Cryptocurrency Flashcards
(35 cards)
Ledgers
Record-keeping system.
Tracking and maintaining historical record of transactions for many times of assets.
DLT
Distributed Ledger Technology
Ledgers shifting to a global decentralized network. Cryptographically secured and fast.
Trust based on cryptography, not centralized authority
Accessed with keys and cryptographic signatures
Ledger changes reflected and copied to all participants quickly. Each participant has a copy
Full audit of history available at all times.
DLTs can be used for recording tracking, monitoring and transacting of all forms of assets.
Centralised downsides
Centralised open to corruption/manipulation, additional regulation/legislation costs, centralised point of failure, centralised system of valuable data, attractive malicious errors
DLT advantages
Improved transparency, reduced corruption, improved security while reducing overheads of auditing, accounting and legal issues.
Easily accessible on demand, tamperproof (reduced corruption again), distributed, no single point of failure so data synchronised across all nodes in network
Public permissionless DLT
Anyone can join, read, write and commit
Private permissionless DLT
Only authorised participants can join, read, write and commit
Public permissioned DLT
Anyone can join and read
Only permissioned participants can write and commit
Private permissioned DLT
Only authorised participants can join and read
Only permissioned participants cna write and commit
Blockchain
Series of blocks chained together by each block’s hash
Each block has data/transactions and hash generated from them. Next block has hash of previous block
Blockchain hash purpose
Canot create the block from the hash as it’s a one-way function
Changing any data in the block gives a completely different hash so it’s easy to verify if the block has been changed. Next block won’t recognize the previous block as being in the chain.
Blockchain consensus
No central organisation so consensus to verify transactions needed.
Distributed system, parties don’t have to trust each other
Transactions need to be validated and then sent to all nodes on the network. Anyone can validate on the network.
Bitcoin uses proof of work for validation
Ethereum uses proof of stake, less energy consumption
Blockchain transactions
Transferral of money with public-key cryptography.
Each wallet has public and private key.
Public key acts as address on wallet for receiving funds.
Private key gives owner access to their digital assets.
Effective security only requires keeping the private key private
Blockchain layers
Application and Presentation Layer
Consensus Layer
Network Layer
Data Layer
Hardware/Infrastructure Layer
Hardware/infrastructure layer
Underlying systems supporting the functioning of a blockchain network
VMs, Containers, Services, Messaging
Data Layer
Storing and managing transactions in a distributed ledger
Digital Signature, Hash, Merkel Tree, Transactions
Network Layer
Transmitting and distributing information between nodes.
P2P
Consensus Layer
Reaching agreement among nodes about state of shared ledger
PoW, PoS, DPoS, PoET, PBFT
Application and Presentation Layer
Providing access to blockchain functionality and services to end-users and developers
Smart Contracts, Chaincode, DApps, User Interface
Blockchain “trusted system”
Trust created by design. P2P distributed network between people who don’t trust each other. Trust in technology and cryptography rather than any centralized authority.
Digital Currencies
Monetary asset in digital form.
Regulated -> denominated to sovereign currency
Unregulated -> Virtual currency (cryptocurrency)
Virtual Currency
Electronic representation of monetary value
Issued, managed and controlled by private issuers (platform developers/founding org)
Relies on trust. No issuing central authority.
Value based on an underlying mechanism (mining/underlying assets)
Restricted to members of a virtual group
Cryptocurrency
Part of virtual currency group
Use cryptography to keep transactions secure and authentic
Manage and control the creation of new currency unts.
Transacted over DLT typically on a dedicated blockchain based network. Public financial transaction database. Open to the common public.
First cryptocurrency
Bitcoin, p2p network to prevent double-spending. Completely decentralized with no server or central authority.
Cryptocurrency Monetary Properties
Controlled supply. Most cryptocurrencies limit supploy of tokens. All cryptocurrencies control the supply of tokens by schedule written in the code.
No debt but bearer: Fiat-money is a system of IOU whereas cryptocurrencies just represent themselves