1. Registrieren
Erstelle dein kostenloses Bitpanda Konto.
Der Kauf von Internet Computer bei Europas führender Handelsplattform für den Kauf und Verkauf von digitalen Assets ist einfach, schnell und sicher.
Krypto-Assets sind sehr volatil. Bitte sei dir bewusst, dass du einen Teil oder deine gesamte Investition verlieren kannst. Investiere nur so viel, wie du dir leisten kannst, zu verlieren. Eine detaillierte Übersicht über die Risiken findest du in unseren Risikohinweisen.
Krypto-Assets sind sehr volatil. Bitte sei dir bewusst, dass du einen Teil oder deine gesamte Investition verlieren kannst. Investiere nur so viel, wie du dir leisten kannst, zu verlieren. Eine detaillierte Übersicht über die Risiken findest du in unseren Risikohinweisen.
The Internet Computer (ICP) ist ein Projekt, das die Funktionalität des öffentlichen Internets ausweiten möchte, indem es versucht, die von Technik-Giganten ausgehende Monopolisierung von Internetdienstleistungen einzuschränken. Das Projekt ermöglicht es Developern, Internetdienstleistungen, Websites und IT-Systeme für Unternehmen direkt im öffentlichen Internet zu kodieren und somit auf Mittelinstanzen zu verzichten. Die Zusammenarbeit wird garantiert, indem Nutzerdaten sowie Funktionalität über permanente APIs, die nicht deaktiviert werden können, mit den Internetdienstleistern geteilt werden. Dadurch vermindert sich das Plattformrisiko beträchtlich. ICP ist der native Utility Token von The Internet Computer und wird zur Teilnahme an der Verwaltung des Netzwerks verwendet.
Kryptowährungen mit der höchsten Marktkapitalisierung
Kryptowährungen mit der niedrigsten Marktkapitalisierung
Erstelle dein kostenloses Bitpanda Konto.
Bestätige deine Identität mit einem unserer zuverlässigen Partner.
Verwende unsere verfügbaren Zahlungsoptionen, um Guthaben sicher einzuzahlen.
Schon geht's los! Kaufe Internet Computer und über 3.000 weitere digitale Assets.
ESG-Vorschriften (Umwelt, Soziales und Unternehmensführung) für Krypto-Assets zielen darauf ab, deren Umweltauswirkungen (z. B. energieintensives Mining) anzugehen, Transparenz zu fördern und ethische Governance-Praktiken sicherzustellen, um die Kryptoindustrie mit breiteren Nachhaltigkeits- und gesellschaftlichen Zielen in Einklang zu bringen. Diese Vorschriften fördern die Einhaltung von Standards, die Risiken mindern und Vertrauen in digitale Vermögenswerte schaffen.
Name | Bitpanda Asset Management GmbH, Bitpanda GmbH |
Relevante Kennung der Rechtseinheit | 9845005X9B7N610K0093, 5493007WZ7IFULIL8G21 |
Name des Krypto-Assets | Internet Computer Token |
Konsensmechanismus | Internet Computer Token is present on the following networks: internet_computer, ethereum. The Internet Computer Protocol (ICP) uses a unique consensus mechanism called Threshold Relay combined with Chain Key Technology to ensure decentralized, scalable, and secure operations for its network. Core Components of ICP’s Consensus Mechanism: 1. Threshold Relay: Threshold Relay is a consensus protocol that enables the network to achieve finality without a traditional Proof-of-Work or Proof-of-Stake mechanism. It leverages a group of nodes called "the committee" to generate a random beacon that is used for the selection of the next block producer. The protocol is designed to provide scalability and speed while maintaining decentralization by allowing any node to join the consensus process. The key feature of Threshold Relay is that it utilizes a threshold signature scheme, where a group of nodes must collaborate to create a valid signature, ensuring that consensus is achieved even in the presence of faulty or malicious nodes. 2. Chain Key Technology: Chain Key Technology is used to manage the state of the Internet Computer, allowing it to scale effectively across a vast number of nodes while still providing fast and secure transaction finality. This technology enables the creation and management of many independent blockchains (also known as subnet blockchains), each with its own set of validators. Chain Key Technology allows the Internet Computer to support billions of smart contracts without compromising speed, as it facilitates quick communication between the subnets and enables cross-chain interoperability. 