The majority of existing cryptocurrencies, including Bitcoin and Ethereum, have transparent blockchains. Transactions can be verified and/or traced by anyone in the world. This means that the sending and receiving addresses of these transactions could potentially be linked to real-world identities.
Tuske, on the other hand, uses various technologies to ensure the privacy of its users.
Tuske uses custom ASIC-resistant and CPU-friendly POW algorithm, designed to make the use of mining-specific hardware unfeasible
A new block is created every ~2 minutes. There is no maximum block size, but instead a dynamic block size, to ensure a dynamic scalability.
RingCT
Stealth Addresses
Ring Signatures
Transactions over Tor/I2P
With Tuske, there are no wire transfer or check clearing fees, no multi-day holding periods, and no fraudulent chargebacks.
Tuske cannot be traced. Merchants and individuals accepting Tuske do not need to worry about blacklisted or tainted coins.
Tuske attract people from all over the world who contribute their efforts to help grow.
Get started in minutes. No need to wait for approval from a central authority.
Trading takes place on a global P2P network of users running Tuske on their own machines.
User data is stored locally on-disk, and is never sent to a central server.
TSK(Tuske mainnet coin) is used as trading margin and transaction fee.
Copyright © 2024.Tuske.network All rights reserved.