SlideShare a Scribd company logo
Bitcoin and Blockchain
● Crypto digital asset to make digital transactions
● Should be secure
● Cryptocurrencies can be anonymous
I wish I had one
● Satoshi Nakamoto is the inventor of Bitcoin -> just a name we don’t actually
know who he is
Bitcoin = cryptocurrency
Blockchain = distributed database (recording things)
They have never confessed who
they are yet
Blockchain
● Electronic database that records bitcoin transactions
● No central source for a hacker to go after
● Blockchain is very secure
● You know each and every individual transaction(personally, I dislike this)
● Blockchain rules change over time
● There is no authoritative centralized source
● Without the cloud, blockchain wouldn’t run and when has the cloud ever gone
down?
Learn what Bitcoin and Blockchain is for beginners
Blockchain
Decentralized ledger
It gives peer to peer transactions without the need for a third party
To do a transaction you need a private and public key
Public key = address to receive funds
Private key is like the bank card pin number
To keep track of our crypto currency, blockchain uses a ledger which is a file that
keeps track of all the transactions
Learn what Bitcoin and Blockchain is for beginners
Bitcoin mining
● Used with a software to solve math problems
● Bitcoins are given as a reward
● More minors = more security
● ASIC chips cause the problems to be solved faster
● What is really being mined?
● Blocks for the blockchain are being MINED
● When the first bitcoin was mined you would get 50 Bitcoins per block
Ethereum
A platform with its own currency
Developers can build their blockchain based programs
Winner or loser would transfer from one player to another
Learn what Bitcoin and Blockchain is for beginners
What is a block in blockchain
A blockchain is a list of linked blocks that are linked by cryptography.
The blocks holds
● Transaction data
● A timestamp -> uses UNIX time
● Cryptographic hash that converts the previous block data into a fixed length of random data ->the
generated hash key stores the data of the current block and the address of the next block-> Bitcoin
uses SHA256
● Nonce -> number used once, used in a proof of work blockchain, Bitcoin stores the value of a
previous block as a hash value for the current block now one can change a block without modifying
all other blocks in the chain
● Mining is when a miner tries to guess the correct nonce when calculating a block hash and then
they receive rewards
Genesis Block
● The first block on a blockchain
● The next block will have the hash of the genesis block
● Modern versions of bitcoin call it block 0
● It is the first block ever mined
● The first genesis block was created by satoshi nakamoto
SHA2
● Designed by the united states national security agency NSA
● First published 2001
● Creates hash values that are 224, 256, 384,512 bits
● SHA-1 and SHA-2 are secure hash algorithms required by law for use in
certain U.S government applications
Creating new blocks
Double Spend
● What if you wanted to reverse a transaction
● Its immutable YOU CANNOT REVERSE
● Spending money more than once is also a problem -> oof
● If you paid for something and it wasn’t committed then that money could be
spent again and blockchain will wonder how to resolve the issue….
● With real money we do not have this problem
● A gap when something occurs and then there is a time gap
● They use a timestamp and give the money to the first person.
What type of encryption
Cryptography is used to protect the privacy of transactions
Why the growth?
● Processes transaction faster since it is not a centralized system
● Allows user to raise a query on the transaction in real-time
● Helps create a digital identity, decentralized system will offer easy access to all information in the
system to access the information from anywhere
● Helps data be real and unalterable
● 💬1 - When and Why to Use Blockchain Technology | Blockchain Council (blockchain-council.org)
● Open to the public
● Any user can view the entire blockchain, helps all users verify the data
● No central point to attack, no single point of entry for hackers
● No middleman which is expensive, time consuming
Why Use Blockchain Technology? | Bernard Marr
Gathering data about Satoshi
Began coding the first implementation of bitcoin in c++ 2007
Wrote the first bitcoin whitepaper
In Jan 2009 he finally launches the bitcoin opensource code
Over time the bitcoin began to grow they began contributing
His code was great but it did have bugs
Learn what Bitcoin and Blockchain is for beginners
Ad

More Related Content

Similar to Learn what Bitcoin and Blockchain is for beginners (20)

