Beruflich Dokumente
Kultur Dokumente
Cryptocurrency
Introduction with some terms & definitions
A public key is created from a secret key, often called a key pair. The public key is
not often seen itself but operates behind the scenes, proving ownership.. With only
the public address it is impossible with current and foreseeable technology to find
the public key.
A secret key is much like a password, in this case it is needed to redeem or use
any tokens associated with the public address that is created from the public key it
creates. These keys are created with some sort of digital signature, Bitcoin uses
something called ECDSA or elliptical curve digital signature algorithm. The SK is
All that is needed to spend funds, keep it safe and don't let others see it unless it
is encrypted.
A node is a computer that receives this broadcast, verifies that it is in order, and
rebroadcasts it to other nodes that it knows. Nodes unless otherwise stated have a
list of all txs ever in the full blockchain.
There are different kinds of nodes. In the very beginning all computers were full
nodes, that is they had a whole blockchain, they had a wallet, they connected to
others and broadcast txs and blocks, and they mined new blocks.
Lite nodes, sometimes called thin nodes don't store a full copy of the blockchain.
A SPV node is one that doesn't keep a local copy of the blockchain and instead
gets txs of interest from those nodes. This requires trusting the connected nodes
aren't lying and doesn't help the network like a regular node.
Miners are now their own class of hardware. There are thousands of miners
worldwide who race to find a satisfying answer to a perpetual puzzle. Miners
organize txs into blocks and create new blocks for the blockchain. If a miner finds
a solution to a new block first they broadcast it to the world. They then receive any
fees from the txs in that block as well as a block reward. All in said digital token.
Mining pools are groups that incorporate the computational resources of their
members into one big attempt to find new blocks. Nowadays more miners use
pool miner services as they can receive more frequent but smaller payments.
A block is made up of some self identifying information called the block header,
and a set of txs. A block also contains a hash of the data that made up the
previous block's header.
A Blockchain is a distributed ledger which secures bits of data into larger blocks of
data, at roughly-regular intervals new data is written into a new block. Every new
block has a value corresponding to all the previous block, which in turn has a link
to its previous block, and so forth until the first block, known as the Genesis Block.
What is Bitcoin?
Bitcoin is a protocol. It is a way to exchange unique digital pieces of data, in this
case the data can have value.
By interacting directly with the protocol, people can interact seemingly directly with
each other, without the need for a middleman or third party.
Bitcoin txs are irreversible Much like cash, it is up to the goodwill of others to give
you a refund if you want one.
There will only ever be so many bitcoins, and many of them have been lost
already.
The token, bitcoin, cannot be counterfeit or spend without the Secret Key, but the
SK can be stolen or lost if one is not careful.
Release
Bitcoin and hence all cryptocurrencies have roots in the Cypherpunk beliefs, as
that is where news of Bitcoin first originated and where some previous work into
cryptos had taken place.
Cypherpunks believe that encryption can shield common people from oppression
and preserve rights, often from the government or large corporations.
The first mined block included the phrase, The Times 03/Jan/2009 Chancellor on
brink of second bailout for banks which was a headline that day in the London
Times. Showed no btc were created previous to this day, but may have also been
a remark on the central banks which have recently hurt the global economy.
Mining hardware
Bitcoin mining companies have created their own ASICs which perform the lion's
share of mining these day, they also get most of the reward.
Some companies produce these chips and sell them to other companies and the
public, while some companies fabricate these chips and use them themselves.
Research is always ongoing to make better chips, and improvements are made in
highly technical hardware fabrication as well as software.
These improvements increase the hash power of the network, making it harder for
older machines to keep up.
Influence of Miners
Miners secure txs and holdings. Many miners all operating independently create
security for the Bitcoin system.
If most miners stop working then someone with enough hashing/computing power
could give their coins back to themselves after they gave them to someone else.
This is known as a 51% attack as this 'bad actor' needs over 50% of the network's
hashing power to succeed every time.
With more miners this becomes very expensive. It is thought that by spending as
little as 2 Billion USD someone could buy enough hashing power to perform a
51% attack as of 2015.
Influence of Nodes
Nodes can and often are run by altruists who want to help the network at some
minor expense to themselves, if it is only time.
Business, and those with a large stake in Bitcoin also run nodes but they do it for
their own sake and not to help the network.
Nodes receive broadcast txs, validate them, and rebroadcast them to their list of
connected nodes.
The network could likely sustain a large drop in nodes, but this increases the risk
that any one node or group of nodes could refuse to forward txs they disagree
with.
Influence of Users
Users are people who spend and receive coins on some time table. Some might
consider those that buy and hold coins not to be users, but that is talk for another
time.
