SlideShare une entreprise Scribd logo
1  sur  11
Bitcoins Introduction
Blockchain
The blockchain is the history of all transactions. It is completely public plaintext information that anyone can audit.
The blockchain consists of a chain of blocks. Each block includes all transactions that were created since the last block.
Miners create blocks. If you are not creating blocks then you aren’t a miner. A “node” in the white paper means a miner. It
does not mean SPV nodes. SPV nodes are users.
A new block is created on average once every ten minutes. The true length of time is random but always averages ten
minutes.
The difficulty of mining a block is adjusted automatically to ensure that it always takes approximately ten minutes to
produce a block.
Miners must produce a proof-of-work (PoW) hash in each block which is a hash starting with a small number of zeros to
prove they have spent real-world resources mining the block.
Proof-of-work is an algorithm for the Handicap Principle. The Handicap Principle is a biological idea that species create
costly signals to indicate health, like a peacock’s tail or the horns of an antelope. The proof-of-work hash is the beautiful
tail of the miner.
Law
Bitcoin is an evidence system that brings law to the internet.
Bitcoin is not anarchist. Bitcoin is designed to operate in a system of laws.
Bitcoin works because the law works. If you need to, such as when a counterparty commits fraud, you can use the
immutable evidence from the blockchain in court.
Bitcoin does not work in an anarchist system because contracts are not enforceable and anyone can change the rules at
any time. The rules are only set in stone insofar as contracts are enforceable, which requires law.
Bitcoin makes it easier to follow existing regulations in business. For instance, Sarbanes-Oxley requires public companies
to keep immutable accounting records. Bitcoin makes this truly possible for the first time, if utilized properly, by making it
impossible to have two sets of books.
Bitcoin makes it easier for governments to collect taxes, if utilized properly, by making all tax payments transparent.
Bitcoin makes it easier to hold governments accountable, if utilized properly, by making tax collection transparent and
auditable by the people.
Computer Science
Bitcoin is Turing Complete, which means it can compute any number. It can do anything that any computer can do.
Each transaction in Bitcoin has multiple inputs and multiple outputs.
An output has a value of satoshis (one satoshi is one hundred millionth of a bitcoin) and a script, sometimes called a
locking script.
An input contains a reference to an earlier output and includes a script that is sometimes called an unlocking script.
To check an input for validity, execute the input script, and then execute the linked output script. If the return value is not
false, then the input is valid.
A transaction is valid if all inputs are valid and if the transaction satisfies other sanity checks such as that they do not
create Bitcoin out of thin air.
There is one case where a transaction can create Bitcoin out of thin air, which is if it is the first transaction in a block.
These are called coinbase transactions and they are where miners get the mining reward.
Computer Security
There is no such thing as perfect security. Security is always and everywhere economic. An economically secure system is a system that is more costly to
attack than the gain from attacking it.
Bitcoin is economically secure because it costs more to attack it than the gain from attacking it.
Quantum computers are not a threat to Bitcoin. Firstly, because they are unlikely to be commercially viable any time soon.
And secondly, because quantum computers cannot crack hash functions, public keys can simply be hidden when they are not needed, and can store an
amount of value that is lower than the cost of cracking them when they must be revealed.
Public keys should never be re-used on the blockchain both for privacy and to deter cracking attempts.
Proof-of-work is not a security mechanism.
Proof-of-work is a mechanism to de-anonymize miners. Miners cannot be anonymous because they must use large data centers to be competitive which
always have discoverable locations in the real world through the use of traditional network scanning tools.
Bitcoin is decentralized because it has no central point of failure, not because everybody runs a node.
Users run SPV wallets which track the block headers.
The wide distribution of block headers through the ubiquitous use of SPV is necessary to secure the network because the wide distribution of the block
headers is what enables users to hold miners accountable. Miners cannot commit fraud such as through creating more than 21 million bitcoin not because
everyone runs a node but because everyone has the block headers and can prove if the miners do commit fraud.
Economics
Bitcoin is an economic system because the security and functioning of the system uses economic incentives.
The miners are independent businesses that compete to earn more bitcoin for processing transactions. Better miners are
more profitable.
Pre-consensus is incompatible with Bitcoin beacause it creates collaboration between miners which ruins their
independendence and creates a cartel which is a central point of failure.
There are and will always be a small number of large miners and a large number of small miners. This is called the
Pareto distribution or the 80/20 rule.
There is a fixed supply of bitcoin, approximately 21 million, with a variable price. There is no way to fix the price to any
real-world asset without creating a central point of failure, so a fixed supply instead is the only solution.
Bitcoin is decentralized because anybody can run a node, not because everybody does run a node.
Networks
The miners form a small world graphic, meaning each miner connects to every other miner.
The users, or SPV nodes, form something like a mesh network, because every user is connect to some subset of other
users directly but not all.
Theoretically, the miners and users form a Mandala network, which has a highly connected central core (the miners) and
a lightly connected outer shell (the users).
In practice, the network structure resembles a Mandala network, but the true network structure is determined by whoever
the miners and users are actually connected to.
Identity
Bitcoin is private, but not anonymous. Bitcoin does not require identity for micropayments. But Bitcoin does require
identity for moderate or large payments.
Bitcoin is private because identity information is not included on the blockchain. Best practice is not to re-use addresses
and to not merge outputs. If this best practice is followed, it is very difficult to infer real-world identity from public data. As
the network grows, it becomes even more difficult to infer real-world identity like finding a needle in a haystack that gets
bigger and bigger with time.
Bitcoin does not include a solution to identity. Identity is firewalled from the blockchain and must be provided by a
separate system.
Moderate and large transactions require the exchange of identity information for the security and compliance of the
parties involved.
Bitcoin is not anonymous for anything other than micropayments because fiat gateways always require identity to be
revealed.
History
David Chaum published some of the original ideas in the 1980s. DigiCash was David Chaum’s company. Chaum’s work
also goes by the name Chaumian eCash.
There were many peer-to-peer electronic cash systems in the 1990s and 2000s, including Mojo Nation.
Bitcoin is very similar to the 1999 solution by Massias et al. (see reference #2 in the white paper) except where the
network itself distributes the block headers instead of publishing them in a separate newspaper.
Satoshi Nakamoto published the Bitcoin white paper on October 21, 2008.
The Bitcoin network was started with satoshi Nakamoto nodes in January, 2009.
The ticker symbol representing Bitcoin on exchanges is BSV. BTC is not Bitcoin.
Future
The most important next step in the future of Bitcoin is the widespread adoption of SPV wallets in the ecosystem for
security and scalability.
Alongside SPV, we must implement an identity system to enable the use of real-world identity where appropriate, such as
large payments and exchanges.
Once these new protocols are developed and adopted, advanced applications can be created such as Internet of Things
(IoT), supply chain, finance, and anything else at the intersection of value and communication.
Conclusion
Bitcoin is a peer-to-peer electronic cash system. Bitcoin is extremely interdisciplinary and in order to understand the full
scope of Bitcoin, one must learn many different fields of study. Those fields of study include but are not limited to
computer science, economics, and law. Few people have already mastered all of the background material necessary to
understand Bitcoin, and as such most students of Bitcoin should expect to spend years studying material in order to have
a complete understanding.

