Apr 15, 2024

What happens if nodes are malicious at Geeq?

Malicious nodes are automatically identified and isolated. They are flagged, so users can ignore them. They become irrelevant.

Jul 3, 2023

June 2023 Tech Round-Up

Merkle root computation and Merkle proof generation is code complete for Validation Layer Blocks (VLBs). Geeq explains how its painstakingly organized data structures lead to easily verified proofs.

Jun 4, 2023

Chain State View (CSV)

All network actors who are following the Chain State for a Geeq blockchain must attest to their own view of the current Chain State.