3. Canister Smart Contracts: The Internet Computer utilizes a decentralized model where the computation of canister smart contracts (which hold the application logic) occurs across different nodes in the network. These canisters can run autonomously and scale with the network’s growth. Finality and Security: • The consensus mechanism ensures finality once a transaction is validated, meaning that once a block is added, it cannot be reverted, providing the security required for high-stakes applications. • The use of Threshold Relay provides robust Byzantine Fault Tolerance (BFT), enabling the network to tolerate faulty or malicious behavior without compromising network integrity. The Ethereum network uses a Proof-of-Stake Consensus Mechanism to validate new transactions on the blockchain. Core Components 1. Validators: Validators are responsible for proposing and validating new blocks. To become a validator, a user must deposit (stake) 32 ETH into a smart contract. This stake acts as collateral and can be slashed if the validator behaves dishonestly. 2. Beacon Chain: The Beacon Chain is the backbone of Ethereum 2.0. It coordinates the network of validators and manages the consensus protocol. It is responsible for creating new blocks, organizing validators into committees, and implementing the finality of blocks. Consensus Process 1. Block Proposal: Validators are chosen randomly to propose new blocks. This selection is based on a weighted random function (WRF), where the weight is determined by the amount of ETH staked. 2. Attestation: Validators not proposing a block participate in attestation. They attest to the validity of the proposed block by voting for it. Attestations are then aggregated to form a single proof of the block’s validity. 3. Committees: Validators are organized into committees to streamline the validation process. Each committee is responsible for validating blocks within a specific shard or the Beacon Chain itself. This ensures decentralization and security, as a smaller group of validators can quickly reach consensus. 4. Finality: Ethereum 2.0 uses a mechanism called Casper FFG (Friendly Finality Gadget) to achieve finality. Finality means that a block and its transactions are considered irreversible and confirmed. Validators vote on the finality of blocks, and once a supermajority is reached, the block is finalized. 5. Incentives and Penalties: Validators earn rewards for participating in the network, including proposing blocks and attesting to their validity. Conversely, validators can be penalized (slashed) for malicious behavior, such as double-signing or being offline for extended periods. This ensures honest participation and network security. |
Anreizmechanismen und anfallende Gebühren | Internet Computer Token is present on the following networks: internet_computer, ethereum. The Internet Computer Protocol (ICP) incentivizes network participants (validators, node operators, and canister developers) through various reward mechanisms and transaction fees. Here's a breakdown of the incentive mechanisms and applicable fees related to ICP: Incentive Mechanism: 1. Network Participation and Rewards: Validators: Validators are crucial for maintaining the integrity and security of the network. They stake ICP tokens to participate in consensus and are rewarded for validating blocks, maintaining the integrity of the decentralized network, and ensuring its performance. Rewards for validators are based on their participation in the consensus mechanism and their stake in the network. Node Operators: Node operators who maintain the physical infrastructure of the network (such as hardware and server resources) are also rewarded. These operators run the nodes that participate in the Threshold Relay and provide computational power to the network. 2. Canister Developers and Network Participants: Canister Smart Contracts: Developers of canisters (smart contracts) on the Internet Computer are incentivized through the creation of decentralized applications (dApps). Developers may also benefit from transaction fees generated by the usage of their dApps and the deployment of smart contracts on the network. Usage Fees: Users of decentralized applications (dApps) or canisters are incentivized to pay for their usage through fees. These fees are often paid in ICP tokens, and developers can receive a share of these fees based on the usage of their deployed applications. 3. Governance: The ICP Token is used for governance via the Network Nervous System (NNS), where holders of ICP tokens participate in decisions regarding the protocol, such as network upgrades, incentive adjustments, and the allocation of funds. Token holders are rewarded with the ability to influence the future of the network. 