SlideShare a Scribd company logo
1 of 54
Understanding Blockchain
Technology ‘Teach-In’ & Introduction
Tony Willenberg, Co-founder/CTO, Neocapita
tony.willenberg@neoapita.com
PGP: 716E E331 2D94 51AC 6FFE 9B67 5772 7AB5 F78A 4920
Finance Watch, FinTech Workshop #1
Leopold Hotel, Rue du Luxembourg 35, 1050 Brussels, Belgium
09:00-10:30, 14th November 2017
Outcomes
I The Bitcoin Story • Understand what got us to this point.
II Distributed Ledger Technology
• Understand the implications this technology has for
our world.
III Key Concepts
• Understand the key concepts, sufficiently well, so as
to think through the impact on citizens, businesses,
and governments.
IV Issues to Explore • Understand the current issues in the debate.
I. The Bitcoin Story
A long time ago…
(in Internet time, that is)
Transactions
• Trusted third parties intermediate long-range transactions
(strangers).
• Trust is centralised: Visa, Sony, SWIFT, central bank, government.
• These actors provide us with valuable services.
• Intermediation involves clearance, settlement, verification, escrow,
privacy, integrity, authentication, non-repudiation.
• Intermediation is friction. Friction is inefficient. Friction can be
frustrating.
• Data and logic are independent.
Transaction Networks
Then…
August 2008
bitcoin.org is registered
November 2008
Bitcoin paper is published
January 2009
“The Times 03/Jan/2009 Chancellor on
brink of second bailout for banks.”
Satoshi Nakamoto → Hal Finney, 10 BTC
First bitcoin transaction takes place
January 2009
• Bitcoin software, free/open
source.
• a.k.a. Node, Bitcoin Software,
Node Software, Wallet Software,
Reference Client, Satoshi Client.
• Originally called: Bitcoin, then
Bitcoin-Qt, then Bitcoin Core.
• Need about 145 GB of disk
space.
Bitcoin
“Bitcoin is a collection of concepts and technologies
that form the basis of a digital money ecosystem.
Units of currency called bitcoin are used to store and
transmit value among participants in the bitcoin
network.”
Source: Antonopoulos, M. (2014)
Revolutionary
• Mathematical relationships to relate transactions to people/machines
• Arrange transaction data so transactions are tamper-proof
• Algorithm to replicate the ledger of transactions globally
• Method for arriving at a consensus on the global state of the ledger
• Become a user of bitcoin by downloading a wallet
• Proving you have done “work” shows your investment in the network
• Transaction fees mean it costs you to be mean to the network
Now…
Adoption
• Bitcoin (BTC); Litecoin (LTC); Ethereum (ETH); Zcash
(ZEC); Dash (DASH, formerly Darkcoin); Ripple (XRP);
Monero (MXR); more than a thousand digital currencies
now in existence
• Total market capitalisation: US$ 200B (or in the top 25 on
the S&P 500)
• Chicago Mercantile Exchange establishes a
cryptocurrency futures trading fund (US), the Bitcoin
Reference Rate (BRR) and the Bitcoin Real Time Index
(BRTI)
• Commodities Futures Trading Commission sets up
Derivatives Clearing Organisation with Swap Execution
Facility for fully collateralised digital currency swaps (USA)
Source: https://coinmarketcap.com, updated: November 8 2017 @ 6:02 pm
Adoption
• One can buy bitcoin in all post offices (source)
(Austria)
• FinCEN Fines levied $700,000 fine against
Ripple Labs Inc. for violation of requirements
under the Bank Secrecy Act (source) (USA)
• Regulatory limitations on use of
cryptocurrencies to prevent money flight
(China)
• Countries encourage cryptocurrencies for
legal commerce (Japan, South Korea, Russia)
Source: https://www.blockchain-austria.gv.at/; https://blockchainhub.net/blog/tag/blockchain/
Extended Bitcoin Network
Source: Figure 8-3, Antonopoulos, M. (2014)
From Bitcoin came…
Transaction Networks Today
II. Distributed Ledger Technology
(DLT)
DLT
Source: Based on Birch (2016) cited in “Distributed Ledger Technology: Beyond Blockchain”, Government Office for Science, Government of the United Kingdom.
How many copies?
Who can use the copies?
Who integrates the ledger?
[anyone]
[group of owners] e.g. a clearing and settlement
network
[one]
e.g. personal bank account
[many]
[any user, by untrusted consensus]
[trusted ledger owners or by validation] e.g. Ripple (XPR) (a global
financial transactions system),
consortium chains
Bitcoin (BTC), Ethereum (ETH), Litecoin
(LTC), Monero (XMR)
Functional Components
Distributed Ledger Technology
1. Shared Ledger 2. Smart Contracts 3. Tokens
Shared Ledger
• Transactions are linked together into blocks (Merkle Tree | Binary Hash
Tree).
• Blocks are chained together into the blockchain.
• Tampering with a transaction, invalidates the block and the blockchain from
the falsified transaction onwards.
• The blockchain is replicated (think of BitTorrent).
• Every record in the ledger is timestamped and cryptographically signed, thus
making the ledger an auditable history of all transactions in the network.
• Transactions can be anything, but there is a size limitation.
• It is not necessarily a database.
Smart Contract
• A.k.a. cryptocontract.
• Is a program that contains instructions for transfer of cryptocurrency.
Data inside the program & logic for how to change the data are now
indivisible, sealed in a cryptographic unit on the blockchain.
• Live on the blockchain at a unique global address, are open for
reading, but cannot be tampered with.
• Transactions represent either: (a) transfer of token to a person, or (b)
transfer of token to a cryptocontract to execute.
Smart Contract
10 ETH
Tokens
• Bitcoin is a token.
• You get tokens by mining them, receiving them in transaction fees, created
in a smart contract, or someone sends (pays) them to your address (A)
• Virtually implemented by virtue of the UTXO and wallet software.
• Private keys enable spending, public keys enable receiving.
• The ERC20 token standard can represent anything that can be digitised.
III. Key Concepts
The Double-Spend Problem
• Is the Byzantine General’s Problem (1982): solutions attempted before,
largely centralised solutions.
• Solved with novel tools (at least 4):
• (a) proof-of-work (game theory),
• (b) cryptography (mathematics),
• (c) peer-to-peer database replication (computer science),
• (d) transaction fees (economics).
Source: http://marknelson.us/2007/07/23/byzantine/
Proof-of-Work
• A way of signalling an investment in and concern about the best interests
of the ecosystem.
• Do a computation and if you find the solution first, the network mints
Bitcoin and gives it to you as a reward.
• “A proof-of-work (POW) system (or protocol, or function) is an economic
measure to deter denial of service attacks and other service abuses such
as spam on a network by requiring some work from the service
requester, usually meaning processing time by a computer.”
Source: https://en.wikipedia.org/wiki/Proof-of-work_system
Proof-of-Stake
• In Proof-of-Stake-based cryptocurrencies the creator of the next block is
chosen via various combinations of random selection, wealth, and age (i.e.
their stake in the ecosystem).
• Those guarding the coins, own the coins.
• NXT, Blackcoin, Peercoin, Ethereum
Private-Public Key
• Symmetric Cryptography = both parties must know
a shared secret first;
• Asymmetric Cryptography = parties keep a
personal secret (private key) linked mathematically
to something that can be shared (public key).
• Private keys are just big numbers: 1 up to ≈2256-1.
The size of bitcoin’s private key space, (2256) is an
unfathomably large number. It is approximately
1077 in decimal. For comparison, the visible
universe is estimated to contain 1080 atoms.
Your Private Key
Private-Public Key
Private
Public
ECDSA
Elliptic Curve Multiplication
• Using a special set of curves,
move from initial point k to a final
location on the curve K => trapdoor
function.
Source: https://en.bitcoin.it/wiki/Secp256k1; Standard for Efficient Cryptography 2 (SEC 2), Certicom Corp. (2010).
• Can be performed on mobile and
IoT devices. We have used it in
WAP security. NIST/Certicom Corp.
Hash Functions
• “fingerprints” = hash codes = hashes = digests = hash values = message
authentication codes => integrity
• Cryptographic functions (1-way) are a subclass of hash functions (2-way).
• Examples:
• SHA: Secure Hashing Algorithm
• RIPEMD-160: Research and Development in Advanced Communications
Technologies in Europe (RACE) Integrity Primitives Evaluation
• The ideal hash function has three main properties:
1. easy to calculate a hash for any given data.
2. computationally difficult to reverse.
3. unlikely that two slightly different messages will have the same hash.
Hash Functions
Example (SHA-256)
Input Output
the quick brown fox jumps
over the lazy dog
1153a4080f1fcb04425aa0b8
41c2b14606fe6df25d9076d2a
1face2d5af57129
the quick brown fox
jumped over the lazy dog
57385e0f6d48919ae32d0b15
5c86210a74a0a477b8260ad2
1eae65b13f146df6
Addresses
• A has built-in checks to make transcription easier.
• A comes from the k (via K).
• (Bitcoin address) A => Allows receiving bitcoin.
• (Private key) k => Allows spending bitcoin.
Signing & Validating
Signing: Private Key + Transaction = Signature
Validating: Public Key + Transaction = Valid Signature
Nodes
• Wallet (W), miner (M), blockchain (B), & networking (N)
