Blockchain Technology Flashcards
bitcoin vs bitcoin cash
- split based on how to deal with slow transactions
Bitcoin
- started using segregated witness (SegWit2x)
- reduces amount of verification data for each block
- Bitcoin also plans to double block size (to 2mb)
Bitcoin Cash
- felt SegWit2 didn’t go far enough
- increases block size to 8mb (up from 1mb)
hash functions
Consists of:
- input: message
- can be any length
- output: digest, tag, hash, fingerprint
- fixed in length
Desired traits
- should be fast
- collision resistant
- hard to infer anything about input
- was it even or odd
- well distributed (should look random)
51% Attack
- hypothetical in which one actor aquires control of over 50% of mining rigs
- can double spend
- can prevent others’ transactions
digital signature
- scheme for verifying the completeness of a message and the identity of its sender
- Examples: RSA, DSS
Steps
- Alice wants to sign a document
- Alice generates 2 keys
- Private key
- Public key
- They’re generated at the same time
- Cannot get private key from the public key
- Alice hashes the document with private key to produce signature
- Bob wishes to verify the message (does this message really generate this signature)
- Bob uses a verification function on the message, signature, and public key determine if message is valid
bitcoin block
- a grouping of individual transations
Includes
- mutliple unrecorded transactions
- a special transaction representing miners’ reward
- an encoding of previous transaction block (to ensure continuity)
- a proof-of-work puzzle
bitcoin transaction - steps
Steps
- Alice wishes to send money to Bob
- Alice uses a bitcoin client to record transations in ledger
- Alice specifies
- Hashes from previous transactions to her account (verifying that she has the money to begin with)
- List of recipients for bitcoin (their public keys)
- Amount to transfer (usually less than her present balance)
- Specify change going back to her
- Leftover money is used for transaction fee
- Takes transaction details and generates a digital signature
- Alice appends transaction with digital signature
- Alice broadcasts complete transaction
bitcoin mining - steps
- miners confirm the order in which transactions take place in order to prevent double-spending
Steps
- Miners gather transactions that haven’t been mined into a block
- Also adds an additional transaction representing his reward
- coinbase/generation transaction
- how new bitcoins are created
- Starts hashing them in pairs to get a single digest value
- Hashes this transaction with most recent block in network to produce a number
- Convert that number into a challenge (for proof-of-work)
- Miner performs proof-of-work
- He generates many potential proofs to the challenge until one works
- Once found, miner announces proof
- This miner’s blockchain becomes the new official chain; other miners build on it
- The more leading zeros required, the more difficult it is to generate a proof
- Number of zeros is calibrated so that it takes a node, on average, 10 minutes to find a proof
longest chain
- chain with PoW puzzles that were the most difficult to solve
bitcoin money supply
- money supply limit is 21M bitcoin
- every time 210K blocks is generated, reward gets cut in half
- it takes about 4 years to generate 210K block
- entire supply will be generated by 2140
proof of work
- a security measure/intentional hurdle incorporated into most crytocurrency protocols
- PoW puzzles have a difficulty score that describes how hard puzzle is
- puzzles are difficult to solve but easy to verify
Steps
- Imagine there’s a challenge string
- Miner generates a random number, called a “proof” or a “nonce”
- He then concatenates the challenge string and the proof
- And hashes the result
- If the hash has the requisite number ofleading zeros
- Then the challenge has been solved
- There’s no effective way to guess or infer the solution, so the miner has to do this with brute force
proof of stake
- bitcoins are assigned a stake value
- value grows as long as bitcoin isn’t used
- when bitcoin is used for transaction, “stake” value is reset
- people who make fraudulent confirmations will lose money
- in PoS, blocks are forged, rather than mined
- the probability that an individual can forge a block is proportional to the stake they have
ethereum tokens
- boost ether’s value by creating a need for the currency
- issued via crowdsale called Initial Coin Offering (ICO)
- ERC20 is a standard interface for tokens
- Must implement the following:
- get the total token supply
- get the account balance
- transfer the token
- approve spending the token
hashrate
- measure of mining power
- number of nonces tried per second normalized by rashrate of the network
asic
- application-specific integrated circuit
- circuit that is designed for a specifc purpose
- ex: video graphic cards
- asic resistence
- memory-hard puzzles
- memory doesn’t improve as quickly as processing speed
- puzzles that require memory won’t advantage asic as much
externally owned accounts
- EOA
- accounts that are owned by a private key
- cannot contain EVM code
byzantine fault tolerance
- ability of a distributed network to handle the byzantine generals problem
two generals probelms
- example of a consensus problem
- there is no perfect solution
Setup
- Two aligned armies (A and B) have to decide whether to attack their opponent (C) tomorrow morning
- They will win if they attack together, but lose separately
- The armies are separated by the territory of army C
- They communicate through courriers, which may or may not make it
- They attempt to send messages back and forth in order to reach consensus
byzantine generals problem
- example of a consensus problem
- generalization of the two generals problem
Setup
- a number of byzantine generals getting ready to attack a fortress
- must decide if they will attack or retreat
- but some generals might be traitors
- the goal is to reach consensus even though one or more generals is a traitor
- traitors can tell send different messages to different generals
- how many traitors can the system tolerate?
