04 Blockchains and Cryptocurrencies Flashcards

1
Q

What is a BLockchain?

A

A blockchain is a ledger or list where the entitties are grouped in blocks that are cryptographically linked
* blocks are timestamped and cannot be altered once included in the chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

High level distinguish between four differetent types of tokens?

A
  1. Cryptocurrencies/ payment tokens
  2. Utility tokens
  3. Security tokens and tokenized assets
  4. Non-fungible tokens
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do cryptocurrencies promise?

A
  • secure and immutable transaction
  • increases in efficiency
  • reduction in cost (no intermediation)
  • no trust in particular authority
  • financial inclusion due to lower costs and decentralization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the main functions of money? and fullfilled by cryptocurrencies?

A
  1. Unit of account
  2. Medium of exchange
  3. Store of value

–>No decentralized money:
* volatility is high
* acceptance is low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The two generations of blockchains/cryptocurrenices

A

1. Generation cryptocurrencies: Payments and store of value
2. Generation: Platform/ distributed computation tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Stablecoin?

A

is a cryptocurrency where the price is linked to some other asset such as fieat currencies or a commodity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Characteristics of stable coins

A
  • low volatility compared to other cryptocurrencies
  • provide quick and relativeley safe way of entering into cryptocurrencies
  • less regulation than the asset they are pegged to
  • some allow for smart contracts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Central bank digital currencies? (CBDCs)

A

–>a virtuel currency representing a direct liability of a central bank, similar to banknotes and coins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The two types of Central Bank digital currencies?

A
  1. Wholesale CBDC –>used among financial intermediaries
  2. Retail CBDC –>used in the wider economy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are utility tokens?

A

Utility tokens offer the right to a service or product
* have value and can typically be used similarly to cryptocurrencies
* some act as internal currencies for payments on a blockchain (E.g. ether)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wider functionality of utility tokens?

A
  • some utility tokens are “consumed” in exchange for products or services, comparable for voucher or gift gards
  • othery only have to be held, for example offering voting rights

Ex:
* Golem (GNT) for renting computing power
* Filecoin (FIL) for renting storage space
* Exchange tokens like Binance coin (BNB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are security tokens/ tokenized assets?

A

Security tokesn represent blockchain-based recorded ownerships of other assets (Stocks, bonds and real estate)
–>derive value from an external asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the benefits of tokenization for tradeing?

A

Beneifts: Allow for fractional ownership
- Equitites:
- Real Estate
* Trading costs and other fictions may be lowerr for tokenized assets
* tokenization is typically not decentralized
–>a company ususally owns the underlying asset
- The price is pegged by allowing token holders to exchange their tokens for the underlying asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are tokenized assets?

A

Tokenization of (existing) assets provides a way of recording the ownership of other types of assets on a blockchain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can security tokens be issued?

A

Can be issued via decentralized ICO, but may also be issued in a more centralized way by a company
- A security token offering (STO) may be less expensive for smaller ventures as compared to an IPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Market for security tokens and their regulation?

A

–>Security tokens are usually subject to the same regulation as the underlying asset
–>Market is still relatively small, but potentially impacts the way trading is organized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Benefits using security tokens for trading?

A
  • transaction allows for fractional ownership
  • Blockchain transactions are transparent
  • settlement of trade substantially faster
  • secondary market liquidity may (or may not) benefit
  • transactions cost may be lower than on conventional exchanges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are non-fungible tokens?

A

Non-fungible tokens are not interchangeable
–>usually represent digital artwork and collectibles, where the ownership is recorded on a blockchain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a cryptographic hash function?

A

= a cryptographic hash function maps an input x of any length to an output Hash(x) of fixed length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What do the two properties Deterministic, Efficient mean for Hash Functions?

A

Deterministic: The same input x will always give the same output
Efficient: GIven x, calculating Hash(x) is computationally easy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What do the two properties One-way, collusion resistant mean for Hash Functions?

A

One-way: GIven Hash(x), calculating x is computationally infeasible
Collision resistant: Finding two inputs x and y that give the same output Hash(x)=Hash(y) is infeasible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What do the two properties Avalanche-effect and Puzzle friendly mean for Hash Functions?