• W|M|B|N = “reference client” node
• W|N = “lightweight wallet” node
• B|N|M = “solo miner” node
• B|N = “full blockchain” node
Source: Figure 8-1, Antonopoulos, M. (2014)
Wallets
• Wallets contain private keys, not coins.
• Wallets can be web, hardware, software, or paper.
• Early wallets were “random” wallets. Bitcoin Core uses a random wallet.
• The latest and safest wallets are “hierarchically deterministic”: effectively a
keychain, e.g. Ledger, Trezor, (see BIP-32, 39, 43, 44).
• Wallets need to be backed up to “cold storage”.
• Generate the private keys (k), the corresponding public key (K), and then
the easy-to-remember bitcoin addresses (A).
Wallets
Wallets know which transactions on the blockchain have been
sent to bitcoin addresses the wallet controls - wallets read the
blockchain, tally up unspent transactions and, in this way,
know how much bitcoin is held in the wallet.
Wallets
Source: Based on Figure 2-4, Antonopoulos, M. (2014)
tn-2
tn-1
tn
Alice’s Wallet Balance: 0.1000 BTC
Alice’s Wallet Balance: 0.0495 BTC
Alice’s Wallet Balance: 0.0995 BTC
Mining
• Proving that you’re honest by doing work that benefits the
ecosystem.
• Earn coinbase & transaction fees.
• Application specific integrated circuits (ASIC) dedicated to
mining.
• Mining pools group resources, shared rewards and fees.
Consensus
5 Steps...
1. Propagation of transactions.
2. Verification of transactions (long list of criteria).
3. Aggregation into new blocks based on a proof-of-work.
4. Verification of new blocks and assembly into chain.
5. Selection of the most computationally intensive chain.
Forks
• Occur regularly, any time two miners find a block at nearly the same time.
• Occur intentionally when node software is modified with new rules (e.g. 1st
August 2017 => BTC and BCH (BIP 91)).
Smart Contracts
• Can be simple logic, such as “pay at time” (say, BTC) or complex logic
such as a Decentralised Autonomous Organisation (DAO) (say, ETH).
• The vision of Ethereum (ETH) is “an unstoppable censorship-resistant self-
sustaining decentralised world-scale computing platform”.
• Computer programs live on the blockchain, they compute whenever they
are given ‘gas’ (via a transaction), and change the state of entities that live
on the blockchain.
• Smart contracts are also known as “dApps” or Distributed Applications.
V. Issues to Explore
Classification
• Store of value?
• Finite supply (21 million by 2140). Algorithmically determined.
• Investment? Token?
• Unbacked, but so are most floating fiat currencies.
• No monetary policy “levers” - no fractional reserve banking.
• Volatile now, but steadily decreasing.
Identity
• ‘Permissioned’ networks critical for delivery of government services. Who
is permitted to get what and how much?
• Therefore, citizen identity will be fundamental to adoption.
• Maintenance of privacy precarious in centralised model - distributed gives
back citizen control over information (which we try to mirror in our systems
today, anyway).
Complexity
• Perhaps obviously, it was not until an application my Grandmother could
use to make voice-over-IP calls, could one say: voice-over-IP technology
has gone mainstream.
• Wallets need to be easy to use: HD-wallets (BIP-32, 39, 43, 44).
• All or nothing - lose the keys, lose the cryptocurrency, forever.
Legal Coding
• New jobs will emerge, like legal coding.
• Judicial branches of government will need systems, training, resources.
• Contracts will span one or more jurisdictions regularly.
• Digital audit trails will often be presented as evidence.
• Constitutions, laws, regulations will need re-thinking.
• Lawyers will need to understand the technology.
• Countries will need to adopt or be unable to participate.
Capital Raising
• Only a few dozen working finished products & platforms.
• Concepts are attracting millions in seed funding.
• Initial Coin Offerings (ICO) not regulated in the same way that IPOs are.
Data Custodianship
• Data lives “everywhere”, no departments, no divisions, global jurisdiction.
• Private-public Keys and Smart Contracts provide the “garden wall”.
• If we accept cryptocurrency, then physical boundaries are moot.
Energy
• Mining puts computers to work on a problem, but the problem is
meaningless outside the cryptocurrency network => wasted energy.
• “Environmental disaster”
• = Slovakia, Ireland
• Homes: 2,479,349 (Bitcoin) v 50,000 (Visa)
• SETI @ Home (UCB), Einstein@Home (Max Planck Institute),
Folding@Home (Stanford) => uses what would otherwise be, wasted
energy.
Source: https://digiconomist.net/bitcoin-energy-consumption
26.78 TWh projected for 2017
Thank You
info@neocapita.com

