SlideShare a Scribd company logo
1 of 68
TEZOS
EDUCATE
BY ENCODE
Encode x Tezos
What’s in store?
8 week online hackathon
10 week accelerator
8 event education series
What is Encode Club?
The best place for web3 education
Educate
Conceptual seminars and
technical deep dives!
Bootcamps
Intensive Solidity
workshops with intimate
support and job
placements!
AMAs
Q&As with the
experts and
biggest names in
crypto!
Hackathons
6-12 week sessions to
earn tokens,
internships, and cash!
Accelerator
10 weeks, turning startups
into companies, with
funding, classes,
and connections!
Investment
Backing by
leading angels and
VCs for advice
and funding!
The best place for web3 building and investment
Talent
Exclusive technical and
non-technical jobs,
internships, and work
placements!
The best place for web3 jobs
Everything we do is free, global, and virtual.
Not sure where to start?
Talk to us.
What’s next?
tinyurl.com/encodestart
● Exclusive job &
internship
opportunities
● Free learning
and training
opportunities
● 1-1 support
● Entry into
building
community
● Investment
What is a Blockchain?
VII. Decentralized Ledger
VIII. Proof of Work
IX. Hash Inclusions
X. Cryptocurrency
XI. Chain Security
I. Cryptographic Hash Fxs
II. Ledger
III. Digital Signatures
IV. Unique Tx IDs
V. No Overspending
VI. Smart Contracts
What is a blockchain?
Cryptographic Hash Functions
y = 2x
x y
0 0
1 2
2 4
3 6
● (the hardest concept today)
● Functions: Take input(s) and return output.
○ Linear: y = mx + b
Cryptographic Hash Functions
Input Output
Linear
Function x y
Cryptographic
Hash Function
Messages,
Transactions,
Keys
256-bit
Hash
Cryptographic Hash Functions
Input Output (256-bit hash)
hello world
730e109bd7a8a32b1cb9d9a09aa2325d
2430587ddbc0c38bad911525
hello world.
619cba8e8e05826e9b8c519c0a5c68f4f
b653e8a3d8aa04bb2c8cd4c
Properties of a 256-bit Hash
● 2256 possible outputs
(115,792,089,237,316,195,423,570,985,008,687,907,853,269,984,66
5,640,564,039,457,584,007,913,129,639,936).
● Looks random, but isn’t actually!
Cryptographic Hash Functions
Properties of a Cryptographic Hash Function
● Same input always results in the same output!
● Extremely hard to reverse engineer.
● Small change to the input results in large change to the
output.
Cryptographic Hash Functions
Cryptographic Hash Functions
🤓 🎉
Let’s think about donuts.
🍩
A owes B $5 🍕
A owes B $7 🍩
B owes A $4 🥨
+ A owes B $2 🍫
A owes B $10 🤓
Ledger
A ⬅️💸➡️ B
📔
Current Stage
We have a central ledger (notebook) capable of recording
transactions between 2 parties who trust each other, who will
settle at end of month.
Ledger
Problem
What if we introduce more parties?
A pays C $6 🍕
D pays B $2 🍩
B pays C $3 🥨
+ A pays D $2 🍫
(settlement) 🤓
Ledger
A ⬅️💸➡️ B
⬆️⬇️ ⬆️⬇️
C ⬅️💸➡️ D
🤓🤓
Current Stage
We have a central ledger (website) capable of recording
transactions between multiple parties who trust each other,
who will settle at end of month.
Ledger
Problem
What if we don’t trust each other?
A pays C $6 Anupam
D pays B $2 Damir
B pays C $3 Beaumont
+ A pays D $2 Anupam
(settlement) 🤓
Signatures
Current Stage
Our central ledger (website) records transactions between
multiple parties who trust each other, who will settle at end of
month. All transactions must be signed.
Signatures
Problem
What if someone forges the signatures?
Digital Signatures
New Inputs!
● Every user is assigned a secret key and a public key.
● Secret Key: Only user knows.
● Public Key: Everybody knows.
Digital Signatures
Input Output
Linear
Function x y
Signature
Function
Message,
Secret Key Signature Hash
Verification
Function
Message, Signature Hash,
Public Key True or False
Digital Signatures
Properties of Digital Signatures
● Signature Function: Users have a cryptographic (secure) way
of attesting to transactions.
● Verification Function: Other users can check to see whether
signatures are legit.
Current Stage
Our central trustless ledger (website) records transactions
between multiple parties who will settle at end of month. All
transactions must be digitally signed.
Digital Signatures
Problem
What if the same signature is applied to an identical transaction?
Unique Transaction IDs
Old Model
A pays $50 to B bd7a8a
A pays $50 to B bd7a8a
A pays $50 to B bd7a8a
A pays $50 to B bd7a8a
Unique Transaction IDs
New Model (with Transaction IDs)
A pays $50 to B (6oexh2) cb9d9a
A pays $50 to B (9w7teg) 9aa232
A pays $50 to B (20t84w) 87ddbc
A pays $50 to B (825g37) c38bad
Remember: Change to input changes the output!
Current Stage
Our central trustless ledger (website) records transactions
between multiple parties who will settle at end of month. All
transactions are authenticated via digital signatures.
Unique Transaction IDs
Problem
How do we make sure people actually settle?
● Users must put money in
the pot first.
● Users are only allowed to
spend as much as they put
in.
● Overspent transactions are
invalid.
No Overspending!
💰 A puts $150 into ledger.
☑️ A pays B $100
☑️ A pays D $50
✖️ A pays C $20
No Overspending!
Properties of No Overspending
● There’s always money to move.
● Never have to cash out - can fully transact within the system!
Problem: How do we make this happen without human
attention?
Smart Contracts
● Don’t overthink it.
● Smart Contract: Takes cause, and executes effect.
If (A pays B $50), then move $50 from A’s account to B’s.
Smart Contracts
Properties of Smart Contracts
● Fully in code.
● Operate automatically!
● Tezos allows you to use Michelson, SmartPy, LIGO or Morley
Current Stage
Our central trustless ledger (website) records transactions
between multiple parties who will automatically settle at end of
month. All transactions are authenticated via digital signatures.
No Overspending and Smart Contracts
Problem
Who controls and maintains the ledger?
Decentralized Ledger
● Everyone has their own copy of the ledger.
● Transactions are broadcast for everyone to record.
A 🔊 “A paid B $50”!
A 📒 B 🥨🥨 C 📔 D 📓
Current Stage
Our decentralized ledgers records transactions between
multiple parties who will automatically settle at end of month. All
transactions are authenticated via digital signatures.
No Overspending and Smart Contracts
Problem
How do we know which ledger to trust?
https://tzstats.com/
Proof of Work
● Nonce: Special number that satisfies the challenge.
● Challenge: Find a nonce input that returns a hash that starts
with a certain amount of zeros.
Proof of Work
PoW Example
Challenge: Find nonce so SHA256 (Message, Nonce) returns a
hash that starts with 30 zeros.
● Users on the network (“nodes”) guess and “check through”
2^256 possibilities.
Proof of Work
Proof of Work: Users compete to find a nonce that meets the
network’s requirement. The set of transactions (ledger) with the
most computational work (nonces found) is trusted.
Properties of PoW
● Difficult to achieve: have to guess through lots of combos.
● Easy to verify! Just plug the nonce in and check.
● Side Note: We’ll start collecting transactions into blocks.
● Blocks are completed with their proof of work.
Proof of Work
Transaction 1
Transaction 2
Transaction 3
Proof of Work
✅
Transaction 1
Transaction 2
Transaction 3
❌
Our Consensus Mechanism:
● The chain (ledger) with the most proof of work is trusted.
● This doesn’t require any intermediaries (third parties). The
code can do everything.
Proof of Work
Example
A’s ledger has 4 sets of PoW. B’s ledger has 2 sets of PoW.
Whose ledger do we trust?
