Godx - DxChain Project Now Open Source
Why is Godx Open Source?
DxChain Godx project is made open source with views to give robustness to the codes by granting permission to members of the public or any engineer familiar with the go language to access the code through the link provided above, allowing them to review its internal implementation logic, verify and modify the code, and compile their own executable file. This also, indicates that no Trojan or backdoor virus can hide in the program to ensure that the project runs in a completely open and safe environment. The DxChain team declares that it is willing to work with community members to maintain this code-based law and build a healthy developer ecosystem..
Let's look at the unique features of Godx
- It is compatible with EVM (Ethereum Virtual Machine)
- Lightning Network Storage Protocol
As seen in Bitcoin transaction speed and scalability, Lightning Network since launched had proved it's effectiveness by improving Bitcoin in these areas. In the algorithm of the offline file contract, the DxChain team also adopted a protocol similar to the lightning network channel and named it storage protocol which allows two parties who store the same file in the main chain to sign the contract, carry out the pledge fund and follow up on many detailed activities (such as uploading/downloading files) that can be implemented offline until the funds are settled by both parties. This means that even if there are huge files in the network that need to be stored, it can be quickly completed, without affecting the main chain, greatly improving storage performance and throughput efficiency.
- Swift Verification Algorithm.
This also is referred to Zero-second file storage verification algorithm. DxChain Team, using a specially designed Merkle Tree algorithm, implemented this protocol on file storage verification. In contrast to other algorithms, ZFSV saves unnecessary network interaction time, so that the acceptance speed of large files can be kept behind seconds. This method will conveniently eradicate hackers/bad actors by ensuring that all file storage are efficiently verified by the entire network.