More Related Content

What's hot

Blockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction CourseBlockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction CourseJean-Marc Seigneur
 
Introduction to blockchain and crypto currencies
Introduction to blockchain and crypto currenciesIntroduction to blockchain and crypto currencies
Introduction to blockchain and crypto currenciesRohas Nagpal
 
1% OF EVERYTHING ABOUT BLOCKCHAIN
1% OF EVERYTHING ABOUT BLOCKCHAIN1% OF EVERYTHING ABOUT BLOCKCHAIN
1% OF EVERYTHING ABOUT BLOCKCHAINRavi Choudhary
 
Blockchian introduction
Blockchian introductionBlockchian introduction
Blockchian introductionkesavan N B
 
Restribute ~ Wealth re-distirbution by blockchain hardfork ~
Restribute ~ Wealth re-distirbution by blockchain hardfork ~ Restribute ~ Wealth re-distirbution by blockchain hardfork ~
Restribute ~ Wealth re-distirbution by blockchain hardfork ~ Tomoaki Sato
 
Blockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v engBlockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v engDavid Vangulick
 
Hyperledger Consensus Algorithms
Hyperledger Consensus AlgorithmsHyperledger Consensus Algorithms
Hyperledger Consensus AlgorithmsMabelOza12
 
Consensus Algorithms: An Introduction & Analysis
Consensus Algorithms: An Introduction & AnalysisConsensus Algorithms: An Introduction & Analysis
Consensus Algorithms: An Introduction & AnalysisZak Cole
 
Iceic2019 final presented
Iceic2019 final presentedIceic2019 final presented
Iceic2019 final presentedHeung-No Lee
 
Crypto Wallets: A Technical Perspective (Nakov at OpenFest 2018)
Crypto Wallets: A Technical Perspective (Nakov at OpenFest 2018)Crypto Wallets: A Technical Perspective (Nakov at OpenFest 2018)
Crypto Wallets: A Technical Perspective (Nakov at OpenFest 2018)Svetlin Nakov
 
Blockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMBlockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMDiego Alberto Tamayo
 
A research-oriented introduction to the cryptographic currencies (starting wi...
A research-oriented introduction to the cryptographic currencies (starting wi...A research-oriented introduction to the cryptographic currencies (starting wi...
A research-oriented introduction to the cryptographic currencies (starting wi...vpnmentor
 
Blockchain : A Key Player in Metaverse.pptx
Blockchain : A Key Player in Metaverse.pptxBlockchain : A Key Player in Metaverse.pptx
Blockchain : A Key Player in Metaverse.pptxDr. Mohamed Torky
 
Iota - Structure and Validation Method
Iota - Structure and Validation MethodIota - Structure and Validation Method
Iota - Structure and Validation MethodJY Chun
 
"The Blockchain Effect on the Future of the Humanities" by Sherry Jones (July...
"The Blockchain Effect on the Future of the Humanities" by Sherry Jones (July..."The Blockchain Effect on the Future of the Humanities" by Sherry Jones (July...
"The Blockchain Effect on the Future of the Humanities" by Sherry Jones (July...Sherry Jones
 
Introduction to Ethereum
Introduction to EthereumIntroduction to Ethereum
Introduction to EthereumArnold Pham
 
Whitepaper blockchain technology and investment
Whitepaper blockchain technology and investmentWhitepaper blockchain technology and investment
Whitepaper blockchain technology and investmentIbrahim Khatri
 

What's hot (20)

Blockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction CourseBlockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction Course
 
Introduction to blockchain and crypto currencies
Introduction to blockchain and crypto currenciesIntroduction to blockchain and crypto currencies
Introduction to blockchain and crypto currencies
 
1% OF EVERYTHING ABOUT BLOCKCHAIN
1% OF EVERYTHING ABOUT BLOCKCHAIN1% OF EVERYTHING ABOUT BLOCKCHAIN
1% OF EVERYTHING ABOUT BLOCKCHAIN
 
Blockchian introduction
Blockchian introductionBlockchian introduction
Blockchian introduction
 
02 hello smart contracts
02 hello smart contracts02 hello smart contracts
02 hello smart contracts
 
Restribute ~ Wealth re-distirbution by blockchain hardfork ~
Restribute ~ Wealth re-distirbution by blockchain hardfork ~ Restribute ~ Wealth re-distirbution by blockchain hardfork ~
Restribute ~ Wealth re-distirbution by blockchain hardfork ~
 
Pi network
Pi networkPi network
Pi network
 
Blockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v engBlockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v eng
 
Hyperledger Consensus Algorithms
Hyperledger Consensus AlgorithmsHyperledger Consensus Algorithms
Hyperledger Consensus Algorithms
 
Consensus Algorithms: An Introduction & Analysis
Consensus Algorithms: An Introduction & AnalysisConsensus Algorithms: An Introduction & Analysis
Consensus Algorithms: An Introduction & Analysis
 
Iceic2019 final presented
Iceic2019 final presentedIceic2019 final presented
Iceic2019 final presented
 
Crypto Wallets: A Technical Perspective (Nakov at OpenFest 2018)
Crypto Wallets: A Technical Perspective (Nakov at OpenFest 2018)Crypto Wallets: A Technical Perspective (Nakov at OpenFest 2018)
Crypto Wallets: A Technical Perspective (Nakov at OpenFest 2018)
 
Blockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMBlockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBM
 
A research-oriented introduction to the cryptographic currencies (starting wi...
A research-oriented introduction to the cryptographic currencies (starting wi...A research-oriented introduction to the cryptographic currencies (starting wi...
A research-oriented introduction to the cryptographic currencies (starting wi...
 
Blockchain : A Key Player in Metaverse.pptx
Blockchain : A Key Player in Metaverse.pptxBlockchain : A Key Player in Metaverse.pptx
Blockchain : A Key Player in Metaverse.pptx
 
Iota - Structure and Validation Method
Iota - Structure and Validation MethodIota - Structure and Validation Method
Iota - Structure and Validation Method
 
"The Blockchain Effect on the Future of the Humanities" by Sherry Jones (July...
"The Blockchain Effect on the Future of the Humanities" by Sherry Jones (July..."The Blockchain Effect on the Future of the Humanities" by Sherry Jones (July...
"The Blockchain Effect on the Future of the Humanities" by Sherry Jones (July...
 
Introduction to Ethereum
Introduction to EthereumIntroduction to Ethereum
Introduction to Ethereum
 
Whitepaper blockchain technology and investment
Whitepaper blockchain technology and investmentWhitepaper blockchain technology and investment
Whitepaper blockchain technology and investment
 
Ethereum Intro
Ethereum IntroEthereum Intro
Ethereum Intro
 

Similar to Understanding Blockchain

Blockchain and Cryptocurrencies
Blockchain and CryptocurrenciesBlockchain and Cryptocurrencies
Blockchain and CryptocurrenciesnimeshQ
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisInderjeet Singh
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysisinder_barara
 
Resource slides for blockchain related question
Resource slides for blockchain related questionResource slides for blockchain related question
Resource slides for blockchain related questionLin Lin (Wendy)
 
Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchainseancarmody
 
An Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / BlockchainAn Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / BlockchainBernard Leong
 
Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014WeKCo Coworking
 
Indjic fintech module 6
Indjic fintech module 6Indjic fintech module 6
Indjic fintech module 6Drago Indjic
 
blockchain bootcamp @WCNJ
blockchain bootcamp @WCNJblockchain bootcamp @WCNJ
blockchain bootcamp @WCNJAsh Yadav
 
An in depth presentation of Cryptocurrency.
An in depth presentation of Cryptocurrency.An in depth presentation of Cryptocurrency.
An in depth presentation of Cryptocurrency.SanjeebSamanta1
 
BCHGraz - Meetup #8 - Intro & Ethereum
 BCHGraz - Meetup #8 - Intro & Ethereum BCHGraz - Meetup #8 - Intro & Ethereum
BCHGraz - Meetup #8 - Intro & EthereumBlockchainHub Graz
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and BitcoinHugo Rodrigues
 
A technical Introduction to Blockchain.
A technical Introduction to Blockchain.A technical Introduction to Blockchain.
A technical Introduction to Blockchain.Dev
 

Similar to Understanding Blockchain (20)

Blockchain and Cryptocurrencies
Blockchain and CryptocurrenciesBlockchain and Cryptocurrencies
Blockchain and Cryptocurrencies
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
 
Resource slides for blockchain related question
Resource slides for blockchain related questionResource slides for blockchain related question
Resource slides for blockchain related question
 
BlockChain.pptx
BlockChain.pptxBlockChain.pptx
BlockChain.pptx
 
Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchain
 
crypto ppt.ppt
crypto ppt.pptcrypto ppt.ppt
crypto ppt.ppt
 
An Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / BlockchainAn Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / Blockchain
 
Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014Blockchain - Presentacion Betabeers Galicia 10/12/2014
Blockchain - Presentacion Betabeers Galicia 10/12/2014
 
Indjic fintech module 6
Indjic fintech module 6Indjic fintech module 6
Indjic fintech module 6
 
module-1.pptx
module-1.pptxmodule-1.pptx
module-1.pptx
 
blockchain bootcamp @WCNJ
blockchain bootcamp @WCNJblockchain bootcamp @WCNJ
blockchain bootcamp @WCNJ
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
 
Blockchains 101
Blockchains 101Blockchains 101
Blockchains 101
 
An in depth presentation of Cryptocurrency.
An in depth presentation of Cryptocurrency.An in depth presentation of Cryptocurrency.
An in depth presentation of Cryptocurrency.
 
