People often ask questions about what NKN can do outside NKN blockchain, for example:

Can we use NKN to enable real time communication between two Ethereum addresses?

Can we use NKN to do communication between different blockchain addresses, like Ethereum to Bitcoin?

Can we use NKN to communicate between web2 addresses (e.g. domain, email address) and web3 addresses (e.g Ethereum address, ENS)?

Now the answer is YES.

Built on top of the New Kind of Network (NKN) protocol, Universal Communication System (UCS) uses NKN as its network layer, effectively making NKN the TCP/IP layer in the UCS architecture. This groundbreaking system enables end-to-end encrypted communication without reliance on any centralized server, ensuring optimal privacy and security for all users.

Today we have officially integrated OpenAI chatGPT into nMobile secure private chat. Download nMobile today from Android/iOS app stores or APK and add chatGPT bot using the QR code. You can use it either in one-on-one private chat (recommended), or use at command @gpt in a group chat (both public group and private group). As […]

We released a new mainnet version v2.2.0 at https://github.com/nknorg/nkn/releases. This version adds a few major features including client authorization, client message cache, transaction pool sync. In addition, this version contains several performance optimization, bug fixes and security patches. Upgrade is highly recommended.

After two successful years of Web 3.0 Tech Talks (2020 highlights, 2021 highlights), this year we will return with a series of informal panel discussions on the latest hot topics in Web 3.0. The first panel is focusing on “trust”.

You can rewatch the Panel 1 recording on YouYube here
https://youtu.be/aucrfPglszk

Transaction spamming, or Tx spamming, is one of the persistent security attacks on these high performance blockchains that can wreak havoc for extended periods of time. The attackers might or might not gain any financial benefit, but can certainly make everybody’s life quite miserable at relatively low cost.

In this article, we define what is transaction spamming, how to detect it, and how to deal with it. Recent examples from 4 leading projects were studied, as well as a best practice is summarized.