per second can be achieved.
There are no blocksize limits as experienced by slower, public blockchains, and the accumulation of vast data volume does not affect performance.
DT Chain also interoperates with other blockchains like NXT, Ethereum or Bitcoin.
Permission based VS Public:
Public (non-permissioned) blockchains are open to participation by anyone with the computing power to drive the computationally intensive Proof of Work (PoW), or the capital intensive Proof of Stake (PoS) consensus mechanisms.
In a Permissioned Blockchain there is no need for complex computations or financial gambles. Each node is a known participant, subject to legal agreements and/or regulations, issued with a cryptographically verifiable identity (private key) secured within a hardware device attached to the node. Any aberrant behavior has consequences agreed to by participants, and this may also result in the invalidation of permissions.
There are 2 formats of nodes available:
Master Nodes to support the Global Network and Sub Nodes for a Private Network
Standard Nodes to Support the private network
Master Nodes are for organizations that wish to participate globally in decentralized manner with other organizations. Private networks are generally for internal purposes.
DT Chain is able to leverage functions and core elements of other Blockchains such as Smart Contracts on Ethereum, or the Token Authentication of NXT, along with messaging anchoring. DT Chain therefore enablesdecentralized computing to cross over Permissionless and Permissoned Blockchains, enhancing regulatory compliance and jurisdictional control.
- Jurisdictional or Private Internal use cases for the Sub Nodes.
- Standardized Internal & External Data Management
- Data Normalization and Silo Deconstruction
- Data Encryptionat rest and in motion
- Comprehensive, data record & field level access control
- Simplified reporting within and outside the enterprise
- Reducing storage infrastructure costs
- 100% Up time
- Improved Business Continuity of Data
Compliance according to jurisdiction