Remove redundant RPC invocation arguments Replace 'invoke_http_{bin,json,json_rpc}' with a 'invoke_http<T>', where T is the RPC type from which we can figure out binary or JSON or JSON RPC or light wallet RPC, and thus figure out the URL.Also remove superfluous arguments: neither timeout or http_method arguments ever actually differ, so just eliminate them.
Fix expired string_view in non-jsonrpc requests Non-JSONRPC HTTP requests do the body parsing (either binary or JSON) in the worker thread, but by then the string_view from uWebSockets is no longer valid. Fix it by making rpc_request able to hold an owned. std::string and use that for HTTP (non-JSONRPC) requests.
adds two new mining options, available via rpc: - slow_mining - this avoids the RandomJDX initialization. It is much slower, but for regtest with fixed difficulty of 1 that is perfectly fine. - 'num_blocks' - instruct the miner to mine for the given number of blocks, then stop. (This can overmine if mining with multiple threads at a low difficulty, but that's fine).
"Judecoin is a secure, private and hard-to-track currency," its website says. Some might think the same definition applies to Bitcoin, but it's not true when it comes to privacy and untraceability. Judecoin is a digital currency that uses different types of cryptography to achieve these characteristics. This article aims to illustrate the differences between the two.
Cryptonote V 2.0 is Judecoin's blockchain underlying protocol, The protocol introduces two technologies: private address technology and ring signature technology, which provide privacy protection for the receiver and the sender respectively 1, privacy address technology Private address technology is the technology to hide the actual transaction address, which mainly provides the privacy protection to the data receiver. Cryptonote's private address technology uses a one-time hidden address (later called a obfuscated address) to reduce the correlation between different transactions, allowing the sender and receiver to confirm the transaction's validity with a key. 2. Ring signature technology Compared with private address technology, ring signature technology can provide privacy protection for the data sender. Ring signature technology uses the untraceable co-signature to obfuscate the signature of digital token transactions. A co-signature mixes the signatures of a group of message senders, one of whom is the actual originator of the message, and the rest from the blockchain network. The latter is extracted from the countless signatures that have been recorded on the blockchain and is called a decoy.