Log in
Enquire now
Metamen Network

Metamen Network

Metamen Network is a network between people entering the metaverse.

OverviewStructured DataIssuesContributors

All edits by  Viachaslau Novikau 

Edits on 10 Feb, 2022
Viachaslau Novikau profile picture
Viachaslau Novikau
edited on 10 Feb, 2022
Edits made to:
Infobox (+2 properties)
Infobox
Telegram
https://t.me/metamenofficial
Twitter
https://twitter.com/METAMEN_N
Viachaslau Novikau profile picture
Viachaslau Novikau
edited on 10 Feb, 2022
Edits made to:
Article (+1 images) (+6403 characters)
Article
EXECUTIVE SUMMARY MTM

MTM, Web2 and Web3 applications respond to vulnerabilities that may occur off-chain, on-chain, and on-chain. The network acts as a base.

Layer that bridges the divide between blockchains, creating a secure DeFi ecosystem.

WTM soldiers exist across blockchains linking different protocols and It enables blockchain interoperability by allowing them to talk to each other.

Blockchains are great for securely storing valuable data, but not for connecting that data to others chains or welds are difficult. The basic node layer external smart contracts to securely perform complex calculations at zero gas cost off-chain computing.

MTM will deliver high-speed performance to common blockchain projects.

The principle of "data on demand" was essential to become industry leaders in their field.

Using truly decentralized oracles and cross-chain bridges has never been easier or easier.

KEY FEATURES
Secure Subsequent Consensus

MTM's core consensus layer is a unique and completely new type of system. It is called Secure Subsequent Consensus. Through adaptive collateral, the protocol can provide fast execution times while ensuring node consensus reached.

Seamless scalability

The MTM network is not a chain and does not store data permanently, so the network It can be easily scaled horizontally without any limitations.

Decentralized Computing

With MTM any Web3 application can run high-level, tamper-proof calculations (Python, Java, C, C++, Rust etc) in its own MTM application container. Nodes running the same App can: they can gossip and even work together to create a decentralized supercomputer.

Customizable and cost effective

Nodes do not need to run all applications and can join or exit any program they want.

They like to run on their machines.

  • Customized nodes: nodes running a very specific application
  • Public nodes: nodes running (almost) all applications

Web3 developers can now switch between the tradeoffs this configuration provides: security and security. speed.

MTM TECHNOLOGY
NODE NETWORK

MTM nodes can have one or more roles. These roles include:

  • signing and sending data to the blockchain
  • Observing data and revealing disagreements

MTM nodes use gossip to gossip as a protocol level communication method. A the user's request starts the process on the first node, whereby it prepares the data, signs it, and propagate it to other nodes. Data is processed by several nodes (configured by the application) and these nodes are selected in a cryptographically secure manner random basis.

Each dApp can customize its class according to its requirements. customize It can be applied in the following ways:

Number of subsequent signatures required from nodes to execute transactions

  • Number of required verifications without conflict
  • Coverage insurance amount required to execute transactions
  • Request input/output and calculation
  • Allowance of custom programs and scripts
  • Distributed consensus algorithm
  • Applied parts

When an HTTP request is received, the MTM network will validate the data internally. Oracle has signed and will freeze the node's locked collateral in case of any dispute. if consensus is reached on the data, then the node's stake is unlocked and Supports incoming requests. It is only partially locked according to the bet amount. required collateral.

RUNNING A NODE

Users can play an active role in the MTM node network by running their own nodes. Them are encouraged to do so through a reward system. Nodes provide coverage as insurance for the data they sign and to provide the infrastructure that makes this possible.

For heavy computation work to be handled in the muon network. calculation off-chain is done on the nodes themselves and the data is then transferred to the chain.

Because MTM is highly configurable and dApps can specify a wide variety of requirements. No special hardware is required to run a MTM node. For a node to qualify While receiving requests from all dApps in the MTM network.

Hardware solution with enough computing power to meet the most demanding needs.

SUBSEQUENT CONSENSUS

The secret of MTM's impressive features (speed, modularity, unreliability) is, the way in which consensus was reached and how it was evaluated on a transactional basis.

With MTM, any type of computation can be done on a set of data and then forwarded to the destination chain destination. Basic understanding of the layers built upon blockchains are the way to reliably transmit said data, and The common way to pass Oracle data to a chain is as follows:

1. Node performs or transfers computational tasks.

2. The result is completed with signature and sent to the node cluster

3. The nodeset verifies the validity of all provided signatures (and data fields).

If applicable: pass data to blockchain/contract. If invalid: punish/slash node (in general conversation) and try again.

Validation process in our solution (as described in step 3)

The transaction has been sent to the blockchain. By this logic, Muon nodes (or clusters)

Much more efficient than traditional methods of interacting with blockchains.

BORROWER COLLUSION WITH AUDITORS

A Borrower may collaborate with Auditors to obtain approval to establish Borrower Pools when they are not legitimate. The first protection is one of the Unique Entity Control Sybil attack where Rogue Auditors are created programmatically. second guard Auditors must have shares of MTM withheld if they vote different from the majority. Auditors The third protection is the random selection of Auditors, weighted according to their weight. It has put MTM at risk, so substantial upfront capital needs to be invested. elected enough to distort the votes. The fourth protection is that anyone can make a claim. ratification at any time would therefore require collusion for all potential future votes. just one. Finally, even if a fraudulent debtor successfully colluded with the Auditors, they also need to persuade many Supporters to risk their own capital.

TOKENOMICS

USE OF THE TOKEN

In addition to the benefits of the token holders mentioned above, the $MTM token powers our ecosystem with multiple uses and payments:

  • Passive income from the transaction fees
  • Purchase of NFTs
  • Marketing and promotion in the ecosystem
  • Tipping the adult content creators

Unlike other adult entertainment platforms, MTM is the only platform that provides its users with the ability to use the tokens to purchase adult content

Viachaslau Novikau profile picture
Viachaslau Novikau
edited on 10 Feb, 2022
Edits made to:
Description (+70 characters)
Topic thumbnail

Metamen Network

A unique network between people entering the world of the Metaverse...

Viachaslau Novikau profile picture
Viachaslau Novikau
edited on 10 Feb, 2022
Edits made to:
Topic thumbnail

METAME METAMEN

Metamen Network is a network between people entering the metaverse.

"Created via: Web app"
Viachaslau Novikau profile picture
Viachaslau Novikau
created this topic on 10 Feb, 2022
Edits made to:
Infobox (+2 properties)
Topic thumbnail

 METAME

Metamen Network is a network between people entering the metaverse.

Infobox
Is a
Cryptocurrency
Cryptocurrency
Website
https://www.metamennetwork.com/

Find more companies like Metamen Network

Use the Golden Query Tool to find similar companies in the same industry, location, or by any other field in the Knowledge Graph.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.