4. Staking Rewards: Staking: ICP token holders can participate in staking their tokens in the NNS, which influences network consensus and governance. By participating in staking, they help secure the network and are rewarded with staking rewards (a form of passive income). The staking rewards are given to token holders who participate in securing the network via the NNS. Applicable Fees: 1. Transaction Fees: Canister Calls: Every interaction with a canister (smart contract) on the Internet Computer incurs a transaction fee. These fees are typically paid in ICP tokens and are used to cover the computational resources required to process requests, store data, and manage execution. Fee Structure: Transaction fees depend on the complexity and resources consumed by the canister call or network operation. For example, operations that require more computational power or data storage may incur higher fees. 2. Storage Fees: Canister Data Storage: Developers and users who deploy applications on the Internet Computer are required to pay fees for storing data. These fees ensure that network resources are used efficiently and that canisters do not waste storage space. The cost of storage is typically paid in ICP tokens. 3. Governance Participation Fees: Voting and Proposal Fees: Participation in the governance process via the NNS (Network Nervous System) may require a small fee, depending on the type of governance action (such as submitting a proposal or voting). These fees ensure that governance is distributed and prevent spam attacks on the governance system. 4. Node and Validator Fees: Fees for Node Operations: Node operators who provide computational power to the network may incur costs related to maintaining hardware and operating nodes. These fees are partially offset by rewards for providing network resources. Ethereum, particularly after transitioning to Ethereum 2.0 (Eth2), employs a Proof-of-Stake (PoS) consensus mechanism to secure its network. The incentives for validators and the fee structures play crucial roles in maintaining the security and efficiency of the blockchain. Incentive Mechanisms 1. Staking Rewards: Validator Rewards: Validators are essential to the PoS mechanism. They are responsible for proposing and validating new blocks. To participate, they must stake a minimum of 32 ETH. In return, they earn rewards for their contributions, which are paid out in ETH. These rewards are a combination of newly minted ETH and transaction fees from the blocks they validate. Reward Rate: The reward rate for validators is dynamic and depends on the total amount of ETH staked in the network. The more ETH staked, the lower the individual reward rate, and vice versa. This is designed to balance the network's security and the incentive to participate. 2. Transaction Fees: Base Fee: After the implementation of Ethereum Improvement Proposal (EIP) 1559, the transaction fee model changed to include a base fee that is burned (i.e., removed from circulation). This base fee adjusts dynamically based on network demand, aiming to stabilize transaction fees and reduce volatility. Priority Fee (Tip): Users can also include a priority fee (tip) to incentivize validators to include their transactions more quickly. This fee goes directly to the validators, providing them with an additional incentive to process transactions efficiently. 3. Penalties for Malicious Behavior: Slashing: Validators face penalties (slashing) if they engage in malicious behavior, such as double-signing or validating incorrect information. Slashing results in the loss of a portion of their staked ETH, discouraging bad actors and ensuring that validators act in the network's best interest. Inactivity Penalties: Validators also face penalties for prolonged inactivity. This ensures that validators remain active and engaged in maintaining the network's security and operation. Fees Applicable on the Ethereum Blockchain 1. Gas Fees: Calculation: Gas fees are calculated based on the computational complexity of transactions and smart contract executions. Each operation on the Ethereum Virtual Machine (EVM) has an associated gas cost. Dynamic Adjustment: The base fee introduced by EIP-1559 dynamically adjusts according to network congestion. When demand for block space is high, the base fee increases, and when demand is low, it decreases. 2. Smart Contract Fees: Deployment and Interaction: Deploying a smart contract on Ethereum involves paying gas fees proportional to the contract's complexity and size. Interacting with deployed smart contracts (e.g., executing functions, transferring tokens) also incurs gas fees. Optimizations: Developers are incentivized to optimize their smart contracts to minimize gas usage, making transactions more cost-effective for users. 3. Asset Transfer Fees: Token Transfers: Transferring ERC-20 or other token standards involves gas fees. These fees vary based on the token's contract implementation and the current network demand. |
