After four years of quiet growth and development, the Bitcoin cryptocurrency leaped into prominence during 2013. Much of the current discourse around Bitcoin focuses on its viability as currency and its valuation. However, to appreciate its potential as the “Internet of ownership transfer”, a deeper understanding of its technical underpinnings is needed.
In this colloquium, Prof G-J van Rooyen gives a technological primer on the nuts and bolts of the cryptocurrency. The talk will demonstrate how the cunning use of hashes makes it possible to transfer ownership in such a way that cheating (double-spending) is impossible in a correctly functioning network. This is shown to be the most successful solution to the long-standing Byzantine Generals Problem, and a breakthrough in distributed information management.
The talk will also show how the Bitcoin peer-to-peer network forms the first widespread use of triple-entry accounting, and consider the applications of such technology. We will briefly dip into the scripting language built into the protocol: “DUP HASH160 EQUALVERIFY CHECKSIG” turns the Bitcoin protocol into Bitcoin the currency. More advanced scripts can make arbitrarily complex contracts and interactions possible.
The document is an attempt to give insights into digital payments space on the whole. It describes the different payment scenarios or methods and how the underlying technology works. Topics covered - NFC;;contacless payments;Mobile Payments;smart cards chips technology;apple pay;Card operating system
Démystification de la Technologie de la BlockChain. Cette formation permet de :
- Être en mesure de Comprendre les enjeux de la technologie de la BLOCKCHAIN, qui est en train de révolutionner le monde de la finance et de l’industrie.
- Explorer les deux réseaux de BlockChain, les plus utilisés : Bitcoin-BlockChain et Ethereum-BlockChain.
- Maitriser les concepts de base de cette technologie (Base de Données BlockChain, Bitcoin, Ethereum, Ether, Smart Contract, Transaction, Minage, ...).
hii guys this ppt more useful for the Smart ATM System,this ppt is more Advance feature of the Atm machine.
guys please use this ppt for your requirmentes okk guys...
this ppt is created by-Umesh Upadhyay
contacte no.-8743064891
Email id-umeshupadhyay120@gmail.com
The document is an attempt to give insights into digital payments space on the whole. It describes the different payment scenarios or methods and how the underlying technology works. Topics covered - NFC;;contacless payments;Mobile Payments;smart cards chips technology;apple pay;Card operating system
Démystification de la Technologie de la BlockChain. Cette formation permet de :
- Être en mesure de Comprendre les enjeux de la technologie de la BLOCKCHAIN, qui est en train de révolutionner le monde de la finance et de l’industrie.
- Explorer les deux réseaux de BlockChain, les plus utilisés : Bitcoin-BlockChain et Ethereum-BlockChain.
- Maitriser les concepts de base de cette technologie (Base de Données BlockChain, Bitcoin, Ethereum, Ether, Smart Contract, Transaction, Minage, ...).
hii guys this ppt more useful for the Smart ATM System,this ppt is more Advance feature of the Atm machine.
guys please use this ppt for your requirmentes okk guys...
this ppt is created by-Umesh Upadhyay
contacte no.-8743064891
Email id-umeshupadhyay120@gmail.com
Unified Payments Interface (UPI) - easy way to transfer money through banksCA Janardhana Gouda
A system for instant online bank payments. A new initiative for cashless and more digital economy. A perfect system for India in Banking System. Using of Mobile in a perfect way. (awesome feature of Virtual ID for transfer of money online through online.
NFA Non Deterministic Finite Automata by Mudasir khushikMudsaraliKhushik
NFA Non Deterministic Finite Automata.
Basics
tuples of NFA
NFA Examples
Transition Table and man more things which you want to understand like Language, Rules, Alphabets, Descriptive Method, Regular Expression, String, and Finite Automata.
This Presentation was for my talk at Null on Steganography using Python. This only serves as a on screen ppt to the talk. In order to understand this in-detail please follow my page to find the code
There are various ways in which cash withdrawals can be made available at ATMs without the use of cards. This presentation considers the options for cardless withdrawals, and discusses the challenges of using cardless technologies – including mobile devices with NFC functionality. It also looks at other cardless ATM facilities that can be offered to both customers and non-customers.
Gentle introduction to ZCash protocol.
- How it is different from Bitcoin protocol?
- How it ensures extended privacy and anonymity to the transactions?
- How does zero-knowledge (zk-SNARK) works?
- What is in roadmap as on Jan'18.