Proof of Work
Current Stage
Our decentralized ledger records transactions between multiple
parties who will automatically settle at end of month. All
transactions are authenticated via digital signatures. We have
decentralized consensus as to the correct record.
Proof of Work
Problem
How do we stop the reordering of blocks?
Block 2 must contain Block 1’s hash.
➡️
➡️
● Block order is maintained!
● A change to a hash changes the entire proof of work.
transaction 1
transaction 2
transaction 3
Proof of Work
Previous Hash
transaction 1
transaction 2
transaction 3
Proof of Work
Previous Hash
transaction 1
transaction 2
transaction 3
Proof of Work
Current Stage
Our decentralized ledger records transactions between multiple
parties who will automatically settle at end of month. All
transactions are authenticated via digital signatures. We have
decentralized consensus as to the correct record (and its order).
Block 2 must contain Block 1’s hash.
Problem
How do we incentivize people to do Proof of Work?
Meaning
Proof-of-stake means that participants in the consensus
algorithm are chosen in function of their stake (the amount of
tokens a participant has).
“Baking” 👩🥨🍳 🥨
Tezos uses Proof of Stake
Consensus in PoS
Proof-of-stake means that participants in the consensus
algorithm are chosen in function of their stake (the amount of
tokens a participant has).
What is Proof of Stake
Delegates
If one does not have enough stake to participate on its own or
does not want to set up the needed infrastructure, (s)he can use
delegation. Therefore, in Tezos, it is the delegates that may
participate in consensus.
Tezos uses Proof of Stake
In a PoS system, a participant's vote in a system is linked directly
to the number of coins they have, so that a person who only has
100 coins cannot pretend to be 1000 different people with 100
coins each.
It could pretend to be 100 different people with 1 coin each, but
since the voting power of a participant is proportional to the
number of coins they own, this spoof does not help.
Why is Proof of Stake better
In a Proof-of-Work system, block producers (aka miners or
validators) compete for this right by expending computing
power to solve random cryptographic puzzles. In this paradigm,
the more computing power a miner has, the more likely they are
to create the next block.
By contrast, PoS systems revolve around the idea that the more
coins a block producer has, the more likely they are to create the
next block.
PoS as more energy efficient
● Baker: Listens for transactions, creates blocks, and
broadcasts those blocks.
● Those who achieve a PoS by ‘baking’ will be rewarded with
TEZ.
● Ledger users listen for blocks, not transactions
Cryptocurrency e.g. TEZ
Current Stage
Our decentralized ledger records transactions between multiple
parties who will automatically settle at end of month. All
transactions are authenticated via digital signatures. We have
decentralized consensus as to the correct record (and its order).
Continuous maintenance of the network is incentivized by
rewarding miners with crypto.
Cryptocurrency!
Problem
How secure is this really?
How do we break this?
Review of Security
● Cryptographic functions ensure that transactions and their
order are authenticated (signature function, hash inclusions).
● Their authenticity can be checked by anyone at any time
(using verification functions, plugging in the nonce).
● Only the chain with the most blocks is trusted. As the
network grows, cheating gets more and more difficult.
How do we break this?
Example
A hates B. A broadcasts “A pays $40 to B” to B, but not to
anybody else. A wants B to have his own (fraudulent chain), but
doesn’t actually want to pay B.
What would he have to do?
How do we break this?
Recall: Only the chain with the most blocks is trusted. A would
have to do his own proof of stake on the fraudulent chain in
order for B to believe it was the right one.
● This is possible, if A has 51% of the computational power on
the network.
● As the network grows, this becomes way more difficult.
● As soon as A’s fraudulent chain is outpaced, he’s blocked!
How do we break this?
Example II
C doesn’t like the set of transactions. She wants to go back a
couple blocks, and remove records of people paying her.
What would she have to do?
How do we break this?
Recall: Every block has the previous block’s hash. Block 6 has
Block 5’s hash, etc.
● To change Block 6, C will have to redo the baking for Blocks 1-
5, and outpace the real chain as she does.
● Possible, but extremely difficult.
● She also does not have people’s secret keys, so can’t create
new transactions that pertain to them.
Current Stage
Our decentralized ledger records transactions between multiple
parties who will automatically settle at end of month. All
transactions are authenticated via digital signatures. We have
decentralized consensus as to the correct record (and its order).
Continuous maintenance of the network is incentivized by
rewarding miners with crypto.
Our system is extremely secure and becomes more secure as
more users join.
How do we break this?
A trustless ledger of transactions that is:
● Immutable: Can’t be changed.
● Decentralized: Failure-tolerant, user-controlled, transparent.
● Secure: Via cryptography, hashing, etc.
● Distributed: Quicker without intermediaries.
● Consensus: No need for trust.
What is a blockchain?
● Self-Amendment: Self-amendment allows Tezos to upgrade itself without having to split
(“fork”) the network into two different blockchains.
● On-chain Governance: In Tezos, all stakeholders can participate in governing the protocol. The
election cycle provides a formal and systematic procedure for stakeholders to reach
agreement on proposed protocol amendments.
● Proof of stake + delegation
● Smart Contracts + Formal Verification: Tezos offers a platform to create smart contracts and
facilitates formal verification, a technique used to improve security by mathematically proving
properties about programs such as smart contracts.
What is unique about Tezos
What is “blockchain” (aka web3)?
Web3 is a totally new way to engage with the
internet with financial primitives, identity and
individual autonomy built in.
Current: Our financial system relies on opaque systems of
intermediaries (banks, brokers, etc) that drive costs and are potentially
untrustworthy.
Possibility: Decentralized Finance
Possibility: What if we had a trustless mechanism by which
transactions can be permanently and transparently recorded, without
the need for costly intermediaries?
Current: ownership is either indirect (someone else looks after it or
verifies our ownership) or it is difficult to prove we own something
Possibility: Non-Fungible Tokens
Possibility: what if we had digital ownership of assets with a compelling
link between the asset and the owner
Current: The governance (decision-making) of powerful institutions is
concentrated between a few actors, shielded from stakeholders, and
compromised by the personal interests of those few actors.
Possibility: Decentralized Autonomous Orgs
Possibility: What if we had a transparent and decentralized way by
which decisions can be made, and governance tokens incentivize
participation by stakeholders?
What’s next?
tinyurl.com/encodestart
● Exclusive job
/ internship
opportunities
● Free learning
and training
opportunities
● 1-1 support
● Entry into
building
community
● Investment

More Related Content

What's hot

Python, Blockchain, and Byte-Size Change
Python, Blockchain, and Byte-Size ChangePython, Blockchain, and Byte-Size Change
Python, Blockchain, and Byte-Size ChangePortia Burton
 
Blockchain And Cryptocurrency : How Blockchain And Cryptocurrency Relate To E...
Blockchain And Cryptocurrency : How Blockchain And Cryptocurrency Relate To E...Blockchain And Cryptocurrency : How Blockchain And Cryptocurrency Relate To E...
Blockchain And Cryptocurrency : How Blockchain And Cryptocurrency Relate To E...Blockchain Council
 
How Blockchain Is Different From Cryptocurrency?
How Blockchain Is Different From Cryptocurrency?How Blockchain Is Different From Cryptocurrency?
How Blockchain Is Different From Cryptocurrency?Endive Software
 
A Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval CaprazA Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval CaprazSeval Çapraz
 
Blockchain & Cryptocurrency
Blockchain & CryptocurrencyBlockchain & Cryptocurrency
Blockchain & CryptocurrencySumit Rajpal
 
Encode: Intro to Tezos
Encode: Intro to TezosEncode: Intro to Tezos
Encode: Intro to TezosTinaBregovi
 
CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101Blockstrap.com
 
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...Simplilearn
 
How Blockchain and Cryptocurrency works.
How Blockchain and Cryptocurrency works.How Blockchain and Cryptocurrency works.
How Blockchain and Cryptocurrency works.Waleed Ahmed
 
5 Core Blockchain Technology Concepts
5 Core Blockchain Technology Concepts 5 Core Blockchain Technology Concepts
5 Core Blockchain Technology Concepts Blockchain Council
 
[JSDC 2021] Blockchain 101 for Frontend Engs
[JSDC 2021] Blockchain 101 for Frontend Engs[JSDC 2021] Blockchain 101 for Frontend Engs
[JSDC 2021] Blockchain 101 for Frontend EngsLucien Lee
 
A comparison of blockchain technologies for distributed voting
A comparison of blockchain technologies for distributed votingA comparison of blockchain technologies for distributed voting
A comparison of blockchain technologies for distributed votingRoderik van der Veer
 
Blockchain for Graduates | Technical Explanation
Blockchain for Graduates | Technical ExplanationBlockchain for Graduates | Technical Explanation
Blockchain for Graduates | Technical ExplanationAkshansh Chaudhary
 
What is tezos
What is tezos What is tezos
What is tezos zaarahary
 
Blockchain Tokenization
Blockchain TokenizationBlockchain Tokenization
Blockchain TokenizationBellaj Badr
 
BlockChain Tutorial | Getting Started With BlockChain | BlockChain Certificat...
BlockChain Tutorial | Getting Started With BlockChain | BlockChain Certificat...BlockChain Tutorial | Getting Started With BlockChain | BlockChain Certificat...
BlockChain Tutorial | Getting Started With BlockChain | BlockChain Certificat...Edureka!
 
