Blockchain
vs Bitcoin:
Stuart Haber and W first outlined the Blockchain technology in 1991. Scott Storyette, a system where two people wanted to implement a system that could not tamper with document timestamps. Nearly two years later, the blockchain was having its first real-world application with the launch of Bitcoin in January 2009.
Here's how it works.
You have all these people, who have bitcoin all over the world. A lot of people around the world possess a bitcoin, probably. Let's say one of those many people who want to spend bitcoin on their groceries. It is here that the blockchain comes in.
When it comes to printed money, a central authority, usually a bank or government, regulates and verifies the use of printed currency — but no-one controls Bitcoin. Instead, a network of computers verifies transactions done in bitcoin. This is what the Bitcoin network and blockchain is "decentralized."
Though transactions are publicly recorded on the blockchain, not-or at least not in full user data. Participants will run a system inside the Bitcoin network, called a "wallet." Each wallet has two cryptographic keys which are unique and distinct: a public key and a private key. The public key is where the transactions are deposited to and selected from. This is also the key that appears on the digital signature of the user as a blockchain ledger.
Public and Private Key Basics:
You can think of the public key as a school locker and a private key locker combination. Teachers, students, and even your attraction can insert letters and notes by opening them in your locker. However, the only person who can retrieve the contents of the mailbox is the unique key. However, it should be noted that while the school locker combinations are kept in the head office, there is no central database that tracks the private keys of a blockchain network. If a user misplaced their private key, they could lose access to Bitcoin's wallet, just like this man who made national headlines in December 2017.
Single public chain
In the bitcoin network, blockchain is not only shared and maintained by a network of public users - but it is also acknowledged. When users join the network, their connected system receives a copy of the blockchain, which is updated whenever new transactions are added. But what if, by human error or the efforts of a hacker, a user's blockchain copy must be different from all other copies of the blockchain?
Theoretically, hacker-proof
A hacker can theoretically take advantage of the majority rule known as an attack of 51 percent. Here's how it does happen. Let's assume the Bitcoin network comprises five million machines, which is a huge underestimate but a convenient amount to split. A hacker must control at least 2.5 million, and one of those computers, to get the majority on the network. In doing so, the attacker or group of attackers can interfere with new transaction recording. They can send a transaction and then modify it so they still have the coin they've been spending. This vulnerability, known as double-spending, is the digital equivalent of a valid counterfeit and enables users to spend twice as much on their bitcoins.
It is very difficult to implement a blockchain such as Bitcoin, because an attacker may need to take control of millions of computers. When Bitcoin was first established in 2009 and had dozens of its users, it would have been easy for an attacker to control the vast amount of computational power in the network. This defining characteristic of the blockchain is flagged as a weakness for developing cryptocurrencies.





No comments:
Post a Comment