A

Avalanche-Effect: Changing x slightly changes the Output Hash(X) substantially
Puzzle Friendly: GIven Hash(x) and part of x, it is still difficult to find the rest of x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Key properties of Hash functions

A
  1. deterministic
  2. efficienct
  3. oneway
  4. collision resistant
  5. avalance effect
  6. puzzle friendly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are Merkle trees and Merkle roots?

A

Merkle trees: are trees containing hashes of hases
–>The top has of a merkle tree is called the Merkle root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is cryptohraphy and security?

A

Cryptographcy used for secure communication:
* prevent third parties from reading and manipulation private messages

asymmetric (or public key) cryptography uses pairs of key:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Difference between public and private key?

A

Private key: is basically just a random number that is only known by the owner
Public key: is mathematically linked to private key and is known by others
–>easy to get public from private key, but not vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

use cases of asymmetric cryptography?

A
  • encryption of messages with the public key, that only can be decrypted by the private key
  • generation of message-specific digital signatures
    –>protect against tampering and impersonation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Types of blockchains?

A

Public or private:
public: everyone can read, view participate by writing, and validating
private: only read after approval or some verification
Permissionless or permissioned:
permissionless: no access contral, trust-free, usually slower
permissioned: validating and wirting to the chain requires approval, usually faster, trusted authority required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Two problems that needed to be addressed by decentralized currencies?

A
  1. Only alice should be allowed to spend her coins
  2. the “Double spending problem”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the solution to Problem 1: (Only alice spend her coins?

A

Asymmetric Cryptography:
* all transaction are cryptographically signed by private key of that individual
* everyone can verify the signature by the public key
*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the solution to Problem 1: (Only alice spend her coins?
–>what are keys and addresses?

A
  • Private keys are basically long random numbers
  • Public key is easy to compute from the private key
    –>Addresses are easy to compute from the public key (for bitcoin, the public key is hashed twice, and a chechsum is added)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the solution to Problem 2: Double spending problem

A

Consensus Mechanism:
–>there are different consensus mechanisms to get an agreeement on what the correct version of the ledger is
–>if temporarilty conflicting versions, in the long-run the longest version is chosen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Describition of PoW

A

–>including transaction on the ledger requires computational effort and thus is costly
* Miners solve cryptographic puzzle to maintain the ledger
* These puzzles consists of finding a nounce–>this is a special number that results in a hash of that block with a particular pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

POW: What is a Nounce

A

Nounce= a special number that when added to the block results in the hash of that block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

POW: NOunce characteristics

A
  • the hash has to start with a certain number of zeros that depends on the difficulty of the network
    —>This difficult level is adjusted automaticaöy every 2016 blocks to keep the average time between two blocks at about 10 minutes
    –>finding the correct nounce is done by try and error
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is done after finding the Correct Nounce?

PoW

A

–>The miner broadcasts the solution to the network
* it appends the block of transatiom, including the nounce, to the ledger
* The other miners (nodes) can verify the nounce results in a correct hash is computationally easy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Describe the 51% Attack in context of blockchains bitcoin with PoW

A

The blocks are all cryptographically linked by including the hash of the previous block in the new block
* to make changes or minor modifications to a previous block would require to re-do all the work starting with that block
–>this can in the long run only happend if the person controls 51% of the computational power of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the two mining incentives?

A
  1. Block rewards through newly generated coins
    * successful miners receives bitcoins these reward halves rougly every four years
    * in about 2140 the reward is expected to be zero
  2. Transaction fees from users
    * capacity in each block is limited —>users can optinally pay a fee to minizers to incentivize them to include their transaction in a block
    –>During times of blockchain congestion, the fees can reach very high levels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is included in the Block header?

A

The Block header contains:
* Bitcoin protocol number
* CUrrent difficult level
* Timestamp
* previous block header hash
* Merkle root hash of hased transactions
* Nounce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is Unspent Transaction Output

A

Nodes track unspent transaction output (UTXO)
* the bitcoin transactions list input and output addresses
–>UTXO is the output of a transaction and exists until it is used as input for another transaction
–>How many UTXTO´s reside in a given address is computed by counting all prior UXTOs that list this address as their destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Explaing the unspent transaction output

A

Works like a wallet, if one has 50 BTC, 1- 30 BTC and 1-20 BTC and wants to send 35 btc
–>Will use both addresses (30 BTC and 20 BTC) and send that to the other addresses, additionally there will be a new “change address” created where the remaining “Unspent transsaction outpu” go in (30+20 - 35) = 15 BTC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is a Mempool?