Introduction to Blockchain Development
Introduction to Blockchain DevelopmentIntroduction to Blockchain Development
Introduction to Blockchain DevelopmentLightstreams
 

What's hot (20)

Python, Blockchain, and Byte-Size Change
Python, Blockchain, and Byte-Size ChangePython, Blockchain, and Byte-Size Change
Python, Blockchain, and Byte-Size Change
 
Blockchains 101
Blockchains 101Blockchains 101
Blockchains 101
 
Intro into blockchain
Intro into blockchainIntro into blockchain
Intro into blockchain
 
Blockchain And Cryptocurrency : How Blockchain And Cryptocurrency Relate To E...
Blockchain And Cryptocurrency : How Blockchain And Cryptocurrency Relate To E...Blockchain And Cryptocurrency : How Blockchain And Cryptocurrency Relate To E...
Blockchain And Cryptocurrency : How Blockchain And Cryptocurrency Relate To E...
 
How Blockchain Is Different From Cryptocurrency?
How Blockchain Is Different From Cryptocurrency?How Blockchain Is Different From Cryptocurrency?
How Blockchain Is Different From Cryptocurrency?
 
A Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval CaprazA Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval Capraz
 
Blockchain & Cryptocurrency
Blockchain & CryptocurrencyBlockchain & Cryptocurrency
Blockchain & Cryptocurrency
 
Encode: Intro to Tezos
Encode: Intro to TezosEncode: Intro to Tezos
Encode: Intro to Tezos
 
CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101
 
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
 
How Blockchain and Cryptocurrency works.
How Blockchain and Cryptocurrency works.How Blockchain and Cryptocurrency works.
How Blockchain and Cryptocurrency works.
 
5 Core Blockchain Technology Concepts
5 Core Blockchain Technology Concepts 5 Core Blockchain Technology Concepts
5 Core Blockchain Technology Concepts
 
[JSDC 2021] Blockchain 101 for Frontend Engs
[JSDC 2021] Blockchain 101 for Frontend Engs[JSDC 2021] Blockchain 101 for Frontend Engs
[JSDC 2021] Blockchain 101 for Frontend Engs
 
A comparison of blockchain technologies for distributed voting
A comparison of blockchain technologies for distributed votingA comparison of blockchain technologies for distributed voting
A comparison of blockchain technologies for distributed voting
 
Blockchain for Graduates | Technical Explanation
Blockchain for Graduates | Technical ExplanationBlockchain for Graduates | Technical Explanation
Blockchain for Graduates | Technical Explanation
 
Blockchain
BlockchainBlockchain
Blockchain
 
What is tezos
What is tezos What is tezos
What is tezos
 
Blockchain Tokenization
Blockchain TokenizationBlockchain Tokenization
Blockchain Tokenization
 
BlockChain Tutorial | Getting Started With BlockChain | BlockChain Certificat...
BlockChain Tutorial | Getting Started With BlockChain | BlockChain Certificat...BlockChain Tutorial | Getting Started With BlockChain | BlockChain Certificat...
BlockChain Tutorial | Getting Started With BlockChain | BlockChain Certificat...
 
Introduction to Blockchain Development
Introduction to Blockchain DevelopmentIntroduction to Blockchain Development
Introduction to Blockchain Development
 

Similar to Encode x Tezos: Intro to Blockchain

Bitcoin story of programable currency
Bitcoin story of programable currencyBitcoin story of programable currency
Bitcoin story of programable currencyHossam Soffar
 
Introduction to Cryptocurrency
Introduction to CryptocurrencyIntroduction to Cryptocurrency
Introduction to CryptocurrencyROUNAKKEDIA1
 
What are Blockchain & Tokens and are they useful ?
What are Blockchain & Tokens and are they useful ?What are Blockchain & Tokens and are they useful ?
What are Blockchain & Tokens and are they useful ?Scott Carlson
 
Blockchain Intro + Myths
Blockchain Intro + MythsBlockchain Intro + Myths
Blockchain Intro + MythsAPIGarage
 
Privacy Preserving Paradigms of Blockchain Technology
Privacy Preserving Paradigms of Blockchain TechnologyPrivacy Preserving Paradigms of Blockchain Technology
Privacy Preserving Paradigms of Blockchain TechnologyGokul Alex
 
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)IT Arena
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchainsubbul
 
Becoming a blockchain professional
Becoming a blockchain professionalBecoming a blockchain professional
Becoming a blockchain professionalPortia Burton
 
Behind the scenes of bitcoin protocol
Behind the scenes of bitcoin protocolBehind the scenes of bitcoin protocol
Behind the scenes of bitcoin protocolVedran Ilić-Dreven
 
What is Cryptocurrency
What is Cryptocurrency What is Cryptocurrency
What is Cryptocurrency James Travis
 
What is cryptocurrency everything you need to know - ultimate guide
What is cryptocurrency  everything you need to know - ultimate guideWhat is cryptocurrency  everything you need to know - ultimate guide
What is cryptocurrency everything you need to know - ultimate guidePreparationInfo
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerBlockstrap.com
 
BlockChain for the Banker
BlockChain for the BankerBlockChain for the Banker
BlockChain for the BankerBohdan Szymanik
 
Intro to Blockchain - And, by the way, what the heck is proof-of-work?
Intro to Blockchain - And, by the way, what the heck is proof-of-work?Intro to Blockchain - And, by the way, what the heck is proof-of-work?
Intro to Blockchain - And, by the way, what the heck is proof-of-work?Jim Flynn
 
Blockchain for Business on Hyperledger
Blockchain for Business on HyperledgerBlockchain for Business on Hyperledger
Blockchain for Business on HyperledgerAll Things Open
 
Click Ventures Blockchain Ecosystem Report 2018
Click Ventures Blockchain Ecosystem Report 2018Click Ventures Blockchain Ecosystem Report 2018
Click Ventures Blockchain Ecosystem Report 2018Frederick Ng
 
Cashu mints - Meetup #10 - 2023-03-09
Cashu mints - Meetup #10 - 2023-03-09Cashu mints - Meetup #10 - 2023-03-09
Cashu mints - Meetup #10 - 2023-03-09RoundRockBitcoiners
 

Similar to Encode x Tezos: Intro to Blockchain (20)

Bitcoin story of programable currency
Bitcoin story of programable currencyBitcoin story of programable currency
Bitcoin story of programable currency
 
Introduction to Cryptocurrency
Introduction to CryptocurrencyIntroduction to Cryptocurrency
Introduction to Cryptocurrency
 
bitcoin_presentation
bitcoin_presentationbitcoin_presentation
bitcoin_presentation
 
What are Blockchain & Tokens and are they useful ?
What are Blockchain & Tokens and are they useful ?What are Blockchain & Tokens and are they useful ?
What are Blockchain & Tokens and are they useful ?
 