Contenu connexe

Similaire à Bitcoins introduction

Seminarreportonbitcoinapp02
Seminarreportonbitcoinapp02Seminarreportonbitcoinapp02
Seminarreportonbitcoinapp02Mayuresh Singh
 
The complete guide to bitcoin and how it is redefining the future of money an...
The complete guide to bitcoin and how it is redefining the future of money an...The complete guide to bitcoin and how it is redefining the future of money an...
The complete guide to bitcoin and how it is redefining the future of money an...SameerShaik43
 
Early Retirement Club at Bitcoinsiders!
Early Retirement Club at Bitcoinsiders!Early Retirement Club at Bitcoinsiders!
Early Retirement Club at Bitcoinsiders!bit3coin3siders
 
Bitcoin-the Currency of Future
Bitcoin-the Currency of FutureBitcoin-the Currency of Future
Bitcoin-the Currency of FutureNiraj Dholakia
 
BITCOIN TECHNOLOGY(AAappZZ)
BITCOIN TECHNOLOGY(AAappZZ)BITCOIN TECHNOLOGY(AAappZZ)
BITCOIN TECHNOLOGY(AAappZZ)Arun Nair
 
Cryptocurrency-Bitcoin
Cryptocurrency-BitcoinCryptocurrency-Bitcoin
Cryptocurrency-BitcoinSatwikaHotwani
 
Bitcoin the_insider_guide_to_cryptocurrency_
Bitcoin  the_insider_guide_to_cryptocurrency_Bitcoin  the_insider_guide_to_cryptocurrency_
Bitcoin the_insider_guide_to_cryptocurrency_waseem nawaz
 