Unified Payments Interface (UPI) - easy way to transfer money through banksCA Janardhana Gouda
A system for instant online bank payments. A new initiative for cashless and more digital economy. A perfect system for India in Banking System. Using of Mobile in a perfect way. (awesome feature of Virtual ID for transfer of money online through online.
NFA Non Deterministic Finite Automata by Mudasir khushikMudsaraliKhushik
NFA Non Deterministic Finite Automata.
Basics
tuples of NFA
NFA Examples
Transition Table and man more things which you want to understand like Language, Rules, Alphabets, Descriptive Method, Regular Expression, String, and Finite Automata.
This Presentation was for my talk at Null on Steganography using Python. This only serves as a on screen ppt to the talk. In order to understand this in-detail please follow my page to find the code
There are various ways in which cash withdrawals can be made available at ATMs without the use of cards. This presentation considers the options for cardless withdrawals, and discusses the challenges of using cardless technologies – including mobile devices with NFC functionality. It also looks at other cardless ATM facilities that can be offered to both customers and non-customers.
Gentle introduction to ZCash protocol.
- How it is different from Bitcoin protocol?
- How it ensures extended privacy and anonymity to the transactions?
- How does zero-knowledge (zk-SNARK) works?
- What is in roadmap as on Jan'18.
Mobile Bitcoin Wallet Security - Andras MendikBitcoin Barcamp
In Andy's technical talk on Mobile Bitcoin Wallet Security: Security is everyone's responsibility, he gives a great overview on wallet storage and then deep dive on how encryption works as well as the gaps to be aware of.
While Andy works for Sophos, these thoughts are his own.
This was first presented at the Bitcoin Barcamp in Sydney on 15th March 2014. To view the full talk or find more presentations from Australia's first pop-up unConference on cryptocurrency innovation, go to www.bitcoinbarcamp.org
Zero-Downtime Rebalancing and Data Migration of a Mature Multi-Shard PlatformFlorian Weingarten
Given at SREcon Europe 2019 in Dublin, Ireland
https://www.usenix.org/conference/srecon19emea/presentation/li
Application-level sharding is a common pattern for scaling multi-tenant architectures. However, once it has been put into production, you inevitably run into follow-up problems that aren't as widely discussed. In this talk, we will share years worth of experience and connect the dots to outline a full sharding solution that goes beyond the initial implementation and deployment. At the core of our toolkit is the "binlog", an event stream used by the MySQL replication protocol. The tooling we've built on top of this idea is being used in production at Shopify to balance hundreds of MySQL shards for uniform load distribution, isolate heavy tenants from each other, and has in the past been used to safely transfer the entire dataset of our over 800.000 tenants from physical datacenters to a cloud environment. All of this happens online, without downtime, and is practically invisible to the tenants.
Beyond php - it's not (just) about the codeWim Godden
Most PHP developers focus on writing code. But creating Web applications is about much more than just wrting PHP. Take a step outside the PHP cocoon and into the big PHP ecosphere to find out how small code changes can make a world of difference on servers and network. This talk is an eye-opener for developers who spend over 80% of their time coding, debugging and testing.
Beyond php - it's not (just) about the codeWim Godden
Most PHP developers focus on writing code. But creating Web applications is about much more than just wrting PHP. Take a step outside the PHP cocoon and into the big PHP ecosphere to find out how small code changes can make a world of difference on servers and network. This talk is an eye-opener for developers who spend over 80% of their time coding, debugging and testing.
#2 Case study Tachyon & ICOVO App by Yoshikazu Nishimura, ICOVO's CTOICOVO
【Outline】
We will welcome two blockchain engineers to dive deep into the development of wallets.
Yoshikazu Nishimura is a creator of Tachyon wallet that supports Ethereum and all the ERC20 standard tokens.
http://tachyon-wallet.io/en/
Alex Melville is an engineer at BitGo. BitGo is a company based in Palo Alto, CA. They make variety of products such as a wallet, an offline vault and institutional custody.
https://www.bitgo.com/
It's organized by ICOVO AG. https://icovo.co/
Shabakat is a web3 wallet that provides a better user experience compared to existing wallets, and implement new features to make the wallet useful on a day-to-day basis.
