Responsive Advertisement

How does DSFR work?




As a new user, you can get started with DSFR without understanding the technical details. Once you've installed a DSFR wallet on your computer or mobile phone, it will generate your first DSFR address and you can create more whenever you need one. You can disclose your addresses to your friends so that they can pay you or vice versa. In fact, this is pretty similar to how email works, except that DSFR addresses should be used only once.





DSFR uses peer-to-peer technology to operate with no central authority or banks; managing transactions and the issuing of DSFRs is carried out collectively by the network. DSFR is open-source; its design is public, nobody owns or controls DSFR and everyone can take part. Through many of its unique properties, DSFR allows exciting uses that could not be covered by any previous payment system.


The block chain is a shared public ledger on which the entire DSFR network relies. All confirmed transactions are included in the block chain. It allows DSFR wallets to calculate their spendable balance so that new transactions can be verified thereby ensuring they're actually owned by the spender. The integrity and the chronological order of the block chain are enforced with cryptography.


A transaction is a transfer of value between DSFR wallets that gets included in the block chain. DSFR wallets keep a secret piece of data called a private key or seed, which is used to sign transactions, providing a mathematical proof that they have come from the owner of the wallet. The signature also prevents the transaction from being altered by anybody once it has been issued. All transactions are broadcast to the network and usually begin to be confirmed within 10-20 minutes, through a process called mining.






Mining is a distributed consensus system that is used to confirm pending transactions by including them in the block chain. It enforces a chronological order in the block chain, protects the neutrality of the network, and allows different computers to agree on the state of the system. To be confirmed, transactions must be packed in a block that fits very strict cryptographic rules that will be verified by the network. These rules prevent previous blocks from being modified because doing so would invalidate all the subsequent blocks. Mining also creates the equivalent of a competitive lottery that prevents any individual from easily adding new blocks consecutively to the block chain. In this way, no group or individuals can control what is included in the block chain or replace parts of the block chain to roll back their own spends.