SlideShare une entreprise Scribd logo
1  sur  46
Télécharger pour lire hors ligne
Cryptocurrencies for
everyone
CUTTING EDGE FINANCIAL TECHNOLOGIES
What Is Bitcoin?
Cryptocurrency is a digital currency in which encryption techniques are used to regulate the
generation of units of currency and verify the transfer of funds, operating independently of a
central bank.
Bitcoin is a payment system invented by Satoshi Nakamoto, who published the invention in
2008 and released it as open-source software in 2009:
• First decentralized digital currency;
• Used for online payments in several payment systems;
• Traded in Bitcoin Exchanges;
• Issued by miners and they are not dependent on any central banks.
Currency vs. Bitcoin
Currency:
• Money (System of money);
• Cash payments;
• Store value;
• Traded between nations in exchange
markets, which determine the relative
values of the different currencies;
• Currency are issued by Central Banks;
• Currencies are defined by governments;
• High security standards;
• Unique ID for every Banknote/Coin.
Bitcoin:
• Crypto Money – IT representation of money;
• Online payments only;
• Store value;
• Bitcoin Exchange;
• Bitcoins can be issued by everyone who owns
a required tool;
• High security standards;
• Decentralized
Bitcoin Expansion
Source: Coupofy.com
Contents
Contents
Elements of Cryptocurrency
Decentralization
Distributed consensus Proof of work
Digital Signature
Public Key Private Key
Hash Pointers and Data Structure
Block Chain Merkle Tree
Hash Functions
Properties SHA-256
Cryptographic Hash Functions
• Input: any String of any Size;
• Fixed Size Ouput: 256 Bit;
• Computing the Hash of n-bit String
should be running time O(n).
Hash Function
• Collision-resistance;
• Hiding;
• Puzzle-friendliness.
Cryptographic
Hash Function
Cryptographically
Secure Function
SHA-256
Fixed-input
hash function
Arbitrary input
hash function
SHA-256 uses Merkle-Damgard transform to turn a fixed-length collision-
resistant function into a hash function that accepts arbitrary length
inputs. It takes 768 bit input and produces 256-bit outputs. The block
size is 512 bit.
Hash Pointers and Data Structures
Hash Pointer is a pointer where some information is stored together with a cryptographic hash
of the information.
Whereas a regular pointer gives you a way to retrieve information, a hash poiter also gives you a
way to verify that information hasn't changed.
Types of Data Structure
Block chain is a linked list of hash pointers. This allows us to append data into the end of the log.
But if someone alters data that is earlier in the log we are going to detect it (tamper-evident
log).
Types of Data Structure
Merkle Tree: In a Merkle tree, data blocks are grouped in pairs and the hash of each of these
blocks is stored in a parent node. The parent nodes are in turn grouped in pairs and their hashes
stored one level up the tree. This continues all the way up the tree until we reach the root node.
Digital Signatures
Main properties of digital signatures:
Only you can make your signature, but anyone who sees it can verify that it's valid;
The signature must be tied to a particular document;
Unforgeability;
ECDSA
Decentralized identity management. Rather than having a central authority that you have to go
in order to register as a user in a system, you can register as a user all by yourself. If you want a
new identity, you can just generate one at any time, and you can make as many as you want.
These identities are called addresses, in Bitcoin jargon. You’ll frequently hear the term address
used in the context of Bitcoin and cryptocurrencies, and all that is really is, is a hash of a public
key.
Digital Signature Scheme
A digital signature scheme consists of the following three algorithms:
● (sk, pk) := generateKeys(keysize) The generateKeys method takes a key size and generates
a key pair. The secret key sk is kept privately and used to sign messages. pk is the public verification
key that you give to everybody. Anyone with this key can verify your signature.
● sig := sign(sk, message) The sign method takes a message, msg, and a secret key, sk, as
input and outputs a signature for the msg under sk
● isValid := verify(pk, message, sig) The verify method takes a message, a signature, and a public key as
input. It returns a boolean value, isValid, that will be true if sig is a valid signature for message under
public key pk, and false otherwise.
We require that the following two properties hold:
● Valid signatures must verify: verify(pk, message, sign(sk, message)) == true
● Signatures are existentially unforgeable
Example: Simple Cryptocurrency
There are two rules for a simplified cryptocurrency:
1. A designated entity can create new coins whenever he wants and those newly created coins belong
to the entity.
2. Second rule is whoever owns a coin can transfer it on to someone else. Transferring is done using
cryptographic operations.
Bank creates a statement "Pay this to Bank2", where "this" is a hash pointer that references the coin
in question. And, as we saw earlier, identities are just public keys, so Bank2 refers to Bank2 public key.
So Bank1 signs the coin ONce the data structure signed by Bank1 exists, Bank2 owns the coin.
CreateCoin
[UniqueCoi
nId]
Digital
Signature
(Public and
Private)
COIN
Payments Data Structure
Centralized Currency Model
CentralBank publishes history of all transactions that have heppened. To do this he uses a block
chain, which is digitally signed by CentralBank. It’s a series of data blocks, each with one transaction
in it. Each blockhain has the ID of a transaction, the transaction’s contents, and a hash pointer to the
previous block.
CentralBank digitally signs the final hash pointer, which represents this entire structure, and
publishes the signature along with the block chain. In this model a transaction only counts if it is in
the block chain signed by CentralBank. Anybody can verify that a transaction was endorsed by Bank
by checking Banks’s signature on the block that it appears in. Bank makes sure that he doesn’t
endorse a transaction that attempts to double-spend an already spent coin.
How To Install Bitcoin Wallet?
• https://bitcoin.org/en/download
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)
Where is Wallet.dat Stored?
The main wallet file wallet.dat can be located in different places depending on your operating system.
◦ Windows XP - disk:/Documents and Settings/user_name/Application Data/Bitcoin
◦ Windows Vista, 7, sever 2008 - disk:/Users/user_name/AppData/Roaming/Bitcoin
◦ Linux uses address ~/.bitcoin/
◦ Mac OSX uses folder /Users/user_name/Application Support/Bitcoin/
How to Integrate Nodes Into a System?
Decentralization Problems
1. Who maintains the ledger of transaction?
2. Who has authority over which transactions are valid?
