Crypto 1 Flashcards

1
Q

What is a blockchain?

A

A blockchain is a type of distributed ledger technology that records transactions in a secure, immutable, and transparent manner. It operates across a decentralized network of nodes, eliminating the need for a central authority. Each block in the chain contains a set of transactions and is linked to the previous block using cryptographic hashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three main components of a blockchain?

A

The three main components are blocks, nodes, and consensus mechanisms. Blocks store the transaction data, nodes are the network participants maintaining the ledger, and consensus mechanisms ensure all participants agree on the validity of the data. Together, they enable a decentralized, secure, and tamper-proof system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a block in a blockchain?

A

A block is a unit of data storage in a blockchain that contains a group of transactions. It also includes metadata such as a timestamp, a reference to the previous block (hash), and a unique identifier for itself. Blocks are sequentially linked to create a secure and tamper-evident chain of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does immutability mean in blockchain?

A

Immutability in blockchain means that once a transaction is recorded, it cannot be altered or deleted. This is achieved through cryptographic hashing and consensus mechanisms that ensure the integrity of the ledger. Immutability provides trust and transparency, as all transactions remain permanently accessible and verifiable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a distributed ledger?

A

A distributed ledger is a database that is spread across multiple nodes or participants in a network. Unlike centralized systems, it does not rely on a single controlling entity, ensuring resilience and transparency. Each participant maintains a synchronized copy of the ledger, and updates are validated through consensus mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a node in blockchain?

A

A node is a device, such as a computer or server, that participates in a blockchain network by maintaining a copy of the ledger. Nodes can perform various functions, such as validating transactions, storing data, and relaying information. They are essential for maintaining the decentralized and secure nature of the blockchain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a consensus mechanism?

A

A consensus mechanism is a protocol used to achieve agreement among nodes in a blockchain network about the validity of transactions. It ensures that all participants maintain a consistent copy of the ledger and prevents malicious activities like double-spending. Common mechanisms include Proof of Work (PoW) and Proof of Stake (PoS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name two common consensus mechanisms.

A

Two common consensus mechanisms are Proof of Work (PoW) and Proof of Stake (PoS). PoW involves solving complex mathematical puzzles to validate transactions, while PoS selects validators based on the amount of cryptocurrency they stake. Both mechanisms aim to secure the network and ensure data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Proof of Work (PoW)?

A

Proof of Work (PoW) is a consensus mechanism where participants (miners) solve computationally intensive puzzles to validate transactions and create new blocks. The first miner to solve the puzzle gets to add the block to the blockchain and is rewarded with cryptocurrency. This mechanism ensures security but requires significant energy and computing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Proof of Stake (PoS)?

A

Proof of Stake (PoS) is a consensus mechanism where validators are chosen to create new blocks based on the amount of cryptocurrency they hold and are willing to stake as collateral. This reduces the energy consumption associated with Proof of Work while maintaining network security. Validators risk losing their stake if they act maliciously, aligning incentives with network integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a public blockchain?

A

A public blockchain is an open and permissionless network where anyone can participate as a node, validator, or user. Examples include Bitcoin and Ethereum, which are decentralized and accessible to anyone with an internet connection. Public blockchains prioritize transparency and security but may face scalability challenges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a private blockchain?

A

A private blockchain is a restricted network where participation is limited to specific individuals or organizations. It is often used by businesses to maintain control over data while leveraging the benefits of blockchain technology, such as transparency and immutability. Private blockchains typically offer faster transaction processing but lack the decentralization of public blockchains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a permissioned blockchain?

A

A permissioned blockchain is a hybrid between public and private blockchains, requiring participants to obtain approval before joining the network. It provides more control over access while still leveraging blockchain’s transparency and security features. Permissioned blockchains are commonly used in enterprise applications for supply chain management and financial systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a permissionless blockchain?

A

A permissionless blockchain is an open network where anyone can join, participate, and validate transactions without prior approval. These blockchains, like Bitcoin, rely on decentralized governance and consensus mechanisms to ensure security and trust. Permissionless blockchains prioritize inclusivity and transparency but may have slower transaction speeds compared to private networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is decentralization?

A

Decentralization refers to the distribution of control and decision-making across a network, rather than being concentrated in a central authority. In blockchain, it ensures that no single entity can alter or control the entire system, enhancing trust and resilience. Decentralization reduces vulnerabilities to attacks and censorship, making systems more robust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a hash function?

