See Also
Scrape AVAX network peers using avax-python
P2P networking is the single most important technical functionality in all cryptocurrency implementations. The decentralized nature of Bitcoin, AVAX, Ethereum and others requires peers to talk to each other 24×7 in order to find out about transactions, new blocks, vertices (for DAG-based cryptos like AVAX) and so on. Even if you had the world’s most […]
Capturing Avalanche AVAX network traffic using avax-python
In this article we take a look at the avax-python network_listener.py utility and how to use it to snoop on Avalanche AVAX network traffic. tl;dr; If you’re in a hurry, here’s how to quickly start capturing Avalanche AVAX network traffic. avax-python requires the following libraries. If you get a missing library error message, then you […]
ELI5 How AVAX validation works [Avalanche Protocol]
According to the Avalanche AVAX token distribution policy, almost 50% of all AVAX in existence will go towards validator rewards (see chart at the top). Since the Avalanche protocol burns all fees, the only source of inflation in the AVAX ecosystem is the validation reward. This presents a great opportunity for those who join the […]
Who is “Team Rocket”, the creators of the Avalanche protocol?
The Avalanche protocol family creators’ true identity is, perhaps, cryptocurrency’s most poorly kept secret. Or is it? Why would such a great idea’s true creators want to keep their names private? Which brings us to an earlier question. Why did Satoshi Nakamoto want to keep his own identity private? Wouldn’t Satoshi be held at the […]