Blockchain Intro + Myths
Blockchain Intro + MythsBlockchain Intro + Myths
Blockchain Intro + Myths
 
Privacy Preserving Paradigms of Blockchain Technology
Privacy Preserving Paradigms of Blockchain TechnologyPrivacy Preserving Paradigms of Blockchain Technology
Privacy Preserving Paradigms of Blockchain Technology
 
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Becoming a blockchain professional
Becoming a blockchain professionalBecoming a blockchain professional
Becoming a blockchain professional
 
Behind the scenes of bitcoin protocol
Behind the scenes of bitcoin protocolBehind the scenes of bitcoin protocol
Behind the scenes of bitcoin protocol
 
What is Cryptocurrency
What is Cryptocurrency What is Cryptocurrency
What is Cryptocurrency
 
What is cryptocurrency everything you need to know - ultimate guide
What is cryptocurrency  everything you need to know - ultimate guideWhat is cryptocurrency  everything you need to know - ultimate guide
What is cryptocurrency everything you need to know - ultimate guide
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primer
 
BlockChain for the Banker
BlockChain for the BankerBlockChain for the Banker
BlockChain for the Banker
 
Blockchain Introduction
Blockchain IntroductionBlockchain Introduction
Blockchain Introduction
 
Intro to Blockchain - And, by the way, what the heck is proof-of-work?
Intro to Blockchain - And, by the way, what the heck is proof-of-work?Intro to Blockchain - And, by the way, what the heck is proof-of-work?
Intro to Blockchain - And, by the way, what the heck is proof-of-work?
 
Blockchain for Business on Hyperledger
Blockchain for Business on HyperledgerBlockchain for Business on Hyperledger
Blockchain for Business on Hyperledger
 
Click Ventures Blockchain Ecosystem Report 2018
Click Ventures Blockchain Ecosystem Report 2018Click Ventures Blockchain Ecosystem Report 2018
Click Ventures Blockchain Ecosystem Report 2018
 
Cashu mints - Meetup #10 - 2023-03-09
Cashu mints - Meetup #10 - 2023-03-09Cashu mints - Meetup #10 - 2023-03-09
Cashu mints - Meetup #10 - 2023-03-09
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 

More from TinaBregovi

Building LSD Use Cases on Bifrost
Building LSD Use Cases on BifrostBuilding LSD Use Cases on Bifrost
Building LSD Use Cases on BifrostTinaBregovi
 
Urbit Launch Event
Urbit Launch EventUrbit Launch Event
Urbit Launch EventTinaBregovi
 
Layer Hack: Boba Network: Understanding Hybrid Compute
Layer Hack: Boba Network: Understanding Hybrid ComputeLayer Hack: Boba Network: Understanding Hybrid Compute
Layer Hack: Boba Network: Understanding Hybrid ComputeTinaBregovi
 
Layer Hack: zkSync - Intro to zkEVM
Layer Hack: zkSync - Intro to zkEVMLayer Hack: zkSync - Intro to zkEVM
Layer Hack: zkSync - Intro to zkEVMTinaBregovi
 
Rollup-as-a-service and why it matters to the next-gen of dApps
Rollup-as-a-service and why it matters to the next-gen of dAppsRollup-as-a-service and why it matters to the next-gen of dApps
Rollup-as-a-service and why it matters to the next-gen of dAppsTinaBregovi
 
Layer Hack: AltLayer Workshop
Layer Hack: AltLayer WorkshopLayer Hack: AltLayer Workshop
Layer Hack: AltLayer WorkshopTinaBregovi
 
Layer Hack Launch Event
Layer Hack Launch EventLayer Hack Launch Event
Layer Hack Launch EventTinaBregovi
 
Bridging with StarkNet
Bridging with StarkNetBridging with StarkNet
Bridging with StarkNetTinaBregovi
 
How To Build Better NFTs with Briq
How To Build Better NFTs with BriqHow To Build Better NFTs with Briq
How To Build Better NFTs with BriqTinaBregovi
 
NFTs on StarkNet
NFTs on StarkNetNFTs on StarkNet
NFTs on StarkNetTinaBregovi
 
How to build a dApp in StarkNet
How to build a dApp in StarkNetHow to build a dApp in StarkNet
How to build a dApp in StarkNetTinaBregovi
 
Braavos Wallet Workshop.pdf
Braavos Wallet Workshop.pdfBraavos Wallet Workshop.pdf
Braavos Wallet Workshop.pdfTinaBregovi
 
StarkNet Autumn Hackathon Launch Event.pptx
StarkNet Autumn Hackathon Launch Event.pptxStarkNet Autumn Hackathon Launch Event.pptx
StarkNet Autumn Hackathon Launch Event.pptxTinaBregovi
 
Harmony Marketplace SDK.pptx
Harmony Marketplace SDK.pptxHarmony Marketplace SDK.pptx
Harmony Marketplace SDK.pptxTinaBregovi
 
Get Ready for Coinbase Node
Get Ready for Coinbase NodeGet Ready for Coinbase Node
Get Ready for Coinbase NodeTinaBregovi
 
MANIFOLD MEV Bounty Competition
MANIFOLD MEV Bounty CompetitionMANIFOLD MEV Bounty Competition
MANIFOLD MEV Bounty CompetitionTinaBregovi
 
Public SP Meeting
Public SP MeetingPublic SP Meeting
Public SP MeetingTinaBregovi
 
