Blockchain Networks: Permissioned Versus Permissionless

Any company looking to learn more about blockchain technology will quickly find that there are different network deployments — Permissioned (where the network is closed to invite-only nodes) and Permissionless (where the network access and participation are publicly available). Which network type makes sense for your use case?


Not all blockchains are the same — in this episode of the Fluree Video Podcast we sit down with Brian Platz and chat about what makes a network “Permissioned” or “Permissionless.”

backdrop credit: starline / Freepik



In this episode of the Fluree Video Podcast, Brian Platz (Co-CEO and Co-Founder @ Fluree) takes us through the key differences between permissioned and permissionless blockchain. Key tradeoffs include time, money, privacy, and efficiency. Key factors to consider are data relevancy and data security.




On the Go?

Read this on Medium:


Share on facebook
Share on twitter
Share on linkedin

Share Article

Share on facebook
Share on twitter
Share on linkedin

Subscribe to the Fluree Newsletter

Get updates on new blog posts, news, and product announcements!

More Articles From Fluree

Introduction to Data-Centricity

The Data-Centric Architecture treats data as a valuable and versatile asset instead of an expensive afterthought. Data-centricity significantly simplifies security, integration, portability, and analysis while delivering faster insights across the entire data value chain. This post will introduce the concept of Data-Centricity and lay the framework for future installments on Data-Centricity.

Read More >

Making Data FAIR

As enterprises begin to invest heavily in extracting analytical and operational value from data, the FAIR data principles should be considered for highly-sophisticated master data management across various industries.

Read More >

Ready to Get Started with Fluree?

Let’s get in touch!