What Are The Key Components Of Bitcoin.pdf
What Are The Key Components Of Bitcoin.pdfWhat Are The Key Components Of Bitcoin.pdf
What Are The Key Components Of Bitcoin.pdfMavie Crypto
 
What Are The Key Components Of Bitcoin.pdf
What Are The Key Components Of Bitcoin.pdfWhat Are The Key Components Of Bitcoin.pdf
What Are The Key Components Of Bitcoin.pdfMavie Crypto
 
Bitcoin Breakthrough Training Guide.
Bitcoin Breakthrough Training Guide.Bitcoin Breakthrough Training Guide.
Bitcoin Breakthrough Training Guide.KepharsKunda
 
Bitcoin:Global Digital Currency
Bitcoin:Global Digital CurrencyBitcoin:Global Digital Currency
Bitcoin:Global Digital CurrencySurbhi Jain
 
Bitcoin-full-report-STVM
Bitcoin-full-report-STVMBitcoin-full-report-STVM
Bitcoin-full-report-STVMKai Bennink
 
How does the division of Bitcoins work_.pptx
How does the division of Bitcoins work_.pptxHow does the division of Bitcoins work_.pptx
How does the division of Bitcoins work_.pptxBlockchainX
 
Bitcoin All The Way
Bitcoin All The WayBitcoin All The Way
Bitcoin All The WayAdmin SBS
 
Cryptocurrency guide.pptx
Cryptocurrency guide.pptxCryptocurrency guide.pptx
Cryptocurrency guide.pptxMarina Ibrahim
 

Similaire à Bitcoins introduction (20)

Seminarreportonbitcoinapp02
Seminarreportonbitcoinapp02Seminarreportonbitcoinapp02
Seminarreportonbitcoinapp02
 
Next Wave of Disruptive Technology - Bitcoin & The Block chain
Next Wave of Disruptive Technology - Bitcoin & The Block chain Next Wave of Disruptive Technology - Bitcoin & The Block chain
Next Wave of Disruptive Technology - Bitcoin & The Block chain
 
The complete guide to bitcoin and how it is redefining the future of money an...
The complete guide to bitcoin and how it is redefining the future of money an...The complete guide to bitcoin and how it is redefining the future of money an...
The complete guide to bitcoin and how it is redefining the future of money an...
 
Early Retirement Club at Bitcoinsiders!
Early Retirement Club at Bitcoinsiders!Early Retirement Club at Bitcoinsiders!
Early Retirement Club at Bitcoinsiders!
 
Bitcoin-the Currency of Future
Bitcoin-the Currency of FutureBitcoin-the Currency of Future
Bitcoin-the Currency of Future
 
BITCOIN TECHNOLOGY(AAappZZ)
BITCOIN TECHNOLOGY(AAappZZ)BITCOIN TECHNOLOGY(AAappZZ)
BITCOIN TECHNOLOGY(AAappZZ)
 
Cryptocurrency-Bitcoin
Cryptocurrency-BitcoinCryptocurrency-Bitcoin
Cryptocurrency-Bitcoin
 
Bitcoin the_insider_guide_to_cryptocurrency_
Bitcoin  the_insider_guide_to_cryptocurrency_Bitcoin  the_insider_guide_to_cryptocurrency_
Bitcoin the_insider_guide_to_cryptocurrency_
 
What Are The Key Components Of Bitcoin.pdf
What Are The Key Components Of Bitcoin.pdfWhat Are The Key Components Of Bitcoin.pdf
What Are The Key Components Of Bitcoin.pdf
 
What Are The Key Components Of Bitcoin.pdf
What Are The Key Components Of Bitcoin.pdfWhat Are The Key Components Of Bitcoin.pdf
What Are The Key Components Of Bitcoin.pdf
 
Bitcoin Breakthrough Training Guide.
Bitcoin Breakthrough Training Guide.Bitcoin Breakthrough Training Guide.
Bitcoin Breakthrough Training Guide.
 
Bitcoin:Global Digital Currency
Bitcoin:Global Digital CurrencyBitcoin:Global Digital Currency
Bitcoin:Global Digital Currency
 
Bitcoin-full-report-STVM
Bitcoin-full-report-STVMBitcoin-full-report-STVM
Bitcoin-full-report-STVM
 
How does the division of Bitcoins work_.pptx
How does the division of Bitcoins work_.pptxHow does the division of Bitcoins work_.pptx
How does the division of Bitcoins work_.pptx
 