3. Who creates new bitcoins?
4. Who determines how the rules of the system change?
5. How do bitcoins acquire exchange value?
Distributed Consensus
Distributed consensus protocol. There are n nodes that each have an input value. Some of these
nodes are faulty or malicious. A distributed consensus protocol has the following two properties:
1. It must terminate with all honest nodes in agreement on the value
2. The value must have been generated by an honest node
All the nodes in the peer to peer network have a ledger consisting of a sequence of blocks, each containing a list of transactions,
they've reached consensus on. Additionally, each node has a pool of outstanding transactions, that it has heard about, but have not yet
included into the block chain.
Node Backlog vs Blockchain
Backlog Blockchain
Unverified transactions:
- Transaction 1
- Transaction 2
- Transaction 3
- Transaction 4
Verified transactions
Hash Puzzles
In order to create a block, the node that proposes that block is required to find a number, or
nonce, such that the when you concatenate the nonce, the previous hash, and the list of
transactions that comprise that block and take the hash of this whole string, then that hash
output should be a number that falls into a target space that is quite small in relation to the the
much larger output space of that hash function. We can define such a target space as any value
falling below a certain target value. In this case, the nonce will have to satisfy the following
inequality:
(nonce || prev_hash || tx || tx H || ... || tx) < target
Hash Puzzles
There are three important properties of hash puzzles:
Difficult to compute;
Parameterizable cost;
Trivial to verify
Incentives and Proof of Work
The question: can we give nodes an
incentive for behaving honestly?
◦ Transaction fees;
◦ Block reward: is cut in half every four years
limiting the total supply of bitcoins to 21
million.
Incentives and Proof of Work
Mining and proof-of-work;
◦ The key idea behind proof-of-work is that we
approximate the selection of a random node by
instead selecting nodes in proportion to a
resource that we hope that nobody can
monopolize. If, for example, that resource is
computing power, then it’s a proof-of-work
system.
◦ Hash-puzzles
Possible Attacks
Double-spend attack: create two transactions: one in which she sends Bob Bitcoins, and a
second in which she double spends those Bitcoins by sending them to a different address that
she controls. As they spend the same Bitcoins, only one of these transactions can be included in
the block chain. The arrows are pointers from one block to the previous block that it extends
including a hash of that previous block within its own contents. CA is used to denote a coin own
by Alice.
Double-Spend Attack
This is what double-spend attempt looks like from Bob the merchant’s viewpoint. In order to
protect himself from this attack, Bob should wait until the transaction with which Alice pays him
is included in the block chain and has several confirmations.
Links and materials
https://www.coursera.org/course/bitcointech
https://blockchain.info/
https://lurkmore.to/Bitcoin
http://bits.media
https://bitcoinwisdom.com/
https://github.com/bitcoin/bitcoin
https://bitcoin.org/en/
https://btcu.biz/
https://btc-trade.com.ua/
https://en.bitcoin.it/wiki/Main_Page
Bitcoin Traders Club Meeting
Leonardo Business Centre
Khmelnytsky st. 17/52,
office 429а
Upcoming meeting –
8th October, 19:15
Contact me:
Dmytro Pershyn
+380967350535
dpershyn@hotmail.com
Backup
CreateCoin/PayCoin Transactions
CreateCoin transaction creates multiple coins. Each coin has a serial number within the
transaction. Each coin also has a value; it’s worth a certain number of BankCoins. Finally, each
coin has a recipient, which is a public key that gets the coin when it’s created. So CreateCoin
creates a bunch of new coins with different values and assigns them to people as initial owners.
We refer to coins by CoinIDs. A CoinID is a combination of a transaction ID and the coin’s serial
number within that transaction.
CreateCoin/PayCoin Transactions
The second kind of transaction is PayCoins. It consumes some
coins, that is, destroys them, and creates new coins of the
same total value. The new coins might belong to different
people (public keys). This transaction has to be signed by
everyone who’s paying in a coin. So if you’re the owner of one
of the coins that’s going to be consumed in this transaction,
then you need to digitally sign the transaction to say that
you’re really okay with spending this coin.
Consensus Schema
The Bitcoin protocol must reach consensus in the face of two types of obstacles:
imperfections in the network, such as latency and nodes crashing, as well as deliberate attempts by
some nodes to subvert the process.
Every 10 minutes, every node in the system proposes its own outstanding transaction pool to be the
next block.
Then the nodes execute some consensus protocol, where each node’s input is its own proposed
block.
Some nodes may be malicious and put invalid transactions into their blocks, but we might assume
that other nodes will be honest. If the consensus protocol succeeds, a valid block will be selected as
the output. Even if the selected block was proposed by only one node, it’s a valid output as long as
the block is valid. Now there may be some valid outstanding transaction that did not get included in
the block, but this is not a problem. If some transaction somehow didn’t make it into this particular
block, it could just wait and get into the next block.
Implicit consenseus
Two assumptions:
So for the moment, take a leap of faith and assume that it is possible to pick a random node from
the Bitcoin network in this manner. Further assume, for the moment, that this token generation
and distribution algorithm is sufficiently smart so that if the adversary is going to try to create a
lot of Sybil nodes, all of those Sybils together will get only one token. This means the adversary is
not able to multiply his power by creating new nodes.
Implicit Consenseus
Bitcoin consensus algorithm (simplified). This algorithm is simplified in that it assumes the ability
to select a random node in a manner that is not vulnerable to Sybil attacks.
1. New transactions are broadcast to all nodes
2. Each node collects new transactions into a block
3. In each round a random node gets to broadcast its block
4. Other nodes accept the block only if all transactions in it are valid (unspent, valid signatures)
5. Nodes express their acceptance of the block by including its hash in the next block they create
Trading Tricks
• Hedging
• Market Volume analysis
• Deflation currency
• Speculative Bubbles
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)
Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)