A

New transactions are broadcasted to the whole network, the ones that are valid wait to be included in a block
–>These waiting transactions (confiremed) are stored in the mempool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What does the Mempool mean for the transaction within?

A

Everyone can see the transactions in the mempool:
* Trading intentions might be revealed
* Front running poses a serious problem —> insider trading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

what does the Hashrate meansure?

A

The Hashrate measure the computing power within the Bitcoin network
* the total network hashrate has increased tremendously
–>The mining difficulty adjust automatically, but what matters for miners is their relative share of computating power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

why were Mining pools created in the first place?

A

For an individual miner it is extremely unlikely to get the block reward
–>Thus to get a more stable stream of income, miners join in mining pools
–>Each members of a pool contribute computational power

46
Q

How is reward in mining pools distributed?

A
  • the rewards are typically distributed according to member´s contributed hashrate
  • pool operators keeps a small percentage to cover administrative costs
    –>relatively few mining pools represent a large part of overall Bitcoin mining, raising concerns about centralization
47
Q

PoW Externalitites

A

–>electricity is the main input for PoW mining, thus miners tend to be located in areas with cheap energy
- uses vast amounts of energy
- energy market spillover effects to local businesses and households
- Bitcoin could have a considerable impact on the climate
–>a lot of the engery comes from gray energy

48
Q

Ethereum platform short describtion (provides…

A

Ethereum network proved a base layer computation platform based on a programmable blockchains
–>used for
- executing smart contracts
- runing decentralized applications (dApps)

49
Q

Ethereum Governance and difference to Bitcoin? conserning changes?

A

Much more so than Bitcoin, the Ethereum protocol is subject to changes
e.g:
- changes to how fees, difficulty, or block rewards are calculated
- increasing scalability, privacy, efficiency, and flexibility
- switich to different consensus mechanism

50
Q

How are changes in the Ethereum like protocol implemented?

A

Changes are usually implemented via a “hard fork”

51
Q

Hard fork and soft fork

A

hard fork: a new blockchain unsing the updated protocol, where miners pick the chain they want to continue by appending to that chain
soft fork: is a forward-compatible change to the rules.
–>It doesn’t create a new blockchain. Instead, it maintains the old blockchain by running on two lanes with different sets of rules.

52
Q

How does the governance model of Ethereum work?

A
  • Users suggest changes to ethereum using off-chain channels of Ethereum Improvement Proposals (EIP) and Ethereum Requests for Comment (ERC)
  • EIP´s are discussed (particulary among core developers)) and then suggested for adoption via a fork or dropped
53
Q

Critism in the governance model of Ethereum

A
  • Some critize the governenance model as being too centralized and dependent on a core team of developers and the founder Vitalik Buterin
54
Q

Which tracking method for accounts and balance does Ethereum use?

A

Etereum uses an account-based model that tracks the balance of each account (as part of the “global state”)

55
Q

Advantages of the ACcount-based model over UTXO

A
  • The account based model may be more intutive thant UTXO
  • need to keep track of order of transaction from an account (every transaction has a number)
  • UTXO may offer more privacy
  • Obtaining the current state of the nework is easier for “liegt” clients/nodes in an account-based model
56
Q

Account types in the Ethereum network

A

There are two types of accounts:
1. Externally owned accounts (EOAs)
2. Contract accounts
–>All accounts can eqully access and interact with the Ethereum network

57
Q

What does each Account in the Ethereum network have?

A
  • unique, crpytopgrahic address
  • nounce
  • Current ether balance
  • Contract code
  • Data storage
58
Q

What are External owned accounts?

A

Controlled by (human) end users that have access to the private key for sending transactions
* have a balance and can send transactions
* do not have associated code

59
Q

What are contract accounts?

A

=Completely controlled by associated code that can contain pretty much any type of calculation.
–>once set up the code itself cannot change
* Contract account have a balance and can transfer ether (or other tokens)

60
Q

How is a execution of the code in a contract account triggered?