ITCamp 2018 - David Wong - A deal with the devil: breaking smart contractsITCamp
The Initial Coin Offering (ICO) boom has been powered by smart contracts, making them a hotter and more lucrative target than ever before. One might expect that being well-funded by security-sensitive investors would be enough to save this technology from the security sins of its forebears. Unfortunately, smart contract security is poorly understood, even by some of the field’s most prolific and successful developers. However, the wider Ethereum community is working to change that. An amalgam of academics, security enthusiasts, and industry professionals have created the first generation of audit and development practices focused on defense of smart contracts, along with a nascent tool suite to augment them.
This talk presents a digestible but robust set of tools and practices used by the authors to find real vulnerabilities in real contracts during the course of their work as security consultants. Audience members who develop smart contracts will leave with a strong understanding of development and test best practices to make sure they are not the next to be “popped”, while those interested in auditing them will learn a battle-tested practicum for finding vulns in the wild.
how to sell pi coins in all Africa Countries.DOT TECH
Yes. You can sell your pi network for other cryptocurrencies like Bitcoin, usdt , Ethereum and other currencies And this is done easily with the help from a pi merchant.
What is a pi merchant ?
Since pi is not launched yet in any exchange. The only way you can sell right now is through merchants.
A verified Pi merchant is someone who buys pi network coins from miners and resell them to investors looking forward to hold massive quantities of pi coins before mainnet launch in 2026.
I will leave the telegram contact of my personal pi merchant to trade with.
@Pi_vendor_247
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Cardnickysharmasucks
The unveiling of the IndusInd Bank Poonawalla Fincorp eLITE RuPay Platinum Credit Card marks a notable milestone in the Indian financial landscape, showcasing a successful partnership between two leading institutions, Poonawalla Fincorp and IndusInd Bank. This co-branded credit card not only offers users a plethora of benefits but also reflects a commitment to innovation and adaptation. With a focus on providing value-driven and customer-centric solutions, this launch represents more than just a new product—it signifies a step towards redefining the banking experience for millions. Promising convenience, rewards, and a touch of luxury in everyday financial transactions, this collaboration aims to cater to the evolving needs of customers and set new standards in the industry.
How to get verified on Coinbase Account?_.docxBuy bitget
t's important to note that buying verified Coinbase accounts is not recommended and may violate Coinbase's terms of service. Instead of searching to "buy verified Coinbase accounts," follow the proper steps to verify your own account to ensure compliance and security.
what is the best method to sell pi coins in 2024DOT TECH
The best way to sell your pi coins safely is trading with an exchange..but since pi is not launched in any exchange, and second option is through a VERIFIED pi merchant.
Who is a pi merchant?
A pi merchant is someone who buys pi coins from miners and pioneers and resell them to Investors looking forward to hold massive amounts before mainnet launch in 2026.
I will leave the telegram contact of my personal pi merchant to trade pi coins with.
@Pi_vendor_247
The European Unemployment Puzzle: implications from population agingGRAPE
We study the link between the evolving age structure of the working population and unemployment. We build a large new Keynesian OLG model with a realistic age structure, labor market frictions, sticky prices, and aggregate shocks. Once calibrated to the European economy, we quantify the extent to which demographic changes over the last three decades have contributed to the decline of the unemployment rate. Our findings yield important implications for the future evolution of unemployment given the anticipated further aging of the working population in Europe. We also quantify the implications for optimal monetary policy: lowering inflation volatility becomes less costly in terms of GDP and unemployment volatility, which hints that optimal monetary policy may be more hawkish in an aging society. Finally, our results also propose a partial reversal of the European-US unemployment puzzle due to the fact that the share of young workers is expected to remain robust in the US.
Currently pi network is not tradable on binance or any other exchange because we are still in the enclosed mainnet.
Right now the only way to sell pi coins is by trading with a verified merchant.
What is a pi merchant?
A pi merchant is someone verified by pi network team and allowed to barter pi coins for goods and services.
Since pi network is not doing any pre-sale The only way exchanges like binance/huobi or crypto whales can get pi is by buying from miners. And a merchant stands in between the exchanges and the miners.
I will leave the telegram contact of my personal pi merchant. I and my friends has traded more than 6000pi coins successfully
Tele-gram
@Pi_vendor_247
how to swap pi coins to foreign currency withdrawable.DOT TECH
As of my last update, Pi is still in the testing phase and is not tradable on any exchanges.
However, Pi Network has announced plans to launch its Testnet and Mainnet in the future, which may include listing Pi on exchanges.
The current method for selling pi coins involves exchanging them with a pi vendor who purchases pi coins for investment reasons.
