Professional Documents
Culture Documents
Blockchain Part 3
Blockchain Part 3
ETHEREUM BLOCKCHAIN
BITCOIN BLOCKCHAIN
PURPOSE PURPOSE
Bitcoin Blockchain Algorithm uses Proof-of-Work (POW) 2015 Ethereum Blockchain Algorithm uses Proof-of-Stake (POS)
What Gave Rise to Ethereum Blockchain?
Ethereum is a programmable blockchain. Like a blank canvas it is up to entrepreneurs or
developers to design anything using their own laws and protocols. Freedom to create their
own operations.
MISSION
3
Block transaction speed. Bitcoin’s average algorithm block time is 10
minutes whereas Ethereum have been successful with 12
seconds. Ethereum give users greater opportunity to complete
more blocks.
MISSION
2
(1)
P r o o f o f Wo r k v s . P r o o f o f S
Algorithm take
Publi (2)
sh D e c e n t r App Store
a l i se d (3) E xe c u t i o n o f S m
A p p l i ca t i o Contract logic art
ns ( D a p p ) Contracts
Proof of Work (POW)
Threat however happens when hackers are able to attack over the 51% of the
network/nodes. Has this happened before?
Yes, but not an everyday scam. This is because it means taking over 51% of all
processing power and that takes massive amounts of energy and grossly
expensive. It remains a key concern for many blockchain(s) to this day that
uses Bitcoin Blockchain Technology.
• Instead of miners, POS has validators. They do not use processing power to
secure blocks, instead they literally stake their funds/coins on the blocks. A coin
could be Bitcoin.
• Validators will receive a cut of the fees included in the block, proportional to the
amount they had previously staked. For example validators who owns 5% of
the Bitcoin can theoretically validate only 5% of the Ethereum blocks.
• Access the link below. Read to find out top POS coins for 2020.
https://medium.com/@karloabart/top-list-of-proof-of-stake-coins-for-2020-534816e9a715
Ethereum
Decentralised App (dapps)
How is it Different?
Dapps has its backend code running on a decentralised peer-to-peer network. Contrast
this to a typical app we all know the backend code is running on centralised servers. Hence,
dapps!
Dapps built on Ethereum blockchain can do things regular centralised applications cannot.
For example:
2) A triggering event like an expiration date and strike price is hit, the smart
contract
executes itself according to the coded terms. The code automatically executes.
3) Once executed, the terms of the contract will automatically transfer the value to
the relevant parties.
h ttp s ://c r y p to z o m b ie s . io /
h ttp s ://c r y p to z o m b ie s . io /
The crypto address is derived from the public key through hash
algorithm (hash function).
When you paste the address into the Blockchain wallet, the software checks
the address prefixes and calculates the checksum. If it does not match, it
rejects the address. This makes it impossible to send crypto to a wrong
address due to typing error.
Therefore, if you have the private key for an address, only you can sign a
transaction token assigned to this address. The public key is used to verify
the digital signatures. This to and fro process is all but significant, that let
you transfer through the Blockchain wallet.
1BvBMSEYstWetqTFn5Au4m4GFg7xJaNVN2 (https://en.bitcoin.it/wiki/Address)
https://metamask.io/
Level 1
Security is designed to prevent users from losing account access. It allows
users to verify their email address, create a 12-word backup recovery phrase
that can be used if a password is forgotten, and set up a password hint
(Blockchain does not store the password).
Level 2
Security is designed to prevent others from gaining unauthorized access to
Wallet Security the wallet and includes linking a phone number to the account to receive a
one-time password when the account is logged into, and creating two-step
authorization.
Level 3
Security allows users to block TOR requests. TOR is a global network of
servers that allows users to route their web traffic through multiple
computers with the goal of preventing anyone from tracing the origins back
to the user.
https://txstreet.com/v/eth-btc
There are risks for just about everyone Particularly for the Financial Services and There have been several successful attempts by
participating in the blockchain. Key question eCommerce industries, blockchains are hackers to command a miner’s computing power to
is always does it work? Solidity disrupting business models and perhaps make the blockchain believe the winning miner is the
developers building smart contracts for the reducing revenues. There is also a huge risk hacker. Hackers will use your computing power
Ethereum platform, or the millions of of the conglomerate economic drivers are not using malware and launch a variety of attacks against
cryptocurrency investors in bitcoin, ether, exploring Blockchain and not playing the role blockchain. With so many new cryptocurrencies that
and coins poses the fundamental threat of as the first mover advantage. Small promise the new Internet of Future for blockchain, it
unsettlement in the blockchain space. businesses will thrive but another will be difficult to recognise legitimate services
fundamental question is always will their versus scams, Ponzi schemes. For example Japan
blockchain be scalable and adopted? bitcoin exchange Mt.Gox Hack!