Bitcoin All The Way
Bitcoin All The WayBitcoin All The Way
Bitcoin All The Way
 
Cryptocurrency guide.pptx
Cryptocurrency guide.pptxCryptocurrency guide.pptx
Cryptocurrency guide.pptx
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Bitcoin King of The Coins
Bitcoin King of The CoinsBitcoin King of The Coins
Bitcoin King of The Coins
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Pi network
Pi networkPi network
Pi network
 

Plus de The Cryptography Centre For Excellence (12)

Non-Fungible Token (NFT).pptx
Non-Fungible Token (NFT).pptxNon-Fungible Token (NFT).pptx
Non-Fungible Token (NFT).pptx
 
Introduction multiparty computation
Introduction multiparty computationIntroduction multiparty computation
Introduction multiparty computation
 
Cryptography is all we can trust
Cryptography is all we can trustCryptography is all we can trust
Cryptography is all we can trust
 
Joe Biden’s Memorandum Post-Quantum Cryptography
Joe Biden’s Memorandum Post-Quantum CryptographyJoe Biden’s Memorandum Post-Quantum Cryptography
Joe Biden’s Memorandum Post-Quantum Cryptography
 
fips140-3compliance
fips140-3compliancefips140-3compliance
fips140-3compliance
 
Exemplar of Cryptography Vulnerabilities
Exemplar of Cryptography VulnerabilitiesExemplar of Cryptography Vulnerabilities
Exemplar of Cryptography Vulnerabilities
 
Poor uses of cryptography
Poor uses of cryptographyPoor uses of cryptography
Poor uses of cryptography
 
Quantum Cryptography
Quantum Cryptography  Quantum Cryptography
Quantum Cryptography
 
Blockchain
BlockchainBlockchain
Blockchain
 
Bitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash SystemBitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash System
 
Prepare For Post-Quantum Cryptography
Prepare For Post-Quantum CryptographyPrepare For Post-Quantum Cryptography
Prepare For Post-Quantum Cryptography
 
Cryptography Inventory
 Cryptography Inventory Cryptography Inventory
Cryptography Inventory
 

Dernier

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 

Dernier (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Bitcoins introduction

