0%

Fundamental Tenets of Blockchain

2022年3月25日 4分读完
新闻文章的横幅图片

Decentralization

Decentralization refers to the shift of control and decision making from a central authority to a distributed network and can be visualized on a spectrum based on the priorities of the blockchain network. Decentralization has many applications, and crypto projects may have different motivations for leveraging a decentralized model including distributed decision-making, distribution of wealth, or security. Although it’s often considered the cornerstone of blockchain technology, not all crypto projects approach decentralization in the same way.

For example, if a network prioritizes the speed of transactions, they may compromise on security, meaning there are fewer nodes responsible for verifying the authenticity of transactions. The fewer number of nodes verifying transactions, the more responsibility or trust each individual node must take on which can lead to security vulnerabilities (and outages). Alternatively, by distributing trust across more nodes, networks can more effectively deter bad actors with intentions to harm the network. With workload spread out evenly across the network, verification of authenticity becomes a much more diligent process and the network in aggregate is less vulnerable.

Transparency

At its core, a blockchain is a public, immutable ledger on which transactions are recorded after appropriate verification by designated network participants known as nodes. This means all transactional activity/information is observable and accessible by anyone using the network and cannot be changed. In contrast, the flow of funds on ledgers of traditional financial institutions are gate-kept by those institutions themselves and are often not immutable.

Computational Logic

The functionality of a blockchain is heavily reliant on computational logic like algorithms and predefined rules that allow nodes to effectively interact with each other and make sure the correct funds make it from point A to point B. The computational logic will often vary based on the blockchain environment.

Enterprises use different algorithms and predefined rules than public blockchains to fulfill their particular use case and business needs. Depending on how sensitive the data is that’s being held on the blockchain, the enterprise might put stricter controls in place to manage who can send transactions and who can validate them. For instance, an airline using blockchain to crosscheck travel documents with flight data is handling much more sensitive information than a retailer using blockchain to track goods from source to end consumer, so more predefined permissions may be employed to ensure transactions are being validated by trustworthy people within the organization. It’s important to note that centralized organizations don’t rely as heavily on distributed trust as public blockchains like the Bitcoin and Ethereum network do

Trust

Blockchain technology seeks to minimize the amount of trust needed by a single entity to achieve consensus. Blockchains are often described as trustless but this isn’t entirely accurate. There are two current mechanisms for achieving consensus in a distributed network: proof of work and proof of stake. We’ll go into these further in a future post, but at a high level one is performed by solving complex mathematical problems while the other is performed by staking funds to a smart contract. Both are designed to incentivize participants to reach consensus in good faith using a combination of economics, game theory, and complex mathematics. Although fundamentally different, both methods help facilitate the distribution of trust within a blockchain environment.

Security

At the block level, peer-to-peer transactions are encrypted by asymmetrical cryptography, more commonly known as public-key cryptography. Public-key cryptography uses a set of public and private keys to confirm transactions are authentic and prevent them from being altered. While your public key is visible to anyone on the network, your private key is visible to only you. Here is public-key cryptography visualized in a peer-to-peer context:

Conclusion

The tenets behind blockchain technology are becoming increasingly dependent on each other as blockchain networks scale to onboard new users.  In our next post, we’ll use this framework to explore and evaluate the two largest blockchain networks: Bitcoin and Ethereum.

The post appeared first on Bittrex.com - The Next Generation Crypto-Currency Exchange.

热门新闻

How to Set Up and Use Trust Wallet for Binance Smart Chain
#Bitcoin#Bitcoins#Config+2 更多标签

How to Set Up and Use Trust Wallet for Binance Smart Chain

Your Essential Guide To Binance Leveraged Tokens

Your Essential Guide To Binance Leveraged Tokens

How to Sell Your Bitcoin Into Cash on Binance (2021 Update)
#Subscriptions

How to Sell Your Bitcoin Into Cash on Binance (2021 Update)

What is Grid Trading? (A Crypto-Futures Guide)

What is Grid Trading? (A Crypto-Futures Guide)

马上免费使用Cryptohopper进行交易!

免费使用——无需信用卡

开始吧
Cryptohopper appCryptohopper app

免责声明:Cryptohopper并非受监管机构。加密货币的机器人交易存在大量风险,过去的业绩表现并不能预示未来的结果。产品截图中展示的利润仅供参考,可能有所夸大。只有在您具备充足的知识或寻求了专业财务顾问的指导后,才应进行机器人交易。在任何情况下,Cryptohopper均不对任何人或实体因使用我们的软件进行交易而产生的全部或部分损失或损害,或任何直接、间接、特殊、后果性或附带的损害承担责任。请注意,Cryptohopper社交交易平台上的内容由Cryptohopper社区成员生成,并不代表Cryptohopper或其代表的建议或推荐。市场上展示的利润并不能预示未来的结果。使用Cryptohopper的服务即表示您承认并接受加密货币交易的固有风险,并同意免除Cryptohopper因您的任何责任或损失的责任。在使用我们的软件或进行任何交易活动之前,务必审阅并理解我们的服务条款和风险披露政策。请根据您的具体情况咨询法律和金融专业人士,获取个性化的建议。

©2017 - 2026 版权归属于Cryptohopper™ -版权所有。