Blockchain and bitcoin
Blockchain and bitcoinBlockchain and bitcoin
Blockchain and bitcoin
Tejhaskar Ashok Kumar
 
Blockchain (and Bitcoin)
Blockchain (and Bitcoin) Blockchain (and Bitcoin)
Blockchain (and Bitcoin)
Nitin Jain
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain work
Shishir Aryal
 
What is a blockchain?
What is a blockchain?What is a blockchain?
What is a blockchain?
Kevin Koo
 
Blockchain
BlockchainBlockchain
Blockchain
Naveen Kumar Neelam
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
subbul
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
Keenan Olsen
 
A Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval CaprazA Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval Capraz
Seval Çapraz
 
Blockchain-based shared ownership of City Platform Cooperatives
Blockchain-based shared ownership of City Platform CooperativesBlockchain-based shared ownership of City Platform Cooperatives
Blockchain-based shared ownership of City Platform Cooperatives
DigitalTown, Inc
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
Hugo Rodrigues
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
Mike Cartwright
 
Blockchain External.pdf
Blockchain External.pdfBlockchain External.pdf
Blockchain External.pdf
manishchaitanya
 
Node.js Blockchain Implementation
Node.js Blockchain ImplementationNode.js Blockchain Implementation
Node.js Blockchain Implementation
GlobalLogic Ukraine
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
Nimmy Solomon
 
BITCOIN EXPLAINED
BITCOIN EXPLAINEDBITCOIN EXPLAINED
BITCOIN EXPLAINED
Murlidhar Sarda
 
crypto ppt.ppt
crypto ppt.pptcrypto ppt.ppt
crypto ppt.ppt
SakshiRawat394090
 
Intro to Blockchain Slides
Intro to Blockchain SlidesIntro to Blockchain Slides
Intro to Blockchain Slides
Shannon Wells
 
Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014
WeKCo Coworking
 
Bitcoin A Peer-to-Peer Electronic Cash System
Bitcoin A Peer-to-Peer Electronic Cash SystemBitcoin A Peer-to-Peer Electronic Cash System
Bitcoin A Peer-to-Peer Electronic Cash System
Flavio Vit
 
Blockchain talk open value meetup 31-8-17
Blockchain talk open value meetup 31-8-17Blockchain talk open value meetup 31-8-17
Blockchain talk open value meetup 31-8-17
Roy Wasse
 
Blockchain (and Bitcoin)
Blockchain (and Bitcoin) Blockchain (and Bitcoin)
Blockchain (and Bitcoin)
Nitin Jain
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain work
Shishir Aryal
 
What is a blockchain?
What is a blockchain?What is a blockchain?
What is a blockchain?
Kevin Koo
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
subbul
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
Keenan Olsen
 
A Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval CaprazA Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval Capraz
Seval Çapraz
 
Blockchain-based shared ownership of City Platform Cooperatives
Blockchain-based shared ownership of City Platform CooperativesBlockchain-based shared ownership of City Platform Cooperatives
Blockchain-based shared ownership of City Platform Cooperatives
DigitalTown, Inc
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
Hugo Rodrigues
 
Node.js Blockchain Implementation
Node.js Blockchain ImplementationNode.js Blockchain Implementation
Node.js Blockchain Implementation
GlobalLogic Ukraine
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
Nimmy Solomon
 
Intro to Blockchain Slides
Intro to Blockchain SlidesIntro to Blockchain Slides
Intro to Blockchain Slides
Shannon Wells
 
Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014
WeKCo Coworking
 
Bitcoin A Peer-to-Peer Electronic Cash System
Bitcoin A Peer-to-Peer Electronic Cash SystemBitcoin A Peer-to-Peer Electronic Cash System
Bitcoin A Peer-to-Peer Electronic Cash System
Flavio Vit
 
Blockchain talk open value meetup 31-8-17
Blockchain talk open value meetup 31-8-17Blockchain talk open value meetup 31-8-17
Blockchain talk open value meetup 31-8-17
Roy Wasse
 

More from Your Study_Buddy (7)

