This document provides an overview of key concepts in blockchain and Bitcoin including decentralization, cryptography, transactions, wallets, mining, and the Bitcoin network. It discusses block and transaction structures, public and private keys, proof-of-work mining, and applications of blockchain technology such as escrow and micropayments. The history of Bitcoin mining from CPUs to ASICs is covered as well as the centralization of mining in pools.
I am sending you 1π! Pi is a new digital currency developed by Stanford PhDs, with over 9 million members worldwide. To claim your Pi, follow this link https://minepi.com/krishvikram and use my username (krishvikram) as your invitation code.
Step 1. Install the Pi app with above link
Step 2 verify the profile
Step 3 tap on earnings and share your link and increase your earnings
Step 4 verification type the referral code which is mandatory.
Referral code is : krishvikram
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad SarangNinad Sarang
Introduction to Blockchain and Bitcoin technologies
Things we will cover,
* What is TRANSACTION ?
* BlockChain !!!……Never heard what is that??
* The BTC Aka BitCoins
* Who discovered?
* How it works?
* Advantages & Disadvantages
* Applications
Virtual or digital currencies, with Bitcoin chief amongst them, have been gaining momentum and investment over the last couple of years. Offering an almost costless means of making payments around the globe, virtual currencies have the potential to bring significant disruption to the banking industry. This potential is not lost on either Bitcoin startups or banks themselves. But how does Bitcoin actually work? A peer-to-peer network maintains the “blockchain”, an innovative cryptographic protocol which securely mediates payments between parties without mutual trust. This session will step through the structure of the blockchain, showing how it solves the “double spend” problem and allows decentralised processing of financial transactions. Whether Bitcoin will become the currency of the internet or it’s a bubble that is doomed to burst sooner or later, the blockchain itself will change the face of transactional banking and perhaps other industries along the way.
Presentation to the Sydney Financial Mathematics Workshop (11 March 2015)
http://www.qgroup.org.au/content/bitcoin-banking-and-blockchain
I am sending you 1π! Pi is a new digital currency developed by Stanford PhDs, with over 9 million members worldwide. To claim your Pi, follow this link https://minepi.com/krishvikram and use my username (krishvikram) as your invitation code.
Step 1. Install the Pi app with above link
Step 2 verify the profile
Step 3 tap on earnings and share your link and increase your earnings
Step 4 verification type the referral code which is mandatory.
Referral code is : krishvikram
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad SarangNinad Sarang
Introduction to Blockchain and Bitcoin technologies
Things we will cover,
* What is TRANSACTION ?
* BlockChain !!!……Never heard what is that??
* The BTC Aka BitCoins
* Who discovered?
* How it works?
* Advantages & Disadvantages
* Applications
Virtual or digital currencies, with Bitcoin chief amongst them, have been gaining momentum and investment over the last couple of years. Offering an almost costless means of making payments around the globe, virtual currencies have the potential to bring significant disruption to the banking industry. This potential is not lost on either Bitcoin startups or banks themselves. But how does Bitcoin actually work? A peer-to-peer network maintains the “blockchain”, an innovative cryptographic protocol which securely mediates payments between parties without mutual trust. This session will step through the structure of the blockchain, showing how it solves the “double spend” problem and allows decentralised processing of financial transactions. Whether Bitcoin will become the currency of the internet or it’s a bubble that is doomed to burst sooner or later, the blockchain itself will change the face of transactional banking and perhaps other industries along the way.
Presentation to the Sydney Financial Mathematics Workshop (11 March 2015)
http://www.qgroup.org.au/content/bitcoin-banking-and-blockchain
An introductory look at various Blockchain Technologies and examples. In this slide I explain about basics of Etherium and types of Blockchain technology currently present and some known public projects/examples which use Blockchain.
Blockchain overview, use cases, implementations and challengesSébastien Tandel
Most know about Bitcoin, the well-known crypto-currency. Less know the details about the underlying and enabling technology, Blockchain.
Hopefully, this presentation provides enough insights to understand blockchain concepts and why it's perceived to potentially disrupt many market segments, from retail to governments, from finance to health care. At last, I hope to brush fairly the many challenges of this rather new technology.
Bitcoin, Blockchain and the Crypto Contracts - Part 2Prithwis Mukerjee
Where we explain how the cryptographic ideas are used to create a crypto asset on the block chain. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
This slidedeck was used at the second Blockchain Vlaanderen meetup in Antwerp. It was given as a general introduction into Blockchain to enable newcomers to follow the presentations that followed.
