• MT block records are open and transparent on the main chain MTC browser.
  • MT will use open source methods to create a framework for collaborative technology development behind the MT blockchain. We will establish appropriate procedures for discussing and reviewing changes to the underlying protocols and software of the blockchain.
  • MT will perform extensive testing on the blockchain, from testing the protocol to testing the network as a whole with various entities (such as wallet services and trading platforms) to ensure that the system operates normally before release.
  • MT will work hard to promote the development of the • Move•…

MT Token The total amount is 1 billion, 50 million for technical operations, 350 million for coin-holding mining power, and 600 million for game mining.

Technical operation accounts for 50 million pieces — -used for the project’s pre-operation, technology research and development, ecological construction, etc.

The mining computing power accounts for 350 million pieces-the POS consensus mechanism (proof of rights) is adopted for mining. The greater the amount of currency held, the more coins are obtained from mining every day.

The game mining computing power accounts for 600 million pieces — -based on the length of the game, the input…

After Shenzhen Luohu first tested and issued the digital RMB red envelope in October, the current digital RMB red envelope pilot work in Suzhou has also come to a successful conclusion. According to the latest data released by JD.com, from 20 o’clock on the 11th to 20 o’clock on the 11th in 24 hours, nearly 20,000 orders were paid in digital renminbi on the JD scene. The largest single online payment amount exceeds 10,000 yuan.

There is no doubt that with the orderly conduct of the digital RMB test, the digital economy era has come in full swing. In all…

-Support the issuance of custom privacy tokens

The blockchain token is widely recognized from the ERC20 standard established by Ethereum. In the ERC standard, each person or business entity can issue a custom token. This custom token can represent any right and value, depending on how the token is given when it is designed. However, most public chains that currently support token issuance do not support native private transactions. It needs to edit the privacy algorithm by the token contract writer, and needs to develop a dedicated wallet for his token. The overall cost of issuing a privacy token in this way is relatively high. …

-Dandelion Spreading Protocol

The main purpose of the Dandelion Agreement is also to improve the privacy of Bitcoin transactions. It is important to know that the spread of bitcoin transactions does not hide the source of transactions well. Whenever a transaction is made, it will be disclosed to the nodes of the entire network, so people can trace the origin to the initial node. Dandelion is a new transaction broadcasting mechanism whose goal is to confuse the IP addresses of Bitcoin transactions. Like the stem and fluff contained in the petals of dandelion, the dandelion protocol is broadcast to the network in two…

-transaction information tailoring

The purpose of trimming block transaction information is to save storage space. In the Bitcoin white paper, a method of reclaiming hard disk space is described, that is, deleting all transactions in the block except the last transaction. Without reclaiming hard disk space, all transactions are stored in the block. Satoshi Nakamoto clearly stated in the Bitcoin white paper that “most of the data in the previous block can be deleted and only the block header data is retained” to streamline the current increasing block data. This processing method not only retains the complete block information, but also reduces the…

-Equihash POW consensus algorithm

Equihash is a proof-of-work mining algorithm (POW) designed by Alex Biryukov and Dmitry Khovratovich. Equihash is based on the broad birthday problem (computer science and cryptography concepts) and an enhanced Wagner algorithm. It was originally developed by Zcash. At present, the mining algorithm Equi-hash has been used by more than a dozen different blockchains, but many have evolved from Equihash variants. Advantages of the Equihash algorithm: It is ASIC resistant. This proof-of-work algorithm is purely memory-oriented, meaning that the amount of mining will depend on the amount of memory in the hardware. …

— SESI 3 (Telegram Question)

Jinsungkay:What are your marketing strategies. How do you intend to make this project known? Would there be A need for more team members and ambassadors?

JIN KO:We are searching for more talents to help us win the global market. You can follow our medium https://metcalfechain.medium.com to learn more about our marketing strategy.

Samanta Mitchell: What are your plans for the 2021 in terms of developing?

JIN KO: In a word, more talents, more applications, and more funds. MTC fund will continue to support good teams and ideas. The more good ideas, the better MTC is.

Aitel:How can users stay updated…


Host: Hello everyone, welcome to MTC AMA, I am the host of today’s AMA. In recent years, with the rapid development of technologies such as blockchain, artificial intelligence, and big data, many companies hope to use emerging technologies to open up new ecological traffic pools and enjoy the traffic dividends of the new era.

So, the sharing project we invited today is MTC a new generation of intelligent traffic application aggregation public chain. At present, MTC has begun to create a brand-new high-traffic application ecosystem. It also continues to expand ecologically and launches a global strategy. …

--Introduction Session

Thank you to the Bang Pateng Community for participating in Ask Me Anything (AMA) with Metcalfe Time on December 12th, 2020. This guest star Mr. JIN KO. If you were unable to join the live AMA, no worries, here comes our 27th AMA recap!

We are glad to meet here:

Introduction Session

Host: Hello everyone, welcome to MTC AMA, I am the host of today’s AMA. …


Metcalfe Chain(MTC) is a new generation of intelligent traffic application aggregation public chain.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store