BCHGraz - Meetup #8 - Intro & Ethereum
 BCHGraz - Meetup #8 - Intro & Ethereum BCHGraz - Meetup #8 - Intro & Ethereum
BCHGraz - Meetup #8 - Intro & Ethereum
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
Blockchain Corporate Style
Blockchain Corporate StyleBlockchain Corporate Style
Blockchain Corporate Style
 
A technical Introduction to Blockchain.
A technical Introduction to Blockchain.A technical Introduction to Blockchain.
A technical Introduction to Blockchain.
 
Block chain
Block chainBlock chain
Block chain
 

Recently uploaded

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Understanding Blockchain

  • 1. Understanding Blockchain Technology ‘Teach-In’ & Introduction Tony Willenberg, Co-founder/CTO, Neocapita tony.willenberg@neoapita.com PGP: 716E E331 2D94 51AC 6FFE 9B67 5772 7AB5 F78A 4920 Finance Watch, FinTech Workshop #1 Leopold Hotel, Rue du Luxembourg 35, 1050 Brussels, Belgium 09:00-10:30, 14th November 2017
  • 2. Outcomes I The Bitcoin Story • Understand what got us to this point. II Distributed Ledger Technology • Understand the implications this technology has for our world. III Key Concepts • Understand the key concepts, sufficiently well, so as to think through the impact on citizens, businesses, and governments. IV Issues to Explore • Understand the current issues in the debate.
  • 4. A long time ago… (in Internet time, that is)
  • 5. Transactions • Trusted third parties intermediate long-range transactions (strangers). • Trust is centralised: Visa, Sony, SWIFT, central bank, government. • These actors provide us with valuable services. • Intermediation involves clearance, settlement, verification, escrow, privacy, integrity, authentication, non-repudiation. • Intermediation is friction. Friction is inefficient. Friction can be frustrating. • Data and logic are independent.
  • 10. January 2009 “The Times 03/Jan/2009 Chancellor on brink of second bailout for banks.” Satoshi Nakamoto → Hal Finney, 10 BTC First bitcoin transaction takes place
  • 11. January 2009 • Bitcoin software, free/open source. • a.k.a. Node, Bitcoin Software, Node Software, Wallet Software, Reference Client, Satoshi Client. • Originally called: Bitcoin, then Bitcoin-Qt, then Bitcoin Core. • Need about 145 GB of disk space.
  • 12. Bitcoin “Bitcoin is a collection of concepts and technologies that form the basis of a digital money ecosystem. Units of currency called bitcoin are used to store and transmit value among participants in the bitcoin network.” Source: Antonopoulos, M. (2014)
  • 13. Revolutionary • Mathematical relationships to relate transactions to people/machines • Arrange transaction data so transactions are tamper-proof • Algorithm to replicate the ledger of transactions globally • Method for arriving at a consensus on the global state of the ledger • Become a user of bitcoin by downloading a wallet • Proving you have done “work” shows your investment in the network • Transaction fees mean it costs you to be mean to the network
  • 15. Adoption • Bitcoin (BTC); Litecoin (LTC); Ethereum (ETH); Zcash (ZEC); Dash (DASH, formerly Darkcoin); Ripple (XRP); Monero (MXR); more than a thousand digital currencies now in existence • Total market capitalisation: US$ 200B (or in the top 25 on the S&P 500) • Chicago Mercantile Exchange establishes a cryptocurrency futures trading fund (US), the Bitcoin Reference Rate (BRR) and the Bitcoin Real Time Index (BRTI) • Commodities Futures Trading Commission sets up Derivatives Clearing Organisation with Swap Execution Facility for fully collateralised digital currency swaps (USA) Source: https://coinmarketcap.com, updated: November 8 2017 @ 6:02 pm
  • 16. Adoption • One can buy bitcoin in all post offices (source) (Austria) • FinCEN Fines levied $700,000 fine against Ripple Labs Inc. for violation of requirements under the Bank Secrecy Act (source) (USA) • Regulatory limitations on use of cryptocurrencies to prevent money flight (China) • Countries encourage cryptocurrencies for legal commerce (Japan, South Korea, Russia) Source: https://www.blockchain-austria.gv.at/; https://blockchainhub.net/blog/tag/blockchain/
  • 17. Extended Bitcoin Network Source: Figure 8-3, Antonopoulos, M. (2014)
  • 20. II. Distributed Ledger Technology (DLT)
  • 21. DLT Source: Based on Birch (2016) cited in “Distributed Ledger Technology: Beyond Blockchain”, Government Office for Science, Government of the United Kingdom. How many copies? Who can use the copies? Who integrates the ledger? [anyone] [group of owners] e.g. a clearing and settlement network [one] e.g. personal bank account [many] [any user, by untrusted consensus] [trusted ledger owners or by validation] e.g. Ripple (XPR) (a global financial transactions system), consortium chains Bitcoin (BTC), Ethereum (ETH), Litecoin (LTC), Monero (XMR)
  • 22. Functional Components Distributed Ledger Technology 1. Shared Ledger 2. Smart Contracts 3. Tokens