Intro to Blockchain - And, by the way, what the heck is proof-of-work?Jim Flynn
An overview of bitcoin and the blockchain with a more in-depth description of proof of work (POW). Conde samples used to demonstrate the concepts behind POW are available at http://jamespflynn.com.
Demonstrating how to create an end-to-end Web-based application that uses blockchain for user authentication, read, and write access to the data stored on the blockchain
Litecoin Genesis Date - October 7, 2011
Founder Charlie Lee, a former Google and Coinbase employee.
Litecoin reached a $1 billion marketcap in November 2013.[
In May 2017, Litecoin became the first of the top-5 (by market cap) cryptocurrencies to adopt Segregated Witness .
Later in May of the same year, the first Lightning Network transaction was completed through litecoin, transferring 0.00000001 LTC from Zurich to San Francisco in under one second.
Metadata in the Blockchain: The OP_RETURN ExplosionCoin Sciences Ltd
With the addition of OP_RETURN outputs in version 0.9, it became possible to attach arbitrary pieces of information to bitcoin transactions. This turns bitcoin into a low-level communications protocol, just like TCP/IP, on which many new applications can be built.
Despite its powerful features, bitcoin is also limited, costly and inefficient compared to TCP/IP. After discussing which sorts of applications make this trade-off worthwhile, we talk about CoinSpark, a new open source protocol for enhancing bitcoin transactions, which makes extensive use of OP_RETURNs.
The new digital era is knocking our doors, and these are arguably the most exciting times post invention of internet itself. Open your doors to the new advanced digital world, which promises to simplify and automate a lot of things around. In the list of remarkable technologies that promise to change the world, is Blockchain.
Conceived in 2008, this concept is generating a lot of buzz. This presentation discusses about this technology, working mechanism in case of Bitcoin, and its use cases beyond crypto-curreinces.
An introductory look at various Blockchain Technologies and examples. In this slide I explain about basics of Etherium and types of Blockchain technology currently present and some known public projects/examples which use Blockchain.
Blockchain overview, use cases, implementations and challengesSébastien Tandel
Most know about Bitcoin, the well-known crypto-currency. Less know the details about the underlying and enabling technology, Blockchain.
Hopefully, this presentation provides enough insights to understand blockchain concepts and why it's perceived to potentially disrupt many market segments, from retail to governments, from finance to health care. At last, I hope to brush fairly the many challenges of this rather new technology.
Bitcoin, Blockchain and the Crypto Contracts - Part 2Prithwis Mukerjee
Where we explain how the cryptographic ideas are used to create a crypto asset on the block chain. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
This slidedeck was used at the second Blockchain Vlaanderen meetup in Antwerp. It was given as a general introduction into Blockchain to enable newcomers to follow the presentations that followed.
Intro to Blockchain - And, by the way, what the heck is proof-of-work?Jim Flynn
An overview of bitcoin and the blockchain with a more in-depth description of proof of work (POW). Conde samples used to demonstrate the concepts behind POW are available at http://jamespflynn.com.
Demonstrating how to create an end-to-end Web-based application that uses blockchain for user authentication, read, and write access to the data stored on the blockchain
Litecoin Genesis Date - October 7, 2011
Founder Charlie Lee, a former Google and Coinbase employee.
Litecoin reached a $1 billion marketcap in November 2013.[
In May 2017, Litecoin became the first of the top-5 (by market cap) cryptocurrencies to adopt Segregated Witness .
Later in May of the same year, the first Lightning Network transaction was completed through litecoin, transferring 0.00000001 LTC from Zurich to San Francisco in under one second.
Metadata in the Blockchain: The OP_RETURN ExplosionCoin Sciences Ltd
With the addition of OP_RETURN outputs in version 0.9, it became possible to attach arbitrary pieces of information to bitcoin transactions. This turns bitcoin into a low-level communications protocol, just like TCP/IP, on which many new applications can be built.
Despite its powerful features, bitcoin is also limited, costly and inefficient compared to TCP/IP. After discussing which sorts of applications make this trade-off worthwhile, we talk about CoinSpark, a new open source protocol for enhancing bitcoin transactions, which makes extensive use of OP_RETURNs.
The new digital era is knocking our doors, and these are arguably the most exciting times post invention of internet itself. Open your doors to the new advanced digital world, which promises to simplify and automate a lot of things around. In the list of remarkable technologies that promise to change the world, is Blockchain.
Conceived in 2008, this concept is generating a lot of buzz. This presentation discusses about this technology, working mechanism in case of Bitcoin, and its use cases beyond crypto-curreinces.
