As we wrap up another week, let’s take a look back at what happened over the last seven days.
In order to build a stronger AtomicDEX community, we created a new AtomicDEX Twitter account and we will tweet in the future more often about new version updates, project listings, and bug fixes.
Make sure to follow the AtomicDEX Twitter account to stay up to date!
The AtomicDEX beta continues and the Komodo developers have released version 0.215 for Android and iOS. The new version contains one of the most requested features for AtomicDEX the ‘Orderbooks’.
You can now see the orderbooks for the buyer and also for the seller side.
In addition, there are the following changes.
- Added Orderbooks
- Added the pairs $XZC and $ZER
- Removed VOTE2020
- Various fixes and improvements
- Updated atomicDEX core
Furthermore, the work on AtomicDEX Pro continues and the development team will soon release a new update.
The Subatomic Go project had a name changer. From now on it will be called “Shurli”. In addition, the developments for Shurli continue and there will be minor too big changes in the UI/UX.
Pirate Chain created the Pirate OS to provide an extra layer of wallet privacy and security by letting a USB-powered operating system handle your wallet transactions
The PirateChain team began to work on I2P integration that will be available for the whole Komodo Ecosystem. A total of 0.25 BTC was raised so far. This doesn’t cover the full costs of the development, for this reason, the PirateChain team is still looking for donations.
Blog about Industry News
Mylo started a blog on https://orderbook.live about industry news.
Komodo History Book (2016-2020)
Tyke has updated the book chapters of the Komodo History Book.
Komodo continued with its Blockchain Fundamentals content series this week with two new interconnected articles.
This first article is about Distributed Ledger Technology. It defines the common components of distributed ledgers and explains how they generally work to achieve consensus. We’ll compare public ledgers and private ledgers. Finally, we’ll look at how four prominent types of DLTs work.
The second article is on Asymmetric Encryption. It looks at how asymmetric encryption overcame the most pressing challenge that older symmetric encryption methods faced. It’ll explain how asymmetric encryption uses public/private key pairs and digital signatures to enhance security. Finally, it’ll highlight some of the most widely-known asymmetric encryption algorithms.
Thanks for reading. Stay safe, stay healthy.