SlideShare a Scribd company logo
Cryptocurrency and
Blockchain
Money
 The need for money arose when humans started living in larger
settlements and started exchanging goods with strangers.
 First money had intrinsic value – barley, salt, hide, clothes.
 Then came money without intrinsic value – gold, silver, cowry shells.
 Kings started issuing coins with their mark to guarantee weight and
authenticity of money. Fiat currency.
 Governments started issuing currency without backing of gold.
Bitcoin
 A purely peer-to-peer version of electronic cash would allow online payments to be sent
directly from one party to another without going through a financial institution.
 Digital signatures provide part of the solution, but the main benefits are lost if a trusted third
party is still required to prevent double-spending.
 We propose a solution to the double-spending problem using a peer-to-peer network.
 The network timestamps transactions by hashing them into an ongoing chain of hash-based
proof-of-work, forming a record that cannot be changed without redoing the proof-of-work.
 The longest chain not only serves as proof of the sequence of events witnessed, but proof
that it came from the largest pool of CPU power.
 As long as a majority of CPU power is controlled by nodes that are not cooperating to attack
the network, they'll generate the longest chain and outpace attackers.
 The network itself requires minimal structure. Messages are broadcast on a best effort basis,
and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain
as proof of what happened while they were gone.
Bitcoin
 A purely peer-to-peer version of electronic cash would allow online payments to be sent
directly from one party to another without going through a financial institution.
 Digital signatures provide part of the solution, but the main benefits are lost if a trusted third
party is still required to prevent double-spending.
 We propose a solution to the double-spending problem using a peer-to-peer network.
 The network timestamps transactions by hashing them into an ongoing chain of hash-based
proof-of-work, forming a record that cannot be changed without redoing the proof-of-
work.
 The longest chain not only serves as proof of the sequence of events witnessed, but proof
that it came from the largest pool of CPU power.
 As long as a majority of CPU power is controlled by nodes that are not cooperating to attack
the network, they'll generate the longest chain and outpace attackers.
 The network itself requires minimal structure. Messages are broadcast on a best effort basis,
and nodes can leave and rejoin the network at will, accepting the longest proof-of-work
chain as proof of what happened while they were gone.
The promise of Bitcoin
 Peer-to-peer electronic cash
 No middlemen
 Proof-of-work as solution to double spending
 Longest chain wins
 Attacking the chain requires majority CPU power
Problem of double spending
 When you spend money, the money is gone from you. You can not spend
real life money multiple times.
 Digital money is easily copiable so you can spend same money multiple
times.
 Trusted third parties like banks are required to make sure people don’t
spend the same money multiple times.
 When you pay someone from your bank account, bank reduces your
balance.
Problem of double spending
 Cryptocurrency wants to do away with middlemen like banks, so they use a
Proof-of-work ledger to avoid double spending.
 Transactions are recorded as a series of blocks, each block connected to
the previous block, thus creating a chain of transactions.
 Adding a block to the chain, takes efforts. A node, needs to do lot of
processing in order to get the right of adding next transaction to the chain.
 When a node shows this proof of work done, they get to add the next
block to blockchain.
Magic of proof-of-work
 Single node cannot just add blocks to the chain at will. Even if it does,
other nodes will reject it and follow the longest chain.
 Thus, hacking the blockchain requires that attackers control at least 51% of
the chain’s processing power.
 This makes the blockchain secure.
A blockchain
 Must be public – anyone should be able to join as a node.
 Must be permissionless – anyone should be able to add a block to the
chain as long as they show proof-of-work.
 Must be trustless – nodes do not trust each-other. They trust the longest
chain because it represents most work done.
 Must be decentralized – not controlled by a single entity. That is the
whole point of blockchain. Decentralization.
Decentralization
 Decentralization is the fundamental concept of the whole cryptocurrency
and blockchain movement.
 The goal of cryptocurrency is to remove middlemen who provide trust.
 A decentralized blockchain relies on CPU intensive proof-of-work to
provide trust.
Inefficiency – feature, not a bug
 Proof-of-work means adding new blocks of transactions takes a lot of CPU
processing and electricity.
 Nodes who do this work – miners – are rewarded with new cryptocurrency
as a reward for their work (CPU power and electricity).
 As network grows, more processing is required to add blocks.
 Difficulty of the work increases to keep the blockchain attack-proof.
Attacker must always require 51% of CPU power to attack the chain.
 Blockchain is inefficient by design. It’s a security feature, not a bug.
Problem with blockchain
 With increasing difficulty, over time, the rewards for mining are not
enough to compensate for electricity and hardware spent doing the work.
 To incentivize the miners to continue to mine and add new blocks to the
chain, transaction fees must be introduced. People who want their
transactions to go on chain must pay miners to pick their transaction and
put on block.
 It leads to bidding war. Those who offer higher transaction fees, their
transactions will be picked up and processed first.
Proof-of-work alternatives
 Can we use proof-of-stake instead of proof-of-work?
 No.
 https://antsstyle.medium.com/explanation-of-blockchain-consensus-
algorithms-pow-pos-etc-735fa50d93c8
Private blockchain
 A private, permissioned, trustful blockchain that does not use the
expensive proof-of-work is pointless.
 Private blockchain is private, not public.
 Private blockchain is permissoned. It only allows certain users to add
blocks without showing any proof-of-work.
 Private blokchain is trusted. Users already know and trust each other,
making overheads of the blockchain redundant.
 Private blockchain by its very nature is not decentralized. It is controlled by
one or a few authorities.
 Private blockchain is everything, a blockchain is not supposed to be.
Conclusion
 Public, permissionless, trustless, decentralized blockchain is inefficient by
design and unsuitable for any real-world use cases.
 Private, permissioned, trusted, centralized blockchain is pointless because
it doesn’t offer anything new over already existing databases which are
much more efficient, fast and cost effective.
 Blockchain is a solution for nothing.

