Blockchain Definition:: UNIT-1
Blockchain Definition:: UNIT-1
Introduction: Introduction, basic ideas behind block chain, how it is changing the landscape
of
digitalization, introduction to cryptographic concepts required, Block chain or distributed
trust, Currency,
Cryptocurrency, how a Cryptocurrency works, financial services, Bitcoin prediction markets.
1.1 Introduction
Blockchain Definition:
Blockchain is a chain of transactions, contained in blocks, hence the name
blockchain.
Blockchain is a decentralized, digital and distributed ledger that allows peer- to -peer
transactions secured by cryptographic algorithms and consensus mechanisms and are linked
together in a chain of blocks.
1.2 Basic ideas behind blockchain: Increased trust, data security, and data integrity are
some of the key benefits of blockchain. Distributed Ledger, Decentralization, transparency,
immutability, and auditability are the basic ideas behind blockchain which support these
benefits.
Distributed: Distributed ledgers take the advantages of traditional or general ledgers and
make them more resilient. Instead of having a single copy of the master data, a distributed
ledger shares the full data set across several network participants (members); each member
has a complete copy of the data.
When someone creates a spreadsheet in Google Drive, they can share it with multiple people.
In our analogy, this spreadsheet can be compared to a Blockchain.
The spreadsheet is generally shared over a large network of computers when shared with
multiple people. The computers having a copy of the spreadsheet are referred to as nodes in
the Blockchain world.
Every node on the network has access to the same spreadsheet. Whenever someone edits or
modifies the spreadsheet, it gets updated automatically on every computer on the network.
Thus, the spreadsheet is updated in real-time, and a single version of the spreadsheet is
always visible to everyone on the network.
This has various benefits. No single point has the master data file, so no single point can
corrupt the master data file. If you lose one of the end points, the rest of the end points still
maintain all the data. And when someone tries to make an update to the data in a distributed
ledger, all the other end points are involved in the process of accepting or rejecting the update.
In a distributed ledger, any updates must be agreed upon by the others — making it very hard
to hack.
Decentralization:
Decentralization means that “not centralized” which mean there is no central authority.
It is like a ledger that a bank uses to keep track of all customer transactions. However, in a
bank, the ledger is controlled by the bank, and only the bank can see the transactions.
Whereas in blockchain, there is no central authority, and the ledger runs on multiple
computers and doesn’t require any single person to authenticate or settle transactions.
Blockchain changes from a central authority to a decentralized system where all members
communicate directly with all other members.
Each member has a complete copy of the data, and updates to the data must be approved by
the members, to stop bad actors. If a malicious person or user attempts to delete the entire
blockchain from a member, the other members retain the information, so no data is lost. If a
bad actor tries to edit the historical data of one member, the other members will refuse to
authenticate it. This denial prevents the false information from entering the blockchain.
Additionally, modern application development recognizes that monolithic architectures aren’t
always efficient. Keeping all the data in a central, large, authoritative database or ledger
increases risk of compromise or loss.
Each member has a complete copy of the data set. If a portion of the network goes down and
takes down a member with it, the remaining members are able to validate and accept updates
to the data structure. When the network is back up, that isolated member will be updated with
the newest data set.
Transparency
Another piece of blockchain that increases trust is transparency. Transparency means that the
information stored in the blockchain is visible to the members of the blockchain. Blockchain
maintains a complete record of all transactions, and that record is available to every member,
making blockchain a very transparent technology.
If we think of an agricultural example, at every step of the way, the people involved can see
the whole path to date. So, the shipping company can see all the information about when and
where the blueberries were harvested. The distributor can see all of that, plus information on
the shipping company:
Additionally, the grocery store gets to see all that information as well, all the way back to
when and where the berries were initially harvested. And because all the members have all
the data, the farmer who initially grew the berries can see when they arrived at their
destination and how they got there.
That level of transparency helps build trust, because everyone is able to see what is going on
with their product.
Which truck transported the blueberries
Who the driver was
How long the trip took
What the truck temperature was
Some blockchain technologies, such as Hyperledger Fabric, provide data privacy as a native
mechanism within the blockchain. With channels, you can create separate channels of the
blockchain to share the data that makes sense to share, without losing any of the previous
information. For example, if the distributor had contracts with multiple restaurants, grocery
stores, and wholesalers, they could branch the data off to each group. Each customer would
be able to track all the way back to the harvest, but the purchase price and volume could stay
between the distributor and the buyer.
When you think of all the data available, and the fact that everyone can see what’s in the
block on a public blockchain, transparency really helps increase trust in the data. However,
that trust in the data is only really possible because of immutability.
Immutability
Immutability simply means something cannot be edited or changed. You can update the
information in a blockchain by adding data, which will be added in a new block. However,
once a block is part of the chain, the information in that block can’t be changed.
The immutability of blockchain is directly tied to its decentralization. Even if someone were
able to edit the information in an already written block and try to push that information into
the blockchain, it wouldn’t work. As soon as the change was made on one member, and an
attempt made to synchronize back up with the rest of the chain, the rest of the members
would recognize a problem. Once the problem was recognized, the update would be blocked.
Every time a piece of information is changed, instead of updating the value and losing sight
of what it used to be, blockchain simply adds a new block that holds the new data, while
continuing to maintain all the old data as well.
This immutability builds trust by letting everyone viewing the information on a blockchain
know that the information hasn’t been tampered with. With traditional databases, if the master
database gets compromised, it can be difficult to prove that the data was tampered with and
also to know, with certainty, what the correct data is. With blockchain, you can be sure that
the data you’re viewing was the originally written data and that nobody went in after the fact
and modified it.
Auditability
Auditability is another benefit of using blockchain. Auditability speaks to how readily
available and accessible something is to audit. Blockchain, relying on the other benefits
already discussed, is a very auditable platform.
With blockchain’s transparency, the auditor can investigate the blockchain and see all the
transactions across time. They’re able to know exactly what happened, when it happened,
where it happened, and how it happened.
With blockchain’s immutability, a complete audit log for every interaction is created. This
can be shared with an auditor, who knows the data hasn’t been compromised. Auditors can
also compare the data between two members to validate the authenticity of the data.
In brief, let us compare traditional databases and Blockchain
Traditional Databases — Blockchain
1. Centralized — Decentralized
2. CRUD operations are performed — only new block can be added and view data
3. Only admin can access the data — everyone has copy of data
Benefits of Blockchain
The decentralized, distributed nature of the blockchain network, the increased security offered
by smart contracts, cryptography and consensus algorithms together make blockchain the
universally accepted infrastructure that provides increased trust and transparency.
The transparency within the network increases collaboration which leads to faster
transaction settlement. The removal of intermediary thus reduces cost as well, and
also reduces the risk of single point failure and eliminating the need of reconciliation.
The immutability and irreversibility of transaction ensures improved compliance and
audits eventually leading to a new business models, when the deal was signed in the
blockchain involving all the stakeholders.
1.3 How it is changing the landscape of digitalization?
1. Explain some of the applications of Blockchain.
Blockchain is a decentralized database that keeps a permanent record of all transactions. Once
a record is written to a blockchain, it is unable to modify.
It is changing the landscape of digitalization in many ways that mean it defines the problem
with the traditional system and provides a hint or solution that can be solved using
Blockchain.
2. Blockchain technology can be used in cars. Odometer fraud — By tampering with the
odometer, someone can make a car to be newer and less worn out resulting in
customers paying more than what the car is actually worth.
The government tries to counter this by collecting the milage of cars when they get a safety
inspection, but that’s not enough. Instead, we can replace regular odometers with smart ones
that are connected to the internet and frequently write the cars milage to a blockchain. This
would create a secure and digital certificate for each car. Since, we use a blockchain, no one
can tamper with the data and everyone can look up a vehicle’s history.
In fact, this already being developed by Bosch’s IoT lab and they are currently testing it on a
fleet of 100 cars in Germany and Switzerland.
So, Blockchains are great at keeping track of things over time.
3. Besides odometers, we can also keep track of things like Intellectual Property or Patents or
it can even function as a notary.
Notary is someone who can perform and verify signatures on legal documents. We can use a
blockchain for it. The online website stampd.io allows us to add documents to the bitcoin or
Ethereum blockchain. Once added, we can always prove that we created a document ate
certain point of time much like a notary. But right now, blockchains aren’t on the same level
as notaries in a legal perspective.
4. Digital Voting — At present, voting happens either on paper or on special computers that
are running proprietary software. Voting on paper costs a lot of money and electronic voting
has security issues.
In recent years, we have seen countries move away from digital voting and adopting paper
votes again because they fear that electronic votes can be tampered with and influenced by
hackers.
But instead of paper, we could use blockchains to cast and store votes. Such a system would
be very transparent as everyone could verify the voting count for themselves and it would
make tampering very difficult.
The Swiss company Agora is already working on such a system and it’s going to be
completely open source. But there are many challenges.
Firstly, we have to be able to identify voters without compromising their privacy.
If we allow people to vote with their own computers or phone, those might be infected with
malware designed, to tamper with the voting process.
Finally, a system like this also has to be able to withstand denial of service attacks because
that could render the whole thing unusable.
If it comes in reality, it could make a more transparent and practical voting system.
5. Food Industry — In food industry, they could use blockchain technology to track their food
products from the moment they are harvested or made, to when they end up in the hands of
customers.
Every year almost half a million people die because of food-borne diseases and it takes too
long to isolate the food that is causing harm.
Blockchains could help us to create a digital certificate for each piece of food, proving where
it came from and where it has been. So, if a contamination is detected we can trace it back to
its root and instantly notify other people who bought the same batch of bad food.
Walmart and IBM are currently working on such a system. It allowed them to trace the origin
of a box of mangoes in just 2 seconds, compared to days or weeks with a traditional system.
6. Shipping — We can track packages and shipments by using a blockchain. IBM and
container shipping giant Maersk are working on a decentralized ledger to help with making
global trade of goods more efficient.
A cargo ship being loaded with goods. Major international shippers are starting to use
blockchain technology to monitor shipments. Blockchain provides shippers with several
valuable tools to maintain control of their customer’s property. Every touch-point or
interaction can be tracked and logged. Blockchain’s consensus mechanisms ensure that all
the data included is the data that was entered — nobody has manipulated the data after the
fact. And finally, the record contains the entire history of a shipped item, from entering the
shipping system through delivery.