OWASP Juice Shop Reference: How to set up OWASP Juice Shop (reference ONLY)
OWASP Juice Shop Reference: How to set up OWASP Juice Shop (reference ONLY)OWASP Juice Shop Reference: How to set up OWASP Juice Shop (reference ONLY)
OWASP Juice Shop Reference: How to set up OWASP Juice Shop (reference ONLY)
Your Study_Buddy
 
What is Angular and some of the terms used
What is Angular and some of the terms usedWhat is Angular and some of the terms used
What is Angular and some of the terms used
Your Study_Buddy
 
React Interview Questions for Noobs or Juniors
React Interview Questions for Noobs or JuniorsReact Interview Questions for Noobs or Juniors
React Interview Questions for Noobs or Juniors
Your Study_Buddy
 
How to use Burpe Suite Intruder for beginner
How to use Burpe Suite Intruder for beginnerHow to use Burpe Suite Intruder for beginner
How to use Burpe Suite Intruder for beginner
Your Study_Buddy
 
Web Security Terms such as what is a WAF, Access Control, Output Encoding ....
Web Security Terms such as what is a WAF, Access Control, Output Encoding   ....Web Security Terms such as what is a WAF, Access Control, Output Encoding   ....
Web Security Terms such as what is a WAF, Access Control, Output Encoding ....
Your Study_Buddy
 
Web Security: Working with burpe suite for beginners
Web Security: Working with burpe suite for beginnersWeb Security: Working with burpe suite for beginners
Web Security: Working with burpe suite for beginners
Your Study_Buddy
 
Beginner: Types of Operating Systems and Attacks in Web Security
Beginner: Types of Operating Systems and Attacks in Web SecurityBeginner: Types of Operating Systems and Attacks in Web Security
Beginner: Types of Operating Systems and Attacks in Web Security
Your Study_Buddy
 
OWASP Juice Shop Reference: How to set up OWASP Juice Shop (reference ONLY)
OWASP Juice Shop Reference: How to set up OWASP Juice Shop (reference ONLY)OWASP Juice Shop Reference: How to set up OWASP Juice Shop (reference ONLY)
OWASP Juice Shop Reference: How to set up OWASP Juice Shop (reference ONLY)
Your Study_Buddy
 
What is Angular and some of the terms used
What is Angular and some of the terms usedWhat is Angular and some of the terms used
What is Angular and some of the terms used
Your Study_Buddy
 
React Interview Questions for Noobs or Juniors
React Interview Questions for Noobs or JuniorsReact Interview Questions for Noobs or Juniors
React Interview Questions for Noobs or Juniors
Your Study_Buddy
 
How to use Burpe Suite Intruder for beginner
How to use Burpe Suite Intruder for beginnerHow to use Burpe Suite Intruder for beginner
How to use Burpe Suite Intruder for beginner
Your Study_Buddy
 
Web Security Terms such as what is a WAF, Access Control, Output Encoding ....
Web Security Terms such as what is a WAF, Access Control, Output Encoding   ....Web Security Terms such as what is a WAF, Access Control, Output Encoding   ....
Web Security Terms such as what is a WAF, Access Control, Output Encoding ....
Your Study_Buddy
 
Web Security: Working with burpe suite for beginners
Web Security: Working with burpe suite for beginnersWeb Security: Working with burpe suite for beginners
Web Security: Working with burpe suite for beginners
Your Study_Buddy
 
Beginner: Types of Operating Systems and Attacks in Web Security
Beginner: Types of Operating Systems and Attacks in Web SecurityBeginner: Types of Operating Systems and Attacks in Web Security
Beginner: Types of Operating Systems and Attacks in Web Security
Your Study_Buddy
 
Ad

Recently uploaded (20)

Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
GyrusAI - Broadcasting & Streaming Applications Driven by AI and ML
GyrusAI - Broadcasting & Streaming Applications Driven by AI and MLGyrusAI - Broadcasting & Streaming Applications Driven by AI and ML
GyrusAI - Broadcasting & Streaming Applications Driven by AI and ML
Gyrus AI
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
AI You Can Trust: The Critical Role of Governance and Quality.pdf
AI You Can Trust: The Critical Role of Governance and Quality.pdfAI You Can Trust: The Critical Role of Governance and Quality.pdf
AI You Can Trust: The Critical Role of Governance and Quality.pdf
Precisely
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
The Changing Compliance Landscape in 2025.pdf
The Changing Compliance Landscape in 2025.pdfThe Changing Compliance Landscape in 2025.pdf
The Changing Compliance Landscape in 2025.pdf
Precisely
 