Contenu connexe

Tendances

Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...Richard Givens
 
OpenBazaar - Ratings, reviews and reputation
OpenBazaar - Ratings, reviews and reputationOpenBazaar - Ratings, reviews and reputation
OpenBazaar - Ratings, reviews and reputationWashington Sanchez
 
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY csandit
 
Eclipsecon Europe: Blockchain, Ethereum and Business Applications
Eclipsecon Europe: Blockchain, Ethereum and Business ApplicationsEclipsecon Europe: Blockchain, Ethereum and Business Applications
Eclipsecon Europe: Blockchain, Ethereum and Business ApplicationsMatthias Zimmermann
 
Kriptovaluták, hashbányászat és okoscicák
Kriptovaluták, hashbányászat és okoscicákKriptovaluták, hashbányászat és okoscicák
Kriptovaluták, hashbányászat és okoscicákhackersuli
 
Blockchain. A Guide For Beginners
Blockchain. A Guide For BeginnersBlockchain. A Guide For Beginners
Blockchain. A Guide For BeginnersElifTech
 
Smart contracts and applications part II
Smart contracts and applications   part IISmart contracts and applications   part II
Smart contracts and applications part IIvpnmentor
 
"How Blockchains and Bitcoins work" by Ricardo Águas @ Pizza Talks Lisbon 201...
"How Blockchains and Bitcoins work" by Ricardo Águas @ Pizza Talks Lisbon 201..."How Blockchains and Bitcoins work" by Ricardo Águas @ Pizza Talks Lisbon 201...
"How Blockchains and Bitcoins work" by Ricardo Águas @ Pizza Talks Lisbon 201...Equal Experts
 
Blockchian introduction
Blockchian introductionBlockchian introduction
Blockchian introductionkesavan N B
 
Smart contract honeypots for profit (and fun) - bha
Smart contract honeypots for profit (and fun)  - bhaSmart contract honeypots for profit (and fun)  - bha
Smart contract honeypots for profit (and fun) - bhaPolySwarm
 
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTSA SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTSijcsit
 
Smart contracts and applications part I
Smart contracts and applications   part ISmart contracts and applications   part I
Smart contracts and applications part Ivpnmentor
 
Technical toolkit for a blockchain startup
Technical toolkit for a blockchain startupTechnical toolkit for a blockchain startup
Technical toolkit for a blockchain startupPortia Burton
 
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek Jaiswal
 

Tendances (17)

Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...
 
Tmc mastering bitcoins ppt
Tmc mastering bitcoins pptTmc mastering bitcoins ppt
Tmc mastering bitcoins ppt
 
OpenBazaar - Ratings, reviews and reputation
OpenBazaar - Ratings, reviews and reputationOpenBazaar - Ratings, reviews and reputation
OpenBazaar - Ratings, reviews and reputation
 
Open bazaar
Open bazaarOpen bazaar
Open bazaar
 
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY
 
Eclipsecon Europe: Blockchain, Ethereum and Business Applications
Eclipsecon Europe: Blockchain, Ethereum and Business ApplicationsEclipsecon Europe: Blockchain, Ethereum and Business Applications
Eclipsecon Europe: Blockchain, Ethereum and Business Applications
 
Kriptovaluták, hashbányászat és okoscicák
Kriptovaluták, hashbányászat és okoscicákKriptovaluták, hashbányászat és okoscicák
Kriptovaluták, hashbányászat és okoscicák
 
Blockchain. A Guide For Beginners
Blockchain. A Guide For BeginnersBlockchain. A Guide For Beginners
Blockchain. A Guide For Beginners
 
Donn felker etehreum
Donn felker etehreumDonn felker etehreum
Donn felker etehreum
 
Smart contracts and applications part II
Smart contracts and applications   part IISmart contracts and applications   part II
Smart contracts and applications part II
 
"How Blockchains and Bitcoins work" by Ricardo Águas @ Pizza Talks Lisbon 201...
"How Blockchains and Bitcoins work" by Ricardo Águas @ Pizza Talks Lisbon 201..."How Blockchains and Bitcoins work" by Ricardo Águas @ Pizza Talks Lisbon 201...
"How Blockchains and Bitcoins work" by Ricardo Águas @ Pizza Talks Lisbon 201...
 
Blockchian introduction
Blockchian introductionBlockchian introduction
Blockchian introduction
 
Smart contract honeypots for profit (and fun) - bha
Smart contract honeypots for profit (and fun)  - bhaSmart contract honeypots for profit (and fun)  - bha
Smart contract honeypots for profit (and fun) - bha
 
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTSA SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
 
Smart contracts and applications part I
Smart contracts and applications   part ISmart contracts and applications   part I
Smart contracts and applications part I
 
Technical toolkit for a blockchain startup
Technical toolkit for a blockchain startupTechnical toolkit for a blockchain startup
Technical toolkit for a blockchain startup
 
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchain
 

En vedette

Fine Motor 2
Fine Motor 2Fine Motor 2
Fine Motor 2jeh20717
 
14 albrieu&amp;baruzzi 2016 comparación normasdnv1967 2010
14 albrieu&amp;baruzzi 2016 comparación normasdnv1967 201014 albrieu&amp;baruzzi 2016 comparación normasdnv1967 2010
14 albrieu&amp;baruzzi 2016 comparación normasdnv1967 2010Sierra Francisco Justo
 
Intellectual property in social media and online resources. Dmytro Gadomsky
Intellectual property in social media and online resources. Dmytro GadomskyIntellectual property in social media and online resources. Dmytro Gadomsky
Intellectual property in social media and online resources. Dmytro GadomskyConstantine Zerov
 
Israel dop curvas horizontales eua&amp;europa r
Israel dop curvas horizontales eua&amp;europa rIsrael dop curvas horizontales eua&amp;europa r
Israel dop curvas horizontales eua&amp;europa rSierra Francisco Justo
 
Fine motor
Fine motorFine motor
Fine motorjeh20717
 
D drops Vitamin D za stare i mlade
D drops Vitamin D za stare i mladeD drops Vitamin D za stare i mlade
D drops Vitamin D za stare i mladeZoran Stojcevski
 
До Дня Незалежності України
До Дня Незалежності УкраїниДо Дня Незалежності України
До Дня Незалежності УкраїниMargoshenka
 
What is it to be a senior engineer?
What is it to be a senior engineer?What is it to be a senior engineer?
What is it to be a senior engineer?Vladimir Miguro
 
Захист прав інтелектуальної власності. Носік Ю.В.
Захист прав інтелектуальної власності. Носік Ю.В.Захист прав інтелектуальної власності. Носік Ю.В.
Захист прав інтелектуальної власності. Носік Ю.В.Constantine Zerov
 
How to Create Digital Disruption (Alejandro Danylyszyn Business Stream)
How to Create Digital Disruption (Alejandro Danylyszyn Business Stream)How to Create Digital Disruption (Alejandro Danylyszyn Business Stream)
How to Create Digital Disruption (Alejandro Danylyszyn Business Stream)IT Arena
 
Строим собственную BI в MS Excel на данных из Яндекс.Метрики и Google Analitycs
Строим собственную BI в MS Excel на данных из Яндекс.Метрики и Google AnalitycsСтроим собственную BI в MS Excel на данных из Яндекс.Метрики и Google Analitycs
Строим собственную BI в MS Excel на данных из Яндекс.Метрики и Google AnalitycsMaxim Uvarov
 
Reworker предпочтовая подготовка
Reworker предпочтовая подготовкаReworker предпочтовая подготовка
Reworker предпочтовая подготовкаNikita Florinskiy
 
