Blockchain Explained

Learn more about the technology behind digital currency, wallets, and ledgers.

  • Making a payment with an ERC20 token.

    When you are making a payment with an ERC20 token like TRST or DAI you need to sign TWO transactions. Here's how it works Let's say, for example, you intend to contribute 1 TRST to a lending circle sm...

  • What's the Difference Between Distributed Apps and Traditional Ones?

    Without getting too technical, traditional apps are based on what’s known as the “client-server model”. A person uses an app as the “client” which connected to a centralized “server” for processing an...

  • What Is a Blockchain?

    Simply put, a blockchain is a group of records of activity (called blocks), “chained” together over time to form a historical record of that activity. Blockchains, because of their reliance on cryptog...

  • Why Is Blockchain So Complicated/Confusing?

    Emerging technologies can appear complicated initially due to their unfamiliarity and potential for change. Blockchain can appear as a seemingly nontraditional experience for people used to interactin...

  • Who Controls a Blockchain?

    A blockchain is distributed - there’s no single owner. By design, these records are stored across multiple network computers (called “nodes”), and every addition to these records gets encrypted and re...

  • What Else Can I Do on the Blockchain Besides Buy Digital Currency?

    Fundamentally, blockchains provide secure keeping of records. This concept has many applications beyond buying digital currency: patient record management for healthcare, transaction processing, and n...

  • How Tech-Savvy Do I Need to Be to Use This?

    One of WeTrust’s goals is to make blockchain technology familiar and accessible to everyone. At present, blockchain applications require a certain level of technical expertise to set up and use, which...

  • Is This Safe to Use? Will I Be Hacked?

    Blockchain technology, by nature of its decentralization, is “secure by design”. Blockchain was built from the ground up with exploits and hacking in mind; in other words, the technology anticipates m...