Verifiable timestamps and ordering of events.
The 3rd generation public ledger
Bitcoin pioneered decentralized infrastructure and Ethereum brought programmability. But earlier proof-of-work blockchains consume massive amounts of energy and process transactions slowly in order to achieve acceptable levels of security. Heavy bandwidth consumption by these technologies leads to expensive fees, even for a simple cryptocurrency transaction.
The Hedera proof-of-stake public network, powered by hashgraph consensus, achieves the highest-grade of security possible (ABFT), with blazing-fast transaction speeds and incredibly low bandwidth consumption. By combining high-throughput, low fees, and finality in seconds, Hedera leads the way for the future of public ledgers.Discover HBAR
1. Cryptocurrency transactions. For Hedera, range shown for transactions not requiring a transaction record, but can receive a transaction receipt.
2. Avg. Bitcoin tx fee from 6/26/20 - 9/24/20 from https://blockchair.com/bitcoin/charts/average-transaction-fee-usd?interval=3m
3. Avg. Ethereum tx fee from 6/26/20 - 9/24/20 from https://blockchair.com/ethereum/charts/average-transaction-fee-usd?interval=3m
Build directly on hashgraph
Create scalable and publicly verifiable timestamps and ordering of events for any application. Track assets on a supply chain, count music streams for digital rights, or log digital asset transfers.
ENABLE FAST, LOW FEE PAYMENTS
Cryptocurrency payments allow you to transact using hbars without intermediaries to lower costs and make complex payments simple with code.
Last metrics update: September 29, 2020 at 00:00 UTC
Achieve fast, low-latency transactions with guaranteed finality in seconds, not minutes or hours. Hedera is an order of magnitude faster than blockchain alternatives.
Count on fair access, timestamps, and transaction ordering that can't be manipulated by malicious nodes.
Deploy on a network with proven, best-in-class asynchronous Byzantine fault tolerant (ABFT) security that's resistant to DDoS and Sybil attacks.
Run on a reliable network governed by term-limited enterprises with no authorized forks, and the ability to meet global data regulations.