SlideShare a Scribd company logo
1 of 56
Scaling Bitcoin to a Billion Users
22 July 2017
Peter Rizun
• Current users spread the bitcoin
virus to new users
• Rate of infection is proportional
to how many users there are
Bitcoin grows exponentially like a virus
𝑑𝑁
𝑑𝑡
∝ 𝑁 --> 𝑁 = 𝑁0 𝑒 𝑡/𝜏
Recipe for exponential growth
Satoshi put a lid on growth
1 MB 1 MB 1 MB 1 MB 1 MB
Satoshi put a lid on growth
1 MB 1 MB 1 MB 1 MB 1 MB
Satoshi put a lid on growth
1 MB 1 MB 1 MB 1 MB 1 MB
Satoshi put a lid on growth
1 MB 1 MB 1 MB 1 MB 1 MB
Satoshi put a lid on growth
1 MB 1 MB 1 MB 1 MB 1 MB
The lid affects Bitcoin’s properties
1 MB 1 MB 1 MB 1 MB 1 MB
$3!!
It is time to remove the lid
1 MB 1 MB 1 MB 1 MB 1 MB
1 billion users making 2 transactions
per day requires 8 GB blocks
Some are hesitant to remove the 1MB limit
• Worried that with continued exponential growth that Bitcoin will
not retain its properties as peer-to-peer electronic cash
• Worry is mostly due to not appreciating the cleverness of
Bitcoin’s intended scaling mechanism: simplified payment
verification (SPV)
How does SPV work?
To appreciate how SPV facilitates massive scaling, we
need to understand three important aspects of Bitcoin’s
design.
1. How do miners build the proof-of-work chain?
2. How does a bitcoin owner transfer his coin?
3. What is the relationship between coin transfers
(transactions) and the proof-of-work chain built by the
miners?
How do miners build the proof-of-work
chain?
How do miners build the proof-of-work
chain?
80 bytes
How do miners build the proof-of-work
chain?
80 bytes
How do miners build the proof-of-work
chain?
How do miners build the proof-of-work
chain?
How do miners build the proof-of-work
chain?
How do miners build the proof-of-work
chain?
Transactions
No double spends
How do miners build the proof-of-work
chain?
How do miners build the proof-of-work
chain?
How do miners build the proof-of-work
chain?
How do miners build the proof-of-work
chain?
How do miners build the proof-of-work
chain?
How do miners build the proof-of-work
chain?
Are there scaling concerns with respect
to following the proof-of-work chain?
• The transactions sit outside the proof-of-work chain
• No need to download all the world’s transaction to follow along
• The proof-of-work chain grows by 80 bytes per block (~10 min)
• Memory: 80 bytes x 144 blocks per day x 365 days per year ~= 4 MB
per year
• Bandwidth: 80 bytes x 8 bits / byte / 600 seconds = 1 bit / second
• The SMS (text) message size limit is 128 bytes
• Your (dumb) phone could follow the longest proof-of-work chain
receiving only a single text message every 10 minutes.
• 4 billion people use SMS today
NO!
How does a bitcoin owner transfer her coin?
How does a bitcoin owner transfer her coin?
How does a bitcoin owner transfer her coin?
How does a bitcoin owner transfer her coin?
How does a bitcoin owner transfer her coin?
How does a bitcoin owner transfer her coin?
How does a bitcoin owner transfer her coin?
How does a bitcoin owner transfer her coin?
Are there scaling concerns with respect
to making transactions?
• Average transaction size is 500 bytes
• Receiving a transactions is like receiving 4 SMS messages
• All 4 billion SMS users could easily send or receive a few transactions
per day with existing technology
NO!
What is the relationship between coin
transfers (transactions) and the proof-of-work
chain built by the miners?
• If Alice can give her signed
transaction to Bob, and Bob can
pass it on to Carol, why do we
need miners?
• To prevent them from spending
the same coin twice!
• The transactions are organized
in a block in a brilliant way
• The miner can provide proof to
Bob that his transaction was
included in a compact way!Transactions
No double spends
What is the relationship between coin
transfers (transactions) and the proof-of-work
chain built by the miners?
• If Alice can give her signed
transaction to Bob, and Bob can
pass it on to Carol, why do we
need miners?
• To prevent them from spending
the same coin twice!
• The transactions are organized
in a block in a brilliant way
• The miner can provide proof to
Bob that his transaction was
included in a compact way!Transactions
No double spends
What is the relationship between coin
transfers (transactions) and the proof-of-work
chain built by the miners?
• If Alice can give her signed
transaction to Bob, and Bob can
pass it on to Carol, why do we
need miners?
• To prevent them from spending
the same coin twice!
• The transactions are organized
in a block in a brilliant way
• The miner can provide proof to
Bob that his transaction was
included in a compact way!
What is the relationship between coin
transfers (transactions) and the proof-of-work
chain built by the miners?
• If Alice can give her signed
transaction to Bob, and Bob can
pass it on to Carol, why do we
need miners?
• To prevent them from spending
the same coin twice!
• The transactions are organized
in a block in a brilliant way
• The miner can provide proof to
Bob that his transaction was
included in a compact way!