A

A hash function is a cryptographic algorithm that converts input data of any size into a fixed-length string of characters, called a hash. This process ensures data security, as the output is unique to the input. Hash functions are used in blockchain to link blocks together and verify the integrity of transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a key feature of a hash function?

A

A hash function is deterministic, meaning the same input always produces the same output. It is also irreversible, so you cannot deduce the input from the output, and collision-resistant, meaning no two inputs produce the same hash. These properties make hash functions critical for ensuring blockchain security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a Merkle tree?

A

A Merkle tree is a data structure that organizes data in a hierarchical manner, using hash functions to link the data. Each leaf node in the tree represents a hash of a transaction, while non-leaf nodes represent hashes of their child nodes. Merkle trees allow efficient and secure verification of data on a blockchain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Genesis block?

A

The Genesis block is the very first block of a blockchain, acting as the foundation for all subsequent blocks. It is often hard-coded into the blockchain software and does not reference a previous block. The Genesis block contains initial data or parameters to kickstart the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a transaction in blockchain?

A

A transaction in blockchain is the act of transferring value, data, or assets between parties, recorded on the blockchain. Each transaction includes details such as sender, receiver, and amount, along with a unique identifier. Once validated and added to a block, the transaction becomes immutable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a miner in blockchain?

A

A miner is a participant in a Proof of Work blockchain who uses computational resources to validate transactions and solve cryptographic puzzles. Once a puzzle is solved, the miner gets to add the block to the chain and receives rewards, typically in the form of cryptocurrency. Miners play a crucial role in maintaining network security and integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is mining?

A

Mining is the process of validating transactions and adding them to the blockchain, specifically in Proof of Work systems. It involves solving complex mathematical problems to achieve consensus among network participants. Miners are rewarded with newly minted cryptocurrency and transaction fees for their work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a smart contract?

A

A smart contract is a self-executing program stored on the blockchain that automatically enforces the terms of an agreement. It eliminates the need for intermediaries by triggering actions when predefined conditions are met. Smart contracts are used in applications like DeFi, NFTs, and supply chain management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What ensures data integrity in blockchain?

A

Data integrity in blockchain is ensured through cryptographic hashing, consensus mechanisms, and decentralization. Hashing secures transaction data, while consensus ensures only valid data is added to the blockchain. Decentralization prevents single points of failure, further strengthening data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a fork in blockchain?

A

A fork occurs when there is a change in a blockchain’s protocol, causing the chain to split into two separate paths. Forks can be temporary (soft forks) or permanent (hard forks), depending on the nature of the change. Forks may arise due to disagreements among participants or upgrades to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a hard fork?

A

A hard fork is a significant and non-backward-compatible change to a blockchain’s protocol, creating a permanent split in the chain. Participants must upgrade their software to remain part of the new chain. Examples include Bitcoin Cash splitting from Bitcoin and Ethereum’s split into Ethereum and Ethereum Classic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a soft fork?

A

A soft fork is a backward-compatible update to a blockchain’s protocol, meaning non-upgraded nodes can still participate in the network. Soft forks often introduce new features or optimizations without causing a permanent chain split. They are considered less disruptive than hard forks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is double-spending?

A

Double-spending is a potential issue in digital currencies where the same token is spent more than once. Blockchain prevents this by requiring consensus among nodes to validate transactions. Once a transaction is confirmed, it becomes part of the immutable ledger, making double-spending nearly impossible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

How does blockchain prevent double-spending?

A

Blockchain prevents double-spending by using a consensus mechanism that ensures only one version of the ledger is valid. Transactions are validated by nodes and recorded in blocks, which are linked securely using cryptographic hashes. This process ensures that each token can be spent only once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is block time?

A

Block time refers to the average time it takes to create and add a new block to the blockchain. It varies depending on the blockchain; for example, Bitcoin’s block time is approximately 10 minutes, while Ethereum’s is around 12 seconds. Block time impacts transaction speed and network throughput.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is block size?

A

Block size is the maximum amount of data that can be included in a single block on a blockchain. Larger block sizes allow more transactions per block but may increase the time required for validation and propagation. For example, Bitcoin’s block size is limited to 1 MB, while Bitcoin Cash allows up to 32 MB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is scalability in blockchain?

A

Scalability refers to a blockchain’s ability to handle increasing numbers of transactions as the network grows. It is one of the biggest challenges for blockchain technology, often requiring trade-offs between decentralization and security. Solutions include layer-2 protocols, sharding, and larger block sizes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a transaction fee?