Introduction to blockchain and cryptocurrency technologiesPaweł Wacławczyk
Introduction to cryptography primitives and fundamental data structures. Discuss the process of achieving distributed consensus, proof-of-work and potential attacks on network.
A Complete Beginners Guide to Blockchain Technology Part 6 of 6. Slides from the #StartingBlock2015 tour by @blockstrap
Part 1: http://www.slideshare.net/Blockstrap/cbgtbt-part-1-workshop-introduction-primer
Part 2: http://www.slideshare.net/Blockstrap/02-blockchains-101
Part 3: http://www.slideshare.net/Blockstrap/03-transactions-101
Part 4: http://www.slideshare.net/Blockstrap/cbgtbt-part-4-mining
Part 5: http://www.slideshare.net/Blockstrap/05-blockchains-102
Part 6: http://www.slideshare.net/Blockstrap/06-transactions-102
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)IT Arena
Lviv IT Arena is a conference specially designed for programmers, designers, developers, top managers, inverstors, entrepreneur and startuppers. Annually it takes place on 2-4 of October in Lviv at the Arena Lviv stadium. In 2015 conference gathered more than 1400 participants and over 100 speakers from companies like Facebook. FitBit, Mail.ru, HP, Epson and IBM. More details about conference at itarene.lviv.ua.
The speaker share his vision on the prospects of employing the technology for practical tasks. He presented basics of the blockchain architecture with case studies of JavaScript blockchain implementation using Node.js.
This presentation by Valerii Radchenko (Senior Software Engineer, Consultant, GlobalLogic, Kharkiv) was delivered at GlobalLogic Kharkiv JS TechTalk #2 on August 17, 2018.
Explains what the Blockchain is and how it works. Features slides about the Cryptography, P2P Networking, Blockchain Data Structure, Bitcoin Transactions, Proof of Work Algorithm (Mining) and Scripts.
Advanced Blockchain Technologies on Privacy & Scalability (All Things Open) Kaleido
(View presentation in full-screen mode for compatibility)
2019 is shaping up to be the pivotal point of broad adoption of blockchain technologies, thanks to the large amount of projects in the enterprise space. Among the top concerns of blockchain projects in the private sector and government alike are privacy and scalability. This talk will cover various technologies such as identity masking, data isolation, zero-knowledge proof, homomorphic encryption that helps keep private data protected from unintended parties, and technologies for improving scalability such as state/payment channels, sharding, and novel consensus algorithms.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
10. How to locate transaction
Assume P transactions in the Merkle tree,
We need O(logN) hashes to construct a path
to verify if a transaction exist here
authentication path :
HL , HIJ , HMNOP , HABCDEFGH
11. How to locate transaction
Assume P transactions in the Merkle tree,
We need O(logN) hashes to construct a path
to verify if a transaction exist here
authentication path :
HL , HIJ , HMNOP , HABCDEFGH
20. KEY(PUBLIC)
• COMPRESSED • UNCOMPRESSED
(x, y)
k = 04xyk = 02x, if y is even
k = 03x, if y is odd
• 66 hex digits • 130 hex digits
04f29a7f486c90281f9396945e99ab35e2ed732c008a
da71e8e745da38dc63ac97b723fe731555dfba9dd60c
0cc8fbc8f26c35739f10c068125e6394839a47eb1e
02f29a7f486c90281f9396945e99ab35e2
ed732c008ada71e8e745da38dc63ac97
23. Mnemonic Code Word
1. Create a random sequence (entropy) of 128 to 256 bits
2. Create a checksum of the random sequence by taking the
first few bits of its SHA256 hash
3. Add the checksum to the end of the random sequence
4. Divide the sequence into sections of 11 bits, using those to
index a dictionary of 2048 pre-defined words
5. Produce 12-24 words representing the mnemonic code
24. Mnemonic Code Word
1. Create a random sequence (entropy) of 128 to 256 bits
2. Create a checksum of the random sequence by taking the
first few bits of its SHA256 hash
3. Add the checksum to the end of the random sequence
4. Divide the sequence into sections of 11 bits, using those to
index a dictionary of 2048 pre-defined words
5. Produce 12-24 words representing the mnemonic code
26. Hierarchical Deterministic Wallets
• tree structure can be used to express additional organizational
meaning
• users can create a sequence of public keys without having
access to the corresponding private keys
• insecure server or in a receive-only capacity
28. Hierarchical Deterministic Wallets
• parent private key and public key (256bit)
• seed called a chain code (256bit)
• index number (32bit)
Extended Keys : key + chain code
30. Hierarchical Deterministic Wallets
• Solution : Hardened Child Key Derivation
• use parent private key to derive child chain code
• best practice, the level-1 children of the master keys are
always derived through the hardened derivation, to prevent
compromise of the master keys
31. Hierarchical Deterministic Wallets
• Index numbers for normal and hardened derivation
• Normal : 0 ~ 2^31 -1 , first one displayed as 0
• Hardened : 2^31 ~ 2^32 -1 , first one displayed as 0’
• HD wallet key identifier (path)
33. Key Format
• Private Key
• Wallet Import Format(WIF) : a way of encoding a private
key so as to make it easier to copy
• Public Key
34. Other Format
• Encrypted Private Key
• private key(usually in WIF) + passphrase
• => Base58Check encoded encrypted private key
with the prefix 6P
• need passphrase to decrypt
35. • Block Structure
• Key, Address and Wallet
• Transaction
• Mining and Consensus
• Network
38. Life Cycle
• Most important thing in Bitcoin network
• All designs in Bitcoin are created for transaction’s creation,
broadcast and verification
• Life cycle :
CREAT
ED
SIGNE
D
BROADCAS
TED
VERIFIED
AND
COLLECT
ED
Every node will
send validated
transaction to its
3~4 neighbors.
