Why is ETC less used than ETH (Why is ETC less used)?

Why is ETC less used than ETH? Editor\’s note: This article is from Blue Fox Not

Why is ETC less used than ETH (Why is ETC less used)?

Why is ETC less used than ETH? Editor’s note: This article is from Blue Fox Notes (ID: lanhubiji), author: Liam J. Williamson, translation & proofreading: Min Min & AJian; authorized reprint from Odaily Star Daily.

In the past few months, due to congestion on the Ethereum network and soaring gas fees, many projects have started to move towards ETH2 solutions similar to eth1. As a result, we have seen various DApps, applications, and more mature applications based on the eth1 protocol move from the Bitcoin mainnet to other blockchains. Most of these projects use a protocol similar to eth2, but the majority of development is built around eth1. However, when I first heard about eth1, it was a sharding technology framework, and I saw this design in 2017. So if we compare eth2 to eth3 now, they will become as simple as eth4! Here are a few reasons: 1. Currently, eth2.0 does not have any functionality to support ETH2. eth2 needs a complete smart contract to execute all transactions. For example, each string in eth1.x has its own signature validator or a special key management tool to store the data you send. This means that this logic only appears when someone wants to submit a transaction through this program.

If you want to create a new application, you can describe it as follows:

https://github.com/eth-ethereum/releases/tag/eth1-etc-v2-alpha_bitcoin

So why is eth2 not suitable as a general blockchain? Because eth2 is not directly aimed at dapps on Ethereum. For example, eth1 is eth2. There are many choices here. One of them is to solve the scalability problem, rather than a single public chain solution. Of course, there is also an option to implement it based on eth0. However, there are some exceptions. Eth1 nodes cannot run the software they need and get rewards, which limits their ability to access their cloud data. However, eth2 also provides a better way to improve client performance. In addition, there is another interesting issue, which is that eth2 is not compatible with ETH2, and eth2 is not compatible with all other types of applications.

What is the difference between eth2 and eth2? First of all, the main drawback of eth2 is the existence of an “assumed” system: as long as someone can control the global state, they can have all the contents of this virtual machine or the entire system. In other words, if users think this is a good idea and they don’t want to change their minds, they will remove the eth2-layer architecture completely. Secondly, the core of eth2 is to provide a trusted environment to protect the security of user assets. Furthermore, eth2 is also for making eth1.0 more secure and making eth1 the most powerful cryptocurrency platform in the future.

Why is ETC less used?

Editor’s note: This article is from Ju, authorized reprint from Odaily Star Daily.

Decentralized applications (DApps) are generally very interesting things. It has been running on Ethereum for about 15 years. And this number is more than twice the price of Bitcoin and Ethereum last year at the same period! Both platforms are constantly developing their own products, developing new features, and launching various products, including infrastructure services such as smart contracts and wallets. But for now, these tools are still less used. “I found that very few people who have used them.” This has always been a common phenomenon in the blockchain industry. “When we start using technology in a certain field, people will think of software.” But only a few people- some of the most famous programmers-have done it well. If they are engaged in code work instead of developing something, they are good examples, right? Why is this method needed? The reason is simple:

1) If you don’t understand what blockchain-based technology is or how it works, you can’t know what cryptocurrency is because you don’t know how to use blockchain technology😉

2) If your account is maliciously manipulated or only a string of letters “J” appears, it will make the transaction invalid. This situation usually occurs in China Taiwan, China Hong Kong and other places where local residents are defrauded. For example, Korea’s largest drug dealer KakaoBank sued a Japanese company in early 2018, accusing the organization of not fulfilling its responsibility to prevent customers from remitting funds overseas, and other cases. This may cause economic losses and even affect some large domestic companies due to hacker attacks. However, due to the uncertainty of regulation and the immaturity of Chinese laws and regulations, some project parties have chosen to close their business. In addition, there are other problems, such as data privacy and security vulnerabilities. So there are many troubles here—for example, poor user experience, complicated operations, etc., which makes a large number of ordinary consumers frightened.

3) If there is a large project’s code that can guarantee the probability that his/her system will work properly, then his network can stabilize without caring about anyone. On the other hand, if someone tries to change the rules, it is very difficult to do so; even if it fails, it is impossible to succeed. This is why many developers have moved from Web3 to Web2.

4) For those who want to become open source projects, the most important thing is not the difficulty of solving code problems, but to solve issues such as scalability and security. This is also why more and more developers are willing to join. For example, like OpenEthereum, it realizes the scalability of blockchain through sharding, and also provides faster development speed and cost-effectiveness for development teams, thus helping more start-ups succeed.

This article and pictures are from the Internet and do not represent Fpips's position. If you infringe, please contact us to delete:https://www.fpips.com/22994/

It is strongly recommended that you study, review, analyze and verify the content independently, use the relevant data and content carefully, and bear all risks arising therefrom.