A

Only trigged by transactions from EOAs or from other contract accounts
* contacts do not just run in the background
* everything that is happening in the network is always set in motin by EOAs

61
Q

How are Transactions between contact accounts called?

A

They are called “internal transactions or “messages” and will not be permantly put on the blockchain

62
Q

How does Ethereum prevent a programm from running to long on the blockchain?

A

–>Put a price tag on computing resources
* Chrage a fee called gas for using the network
* Transactions have to include the amount of gas and the price the sender is willing to spend on executing the transaction.
Gas prices typically expressed in gwei

63
Q

Transaction execution and gas?

A

As the transaction is excetued, gas is used for every computational step
- unspent gas is retunred to the sender
- if exection not finished an gas is not enough, everything is reversed and gas is sent back

64
Q

What are the functionalities of Contract accounts?

A
  • Transfer funds
  • Create new digital tokens
  • Exchange different tokens (as in decentralized exchanges)
  • Trigger code from other contract accounts
  • Construct derivatives with automated payouts
65
Q

Are these smart contacts smart?

A

These “smart contracts” are permanently kept on the blockchain
–>They are not really smart and not necessarily a (legal) contract
–>more like a vending machine
–>Code is law

66
Q

What is the main use of smart contracts?

A

The main use of smart contracts is the creation of new tokens, many of whcih are utility tokens
–>Ethereum contains several standards for new tokens that use the Ethereum blockchain

–>ERC-20 for fungible tokens
–>ERC-721 for non-fungible tokens
–>ERC-1400 for security tokens

67
Q

FtHow doe Initial coin offerings work?

A

Investors buy into the offering and in return get new tokens, for example
- Utility tokens that have some use in using the product of the company
- the internal cryptocurrency of the venture
Different to IPOs; ICOs are mostly unregulated

68
Q

What is Initial Coin Offerings?

A

ICOs are a new type of crowdfunding, combining aspects of fundraisng with platform building and network growing

69
Q

What can change the global state ? (Blanace, data,…)

Ethereum

A

only transsactions can change the global state
* transfer ether between EOAs
* Change contract data by triggering contract accounts
* Initialize contract accounts

70
Q

What are decentralized applications?

A

dApps are computer programs that run on a distributed, decentralized network like the Ethereum blockchains

71
Q

Characteristics of dApps?

A

Most dApps run on Ethereum
* Smart contracts are the building blocks of dApps
* user interfaces are often similar to other cloud apps

–>Code and data are stored on the blockchain
–>dApps are generally not owned by anyone (though the correspsonding utility tokens are) –>Trust?

72
Q

Advantages and Disadvantages of dApps?

A
  • dApps cannot be shut down,
  • have no downtime and
  • are censorship resistant

Contra:
* can be extremely slow
* user experience may (yet) be poor

73
Q

Proof-of-stake Mechanism

A
  • No mining, randomly chosen validators update the blockchain
  • validators are user that deposit some coins at stake
  • The stake is typically locked up for some time and cannot be used for transactions
  • The probability of being drawn increases in the amount deposited as stake

–>Chosen validators then verify the transactions in the block and update the chain

74
Q

How are Validators incentivized?

PoS

A

–>Validators are incentivzed positively and negatively
* As a reward, they typically get newly minded coins and transaction fees
* They can loose their stake if they are dishonest

75
Q

What is the “Nothing at stake” Problem in PoS?

PoS

A

suppose there is a fork (two versions of the chain)
* in theory validators have an incentive to keep signing blocks on both versions of the blockchian because they collect fees and newly minted coins on whichever fork eventually ends up winning
–>In PoW this is not possible because you have to spend computing power

76
Q

What does the “long range attacks mean in the context of PoS?

A

–>to perform a 51% attack in PoW, you need to manipulate a block of the recent past
–>In PoS theoretically you could stat such an attack much earlier, even at the Genesis block.
–>One solution: always reject forks that differ before some “checkpont”

77
Q

Was is the Double spend —> Nothing at stake problem?

PoS

A

The double spender could for example only validate blocks on the fraudulent version, which then would be the longest chain

78
Q

How transparent are Blockchains?

