Cryptocurrency Flashcards

1
Q

Ledgers

A

Record-keeping system.
Tracking and maintaining historical record of transactions for many times of assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DLT

A

Distributed Ledger Technology
Ledgers shifting to a global decentralized network. Cryptographically secured and fast.

Trust based on cryptography, not centralized authority
Accessed with keys and cryptographic signatures
Ledger changes reflected and copied to all participants quickly. Each participant has a copy

Full audit of history available at all times.
DLTs can be used for recording tracking, monitoring and transacting of all forms of assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Centralised downsides

A

Centralised open to corruption/manipulation, additional regulation/legislation costs, centralised point of failure, centralised system of valuable data, attractive malicious errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DLT advantages

A

Improved transparency, reduced corruption, improved security while reducing overheads of auditing, accounting and legal issues.
Easily accessible on demand, tamperproof (reduced corruption again), distributed, no single point of failure so data synchronised across all nodes in network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public permissionless DLT

A

Anyone can join, read, write and commit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Private permissionless DLT

A

Only authorised participants can join, read, write and commit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Public permissioned DLT

A

Anyone can join and read
Only permissioned participants can write and commit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Private permissioned DLT

A

Only authorised participants can join and read
Only permissioned participants cna write and commit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blockchain

A

Series of blocks chained together by each block’s hash
Each block has data/transactions and hash generated from them. Next block has hash of previous block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Blockchain hash purpose

A

Canot create the block from the hash as it’s a one-way function
Changing any data in the block gives a completely different hash so it’s easy to verify if the block has been changed. Next block won’t recognize the previous block as being in the chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Blockchain consensus

A

No central organisation so consensus to verify transactions needed.
Distributed system, parties don’t have to trust each other
Transactions need to be validated and then sent to all nodes on the network. Anyone can validate on the network.
Bitcoin uses proof of work for validation
Ethereum uses proof of stake, less energy consumption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Blockchain transactions

A

Transferral of money with public-key cryptography.
Each wallet has public and private key.
Public key acts as address on wallet for receiving funds.
Private key gives owner access to their digital assets.
Effective security only requires keeping the private key private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Blockchain layers

A

Application and Presentation Layer
Consensus Layer
Network Layer
Data Layer
Hardware/Infrastructure Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hardware/infrastructure layer

A

Underlying systems supporting the functioning of a blockchain network
VMs, Containers, Services, Messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Layer

A

Storing and managing transactions in a distributed ledger
Digital Signature, Hash, Merkel Tree, Transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network Layer

A

Transmitting and distributing information between nodes.
P2P

17
Q

Consensus Layer

A

Reaching agreement among nodes about state of shared ledger
PoW, PoS, DPoS, PoET, PBFT

18
Q

Application and Presentation Layer

A

Providing access to blockchain functionality and services to end-users and developers
Smart Contracts, Chaincode, DApps, User Interface

19
Q

Blockchain “trusted system”

A

Trust created by design. P2P distributed network between people who don’t trust each other. Trust in technology and cryptography rather than any centralized authority.

20
Q

Digital Currencies

A

Monetary asset in digital form.
Regulated -> denominated to sovereign currency
Unregulated -> Virtual currency (cryptocurrency)

21
Q

Virtual Currency

A

Electronic representation of monetary value
Issued, managed and controlled by private issuers (platform developers/founding org)
Relies on trust. No issuing central authority.
Value based on an underlying mechanism (mining/underlying assets)
Restricted to members of a virtual group

22
Q

Cryptocurrency

A

Part of virtual currency group
Use cryptography to keep transactions secure and authentic
Manage and control the creation of new currency unts.
Transacted over DLT typically on a dedicated blockchain based network. Public financial transaction database. Open to the common public.

23
Q

First cryptocurrency

A

Bitcoin, p2p network to prevent double-spending. Completely decentralized with no server or central authority.

24
Q

Cryptocurrency Monetary Properties

A

Controlled supply. Most cryptocurrencies limit supploy of tokens. All cryptocurrencies control the supply of tokens by schedule written in the code.
No debt but bearer: Fiat-money is a system of IOU whereas cryptocurrencies just represent themselves

25
Q

Cryptocurrency Transactional Properties

A

Irreversible
Pseudonymous
Fast and global
Secure
Permissionless

26
Q

Irreversible

A

After confirmation, a transaction cannot be reversed (immutable).
No safety net if you are hacked or sent funds incorrectly.

27
Q

Pseudonymity

A

Neither transactions nor accounts are connected to real-world identities. Can analyse transaction flow but it is difficult to connect real-world identity of users with those addresses.

28
Q

Cryptocurrency: Fast and Global

A

Transactions are propogated nearly instantly in the network. Confirmed in a couple of minutes.
Invariant to location of sender and receiver

29
Q

Cryptocurrenty security

A

Funds locked with public-key cryptography system. Only owner of private key can send cryptocurrency

30
Q

Cryptocurrency Permissionless

A

Software based, so once installed, you can make use of cryptocurrencies. No gatekeeper.

31
Q

Cryptocurrency concerns

A

No regulation (Independent from formal banking system, no way to control monetary policy, secure from political influence)
Limited (Cannot control inflation)
DIfficult to track (Exchange is fast, global and very complex)
Anonymity, use in black-market economy
Tax evasion/money laundering

32
Q

Cryptocurrency theft and fraud

A

Crypto.com admits $30 million stolen by hackers. User accounts where transactions were being approved without the 2fa authentication control.
Infrastructure is not as well designed as that of banks
Not enough regulatory oversight
Lack of consumer protection against loss or theft

33
Q

Cryptocurrency transactions double-spending

A

Need to stop double-spending. Can normally use a centralized digital authority to give correct balance.
Achieved in a decentralized system with P2P technology. Transaction is broadcasted across the network.
Each peer has a full copy of the ledger. Transactions, and hence balance for every account on the system

34
Q

Cryptocurrency transaction broadcast and confirmation

A

Transaction broadcasted immediately across the network, it is not confirmed straightaway.
Before confirmation, there is a possibility of being forged. After being confirmed it is immutable.

35
Q

Cryptocurrency transaction validation

A

Once a validator has confirmed a transaction, it is added to the distributed ledger.
Anyone on the network can be a validator.
Make validators work to validate (e.g. proof of work) prevents one validator abusing the system.
Validators get reward for undertaking confirmation process (mining)