More Related Content

What's hot

Introduction to Go programming
Introduction to Go programmingIntroduction to Go programming
Introduction to Go programming
Exotel
 
Python made easy
Python made easy Python made easy
Python made easy
Abhishek kumar
 
Golang - Overview of Go (golang) Language
Golang - Overview of Go (golang) LanguageGolang - Overview of Go (golang) Language
Golang - Overview of Go (golang) Language
Aniruddha Chakrabarti
 
DevOps without DevOps Tools
DevOps without DevOps ToolsDevOps without DevOps Tools
DevOps without DevOps Tools
Jagatveer Singh
 
DevOps
DevOpsDevOps
Gitlab CI/CD
Gitlab CI/CDGitlab CI/CD
Gitlab CI/CD
JEMLI Fathi
 
Functional Design Patterns (DevTernity 2018)
Functional Design Patterns (DevTernity 2018)Functional Design Patterns (DevTernity 2018)
Functional Design Patterns (DevTernity 2018)
Scott Wlaschin
 
Webinar - Unbox GitLab CI/CD
Webinar - Unbox GitLab CI/CD Webinar - Unbox GitLab CI/CD
Webinar - Unbox GitLab CI/CD
Annie Huang
 
Intro to Flutter
Intro to FlutterIntro to Flutter
Intro to Flutter
Eason Pai
 
Introduction To DevOps | Devops Tutorial For Beginners | DevOps Training For ...
Introduction To DevOps | Devops Tutorial For Beginners | DevOps Training For ...Introduction To DevOps | Devops Tutorial For Beginners | DevOps Training For ...
Introduction To DevOps | Devops Tutorial For Beginners | DevOps Training For ...
Simplilearn
 
Python Basics
Python BasicsPython Basics
Python Basics
Pooja B S
 
Spring Boot on Amazon Web Services with Spring Cloud AWS
Spring Boot on Amazon Web Services with Spring Cloud AWSSpring Boot on Amazon Web Services with Spring Cloud AWS
Spring Boot on Amazon Web Services with Spring Cloud AWS
VMware Tanzu
 
Flutter
FlutterFlutter
DevOps é cultura, processo ou cargo ?
DevOps é cultura, processo ou cargo ?DevOps é cultura, processo ou cargo ?
DevOps é cultura, processo ou cargo ?
Carlos Felippe Cardoso
 
What is flutter and why should i care?
What is flutter and why should i care?What is flutter and why should i care?
What is flutter and why should i care?
Sergi Martínez
 
Python basics
Python basicsPython basics
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
Alex Hunte
 
Grafana introduction
Grafana introductionGrafana introduction
Grafana introduction
Rico Chen
 
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
Sonatype
 
Flutter tutorial for Beginner Step by Step
Flutter tutorial for Beginner Step by StepFlutter tutorial for Beginner Step by Step
Flutter tutorial for Beginner Step by Step
Chandramouli Biyyala
 

