Log in
Enquire now
WATCHMEN

WATCHMEN

IN THE WORLD OF THE FUTURE; Decentralized cloud computing, cross-chain bridge interface and security for gaming, NFT, DeFi and dApps! WTM watchmen

OverviewStructured DataIssuesContributors

Contents

watchmenmeta.com
Is a
Cryptocurrency
Cryptocurrency

Cryptocurrency attributes

Industry
Blockchain
Blockchain
Tokenization
Tokenization
Blockchain and cryptocurrency
Blockchain and cryptocurrency
Cryptocurrency
Cryptocurrency
Non-fungible token (NFT)
Non-fungible token (NFT)
Ticker Symbol
WTM
Maximum Supply
5,000,000,000
Block Explorer URL
bscscan.com/token/0xc...9e3f84124c

Other attributes

Cryptocurrency Symbol
WTM
Exchange
Hotbit Exchange
Hotbit Exchange
0
Token Standard
BEP-20
Total Supply
5,000,000,000

Secure Subsequent Consensus

WTM's core consensus layer is a unique and completely new type of system.

It is called Secure Subsequent Consensus. Through adaptive collateral, the protocol

can provide fast execution times while ensuring node consensus

reached.

Seamless scalability

The WTM network is not a chain and does not store data permanently, so the network

It can be easily scaled horizontally without any limitations.

Decentralized Computing

With WTM any Web3 application can run high-level, tamper-proof calculations (Python, Java, C,

C++, Rust etc) in its own WTM application container. Nodes running the same App can:

they can gossip and even work together to create a decentralized supercomputer.

NODE NETWORK

WTM nodes can have one or more roles. These roles include:

● signing and sending data to the blockchain

● Observing data and revealing disagreements

WTM nodes use gossip to gossip as a protocol level communication method. A

the user's request starts the process on the first node, whereby it prepares the data, signs it,

and propagate it to other nodes. Data is processed by several nodes

(configured by the application) and these nodes are selected in a cryptographically secure manner

random basis.

Each dApp can customize its class according to its requirements. customize

It can be applied in the following ways:

Number of subsequent signatures required from nodes to execute transactions

● Number of required verifications without conflict

● Coverage insurance amount required to execute transactions

● Request input/output and calculation

● Allowance of custom programs and scripts

● Distributed consensus algorithm

● Applied parts

When an HTTP request is received, the WTM network will validate the data internally.

Oracle has signed and will freeze the node's locked collateral in case of any dispute. if

consensus is reached on the data, then the node's stake is unlocked and

Supports incoming requests. It is only partially locked according to the bet amount.

required collateral.

RUNNING A NODE

Users can play an active role in the WTM node network by running their own nodes. Them

are encouraged to do so through a reward system. Nodes provide coverage as insurance

for the data they sign and to provide the infrastructure that makes this possible

For heavy computation work to be handled in the muon network. calculation

off-chain is done on the nodes themselves and the data is then transferred to the chain.

Because WTM is highly configurable and dApps can specify a wide variety of requirements,

No special hardware is required to run a WTM node. For a node to qualify

While receiving requests from all dApps in the WTM network,

Hardware solution with enough computing power to meet the most demanding needs.

SUBSEQUENT CONSENSUS

The secret of WTM's impressive features (speed, modularity, unreliability) is,

the way in which consensus was reached and how it was evaluated on a transactional basis.

With WTM, any type of computation can be done on a set of data and then

forwarded to the destination chain destination. Basic understanding of the layers built upon

blockchains are the way to reliably transmit said data, and

The common way to pass Oracle data to a chain is as follows:

1. Node performs or transfers computational tasks.

2. The result is completed with signature and sent to the node cluster

3. The nodeset verifies the validity of all provided signatures (and data fields).

If applicable: pass data to blockchain/contract. If invalid: punish/slash node (in general

conversation) and try again.

Validation process in our solution (as described in step 3)

The transaction has been sent to the blockchain. By this logic, Muon nodes (or clusters)

Much more efficient than traditional methods of interacting with blockchains

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like WATCHMEN

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.