BlueCoin Detail

BlueCoin mitigates the threat of 51% attacks by combining the ASIC resistant X11 algorithm with an energy efficient PoS (Proof of Stake) validation scheme.

With BlueCoin users prevent double spend attacks on the network by simply holding a balance, or mining with their personal computers, never needing fancy equipment to participate in BlueCoin's decentralized peer-to-peer economy.

Malicious users would need to take over 51% of the total BLU supply, and 51% of the networks hashing power to execute an attack successfully, making it infeasible for such an event to ever take place.

Links

Cookies disclaimer

Our site saves small pieces of text information (cookies) on your device in order to deliver better content and for statistical purposes. You can disable the usage of cookies by changing the settings of your browser. By browsing our website without changing the browser settings you grant us permission to store that information on your device.
Participate: