Difference between revisions of "Blockchain"
m |
m (Text replacement - "http:" to "https:") |
||
Line 5: | Line 5: | ||
|description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools | |description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools | ||
}} | }} | ||
− | [ | + | [https://www.youtube.com/results?search_query=Federated+Learning+deep+machine+learning+ML+AI+Blockchain Youtube search...] |
− | [ | + | [https://www.google.com/search?q=Federated+Learning+deep+machine+learning+ML+AI+Blockchain ...Google search] |
* [[Case Studies]] | * [[Case Studies]] | ||
Line 22: | Line 22: | ||
* [[Non-Fungible Token (NFT)]] | * [[Non-Fungible Token (NFT)]] | ||
* [[Quantum#Quantum Cryptographic Technology| Quantum Cryptographic Technology]] | * [[Quantum#Quantum Cryptographic Technology| Quantum Cryptographic Technology]] | ||
− | * [ | + | * [https://venturebeat.com/2021/12/20/use-of-blockchain-technology-could-increase-human-trust-in-ai/ Use of blockchain technology could increase human trust in AI | Deepak Gupta - VentureBeat] |
− | * [ | + | * [https://101blockchains.com/types-of-blockchain/ 4 Different Types of Blockchain Technology & Networks | 101 Bloackchains] |
− | * [ | + | * [https://en.wikipedia.org/wiki/Decentralized_autonomous_organization Decentralized Autonomous Organization (DAO) | Wikipedia] |
− | * [ | + | * [https://en.wikipedia.org/wiki/Fork_(blockchain) Fork (blockchain)] |
− | * [ | + | * [https://www.forbes.com/sites/jonathanponciano/2021/03/09/bill-gates-bitcoin-crypto-climate-change/?sh=7763641a6822 Bill Gates Sounds Alarm On Bitcoin's Energy Consumption–Here's Why Crypto Is Bad For Climate Change | Jonathan Ponciano - Forbes] ... According to Digiconomist, one bitcoin transaction requires about 707.6 kilowatt-hours of electrical energy, the amount of energy the <b>average U.S. household consumes in 24 days</b>. |
− | A blockchain is a growing list of records, called blocks, that are linked together using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a Merkle tree). The timestamp proves that the transaction data existed when the block was published in order to get into its hash. As blocks each contain information about the block previous to it, they form a chain, with each additional block reinforcing the ones before it. Therefore, blockchains are resistant to modification of their data because once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks. Blockchains are typically managed by a peer-to-peer network for use as a publicly distributed ledger, where nodes collectively adhere to a protocol to communicate and validate new blocks. Although blockchain records are not unalterable as forks are possible, blockchains may be considered secure by design and exemplify a distributed computing system with high Byzantine fault tolerance.[ | + | A blockchain is a growing list of records, called blocks, that are linked together using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a Merkle tree). The timestamp proves that the transaction data existed when the block was published in order to get into its hash. As blocks each contain information about the block previous to it, they form a chain, with each additional block reinforcing the ones before it. Therefore, blockchains are resistant to modification of their data because once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks. Blockchains are typically managed by a peer-to-peer network for use as a publicly distributed ledger, where nodes collectively adhere to a protocol to communicate and validate new blocks. Although blockchain records are not unalterable as forks are possible, blockchains may be considered secure by design and exemplify a distributed computing system with high Byzantine fault tolerance.[https://en.wikipedia.org/wiki/Blockchain Wikipedia] |
===== How Does It Work? ===== | ===== How Does It Work? ===== | ||
Line 48: | Line 48: | ||
<youtube>bBC-nXj3Ng4</youtube> | <youtube>bBC-nXj3Ng4</youtube> | ||
<b>But how does bitcoin actually work? | <b>But how does bitcoin actually work? | ||
− | </b><br>The math behind cryptocurrencies. Help fund future projects: https://www.patreon.com/3blue1brown An equally valuable form of support is to simply share some of the videos. Special thanks to these supporters: | + | </b><br>The math behind cryptocurrencies. Help fund future projects: https://www.patreon.com/3blue1brown An equally valuable form of support is to simply share some of the videos. Special thanks to these supporters: https://3b1b.co/btc-thanks This video was also funded with help from Protocol Labs: https://protocol.ai/join/ Some people have asked if this channel accepts contributions in cryptocurrency form. As a matter of fact, it does: |
− | + | https://3b1b.co/crypto | |
|} | |} | ||
|}<!-- B --> | |}<!-- B --> | ||
− | * [ | + | * [https://andersbrownworth.com/blockchain/public-private-keys/ If you are interested in playing with this on your own | Anders Brownworth] |
− | * [ | + | * [https://github.com/anders94/public-private-key-demo The code that runs this demo is also on GitHub | Anders Brownworth] |
{|<!-- T --> | {|<!-- T --> | ||
Line 74: | Line 74: | ||
|}<!-- B --> | |}<!-- B --> | ||
− | [ | + | [https://en.wikipedia.org/wiki/SHA-2 <b>SHA-2 (Secure Hash Algorithm 2)</b>] is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. They are built using the [https://en.wikipedia.org/wiki/Merkle%E2%80%93Damg%C3%A5rd_construction Merkle–Damgård] construction, from a one-way compression function itself built using the Davies–Meyer structure from a specialized block cipher. ..The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits... .SHA-2 was first published by the National Institute of Standards and Technology (NIST) as a U.S. federal standard (FIPS). The SHA-2 family of algorithms are patented in US patent 6829355. The United States has released the patent under a royalty-free license. | Wikipedia |
=== Introduction === | === Introduction === | ||
− | A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone. [ | + | A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone. [https://www.ussc.gov/sites/default/files/pdf/training/annual-national-training-seminar/2018/Emerging_Tech_Bitcoin_Crypto.pdf Bitcoin: A Peer-to-Peer Electronic Cash System | Satoshi Nakamoto] - [https://bitcoin.org/en/ bitcoin.org] |
<youtube>qOVAbKKSH10</youtube> | <youtube>qOVAbKKSH10</youtube> | ||
Line 99: | Line 99: | ||
=== Uses === | === Uses === | ||
− | [ | + | [https://www.youtube.com/results?search_query=Distributed+Ledger Youtube search...] |
− | [ | + | [https://www.google.com/search?q=Distributed+Ledger ...Google search] |
* [[Gaming]] | * [[Gaming]] | ||
Line 112: | Line 112: | ||
===== Supply Chain ===== | ===== Supply Chain ===== | ||
− | Blockchain use cases for supply chain include immutability into the provenance of goods, the elimination of reconciliation pain across multiple parties and the real-time visibility to perform track and trace analysis, assess risks and accelerate physical and financial supply chains. [ | + | Blockchain use cases for supply chain include immutability into the provenance of goods, the elimination of reconciliation pain across multiple parties and the real-time visibility to perform track and trace analysis, assess risks and accelerate physical and financial supply chains. [https://www.r3.com/customers/supply-chain/#:~:text=Blockchain%20use%20cases%20for%20supply,physical%20and%20financial%20supply%20chains. Blockchain for supply chain management: use cases and applications | r3] |
<youtube>RscsA7uX6WY</youtube> | <youtube>RscsA7uX6WY</youtube> | ||
Line 128: | Line 128: | ||
− | <img src=" | + | <img src="https://101blockchains.com/wp-content/uploads/2020/04/Types-of-Blockchain-Technology-1982x2048.png" width="800"> |
Revision as of 03:16, 28 March 2023
Youtube search... ...Google search
- Case Studies
- Decentralized: Federated & Distributed
- Directed Acyclic Graph (DAG)
- Metaverse
- Privacy
- OpenMined
- Non-Fungible Token (NFT)
- Quantum Cryptographic Technology
- Use of blockchain technology could increase human trust in AI | Deepak Gupta - VentureBeat
- 4 Different Types of Blockchain Technology & Networks | 101 Bloackchains
- Decentralized Autonomous Organization (DAO) | Wikipedia
- Fork (blockchain)
- Bill Gates Sounds Alarm On Bitcoin's Energy Consumption–Here's Why Crypto Is Bad For Climate Change | Jonathan Ponciano - Forbes ... According to Digiconomist, one bitcoin transaction requires about 707.6 kilowatt-hours of electrical energy, the amount of energy the average U.S. household consumes in 24 days.
A blockchain is a growing list of records, called blocks, that are linked together using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a Merkle tree). The timestamp proves that the transaction data existed when the block was published in order to get into its hash. As blocks each contain information about the block previous to it, they form a chain, with each additional block reinforcing the ones before it. Therefore, blockchains are resistant to modification of their data because once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks. Blockchains are typically managed by a peer-to-peer network for use as a publicly distributed ledger, where nodes collectively adhere to a protocol to communicate and validate new blocks. Although blockchain records are not unalterable as forks are possible, blockchains may be considered secure by design and exemplify a distributed computing system with high Byzantine fault tolerance.Wikipedia
Contents
How Does It Work?
Behind blockchains & cryptocurrencies
|
|
- If you are interested in playing with this on your own | Anders Brownworth
- The code that runs this demo is also on GitHub | Anders Brownworth
|
|
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. They are built using the Merkle–Damgård construction, from a one-way compression function itself built using the Davies–Meyer structure from a specialized block cipher. ..The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits... .SHA-2 was first published by the National Institute of Standards and Technology (NIST) as a U.S. federal standard (FIPS). The SHA-2 family of algorithms are patented in US patent 6829355. The United States has released the patent under a royalty-free license. | Wikipedia
Introduction
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone. Bitcoin: A Peer-to-Peer Electronic Cash System | Satoshi Nakamoto - bitcoin.org
Programming
Uses
Youtube search... ...Google search
- Gaming
- Agriculture
- Healthcare
- Law
- Banking
- Real Estate
- ... other uses of blockchain: cryptocurrencies, smart contracts, energy trading, supply chain, anti-counterfeiting, domain names, decentralized voting, proof of existence and
Supply Chain
Blockchain use cases for supply chain include immutability into the provenance of goods, the elimination of reconciliation pain across multiple parties and the real-time visibility to perform track and trace analysis, assess risks and accelerate physical and financial supply chains. Blockchain for supply chain management: use cases and applications | r3
Distributed Ledger
A distributed ledger is a database that is consensually shared and synchronized across multiple sites, institutions, or geographies, accessible by multiple people. ... Underlying distributed ledgers is the same technology that is used by blockchain, which is the technology that is used by bitcoin.