Decentralised Transactions and Accounts with Blockchain
Decentralised Transactions and Accounts with BlockchainDecentralised Transactions and Accounts with Blockchain
Decentralised Transactions and Accounts with Blockchainaharth
 
PwC Sports Outlook 2016
PwC Sports Outlook 2016PwC Sports Outlook 2016
PwC Sports Outlook 2016Jonesy033
 
Failure Analysis of Gas Turbine Blade
Failure Analysis of Gas Turbine BladeFailure Analysis of Gas Turbine Blade
Failure Analysis of Gas Turbine BladeOluwaseyi Adeniyan
 
EBD CPAD Lições bíblicas 1° trimestre 2016 lição 3 Esperando a volta de Jesus.
EBD CPAD Lições bíblicas 1° trimestre 2016 lição 3 Esperando a volta de Jesus.EBD CPAD Lições bíblicas 1° trimestre 2016 lição 3 Esperando a volta de Jesus.
EBD CPAD Lições bíblicas 1° trimestre 2016 lição 3 Esperando a volta de Jesus.GIDEONE Moura Santos Ferreira
 

En vedette (20)

Fine Motor 2
Fine Motor 2Fine Motor 2
Fine Motor 2
 
14 albrieu&amp;baruzzi 2016 comparación normasdnv1967 2010
14 albrieu&amp;baruzzi 2016 comparación normasdnv1967 201014 albrieu&amp;baruzzi 2016 comparación normasdnv1967 2010
14 albrieu&amp;baruzzi 2016 comparación normasdnv1967 2010
 
Intellectual property in social media and online resources. Dmytro Gadomsky
Intellectual property in social media and online resources. Dmytro GadomskyIntellectual property in social media and online resources. Dmytro Gadomsky
Intellectual property in social media and online resources. Dmytro Gadomsky
 
Retail crm
Retail crmRetail crm
Retail crm
 
Complex stories about Sqooping PostgreSQL data
Complex stories about Sqooping PostgreSQL dataComplex stories about Sqooping PostgreSQL data
Complex stories about Sqooping PostgreSQL data
 
Israel dop curvas horizontales eua&amp;europa r
Israel dop curvas horizontales eua&amp;europa rIsrael dop curvas horizontales eua&amp;europa r
Israel dop curvas horizontales eua&amp;europa r
 
VidaEconomica_21NOV
VidaEconomica_21NOVVidaEconomica_21NOV
VidaEconomica_21NOV
 
Fine motor
Fine motorFine motor
Fine motor
 
D drops Vitamin D za stare i mlade
D drops Vitamin D za stare i mladeD drops Vitamin D za stare i mlade
D drops Vitamin D za stare i mlade
 
До Дня Незалежності України
До Дня Незалежності УкраїниДо Дня Незалежності України
До Дня Незалежності України
 
What is it to be a senior engineer?
What is it to be a senior engineer?What is it to be a senior engineer?
What is it to be a senior engineer?
 
Захист прав інтелектуальної власності. Носік Ю.В.
Захист прав інтелектуальної власності. Носік Ю.В.Захист прав інтелектуальної власності. Носік Ю.В.
Захист прав інтелектуальної власності. Носік Ю.В.
 
E05912226
E05912226E05912226
E05912226
 
How to Create Digital Disruption (Alejandro Danylyszyn Business Stream)
How to Create Digital Disruption (Alejandro Danylyszyn Business Stream)How to Create Digital Disruption (Alejandro Danylyszyn Business Stream)
How to Create Digital Disruption (Alejandro Danylyszyn Business Stream)
 
Строим собственную BI в MS Excel на данных из Яндекс.Метрики и Google Analitycs
Строим собственную BI в MS Excel на данных из Яндекс.Метрики и Google AnalitycsСтроим собственную BI в MS Excel на данных из Яндекс.Метрики и Google Analitycs
Строим собственную BI в MS Excel на данных из Яндекс.Метрики и Google Analitycs
 
Reworker предпочтовая подготовка
Reworker предпочтовая подготовкаReworker предпочтовая подготовка
Reworker предпочтовая подготовка
 
Decentralised Transactions and Accounts with Blockchain
Decentralised Transactions and Accounts with BlockchainDecentralised Transactions and Accounts with Blockchain
Decentralised Transactions and Accounts with Blockchain
 
PwC Sports Outlook 2016
PwC Sports Outlook 2016PwC Sports Outlook 2016
PwC Sports Outlook 2016
 
Failure Analysis of Gas Turbine Blade
Failure Analysis of Gas Turbine BladeFailure Analysis of Gas Turbine Blade
Failure Analysis of Gas Turbine Blade
 
EBD CPAD Lições bíblicas 1° trimestre 2016 lição 3 Esperando a volta de Jesus.
EBD CPAD Lições bíblicas 1° trimestre 2016 lição 3 Esperando a volta de Jesus.EBD CPAD Lições bíblicas 1° trimestre 2016 lição 3 Esperando a volta de Jesus.
EBD CPAD Lições bíblicas 1° trimestre 2016 lição 3 Esperando a volta de Jesus.
 

Similaire à Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)

Bitcoin story of programable currency
Bitcoin story of programable currencyBitcoin story of programable currency
Bitcoin story of programable currencyHossam Soffar
 
Cryptocurrency-Bitcoin
Cryptocurrency-BitcoinCryptocurrency-Bitcoin
Cryptocurrency-BitcoinSatwikaHotwani
 
Blockchain Session 1
Blockchain Session 1Blockchain Session 1
Blockchain Session 1DSCPICT
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and BitcoinHugo Rodrigues
 
Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)AJSH & Co LLP
 
Blockchain technology Overview
Blockchain technology OverviewBlockchain technology Overview
Blockchain technology OverviewLalitha Prasanna
 
Crypto currency - a digital asset
Crypto currency - a digital asset Crypto currency - a digital asset
Crypto currency - a digital asset mayil vealan
 
Idea To IPO Blockchain Slides
Idea To IPO Blockchain SlidesIdea To IPO Blockchain Slides
Idea To IPO Blockchain SlidesRoger Royse
 
Payment Protocols - Block Chain & Beyond
Payment Protocols - Block Chain & BeyondPayment Protocols - Block Chain & Beyond
Payment Protocols - Block Chain & BeyondAlexander Kiriakou
 

Similaire à Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream) (20)

bitcoin_presentation
bitcoin_presentationbitcoin_presentation
bitcoin_presentation
 
Bitcoin story of programable currency
Bitcoin story of programable currencyBitcoin story of programable currency
Bitcoin story of programable currency
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Introduction to Blockchain
Introduction to Blockchain Introduction to Blockchain
Introduction to Blockchain
 