- (must be < 1/3)
double spend
- a deliberate fork
- first, agent spends bitcoin
- then agent creates another block at same level to send bitcoin to another person, and starts mining on that chain
Gas
- costs around 20K gas to set a value
- storing data is generally more expensive that performing an action
*
EVM
- Runs opcodes
Ether
- Currency of ethereum
- Used to pay for computation
- Smallest unit (base unit) called wei
ABI
- Application Binary Interface
- Tells web3 how to interact with binary code on blockchain
- JSON array
- First element: send
- Function name
- Balance
- data field
- first 20 bytes are function call
- rest is a parameter
Three Types of Blockchains
- Public blockchains
- Normal blockchains
- Consortium blockchains
- Controlled by a preselected set of nodes (computers)
- Only those preapproved nodes can sign transaction
- Considered partially decentralized
- Private blockchains (aka private networks)
- Not necessarily considered legitimate blockchains
- All permissions are kept centralized, by 1 node
- Banks are experimenting with this
- Applications: database management, auditing, and things specific to that organization
Smart Contracts
- Aid in transferring something of value in transparent and secure way
- Eliminates middle party
Steps
- Buyer pays for product
- Receipt is held in virtual smart contract
- Seller gives buyer entry key on date specified beforehand
- If seller reneges, blockchain will automatically give refund on date key should have arrived
- If seller gives key early, blockchain holds it until agreed date
- Contract is saved on blockchain, so it cannot be altered once created
- If attempt is made to alter it, all parties are notified
Pros
- Autonomy: cannot be manipualted by third parties
- Trust: impossible to lose
- Backups
- Safety
- Speed
- Saves money: no intermediary
- Accuracy
dApp
- Distributed application
- Runs on ethereum virtual machine
DAO
(Democractic Autonomous Organization)
- virtual organization where members can vote on issues
*
Wallets
2 Types of Wallets
- Externally Owned Accounts (EOA)
- Create in your wallets
- You own private key, public key and password
- Have an ether balance
- Can send trasactions
- Have not code associated with them
- Contracts Accounts
- Deployed in blockchain
- Contain code
- Have an ether balance
- Code is triggered by transactions or messages
- Can manipulate its own persistent storage
Keypair
private network
Solidity
functions
- functions can be make to return variables or not
- semicolons are required
- constructor
- just like Java constructor
- runs on deployment, and never again
- costs gas
- constant functions
- can return values, but cannot change anything on blockchain
- can return more than one thing
- don’t cost gas to run
- syntax:
- function getSomeVar() constant returns (uint) {
return someVar
}
*
Solidity
Types
- bool
- auto-initialized to false
- int (integer)
- ranges from int8 - int256
- uint (unsigned integer)
- ranges from uint8 - uint256
- auto initialized to zero
- can only be positive
- bytes
- address
- holds a 20 byte value (size of ethereum address)
- has properties balance (gets balance at that addres) and transfer (function that sends wei from contract address to involking address)
- string
- arrays
- can be either fixed or dynamic
- enums
- used to create user-defined types
- structs
- mappings
- hash tables
Solidity
access contact from another contract
2 Options
- Instantiate a new instance of contract
- myContract = new ContractA()
- Store reference to existing contract
- myContract = ContractA(addressA)
Solidity
msg
- special object
- properties
- sender
- address of individual that sends funds
- sender
Solidity
Inheritance
- contracts can inherit from each other like classes in other languages
- use keyword is to inherit
- ex: contract con1 is con2 { }
Solidity
Data Location
- Three places to store data in solidty:
- storage (persisting)
- memory (non-persisting)
- call-data (where external function params are stored)
- When assigning from a storage to memory variable, always creates an independent copy
- Assignments to local storage variables are references
- Forced data location
- parameters (not return) of external functions: calldata
- state variables: storage
- Default data location:
- parameters (also return) of functions: memory
- all other local variables: storage
Web3
- Interface between ethereum and javascript (and html)
- Get access contracts as objects
- Create contractor from contract, and then instantiate
- Syntax:
- var MyContract = (web3.eth.contract(abiArray))
- var contractInstance = MyContract.ad([address])
public variable
- can access public variables without using gas
- an accessor is created for each public variable
- functions are public by default
testrpc
- simulated blockchain that runs on memory on computer
interface
- essentially an api
- a json object that describes all of the functions in contract
- their params, arguments, what they return, etc.
migration
- scripts that allow you to automate tasks related to setting up contracts
- mass-deployments
*
- mass-deployments
library
- makes functionality available to multiple contracts at once
deployment steps
Steps
- Write contract
- Place contract in contracts folder
- Run truffle compile
- Add your contract to 2_deploy_contracts.js
- Turn on testrpc
- Run truffle migrate
- truffle migrate
transaction/call
- transaction
- writing to network/changing data
- ex: sending ether; creating contracts
- transactions cost ether and take time
- typically aren’t processed immediately
- typically return transaction id, rather than return value
- in function definition: just returns
- call
- reading from network
- free to run
- processed immediately
- in function definition: constant returns
- in function call: myContract.getBalance.call()
abstractions
- JavaScript wrappers for solidity contracts
- Allow you to interact with contract in js
module loader/module bundler
- allows you to code modules separately, and combine them in the end
- generates static assets
- examples:
- webpack
- require.js
- browserify
package manger
- npm
- mainly for node packages
- bower
- mainly for frontend packages
- yarn
task runners
- used to automate tasks, such as converting from SASS to CSS, or minifying
- examples:
- gulp
- grunt
bitcoin script
- uses stacks
- composed of op codes
- turing incomplete
- primarily used to validate bitcoin transations