A
  • Most cryptocurrencies are pseudonymous
    Require unique address, and use private keys
  • Data on blockchain is usually totally transparent
    All transactions are recorded
  • Users prefer less transparency
    –>Two approaches:
    • Privacy coins
    • Mixers
79
Q

How does the Lightning Network work=

A

THe Transaction between the two parties change the balance of the payment channel.
–>THe updated balance is signed by btoh parties using their private keys.
–>No transaction is recorded on the main blockchain
- Eventually the payment channel is closed and the net is broadcasted to the main network
- –>Which results in another single transaction of the main blockchain

80
Q

What is a Lightning Network?

A

Is a off-chain solution for smaller payments
* First there is a payment channel opened between two parties by recording a transaction on the main blockchain

Payment channel: is a multi-signature address using both parties keys keeping track of each parties respective balance

81
Q

Example of zero knowledge proof? (red and blue pills)

A

One firend A is blind and cannot differentiate between red and blue
–>How can you prove to him that the two are different without telling him which one has what colour?
- you let him change the pills hand behind his back and then tell him wheteher he changed it or not.
- Since you can see the color you can prove to him that they are different withoiut telling him

82
Q

What is zero knowledge proofs in the context of privacy coins?

A

How can we make sure that only Alice can get to spend her coins?
–>Use zero knowledge proofs
- proof a secret to another party without letting anyone know what the secret is

83
Q

What are privacy coins?

A

Alternative to cryptocurrencies that allow for completely anonymous transactions

84
Q

Advantages and Disadvantages of PoS

A

Advantages:
* verly low energy demand
* scalability isoftentimes better (and more faster transactions)
* no expensive, specialized, soon-to-be redundant equipment needed
Disadvantages:
* Not robust 51% attacks, instead need 51% of stake, However when other find out the Stake would be worthless probably
* There are and have to be still costs for validatos –>Oppotunity cost of locking away the stake
* Liduidity may be reduced due to locked-stake
* not withstood the test of time for as long as PoW

85
Q

Some issue with stablecoins?

A
  • Some are very intransparent regarding their services
  • Stablecoins pegged to other currencies are fully influenced by their monetary policy
  • Regulation (collaterialized stablecoins, may suddenly have to buy or sell alrge amount of collateral, potentially impacting traditional financial markets
  • Depending on the mechanism, stablecoins can be centralized
    (in sace of fiat and commodity-backed: someone has to hold the reserve somewhere
  • they might not be as stable as they claim
86
Q

Two basic types of backing mechanisms? Stablecoins

A
  1. Collateralized stablecoins
  2. Algorithmic stablecoins
87
Q

Short description of Collateralized stablecoins?

A

they hold some other asset in reserve
->This asset can be the same asset as the stablecoin is pegged to

88
Q

Collateralized stablecoins
Describtion between pegged and reserve asset

A

Peg = reservce –> a mechanism allows investors to direclty exchange the stablecoin for the reserve asset in 1:1 ratio
Peg =/ reserve –> the reserve asset hat to be bought and sold to meet the demans of investors wanting to exchange
- these stablecoins then need to be overcollaterialized, especially for volatile reserve assets
- reserve assets have to be sufficiently liquid

89
Q

Algorithmic Stablecoins short descrioption
Versions of stablecoins

A

are not backed by any other asset
* rely on automated algorithms via smart contracts to adjust the value of the coin by increasing or decreasing supply
–>These share of each user stays constant during the adjustments, but the total suplly changes

90
Q

What are wallets?

A

Wallets are tools to create and store the keys and addresses
* create a seed phrase of typically 12 or more words used to set up and access the wallet
* From this one seed, infinite number of addresses can be generated
–>all can be accessed and backup by the single seed phrase

91
Q

What do Mixers do?

A

Mier pool together funds from multiple sources over some time and then split them acoss multiple addresses at random times

–>They are used to obscure fund flows and to increase anonymity
* can be intermediate mixing steps of pooling and distributing
* operators keep a small fee
* are frequently used for criminal activity

92
Q

What kin of Wallets exist?

A

Hot Wallets: are connected to the internet and readily available for trading
Cold Wallets: are offllince and suited for long-term storage of funds

93
Q

Name the two types of exchanges?

A

Centralized exhanges: operate similar to exchanges of other finanical assets
Decentralized exchanges: are new to cryptocurrencies
–>Transaction on the blokcchian can be used to transfer funds of the same currency between parties.

