Technical features

ROD (prefix ROD) is a token based on the UMI blockchain, which is a tool for staking and creating various solutions for many projects, including the DoStaTok game. The total issuance of ROD is capped at 21 trillion tokens. Once the total issuance reaches 21 trillion ROD, staking will stop.

  • ROD is issued on the UMI blockchain.

  • Each block on the UMI blockchain accommodates up to 65,535 transactions. New blocks are generated approximately once every 1 second, providing the network and ROD token with a throughput of up to 3,932,100 transactions per minute.

  • Standard addresses for ROD begin with the prefix "rod" and contain 62 characters (Bech32 format). Example address:

  • rod1uce7l9n7ql67q2zj6mt5x3zjxgwr4x79kzzl0lnl45s6utlpgsgs0cd2vx

  • Addresses within pools (smart contract by staking pool) start with a different prefix, depending on the pool settings. ROD01 through ROD99.

  • The wallet address is generated using a mnemonic seed phrase (256-bit), which is a random series of words. For example:

  • water prize useless put surface laundry neck because expire sing sing dawn digital salon nerve timber fog caution squirrel banner age repeat column venture meadow

  • Transaction hash/ID (TxID) consists of 64 characters and contains digits from 0 to 9 and Latin letters from "a" to "f". Example:

  • 6c30a24bcbbb33d540739dade880e98f9d18b12dc6f411fefd715f748600b77b

  • Each ROD token is divided into hundredths like fiat currencies, not 100s like bitcoins. Thus, the minimum value is 0.01 ROD.

  • ROD is not a stablecoin. The token rate is not pegged to USD or any other currency.

  • The UMI network blockchain is open and available for public viewing through specialized blockchain explorers. So all transactions with the ROD token can be tracked publicly through blockchain browsers or specialized software.

  • All transactions are pseudo-anonymous. They are not anonymous because the addresses, amounts, and transaction hash/ID (TxID) are visible to everyone for transparency purposes.

  • The UMI network does not use a "wallet.dat" file and there is no need to store anything electronically.

  • To ensure that the network is protected from malicious flooding and DDoS attacks, the UMI blockchain uses a PoW security model that allows for commission-free operation. The device needs to perform a small mathematical operation to send a transaction to the network.

  • Merkle Tree, API and SDK tools simplify and speed up the process of confirming ROD transactions with third-party payment gateways, providing integration with existing payment systems, exchangers, Telegram bots, mobile apps and cryptocurrency exchanges.

Last updated