Cryptocurrency-Bitcoin
Cryptocurrency-BitcoinCryptocurrency-Bitcoin
Cryptocurrency-Bitcoin
 
Blockchain
BlockchainBlockchain
Blockchain
 
BITCOIN EXPLAINED
BITCOIN EXPLAINEDBITCOIN EXPLAINED
BITCOIN EXPLAINED
 
An Introduction to Blockchain
An Introduction to BlockchainAn Introduction to Blockchain
An Introduction to Blockchain
 
Blockchain Session 1
Blockchain Session 1Blockchain Session 1
Blockchain Session 1
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Blockchain technology Overview
Blockchain technology OverviewBlockchain technology Overview
Blockchain technology Overview
 
Blockchain
BlockchainBlockchain
Blockchain
 
Crypto currency - a digital asset
Crypto currency - a digital asset Crypto currency - a digital asset
Crypto currency - a digital asset
 
Idea To IPO Blockchain Slides
Idea To IPO Blockchain SlidesIdea To IPO Blockchain Slides
Idea To IPO Blockchain Slides
 
Block chain introduction
Block chain introductionBlock chain introduction
Block chain introduction
 
Blockchain and bitcoin
Blockchain and bitcoinBlockchain and bitcoin
Blockchain and bitcoin
 
Payment Protocols - Block Chain & Beyond
Payment Protocols - Block Chain & BeyondPayment Protocols - Block Chain & Beyond
Payment Protocols - Block Chain & Beyond
 
Bitcoin data mining
Bitcoin data miningBitcoin data mining
Bitcoin data mining
 

Plus de IT Arena

Shalini Agarwal, LinkedIn. Engineering excellence: marathon, not a sprint
Shalini Agarwal, LinkedIn. Engineering excellence: marathon, not a sprintShalini Agarwal, LinkedIn. Engineering excellence: marathon, not a sprint
Shalini Agarwal, LinkedIn. Engineering excellence: marathon, not a sprintIT Arena
 
Dave Karow, Split. Powering Progressive Delivery With Data
Dave Karow, Split. Powering Progressive Delivery With DataDave Karow, Split. Powering Progressive Delivery With Data
Dave Karow, Split. Powering Progressive Delivery With DataIT Arena
 
Ihar Mahaniok, Angel Investor. Hunting unicorns for early stage investments
Ihar Mahaniok, Angel Investor. Hunting unicorns for early stage investmentsIhar Mahaniok, Angel Investor. Hunting unicorns for early stage investments
Ihar Mahaniok, Angel Investor. Hunting unicorns for early stage investmentsIT Arena
 
Yuriy Zaremba, AXDRAFT. How to sell your startup
Yuriy Zaremba, AXDRAFT. How to sell your startupYuriy Zaremba, AXDRAFT. How to sell your startup
Yuriy Zaremba, AXDRAFT. How to sell your startupIT Arena
 
John Griffin, Ford Credit Europe. Normalising failure and making way for succ...
John Griffin, Ford Credit Europe. Normalising failure and making way for succ...John Griffin, Ford Credit Europe. Normalising failure and making way for succ...
John Griffin, Ford Credit Europe. Normalising failure and making way for succ...IT Arena
 
Vitaliy Diatlenko, Uklon. Transforming your business with machine learning. T...
Vitaliy Diatlenko, Uklon. Transforming your business with machine learning. T...Vitaliy Diatlenko, Uklon. Transforming your business with machine learning. T...
Vitaliy Diatlenko, Uklon. Transforming your business with machine learning. T...IT Arena
 
Chris Cassarino, SoftServe. Stop Fixating on Fixing – Solving the global enga...
Chris Cassarino, SoftServe. Stop Fixating on Fixing – Solving the global enga...Chris Cassarino, SoftServe. Stop Fixating on Fixing – Solving the global enga...
Chris Cassarino, SoftServe. Stop Fixating on Fixing – Solving the global enga...IT Arena
 
Michael Labate, Intellias. EDI in the DNA: Why Equity, Diversity and Inclusio...
Michael Labate, Intellias. EDI in the DNA: Why Equity, Diversity and Inclusio...Michael Labate, Intellias. EDI in the DNA: Why Equity, Diversity and Inclusio...
Michael Labate, Intellias. EDI in the DNA: Why Equity, Diversity and Inclusio...IT Arena
 
Beth Anne Katz, Microsoft. How to Product Manage Your Mental Health
Beth Anne Katz, Microsoft. How to Product Manage Your Mental HealthBeth Anne Katz, Microsoft. How to Product Manage Your Mental Health
Beth Anne Katz, Microsoft. How to Product Manage Your Mental HealthIT Arena
 
Sally Foote, GoCompare & Look After My Bills. Magic Goggles: the tools you ne...
Sally Foote, GoCompare & Look After My Bills. Magic Goggles: the tools you ne...Sally Foote, GoCompare & Look After My Bills. Magic Goggles: the tools you ne...
Sally Foote, GoCompare & Look After My Bills. Magic Goggles: the tools you ne...IT Arena
 
Colleen Graneto, Airbnb. 3 steps to better product decision making
Colleen Graneto, Airbnb. 3 steps to better product decision makingColleen Graneto, Airbnb. 3 steps to better product decision making
Colleen Graneto, Airbnb. 3 steps to better product decision makingIT Arena
 
Vasyl Zadvornyy, Prozorro. The Future of Governance: Can a Script Replace the...
Vasyl Zadvornyy, Prozorro. The Future of Governance: Can a Script Replace the...Vasyl Zadvornyy, Prozorro. The Future of Governance: Can a Script Replace the...
Vasyl Zadvornyy, Prozorro. The Future of Governance: Can a Script Replace the...IT Arena
 
Godard Abel, G2. The SaaS Trust Crisis
Godard Abel, G2. The SaaS Trust CrisisGodard Abel, G2. The SaaS Trust Crisis
Godard Abel, G2. The SaaS Trust CrisisIT Arena
 
Zeb Evans, ClickUp. From $0 to $20M ARR in 2 Years: Bootstrapping to Natural ...
Zeb Evans, ClickUp. From $0 to $20M ARR in 2 Years: Bootstrapping to Natural ...Zeb Evans, ClickUp. From $0 to $20M ARR in 2 Years: Bootstrapping to Natural ...
Zeb Evans, ClickUp. From $0 to $20M ARR in 2 Years: Bootstrapping to Natural ...IT Arena
 
Namir Anani, ICTC. Economic Resiliency in The Face of Adversity
Namir Anani, ICTC. Economic Resiliency in The Face of AdversityNamir Anani, ICTC. Economic Resiliency in The Face of Adversity
Namir Anani, ICTC. Economic Resiliency in The Face of AdversityIT Arena
 
