Some of Tangram’s functionality will roll out as of today for testing to all community members. Although transactions bugs are still being ironed out, opening up the testing process to the community will help with identifying bugs across the functionality on Cypher Testnet and get you started.
For this Open Beta rollout, the Cypher functionality that will be available is limited to — downloading, installing, and running both Cypher’s node and wallet. This will enable you to start familiarising yourself with the node functionalities and running a node, creating a wallet, using wallet commands, etc.
Four weeks ago, Tangram released Cypher Open Beta. We advertised to the community that anyone can start running a node and setting up a wallet to familiarise themselves with the process. After several key fixes and enhancements to Cypher, such as:
As we progress with Tangram and begin preparations for releasing Cypher Open Beta testing to the community; updates are in order.
As we move closer to the release of Tangram Mainnet, we’re focusing on finding contributors who are able to dedicate time to development across Tangram’s core functionalities such as networking, protocol, and other critical areas. Currently, the key experience areas are C# and C++, although later these will expand into other skillsets which can assist in building Tangram’s wider ecosystem of web apps, etc.
Some time ago, Inkadnb stepped back from actively contributing to the project on a regular…
Cypher is Tangram’s final testnet before Tangram’s mainnet release.
The reason for the continuation of Cypher closed testnet throughout the month of May is three-fold for
Tangram’s developers have decided that it is essential to halt Serf within Tangram’s network architecture and have the network communication libraries modularised for an extensible networking stack. This solves many challenges…
As we get closer to the Open Beta release of Cypher after its many iterations and upgrades, this article will serve as a high-level overview of where we are today, while providing some status updates.
Here are some of the key accomplishments and insights.
Refactoring, new features and test scripts. Cypher now contains many other significant fixes, changes and improvements including the following:
Cypher is an unaudited and unrefined release of Tangram. It is intended to serve as a proving ground, allowing developers and teams to build and deploy nodes, send and receive transactions, and test and evaluate the consensus and privacy.
Warning: this is a pre-production environment of an experimental network — expect glitches in the matrix.
This Testnet-2 timeline aims to provide a rough guideline for expectations during the weeks after Testnet 2 release.
Please feel free to discuss and advise if you believe this Checkpoint framework should be changed.
Checkpoint 1 will run for ≈2–4 weeks. This time will be…
Distribution models are challenging, especially when creating something new. Discussions around the best way to disseminate a new cryptocurrency follow very researchable short and long-term strategies. These strategies usually fall into two categories:
If we look at mining, ultimately it contributes heavily to two very simple functions;
Is there a way for us to mimic this process then, and obtain both of these functions? Further, can we improve on it? This is a particularly challenging question, and debates between short-term and long-term strategies are forever dynamic.
We (both the Core team and…
This has been a long awaited project and development update. It is also a new year, twice over within a month (unlike our updates), so Happy Chinese New Year! 🐀.
Now a major project alignment piece has been on the front burner for quite some time. We’d like to touch on the following:
In our last update we highlighted the development and integration work being done with zk-PoS. Development is on-going, and the ground-work for zk-PoS has made…
Moving forward, the bug bounty program scope and rewards will grow and continue to be actively updated as we extend and expand the Tangram network, hit important development milestones, and ship new features into the wild. As the network evolves, so will the bug bounties. The scope of the bug bounty program will be progressively updated to include more of Tangram’s code, and also specific files, vulnerabilities, and areas which may need to be focused on.
Vulnerabilities which may be eligible for the bug bounty include; memory allocation bugs, race conditions, timing attacks, information leaks, authentication bypasses, incorrect block validation…