  • 23. Shared Ledger • Transactions are linked together into blocks (Merkle Tree | Binary Hash Tree). • Blocks are chained together into the blockchain. • Tampering with a transaction, invalidates the block and the blockchain from the falsified transaction onwards. • The blockchain is replicated (think of BitTorrent). • Every record in the ledger is timestamped and cryptographically signed, thus making the ledger an auditable history of all transactions in the network. • Transactions can be anything, but there is a size limitation. • It is not necessarily a database.
  • 24. Smart Contract • A.k.a. cryptocontract. • Is a program that contains instructions for transfer of cryptocurrency. Data inside the program & logic for how to change the data are now indivisible, sealed in a cryptographic unit on the blockchain. • Live on the blockchain at a unique global address, are open for reading, but cannot be tampered with. • Transactions represent either: (a) transfer of token to a person, or (b) transfer of token to a cryptocontract to execute.
  • 26. Tokens • Bitcoin is a token. • You get tokens by mining them, receiving them in transaction fees, created in a smart contract, or someone sends (pays) them to your address (A) • Virtually implemented by virtue of the UTXO and wallet software. • Private keys enable spending, public keys enable receiving. • The ERC20 token standard can represent anything that can be digitised.
  • 28. The Double-Spend Problem • Is the Byzantine General’s Problem (1982): solutions attempted before, largely centralised solutions. • Solved with novel tools (at least 4): • (a) proof-of-work (game theory), • (b) cryptography (mathematics), • (c) peer-to-peer database replication (computer science), • (d) transaction fees (economics). Source: http://marknelson.us/2007/07/23/byzantine/
  • 29. Proof-of-Work • A way of signalling an investment in and concern about the best interests of the ecosystem. • Do a computation and if you find the solution first, the network mints Bitcoin and gives it to you as a reward. • “A proof-of-work (POW) system (or protocol, or function) is an economic measure to deter denial of service attacks and other service abuses such as spam on a network by requiring some work from the service requester, usually meaning processing time by a computer.” Source: https://en.wikipedia.org/wiki/Proof-of-work_system
  • 30. Proof-of-Stake • In Proof-of-Stake-based cryptocurrencies the creator of the next block is chosen via various combinations of random selection, wealth, and age (i.e. their stake in the ecosystem). • Those guarding the coins, own the coins. • NXT, Blackcoin, Peercoin, Ethereum
  • 31. Private-Public Key • Symmetric Cryptography = both parties must know a shared secret first; • Asymmetric Cryptography = parties keep a personal secret (private key) linked mathematically to something that can be shared (public key). • Private keys are just big numbers: 1 up to ≈2256-1. The size of bitcoin’s private key space, (2256) is an unfathomably large number. It is approximately 1077 in decimal. For comparison, the visible universe is estimated to contain 1080 atoms. Your Private Key
  • 33. Elliptic Curve Multiplication • Using a special set of curves, move from initial point k to a final location on the curve K => trapdoor function. Source: https://en.bitcoin.it/wiki/Secp256k1; Standard for Efficient Cryptography 2 (SEC 2), Certicom Corp. (2010). • Can be performed on mobile and IoT devices. We have used it in WAP security. NIST/Certicom Corp.
  • 34. Hash Functions • “fingerprints” = hash codes = hashes = digests = hash values = message authentication codes => integrity • Cryptographic functions (1-way) are a subclass of hash functions (2-way). • Examples: • SHA: Secure Hashing Algorithm • RIPEMD-160: Research and Development in Advanced Communications Technologies in Europe (RACE) Integrity Primitives Evaluation • The ideal hash function has three main properties: 1. easy to calculate a hash for any given data. 2. computationally difficult to reverse. 3. unlikely that two slightly different messages will have the same hash.
  • 35. Hash Functions Example (SHA-256) Input Output the quick brown fox jumps over the lazy dog 1153a4080f1fcb04425aa0b8 41c2b14606fe6df25d9076d2a 1face2d5af57129 the quick brown fox jumped over the lazy dog 57385e0f6d48919ae32d0b15 5c86210a74a0a477b8260ad2 1eae65b13f146df6
  • 36. Addresses • A has built-in checks to make transcription easier. • A comes from the k (via K). • (Bitcoin address) A => Allows receiving bitcoin. • (Private key) k => Allows spending bitcoin.
  • 37. Signing & Validating Signing: Private Key + Transaction = Signature Validating: Public Key + Transaction = Valid Signature
  • 38. Nodes • Wallet (W), miner (M), blockchain (B), & networking (N) • W|M|B|N = “reference client” node • W|N = “lightweight wallet” node • B|N|M = “solo miner” node • B|N = “full blockchain” node Source: Figure 8-1, Antonopoulos, M. (2014)
