#MetaHash security against external threats

#MetaHash
#MetaHash
Published in
2 min readFeb 28, 2019

Unfortunately, it is difficult to imagine any modern IT-project without fraudsters, extortionists and simply ill-wishers. However, the developers of #MetaHash made every effort to protect the system from all sorts of attacks, viruses, spam and malicious actions that could affect the users’ assets and affect the network.

The security system of the #MetaHash network bases on universal voting: it is impossible to gain full control over the system, even with a budget of billions of dollars or with 67% of #MHC in one hand. It’s a true decentralization, do you agree? All users of #MetaHash are real people, not impersonal groups of dominant users with giant mining farms. In addition, do not forget about transactions rechecking: each operation is protected by 5 different consensus algorithms.

Every day the nodes belonging to the #MetaHash establish the anchor of the last block in networks Ethereum, Bitcoin and some others. In the case of a successful attack, this fact will help to restore the #MetaHash network stability by the method of general voting. Fidelity of the anchor installation can be checked by any network member. Thus, to change the data of the #MetaHash network, you need to attack successfully both the #MetaHash network and additional Blockchain-networks, which is absolutely impossible.

In addition, there is a system of ranking the trust levels to the nodes. If a node handles a transaction incorrectly, that will reset its trust. A node will be able to come close to 99% of trust level only after 6 months of continuous operation. If the node was used to disrupt or slow down the network, it loses accumulated trust and cannot be fully used for a long time.

As you can see, the #MetaHash developers have tried to think over everything to protect the network from possible external threats. However, many Internet users are faced with detractors not only on a global level but also on a more personal one, due to fake and fraudulent accounts widespread today. That is why it’s really important to remember that Managers\Administrators of #MetaHash will never write private messages, ask for money, offer any actions or tokens on “exclusive” conditions. Of course, #MetaHash Administrators regularly clean groups from spam and flooding, but phishers also write to people directly, so be careful. By the way, it’s not so difficult to protect yourself from phishing sites and ICO scammers: we advise you to clarify the advisor’s connection with the project, ask questions to the team and check carefully the answers, review carefully White Paper and Road Map of the project.

Follow our recommendations and be careful — safety is a true key to success.

Our website
#MetaGate
Telegram
Twitter

--

--