What is the relationship between coin
transfers (transactions) and the proof-of-work
chain built by the miners?
• If Alice can give her signed
transaction to Bob, and Bob can
pass it on to Carol, why do we
need miners?
• To prevent them from spending
the same coin twice!
• The transactions are organized
in a block in a brilliant way
• The miner can provide proof to
Bob that his transaction was
included in a compact way!
What is the relationship between coin
transfers (transactions) and the proof-of-work
chain built by the miners?
• If Alice can give her signed
transaction to Bob, and Bob can
pass it on to Carol, why do we
need miners?
• To prevent them from spending
the same coin twice!
• The transactions are organized
in a block in a brilliant way
• The miner can provide proof to
Bob that his transaction was
included in a compact way!
What is the relationship between coin
transfers (transactions) and the proof-of-work
chain built by the miners?
• If Alice can give her signed
transaction to Bob, and Bob can
pass it on to Carol, why do we
need miners?
• To prevent them from spending
the same coin twice!
• The transactions are organized
in a block in a brilliant way
• The miner can provide proof to
Bob that his transaction was
included in a compact way!
What is the relationship between coin
transfers (transactions) and the proof-of-work
chain built by the miners?
• If Alice can give her signed
transaction to Bob, and Bob can
pass it on to Carol, why do we
need miners?
• To prevent them from spending
the same coin twice!
• The transactions are organized
in a block in a brilliant way
• The miner can provide proof to
Bob that his transaction was
included in a compact way!
What is the relationship between coin
transfers (transactions) and the proof-of-work
chain built by the miners?
• If Alice can give her signed
transaction to Bob, and Bob can
pass it on to Carol, why do we
need miners?
• To prevent them from spending
the same coin twice!
• The transactions are organized
in a block in a brilliant way
• The miner can provide proof to
Bob that his transaction was
included in a compact way!
What is the relationship between coin
transfers (transactions) and the proof-of-work
chain built by the miners?
• If Alice can give her signed
transaction to Bob, and Bob can
pass it on to Carol, why do we
need miners?
• To prevent them from spending
the same coin twice!
• The transactions are organized
in a block in a brilliant way
• The miner can provide proof to
Bob that his transaction was
included in a compact way!
What is the relationship between coin
transfers (transactions) and the proof-of-work
chain built by the miners?
• If Alice can give her signed
transaction to Bob, and Bob can
pass it on to Carol, why do we
need miners?
• To prevent them from spending
the same coin twice!
• The transactions are organized
in a block in a brilliant way
• The miner can provide proof to
Bob that his transaction was
included in a compact way!
Are there scaling concerns with respect
to proving inclusion in a block?
Transactions per
block
Hashes required to construct
path to root hash
Number of bytes
4 2 64
Are there scaling concerns with respect
to proving inclusion in a block?
Transactions per
block
Hashes required to construct
path to root hash
Number of bytes
4 2 64
8 3 96
Are there scaling concerns with respect
to proving inclusion in a block?
Transactions per
block
Hashes required to construct
path to root hash
Number of bytes
4 2 64
8 3 96
16 4 128
32 5 160
… … …
Are there scaling concerns with respect
to proving inclusion in a block?
Transactions per
block
Hashes required to construct
path to root hash
Number of bytes
4 2 64
8 3 96
16 4 128
32 5 160
… … …
1,000 10 320
Are there scaling concerns with respect
to proving inclusion in a block?
Transactions per
block
Hashes required to construct
path to root hash
Number of bytes
4 2 64
8 3 96
16 4 128
32 5 160
… … …
1,000 10 320
1,000,000 20 640
Are there scaling concerns with respect
to proving inclusion in a block?
Transactions per
block
Hashes required to construct
path to root hash
Number of bytes
4 2 64
8 3 96
16 4 128
32 5 160
… … …
1,000 10 320
1,000,000 20 640
1,000,000,000 30 960
Are there scaling concerns with respect
to proving inclusion in a block? NO!
Transactions per
block
Hashes required to construct
path to root hash
Number of bytes
4 2 64
8 3 96
16 4 128
32 5 160
… … …
1,000 10 320
1,000,000 20 640
1,000,000,000 30 960
Scaling with SPV
• Is it easy to track the proof-of-work
chain?
• Is it easy to send and receive
transactions?
• Is it easy to prove that a transaction
was confirmed in a block?
✓
✓
✓
Invalid-block versus Re-org attacks
If Alice is in cahoots with a large portion of the network hash power, she may
be able to defraud Bob.
Features Invalid-block attack Re-org attack
Leaves no proof of fraud? ✘ ✓
Miner keeps coinbase reward? ✘ ✓
Works on both SPV and full nodes? ✘ ✓
A wallet only needs to be as strong as Bitcoin’s weakest link. SPV achieves that.
Thank you!
Peter Rizun
peter.rizun@gmail.com
Scaling Bitcoin to a Billion Users