Mada Seghete, Branch. Mobile Growth Trends
 Mada Seghete, Branch. Mobile Growth Trends Mada Seghete, Branch. Mobile Growth Trends
Mada Seghete, Branch. Mobile Growth TrendsIT Arena
 
Julia Petryk, MacPaw. Product PR: a how-to guide
Julia Petryk, MacPaw. Product PR: a how-to guideJulia Petryk, MacPaw. Product PR: a how-to guide
Julia Petryk, MacPaw. Product PR: a how-to guideIT Arena
 
Yaroslav Ravlinko, Intellias. You don’t need Kubernetes. You need to understa...
Yaroslav Ravlinko, Intellias. You don’t need Kubernetes. You need to understa...Yaroslav Ravlinko, Intellias. You don’t need Kubernetes. You need to understa...
Yaroslav Ravlinko, Intellias. You don’t need Kubernetes. You need to understa...IT Arena
 
Yaroslav Novytskyy, Anton Vasylenko, N-iX. Migrating to the cloud: options an...
Yaroslav Novytskyy, Anton Vasylenko, N-iX. Migrating to the cloud: options an...Yaroslav Novytskyy, Anton Vasylenko, N-iX. Migrating to the cloud: options an...
Yaroslav Novytskyy, Anton Vasylenko, N-iX. Migrating to the cloud: options an...IT Arena
 
Kostiantyn Bokhan, N-iX. CD4ML based on Azure and Kubeflow
Kostiantyn Bokhan, N-iX. CD4ML based on Azure and KubeflowKostiantyn Bokhan, N-iX. CD4ML based on Azure and Kubeflow
Kostiantyn Bokhan, N-iX. CD4ML based on Azure and KubeflowIT Arena
 

Plus de IT Arena (20)

Shalini Agarwal, LinkedIn. Engineering excellence: marathon, not a sprint
Shalini Agarwal, LinkedIn. Engineering excellence: marathon, not a sprintShalini Agarwal, LinkedIn. Engineering excellence: marathon, not a sprint
Shalini Agarwal, LinkedIn. Engineering excellence: marathon, not a sprint
 
Dave Karow, Split. Powering Progressive Delivery With Data
Dave Karow, Split. Powering Progressive Delivery With DataDave Karow, Split. Powering Progressive Delivery With Data
Dave Karow, Split. Powering Progressive Delivery With Data
 
Ihar Mahaniok, Angel Investor. Hunting unicorns for early stage investments
Ihar Mahaniok, Angel Investor. Hunting unicorns for early stage investmentsIhar Mahaniok, Angel Investor. Hunting unicorns for early stage investments
Ihar Mahaniok, Angel Investor. Hunting unicorns for early stage investments
 
Yuriy Zaremba, AXDRAFT. How to sell your startup
Yuriy Zaremba, AXDRAFT. How to sell your startupYuriy Zaremba, AXDRAFT. How to sell your startup
Yuriy Zaremba, AXDRAFT. How to sell your startup
 
John Griffin, Ford Credit Europe. Normalising failure and making way for succ...
John Griffin, Ford Credit Europe. Normalising failure and making way for succ...John Griffin, Ford Credit Europe. Normalising failure and making way for succ...
John Griffin, Ford Credit Europe. Normalising failure and making way for succ...
 
Vitaliy Diatlenko, Uklon. Transforming your business with machine learning. T...
Vitaliy Diatlenko, Uklon. Transforming your business with machine learning. T...Vitaliy Diatlenko, Uklon. Transforming your business with machine learning. T...
Vitaliy Diatlenko, Uklon. Transforming your business with machine learning. T...
 
Chris Cassarino, SoftServe. Stop Fixating on Fixing – Solving the global enga...
Chris Cassarino, SoftServe. Stop Fixating on Fixing – Solving the global enga...Chris Cassarino, SoftServe. Stop Fixating on Fixing – Solving the global enga...
Chris Cassarino, SoftServe. Stop Fixating on Fixing – Solving the global enga...
 
Michael Labate, Intellias. EDI in the DNA: Why Equity, Diversity and Inclusio...
Michael Labate, Intellias. EDI in the DNA: Why Equity, Diversity and Inclusio...Michael Labate, Intellias. EDI in the DNA: Why Equity, Diversity and Inclusio...
Michael Labate, Intellias. EDI in the DNA: Why Equity, Diversity and Inclusio...
 
Beth Anne Katz, Microsoft. How to Product Manage Your Mental Health
Beth Anne Katz, Microsoft. How to Product Manage Your Mental HealthBeth Anne Katz, Microsoft. How to Product Manage Your Mental Health
Beth Anne Katz, Microsoft. How to Product Manage Your Mental Health
 
Sally Foote, GoCompare & Look After My Bills. Magic Goggles: the tools you ne...
Sally Foote, GoCompare & Look After My Bills. Magic Goggles: the tools you ne...Sally Foote, GoCompare & Look After My Bills. Magic Goggles: the tools you ne...
Sally Foote, GoCompare & Look After My Bills. Magic Goggles: the tools you ne...
 
Colleen Graneto, Airbnb. 3 steps to better product decision making
Colleen Graneto, Airbnb. 3 steps to better product decision makingColleen Graneto, Airbnb. 3 steps to better product decision making
Colleen Graneto, Airbnb. 3 steps to better product decision making
 
Vasyl Zadvornyy, Prozorro. The Future of Governance: Can a Script Replace the...
Vasyl Zadvornyy, Prozorro. The Future of Governance: Can a Script Replace the...Vasyl Zadvornyy, Prozorro. The Future of Governance: Can a Script Replace the...
Vasyl Zadvornyy, Prozorro. The Future of Governance: Can a Script Replace the...
 
Godard Abel, G2. The SaaS Trust Crisis
Godard Abel, G2. The SaaS Trust CrisisGodard Abel, G2. The SaaS Trust Crisis
Godard Abel, G2. The SaaS Trust Crisis
 
Zeb Evans, ClickUp. From $0 to $20M ARR in 2 Years: Bootstrapping to Natural ...
Zeb Evans, ClickUp. From $0 to $20M ARR in 2 Years: Bootstrapping to Natural ...Zeb Evans, ClickUp. From $0 to $20M ARR in 2 Years: Bootstrapping to Natural ...
Zeb Evans, ClickUp. From $0 to $20M ARR in 2 Years: Bootstrapping to Natural ...
 