Beginn der Periode | 2024-01-30 |
Ende der Periode | 2025-01-30 |
Energieverbrauch | 5834160.00000 (kWh/a) |
Energieverbrauchsressourcen und -methoden | The energy consumption of this asset is aggregated across multiple components: For the calculation of energy consumptions, the so called “bottom-up” approach is being used. The nodes are considered to be the central factor for the energy consumption of the network. These assumptions are made on the basis of empirical findings through the use of public information sites, open-source crawlers and crawlers developed in-house. The main determinants for estimating the hardware used within the network are the requirements for operating the client software. The energy consumption of the hardware devices was measured in certified test laboratories. When calculating the energy consumption, we used - if available - the Functionally Fungible Group Digital Token Identifier (FFG DTI) to determine all implementations of the asset of question in scope and we update the mappings regulary, based on data of the Digital Token Identifier Foundation. To determine the energy consumption of a token, the energy consumption of the network(s) ethereum is calculated first. Based on the crypto asset's gas consumption per network, the share of the total consumption of the respective network that is assigned to this asset is defined. When calculating the energy consumption, we used - if available - the Functionally Fungible Group Digital Token Identifier (FFG DTI) to determine all implementations of the asset of question in scope and we update the mappings regulary, based on data of the Digital Token Identifier Foundation. |
Verbrauch erneuerbarer Energien | 16.500000000 (%) |
Energieintensität | 0.01204 (kWh) |
DLT-Treibhausgasemissionen Scope 1 - Kontrolliert | 0.00000 (tCO2e/a) |
DLT-Treibhausgasemissionen Scope 2 - Eingekauft | 2047.79016 (tCO2e/a) |
Treibhausgasintensität | 0.00423 (kgCO2e) |
Wesentliche Energiequellen und -methoden | To determine the proportion of renewable energy usage, the locations of the nodes are to be determined using public information sites, open-source crawlers and crawlers developed in-house. If no information is available on the geographic distribution of the nodes, reference networks are used which are comparable in terms of their incentivization structure and consensus mechanism. This geo-information is merged with public information from the European Environment Agency (EEA) and thus determined. |
Wesentliche Treibhausgasquellen und -methoden | To determine the GHG Emissions, the locations of the nodes are to be determined using public information sites, open-source crawlers and crawlers developed in-house. If no information is available on the geographic distribution of the nodes, reference networks are used which are comparable in terms of their incentivization structure and consensus mechanism. This geo-information is merged with public information from the European Environment Agency (EEA) and thus determined. |
Cookies verwalten
Sie entscheiden, welche Cookies Sie aktivieren oder ablehnen möchten. Ohne Ihre Einwilligung setzen wir keine Cookies ein. Cookie-Richtlinien
Verwalten Sie Ihre Cookie-Einstellungen
Immer aktiv
Erlaube uns, deine Einstellungen bei der Nutzung von Bitpanda zu speichern (z. B. Datenschutz- oder Spracheinstellungen).
Schützen Sie die Plattform vor Angriffen
Aktivieren Sie diese Option, um angemeldet zu bleiben, nachdem Sie sich ursprünglich angemeldet haben
Inaktiv
Sammeln Sie Informationen über Benutzer, die auf unserer Website surfen, um uns dabei zu helfen, unsere Dienste und die Leistung unserer Website zu messen und zu verbessern
Erhalten Sie die gesammelten Daten anonym
Inaktiv
Bereitstellung von Werbung, die für Bitpanda relevant ist (in der Regel von Dritten bereitgestellt)
Verwalten und personalisieren Sie die Anzeigen, um sie an Ihre Interessen anzupassen
Messen Sie den Erfolg unserer Marketingkampagnen
Personalisieren Sie Ihr Erlebnis
Cookies helfen uns, unsere Dienste und Ihr Erlebnis zu optimieren. Wir nutzen die Informationen im Rahmen unserer EU-weiten Aktivitäten. Cookie-Richtlinien