If you want to sell your pi coins, reach out to a pi vendor and sell them to anyone looking to sell pi coins from any country around the globe.
Below is the contact information for my personal pi vendor.
Telegram: @Pi_vendor_247
What price will pi network be listed on exchangesDOT TECH
The rate at which pi will be listed is practically unknown. But due to speculations surrounding it the predicted rate is tends to be from 30$ — 50$.
So if you are interested in selling your pi network coins at a high rate tho. Or you can't wait till the mainnet launch in 2026. You can easily trade your pi coins with a merchant.
A merchant is someone who buys pi coins from miners and resell them to Investors looking forward to hold massive quantities till mainnet launch.
I will leave the telegram contact of my personal pi vendor to trade with.
@Pi_vendor_247
USDA Loans in California: A Comprehensive Overview.pptxmarketing367770
USDA Loans in California: A Comprehensive Overview
If you're dreaming of owning a home in California's rural or suburban areas, a USDA loan might be the perfect solution. The U.S. Department of Agriculture (USDA) offers these loans to help low-to-moderate-income individuals and families achieve homeownership.
Key Features of USDA Loans:
Zero Down Payment: USDA loans require no down payment, making homeownership more accessible.
Competitive Interest Rates: These loans often come with lower interest rates compared to conventional loans.
Flexible Credit Requirements: USDA loans have more lenient credit score requirements, helping those with less-than-perfect credit.
Guaranteed Loan Program: The USDA guarantees a portion of the loan, reducing risk for lenders and expanding borrowing options.
Eligibility Criteria:
Location: The property must be located in a USDA-designated rural or suburban area. Many areas in California qualify.
Income Limits: Applicants must meet income guidelines, which vary by region and household size.
Primary Residence: The home must be used as the borrower's primary residence.
Application Process:
Find a USDA-Approved Lender: Not all lenders offer USDA loans, so it's essential to choose one approved by the USDA.
Pre-Qualification: Determine your eligibility and the amount you can borrow.
Property Search: Look for properties in eligible rural or suburban areas.
Loan Application: Submit your application, including financial and personal information.
Processing and Approval: The lender and USDA will review your application. If approved, you can proceed to closing.
USDA loans are an excellent option for those looking to buy a home in California's rural and suburban areas. With no down payment and flexible requirements, these loans make homeownership more attainable for many families. Explore your eligibility today and take the first step toward owning your dream home.
how to sell pi coins on Bitmart crypto exchangeDOT TECH
Yes. Pi network coins can be exchanged but not on bitmart exchange. Because pi network is still in the enclosed mainnet. The only way pioneers are able to trade pi coins is by reselling the pi coins to pi verified merchants.
A verified merchant is someone who buys pi network coins and resell it to exchanges looking forward to hold till mainnet launch.
I will leave the telegram contact of my personal pi merchant to trade with.
@Pi_vendor_247
how to sell pi coins at high rate quickly.DOT TECH
Where can I sell my pi coins at a high rate.
Pi is not launched yet on any exchange. But one can easily sell his or her pi coins to investors who want to hold pi till mainnet launch.
This means crypto whales want to hold pi. And you can get a good rate for selling pi to them. I will leave the telegram contact of my personal pi vendor below.
A vendor is someone who buys from a miner and resell it to a holder or crypto whale.
Here is the telegram contact of my vendor:
@Pi_vendor_247
2. “With e-currency based on cryptographic proof,
without the need to trust a third-party middleman,
money can be secure and transactions effortless.”
!
– Satoshi Nakamoto
3. “We can laugh at Bitcoin, but real guys, in real
basements, are losing real fake money right now.”
!
– David Clinch
4. This talk is not about…
•
…is Bitcoin “real” money?
•
…is Bitcoin a good investment?
•
…will Bitcoin replace the dollar/rand/yen?
•
…is Dogecoin/Litecoin better than Bitcoin?
•
…exchange volatility
5. We will talk about…
•
…difficulty of trust-free agreement in a
decentralised P2P network (Byzantine Generals)
•
…triple-entry accounting
•
…how Bitcoin transactions are built and verified
•
…the scripting language built into the protocol
•
…scripted contracts (“Bitcoin 2.0”)
9. Byzantine Generals
•
N generals need to coordinate
an attack
•
Messages are passed amongst
each other
•
Traitorous generals may pass
on false messages
•
Consensus very difficult
•
Lamport: solution for 2/3 trust
(later > 50%)
10. Nakamoto’s Solution
•
Scenario: generals have to agree on time to attack
•
A random general proposes a time and distributes the message
•
Other generals “sign off” (agree) on time adding a hash that’s
computationally difficult to compute (but trivial to verify)
•
A chain of time-plus-hashes builds up and is distributed
•
Over time, the generals become convinced that the majority of
the computational power of the network has reached consensus.
