Exchange

IDX Chain Integrates Dandelion++ Protocol to Enhance User Privacy

Privacy is a major concern in the cryptocurrency industry, and Index Chain is a project that is working to improve privacy levels for users. Also, apart from the existing TOR integration into the blockchain, IDX Chain developers implemented the protocol known as Dandelion++ that further improves user privacy.

Development of Dandelion++

Dandelion was the name of the protocol’s original version and was developed to function like an anonymity layer. Proposed in 2017, Dandelion aimed to enhance P2P privacy for Bitcoin. But, due to certain flaws in this original version, steps were taken to develop Dandelion++.

Integration of Dandelion++ protocol within IDX Chain is a clear indication that they are serious about user privacy.

How does Dandelion protocol work?

This implementation functions like an IP concealer while a transaction is broadcasted in the blockchain. Here, when a transaction is made within the IDX network, it is randomly broadcasted onto a node that the user is connected to, and the process goes on.

The broadcast of a transaction into the IDX network happens in 2 phases, known as STEM and FLUFF.

  1. STEM Phase: In this phase, a solitary Dandelion++ node is chosen to get transaction-related information. This process is repeated a couple of times before the FLUFF phase starts.
  2. FLUFF Phase: Here, all the connected nodes are informed about the transaction to make sure all the nodes are aware of it.

The good thing about this protocol is that the transaction’s origin will become untraceable and associating a particular IP to any specific transaction will not be possible. In conjunction with TOR implementation, it will result in a private, safer, and more secure network.

Fred Wilson

Fred Wilson is a news editor and writer for CryptoEighty. In addition to cryptocurrency market, he enjoys learning, and writing about blockchain technology and it's use cases. He regularly contributes technical analysis articles for digital currencies. He had also worked as a digital media expert for foremost news sites.

Recent Posts

How does Monero ensure untraceable transactions in cryptocurrency?

Introduced in 2014, Monero (XMR) is an open-source cryptocurrency designed for privacy. Emphasizing transaction anonymity…

5 months ago

Top reasons why Solana is the best blockchain for gaming

The gaming realm has numerous blockchains, each with price and unique significance. One among them…

6 months ago

Unlocking the future of fun: 8 indicators for a winning crypto game

The burgeoning blockchain technology and cryptocurrencies are today the two influential and crucial driving forces…

6 months ago

What is Cardano (ADA) and how it differs from Bitcoin

Cardano is an up-and-coming cryptocurrency that is increasingly gaining traction in the realm of digital…

7 months ago

Dogecoin: From meme to mainstream — What’s next?

Once a humorous meme in the cryptocurrency world, Dogecoin has quickly outgrown its roots to…

7 months ago

What is Tron crypto and How to use it to gain profit?

The decentralized platform and blockchain-based cryptocurrency Tron (TRX) aim to revolutionize the digital entertainment industry.…

7 months ago