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
James Anderson
 
The Microsoft Excel Parts Presentation.pdf
The Microsoft Excel Parts Presentation.pdfThe Microsoft Excel Parts Presentation.pdf
The Microsoft Excel Parts Presentation.pdf
YvonneRoseEranista
 
Vaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without HallucinationsVaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without Hallucinations
john409870
 
UiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer OpportunitiesUiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer Opportunities
DianaGray10
 
Connect and Protect: Networks and Network Security
Connect and Protect: Networks and Network SecurityConnect and Protect: Networks and Network Security
Connect and Protect: Networks and Network Security
VICTOR MAESTRE RAMIREZ
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
Transcript: Canadian book publishing: Insights from the latest salary survey ...
Transcript: Canadian book publishing: Insights from the latest salary survey ...Transcript: Canadian book publishing: Insights from the latest salary survey ...
Transcript: Canadian book publishing: Insights from the latest salary survey ...
BookNet Canada
 
Vibe Coding_ Develop a web application using AI (1).pdf
Vibe Coding_ Develop a web application using AI (1).pdfVibe Coding_ Develop a web application using AI (1).pdf
Vibe Coding_ Develop a web application using AI (1).pdf
Baiju Muthukadan
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Raffi Khatchadourian
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Canadian book publishing: Insights from the latest salary survey - Tech Forum...
Canadian book publishing: Insights from the latest salary survey - Tech Forum...Canadian book publishing: Insights from the latest salary survey - Tech Forum...
Canadian book publishing: Insights from the latest salary survey - Tech Forum...
BookNet Canada
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
GyrusAI - Broadcasting & Streaming Applications Driven by AI and ML
GyrusAI - Broadcasting & Streaming Applications Driven by AI and MLGyrusAI - Broadcasting & Streaming Applications Driven by AI and ML
GyrusAI - Broadcasting & Streaming Applications Driven by AI and ML
Gyrus AI
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
AI You Can Trust: The Critical Role of Governance and Quality.pdf
AI You Can Trust: The Critical Role of Governance and Quality.pdfAI You Can Trust: The Critical Role of Governance and Quality.pdf
AI You Can Trust: The Critical Role of Governance and Quality.pdf
Precisely
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
The Changing Compliance Landscape in 2025.pdf
The Changing Compliance Landscape in 2025.pdfThe Changing Compliance Landscape in 2025.pdf
The Changing Compliance Landscape in 2025.pdf
Precisely
 
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
James Anderson
 
The Microsoft Excel Parts Presentation.pdf
The Microsoft Excel Parts Presentation.pdfThe Microsoft Excel Parts Presentation.pdf
The Microsoft Excel Parts Presentation.pdf
YvonneRoseEranista
 
Vaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without HallucinationsVaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without Hallucinations
john409870
 
UiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer OpportunitiesUiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer Opportunities
DianaGray10
 
Connect and Protect: Networks and Network Security
Connect and Protect: Networks and Network SecurityConnect and Protect: Networks and Network Security
Connect and Protect: Networks and Network Security
VICTOR MAESTRE RAMIREZ
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
Transcript: Canadian book publishing: Insights from the latest salary survey ...
Transcript: Canadian book publishing: Insights from the latest salary survey ...Transcript: Canadian book publishing: Insights from the latest salary survey ...
Transcript: Canadian book publishing: Insights from the latest salary survey ...
BookNet Canada
 
Vibe Coding_ Develop a web application using AI (1).pdf
Vibe Coding_ Develop a web application using AI (1).pdfVibe Coding_ Develop a web application using AI (1).pdf
Vibe Coding_ Develop a web application using AI (1).pdf
Baiju Muthukadan
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Raffi Khatchadourian
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Canadian book publishing: Insights from the latest salary survey - Tech Forum...
Canadian book publishing: Insights from the latest salary survey - Tech Forum...Canadian book publishing: Insights from the latest salary survey - Tech Forum...
Canadian book publishing: Insights from the latest salary survey - Tech Forum...
BookNet Canada
 