More Related Content

Similar to Scaling Bitcoin to a Billion Users

Amber & SnapChat - Presentation
Amber & SnapChat - PresentationAmber & SnapChat - Presentation
Amber & SnapChat - PresentationAleksandar Svetski
 
Pettycoin: Losing Tiny Amounts of Bitcoin At Scale!
Pettycoin: Losing Tiny Amounts of Bitcoin At Scale!Pettycoin: Losing Tiny Amounts of Bitcoin At Scale!
Pettycoin: Losing Tiny Amounts of Bitcoin At Scale!RustyQRussell
 
An Introduction to Blockchain
An Introduction to BlockchainAn Introduction to Blockchain
An Introduction to BlockchainArun Sharma
 
Bitcoin, Blockchain, and current trends in China
Bitcoin, Blockchain, and current trends in ChinaBitcoin, Blockchain, and current trends in China
Bitcoin, Blockchain, and current trends in ChinaBenjamin Chodroff
 
Blockchain for Business Yale School of Management Dr John Maheswaran
Blockchain for Business Yale School of Management Dr John MaheswaranBlockchain for Business Yale School of Management Dr John Maheswaran
Blockchain for Business Yale School of Management Dr John MaheswaranJohn M.
 
Bitcoin history - Blockchaine e Dintorini Meetup Bari
Bitcoin history - Blockchaine e Dintorini Meetup BariBitcoin history - Blockchaine e Dintorini Meetup Bari
Bitcoin history - Blockchaine e Dintorini Meetup BariGiancarlo Valente
 
What is Blockchain and why should we care?
What is Blockchain and why should we care?What is Blockchain and why should we care?
What is Blockchain and why should we care?Paul Johnston
 
Stanford CS 007-10: Personal Finance for Engineers / Additional Topics
Stanford CS 007-10: Personal Finance for Engineers / Additional TopicsStanford CS 007-10: Personal Finance for Engineers / Additional Topics
Stanford CS 007-10: Personal Finance for Engineers / Additional TopicsAdam Nash
 
Cryptocurrency for Dummies
Cryptocurrency for DummiesCryptocurrency for Dummies
Cryptocurrency for DummiesMiguel Duarte
 
Basics of Bitcoin & Mining
Basics of Bitcoin & MiningBasics of Bitcoin & Mining
Basics of Bitcoin & MiningAkhilesh Arora
 
Bitcoin - YXE Barcamp 2012
Bitcoin - YXE Barcamp 2012Bitcoin - YXE Barcamp 2012
Bitcoin - YXE Barcamp 2012Colin Bendell
 
ORDINALS – MEETUP #9 – 2023-02-09
ORDINALS – MEETUP #9 – 2023-02-09ORDINALS – MEETUP #9 – 2023-02-09
ORDINALS – MEETUP #9 – 2023-02-09RoundRockBitcoiners
 
Bitcoin and the Rise of the Block Chains
Bitcoin and the Rise of the Block ChainsBitcoin and the Rise of the Block Chains
Bitcoin and the Rise of the Block ChainsDallas Kennedy
 
Flaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip HopFlaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip HopAndrew Morris
 
Introducing the Hedera Consensus service
Introducing the Hedera Consensus serviceIntroducing the Hedera Consensus service
Introducing the Hedera Consensus serviceHedera Hashgraph
 
Open local data: challenges and opportunities
Open local data: challenges and opportunitiesOpen local data: challenges and opportunities
Open local data: challenges and opportunitiesChris Taggart
 
Introduction to Blockchains
Introduction to BlockchainsIntroduction to Blockchains
Introduction to BlockchainsRamesh Nair
 
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes Zweng
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes ZwengBlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes Zweng
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes ZwengBlockchainHub Graz
 

Similar to Scaling Bitcoin to a Billion Users (20)

Amber & SnapChat - Presentation
Amber & SnapChat - PresentationAmber & SnapChat - Presentation
Amber & SnapChat - Presentation
 
Pettycoin: Losing Tiny Amounts of Bitcoin At Scale!
Pettycoin: Losing Tiny Amounts of Bitcoin At Scale!Pettycoin: Losing Tiny Amounts of Bitcoin At Scale!
Pettycoin: Losing Tiny Amounts of Bitcoin At Scale!
 
An Introduction to Blockchain
An Introduction to BlockchainAn Introduction to Blockchain
An Introduction to Blockchain
 
Bitcoin, Blockchain, and current trends in China
Bitcoin, Blockchain, and current trends in ChinaBitcoin, Blockchain, and current trends in China
Bitcoin, Blockchain, and current trends in China
 
Blockchain for Business Yale School of Management Dr John Maheswaran
Blockchain for Business Yale School of Management Dr John MaheswaranBlockchain for Business Yale School of Management Dr John Maheswaran
Blockchain for Business Yale School of Management Dr John Maheswaran
 
Bitcoin history - Blockchaine e Dintorini Meetup Bari
Bitcoin history - Blockchaine e Dintorini Meetup BariBitcoin history - Blockchaine e Dintorini Meetup Bari
Bitcoin history - Blockchaine e Dintorini Meetup Bari
 
What is Blockchain and why should we care?
What is Blockchain and why should we care?What is Blockchain and why should we care?
What is Blockchain and why should we care?
 