Namir Anani, ICTC. Economic Resiliency in The Face of Adversity
Namir Anani, ICTC. Economic Resiliency in The Face of AdversityNamir Anani, ICTC. Economic Resiliency in The Face of Adversity
Namir Anani, ICTC. Economic Resiliency in The Face of Adversity
 
Mada Seghete, Branch. Mobile Growth Trends
 Mada Seghete, Branch. Mobile Growth Trends Mada Seghete, Branch. Mobile Growth Trends
Mada Seghete, Branch. Mobile Growth Trends
 
Julia Petryk, MacPaw. Product PR: a how-to guide
Julia Petryk, MacPaw. Product PR: a how-to guideJulia Petryk, MacPaw. Product PR: a how-to guide
Julia Petryk, MacPaw. Product PR: a how-to guide
 
Yaroslav Ravlinko, Intellias. You don’t need Kubernetes. You need to understa...
Yaroslav Ravlinko, Intellias. You don’t need Kubernetes. You need to understa...Yaroslav Ravlinko, Intellias. You don’t need Kubernetes. You need to understa...
Yaroslav Ravlinko, Intellias. You don’t need Kubernetes. You need to understa...
 
Yaroslav Novytskyy, Anton Vasylenko, N-iX. Migrating to the cloud: options an...
Yaroslav Novytskyy, Anton Vasylenko, N-iX. Migrating to the cloud: options an...Yaroslav Novytskyy, Anton Vasylenko, N-iX. Migrating to the cloud: options an...
Yaroslav Novytskyy, Anton Vasylenko, N-iX. Migrating to the cloud: options an...
 
Kostiantyn Bokhan, N-iX. CD4ML based on Azure and Kubeflow
Kostiantyn Bokhan, N-iX. CD4ML based on Azure and KubeflowKostiantyn Bokhan, N-iX. CD4ML based on Azure and Kubeflow
Kostiantyn Bokhan, N-iX. CD4ML based on Azure and Kubeflow
 

Dernier

Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 

Dernier (20)

201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 

Cryptocurrencies for Everyone (Dmytro Pershyn Technology Stream)