Users who keep coins as investment help create scarcity in the number of
available coins. This lowering of supply can increase demand. If these holders all
decided to sell their coins, it would likely have the opposite effect. This sort of
feedback loop has been seen in failing businesses in the past.
If the users are unhappy with the system they might leave and use another
system. If Bitcoin or any crypto has no users it has no utility, because what use is
a system no one wants to use.
Influence of Companies
Companies control things such as exchange points like websites and kiosks, wallet
application and hardware, mining hardware production, websites or discussion forums,
remittance or transmission applications, etc.
They can publicly endorse any changes they agree with disagree with and try to sway
opinion. Those with a large number of users can try and use said numbers of users as
leverage for support of proposals.
Each realm has a number of things it can do to influence workings or public perception.
Some companies have in the past performed capacity tests on the Bitcoin network, throttling
normal transactions and clogging the network. Companies and individuals with enough
knowledge and malice can temporarily slow the network, but to do so require spending
resources on fees.
Influence of Media
Much of the media related to cryptocurrencies is based online. The two largest
discussion forums for bitcoin, reddit.com/r/bitcoin and bitcointalk.org are both
moderated by the same person, who in 2015 began censoring discussion he did
not agree with, and these sites are no longer recommended. Other, though less
popular options are advised.
For more technical discussion the developer mailing list and IRC channel or
Internet Relay Chat exist.
Since anyone worldwide can work on the software the developers are often
spread out in location and time. Therefore much of the communication about
cryptos, both development and discussion happens online.
Influence of Developers
Bitcoin is open source, so anyone can contribute to the code.
But people can't just make a code change and bitcoin changes. If a change is
approved or accepted by enough of the developers and community then it can be
included in the next software version or release of the software. Then people have
to download that new version, install it, and begin running it.
There has to be some certain number of people using any implementation for it to
then become active.
A renegade dev could try and introduce some malicious modifications into the
system, but they would have to get them by the review of many people.
Influence of Developers
A group of malicious developers could gain more support saying there was some
issue and they were all the experts on it, but the code would still be reviewable by
anyone online.
The devs could refuse to act for a given problem however, thus endangering the
health of the ecosystem and alienating themselves.
There is no official Bitcoin system and yet there is a Core client that is the current
de-facto standard and it has both contributors and developers.
Influence of Governments
Governments have exerted little influence so far on cryptos, with some agencies advocating
against heavy regulation that might stifle new growth.
A few governments have issued restrictions or outright bans on cryptos.
Restrictions mostly apply to businesses and those that deal with local fiat. These actions
might impede start up companies that don't have large amounts of funding.
Banning use of cryptos, particular ones or in general, makes it illegal for people to use. This
can make cryptos less popular locally or push their use into the black market.
Government exert local power and some governments like to censor the internet. Crypto use
is still possible but it is more difficult.
Influence of ISPs
Internet service providers, or ISPs, connect most homes and businesses to the internet. All internet traffic
goes through them before being routed to the end recipient.
Much web traffic these days is encrypted, but much of that encryption is weak or compromised, and a
large amount of web traffic isn't encrypted at all. So anyone who taps into the connection can see what is
happening. This is especially easy for ISPs who host the traffic.
ISPs then have the ability to monitor some amount of web traffic, and stop thing that they don't like from
getting out or to the real recipient.
They also have the ability to modify data in transit and or reroute it. This means they potentially can
reroute the hashpower of a mining pool to their own ends.
However these actions would likely be detected quickly and corrected; and nothing like this has ever been
documented.
Info sources
Dictionary https://www.merriam-webster.com/dictionary
Mastering Bitcoin by Andreas Antonopoulos https://chimera.labs.oreilly.com/books/1234000001802
Genesis block https://blockchain.info/tx/4a5e1e4baab89f3a32518a88c31bc87f618f76673e2cc77ab2127b7afdeda33b?show_adv=true
Bitcoin flows http://www.ofnumbers.com/2015/04/22/the-flow-of-funds-on-the-bitcoin-network-in-2015/
More Satoshi sources:
https://drive.google.com/file/d/0B6xWx7EWH5mmRlFsekpfYVc0blE/view
http://www.coindesk.com/information/who-is-satoshi-nakamoto/
https://en.wikipedia.org/wiki/Satoshi_Nakamoto
http://www.economist.com/blogs/economist-explains/2015/11/economist-explains-1
https://motherboard.vice.com/blog/who-is-satoshi-nakamoto-the-creator-of-bitcoin
http://satoshi.nakamotoinstitute.org/