Archives: Docs

Docs

token-transfer-flow

Login with NEARToken Transfer flow In the previous article we saw an example of token transfer between accounts found in different shards. That example was simplified and missed a few steps in the process. That was intentional, to keep the article and the video short yet explanatory, in order to give you a bigger picture …

token-transfer-flow Read More »

Validators

Login with NEARThe NEAR network is decentralized, meaning that multiple people collaborate in order to keep it safe. We call such people validators. In order to make sure that all the transactions in the network are valid, i.e. that nobody is trying to steal money, the validators follow a specific consensus mechanism. Currently, there are …

Validators Read More »

near-data-flow

Login with NEARNEAR Data Flow <iframe width=”100%” height=”500″ src=”https://www.youtube.com/embed/VSBJ-A69Km4” title=”YouTube video player” frameborder=”0″ allow=”accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture” allowfullscreen> info Data flow In this video we give a quick overview on the main concept of how the data flows across the NEAR Protocol blockchain. NEAR Protocol blockchain data flow might be a bit tricky …

near-data-flow Read More »

Tokens

Login with NEARNEAR Token This is the native token used in NEAR Protocol. It has multiple use cases: Secures the network through staking Provides a unit of account – NEAR is used for processing transactions and storing data Serves as a medium of exchange Securing the Network NEAR Protocol is a proof-of-stake (PoS) network, which …

Tokens Read More »

Avoiding Token Loss

Login with NEAR warning Careful! Losing tokens means losing money! Token loss is possible under multiple scenarios. These scenarios can be grouped into a few related classes: Improper key management Refunding deleted accounts Failed function calls in batches Improper key management Improper key management may lead to token loss. Mitigating such scenarios may be done …

Avoiding Token Loss Read More »

Runtime

Login with NEARThis section contains videos that explore the core Runtime, its operation, and how it implements cross-contract calls. Runtime Overview An in-depth code overview of NEAR Runtime. <iframe width=”560″ height=”315″ src=”https://www.youtube-nocookie.com/embed/Xi_8PapFCjo” frameborder=”0″ allow=”accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture” allowfullscreen> Runtime Action and Data Receipts An in-depth code review of how NEAR Runtime implements cross …

Runtime Read More »

Scroll to Top