Mint and configure tokens and accounts.
Decentralization is a foundational principle of blockchain technology, and at Hedera, it is the cornerstone of building the Hedera network to sustain security, longevity, and sustainable operations.
Hedera is a proof-of-stake network, meaning it does not require mining to solve computational problems and deliver proof of work for reward. Instead, Hedera’s design uses the value of a scarce, “pre-minted” resource ($HBAR), staked to network nodes, to achieve consensus and protect the network against certain forms of cyberattack, including Sybil attacks. Enabling native staking, therefore, is essential for the Hedera network to continue along its path to decentralization and to incentivize staking behavior to protect the network from attack.
Schwyz, Switzerland, 20th April 2022 – Hedera Hashgraph has entered into a strategic partnership with Swiss Digital Assets Institute (SDAI) – a professional training and education company – for the delivery of a custom-designed global “Hashgraph Innovation Program” out of Switzerland.
Dallas, TX - January 19, 2022 - The Hedera Governing Council has voted to purchase the intellectual property rights to the hashgraph consensus algorithm from Swirlds, Inc., the original creator of the hashgraph consensus algorithm and founding member of the Hedera Governing Council.
DALLAS, TX - September 16, 2021 - The Hedera Governing Council has announced the approval of a plan to allocate 10.7 billion hbars (approximately 20% of total supply), currently worth US $5 billion as of September 16th, 2021, towards the development of the Hedera ecosystem.
Today marks the launch of the official Hedera Hashgraph Partner Program. In the spirit of Hedera’s path to decentralization, this program establishes a foundation upon which a fully decentralized partner community will grow and thrive.
In the weeks since our launch, we are seeing an increasing number of sophisticated scammers trying to take advantage of our community. These scams range from emails to Twitter accounts to fake websites, and the most sophisticated of them are targeted phishing scams, using social engineering.