The PoCo series of articles discusses the Proof-of-Contribution protocol developed by iExec.
The first episode of this series gave an outline of the protocol. In the second episode, we had a deeper look at the consensus mechanism, where we discussed the use stake and the (non-) effectiveness of different attack scenarios. In this third episode, we will describe an updated, more detailed, version of the protocol along with all transactions involved in achieving consensus.
Was this helpful?
Did you like the post? Let us know your opinion!
Thanks. Would you like to add something?
Thanks for your feedback!