7. Smart Contracts — Blockchains can be used to keep track of information and verify its
integrity. But blockchains can be even more powerful when we add smart contracts to them.
These are tiny computer programs that live on the blockchain and can perform actions when
certain conditions are met.
Insurance companies could use smart contracts to validate claims and calculate a payout or
they could allow us to only pay for car insurance when we are driving.
8. With Smart contracts we can secure our own data on a blockchain. They could allow us to
store our medical records on a blockchain and allow doctors to access them when we approve
it with a digital signature.
9. Collecting royalties for artists: A future streaming service could setup two smart contracts:
1. One where users send their monthly subscription to and
2. One that keeps track of what the user has listened to.
At the end of each month, the smart contract that holds the subscription fee can automatically
distribute the money to artists, based on how many times their songs have been listened to.
Cryptography in Blockchain
What are the Cryptographic functions used in Blockchain?
The security in blockchain network is provided by the cryptography concept.
Cryptographic Functions used in Blockchain:
The Cryptography consists of mainly 3 functions called Cryptographic functions. They are
Hash functions, Public and Private Key Encryption, and Digital Signatures
The above three security mechanisms can be used stand alone or in combination to make the
system more and more secure.
If we talk about Digital Signatures and Public — Private Key Encryption, it is mainly used in
initiation and broadcasting of transaction. Whereas, Hash function is used in chaining of a
transaction.
Using a fixed-length output increases security since anyone trying to decrypt the hash won’t
be able to tell how long or short the input is simply by looking at the length of the output. The
only method to determine the original string from its hash is by using “brute-force.” Brute-
force basically means that one has to take random inputs, hash them and compare them with
the target hash. For instance, if the SHA-256 hash algorithm is used, a brute-force attack
would need to make 2²⁵⁶ attempts to generate the initial data.
Properties of Hash Function:
The input to a hash function could be anything. It could be a pdf document, images or even
a log file.
This file will be inputted to hash function and the output from a hash function will be of a
fixed length which also represent the digital fingerprint of the input. This fixed length output
will be a unique value w.r.t the input file. That’s why it is also known as the digital
fingerprint of the input.
Another property of hash function is that even a small change in input lead to a completely
different output.
Let us understand with an example.
In this example, there is a number from 1 to 9 and then 0 (1234567890), whereas in second
function there is a number from 1 to 9 and then 1 (1234567891). There is just one digit
different, but if you notice the output, it is completely different. So, even a small change in
input leads to a completely different output.
Encryption:
The second factor which controls the security in blockchain network is encryption.
Encryption takes plain text and turns it into cipher text by using a key or key pair. The result
is a meaningless message unless you have a key.
In order to perform encryption, the network need public and private key. This public, private
key can be created using online site as well.
Public key is known to everyone in the network, just like our email which is known to
everybody within our organization. Private key is private only to the user like bank account
password.
If something is encrypted with public key, it can only be decrypted with the private key and
vice-versa.
What are the types of Encryption and How encryption works in blockchain system?
There are 2 types of encryption
1. Symmetric encryption
2. Asymmetric encryption
Symmetric Encryption:
Symmetric encryption is done using single key.
Symmetric Key Cryptography is also known as Secret Key Encryption. Same key (identical
private keys) is shared between sender and receiver. Need to exchange the shared key by both
parties using a secured channel, otherwise it could lead to severe information leak.
Computationally, it is easy to generate and Robust to resist. The vulnerability increases as the
users having the same shared key increases.
For Example, Alice wants to share some confidential information with Bob
So, Alice uses Symmetric Encryption and encrypt the data using her key
At the receiver end, Bob uses Alice Key and decrypt the document.
In this example, though encryption is used, it is not considered safe, because of single key
encryption. This key could be compromised which could lead to severe information leak.
Asymmetric Encryption:
In this encryption, separate encryption and decryption key are used in order to decrypt and
encrypt a message. The users can only be able to decrypt an encrypted message, if they have
the appropriate decryption key.
This asymmetric encryption provides more advantages over symmetric encryption algorithm.
For example,
Alice wants to share some confidential information with Bob. Before sending the data to Bob,
Alice encrypts the data using encryption key. At the receiver end, Bob uses Decryption Key
in order to decrypt the data.
It can be mainly used for
1. Encrypted Communications
2. Authenticated Communications
3. Confidential and Authenticated Communications
Encrypted Communications:
This type of encryption is used, when the sender wants to ensure that only the intended users
should be able to decrypt and access the document. If something is encrypted using private
key, it can only be decrypted using public key.
Let us understand with an example.
Here, Alice wants to send some data to Bob, where she wants only Bob should be able to
open the document. In order to achieve this, Alice decided to go with Asymmetric Encryption.
Here, Alice and Bob are part of network, so both have their own public and private key
respectively.
In this case, Alice encrypted the data using Bob’s public key and send the document over the
network.
Document is received by Bob, i.e., document is encrypted using Bob’s public key which can
be decrypted by only Bob’s private key. Since Bob’s private key is only known to Bob and
hence only Bob will be able to open or decrypt the document.
Let us suppose Eve is malicious person in the network. She wants to tamper the document.
When Eve receives the document, she tried to decrypt it, but she was not able to do so
because the document was encrypted using Bob’s public key and it can only be decrypted
using Bob’s private key. Now, Bob’s private key is private to Bob alone and not shared with
Eve and hence Eve will not be able to decrypt the data, which means the network secure.
This kind of encryption is mainly used where the documents are intended for particular
people and not to everybody.
Authenticated Communications:
Let Alice tries to send some confidential data to Bob. Alice encrypted the data using her own
private key. Since both Alice and Bob are part of the network, they have their respective
public and private key combination. We need to remember that, if something is encrypted
with a private key, it can only be decrypted with a public key.
Here Alice is encrypting the data using her own private key and send the data over the
network.
Once the data reaches to Bob, he uses Alice’s public key to decrypt it. If the document gets
decrypted, it means that the document is sent by Alice. If document is not decrypted using
Alice’s public key, it means that document is tampered and compromised.
Suppose Eve is also in the network. She tries to tamper the data. She is able to decrypt the
data since the data could be decrypted using Alice’s public key which is known to everybody.
But, in order to send the data, first of all Eve has to encrypt the tampered data for which she
requires Alice private key. Now, Alice’s private key is not present with Eve, hence the
tampered data will be identified by Bob during decryption.
Here, we have to remember the sequence in which encryption takes place, first with sender’s
private key and then receiver’s public key, because at the time of decryption, same order will
be followed.
Once the document is received by Bob, first he will decrypt it using his own private key
which ensures that only the intended user can decrypt the first round of encryption. Then he
will use the sender’s private key to decrypt it and read the document.
If we have an attack in the network, in order to decrypt the first round of encryption, the
attackers should have Bob’s private key which is not possible and hence network is secured
from any external attack.
Digital Signature:
A digital Signature is a mechanism to ensure the authenticity of electronically transmitted
documents like email, word document, spreadsheet etc. which remains intact.
Authenticity means that you know who created the document and you have full trust that it
has not been altered.
Once the fingerprint is created, Alice will encrypt it using her private key such that receiver is
rest assured that the document is sent by Alice. This encrypted data is known as Digital
Signature of the document.
Once the digital signature is created alike will sent this signature along with original
document to Bob.
Verification of Digital Signature:
Now, Bob will verify the data which he has received. In total, he has received two documents.
One is original contract and the other is digital signature of the contract.
First, Bob has to decrypt the digital signature. Bob uses Alice public key which assures that
the data sent by alike alone and nobody else. After decryption, Bob will get the digital
fingerprint which is nothing but the hash value of the original document.
The second step is to proceed with the hash value of the document which was received I.,
contract document. By the end of second step, Bob has two hash values from two different
documents.
Just by comparing both the documents, Bob will come to know whether the document he has
received is correct or not. If both the hash value matches, then the document is correct,
otherwise someone tampered the document and he has received the tampered document.
Blockchain or Distributed Trust
Trust is an unstable equilibrium. When two people trust each other, it only takes one of them
to have doubts for the other to also start doubting. The result is that the parties descend into a
state of mutual mistrust, a sentiment that is much less precariously balanced.
When eBay was created, it was not the only online auction and shopping website, but it
invented the concept of buyers and sellers rating each other, a scoring feature that can now be
found on all community sites such as Airbnb, Ballecer, and so. What eBay understood is that
trust could only be created by the community itself and not by the presence of third parties,
which in its case would have meant expert auctioneers.
The externalised trust model is proving inadequate and rely on the trusted third party, to
demand ever greater resources in order to deal with the increase in the number of transactions.
Here External indicates the people like judges, teachers, managers, parents, and so on.
The community-based trust model is much more scalable and able to handle the increase in
the number of interactions. Here community is where several people are involved.
The blockchain model is even more powerful than the community-based trust model:
Blockchain technology based on three pillars: two are technological, asymmetric
cryptography and distributed systems, and the third is sociological, the vision of a transaction
model with a peer-to-peer structure, thereby enabling a distributed consensus to be reached
without the need for a trusted third party.
The blockchain enables the construction of a vast ledger that is distributed as far and as wide
as desired, visible to everyone, updated in accordance with a transactional principle similarly
distributed and guaranteed by a community, without the need for a trusted third party as a
central authority.
The blockchain makes five promises:
1. Distributed trust.
2. A system of transactions.
3. Guaranteed by an extended community.
4. No trusted third parties
5. The capacity to operate complex protocols.
The fifth promise is crucial, as it lends the blockchain its capacity for disruption: the ability to
handle complex protocols (money transfers, banking, validation, and so on) in an automated
way, with much lower transaction costs compared with systems that require human input,
above all in the form of a trusted third party. In other words, the blockchain not only
transports information, but also algorithms, and it does so with the same guarantee of trust as
applies to the information itself.
Currency, Cryptocurrency
In this, we will cover the following
1. Describe the characteristics of Fiat Currency.
2. Define Cryptocurrency and Explain how cryptocurrency works.
3. Explain briefly about e-wallet services and personal cryptosecurity.
Currency:
Before we understand cryptocurrency, let’s first understand some basics about currency that
is being used in today’s world. It is also known as “Fiat Currency.”
Watermark
Security Thread
Cryptocurrency:
In simple terms, Cryptocurrency is a medium of exchange like many other currencies around
the world. But the major difference is that it exists in digital form i.e., there is no tangible
money, only some program snippets.
More importantly, the currency is self-controlled and there are no middlemen like central
banks or governments to control the currency. Its security is warranted by sophisticated
cryptographic algorithms. If there is no one to issue and control the currency then how new
currency does is created? New units of cryptocurrencies are created through a process
called mining. The first know cryptocurrency was bitcoin, invented in 2009 by a mysterious
person ‘Satoshi Nakamoto’.
In April 2011 another currency known as ‘Name coin’ was created. Then onwards many other
cryptocurrencies have emerged and many of them became popular.
Benefits of Cryptocurrency:
1. Cryptocurrencies are global currencies i.e.no single country controls it. They are
accessible to everyone and can be transferred to anyone around the world.
2. Cryptocurrencies are devoid of a middleman like banks. So, there is no
middlemen fee for transactions and transactions are usually done faster.
3. It is a more secure asset than traditional currencies. The sophisticated
cryptography guarantee that only the sender and receiver can access the data.
4. It is a more transparent monetary system that any existing. The transaction
history and data are stored in public ledger and is viewable to all stakeholders.
Benefits of Cryptocurrency:
1. Fast and cheap transactions
2. Investment destinations
3. Anti-inflationary currency
Fast and cheap transactions: When we are undertaking any transactions, let us assume if you
swipe your credit card or debit card, or you transfer some money online, there is always a
minimum charge that is involved in between. This is how the banks, or card issuers like
master card, visa, rupay earn money.
With Cryptocurrency, that will not be the case. Because there is no intermediary in between,
it is obviously cheaper to transfer money from one place to the other in the form of
cryptocurrency. So, it is much cheaper, and it is faster.
The good part is because, there are no intermediary involved, there is no additional cost. The
bad thing is if something wrong happens, then there is no one that you can go ahead and
complain to. Right now, if you swipe your card, and money gets debited from your account,
but the machine says translation decline, you do have an option to complain to your bank, you
have an option to take up the matter with the RBI also. But with the cryptocurrency, there is
no such agency, where you can actually take your complaint.
Investment Decisions: It has also been seen as an investment option by a lot of people across
the world, majorly the youth. You would have seen a lot of people across the world turning
into millionaires, billionaires just by investing all that money into currency such as bitcoin in
the earlier stage.
Anti-inflationary currency: Inflation takes place when there is a lot of money supply in the
market, when the supply of the commodities remains the same, but actually a lot of money
gets into the hands of the people. With cryptocurrency, such as bitcoins etc that will not be
the case, why because the number of bitcoins, the number of ripples, the number of
Ethereum’s across the world are fixed because, the currency that we have the number and the
number of currencies fixed, there is a very little chance that there will be any inflation in case
of cryptocurrency.
Drawbacks of Cryptocurrency:
Extremely Volatile: When you see that stock market is declining or when you see a rupee is
declining, there is always a logical reason behind it, why is the stock market declining, what
is happening? But with bitcoins, we have seen that there is no logic behind it.
Unregulated: There is no central authority that comes into picture.
Speculative nature: One tweet by any influential person can increase or decrease the value of
these cryptocurrencies without any reason. It is all based on speculation, there is no
underlying value. Tomorrow, if people say that we don’t want to buy bitcoin, we are not
ready to give even one rupee for one bitcoin, the government cannot do anything. All the
bitcoins will go to waste, if people stop accepting it, if people stop buying it because it is all
based on speculation.
Security risks: Cyberattacks on wallets, exchange mechanism (Crypto jacking).
Fortunately, India has not seen these many cases, but if you actually read international media,
you will see in the past few months, a lot of issues have come up in countries such as US and
many other European countries. Cases of people actually hacking into government servers-
places or cases where people hack into very important servers and in return they ask for
ransom in the form of bitcoins or in the form of other cryptocurrencies. So, a lot of illegal
activities are happening, because the hackers also know it is almost next to impossible to trace
where the cryptocurrency has gone. That is why there is always a security risk that is attached
to it.
Shield to crime: Used for illicit trading, Criminal activities and organized crimes.
A lot of illegal activities are happening because the hackers also know it is almost next to
impossible to trace where the cryptocurrency has gone. That is why, there is always a security
risk that is attached to it. There are also new stories for it if you actually google it, that there
are people who had a lot of bitcoins in their official account, but they now have lost all their
credentials, they don’t know how to login. So, these kind of securities are still associated with
a lot of cryptocurrencies. It is increasing or it is giving a push to the crime as said. there are
lot of cybercrimes that are happening against which the people are demanding
cryptocurrencies.
Threat to the Indian rupee: If a large number of investors invest in digital coins rather than
rupee-based savings like provident funds, the demand of the latter will fail.
It is a Threat to the Indian rupee or not just Indian rupee, but many other currency. If enough
number of people start accepting the fact that Indian currency or US dollars are bad, I will
switch to cryptocurrency, I will only trade in bitcoin automatically, it will be bad news for the
official currency, the reason why official currency works is enough people trust that if I am
ready to buy the mangoes, and the Mago vendor is ready to give me the mangoes against that
currency note, it is because, he or she trusts that Indian rupee. if they stop trusting it and they
say no, I don’t trust it, I want bitcoin only in return of this, then obviously the value of any
official legal currency will fall down, and that is real threat.
Lack of Liquidity and Lower Acceptability: Lack of liquidity means if I have let’s say 10
bitcoins, tomorrow I want money, I want to sell it. It is not necessary that I will get a buyer.
maybe people are not ready to buy it. but if I have let’s say gold or silver, obviously I will
find a buyer anytime that I want. But with cryptocurrency, it is not necessary that you will
always get a buyer at the time you want price.
Price Volatility: prone to price fluctuations and waste of computing power.
Lack of consumer protection: No dispute settlement mechanisms and SEBI (Securities and
Exchange Board of India)
for both Volatility and Lack of consumer protection, there is no intermediary in between,
there is no govt agency to take of any grievance that you would have, whenever you are
trading in cryptocurrency Nd that is why cryptocurrencies are best avoided unless you have
absolute knowledge of how it actually works.
There are some success stories and there are some stories in which people have made a lot of
money due to cryptocurrency and investment but it is best avoided because again it is based
on speculation, it does not have any intrinsic value.
List of Cryptocurrencies:
There are about 16000+ cryptocurrencies available now. A new cryptocurrency can be
invented at any time. Like any other assets, the value of cryptocurrency can also raise and fall
quickly.
The most popular cryptocurrencies are:
1. Bitcoin
2. Ether
3. Litecoin
4. Ripple
5. Name coin
6. Swift coin
7. Monero
8. Dogecoin
9. Dash
10.Lisk
BITCOIN:
The Bitcoin (BTC) is the first and most famous cryptocurrency. It is invented by Satoshi
Nakamoto. The details of the founder are still a mystery and nobody is sure about his
existence. Bitcoin uses peer to peer network for its existence and the transaction conducted
are verified by miners. Mining means solving a complex mathematical problem to verify a
transaction and it needs a high amount of computing power. By verifying a transaction,
miners get a fixed amount of bitcoin as a reward and the newly created coin also become the
part of the network. However, there are a finite number of bitcoins say 21 million. And
according to miners the rest of the coins will be added to the network by 2024.
The hashing algorithm used in bitcoin is SHA-256 (Secured Hashing Algorithm-256). And
POW algorithm is used by the network to decide the next block to be added to the Blockchain.
Mining in Bitcoin
Basically, mining means searching for a new block to add in the Blockchain. When a new
block arrives, all the contents of the block is hashed first. Then this hashed output is
concatenated with the nonce and is hashed again. The resulting hash is compared with the
difficulty target. If it is less than difficulty level the block is added, else the nonce is changed
and the process is repeated till it meets the requirement.
Whenever a transaction happens in a bitcoin network, the user pushes it to the network. The
transaction is hence verified by some participants in the network called miners. The process is
as follows. When a new block arrives, all the contents of the block is hashed first. Then this
hashed output is concatenated with a random string called ‘nonce’ and is hashed again. The
resulting hash is compared with the difficulty target. If it is less than difficulty level then
block is added, else the nonce is changed and the process is repeated till it meets the
requirement. This process of verifying the transaction is known as mining.
ETHER:
Ether is another type cryptocurrency which is used in the distributed application platform
Ethereum.
Ethereum is another type of decentralized blockchain network which is specifically designed
to develop and run smart contracts and decentralized apps. Ether is the fuel of Ethereum and
it was launched in 2015 by Vitalik Buterin. The total supply of Ethereum is estimated to 60
million.
Like in bitcoin Ether mining also indicate the verification of a transaction conducted in
Ethereum network. In Ethereum network a new block is added in every 15 seconds and
presently the reward for adding a new block is 3 Ether coins.
LITECOIN:
Litecoin was launched in October 2011 by Charles Lee. It is an open-source peer-to-peer
network that is fully decentralized without any centralized authority. It has a market cap of
around $180 million.
Litecoin little bit complex than previous two. Though the working principles are similar.
There are some differences too. Open-source Cryptographic protocol is the base of Litecoin.
A new block is processed in every 2.5 minutes and it uses ‘Script’ for mining process. Since
the mining is a little bit harder in Litecoin the miner gets 25 Litecoin’s for every new block.
RIPPLE:
Ripple is used as both cryptocurrency and open payment network where the currency is
transferred. It was released in 2012 and was invented by Chris Larsen and Jed McCaleb.
Ripple coin is labelled as ‘XRP’. The current market of Ripple coin is $243 million. The
ripple coin is mainly known for its strong focus on the banking market and real-time
settlement.
Ripple uses a medium known as Gateway that enables any person or organization to put into
or take money out of the Ripple pool. Maybe the gateway mechanism is similar to the present
banking system but the shared open ledger makes the difference.
Ripple is slowly becoming popular. Companies like Santander, UniCredit, UBS have already
adopted it and Payment networks and Banks are increasingly attracted towards it.
NAMECOIN:
Name Coin is another cryptocurrency which has many similarities with Bitcoin. In fact, it
uses the same code of Bitcoin. And just like Bitcoin it also uses the Proof-of-work algorithm
and SHA-256 Hash algorithm. The total supply of the Name coin is limited to 21 million.
Name coin technology solves the problem of Zook’s triangle, where anyone can register
arbitrary human-readable names in a decentralized and secure way. These names can be used
to create online identities. Name coin was invented in April 2011 by Vince. Named was
launched in June 2013.
SWIFTCOIN:
Swift coin is also another type of cryptocurrency. Like other cryptocurrencies transaction
made in Swift coins are encrypted and anonymous. And of course, there is no central
authority to control the transactions or users. Swift coin is the first digital currency in Cuba
created by Team Daniel Bruno.
MONERO:
Monero is a cryptocurrency that mainly focuses on privacy using signature technology. It is
estimated that Monero has a market cap of about $138 million. The privacy of Monero
transactions is strengthened using ‘Confidential Transaction’ algorithm which hides the
amounts being transacted.
DOGECOIN:
Dogecoins are released in December 2013 by Billy Markus as a funny meme on the internet.
By the mid of 2015, there were 100 billion Dogecoins has been mined also 5.256 billion coins
are mined every year thereafter.
DASH:
Dash is open-source peer-to-peer cryptocurrency which strongly focuses on speed of
transaction and security. Dash uses anonymization technology for improving security. The
estimated market cap of Dash is $77 million. In January 2014 Dash coin was released in the
name of ‘Coin’. Later in February, the name was changed into ‘Dark coin’ and on March it
was rebranded as Dash. The founder of Dash was Evan Duffield and Kyle Hagan.
LISK:
Lisk is a modular cryptocurrency which utilizes Sidechains. ‘Sidechain’ are some additional
chains attached to the main blockchain in order to avoid bloated network. When there are
many bad transactions, the blocks are created faster and it slows down the network. This is
called a bloated network. Sidechains can be attached to the main blockchain and can serve as
a place to pull high volume transaction without interfering with the main blockchain. As a
result, it will ensure a fast network all day. Lisk has a market cap of $45 million.
Cryptocurrency is also known as Crypto Assets. It can be either Crypto Coin or Crypto
Token. Cryptocurrency has its own blockchain network and also known as standalone
blockchain.
Crypto coin:
Crypto coin is a digital or virtual currency on decentralized networks based on blockchain
technology and is secured by cryptography.
Bitcoin is the very first crypto coin and all other coins are altcoins, which means all the coins
other than Bitcoin are also known as Alternate Cryptocurrency.
These altcoins are further divided based on whether it is derived from Bitcoin Blockchain or
not and whether it is mining-based or stable coin.
1. These altcoins are further divided into two types based on whether it is derived
from Bitcoin Blockchain or not.
For mining-based coin, the coin has created by miner by solving cryptographic puzzle and
block rewards are transferred to the miner. So, there is a fluctuation in the price movement of
such coin.
Stable coin also has an interesting functionality of cryptocurrency but does not suffer from
the vulnerability of market fluctuation and price volatility.
The stable coins are introduced to bring stability to this cryptocurrency world. Till now, it
was based on demand of coin. Now, to create a stability, it was done by creating a backup,
just like when we use to have Fiat currency which was backed by gold.
Stable coin working is simple. They are backed by a company or a central entity. This
company or a central entity manage the acceptance of new fiat and issues a corresponding
amount of fiat backed by token. The company or central entity is the custodial of the fiat
result and it backs all the tokens.
Stablecoin is further divided into
1. Fiat Collateralized Stablecoin
2. Crypto Collateralized Stablecoin
3. Non-Collateralized Stablecoin
Fiat Collateralized Stablecoins are the coins which are backed by some currency in the ratio
of 1:1. Most known example of Fiat money backed in the stable coin are dollar based
including Tether (USDT) or True USD.
Crypto Collateralized Stablecoins are the coins which are backed by some cryptocurrency
like bitcoin, or ether.
Non-Collateralized Stablecoins are the coins which are backed by an algorithm which take
care of fluctuation and provide stability.
Crypto Token:
If we are already having blockchain, and we want to implement another business on top of the
existing blockchain network, we want some way to represent digital assets. Then these assets
are represented using a Crypto Token. Typically, it will be implemented as a business case
on an existing blockchain.
Cryptographic tokens represent programmable assets or access rights, managed by a smart
contract and an underlying distributed ledger.
There are mainly two types of tokens.
1. Utility token
2. Security Token
Financial Services:
The use of technology has revolutionized the financial industry. Financial intermediation has
become more efficient with lower cost and higher speed, challenging the traditional banking
sectors and financial markets. The increased use of blockchains for creating cryptocurrencies
and other online assets has provided new classes of safe digital assets.
A prime area for blockchain businesses is interfacing cryptocurrencies with traditional
banking and financial markets.
1. Ripple Labs is using blockchain technology to reinvent the banking ecosystem and
allow traditional financial institutions to conduct their own business more
efficiently.
Ripple’s payment network lets banks transfer funds and foreign exchange transactions
directly between themselves without a third-party intermediary, as is now required: “Regional
banks can now move money bilaterally to other regional banks without having to relay those
funds through an intermediary.”
Ripple is also developing a smart contracts platform and language, Codi us.
2. Another potential symbiosis between the traditional banking industry and Bitcoin is
exemplified by Spanish bank in Confine, a Bitcoin technology startup that aims to make it
possible for end users to buy and sell Bitcoin directly without an exchange.
3. Other businesses are also connecting Bitcoin to traditional financial and payments market
solutions. PayPal is an instructive example because PayPal was initially an innovative
payments market solution outside of the traditional financial-services market, like Bitcoin, but
has since become a more formal business within the regulated industry, collecting and
validating detailed personal information about its customers. PayPal had been known for
being on the edge of financial innovation, but it then became more corporate focused and lost
the possibility of providing early market leadership with regard to Bitcoin.
Now, PayPal has been incorporating Bitcoin slowly, as of September 2014 announcing
partnerships with three major Bitcoin payment processors: Bit Pay, Coinbase, and Geocoin.
Also in September 2014, PayPal’s Braintree unit (acquired in 2013), a mobile payments
provider, is apparently working on a feature with which customers can pay for Airbnb rentals
and Uber car rides with Bitcoin.
4. In the same area of regulation-compliant Bitcoin complements to traditional financial
services is the notion of a “Bit bank.” Bitcoin exchange Kraken has partnered with a bank to
provide regulated financial services involving Bitcoin.
There is a clear need for an analogy to and innovation around traditional financial products
and services for Bitcoin — for example, Bitcoin savings accounts and lending.
BTCjam is an example of such decentralized blockchain-based peer-to-peer lending.
Tera Exchange launched the first US-regulated Bitcoin swaps exchange, which could make it
possible for institutional and individual investors to buy Bitcoin contracts directly through its
online trading platforms. Part of the offering includes an institutional Bitcoin price index, the
Tera Bitcoin Price Index, to be used as the benchmark for trading USD/XBT contracts.
5. In the same space, startup Vacuum is building an API for financial institutions to offer
traditional brokerage investors and bank customers access to Bitcoin.
6. Another project is startup Butter coin, a Bitcoin trading platform and exchange for high-
volume transactions (200,000–500,000 Bitcoin, or $70–$175 million), targeted at a business
clientele who has a need to complete large-scale Bitcoin transactions. Butter coin is partnered
with capital markets firm Wedbush Securities, itself one of the first security analysts to cover
Bitcoin and accept Bitcoin payments for its research.
Other ventures are more radically positioned against artificial unregulated monopolies in the
current stock trading market infrastructure, like the Depository Trust Company and the
National Securities Clearing Corporation, or DTCC, which is involved in the clearing and
settlement of securities.
Prediction Market:
Prediction markets are marketplaces where people trade on the outcomes of future events.
Market prices can indicate what the marketplace believes the probability of the event is. Most
prediction markets are a binary option market (e.g., “yes” or “no), where the two options will
expire at the price of 0% or 100%. Before expiry, the two assets trade between 0% and 100%,
which indicates what the marketplace thinks the odds are.
For example, “who will win in a sporting event?” For this sporting event there will be two
tokens, one for each team. If the price of token A is higher than token B, it means that the
market believes team A has a higher chance of winning. If the market price of token A is
US$0.30 and the price of token B is US$0.70, then the market believes the likelihood of team
B winning is approximately 70%.
Prediction markets can be seen as an extension of derivatives markets. Derivatives, such as
futures and options, are used to predict the future price of assets such as oil, gold, stocks, and
bitcoin. Prediction markets do the same for events.
Derivatives markets are also used to bet on the probability of some future events, but
indirectly. For example, if you believe a certain political party will win the US presidency,
you might express that belief by buying or selling certain stocks and commodities. Prediction
markets allow people to place bets directly on the probability of the election. In this way,
prediction markets can be seen as a “cleaner” way to express your views of the future.
Prediction markets might also be a public good. They have proven to be relatively accurate at
predicting future events. Companies such as Google have begun to use prediction markets.
Financial institutions pay attention to prediction markets on things like Central Bank rate
hikes. News organizations and society at large pay attention to prediction markets on political
elections.
Centralized or decentralized prediction markets:
Most prediction markets exist within the legacy finance and web2 framework.
There are many centralized prediction markets regulated by government organizations like
the SEC. These centralized markets have several problems that impact their predictive power.
The most important problem with these centralized markets is that they have low limits on
how much each person can bet. This limits the predictive power of prediction markets,
because even if a person has very strong conviction about an outcome and the means to back
it up, they are capped at limits well under $1,000. This is especially true when someone
believes that the likelihood of an event is very mispriced. They, and like-minded people, will
be unable to capitalize on the market mispricing, and the prediction market will grossly
misrepresent the probabilities.
Legacy prediction markets need to KYC their customers, shutting out many people. A smaller,
narrower pool of people likely skews the market’s predictive power. Finally, prediction
markets have high fees (e.g., a 5% withdrawal fee on Predict It) — an all-too-common
problem with legacy financial products.
Decentralized crypto prediction markets solve these problems. They do not limit people’s
ability to fully express their conviction on an outcome. There are decentralized projects that
do not have jurisdictional or KYC requirements. Finally, as is the case when comparing any
DeFi protocol to its legacy market counterparts, fees are much lower.
Bitcoin prediction market is a decentralized crypto prediction market. Examples of Bitcoin
prediction markets are Predictions and Fairlay.
Bitcoin prediction markets offer a betting venue for the usual real-world outcomes as
prediction markets always have, such as elections, political legislation, sports matches, and
technology product releases, and also serve as a good source of information about the
developing blockchain industry.
Bitcoin prediction markets are one way to see what insiders think about Bitcoin’s future price
directions, the success of different altcoin and protocol 2.0 projects, and industry issues more
generally (e.g., technical development issues with Bitcoin, such as when there will be a hard
fork — significant change of the code, and the level of difficulty of the mining algorithm).