In this video I go over the DVM-Basic language and point out a few inaccuracies in the official documentation. I also demonstrate how to launch a contract, how to avoid a nasty exploit, and how to use the Universal Dero Contract UI

In this video I go over the DVM-Basic language and point out a few inaccuracies in the official documentation. I also demonstrate how to launch a contract, how to avoid a nasty exploit, and how to use the Universal Dero Contract UI
The DERO Foundation has released their brand new GUI wallet named Engram. This offers a bunch of features all in one place for DERO users and developers to take advantage of. In this video I go over those features, install Engram and do a quick demo of the platform.
There’s a cool feature that DERO offers that allows users to register and attach a custom name to their DERO wallet address. This allows you the ability to only have to give someone who wants to send DERO to you, your custom name and not your full wallet address.
This short video will show you the command lines required to setup your Full Node and CLI Miner to be able to mine DERO on the DERO Network. This is for users running derod on the same machine. If you are looking for a more advanced configuration, please visit the DERO documentation on their website.
This video will show you how to connect to the DERO network by using a remote node and how to create your wallet using the CLI Wallet interface.
This video will show you how to setup a full node on DERO and create your own wallet using the CLI Wallet interface. This is a Windows installation for the Stargate Mainnet ONLY. If you have DERO coins on Atlantis still you will need to swap those. Visit the DERO Website for more information.
DERO is a general purpose platform for building unstoppable decentralised applications and securely storing and transferring value. It is an original protocol which has been built from scratch and is maintained by the developer team who created it. This is not a fork or translation of any other layer 1 (L1) blockchain protocol.
Trusted Execution Environment is a method like Homomorphic Encryption, to perform operations on data in a form of encrypted state, this form is quite different though. TEE’s work by taking in encrypted data and decrypting it into an encrypted trusted area (called an enclave with Intel SGX) where operations can be performed on the data behind encryption for privacy. The trust in this setup comes from having the data in a decrypted state and having to rely on the surrounding “enclave” to be secure. If you did not create this area, if it is proprietary, then you are trusting it is secure.
The Cryptonote protocol used by Monero, Zano, Haven and a lot of other projects quite often seems to get conflated with encryption when Cryptonote uses sender/receiver obfuscation as key images and stealth addresses. This is partly due to the UTXO model not lending itself to encryption as well as an account model does.