39. UTXO
• Unspent Transaction Output
• locked to specific owner
• no balance of a bitcoin address account; only scattered UTXO
• balance is the sum of UTXO of that address
Account-based ledger
Alice transfer $10 to me
Bob transfer $5 to me
transfer $13 to David
transfer $10 to Alice
Transaction-based ledger
Input from a1,$10, to me
Input from b1,$5, to me
Input from c1,c2,$13, to David
Input from c3,$5, to Alice
only need to verify output from specific transaction
40. UTXO
• Unspent Transaction Output
• locked to specific owner
• no balance of a bitcoin address account; only scattered UTXO
• balance is the sum of UTXO of that address
Account-based ledger
Alice transfer $10 to me
Bob transfer $5 to me
transfer $13 to David
transfer $10 to Alice
Transaction-based ledger
Input from a1,$10, to me
Input from b1,$5, to me
Input from c1,c2,$13, to David
Input from c3,$5, to Alice
only need to verify output from specific transaction
• efficient verification
• consolidating funds : merge my own
coins together to one address
• joint payments : combine payments
from multiple person
• change address : the change are
changed to another address
41. UTXO
• Unspent Transaction Output
• locked to specific owner
• no balance of a bitcoin address account; only scattered UTXO
• balance is the sum of UTXO of that address
Account-based ledger
Alice transfer $10 to me
Bob transfer $5 to me
transfer $13 to David
transfer $10 to Alice
Transaction-based ledger
Input from a1,$10, to me
Input from b1,$5, to me
Input from c1,c2,$13, to David
Input from c3,$5, to Alice
only need to verify output from specific transaction
• efficient verification
• consolidating funds : merge my own
coins together to one address
• joint payments : combine payments
from multiple person
• change address : the change are
changed to another address
42. Structure
• Metadata
• Locktime
• the earliest time that a transaction is valid and can be
relayed on the network or added to the blockchain
• = 0 : no locktime limit
• < 500 million : block height
• > 500 million : Unix Epoch timestamp
49. Script
• Pay-to-public-key-hash (P2PKH)
• Majority
• Public-key
• Public key is store in the locking script
rather than Public key hash
• generated by older mining software that
has not been updated to use P2PKH
50. Script
• Multi-Signature
• Locking script
• M <Public Key 1> <Public Key 2> ... <Public
Key N> N OP_CHECKMULTISIG
• Unlocking script
• OP_0 <Signature B> <Signature C>
• Data Output(OP_RETURN)
• allows developers to add 40 bytes of non-payment
data to a transaction output
• un-spendable output
51. Script
• Pay-to-Script-Hash(P2SH)
• pay to a script matching this hash, a script which
will be presented later when this output is spent
• P2SH addresses are Base58Check encodings of
the 20 byte hash of a script
• use version prefix 5, which results in Base58Check
encoded addresses starting with 3
• the redeem script can be invalid , which will result
in un-spendable bitcoin
52. Script
• Pay-to-Script-Hash(P2SH)
• pay to a script matching this hash, a script which
will be presented later when this output is spent
• P2SH addresses are Base58Check encodings of
the 20 byte hash of a script
• use version prefix 5, which results in Base58Check
encoded addresses starting with 3
• the redeem script can be invalid , which will result
in un-spendable bitcoin
53. Script
• Pay-to-Script-Hash(P2SH)
• pay to a script matching this hash, a script which
will be presented later when this output is spent
• P2SH addresses are Base58Check encodings of
the 20 byte hash of a script
• use version prefix 5, which results in Base58Check
encoded addresses starting with 3
• the redeem script can be invalid , which will result
in un-spendable bitcoin
54. Script
• Pay-to-Script-Hash(P2SH)
• pay to a script matching this hash, a script which
will be presented later when this output is spent
• P2SH addresses are Base58Check encodings of
the 20 byte hash of a script
• use version prefix 5, which results in Base58Check
encoded addresses starting with 3
• the redeem script can be invalid , which will result
in un-spendable bitcoin
advantage:
nodes keep less record
55. Transaction Fee
• = sum of output - sum of input
• independent of the transaction’s bitcoin value,
but generally determined by size of a
transaction
• others are more willing to put a transaction into
a block if it’s fee is high
• is used to stop spam transactions and DDoS
56. • Block Structure
• Key, Address and Wallet
• Transaction
• Mining and Consensus
• Network
61. Task of Bitcoin Miners
• maintaining block chain and listen for new
blocks
• listen for transactions : listen and validate
• assemble a new block
• compute the answer(nonce) and broadcast the
block
62. Proof of Work
• spam email check
• difficult to produce but easy to verify
• a base string + nonce -> hash
• nonce : number used only once
• base string : Hello, world!
