Crypto Frontmatter
JREX Logo

Jura

The Jura protocol is essentially a suite of four different innovations all wrapped into one: an individual account-based directed acyclic graph (DAG) data structure we’ve named the Fusus, a Proof of Dedication (PoD) consensus mechanism, a dynamically monitored and distributed sharding (DMDS) technique for distributing data, and an AI security and learning layer to prevent malicious attacks from happening

frontmatter.json
{
  "path": "eip155:1/erc20:0x638155F4BD8F85d401Da32498D8866eE39A150B8",
  "fileId": "8f578780cc990455e67a7f16b8a012882d69cf87896b1d12e5b4e341a834551a",
  "modifiedDate": 1730858428804,
  "type": "_erc20",
  "fields": {
    "title": "Jura",
    "description": "The Jura protocol is essentially a suite of four different innovations all wrapped into one: an individual account-based directed acyclic graph (DAG) data structure we’ve named the Fusus, a Proof of Dedication (PoD) consensus mechanism, a dynamica...",
    "caip2": "eip155:1",
    "namespace": "erc20",
    "symbol": "JREX",
    "decimals": 8,
    "links": [
      {
        "name": "website",
        "url": "https://jura.network/"
      },
      {
        "name": "explorer",
        "url": "https://etherscan.io/token/0x638155F4BD8F85d401Da32498D8866eE39A150B8"
      },
      {
        "name": "github",
        "url": "https://github.com/JuraNetwork"
      },
      {
        "name": "twitter",
        "url": "https://twitter.com/JuraProtocol"
      },
      {
        "name": "whitepaper",
        "url": "https://docsend.com/view/p9f87gp/"
      }
    ],
    "images": [
      {
        "type": "icon",
        "mime": "image/png",
        "size": {
          "width": 256,
          "height": 256
        },
        "path": "87a2bf459f8aa0a6dde90df1bef70529b087cd3aeadd015bbad9f1d9940a885e.png"
      }
    ]
  },
  "html": "<h1>Jura</h1>\n<p>The Jura protocol is essentially a suite of four different innovations all wrapped into one: an individual account-based directed acyclic graph (DAG) data structure we’ve named the Fusus, a Proof of Dedication (PoD) consensus mechanism, a dynamically monitored and distributed sharding (DMDS) technique for distributing data, and an AI security and learning layer to prevent malicious attacks from happening</p>"
}