Welcome to the Web 3.0
Welcome to the Web 3.0Welcome to the Web 3.0
Welcome to the Web 3.0TinaBregovi
 

More from TinaBregovi (20)

Building LSD Use Cases on Bifrost
Building LSD Use Cases on BifrostBuilding LSD Use Cases on Bifrost
Building LSD Use Cases on Bifrost
 
Urbit Launch Event
Urbit Launch EventUrbit Launch Event
Urbit Launch Event
 
Layer Hack: Boba Network: Understanding Hybrid Compute
Layer Hack: Boba Network: Understanding Hybrid ComputeLayer Hack: Boba Network: Understanding Hybrid Compute
Layer Hack: Boba Network: Understanding Hybrid Compute
 
Layer Hack: zkSync - Intro to zkEVM
Layer Hack: zkSync - Intro to zkEVMLayer Hack: zkSync - Intro to zkEVM
Layer Hack: zkSync - Intro to zkEVM
 
Rollup-as-a-service and why it matters to the next-gen of dApps
Rollup-as-a-service and why it matters to the next-gen of dAppsRollup-as-a-service and why it matters to the next-gen of dApps
Rollup-as-a-service and why it matters to the next-gen of dApps
 
Layer Hack: AltLayer Workshop
Layer Hack: AltLayer WorkshopLayer Hack: AltLayer Workshop
Layer Hack: AltLayer Workshop
 
Layer Hack Launch Event
Layer Hack Launch EventLayer Hack Launch Event
Layer Hack Launch Event
 
Bridging with StarkNet
Bridging with StarkNetBridging with StarkNet
Bridging with StarkNet
 
How To Build Better NFTs with Briq
How To Build Better NFTs with BriqHow To Build Better NFTs with Briq
How To Build Better NFTs with Briq
 
NFTs on StarkNet
NFTs on StarkNetNFTs on StarkNet
NFTs on StarkNet
 
How to build a dApp in StarkNet
How to build a dApp in StarkNetHow to build a dApp in StarkNet
How to build a dApp in StarkNet
 
Braavos Wallet Workshop.pdf
Braavos Wallet Workshop.pdfBraavos Wallet Workshop.pdf
Braavos Wallet Workshop.pdf
 
StarkNet Autumn Hackathon Launch Event.pptx
StarkNet Autumn Hackathon Launch Event.pptxStarkNet Autumn Hackathon Launch Event.pptx
StarkNet Autumn Hackathon Launch Event.pptx
 
Harmony Marketplace SDK.pptx
Harmony Marketplace SDK.pptxHarmony Marketplace SDK.pptx
Harmony Marketplace SDK.pptx
 
Coinbase Node
Coinbase NodeCoinbase Node
Coinbase Node
 
Get Ready for Coinbase Node
Get Ready for Coinbase NodeGet Ready for Coinbase Node
Get Ready for Coinbase Node
 
MANIFOLD MEV Bounty Competition
MANIFOLD MEV Bounty CompetitionMANIFOLD MEV Bounty Competition
MANIFOLD MEV Bounty Competition
 
Public SP Meeting
Public SP MeetingPublic SP Meeting
Public SP Meeting
 
Ecosystem WG
Ecosystem WGEcosystem WG
Ecosystem WG
 
Welcome to the Web 3.0
Welcome to the Web 3.0Welcome to the Web 3.0
Welcome to the Web 3.0
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Encode x Tezos: Intro to Blockchain

  • 2. Encode x Tezos What’s in store? 8 week online hackathon 10 week accelerator 8 event education series
  • 4. The best place for web3 education Educate Conceptual seminars and technical deep dives! Bootcamps Intensive Solidity workshops with intimate support and job placements! AMAs Q&As with the experts and biggest names in crypto!
  • 5. Hackathons 6-12 week sessions to earn tokens, internships, and cash! Accelerator 10 weeks, turning startups into companies, with funding, classes, and connections! Investment Backing by leading angels and VCs for advice and funding! The best place for web3 building and investment
  • 6. Talent Exclusive technical and non-technical jobs, internships, and work placements! The best place for web3 jobs
  • 7. Everything we do is free, global, and virtual.
  • 8. Not sure where to start? Talk to us.
  • 9. What’s next? tinyurl.com/encodestart ● Exclusive job & internship opportunities ● Free learning and training opportunities ● 1-1 support ● Entry into building community ● Investment
  • 10. What is a Blockchain?
  • 11. VII. Decentralized Ledger VIII. Proof of Work IX. Hash Inclusions X. Cryptocurrency XI. Chain Security I. Cryptographic Hash Fxs II. Ledger III. Digital Signatures IV. Unique Tx IDs V. No Overspending VI. Smart Contracts What is a blockchain?
  • 12. Cryptographic Hash Functions y = 2x x y 0 0 1 2 2 4 3 6 ● (the hardest concept today) ● Functions: Take input(s) and return output. ○ Linear: y = mx + b
  • 13. Cryptographic Hash Functions Input Output Linear Function x y Cryptographic Hash Function Messages, Transactions, Keys 256-bit Hash
  • 14. Cryptographic Hash Functions Input Output (256-bit hash) hello world 730e109bd7a8a32b1cb9d9a09aa2325d 2430587ddbc0c38bad911525 hello world. 619cba8e8e05826e9b8c519c0a5c68f4f b653e8a3d8aa04bb2c8cd4c
  • 15. Properties of a 256-bit Hash ● 2256 possible outputs (115,792,089,237,316,195,423,570,985,008,687,907,853,269,984,66 5,640,564,039,457,584,007,913,129,639,936). ● Looks random, but isn’t actually! Cryptographic Hash Functions
  • 16. Properties of a Cryptographic Hash Function ● Same input always results in the same output! ● Extremely hard to reverse engineer. ● Small change to the input results in large change to the output. Cryptographic Hash Functions
  • 18. Let’s think about donuts. 🍩
  • 19. A owes B $5 🍕 A owes B $7 🍩 B owes A $4 🥨 + A owes B $2 🍫 A owes B $10 🤓 Ledger A ⬅️💸➡️ B 📔
  • 20. Current Stage We have a central ledger (notebook) capable of recording transactions between 2 parties who trust each other, who will settle at end of month. Ledger Problem What if we introduce more parties?
  • 21. A pays C $6 🍕 D pays B $2 🍩 B pays C $3 🥨 + A pays D $2 🍫 (settlement) 🤓 Ledger A ⬅️💸➡️ B ⬆️⬇️ ⬆️⬇️ C ⬅️💸➡️ D 🤓🤓
  • 22. Current Stage We have a central ledger (website) capable of recording transactions between multiple parties who trust each other, who will settle at end of month. Ledger Problem What if we don’t trust each other?
  • 23. A pays C $6 Anupam D pays B $2 Damir B pays C $3 Beaumont + A pays D $2 Anupam (settlement) 🤓 Signatures
  • 24. Current Stage Our central ledger (website) records transactions between multiple parties who trust each other, who will settle at end of month. All transactions must be signed. Signatures Problem What if someone forges the signatures?
  • 25. Digital Signatures New Inputs! ● Every user is assigned a secret key and a public key. ● Secret Key: Only user knows. ● Public Key: Everybody knows.
  • 26. Digital Signatures Input Output Linear Function x y Signature Function Message, Secret Key Signature Hash Verification Function Message, Signature Hash, Public Key True or False
  • 27. Digital Signatures Properties of Digital Signatures ● Signature Function: Users have a cryptographic (secure) way of attesting to transactions. ● Verification Function: Other users can check to see whether signatures are legit.
  • 28. Current Stage Our central trustless ledger (website) records transactions between multiple parties who will settle at end of month. All transactions must be digitally signed. Digital Signatures Problem What if the same signature is applied to an identical transaction?
  • 29. Unique Transaction IDs Old Model A pays $50 to B bd7a8a A pays $50 to B bd7a8a A pays $50 to B bd7a8a A pays $50 to B bd7a8a
  • 30. Unique Transaction IDs New Model (with Transaction IDs) A pays $50 to B (6oexh2) cb9d9a A pays $50 to B (9w7teg) 9aa232 A pays $50 to B (20t84w) 87ddbc A pays $50 to B (825g37) c38bad Remember: Change to input changes the output!
  • 31. Current Stage Our central trustless ledger (website) records transactions between multiple parties who will settle at end of month. All transactions are authenticated via digital signatures. Unique Transaction IDs Problem How do we make sure people actually settle?
  • 32. ● Users must put money in the pot first. ● Users are only allowed to spend as much as they put in. ● Overspent transactions are invalid. No Overspending! 💰 A puts $150 into ledger. ☑️ A pays B $100 ☑️ A pays D $50 ✖️ A pays C $20
  • 33. No Overspending! Properties of No Overspending ● There’s always money to move. ● Never have to cash out - can fully transact within the system! Problem: How do we make this happen without human attention?
  • 34. Smart Contracts ● Don’t overthink it. ● Smart Contract: Takes cause, and executes effect. If (A pays B $50), then move $50 from A’s account to B’s.
  • 35. Smart Contracts Properties of Smart Contracts ● Fully in code. ● Operate automatically! ● Tezos allows you to use Michelson, SmartPy, LIGO or Morley
  • 36. Current Stage Our central trustless ledger (website) records transactions between multiple parties who will automatically settle at end of month. All transactions are authenticated via digital signatures. No Overspending and Smart Contracts Problem Who controls and maintains the ledger?
  • 37. Decentralized Ledger ● Everyone has their own copy of the ledger. ● Transactions are broadcast for everyone to record. A 🔊 “A paid B $50”! A 📒 B 🥨🥨 C 📔 D 📓
  • 38. Current Stage Our decentralized ledgers records transactions between multiple parties who will automatically settle at end of month. All transactions are authenticated via digital signatures. No Overspending and Smart Contracts Problem How do we know which ledger to trust? https://tzstats.com/
  • 39. Proof of Work ● Nonce: Special number that satisfies the challenge. ● Challenge: Find a nonce input that returns a hash that starts with a certain amount of zeros.
  • 40. Proof of Work PoW Example Challenge: Find nonce so SHA256 (Message, Nonce) returns a hash that starts with 30 zeros. ● Users on the network (“nodes”) guess and “check through” 2^256 possibilities.
  • 41. Proof of Work Proof of Work: Users compete to find a nonce that meets the network’s requirement. The set of transactions (ledger) with the most computational work (nonces found) is trusted. Properties of PoW ● Difficult to achieve: have to guess through lots of combos. ● Easy to verify! Just plug the nonce in and check.
  • 42. ● Side Note: We’ll start collecting transactions into blocks. ● Blocks are completed with their proof of work. Proof of Work Transaction 1 Transaction 2 Transaction 3 Proof of Work ✅ Transaction 1 Transaction 2 Transaction 3 ❌
  • 43. Our Consensus Mechanism: ● The chain (ledger) with the most proof of work is trusted. ● This doesn’t require any intermediaries (third parties). The code can do everything. Proof of Work
  • 44. Example A’s ledger has 4 sets of PoW. B’s ledger has 2 sets of PoW. Whose ledger do we trust? Proof of Work
  • 45. Current Stage Our decentralized ledger records transactions between multiple parties who will automatically settle at end of month. All transactions are authenticated via digital signatures. We have decentralized consensus as to the correct record. Proof of Work Problem How do we stop the reordering of blocks?
  • 46. Block 2 must contain Block 1’s hash. ➡️ ➡️ ● Block order is maintained! ● A change to a hash changes the entire proof of work. transaction 1 transaction 2 transaction 3 Proof of Work Previous Hash transaction 1 transaction 2 transaction 3 Proof of Work Previous Hash transaction 1 transaction 2 transaction 3 Proof of Work
  • 47. Current Stage Our decentralized ledger records transactions between multiple parties who will automatically settle at end of month. All transactions are authenticated via digital signatures. We have decentralized consensus as to the correct record (and its order). Block 2 must contain Block 1’s hash. Problem How do we incentivize people to do Proof of Work?
  • 48. Meaning Proof-of-stake means that participants in the consensus algorithm are chosen in function of their stake (the amount of tokens a participant has). “Baking” 👩🥨🍳 🥨 Tezos uses Proof of Stake
  • 49. Consensus in PoS Proof-of-stake means that participants in the consensus algorithm are chosen in function of their stake (the amount of tokens a participant has). What is Proof of Stake
  • 50. Delegates If one does not have enough stake to participate on its own or does not want to set up the needed infrastructure, (s)he can use delegation. Therefore, in Tezos, it is the delegates that may participate in consensus. Tezos uses Proof of Stake
  • 51. In a PoS system, a participant's vote in a system is linked directly to the number of coins they have, so that a person who only has 100 coins cannot pretend to be 1000 different people with 100 coins each. It could pretend to be 100 different people with 1 coin each, but since the voting power of a participant is proportional to the number of coins they own, this spoof does not help. Why is Proof of Stake better
  • 52. In a Proof-of-Work system, block producers (aka miners or validators) compete for this right by expending computing power to solve random cryptographic puzzles. In this paradigm, the more computing power a miner has, the more likely they are to create the next block. By contrast, PoS systems revolve around the idea that the more coins a block producer has, the more likely they are to create the next block. PoS as more energy efficient
  • 53. ● Baker: Listens for transactions, creates blocks, and broadcasts those blocks. ● Those who achieve a PoS by ‘baking’ will be rewarded with TEZ. ● Ledger users listen for blocks, not transactions Cryptocurrency e.g. TEZ
  • 54. Current Stage Our decentralized ledger records transactions between multiple parties who will automatically settle at end of month. All transactions are authenticated via digital signatures. We have decentralized consensus as to the correct record (and its order). Continuous maintenance of the network is incentivized by rewarding miners with crypto. Cryptocurrency! Problem How secure is this really?
  • 55. How do we break this? Review of Security ● Cryptographic functions ensure that transactions and their order are authenticated (signature function, hash inclusions). ● Their authenticity can be checked by anyone at any time (using verification functions, plugging in the nonce). ● Only the chain with the most blocks is trusted. As the network grows, cheating gets more and more difficult.
  • 56. How do we break this? Example A hates B. A broadcasts “A pays $40 to B” to B, but not to anybody else. A wants B to have his own (fraudulent chain), but doesn’t actually want to pay B. What would he have to do?
  • 57. How do we break this? Recall: Only the chain with the most blocks is trusted. A would have to do his own proof of stake on the fraudulent chain in order for B to believe it was the right one. ● This is possible, if A has 51% of the computational power on the network. ● As the network grows, this becomes way more difficult. ● As soon as A’s fraudulent chain is outpaced, he’s blocked!
  • 58. How do we break this? Example II C doesn’t like the set of transactions. She wants to go back a couple blocks, and remove records of people paying her. What would she have to do?
  • 59. How do we break this? Recall: Every block has the previous block’s hash. Block 6 has Block 5’s hash, etc. ● To change Block 6, C will have to redo the baking for Blocks 1- 5, and outpace the real chain as she does. ● Possible, but extremely difficult. ● She also does not have people’s secret keys, so can’t create new transactions that pertain to them.
  • 60. Current Stage Our decentralized ledger records transactions between multiple parties who will automatically settle at end of month. All transactions are authenticated via digital signatures. We have decentralized consensus as to the correct record (and its order). Continuous maintenance of the network is incentivized by rewarding miners with crypto. Our system is extremely secure and becomes more secure as more users join. How do we break this?
  • 61. A trustless ledger of transactions that is: ● Immutable: Can’t be changed. ● Decentralized: Failure-tolerant, user-controlled, transparent. ● Secure: Via cryptography, hashing, etc. ● Distributed: Quicker without intermediaries. ● Consensus: No need for trust. What is a blockchain?
  • 62. ● Self-Amendment: Self-amendment allows Tezos to upgrade itself without having to split (“fork”) the network into two different blockchains. ● On-chain Governance: In Tezos, all stakeholders can participate in governing the protocol. The election cycle provides a formal and systematic procedure for stakeholders to reach agreement on proposed protocol amendments. ● Proof of stake + delegation ● Smart Contracts + Formal Verification: Tezos offers a platform to create smart contracts and facilitates formal verification, a technique used to improve security by mathematically proving properties about programs such as smart contracts. What is unique about Tezos
  • 64. Web3 is a totally new way to engage with the internet with financial primitives, identity and individual autonomy built in.
  • 65. Current: Our financial system relies on opaque systems of intermediaries (banks, brokers, etc) that drive costs and are potentially untrustworthy. Possibility: Decentralized Finance Possibility: What if we had a trustless mechanism by which transactions can be permanently and transparently recorded, without the need for costly intermediaries?
  • 66. Current: ownership is either indirect (someone else looks after it or verifies our ownership) or it is difficult to prove we own something Possibility: Non-Fungible Tokens Possibility: what if we had digital ownership of assets with a compelling link between the asset and the owner
  • 67. Current: The governance (decision-making) of powerful institutions is concentrated between a few actors, shielded from stakeholders, and compromised by the personal interests of those few actors. Possibility: Decentralized Autonomous Orgs Possibility: What if we had a transparent and decentralized way by which decisions can be made, and governance tokens incentivize participation by stakeholders?
  • 68. What’s next? tinyurl.com/encodestart ● Exclusive job / internship opportunities ● Free learning and training opportunities ● 1-1 support ● Entry into building community ● Investment