Loopring does not employ the Proof-of-Work (PoW) or Proof-of-Stake (PoS) consensus procedures . Instead, it uses a Loopring protocol based on a three-layer Merkle Tree. This method is more secure and allows for thousands of transactions per second.
Loopring does not employ the Proof-of-Work (PoW) or Proof-of-Stake (PoS) consensus procedures . Instead, it uses a Loopring protocol based on a three-layer Merkle Tree. This method is more secure and allows for thousands of transactions per second.