QWLA | Next level of asset ownership…

QWLA
QWLA
Published in
4 min readMar 13, 2021

Crypto assets fall under several different categories Tokens, Coins and recently popularized NFTs. But how are these assets used in the real world? What can you do with them? Lets take a look at how QWLA token works…

QWLA | Network

What is a Crypto Token?

Crypto tokens, which are also called crypto assets, are special kinds of virtual currency tokens that reside on their own blockchains and represent an asset or utility. Most often, they are used to fundraise for crowd sales, but they can also be used as a substitute for other things.

Bounce Voting

A lot of currently available Token’s provide no real world functionality and do not enable the holder any direct network benefits. QWLA Token enables Bounce Voting and General Network Governance to the asset holders. Both of these functions inside the QWLA network allow holders the ability to impact the direct management of the ETFs funds. Bounce Voting also impacts enhancements and changes to the network.

QWLA | Network Harmony Protocol

Every blockchain network is susceptible to malicious attacks, and it’s important to the network to have protective measures for stakeholders. QWLA harmony protocol actively monitors the incoming/outgoing transactions for deliberate attacks on the network. The allows stakeholders to freely move assets and use Bounce Voting while our goal is to keep the network stable and secure.

Why we are Proof of Stake

Proof of Stake (PoS) concept states that a person can mine or validate block transactions according to how many coins he or she holds. This means that the more Bitcoin or altcoin owned by a miner, the more mining power he or she has.

The proof of stake was created as an alternative to the proof of work (PoW), to tackle inherent issues in the latter. When a transaction is initiated, the transaction data is fitted into a block with a maximum capacity of 1 megabyte, and then duplicated across multiple computers or nodes on the network. The nodes are the administrative body of the blockchain and verify the legitimacy of the transactions in each block. To carry out the verification step, the nodes or miners would need to solve a computational puzzle, known as the proof of work problem. The first miner to decrypt each block transaction problem gets rewarded with coin. Once a block of transactions has been verified, it is added to the blockchain, a public transparent ledger.

Mining requires a great deal of computing power to run different cryptographic calculations to unlock the computational challenges. The computing power translates into a high amount of electricity and power needed for the proof of work. In 2015, it was estimated that one Bitcoin transaction required the amount of electricity needed to power up 1.27 American households per day. To foot the electricity bill, miners would usually sell their awarded coins for fiat money, which would lead to a downward movement in the price of the cryptocurrency.

The proof of stake (PoS) seeks to address this issue by attributing mining power to the proportion of coins held by a miner. This way, instead of utilizing energy to answer PoW puzzles, a PoS miner is limited to mining a percentage of transactions that is reflective of his or her ownership stake. For instance, a miner who owns 1.75% of the Bitcoin available can theoretically mine only 1.75% of the blocks.

Understanding the 51% Network Attack

Bitcoin uses a PoW system and as such is susceptible to a potential Tragedy of Commons. The Tragedy of Commons refers to a future point in time when there will be fewer bitcoin miners available due to little to no block reward from mining. The only fees that will be earned will come from transaction fees which will also diminish over time as users opt to pay lower fees for their transactions. With fewer miners than required mining for coins, the network becomes more vulnerable to a 51% attack. A 51% attack is when a miner or mining pool controls 51% of the computational power of the network and creates fraudulent blocks of transactions for himself while invalidating the transactions of others in the network.

With a PoS, the attacker would need to obtain 51% of the cryptocurrency to carry out a 51% attack. The proof of stake avoids this ‘tragedy’ by making it disadvantageous for a miner with a 51% stake in a cryptocurrency to attack the network. Although it would be difficult and expensive to accumulate 51% of a reputable digital coin, a miner with 51% stake in the coin would not have it in his best interest to attack a network which he holds a majority share. If the value of the cryptocurrency falls, this means that the value of his holdings would also fall, and so the majority stake owner would be more incentivized to maintain a secure network.

QWLA will always hold 51% of the available tokens off the network and offline in a cold storage device. Not one party will have full control of the network.

--

--

QWLA
QWLA
Editor for

Disrupting the foundation of traditional ETFs #Innovation #FutureTech #Decentralization #Blockchain #BlockchainETFTs