What's hot (20)

Introduction to Go programming
Introduction to Go programmingIntroduction to Go programming
Introduction to Go programming
 
Python made easy
Python made easy Python made easy
Python made easy
 
Golang - Overview of Go (golang) Language
Golang - Overview of Go (golang) LanguageGolang - Overview of Go (golang) Language
Golang - Overview of Go (golang) Language
 
DevOps without DevOps Tools
DevOps without DevOps ToolsDevOps without DevOps Tools
DevOps without DevOps Tools
 
DevOps
DevOpsDevOps
DevOps
 
Gitlab CI/CD
Gitlab CI/CDGitlab CI/CD
Gitlab CI/CD
 
Functional Design Patterns (DevTernity 2018)
Functional Design Patterns (DevTernity 2018)Functional Design Patterns (DevTernity 2018)
Functional Design Patterns (DevTernity 2018)
 
Webinar - Unbox GitLab CI/CD
Webinar - Unbox GitLab CI/CD Webinar - Unbox GitLab CI/CD
Webinar - Unbox GitLab CI/CD
 
Intro to Flutter
Intro to FlutterIntro to Flutter
Intro to Flutter
 
Introduction To DevOps | Devops Tutorial For Beginners | DevOps Training For ...
Introduction To DevOps | Devops Tutorial For Beginners | DevOps Training For ...Introduction To DevOps | Devops Tutorial For Beginners | DevOps Training For ...
Introduction To DevOps | Devops Tutorial For Beginners | DevOps Training For ...
 
Python Basics
Python BasicsPython Basics
Python Basics
 
Spring Boot on Amazon Web Services with Spring Cloud AWS
Spring Boot on Amazon Web Services with Spring Cloud AWSSpring Boot on Amazon Web Services with Spring Cloud AWS
Spring Boot on Amazon Web Services with Spring Cloud AWS
 
Flutter
FlutterFlutter
Flutter
 
DevOps é cultura, processo ou cargo ?
DevOps é cultura, processo ou cargo ?DevOps é cultura, processo ou cargo ?
DevOps é cultura, processo ou cargo ?
 
What is flutter and why should i care?
What is flutter and why should i care?What is flutter and why should i care?
What is flutter and why should i care?
 
Python basics
Python basicsPython basics
Python basics
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
 
Grafana introduction
Grafana introductionGrafana introduction
Grafana introduction
 
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
 
Flutter tutorial for Beginner Step by Step
Flutter tutorial for Beginner Step by StepFlutter tutorial for Beginner Step by Step
Flutter tutorial for Beginner Step by Step
 

Similar to Blockchain - A Solution For Nothing

Bitcoin A Peer-to-Peer Electronic Cash SystemSatoshi Naka.docx
Bitcoin A Peer-to-Peer Electronic Cash SystemSatoshi Naka.docxBitcoin A Peer-to-Peer Electronic Cash SystemSatoshi Naka.docx
Bitcoin A Peer-to-Peer Electronic Cash SystemSatoshi Naka.docx
jasoninnes20
 
bitcoin.pdf
bitcoin.pdfbitcoin.pdf
bitcoin.pdf
kikofx
 
Satoshinakamotobitcoin
Satoshinakamotobitcoin Satoshinakamotobitcoin
Satoshinakamotobitcoin
Nivaldo Torres
 
bitcoin.pdf
bitcoin.pdfbitcoin.pdf
bitcoin.pdf
RoselinGuerr
 
Introduction for Bitcoin. Original Pater
Introduction for Bitcoin. Original PaterIntroduction for Bitcoin. Original Pater
Introduction for Bitcoin. Original Pater
MarkYang62
 
Bitcoin White Paper
Bitcoin White PaperBitcoin White Paper
Bitcoin White Paper
Andre Vianna (Brazil)
 
Bitcoin whitepaper
Bitcoin whitepaperBitcoin whitepaper
Bitcoin whitepaper
AbdulShamilMS
 
bitcoin.pdf
bitcoin.pdfbitcoin.pdf
bitcoin.pdf
nafeesarani1
 
Bitcoin Whitepaper
Bitcoin WhitepaperBitcoin Whitepaper
Bitcoin Whitepaper
JohnAvery36
 
