Using the DAG approach allows these chains to secure each other’s blocks or data by referencing earlier units created by others. There are currently 3 live projects that are using this technology: Byteball (GBYTE), IOTA and Nano. All 3 are using a different approach to solve the possible attack vectors and this means that they… Read More