•
If an attacker injects a fake time to spread confusion, the network
selects the chain with the longest sequence of valid hashes
12. Application to ownership
transfer
•
I can sign a “cheque” giving away money I own
•
Everyone can verify the transaction is valid
•
A double-spend of money is always invalid
•
People who “audited” the transaction sign it off by
proof-of-work
13. Single-entry accounting
•
“Write down income and expenses”
•
If you leave out a number, no-one
will know
•
Bookkeeper always has plausible
deniability (it was an honest
mistake!)
•
Limited businesses to family and
crown
15. Bitcoin as triple-entry
•
Alice debits her wallet, and credits Bob’s
(double-entry)
•
Ivan audits transaction
•
Ivan commits it to the public ledger
(third entry)
•
No central authority
•
Non-repudiable transaction
17. E
The basics of Bitcoin:
Private keys Import Format)
Private Key (Wallet
•
Each “account”
= random 256-bit number
•
Private key, must be kept
secret
•
SECRET
Need not be stored digitally
– can be on paper or
memorised
ZLtyuu1z to open an account?
• Want
Guess a number!
QR code representation of the private key!
x3qRcMD5FyogomtVnABuToGCoVVDC9HvPMwDgARWBqzzzNte
5KQx3qRcMD5FyogomtVnABuToGCoVVDC9HvPMwDgARWBqzzzNte
le pairing of a Bitcoin address with its corresponding Bitcoin private
18. The basics of Bitcoin:
Public keys and addresses
Bitcoin Address
•
ECDSA is used to generate a
public key from the PrivKey
•
The PubKey can be used to
verify transactions signed
using the PrivKey
•
64-byte PubKeys are
unwieldy, and are hashed
down to 20-byte addresses
SH
1MZhiFUaJSLpUyrCj8de7
QR code representation of the address!
1MZhiFUaJSLpUyrCj8de7d5UMvZLtyuu1z
19. Crypto-primer: Hashes
•
Hashing: D = H(M)
•
D is usually much shorter than M
•
It is impossible to get back to M just from D
•
SHA256 and RIPEMD-160 used in Bitcoin
20. Crypto-primer: Signatures
•
Hashing: D = H(M)
•
Signing: σ = S(D, Pr)!
•
Verification: ß = V(D, σ, Pu)
•
Only the owner of the private key can sign a message
(transaction)
•
Anyone who knows a user’s public key can verify that
she signed it
•
ECDSA used in Bitcoin
23. A full transaction
Field
Description
Version #
Currently 1
In-counter
Positive integer
Size!
[b]
4
1-9
References to outputs of previous
List of inputs
transactions
Out-counter
Positive integer
1-9
Values of outputs, and scripts dictating
List of outputs
how they may be claimed
Lock time
Time stamp when transaction becomes
final (default 0 = immediately)
4
25. The output script
•
Each output has a script specifying how it may be claimed
•
FORTH-like scripting language
•
Deliberately Turing-incomplete
•
Can specify anything:
•
“anyone can have this”
•
pay to specific address
•
highly complex contracts (e.g. “pay out when I die”)
26. The simplest script
•
Pay-to-PubkeyHash (give money to an address)
•
scriptPubKey: OP_DUP OP_HASH160
<pubKeyHash> OP_EQUALVERIFY OP_CHECKSIG
•
scriptSig: <sig> <pubKey>
•
scriptSig and scriptPubKey are combined, and then
stack processing is done operation-by-operation
27. The simplest script:
Step 1
STACK
•
scriptSig and scriptPubKey
are combined
•
Unprocessed script:
<sig> <pubKey> OP_DUP
OP_HASH160 <pubKeyHash>
OP_EQUALVERIFY
OP_CHECKSIG
(empty)
28. The simplest script:
Step 2
STACK
•
The constants <sig> and
<pubKey> are added to the
stack
•
Unprocessed script:
<sig> <pubKey> OP_DUP
OP_HASH160 <pubKeyHash>
OP_EQUALVERIFY
OP_CHECKSIG
<pubKey>
<sig>
29. The simplest script:
Step 3
STACK
•
The top stack item is
duplicated
•
Unprocessed script:
<sig> <pubKey> OP_DUP
OP_HASH160 <pubKeyHash>
OP_EQUALVERIFY
OP_CHECKSIG
<pubKey>
<pubKey>
<sig>
30. The simplest script:
Step 4
•
The top stack item is hashed!