• target : hash begins with certain zeros
63. Proof of Work
• spam email check
• difficult to produce but easy to verify
• a base string + nonce -> hash
• nonce : number used only once
• base string : Hello, world!
• target : hash begins with certain zeros
64. Difficulty
• averagely 10 mins per block generation
• determine the difficulty
• adjust every 2 weeks
• next_difficulty = previous_difficulty * (2
weeks) / (time to mine last 2016 blocks)
65. Coinbase Transaction
• a null hash pointer
• a parameter contain arbitrary data , usually used
to signal support by miners for different new
features (vote)
• BIP , Bitcoin Improvement Proposal
• value contains block reward and all the
transaction fees of the block
69. Problem & Attack
• steal bitcoin?
• protected by digital signature
• steal private keys
• fork
• P2P network latency
• miner will go with the main(longest) chain
• lose if not on the main chain
• double-spend attack?
• a block is generated about every 10 minutes
• should wait at least 6 blocks(confirmation)
70. Problem & Attack
• Sybil attacks
• refuse to relay blocks and transactions,
disconnecting you from the network
• open to double-spending attacks
• 51% attack
• could change the main chain
71. Problem & Attack
• Sybil attacks
• refuse to relay blocks and transactions,
disconnecting you from the network
• open to double-spending attacks
• 51% attack
• could change the main chain
73. Application of Bitcoin
• Escrow Application
• MULTISIG and a third party
• green address
• bank-controlled address
• bank guarantee it will not double-spend (real
world guarantee) , so recipient won’t have to
worry about confirmations of the transaction
which would take an hour
• trackable
74. Application of Bitcoin
• micro-payment
• bond : broadcast by recipient in the beginning
• refund : MULTISIG , requires both sender and
receiver to sign ; spend the money of bond ,
transfer them to both sender and recipient
• lock time : set the time t when recipient fail to
broadcast the payment by t , sender can get
the whole money back instead of money being
hold hostage by recipient
79. Mining History
• FPGA Mining
• Field Programmable Gate Array, Verilog
• allowing the owner of the card to customize it
or reconfigure it
• better performance, cooling
• malfunction and errors, difficult to optimize the
32bit addition step, less accessible
81. Mining History
• ASIC Mining
• Application Specific Integrated Circuits
• chips designed, built, and optimized for the
sole purpose of mining Bitcoins
• rapidly increasing network hash rate, shipping
speed is crucial
• short lifetime
89. Mining Pool
• pay-per-share
• flat fee on every share, even no valid block
found
• manager absorb the risk
• took advantage by competitors
• proportional
97. SPV client
• Simplified Payment Verification nodes
• retrieve only block headers, 1000 times smaller
than full blockchain
• request for specific transaction from peers
• Sybil attack
• double spending attack
• privacy revealed
• Bloom Filter
98. Bloom Filter
• probabilistic search filter, a way to describe a
desired pattern without specifying it exactly
• a variable-size array of N binary digits
• a variable number of M hash functions, output
between 1 and N
• varying the level of accuracy and therefore
privacy by picking different N & M
99. Bloom Filter
• To add a pattern to the bloom filter, the pattern is
hashed by each hash function in turn
• corresponding bit of hash output is set to 1