본문 바로가기

0/blockchain

(9)
Ethereum Scaling Overview The main goal of scalability is to increase transaction speed, and transaction throughput, without sacrificing decentralization or security. On-Chain Scaling It requires changes to the Ethereum protocol. Sharding is currently the main focus for it. Sharding : the process of splitting a database horizontally to spread the load. It will reduce network congestion and increase TPS by creati..
재밌는 스마트 컨트랙트, NFT 튜토리얼 NFT와 가상 화폐 시장이 다시 핫해지면서 멀어졌던 블록체인에 대한 관심이 다시 슬금슬금 올라오고 있었던 중에 친구에게 재미난 튜토리얼을 추천받았다. buildspace라는 곳에서 만든 것들인데 가입 절차도 간단하고 기술적인 쪽에 치우쳐진 튜토리얼이라기보다는 친구랑 대화하는 느낌으로 대략적인 개념들을 설명해주는 튜토리얼들이다. 하루 4시간 정도면 완료할 수 있으니 부담도 별로 없다! https://buildspace.so/ buildspace Start building cool web3 projects, earn NFTs, access secret work opportunities in crypto. buildspace.so
Bitcoin and Cryptocurrencies Week 4 (Summary) (2) 1. Types of Users Bitcoin makes the distinction of 4 key functionalities that every node in the network is a combination of: Wallets: management of keys and addresses Mining: the voting process which expends computational power Full Blockchain : a copy of the full Bitcoin blockchain Routing: software that allows you to talk to other Bitcoin nodes We can make powerful generalizations using these ..
Bitcoin and Cryptocurrencies Week 4 (Mining) (1) Step 0 : Download the entire Bitcoin blockchain. This only has to be done once. This allows us to know the history so we can validate future transactions. Note: This step is optional if you mine in a mining pool or are doing lightweight mining. Step 1: Verify transactions You store newly received, unprocessed transactions in a "mempool," where all pending transactions live before making their wa..
Bitcoin and Cryptocurrencies Week 3 (Bitcoin Mechanics & Optimizations) (3) 1. Cryptographic Hash Funcitons In this lecture, we dove into the low-level specifics of Bitcoin that make it work. Bitcoin was innovative because it allowed a decentralized network to reach consensus. It achieved this via tamper-evidence, which means although one can modify the information that passes along the Bitcoin network, it would be obvious that some modification has been made. This tamp..
Bitcoin and Cryptocurrencies Week 3 (Bitcoin Mechanics & Optimizations) (2) Signatures, ECDSA, and Addresses DIGITAL SIGNATURE SCHEMES (DSS) Alice uses ECDSA to generate private and public keys. Bob needs Alice's public key. Alice signs her message. Alice sends message + signature. (The message is the main payload, and the signature can be used to prove that Alice was the one who created that exact message.) Bob can easily verify if Alice signed. 암호화 알고리즘으로 ECC를 사용 ^^; ..
Bitcoin and Cryptocurrencies Week 3 (Bitcoin Mechanics & Optimizations) (1) Cryptographic Hash Functions Cryptographic hash function: Preimage resistance Given H(X), it is computationally difficult to determine X Second preimage resistance Given X, it is computationally difficult to find some value X' such that H(X) == H(X') Collision resistance It is computationally difficult to find X and Y such that H(X) == H(Y) Avalanche effect: a small change in the input produces ..
Bitcoin and Cryptocurrencies Week 2 (Blockchain History: From the Cypherpunk Movement to JP Morgan Chase) 1. Pre-Bitcoin: Libertarian Dreams In the face of increasingly powerful banks and national agencies, the Cypherpunks and Crypto-anarchists of the late 1980s advocated the use of cryptography to preserve privacy, which they defined as the power to selectively reveal oneself. They sought to devleop an anonymous digital transaction system. In October 2008, Satoshi Nakamoto released the Bitcoin whit..