Setting up Viber on a computer

 Setting up Viber on a computer We launch Viber, in Windows this can be done using a shortcut on the desktop, and in Linux Mint using “Menu->Internet->Viber” (the process of setting up Viber in Windows and Linux is no different). After starting on the first window, we answer “Yes”, since in this article we are considering the option when Viber is already on the phone, therefore we answer “Yes”. Then enter the phone number and click Continue. After that, a QR code will be displayed on the next window, and a QR code scanner will start on the phone. You read this code accordingly and that's it, Viber activation on your computer is completed. Next, click the "Open Viber" button. When you first start Viber on your computer, the program will offer to synchronize your chat history, click the "Synchronization" button, a window will open on your phone at this time in which you need to confirm the synchronization, i.e. press the "Start" button. That's ...

Disadvantages of PoS

Disadvantages of PoS


On the market, you can find a fairly large number of cryptocurrencies that work on a hybrid algorithm. Pure Proof-of-Stake is relatively rare, as there are several drawbacks.

One of the main ones is the unfair distribution of coins. The volume of the reward for an open block is determined by whoever has the most of a particular variety of cryptocurrency. This does not allow for complete decentralization. It is most profitable to own cryptocurrency in large volume, which leads to a monopoly of the market. Developers distribute the entire amount of money even before the moment when they enter the market. Early investors find themselves in the most favorable conditions, which does not attract new users. Large investors determine almost all development prospects.

There is a threat of an attack that will be provoked by the largest owners of coins. If the cryptocurrency is sold cheaply, then the coins can be bought in large quantities for a relatively small amount and gain control over most of the entire assets of the system. This allows attackers to resort to various manipulations.

Probability of parallel transactions. There may be two users in the system, the parameters of which will be the same. If the blocks are signed at the same time, both will be correct. Despite the existing shortcomings, the system still has prospects, as the creators are upgrading and working on bugs.