A

A transaction fee is a payment made by users to incentivize miners or validators to process their transactions. Fees help prioritize transactions during periods of high network activity. In Proof of Stake systems, fees may also be distributed among validators as rewards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is on-chain data?

A

On-chain data refers to any information or transaction that is directly stored and recorded on the blockchain. This includes financial transactions, smart contract executions, and metadata. On-chain data is permanent, transparent, and secured by the blockchain’s cryptographic mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is off-chain data?

A

Off-chain data refers to information that is stored outside the blockchain but linked to it through references or hashes. This approach is often used to improve scalability and privacy. Examples include IPFS (InterPlanetary File System) and off-chain transactions managed by payment channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a blockchain explorer?

A

A blockchain explorer is a web-based tool that allows users to view and search blockchain data. It provides information on transactions, wallet addresses, blocks, and network activity. Examples include Etherscan for Ethereum and Blockchain.com for Bitcoin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a 51% attack?

A

A 51% attack occurs when a malicious entity gains control of more than 50% of a blockchain’s hashing power or staking power. This control allows them to manipulate the network, such as altering transactions, double-spending, or halting new transactions. Proof of Work blockchains are particularly vulnerable to this type of attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the main layers of blockchain?

A

Blockchain consists of three main layers: the application layer, the protocol layer, and the infrastructure layer. The application layer includes DApps and smart contracts, the protocol layer defines consensus rules, and the infrastructure layer provides the hardware and network connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is cryptographic security in blockchain?

A

Cryptographic security ensures that data on the blockchain is protected from tampering or unauthorized access. It relies on techniques like hashing and digital signatures. These methods provide data integrity, authenticity, and secure identity verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is transparency in blockchain?

A

Transparency in blockchain refers to the ability of participants to view and verify all recorded transactions. Public blockchains, like Bitcoin, allow anyone to access the full ledger, fostering trust. Transparency is a key feature for auditing and accountability in decentralized systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is a decentralized application (DApp)?

A

A decentralized application (DApp) is an application that runs on a blockchain rather than a centralized server. DApps leverage smart contracts to execute functions and eliminate the need for intermediaries. Examples include Uniswap for DeFi and OpenSea for NFTs.

42
Q

What is interoperability in blockchain?

A

Interoperability refers to the ability of different blockchain systems to communicate and share data. It enables assets and information to move seamlessly across chains, increasing efficiency. Technologies like cross-chain bridges and standards like Polkadot facilitate interoperability.

43
Q

What is a blockchain oracle?

A

A blockchain oracle is a service that connects on-chain applications to external, off-chain data sources. Oracles provide smart contracts with real-world information, such as price feeds, weather data, or event outcomes. They are essential for enabling complex DApp functionalities.

44
Q

What is finality in blockchain?

A

Finality refers to the point at which a transaction is permanently confirmed and cannot be reversed. Different blockchains achieve finality through various mechanisms, such as probabilistic finality in Bitcoin or deterministic finality in Proof of Stake networks. Finality ensures transaction security and trust.

45
Q

What is a timestamp in blockchain?

A

A timestamp records the exact time and date when a block or transaction is added to the blockchain. It provides chronological order and is crucial for verifying transaction validity. Timestamps are created during the mining or validation process.

46
Q

What is peer-to-peer (P2P) in blockchain?

A

Peer-to-peer (P2P) refers to the decentralized network architecture in blockchain, where nodes communicate directly without intermediaries. P2P enhances network resilience and removes the need for a central authority. It allows for efficient transaction validation and data sharing.

47
Q

What is Byzantine Fault Tolerance (BFT)?

A

Byzantine Fault Tolerance (BFT) is a property of blockchain systems that allows them to function correctly even if some nodes act maliciously. BFT algorithms, like Practical Byzantine Fault Tolerance (PBFT), ensure consensus despite faults or attacks. It is essential for ensuring reliability in decentralized systems.

48
Q

What is the scalability trilemma?

A

The scalability trilemma describes the trade-offs between scalability, decentralization, and security in blockchain design. Improving one aspect often compromises the others. For example, increasing transaction throughput may require reducing decentralization, as seen in some private chains.

49
Q

What is a ledger?

A

A ledger is a record-keeping system used to track transactions, balances, or data. In blockchain, the ledger is decentralized and immutable, ensuring transparency and trust. Each node in the network maintains a synchronized copy of the ledger.

50
Q

What is a block reward?

