paint-brush
Protocol Spotlight: Avalanche (Part 2)by@flatoutcrypto
1,232 reads
1,232 reads

Protocol Spotlight: Avalanche (Part 2)

by FlatOutCrypto8mJuly 1st, 2018
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

This is Part 2 of an introduction to the <a href="https://ipfs.io/ipfs/QmUy4jh5mGNZvLkjies1RWM4YuvJh5o2FYopNPVYwrRVGV" target="_blank">Avalanche Protocol</a>. Part 1 looked at what Avalanche is, what it is trying to achieve and the assumptions and guarantees Team Rocket outline. It can be found <a href="https://medium.com/@flatoutcrypto/protocol-spotlight-avalanche-3f5dfd366a26" target="_blank">here</a>. I will now look at the <a href="https://hackernoon.com/tagged/protocols" target="_blank">protocols</a> that make up the Avalanche family and how they come together to form the leaderless protocol Avalanche.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Protocol Spotlight: Avalanche (Part 2)
FlatOutCrypto HackerNoon profile picture
FlatOutCrypto

FlatOutCrypto

@flatoutcrypto

L O A D I N G
. . . comments & more!

About Author

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite