Skip to main content

What is Bitcoin?



Before we understand what, is bitcoin and how it works? We must know why bitcoin was created?
Bitcoins is created to cut the middleman (Bank) from the transaction process. To understand this let’s take an example assume you want to send money to your friend who is in U.S. Now to send money it go through a bank in your country. Here now bank take fee for processing. Once the money reaches the bank in U.S. Now the friend’s bank will charge fee too. Now let assume it’s ok they take fee that’s not a problem. But bank store lots of personal data about their customer. Before the invention
of Bitcoins. Many banks where been hacked during this period of time. Which is very dangerous for the people that use the bank because their privacy is at risk. So this how bitcoin was introduced.


So, now let’s see what is Bitcoin?
In laymen’s term:
Bitcoin is a digital currency. That’s a concept that might be more complex than you realize , it isn’t simply an assigned value of money stored in digital account, like your bank account or credit line .Rather than that its basically a computer file which is stored in “digital wallet” app on a computer or mobile.
Bitcoin is block of ultra-secure data that are treated like money. Moving this data from one person to another and verifying the transaction, i.e. spending the money.



In Technical term:
Bitcoin was released in 2009 by a unknown person or a group with the name of “Satoshi Nakamoto “.The domain name “bitcoin.com” was register on 18 August 2008.On 31 October 2008, a link to a paper authored by Satoshi Nakamoto titled Bitcoin: A Peer-to-Peer Electronic Cash system was posted to a cryptography mailing list.
How Bitcoins are created?
New Bitcoins are generated by a competitive and decentralized process called “mining”.
Bitcoin mining “is vast topic. So, we will discuss in some other blog. So, for now we will see it in laymen term.
In laymen’s term: New Bitcoin are created by solving the mathematical equation called “blocks”, which are created every time there is bitcoin exchange.



Interesting Fact: There are only 21 million bitcoins that can be mined in total.
Last estimated year when all the bitcoin will be mined is 2140. 


Comments

Popular posts from this blog

Secure Network(Week 4)

Network hardening is the process of securing a network by reducing its potential vulnerabilities through configuration changes and taking specific steps.   Implicit deny is a network security concept where anything not explicitly permitted or allowed should be denied. Analyzing logs is the practice of collecting logs from different networks and sometimes client devices on your network, then performing an automated analysis on them. Correlation analysis is the process of taking log data from different systems and matching events across the systems. Flood guards provide protection against Dos or denial of service attacks. EAP-TLS is an authentication type supported by EAP that uses TLS to provide mutual authentication of both the client and the authenticating server.   if you really want to lock down your network, you can implement 802.1x . DHCP Snooping Attack Why WEP Encryption fall apart? A general concept in security and encryption is to never send the plain ...

Troubleshooting and debugging

Troubleshooting is the process of identifying, analyzing, and solving problems.  Debugging is the process of identifying, analyzing, and removing bugs in a system. We sometimes use troubleshooting and debugging interchangeably.  But generally, we say troubleshooting when we're fixing problems in the system running the application, and debugging when we're fixing the bugs in the actual code of the application. Debuggers let us follow the code line by line, inspect changes in variable assignments, interrupt the program when a specific condition is met, and more. System calls are the calls that the programs running on our computer make to the running kernel.   A reproduction case is a way to verify if the problem is present or not. Where to check for log file in OS? On Linux , you'd read system logs like /var/log/syslog and user-specific logs like the .xsession-errors file located in the user's home directory. On MacOs , on top of the system logs, you'd go through...

Authentication Authorization Accounting(week 3)

Identification is the idea of describing an entity uniquely. Biometric authentication is the process of using unique physiological characteristics of an individual to identify them. C.R.L(Certificate revocation list) :This is a signed list published by the CA which defines certificates that have been explicitly revoked. Lightweight Directory Access Protocol(LDAP): LDAP is an open industry-standard protocol for accessing and maintaining directory services. Authentication is related to verifying the identity a user, authorization pertains to describing what the user account has access to or doesn't have access to. An access control list or ACL , is a way of defining permissions or authorizations for objects.  RADIUS or Remote Authentication Dial-In User Service , is a protocol that provides AAA services for users on a network.It's a very common protocol used to manage access to internal networks, WiFi networks, email services and VPN services. when a client wants to access a r...