Whitepaper Bitcoin: A Peer-to-Peer Electronic Cash System
Whitepaper Bitcoin: A Peer-to-Peer Electronic Cash SystemWhitepaper Bitcoin: A Peer-to-Peer Electronic Cash System
Whitepaper Bitcoin: A Peer-to-Peer Electronic Cash System
IQbal KHan
 
190221 masterclass blockchain
190221 masterclass blockchain190221 masterclass blockchain
190221 masterclass blockchain
BoFrank01
 
Blockchain Technology Explained
Blockchain Technology ExplainedBlockchain Technology Explained
Blockchain Technology Explained
MdSaifulIslam289
 
Blockchain
BlockchainBlockchain
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchain
Abhishek Jaiswal
 
The Basic Theories of Blockchain
The Basic Theories of BlockchainThe Basic Theories of Blockchain
The Basic Theories of Blockchain
Sota Watanabe
 
A beginners Guide to NFTs.pdf
A beginners Guide to NFTs.pdfA beginners Guide to NFTs.pdf
A beginners Guide to NFTs.pdf
Akash Agrawal
 
Demystifying Blockchain for businesses
Demystifying Blockchain for businessesDemystifying Blockchain for businesses
Demystifying Blockchain for businesses
Scott Turner
 
Introduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionIntroduction to Blockchain Web3 Session
Introduction to Blockchain Web3 Session
DSCIITPatna
 
The problem with blockchains
The problem with blockchainsThe problem with blockchains
The problem with blockchains
Gurkirat Singh
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
Zied GUESMI
 

Similar to Blockchain - A Solution For Nothing (20)

Bitcoin A Peer-to-Peer Electronic Cash SystemSatoshi Naka.docx
Bitcoin A Peer-to-Peer Electronic Cash SystemSatoshi Naka.docxBitcoin A Peer-to-Peer Electronic Cash SystemSatoshi Naka.docx
Bitcoin A Peer-to-Peer Electronic Cash SystemSatoshi Naka.docx
 
bitcoin.pdf
bitcoin.pdfbitcoin.pdf
bitcoin.pdf
 
Satoshinakamotobitcoin
Satoshinakamotobitcoin Satoshinakamotobitcoin
Satoshinakamotobitcoin
 
bitcoin.pdf
bitcoin.pdfbitcoin.pdf
bitcoin.pdf
 
Introduction for Bitcoin. Original Pater
Introduction for Bitcoin. Original PaterIntroduction for Bitcoin. Original Pater
Introduction for Bitcoin. Original Pater
 
Bitcoin White Paper
Bitcoin White PaperBitcoin White Paper
Bitcoin White Paper
 
Bitcoin whitepaper
Bitcoin whitepaperBitcoin whitepaper
Bitcoin whitepaper
 
bitcoin.pdf
bitcoin.pdfbitcoin.pdf
bitcoin.pdf
 
Bitcoin Whitepaper
Bitcoin WhitepaperBitcoin Whitepaper
Bitcoin Whitepaper
 
Whitepaper Bitcoin: A Peer-to-Peer Electronic Cash System
Whitepaper Bitcoin: A Peer-to-Peer Electronic Cash SystemWhitepaper Bitcoin: A Peer-to-Peer Electronic Cash System
Whitepaper Bitcoin: A Peer-to-Peer Electronic Cash System
 
190221 masterclass blockchain
190221 masterclass blockchain190221 masterclass blockchain
190221 masterclass blockchain
 
Blockchain Technology Explained
Blockchain Technology ExplainedBlockchain Technology Explained
Blockchain Technology Explained
 
Blockchain
BlockchainBlockchain
Blockchain
 
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchain
 
The Basic Theories of Blockchain
The Basic Theories of BlockchainThe Basic Theories of Blockchain
The Basic Theories of Blockchain
 
A beginners Guide to NFTs.pdf
A beginners Guide to NFTs.pdfA beginners Guide to NFTs.pdf
A beginners Guide to NFTs.pdf
 
Demystifying Blockchain for businesses
Demystifying Blockchain for businessesDemystifying Blockchain for businesses
Demystifying Blockchain for businesses
 
Introduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionIntroduction to Blockchain Web3 Session
Introduction to Blockchain Web3 Session
 
The problem with blockchains
The problem with blockchainsThe problem with blockchains
The problem with blockchains
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Blockchain - A Solution For Nothing