  • 2. Blockchain The blockchain is the history of all transactions. It is completely public plaintext information that anyone can audit. The blockchain consists of a chain of blocks. Each block includes all transactions that were created since the last block. Miners create blocks. If you are not creating blocks then you aren’t a miner. A “node” in the white paper means a miner. It does not mean SPV nodes. SPV nodes are users. A new block is created on average once every ten minutes. The true length of time is random but always averages ten minutes. The difficulty of mining a block is adjusted automatically to ensure that it always takes approximately ten minutes to produce a block. Miners must produce a proof-of-work (PoW) hash in each block which is a hash starting with a small number of zeros to prove they have spent real-world resources mining the block. Proof-of-work is an algorithm for the Handicap Principle. The Handicap Principle is a biological idea that species create costly signals to indicate health, like a peacock’s tail or the horns of an antelope. The proof-of-work hash is the beautiful tail of the miner.
  • 3. Law Bitcoin is an evidence system that brings law to the internet. Bitcoin is not anarchist. Bitcoin is designed to operate in a system of laws. Bitcoin works because the law works. If you need to, such as when a counterparty commits fraud, you can use the immutable evidence from the blockchain in court. Bitcoin does not work in an anarchist system because contracts are not enforceable and anyone can change the rules at any time. The rules are only set in stone insofar as contracts are enforceable, which requires law. Bitcoin makes it easier to follow existing regulations in business. For instance, Sarbanes-Oxley requires public companies to keep immutable accounting records. Bitcoin makes this truly possible for the first time, if utilized properly, by making it impossible to have two sets of books. Bitcoin makes it easier for governments to collect taxes, if utilized properly, by making all tax payments transparent. Bitcoin makes it easier to hold governments accountable, if utilized properly, by making tax collection transparent and auditable by the people.
  • 4. Computer Science Bitcoin is Turing Complete, which means it can compute any number. It can do anything that any computer can do. Each transaction in Bitcoin has multiple inputs and multiple outputs. An output has a value of satoshis (one satoshi is one hundred millionth of a bitcoin) and a script, sometimes called a locking script. An input contains a reference to an earlier output and includes a script that is sometimes called an unlocking script. To check an input for validity, execute the input script, and then execute the linked output script. If the return value is not false, then the input is valid. A transaction is valid if all inputs are valid and if the transaction satisfies other sanity checks such as that they do not create Bitcoin out of thin air. There is one case where a transaction can create Bitcoin out of thin air, which is if it is the first transaction in a block. These are called coinbase transactions and they are where miners get the mining reward.
  • 5. Computer Security There is no such thing as perfect security. Security is always and everywhere economic. An economically secure system is a system that is more costly to attack than the gain from attacking it. Bitcoin is economically secure because it costs more to attack it than the gain from attacking it. Quantum computers are not a threat to Bitcoin. Firstly, because they are unlikely to be commercially viable any time soon. And secondly, because quantum computers cannot crack hash functions, public keys can simply be hidden when they are not needed, and can store an amount of value that is lower than the cost of cracking them when they must be revealed. Public keys should never be re-used on the blockchain both for privacy and to deter cracking attempts. Proof-of-work is not a security mechanism. Proof-of-work is a mechanism to de-anonymize miners. Miners cannot be anonymous because they must use large data centers to be competitive which always have discoverable locations in the real world through the use of traditional network scanning tools. Bitcoin is decentralized because it has no central point of failure, not because everybody runs a node. Users run SPV wallets which track the block headers. The wide distribution of block headers through the ubiquitous use of SPV is necessary to secure the network because the wide distribution of the block headers is what enables users to hold miners accountable. Miners cannot commit fraud such as through creating more than 21 million bitcoin not because everyone runs a node but because everyone has the block headers and can prove if the miners do commit fraud.
  • 6. Economics Bitcoin is an economic system because the security and functioning of the system uses economic incentives. The miners are independent businesses that compete to earn more bitcoin for processing transactions. Better miners are more profitable. Pre-consensus is incompatible with Bitcoin beacause it creates collaboration between miners which ruins their independendence and creates a cartel which is a central point of failure. There are and will always be a small number of large miners and a large number of small miners. This is called the Pareto distribution or the 80/20 rule. There is a fixed supply of bitcoin, approximately 21 million, with a variable price. There is no way to fix the price to any real-world asset without creating a central point of failure, so a fixed supply instead is the only solution. Bitcoin is decentralized because anybody can run a node, not because everybody does run a node.
  • 7. Networks The miners form a small world graphic, meaning each miner connects to every other miner. The users, or SPV nodes, form something like a mesh network, because every user is connect to some subset of other users directly but not all. Theoretically, the miners and users form a Mandala network, which has a highly connected central core (the miners) and a lightly connected outer shell (the users). In practice, the network structure resembles a Mandala network, but the true network structure is determined by whoever the miners and users are actually connected to.
  • 8. Identity Bitcoin is private, but not anonymous. Bitcoin does not require identity for micropayments. But Bitcoin does require identity for moderate or large payments. Bitcoin is private because identity information is not included on the blockchain. Best practice is not to re-use addresses and to not merge outputs. If this best practice is followed, it is very difficult to infer real-world identity from public data. As the network grows, it becomes even more difficult to infer real-world identity like finding a needle in a haystack that gets bigger and bigger with time. Bitcoin does not include a solution to identity. Identity is firewalled from the blockchain and must be provided by a separate system. Moderate and large transactions require the exchange of identity information for the security and compliance of the parties involved. Bitcoin is not anonymous for anything other than micropayments because fiat gateways always require identity to be revealed.
  • 9. History David Chaum published some of the original ideas in the 1980s. DigiCash was David Chaum’s company. Chaum’s work also goes by the name Chaumian eCash. There were many peer-to-peer electronic cash systems in the 1990s and 2000s, including Mojo Nation. Bitcoin is very similar to the 1999 solution by Massias et al. (see reference #2 in the white paper) except where the network itself distributes the block headers instead of publishing them in a separate newspaper. Satoshi Nakamoto published the Bitcoin white paper on October 21, 2008. The Bitcoin network was started with satoshi Nakamoto nodes in January, 2009. The ticker symbol representing Bitcoin on exchanges is BSV. BTC is not Bitcoin.
  • 10. Future The most important next step in the future of Bitcoin is the widespread adoption of SPV wallets in the ecosystem for security and scalability. Alongside SPV, we must implement an identity system to enable the use of real-world identity where appropriate, such as large payments and exchanges. Once these new protocols are developed and adopted, advanced applications can be created such as Internet of Things (IoT), supply chain, finance, and anything else at the intersection of value and communication.
  • 11. Conclusion Bitcoin is a peer-to-peer electronic cash system. Bitcoin is extremely interdisciplinary and in order to understand the full scope of Bitcoin, one must learn many different fields of study. Those fields of study include but are not limited to computer science, economics, and law. Few people have already mastered all of the background material necessary to understand Bitcoin, and as such most students of Bitcoin should expect to spend years studying material in order to have a complete understanding.