Add xmr.to faucets and block explorers to networks articl

This commit is contained in:
Piotr Włodarek 2018-11-07 15:21:19 +02:00
parent 61b938d197
commit 9da5363b3d
3 changed files with 10 additions and 10 deletions

View file

@ -28,8 +28,8 @@ Stagenet is technically equivalent to mainnet, both in terms of features and con
To get started:
* Connect your GUI or CLI to stagenet open node **monero-stagenet.exan.tech:38081**
* Get free XMR from [stagenet faucet](http://stagenet.xmr-tw.org:38085/)
* Check the [stagenet block explorer](http://162.210.173.150:8083/)
* Get free XMR from [stagenet faucet 1](https://community.xmr.to/faucet/stagenet/) or [stagenet faucet 2](http://stagenet.xmr-tw.org:38085/)
* Check the [stagenet block explorer 1](https://community.xmr.to/explorer/stagenet/) or [stagenet block explorer 2](http://162.210.173.150:8083/)
Default TCP ports (listening):
@ -51,8 +51,8 @@ To get started:
* Build Monero from [source](https://github.com/monero-project/monero)
* Connect your GUI or CLI to testnet open node **monero-testnet.exan.tech:28081**
* Get free XMR from [testnet faucet](https://dis.gratis/)
* Check the [testnet block explorer](https://testnet.xmrchain.net)
* Get free XMR from [testnet faucet 1](https://community.xmr.to/faucet/testnet/) or [testnet faucet 2](https://dis.gratis/)
* Check the [testnet block explorer 1](https://community.xmr.to/explorer/testnet/) or [testnet block explorer 2](https://testnet.xmrchain.net)
Default TCP ports (listening):

View file

@ -21,7 +21,7 @@ Efficient CryptoNight ASIC was developed in 2017 by Bitmain.
Monero inherited CryptoNight as its proof of work in 2014.
Since then Monero slightly evolved the algorithm to intentionally break compatibility with released ASIC-s.
Currently Monero implements CryptoNight v2, a third iteration of original CryptoNight.
Currently Monero implements CryptoNight v2, a third iteration of original CryptoNight (v0, v1, v2).
## The goal is to find small-enough hash
@ -46,7 +46,7 @@ They also have a power over which transactions are included in the block and how
CryptoNight is based on:
* AES encryption
* 5 hashing functions, all of which were finalist in NIST SHA-3 competition:
* 5 hashing functions, all of which were finalists in NIST SHA-3 competition:
* Keccak (the primary one)
* BLAKE
* Groestl
@ -75,7 +75,7 @@ See [get_block_hashing_blob()](https://github.com/monero-project/monero/blob/mas
CryptoNight attempts to make memory access a bottleneck for performance ("memory hardness"). It has three steps:
1. Initialize large area of memory with pseudo-random data. This memory is known as the scratchpad.
2. Perform numerous read/write operations at pseudo-random addresses on the scratchpad.
2. Perform numerous read/write operations at pseudo-random (but deterministic) addresses on the scratchpad.
3. Hash the entire scratchpad to produce the resulting value.
### Step 1: scratchpad initialization
@ -93,7 +93,7 @@ The next payload is encryption result of the previous payload.
Each 128-byte payload is actually encrypted 10 times.
The details are a bit more nuanced, see "Scratchpad Initialization" on [CryptoNote Standard](https://cryptonote.org/cns/cns008.txt).
The details are a bit more nuanced, see "Scratchpad Initialization" in [CryptoNote Standard](https://cryptonote.org/cns/cns008.txt).
### Step 2: memory-hard loop
@ -127,7 +127,7 @@ The resulting 256-bit hash is the final output of CryptoNight algorithm.
### CryptoNight v0
This is how Monero refers to original implementation of CryptoNight.
This is how Monero community refers to original implementation of CryptoNight.
### CryptoNight v1

View file

@ -7,7 +7,7 @@ title: Proof of Work in Cryptocurrencies | Monero Documentation
## PoW protects against Sybil attack
In decentralized cryptocurrencies **untrusted** actors sign (blocks of) transactions.
In decentralized cryptocurrencies **untrusted** actors confirm (blocks of) transactions.
If threshold voting was employed then the scheme would break immediately.
This is because nothing prevents a single actor from creating arbitrary number of pseudonyms and take over the voting.