  • 2. Money  The need for money arose when humans started living in larger settlements and started exchanging goods with strangers.  First money had intrinsic value – barley, salt, hide, clothes.  Then came money without intrinsic value – gold, silver, cowry shells.  Kings started issuing coins with their mark to guarantee weight and authenticity of money. Fiat currency.  Governments started issuing currency without backing of gold.
  • 3. Bitcoin  A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution.  Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending.  We propose a solution to the double-spending problem using a peer-to-peer network.  The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work.  The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power.  As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers.  The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone.
  • 4. Bitcoin  A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution.  Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending.  We propose a solution to the double-spending problem using a peer-to-peer network.  The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of- work.  The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power.  As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers.  The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone.
  • 5. The promise of Bitcoin  Peer-to-peer electronic cash  No middlemen  Proof-of-work as solution to double spending  Longest chain wins  Attacking the chain requires majority CPU power
  • 6. Problem of double spending  When you spend money, the money is gone from you. You can not spend real life money multiple times.  Digital money is easily copiable so you can spend same money multiple times.  Trusted third parties like banks are required to make sure people don’t spend the same money multiple times.  When you pay someone from your bank account, bank reduces your balance.
  • 7. Problem of double spending  Cryptocurrency wants to do away with middlemen like banks, so they use a Proof-of-work ledger to avoid double spending.  Transactions are recorded as a series of blocks, each block connected to the previous block, thus creating a chain of transactions.  Adding a block to the chain, takes efforts. A node, needs to do lot of processing in order to get the right of adding next transaction to the chain.  When a node shows this proof of work done, they get to add the next block to blockchain.
  • 8. Magic of proof-of-work  Single node cannot just add blocks to the chain at will. Even if it does, other nodes will reject it and follow the longest chain.  Thus, hacking the blockchain requires that attackers control at least 51% of the chain’s processing power.  This makes the blockchain secure.
  • 9. A blockchain  Must be public – anyone should be able to join as a node.  Must be permissionless – anyone should be able to add a block to the chain as long as they show proof-of-work.  Must be trustless – nodes do not trust each-other. They trust the longest chain because it represents most work done.  Must be decentralized – not controlled by a single entity. That is the whole point of blockchain. Decentralization.
  • 10. Decentralization  Decentralization is the fundamental concept of the whole cryptocurrency and blockchain movement.  The goal of cryptocurrency is to remove middlemen who provide trust.  A decentralized blockchain relies on CPU intensive proof-of-work to provide trust.
  • 11. Inefficiency – feature, not a bug  Proof-of-work means adding new blocks of transactions takes a lot of CPU processing and electricity.  Nodes who do this work – miners – are rewarded with new cryptocurrency as a reward for their work (CPU power and electricity).  As network grows, more processing is required to add blocks.  Difficulty of the work increases to keep the blockchain attack-proof. Attacker must always require 51% of CPU power to attack the chain.  Blockchain is inefficient by design. It’s a security feature, not a bug.
  • 12. Problem with blockchain  With increasing difficulty, over time, the rewards for mining are not enough to compensate for electricity and hardware spent doing the work.  To incentivize the miners to continue to mine and add new blocks to the chain, transaction fees must be introduced. People who want their transactions to go on chain must pay miners to pick their transaction and put on block.  It leads to bidding war. Those who offer higher transaction fees, their transactions will be picked up and processed first.
  • 13. Proof-of-work alternatives  Can we use proof-of-stake instead of proof-of-work?  No.  https://antsstyle.medium.com/explanation-of-blockchain-consensus- algorithms-pow-pos-etc-735fa50d93c8
  • 14. Private blockchain  A private, permissioned, trustful blockchain that does not use the expensive proof-of-work is pointless.  Private blockchain is private, not public.  Private blockchain is permissoned. It only allows certain users to add blocks without showing any proof-of-work.  Private blokchain is trusted. Users already know and trust each other, making overheads of the blockchain redundant.  Private blockchain by its very nature is not decentralized. It is controlled by one or a few authorities.  Private blockchain is everything, a blockchain is not supposed to be.
  • 15. Conclusion  Public, permissionless, trustless, decentralized blockchain is inefficient by design and unsuitable for any real-world use cases.  Private, permissioned, trusted, centralized blockchain is pointless because it doesn’t offer anything new over already existing databases which are much more efficient, fast and cost effective.  Blockchain is a solution for nothing.