Dehvo
Search
K

Platform Overview

Enterprise, Governmental, and Private Applications

Our technology can be used to deploy private infrastructure, that can further bolster productivity and allow for better and trustless workflow for individuals, governments, and enterprises.
Dehvo Inc. is constantly updating and upgrading its enterprise-level suite of applications, that like no other mainstream platforms, allow for setup and deployment of a private production-grade blockchain in less than one minute.

Smart Contracts Ready

Developers can deploy with ease on Dehvo as it is Solidity compatible out-of-the-box. It leverages on the Ethereum Virtual Machine, and is compatible with well-known and wide used IDEs, such as Remix and Truffle.
Being Solidity compatible also means that it is easier for participants to fork existing open-source platforms from other networks, into Dehvo.

Scaling and Multilayering

Dehvo is built to be scalable and future proof. It's multilayering mechanism allows for further development on top of its Execution Layer, making possible the implementation of subnets using different consensus mechanisms. This enables massive scaling potential without compromising the core security and decentralisation elements of the core network.

Core Layer

As the name suggests, this is the core layer of the network, and it's comprised by several Core Layer Nodes. Each one of these nodes stores a complete history of the network, and can also act as a Validator in case of major problem or even complete failure of the Execution and Bridging layers. It guarantees that the network is unstoppable and resilient.

Bridging Layer

The bridging layer is comprised by an array of nodes acting as active bridges between the Execution Layer and the Core Layer. All transactions submitted to an Execution Layer node passes through a Bridging Layer node, which then broadcasts it to a Core Layer node, that permanently records and seals the information into the network's history book, or ledger. This mechanism allows easy mitigation of attacks, or tampering attempts from any Execution Layer nodes by breaking the link between the attacking node and the main network ledger. In these cases a fork with the tampered records is created and disconnected away, instead of it being sealed and recorded as a legitimate part of the main public ledger.

Execution Layer

It is comprised by the Validator Nodes, which are used to seal new network blocks, as well as to allow connection and communication with the network via public or private RPCs.

Subnet Layer

Built on top of the execution layer, Subnet Layer nodes allow for seamless future implementation of scaling solutions, including purpose-built public subnet ledgers and private or public third-party blockchains or DAGs.