Conclusion and wrapping up rock paper scissors game

In this module, we learned how to implement rock paper scissors on Ethereum and we learned how to do that in a way which keeps the users moves private. We learned the following:

  • Implementing rock paper scissors in solidity

  • Using hash functions first hand

  • Understanding privacy in public blockchains

  • Understanding randomness and the importance of true randomness

  • Understanding attack vectors of rock paper scissors on blockchain

Start a new discussion. All notification go to the author.