decentralized super computer




What can Elastic do?

With Elastic, instead of specific use cases, a use case has to be coded by the user of the system in Elastic’s own programming language - Elastic PL. It is similar to C but with limited functionality so it can be guaranteed that Elastic code can be executed on other machines without causing any harm. You can write a program in Elastic PL and be sure that if executed correctly, no exploits, no endless loops, no data leakage.

So while Elastic is more flexible in designing tasks, it does not perform better for one particular use case over other systems. With other super computer models, If you want to do 6 different tasks you need 6 separate use cases. With Elastic you can do them all at once. As the Elastic PL is further developed, so the diversity of tasks will become more complex. Currently, only tasks which explore a search space can be performed, and not tasks which are divided into multiple packages (like rendering divides a large image into many smaller tiles).

Elastic PL will get better over time with the flexibility that Elastic PL provides. The system is built and designed this way from ground up to allow user configurable tasks. This makes Elastic the only system that currently offer this. The potential of Elastic is basically limitless.

Other Design Features

The current system is absolutely trustless. That means that there is no central authority verifying anything (such as all BOINC based coins, which rely on an external service controlled by a single entity and which could become rogue and cripple the entire coin), so we at Elastic have to make sure every node in the network verifies work by itself. To further act as a safeguard, Super Nodes check work processed by the nodes and a final level of security is in the Guard Nodes that check that the SuperNodes are doing their job.


  • Elastic Coin is known as XEL
  • Total Coin Supply: 100.000.000 XEL
  • Distributed Coins: 100.000.000 XEL
  • Elastic features the “Elastic PL” programming language
  • Normal nodes broadcast unverified POW/bounties
  • Super nodes verify work and broadcast verified POW/bounties
  • Guard nodes cross verify certain percentages of signed POW/bounties by supernodes to detect malicious behaviour

more Elastic PLElastic Compared to Other CompetitorsBitcoin Mining with Elastic PL (theoretical)