  • 39. Wallets • Wallets contain private keys, not coins. • Wallets can be web, hardware, software, or paper. • Early wallets were “random” wallets. Bitcoin Core uses a random wallet. • The latest and safest wallets are “hierarchically deterministic”: effectively a keychain, e.g. Ledger, Trezor, (see BIP-32, 39, 43, 44). • Wallets need to be backed up to “cold storage”. • Generate the private keys (k), the corresponding public key (K), and then the easy-to-remember bitcoin addresses (A).
  • 40. Wallets Wallets know which transactions on the blockchain have been sent to bitcoin addresses the wallet controls - wallets read the blockchain, tally up unspent transactions and, in this way, know how much bitcoin is held in the wallet.
  • 41. Wallets Source: Based on Figure 2-4, Antonopoulos, M. (2014) tn-2 tn-1 tn Alice’s Wallet Balance: 0.1000 BTC Alice’s Wallet Balance: 0.0495 BTC Alice’s Wallet Balance: 0.0995 BTC
  • 42. Mining • Proving that you’re honest by doing work that benefits the ecosystem. • Earn coinbase & transaction fees. • Application specific integrated circuits (ASIC) dedicated to mining. • Mining pools group resources, shared rewards and fees.
  • 43. Consensus 5 Steps... 1. Propagation of transactions. 2. Verification of transactions (long list of criteria). 3. Aggregation into new blocks based on a proof-of-work. 4. Verification of new blocks and assembly into chain. 5. Selection of the most computationally intensive chain.
  • 44. Forks • Occur regularly, any time two miners find a block at nearly the same time. • Occur intentionally when node software is modified with new rules (e.g. 1st August 2017 => BTC and BCH (BIP 91)).
  • 45. Smart Contracts • Can be simple logic, such as “pay at time” (say, BTC) or complex logic such as a Decentralised Autonomous Organisation (DAO) (say, ETH). • The vision of Ethereum (ETH) is “an unstoppable censorship-resistant self- sustaining decentralised world-scale computing platform”. • Computer programs live on the blockchain, they compute whenever they are given ‘gas’ (via a transaction), and change the state of entities that live on the blockchain. • Smart contracts are also known as “dApps” or Distributed Applications.
  • 46. V. Issues to Explore
  • 47. Classification • Store of value? • Finite supply (21 million by 2140). Algorithmically determined. • Investment? Token? • Unbacked, but so are most floating fiat currencies. • No monetary policy “levers” - no fractional reserve banking. • Volatile now, but steadily decreasing.
  • 48. Identity • ‘Permissioned’ networks critical for delivery of government services. Who is permitted to get what and how much? • Therefore, citizen identity will be fundamental to adoption. • Maintenance of privacy precarious in centralised model - distributed gives back citizen control over information (which we try to mirror in our systems today, anyway).
  • 49. Complexity • Perhaps obviously, it was not until an application my Grandmother could use to make voice-over-IP calls, could one say: voice-over-IP technology has gone mainstream. • Wallets need to be easy to use: HD-wallets (BIP-32, 39, 43, 44). • All or nothing - lose the keys, lose the cryptocurrency, forever.
  • 50. Legal Coding • New jobs will emerge, like legal coding. • Judicial branches of government will need systems, training, resources. • Contracts will span one or more jurisdictions regularly. • Digital audit trails will often be presented as evidence. • Constitutions, laws, regulations will need re-thinking. • Lawyers will need to understand the technology. • Countries will need to adopt or be unable to participate.
  • 51. Capital Raising • Only a few dozen working finished products & platforms. • Concepts are attracting millions in seed funding. • Initial Coin Offerings (ICO) not regulated in the same way that IPOs are.
  • 52. Data Custodianship • Data lives “everywhere”, no departments, no divisions, global jurisdiction. • Private-public Keys and Smart Contracts provide the “garden wall”. • If we accept cryptocurrency, then physical boundaries are moot.
  • 53. Energy • Mining puts computers to work on a problem, but the problem is meaningless outside the cryptocurrency network => wasted energy. • “Environmental disaster” • = Slovakia, Ireland • Homes: 2,479,349 (Bitcoin) v 50,000 (Visa) • SETI @ Home (UCB), Einstein@Home (Max Planck Institute), Folding@Home (Stanford) => uses what would otherwise be, wasted energy. Source: https://digiconomist.net/bitcoin-energy-consumption 26.78 TWh projected for 2017

Editor's Notes

  1. The power is more obvious when you look at the technologies and the infrastructure required to provide each one of these features individually.
  2. FinCEN: Financial Crimes Enforcement Network
  3. FinCEN: Financial Crimes Enforcement Network
  4. NIST = National Institute of Standards and Technology
  5. NIST = National Institute of Standards and Technology
  6. Einstein@Home = find pulsars using radio signals and gravitational wave data.