94
Q

Explain LImit Order Book Trading (Centralized Exchanges)

A

–>centralized exchanges typically iperates a central limit order book:
* Traders can submit limit and market orders
* The matching enging then matches buy and sell orders

95
Q

What do users need for centralized exchange?

A

–>to trade the users need an account at the exchange
* all funds are kept in the exchange´s own wallet, from the blockchain´s perspective the coins are still owned by the exchange
* Only deposits and withdrawals of cryptocurrencies are recorded on the blockchain, and actually moves coins to other addresses

–>simplifies the process, increases speed, and reduces blockchain congestion and fees

96
Q

Things to conisder with centralized exchanges?

A
  • are convenient and fast, but introduce a single point of failure and require trust in the exchange
  • severall centralized exchanges allow user to buy cryptocurrnecies with fiat currency (contracy to decentralized exchanges)
  • several have been shown to report fake volumne to appear more trustworthy
97
Q

Short Description of decenteralized exchanges

A

decentralized exchanges (DEX) is a type of on-blockchain exchange that does not require an intermediary but instead relies on smart contracts

98
Q

Description of Constant Product Market Making (CPMM)?

Deecentralized Exchanges

A

= trading takes place in liquidity pools where two tokens can be exchanged with each other
* Liquidity provider (LP) add both tokens to the pool in the same ration as tokens are already in the pool
* in return, LP´s receive liquidity tokens that reflect the LP´s share in the pool and can be exchanged for both coins in their share

99
Q

How does a trade exchanges Tokens in CPMM?

A

Traders wanting to exchange tokens, deposit one token in the pool and receive the other token in return
–>The price is implied by the current raio of the two tokens in the pool
- LP´s are rewarded by receiving transaction fees

100
Q

What types of Loans exists in Lending markets for cryptocurrencies?

A
  1. Collateralized Loans
  2. Flash Loans
101
Q

Describe Collaterialized Loans

A

–>Similar to bank loans
* Typical application would be to borrow a given amount in a stablecoin and put up another cryptocurrency as collateral
–>Since cryptos are so volatile, the loans have to be overcollateralized

102
Q

describe Flash loans?

A

Flash Loans are uncollateralized DeFi Loans
* Funds are borrowed, used, and returned within the same transaction via smart contracts
* If the loan is not repaid within the same transaction, the whole transation is reversed
–>Liquidity is provided via pools similar to DEX (with one token)
—>Flas loans are used for exploiting arbitragre opportunitites or attacking dApps

103
Q

Describe CBDC?

A

= DB digital currencies represent a claim on a central bank

104
Q

What are Retail CBDC?

A

Retail CBDC is accessible to everyone
* Single-tier retail CBDC: CB directly handles retail payments
* Two-tier CBDC (hybrid or intermediated): Intermediaries handle retail payments

105
Q

What are whole-sale CBDC?

A

In Wholesale CBDB, only a few isntitutions have access and use it for settlement

106
Q

What types of CBDC are there?

A

Token-based CBDC: are anonymous, may use blockchains (not open or public), and are closer to cryptocurrencies (and pyhsical cash)
Account-based CBDC: users are identifiable and have an account with the CB

107
Q

Pros of Central Bankd Digital Currencies (CBDC)?

A

Pros:
* provide new and better ways to implement monetary policy
* can be used for efficient fiscal transfers
* faciliate improved anti money laundering processes
* might be attractive and competitive with other payment systems
* Default risk of CBs is practically zero
* might make cross-border payments more efficient
* Retail implementations decrease the need for commercial bank intermediation

108
Q

Cons of Central Bankd Digital Currencies (CBDC)?

A

Cons:
*effects on financial stability still not fully understood
* Privacy concerns copared to physical cash and more centralization compared to established banking system
* Security might be an issue if the CB is hacked
* Retail implementations decrease the need for commercial bank intermediation

109
Q

Further Blockchains Applications?

A
  1. Clearing and Settlement (trade)
  2. Insurance
  3. Energy markets
  4. Compliance
  5. Commerce and Trade
  6. Logistics and Supply Chain Management
  7. Healtcare
110
Q

What is the computing layer within Ethereum?

A

The computing layer is a virtual machine (EVM), which is a Turing complete machine that can ** execute loops and run** all sorts of programs