Zen Protocol’s Mining Design – Zen Protocol


#1

Learn more about how we will use Multi-Hash Mining and non-outsourceable proofs for increasing security, node decentralization, and token holders’ input on decisions: