Welcome to contact us. Email: email@example.com, or @ulordchain on GitHub or Twitter. Your suggestions are very important to us. We look forward to your support and participation.
1. Libp2p network technology was studied, and how to use it in Ulord.
2.The cross chain technology of Cosmos and Polkadot was investigated, and the cross chain method of Ulord was studied.
1. The API interface of the balance mechanism between UDFs network communication delay and data retransmission mechanism was coded.
2. The effect of TEE on the performance of storage proof algorithm was studied.
Some interfaces of Ulord APP were optimized.
51% attack: 51% attack refers to the use of bitcoin’s computing power as a competitive condition to tamper with or revoke their own payment transactions with the advantage of computing power. If someone has more than 50% of the computing power, he can find the random number needed for the mining block faster than others, so he can create the block faster than others.