•
This calculates and address
from the claimant’s public key
•
(we must ensure this is the
same as the TXout’s address)
•
Unprocessed script:
<sig> <pubKey> OP_DUP
OP_HASH160 <pubKeyHash>
OP_EQUALVERIFY
OP_CHECKSIG
STACK
<pubHashA>
<pubKey>
<sig>
31. The simplest script:
Step 5
STACK
•
•
Another constant (the previous
output’s destination address)
is added to the stack
Unprocessed script:
<sig> <pubKey> OP_DUP
OP_HASH160 <pubKeyHash>
OP_EQUALVERIFY
OP_CHECKSIG
<pubKeyHash>
<pubHashA>
<pubKey>
<sig>
32. The simplest script:
Step 6
•
Verify that the claimant’s
public key actually matches
the previous transaction’s
output address!
•
If false, the transaction is
rejected an not distributed
further
•
Unprocessed script:
<sig> <pubKey> OP_DUP
OP_HASH160 <pubKeyHash>
OP_EQUALVERIFY
OP_CHECKSIG
STACK
<pubKey>
<sig>
33. The simplest script:
Step 7
•
Verify that the claimant’s
public key confirms the
transaction’s signature!
•
If false, the transaction is
rejected an not distributed
further
•
Unprocessed script:
<sig> <pubKey> OP_DUP
OP_HASH160 <pubKeyHash>
OP_EQUALVERIFY
OP_CHECKSIG
STACK
(empty)
35. Mining
•
“Auditors” collect transactions into a “block”
(up to 1 Mb)
•
Each transaction in the block is verified for validity
•
The miner then does a proof-of-work calculation to
“sign off” the block and add it to the blockchain
•
Difficult hash calculation takes +/- 10 min
regardless of number of miners in the network
36. Advanced mining
•
A miner who successfully finds a suitable hash for
a block, gets reward (currently 25 XBT = 625 USD)
•
Each transaction has optional transaction fees
(difference between sum of inputs and outputs)
that also go to the miner
•
Hash difficulty: number of “leading zeros” in hash
•
Adjusted dynamically, aims for 1 block in 10 mins
37. More interesting contracts
•
Scripting language can be
used to enforce arbitrary
constraints on how outputs are
spent
•
Entire financial applications
involving transfer of
ownership can be built using
the Bitcoin protocol
38. Dispute mediation
•
Third party (escrow / arbiter) may optionally be
called in to sign off on a transaction if something
goes wrong.
•
Script:
2 <K1> <K2> <K3> 3 OP_CHECKMULTISIGVERIFY!
•
2 out of 3 parties must agree on the outcome of the
transaction in order to spend the output
•
The output may be spent as a payment or a refund
39. Micropayment channels
•
Each Bitcoin transaction carries a transaction cost
(or processing delay), so normal transactions aren’t
ideal for micropayments
•
Client send rapid adjustments in what it is willing
to transfer to the server, directly to the server
•
These transactions aren’t broadcast until the
session ends, when the final payment is made.
40. Oracle conditions
•
E.g. script to pass on an inheritance:
•
•
<hash> OP_DROP2 <son’s pubkey>
<oracle’s pubkey> CHECKMULTISIG
Uses an external, trusted oracle who will only sign
off when predetermined condition is met, e.g.
•
if (has_died(‘G-J van Rooyen’,
id=‘7609257364083’)) return (10.0,
1MZhiFUaJSLpUyrCj8de7d5UMvZLtyuu1z)
41. Colored coins
•
From “wallet point-of-view”, Bitcoins are fungible
•
However, transaction outputs are traceable
•
0.00000001 XBT outputs can be used to trace
ownership of associated digital or physical goods
in the real world
•
Software, movies, stocks, cars, houses can be
traded without intermediaries
42. In Conclusion
•
The Bitcoin protocol is brilliant,
subtle, intricate and (in some
places) horribly complex
•
Proof-of-ownership protocol
with built-in scripting language
•
Currency (“pay-to-address”) is
the “Hallo, world!” of Bitcoin
applications
•
Understand the protocol. Then
go understand traditional
financial systems