A

A block reward is the incentive given to miners or validators for successfully adding a new block to the blockchain. It usually consists of newly minted cryptocurrency and transaction fees. Block rewards motivate participants to maintain and secure the network.

51
Q

What is the difference between public and private keys in blockchain?

A

A public key is used to receive transactions and is shared openly, while a private key is used to sign transactions and must be kept secure. The private key generates the public key through cryptographic algorithms, ensuring secure communication. Together, they enable asymmetric encryption and digital signatures.

52
Q

How does asymmetric encryption work in blockchain?

A

Asymmetric encryption uses a pair of keys (public and private) to secure data. The public key encrypts the data, while the private key decrypts it. In blockchain, this mechanism ensures only the intended recipient can access the encrypted information.

53
Q

What is the role of digital signatures in blockchain?

A

Digital signatures authenticate transactions by proving ownership of a private key. They ensure the integrity and non-repudiation of transactions by mathematically linking the signature to the transaction data. If the data is altered, the signature becomes invalid.

54
Q

What is a UTXO-based model in blockchain?

A

UTXO (Unspent Transaction Output) is a model used in blockchains like Bitcoin. Each transaction consumes previous outputs (UTXOs) as inputs and generates new outputs. This model ensures transaction traceability and prevents double-spending.

55
Q

How does the account-based model differ from UTXO?

A

In the account-based model, like in Ethereum, transactions directly modify account balances. It simplifies state management compared to UTXO but may require additional computations for verifying balances and smart contracts.

56
Q

What is sharding in blockchain?

A

Sharding is a scalability solution that divides the blockchain into smaller partitions (shards). Each shard processes its transactions and smart contracts independently, increasing the network’s throughput. Shards communicate using cross-shard protocols to maintain consistency.

57
Q

What are state channels in blockchain?

A

State channels are off-chain scaling solutions that allow participants to conduct multiple transactions without involving the blockchain. Only the initial and final states are recorded on-chain, reducing congestion and transaction fees.

58
Q

What is the role of a Merkle root in a blockchain?

A

The Merkle root is the topmost hash in a Merkle tree, summarizing all transactions in a block. It allows efficient and secure verification of whether a specific transaction is included in the block. Changing any transaction alters the Merkle root, ensuring data integrity.

59
Q

What is a block header?

A

A block header contains metadata about a block, including the previous block’s hash, the Merkle root, a timestamp, and a nonce. This information is used to verify the block’s validity and link it to the blockchain.

60
Q

What is a nonce in Proof of Work?

A

A nonce is a random number used in Proof of Work to vary the input of a hash function. Miners repeatedly change the nonce to find a hash that meets the blockchain’s difficulty target. It ensures the randomness and computational difficulty of mining.

61
Q

How does difficulty adjustment work in Bitcoin?

A

Bitcoin’s difficulty adjusts approximately every 2016 blocks to ensure blocks are mined every 10 minutes on average. The adjustment depends on the total hashing power in the network, increasing difficulty if blocks are mined too quickly and decreasing it if they are too slow.

62
Q

What are orphan blocks?

A

Orphan blocks are valid blocks that are not included in the main blockchain. They occur when multiple miners solve a block simultaneously, but only one becomes part of the chain. The other blocks are discarded as orphans.

63
Q

What is the difference between soft state and hard state in blockchain?

A

Soft state refers to temporary data stored during transaction execution, while hard state is data permanently recorded on the blockchain. Soft state helps in computation but is not part of the blockchain ledger.

64
Q

What is gas in Ethereum?

A

Gas is a unit that measures computational effort required to execute operations on the Ethereum network. Users pay gas fees in ETH to incentivize miners or validators and prevent spamming. Gas costs depend on the complexity of the operation and network congestion.

65
Q

What is the EVM (Ethereum Virtual Machine)?

A

The EVM is a runtime environment for executing smart contracts on Ethereum. It processes code in a decentralized manner, ensuring all nodes reach consensus on the contract’s state. The EVM uses gas to measure and limit computational resources.

66
Q

How are consensus algorithms resistant to Sybil attacks?

A

Consensus algorithms like Proof of Work and Proof of Stake make it computationally or financially expensive for a single entity to control multiple nodes. By linking participation to resources like hashing power or cryptocurrency, they prevent malicious actors from overwhelming the network.

67
Q

What is the difference between on-chain and off-chain governance?

A

On-chain governance involves decision-making processes executed directly on the blockchain, such as voting on proposals via smart contracts. Off-chain governance relies on external mechanisms like forums, social consensus, and stakeholder discussions. Both approaches influence network upgrades and policies.

68
Q

What is the role of cryptographic salt in hashing?

A

A cryptographic salt is a random value added to data before hashing to make the output unique. This prevents attackers from using precomputed hash tables (rainbow tables) to guess inputs. Salting enhances security, especially for sensitive data like passwords.

69
Q

What is a hybrid blockchain?

A

A hybrid blockchain combines elements of public and private blockchains. It allows selective access to certain data or functions while keeping other parts open to the public. Hybrid blockchains are often used in industries requiring privacy and transparency, like supply chain management.

70
Q

What are zk-SNARKs?

A

zk-SNARKs (Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge) are cryptographic proofs that allow one party to prove they know a piece of information without revealing it. They are used in privacy-focused blockchains like Zcash to enable secure and anonymous transactions.

71
Q

What is the purpose of a consensus protocol’s “finality” feature?

A

Finality ensures that once a transaction is confirmed, it cannot be reversed or altered. In Proof of Stake systems, finality mechanisms like checkpoints solidify the blockchain’s state. This feature is critical for preventing forks and ensuring transaction reliability.

72
Q

How does a delegated Proof of Stake (DPoS) system work?

A

DPoS uses a voting mechanism where token holders elect a small number of delegates to validate transactions and create blocks. This reduces the number of active validators, increasing transaction speed. Delegates can lose their position if they act maliciously or inefficiently.

73
Q

What is MEV (Miner Extractable Value)?

A

MEV refers to the profit miners or validators can extract by reordering, including, or excluding transactions in a block. It can lead to inefficiencies and unfair practices but is mitigated by mechanisms like Flashbots.

74
Q

What is the significance of “hash rate” in blockchain networks?

A

Hash rate measures the computational power used by miners to solve Proof of Work puzzles. A higher hash rate indicates a more secure network, as it becomes more difficult for attackers to perform a 51% attack. It also reflects the network’s health and miner participation.

75
Q

What is the difference between a rollup and a sidechain?

A

Rollups are layer-2 solutions that execute transactions off-chain but post their data on-chain, ensuring security. Sidechains are independent blockchains connected to the main chain via bridges, with their own consensus mechanisms. Rollups rely on the main chain for security, while sidechains do not.

76
Q

What is a hash pointer, and how is it used in blockchain?

A

A hash pointer is a reference to a block’s location and its hash, ensuring data integrity. It links blocks in the chain, creating a tamper-evident structure. If any block is altered, the hash pointer becomes invalid, alerting the network to the change.

77
Q

What are privacy coins, and how do they work?

A

Privacy coins like Monero and Zcash use advanced cryptographic techniques to hide transaction details. These techniques include ring signatures, stealth addresses, and zk-SNARKs. Privacy coins enable secure and anonymous transactions while maintaining decentralization.

78
Q

What is an incentive-compatible blockchain protocol?

A

An incentive-compatible protocol aligns the interests of participants with the network’s security and functionality. By rewarding honest behavior and penalizing malicious actions, it ensures cooperation. Examples include staking rewards in PoS or mining rewards in PoW.

79
Q

What is a DAG (Directed Acyclic Graph) in blockchain?

A

A DAG is a data structure where transactions are linked in a graph rather than linear blocks. It allows parallel processing, increasing scalability. Projects like IOTA and Nano use DAGs to enable high throughput and low-latency networks.

80
Q

What is the role of full nodes versus light nodes?

A

Full nodes store the entire blockchain ledger and validate transactions independently, ensuring network security. Light nodes rely on full nodes for data but store only a subset of the blockchain. While light nodes are resource-efficient, they depend on full nodes for trust.

81
Q

How does the Lightning Network work?

A

The Lightning Network is a layer-2 scaling solution for Bitcoin that uses payment channels to process transactions off-chain. Participants open a channel, exchange funds privately, and only settle the final state on-chain. This reduces congestion and enables faster, cheaper payments.

82
Q

What is staking, and how does it differ from mining?

A

Staking involves locking cryptocurrency to support a Proof of Stake network and earn rewards. Mining requires computational power to solve puzzles in Proof of Work networks. Staking is energy-efficient, while mining consumes significant energy resources.

83
Q

What is slashing in Proof of Stake?

A

Slashing is a penalty mechanism in PoS networks where validators lose a portion of their staked funds for malicious or negligent behavior. It deters attacks like double-signing or going offline, ensuring validators act in the network’s best interest.

84
Q

What is a consensus delay attack?

A

A consensus delay attack involves disrupting the consensus process to slow down or halt block production. It can occur if malicious nodes delay messages or exploit vulnerabilities in the protocol. Mitigation includes using timeouts and robust network communication.

85
Q

How do rollups ensure data availability?

A

Rollups post transaction data to the main chain, ensuring it remains accessible for validation. Optimistic rollups assume transactions are valid unless challenged, while ZK rollups use cryptographic proofs to verify transactions.

86
Q

What is a liquidity pool in DeFi?

A

A liquidity pool is a smart contract that holds funds supplied by users to facilitate decentralized trading. Liquidity providers earn fees, and pools enable automated market making without traditional order books. Examples include Uniswap and SushiSwap.

87
Q

What is a Byzantine Fault in blockchain?

A

A Byzantine Fault occurs when a node behaves maliciously or unpredictably, disrupting consensus. Blockchain networks use Byzantine Fault Tolerance algorithms to reach agreement despite such faults. Examples include PBFT and Tendermint.

88
Q

How does token burning work in blockchain?

A

Token burning involves permanently removing tokens from circulation, reducing supply. It is achieved by sending tokens to an inaccessible address. Burning can increase scarcity, support deflationary models, and align incentives.

89
Q

What is an airdrop in the crypto context?

A

An airdrop is a distribution of free tokens to users, often as a marketing strategy or reward. Recipients may need to meet certain criteria, like holding specific assets or completing tasks. Airdrops help increase awareness and adoption of a project.

90
Q

What is a cryptographic accumulator?

A

A cryptographic accumulator is a data structure that compactly represents a set of elements. It allows efficient proofs of membership or non-membership without revealing the full dataset. Accumulators enhance privacy and scalability in blockchains.

91
Q

What is the purpose of a decentralized identity system?

A

Decentralized identity systems enable users to control their digital identities without relying on central authorities. They use blockchain for verification and storage, ensuring privacy and security. Examples include SSI (Self-Sovereign Identity) frameworks.

92
Q

What is the difference between fungible and non-fungible tokens?

A

Fungible tokens are interchangeable and identical in value, like cryptocurrencies. Non-fungible tokens (NFTs) are unique and represent ownership of specific digital or physical assets, like art or collectibles. Each type serves different use cases.

93
Q

How do atomic swaps work in blockchain?

A

Atomic swaps enable direct, trustless exchange of cryptocurrencies between different blockchains. They use hashed time-locked contracts (HTLCs) to ensure both parties fulfill the trade conditions or the funds are refunded. This eliminates intermediaries in cross-chain trading.

94
Q

What is front-running in blockchain?

A

Front-running involves exploiting the transparency of blockchain mempools to insert transactions ahead of others for financial gain. Miners or bots may prioritize their transactions by paying higher fees. Solutions include private transactions and MEV-aware mechanisms.

95
Q

What is a treasury system in blockchain governance?

A

A treasury system manages funds within a blockchain network, often sourced from transaction fees or block rewards. Funds are used for ecosystem development, maintenance, or grants, with allocation decisions made through governance mechanisms.

96
Q

How do oracles handle the challenge of data trustworthiness?

A

Oracles use methods like aggregation, cryptographic proofs, and reputation systems to ensure data accuracy. Decentralized oracles like Chainlink source data from multiple providers, reducing reliance on a single source. Trustworthiness is critical for smart contract functionality.

97
Q

What is the difference between synchronous and asynchronous BFT?

A

Synchronous BFT assumes fixed message delivery times, ensuring timely consensus. Asynchronous BFT does not rely on timing assumptions, making it more robust against network delays. Asynchronous models are often preferred for real-world blockchain applications.

98
Q

What is the Nakamoto consensus?

A

The Nakamoto consensus is the protocol used in Bitcoin’s Proof of Work system, where the longest chain is considered valid. It relies on miners competing to solve puzzles, ensuring decentralization and security. The consensus ensures agreement without centralized coordination.

99
Q

What is a self-executing loan in DeFi?

A

A self-executing loan is a smart contract-based loan that automatically enforces repayment terms. Collateral is locked in the contract, and liquidation occurs if conditions are not met. These loans operate without intermediaries, increasing efficiency.

100
Q

How does blockchain facilitate cross-border payments?

A

Blockchain enables fast, low-cost cross-border payments by eliminating intermediaries like banks. Cryptocurrencies and stablecoins allow direct transactions between parties. Settlement occurs in minutes, reducing delays and costs in traditional systems.