||| IOTA ||| - THE ECONOMY OF THINGS
OTA is an open-source distributed ledger (cryptocurrency) focused on providing secure communications and payments between machines on the Internet of Things. Using directed acyclic graph (DAG) technology instead of the traditional blockchain, IOTA's transactions are free regardless of the size of the transaction, confirmation times are fast, the number of transactions the system can handle simultaneously is unlimited, and the system can easily scale. IOTA was founded in 2015 by David Sønstebø, Sergey Ivancheglo, Dominik Schiener, and Dr. Serguei Popov.
IOTA has a collaboration with Deutsche Telekom, Microsoft, and Fujitsu, the Foundation opened up a data marketplace using IOTA technology.
Transactions
For an IOTA user to send out a transaction, the user must validate two other, randomly selected transactions. A sent transaction must accumulate a sufficient level of verification (i.e. must be validated a sufficient number of times by other users) in order to be accepted as “confirmed” by its recipient. IOTA works with a single administrator called the Coordinator which confirms all transactions in a set of released milestones. Without the Coordinator, the IOTA DAG is not considered sufficiently secured in its early stages. The Coordinator is meant to be removed when the network is sufficiently large.
The Tangle
Instead of using a blockchain, IOTA uses a directed acyclic graph (DAG). IOTA's DAG is colloquially referred to as the "tangle", and is a generalization of the block chain protocol (a blockchain is a special case of a DAG).
Cryptography
IOTA uses Winternitz hash-based cryptography signatures instead of elliptic curve cryptography (ECC). Hash-based signatures are much faster than ECC.
IOTA made use of a self-designed hash function named Curl. In July 2017 researchers found a critical vulnerability allowing them to forge signatures. Generally, the researchers criticize the use of self-developed cryptography.[21] On 7 August the developers replaced the hash function with a version of SHA-3 named Kerl, which works with ternary (instead of binary) operations, effectively fixing the vulnerability.