Ad

Learn what Bitcoin and Blockchain is for beginners

  • 2. ● Crypto digital asset to make digital transactions ● Should be secure ● Cryptocurrencies can be anonymous
  • 3. I wish I had one
  • 4. ● Satoshi Nakamoto is the inventor of Bitcoin -> just a name we don’t actually know who he is Bitcoin = cryptocurrency Blockchain = distributed database (recording things) They have never confessed who they are yet
  • 5. Blockchain ● Electronic database that records bitcoin transactions ● No central source for a hacker to go after ● Blockchain is very secure ● You know each and every individual transaction(personally, I dislike this) ● Blockchain rules change over time ● There is no authoritative centralized source ● Without the cloud, blockchain wouldn’t run and when has the cloud ever gone down?
  • 7. Blockchain Decentralized ledger It gives peer to peer transactions without the need for a third party To do a transaction you need a private and public key Public key = address to receive funds Private key is like the bank card pin number To keep track of our crypto currency, blockchain uses a ledger which is a file that keeps track of all the transactions
  • 9. Bitcoin mining ● Used with a software to solve math problems ● Bitcoins are given as a reward ● More minors = more security ● ASIC chips cause the problems to be solved faster ● What is really being mined? ● Blocks for the blockchain are being MINED ● When the first bitcoin was mined you would get 50 Bitcoins per block
  • 10. Ethereum A platform with its own currency Developers can build their blockchain based programs Winner or loser would transfer from one player to another
  • 12. What is a block in blockchain A blockchain is a list of linked blocks that are linked by cryptography. The blocks holds ● Transaction data ● A timestamp -> uses UNIX time ● Cryptographic hash that converts the previous block data into a fixed length of random data ->the generated hash key stores the data of the current block and the address of the next block-> Bitcoin uses SHA256 ● Nonce -> number used once, used in a proof of work blockchain, Bitcoin stores the value of a previous block as a hash value for the current block now one can change a block without modifying all other blocks in the chain ● Mining is when a miner tries to guess the correct nonce when calculating a block hash and then they receive rewards
  • 13. Genesis Block ● The first block on a blockchain ● The next block will have the hash of the genesis block ● Modern versions of bitcoin call it block 0 ● It is the first block ever mined ● The first genesis block was created by satoshi nakamoto
  • 14. SHA2 ● Designed by the united states national security agency NSA ● First published 2001 ● Creates hash values that are 224, 256, 384,512 bits ● SHA-1 and SHA-2 are secure hash algorithms required by law for use in certain U.S government applications
  • 16. Double Spend ● What if you wanted to reverse a transaction ● Its immutable YOU CANNOT REVERSE ● Spending money more than once is also a problem -> oof ● If you paid for something and it wasn’t committed then that money could be spent again and blockchain will wonder how to resolve the issue…. ● With real money we do not have this problem ● A gap when something occurs and then there is a time gap ● They use a timestamp and give the money to the first person.
  • 17. What type of encryption Cryptography is used to protect the privacy of transactions
  • 18. Why the growth? ● Processes transaction faster since it is not a centralized system ● Allows user to raise a query on the transaction in real-time ● Helps create a digital identity, decentralized system will offer easy access to all information in the system to access the information from anywhere ● Helps data be real and unalterable ● 💬1 - When and Why to Use Blockchain Technology | Blockchain Council (blockchain-council.org) ● Open to the public ● Any user can view the entire blockchain, helps all users verify the data ● No central point to attack, no single point of entry for hackers ● No middleman which is expensive, time consuming Why Use Blockchain Technology? | Bernard Marr
  • 19. Gathering data about Satoshi Began coding the first implementation of bitcoin in c++ 2007 Wrote the first bitcoin whitepaper In Jan 2009 he finally launches the bitcoin opensource code Over time the bitcoin began to grow they began contributing His code was great but it did have bugs