  • 2. What Is Bitcoin? Cryptocurrency is a digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of a central bank. Bitcoin is a payment system invented by Satoshi Nakamoto, who published the invention in 2008 and released it as open-source software in 2009: • First decentralized digital currency; • Used for online payments in several payment systems; • Traded in Bitcoin Exchanges; • Issued by miners and they are not dependent on any central banks.
  • 3. Currency vs. Bitcoin Currency: • Money (System of money); • Cash payments; • Store value; • Traded between nations in exchange markets, which determine the relative values of the different currencies; • Currency are issued by Central Banks; • Currencies are defined by governments; • High security standards; • Unique ID for every Banknote/Coin. Bitcoin: • Crypto Money – IT representation of money; • Online payments only; • Store value; • Bitcoin Exchange; • Bitcoins can be issued by everyone who owns a required tool; • High security standards; • Decentralized
  • 7. Elements of Cryptocurrency Decentralization Distributed consensus Proof of work Digital Signature Public Key Private Key Hash Pointers and Data Structure Block Chain Merkle Tree Hash Functions Properties SHA-256
  • 8. Cryptographic Hash Functions • Input: any String of any Size; • Fixed Size Ouput: 256 Bit; • Computing the Hash of n-bit String should be running time O(n). Hash Function • Collision-resistance; • Hiding; • Puzzle-friendliness. Cryptographic Hash Function Cryptographically Secure Function
  • 9. SHA-256 Fixed-input hash function Arbitrary input hash function SHA-256 uses Merkle-Damgard transform to turn a fixed-length collision- resistant function into a hash function that accepts arbitrary length inputs. It takes 768 bit input and produces 256-bit outputs. The block size is 512 bit.
  • 10. Hash Pointers and Data Structures Hash Pointer is a pointer where some information is stored together with a cryptographic hash of the information. Whereas a regular pointer gives you a way to retrieve information, a hash poiter also gives you a way to verify that information hasn't changed.
  • 11. Types of Data Structure Block chain is a linked list of hash pointers. This allows us to append data into the end of the log. But if someone alters data that is earlier in the log we are going to detect it (tamper-evident log).
  • 12. Types of Data Structure Merkle Tree: In a Merkle tree, data blocks are grouped in pairs and the hash of each of these blocks is stored in a parent node. The parent nodes are in turn grouped in pairs and their hashes stored one level up the tree. This continues all the way up the tree until we reach the root node.
  • 13. Digital Signatures Main properties of digital signatures: Only you can make your signature, but anyone who sees it can verify that it's valid; The signature must be tied to a particular document; Unforgeability; ECDSA Decentralized identity management. Rather than having a central authority that you have to go in order to register as a user in a system, you can register as a user all by yourself. If you want a new identity, you can just generate one at any time, and you can make as many as you want. These identities are called addresses, in Bitcoin jargon. You’ll frequently hear the term address used in the context of Bitcoin and cryptocurrencies, and all that is really is, is a hash of a public key.
  • 14. Digital Signature Scheme A digital signature scheme consists of the following three algorithms: ● (sk, pk) := generateKeys(keysize) The generateKeys method takes a key size and generates a key pair. The secret key sk is kept privately and used to sign messages. pk is the public verification key that you give to everybody. Anyone with this key can verify your signature. ● sig := sign(sk, message) The sign method takes a message, msg, and a secret key, sk, as input and outputs a signature for the msg under sk ● isValid := verify(pk, message, sig) The verify method takes a message, a signature, and a public key as input. It returns a boolean value, isValid, that will be true if sig is a valid signature for message under public key pk, and false otherwise. We require that the following two properties hold: ● Valid signatures must verify: verify(pk, message, sign(sk, message)) == true ● Signatures are existentially unforgeable
  • 15. Example: Simple Cryptocurrency There are two rules for a simplified cryptocurrency: 1. A designated entity can create new coins whenever he wants and those newly created coins belong to the entity. 2. Second rule is whoever owns a coin can transfer it on to someone else. Transferring is done using cryptographic operations. Bank creates a statement "Pay this to Bank2", where "this" is a hash pointer that references the coin in question. And, as we saw earlier, identities are just public keys, so Bank2 refers to Bank2 public key. So Bank1 signs the coin ONce the data structure signed by Bank1 exists, Bank2 owns the coin. CreateCoin [UniqueCoi nId] Digital Signature (Public and Private) COIN
  • 17. Centralized Currency Model CentralBank publishes history of all transactions that have heppened. To do this he uses a block chain, which is digitally signed by CentralBank. It’s a series of data blocks, each with one transaction in it. Each blockhain has the ID of a transaction, the transaction’s contents, and a hash pointer to the previous block. CentralBank digitally signs the final hash pointer, which represents this entire structure, and publishes the signature along with the block chain. In this model a transaction only counts if it is in the block chain signed by CentralBank. Anybody can verify that a transaction was endorsed by Bank by checking Banks’s signature on the block that it appears in. Bank makes sure that he doesn’t endorse a transaction that attempts to double-spend an already spent coin.
  • 18. How To Install Bitcoin Wallet? • https://bitcoin.org/en/download
  • 23. Where is Wallet.dat Stored? The main wallet file wallet.dat can be located in different places depending on your operating system. ◦ Windows XP - disk:/Documents and Settings/user_name/Application Data/Bitcoin ◦ Windows Vista, 7, sever 2008 - disk:/Users/user_name/AppData/Roaming/Bitcoin ◦ Linux uses address ~/.bitcoin/ ◦ Mac OSX uses folder /Users/user_name/Application Support/Bitcoin/
  • 24. How to Integrate Nodes Into a System?
  • 25. Decentralization Problems 1. Who maintains the ledger of transaction? 2. Who has authority over which transactions are valid? 3. Who creates new bitcoins? 4. Who determines how the rules of the system change? 5. How do bitcoins acquire exchange value?
  • 26. Distributed Consensus Distributed consensus protocol. There are n nodes that each have an input value. Some of these nodes are faulty or malicious. A distributed consensus protocol has the following two properties: 1. It must terminate with all honest nodes in agreement on the value 2. The value must have been generated by an honest node All the nodes in the peer to peer network have a ledger consisting of a sequence of blocks, each containing a list of transactions, they've reached consensus on. Additionally, each node has a pool of outstanding transactions, that it has heard about, but have not yet included into the block chain.
  • 27. Node Backlog vs Blockchain Backlog Blockchain Unverified transactions: - Transaction 1 - Transaction 2 - Transaction 3 - Transaction 4 Verified transactions
  • 28. Hash Puzzles In order to create a block, the node that proposes that block is required to find a number, or nonce, such that the when you concatenate the nonce, the previous hash, and the list of transactions that comprise that block and take the hash of this whole string, then that hash output should be a number that falls into a target space that is quite small in relation to the the much larger output space of that hash function. We can define such a target space as any value falling below a certain target value. In this case, the nonce will have to satisfy the following inequality: (nonce || prev_hash || tx || tx H || ... || tx) < target
  • 29. Hash Puzzles There are three important properties of hash puzzles: Difficult to compute; Parameterizable cost; Trivial to verify
  • 30. Incentives and Proof of Work The question: can we give nodes an incentive for behaving honestly? ◦ Transaction fees; ◦ Block reward: is cut in half every four years limiting the total supply of bitcoins to 21 million.
  • 31. Incentives and Proof of Work Mining and proof-of-work; ◦ The key idea behind proof-of-work is that we approximate the selection of a random node by instead selecting nodes in proportion to a resource that we hope that nobody can monopolize. If, for example, that resource is computing power, then it’s a proof-of-work system. ◦ Hash-puzzles
  • 32. Possible Attacks Double-spend attack: create two transactions: one in which she sends Bob Bitcoins, and a second in which she double spends those Bitcoins by sending them to a different address that she controls. As they spend the same Bitcoins, only one of these transactions can be included in the block chain. The arrows are pointers from one block to the previous block that it extends including a hash of that previous block within its own contents. CA is used to denote a coin own by Alice.
  • 33. Double-Spend Attack This is what double-spend attempt looks like from Bob the merchant’s viewpoint. In order to protect himself from this attack, Bob should wait until the transaction with which Alice pays him is included in the block chain and has several confirmations.
  • 35. Bitcoin Traders Club Meeting Leonardo Business Centre Khmelnytsky st. 17/52, office 429а Upcoming meeting – 8th October, 19:15 Contact me: Dmytro Pershyn +380967350535 dpershyn@hotmail.com
  • 37. CreateCoin/PayCoin Transactions CreateCoin transaction creates multiple coins. Each coin has a serial number within the transaction. Each coin also has a value; it’s worth a certain number of BankCoins. Finally, each coin has a recipient, which is a public key that gets the coin when it’s created. So CreateCoin creates a bunch of new coins with different values and assigns them to people as initial owners. We refer to coins by CoinIDs. A CoinID is a combination of a transaction ID and the coin’s serial number within that transaction.
  • 38. CreateCoin/PayCoin Transactions The second kind of transaction is PayCoins. It consumes some coins, that is, destroys them, and creates new coins of the same total value. The new coins might belong to different people (public keys). This transaction has to be signed by everyone who’s paying in a coin. So if you’re the owner of one of the coins that’s going to be consumed in this transaction, then you need to digitally sign the transaction to say that you’re really okay with spending this coin.
  • 39. Consensus Schema The Bitcoin protocol must reach consensus in the face of two types of obstacles: imperfections in the network, such as latency and nodes crashing, as well as deliberate attempts by some nodes to subvert the process. Every 10 minutes, every node in the system proposes its own outstanding transaction pool to be the next block. Then the nodes execute some consensus protocol, where each node’s input is its own proposed block. Some nodes may be malicious and put invalid transactions into their blocks, but we might assume that other nodes will be honest. If the consensus protocol succeeds, a valid block will be selected as the output. Even if the selected block was proposed by only one node, it’s a valid output as long as the block is valid. Now there may be some valid outstanding transaction that did not get included in the block, but this is not a problem. If some transaction somehow didn’t make it into this particular block, it could just wait and get into the next block.
  • 40. Implicit consenseus Two assumptions: So for the moment, take a leap of faith and assume that it is possible to pick a random node from the Bitcoin network in this manner. Further assume, for the moment, that this token generation and distribution algorithm is sufficiently smart so that if the adversary is going to try to create a lot of Sybil nodes, all of those Sybils together will get only one token. This means the adversary is not able to multiply his power by creating new nodes.
  • 41. Implicit Consenseus Bitcoin consensus algorithm (simplified). This algorithm is simplified in that it assumes the ability to select a random node in a manner that is not vulnerable to Sybil attacks. 1. New transactions are broadcast to all nodes 2. Each node collects new transactions into a block 3. In each round a random node gets to broadcast its block 4. Other nodes accept the block only if all transactions in it are valid (unspent, valid signatures) 5. Nodes express their acceptance of the block by including its hash in the next block they create
  • 42. Trading Tricks • Hedging • Market Volume analysis • Deflation currency • Speculative Bubbles