Cardano delivered its long-awaited 1.0.0 ‘Daedalus’ mainnet wallet while IOHK publishes 11 blockchain vulnerabilities for the sake of transparency.
Cardano’s new wallet mainnet, Daedalus 1.0.0, was officially launched today, according to an IOHK update. The portfolio, which had been developed since September 2017, brings several new features to the Cardano ecosystem, a blockchain background synchronization and optimized security.
Unlike Cardano’s ‘light’ portfolios, launched earlier and so called because they don’t carry all the ledger, Daedalus is a full node wallet. This means that a full copy of Cardano’s blockchain will be downloaded along with the new wallet. Thus, Daedalus will independently validate each transaction in its history. According to the developers, this offers maximum security as centralized intermediate servers are denied.
Daedalus also enables blockchain synchronization of background. In a recent update video (below) by Cardano’s founder and IOHK CEO Charles Hoskinson, the revelation is made that the sync now takes about an hour – quite different from the one previously recorded, which lasted between 9 to 14 hours.
Another addition to this version comes in the form of what the developers call “unlimited counting.” Being a “hierarchical deterministic portfolio,” Daedalus allows the end user to generate several pairs of public / private keys through a simple seed or mnemonic phrase – enabling simultaneous management of multiple portfolios.
IOHK reveals potential vulnerabilities in Byron
The launch of Daedalus happens after the release of the reboot Byron from the Cardano blockchain. A recent IOHK contracted and benchmarked security audit revealed 11 potential vulnerabilities in the blockchain. Having resolved them, IOHK chose to publish them for the sake of transparency.
“It is vital that the blockchain industry live up to its own vision of open and decentralized systems when it comes to the process of blockchains under construction,” said Hoskinson. “Companies should not prioritize market secrecy and speed over security, because large sums of money and even lives will depend on the software we produce. The industry must make the development of its software available to third-party audits and share the science of vulnerabilities for the benefit of the entire segment and aiming to obtain the user’s trust. ”