Docker is a powerful virtualization tool. While this is not the only virtualization solution available today, it remains one of the simplest to use. Let’s see if and how it plays a critical role in decentralized systems.
Figure 1. Polkadot Runtime Not using Docker Before going any further, it is probably worth mentioning that many people are using Docker to run nodes and validator nodes. The option is totally valid and (I may argue) even better.
In a previous article, I submitted a motion to the Kusama Council proposing the registration of a new registrar on Kusama: Registrar #1.
Unlike the name suggests, this is not the first registrar on Kusama. It brings a second registrar on the chain as we can see by querying the chain state of the identity module:
1. TLDR If you only want to jump to practical todos ignore the explanations, you may directly go to Certification process.
I introduced srtool in a previous article. While the first implementation filled a gap and allowed for the first time users to verify substrate runtime wasm blobs, there was still work to do to improve the user’s experience.
1. Current verification process Up to now, the verification process looked like:
a runtime dev works on some changes
he builds the new runtime locally, preferably using srtool in order to get the SHA256 of the new wasm blob right away
The surprise You may read more about Brave in my first article about the Brave browser.
After recently visiting one of my own blog post to check the spelling, I got the surprise to be welcomed by a pop proposing me to install a mysterious Crypto Wallet extension.
If you are in crypto for a while, all alarms bells should be ringing already. This typically looks like a phishing attempt.
Google Chrome needs no introduction and most people who visited an internet page within the last 5 years likely used Chrome or one of the Chromium based browsers.
At the launch of the Kusama network, there was no way to identify who the owner of a given account was beside making your own research and adding a name to an account in the PolkadotJS UI. New solutions have been tested and the system is evolving.
Background Address book Building your network of trust with the Address book looks like this:
This would look as follow:
Unlike all other Blockchains, Polkadot (based on Substrate) allows on-chain protocol upgrades without requiring the node operators to do anything but to keep their node up and running.
If you know everything about Substrate Runtime, you may jump to the Installation section.
In order to achieve this, Polkadot stores its runtime executable as a WASM blob in its own storage. If the WASM blob is replaced, the new runtime kicks in and all the nodes start using it, altogether.
A glance at the past Back in 2018, I introduced theCyber with this first article. A second article provided more detailled information about the contracts and what needs to be solved in order to enter the small circle of people who made their way in.
After the introduction of the GateKeeperTwo detailled in this article, the readers were left with the challenge to try hacking the contract and save one of the 127 spots available.
Your account as an id, custodial wallets and dApp browsers. How to leap forward decentralized services.
The (no longer so) “inter” net of 2019 In 2019, the typical workflow for a traveler through the internet looks most of the time as:
open your favourite web browser
browse to your favourite site directly or through a search
select your auth provider, which mostly mean clicking on on of the button below.
Polkadot is a platform that allows diverse blockchains to transfer messages, including value, in a trust-free fashion; sharing their unique features while pooling their security. In brief, Polkadot is a scalable, heterogeneous, multi-chain technology.
Monitoring the Polkadot network can mean either staring at charts the whole day until something happens…
…or asking PolkaBot to take care of the watching. It doesn’t sleep!
Polkadot - what’s it good for?
If you ever used decentralized platforms such as Bitcoin or Ethereum (to name only a few), you probably installed a few Apps on your Desktop, on your Mobile, etc… Those includes so called wallets, dApps, etc…
The on-boarding process varies a little bit but mostly boils down to making a new account or set of accounts on the device . This new account is in fact a key pair (private key + public key) or a seed allowing the deterministic generation of multiple key pairs.
This artcile is about using the new Polkadot Docker image to get started with PoC-2.
Note Read this article in German on Base58.de. Exciting times The Polkadot PoC testnet has been up and running for a while, but for newcomers who want to jump in the level of technical detail may seem a little daunting. Don’t let that stop you!