Stanford CS 007-10: Personal Finance for Engineers / Additional Topics
Stanford CS 007-10: Personal Finance for Engineers / Additional TopicsStanford CS 007-10: Personal Finance for Engineers / Additional Topics
Stanford CS 007-10: Personal Finance for Engineers / Additional Topics
 
Cryptocurrency for Dummies
Cryptocurrency for DummiesCryptocurrency for Dummies
Cryptocurrency for Dummies
 
CryptoCurrency for Dummies
CryptoCurrency for Dummies CryptoCurrency for Dummies
CryptoCurrency for Dummies
 
Basics of Bitcoin & Mining
Basics of Bitcoin & MiningBasics of Bitcoin & Mining
Basics of Bitcoin & Mining
 
Bitcoin 00
Bitcoin 00Bitcoin 00
Bitcoin 00
 
Bitcoin - YXE Barcamp 2012
Bitcoin - YXE Barcamp 2012Bitcoin - YXE Barcamp 2012
Bitcoin - YXE Barcamp 2012
 
ORDINALS – MEETUP #9 – 2023-02-09
ORDINALS – MEETUP #9 – 2023-02-09ORDINALS – MEETUP #9 – 2023-02-09
ORDINALS – MEETUP #9 – 2023-02-09
 
Bitcoin and the Rise of the Block Chains
Bitcoin and the Rise of the Block ChainsBitcoin and the Rise of the Block Chains
Bitcoin and the Rise of the Block Chains
 
Flaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip HopFlaying the Blockchain Ledger for Fun, Profit, and Hip Hop
Flaying the Blockchain Ledger for Fun, Profit, and Hip Hop
 
Introducing the Hedera Consensus service
Introducing the Hedera Consensus serviceIntroducing the Hedera Consensus service
Introducing the Hedera Consensus service
 
Open local data: challenges and opportunities
Open local data: challenges and opportunitiesOpen local data: challenges and opportunities
Open local data: challenges and opportunities
 
Introduction to Blockchains
Introduction to BlockchainsIntroduction to Blockchains
Introduction to Blockchains
 
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes Zweng
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes ZwengBlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes Zweng
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes Zweng
 

Recently uploaded

Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 

Recently uploaded (20)

Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 

Scaling Bitcoin to a Billion Users

  • 1. Scaling Bitcoin to a Billion Users 22 July 2017 Peter Rizun
  • 2. • Current users spread the bitcoin virus to new users • Rate of infection is proportional to how many users there are Bitcoin grows exponentially like a virus 𝑑𝑁 𝑑𝑡 ∝ 𝑁 --> 𝑁 = 𝑁0 𝑒 𝑡/𝜏 Recipe for exponential growth
  • 3. Satoshi put a lid on growth 1 MB 1 MB 1 MB 1 MB 1 MB
  • 4. Satoshi put a lid on growth 1 MB 1 MB 1 MB 1 MB 1 MB
  • 5. Satoshi put a lid on growth 1 MB 1 MB 1 MB 1 MB 1 MB
  • 6. Satoshi put a lid on growth 1 MB 1 MB 1 MB 1 MB 1 MB
  • 7. Satoshi put a lid on growth 1 MB 1 MB 1 MB 1 MB 1 MB
  • 8. The lid affects Bitcoin’s properties 1 MB 1 MB 1 MB 1 MB 1 MB $3!!
  • 9. It is time to remove the lid 1 MB 1 MB 1 MB 1 MB 1 MB 1 billion users making 2 transactions per day requires 8 GB blocks
  • 10. Some are hesitant to remove the 1MB limit • Worried that with continued exponential growth that Bitcoin will not retain its properties as peer-to-peer electronic cash • Worry is mostly due to not appreciating the cleverness of Bitcoin’s intended scaling mechanism: simplified payment verification (SPV)
  • 11. How does SPV work? To appreciate how SPV facilitates massive scaling, we need to understand three important aspects of Bitcoin’s design. 1. How do miners build the proof-of-work chain? 2. How does a bitcoin owner transfer his coin? 3. What is the relationship between coin transfers (transactions) and the proof-of-work chain built by the miners?
  • 12. How do miners build the proof-of-work chain?
  • 13. How do miners build the proof-of-work chain? 80 bytes
  • 14. How do miners build the proof-of-work chain? 80 bytes
  • 15. How do miners build the proof-of-work chain?
  • 16. How do miners build the proof-of-work chain?
  • 17. How do miners build the proof-of-work chain?
  • 18. How do miners build the proof-of-work chain? Transactions No double spends
  • 19. How do miners build the proof-of-work chain?
  • 20. How do miners build the proof-of-work chain?
  • 21. How do miners build the proof-of-work chain?
  • 22. How do miners build the proof-of-work chain?
  • 23. How do miners build the proof-of-work chain?
  • 24. How do miners build the proof-of-work chain?
  • 25. Are there scaling concerns with respect to following the proof-of-work chain? • The transactions sit outside the proof-of-work chain • No need to download all the world’s transaction to follow along • The proof-of-work chain grows by 80 bytes per block (~10 min) • Memory: 80 bytes x 144 blocks per day x 365 days per year ~= 4 MB per year • Bandwidth: 80 bytes x 8 bits / byte / 600 seconds = 1 bit / second • The SMS (text) message size limit is 128 bytes • Your (dumb) phone could follow the longest proof-of-work chain receiving only a single text message every 10 minutes. • 4 billion people use SMS today NO!
  • 26. How does a bitcoin owner transfer her coin?
  • 27. How does a bitcoin owner transfer her coin?
  • 28. How does a bitcoin owner transfer her coin?
  • 29. How does a bitcoin owner transfer her coin?
  • 30. How does a bitcoin owner transfer her coin?
  • 31. How does a bitcoin owner transfer her coin?
  • 32. How does a bitcoin owner transfer her coin?
  • 33. How does a bitcoin owner transfer her coin?
  • 34. Are there scaling concerns with respect to making transactions? • Average transaction size is 500 bytes • Receiving a transactions is like receiving 4 SMS messages • All 4 billion SMS users could easily send or receive a few transactions per day with existing technology NO!
  • 35. What is the relationship between coin transfers (transactions) and the proof-of-work chain built by the miners? • If Alice can give her signed transaction to Bob, and Bob can pass it on to Carol, why do we need miners? • To prevent them from spending the same coin twice! • The transactions are organized in a block in a brilliant way • The miner can provide proof to Bob that his transaction was included in a compact way!Transactions No double spends
  • 36. What is the relationship between coin transfers (transactions) and the proof-of-work chain built by the miners? • If Alice can give her signed transaction to Bob, and Bob can pass it on to Carol, why do we need miners? • To prevent them from spending the same coin twice! • The transactions are organized in a block in a brilliant way • The miner can provide proof to Bob that his transaction was included in a compact way!Transactions No double spends
  • 37. What is the relationship between coin transfers (transactions) and the proof-of-work chain built by the miners? • If Alice can give her signed transaction to Bob, and Bob can pass it on to Carol, why do we need miners? • To prevent them from spending the same coin twice! • The transactions are organized in a block in a brilliant way • The miner can provide proof to Bob that his transaction was included in a compact way!
  • 38. What is the relationship between coin transfers (transactions) and the proof-of-work chain built by the miners? • If Alice can give her signed transaction to Bob, and Bob can pass it on to Carol, why do we need miners? • To prevent them from spending the same coin twice! • The transactions are organized in a block in a brilliant way • The miner can provide proof to Bob that his transaction was included in a compact way!
  • 39. What is the relationship between coin transfers (transactions) and the proof-of-work chain built by the miners? • If Alice can give her signed transaction to Bob, and Bob can pass it on to Carol, why do we need miners? • To prevent them from spending the same coin twice! • The transactions are organized in a block in a brilliant way • The miner can provide proof to Bob that his transaction was included in a compact way!
  • 40. What is the relationship between coin transfers (transactions) and the proof-of-work chain built by the miners? • If Alice can give her signed transaction to Bob, and Bob can pass it on to Carol, why do we need miners? • To prevent them from spending the same coin twice! • The transactions are organized in a block in a brilliant way • The miner can provide proof to Bob that his transaction was included in a compact way!
  • 41. What is the relationship between coin transfers (transactions) and the proof-of-work chain built by the miners? • If Alice can give her signed transaction to Bob, and Bob can pass it on to Carol, why do we need miners? • To prevent them from spending the same coin twice! • The transactions are organized in a block in a brilliant way • The miner can provide proof to Bob that his transaction was included in a compact way!
  • 42. What is the relationship between coin transfers (transactions) and the proof-of-work chain built by the miners? • If Alice can give her signed transaction to Bob, and Bob can pass it on to Carol, why do we need miners? • To prevent them from spending the same coin twice! • The transactions are organized in a block in a brilliant way • The miner can provide proof to Bob that his transaction was included in a compact way!
  • 43. What is the relationship between coin transfers (transactions) and the proof-of-work chain built by the miners? • If Alice can give her signed transaction to Bob, and Bob can pass it on to Carol, why do we need miners? • To prevent them from spending the same coin twice! • The transactions are organized in a block in a brilliant way • The miner can provide proof to Bob that his transaction was included in a compact way!
  • 44. What is the relationship between coin transfers (transactions) and the proof-of-work chain built by the miners? • If Alice can give her signed transaction to Bob, and Bob can pass it on to Carol, why do we need miners? • To prevent them from spending the same coin twice! • The transactions are organized in a block in a brilliant way • The miner can provide proof to Bob that his transaction was included in a compact way!
  • 45. What is the relationship between coin transfers (transactions) and the proof-of-work chain built by the miners? • If Alice can give her signed transaction to Bob, and Bob can pass it on to Carol, why do we need miners? • To prevent them from spending the same coin twice! • The transactions are organized in a block in a brilliant way • The miner can provide proof to Bob that his transaction was included in a compact way!
  • 46. Are there scaling concerns with respect to proving inclusion in a block? Transactions per block Hashes required to construct path to root hash Number of bytes 4 2 64
  • 47. Are there scaling concerns with respect to proving inclusion in a block? Transactions per block Hashes required to construct path to root hash Number of bytes 4 2 64 8 3 96
  • 48. Are there scaling concerns with respect to proving inclusion in a block? Transactions per block Hashes required to construct path to root hash Number of bytes 4 2 64 8 3 96 16 4 128 32 5 160 … … …
  • 49. Are there scaling concerns with respect to proving inclusion in a block? Transactions per block Hashes required to construct path to root hash Number of bytes 4 2 64 8 3 96 16 4 128 32 5 160 … … … 1,000 10 320
  • 50. Are there scaling concerns with respect to proving inclusion in a block? Transactions per block Hashes required to construct path to root hash Number of bytes 4 2 64 8 3 96 16 4 128 32 5 160 … … … 1,000 10 320 1,000,000 20 640
  • 51. Are there scaling concerns with respect to proving inclusion in a block? Transactions per block Hashes required to construct path to root hash Number of bytes 4 2 64 8 3 96 16 4 128 32 5 160 … … … 1,000 10 320 1,000,000 20 640 1,000,000,000 30 960
  • 52. Are there scaling concerns with respect to proving inclusion in a block? NO! Transactions per block Hashes required to construct path to root hash Number of bytes 4 2 64 8 3 96 16 4 128 32 5 160 … … … 1,000 10 320 1,000,000 20 640 1,000,000,000 30 960
  • 53. Scaling with SPV • Is it easy to track the proof-of-work chain? • Is it easy to send and receive transactions? • Is it easy to prove that a transaction was confirmed in a block? ✓ ✓ ✓
  • 54. Invalid-block versus Re-org attacks If Alice is in cahoots with a large portion of the network hash power, she may be able to defraud Bob. Features Invalid-block attack Re-org attack Leaves no proof of fraud? ✘ ✓ Miner keeps coinbase reward? ✘ ✓ Works on both SPV and full nodes? ✘ ✓ A wallet only needs to be as strong as Bitcoin’s weakest link. SPV achieves that.

Editor's Notes

  1. Good afternoon everyone. I’ll start my talk with an anecdote: