Half Moon Seminer presentation for CLE credits.
Goes through the technologies that underly blockchain systems, smart contracts, tokens and their applications across a number of industry verticals.
4. “Blockchain is a technology that allows
natively digital transfer of value.”
Karl Kreder, co-founder of Grid+
5. 5
- Can't verify any data
- Doesn't allow instant transactions
- Isn't immutable
- Isn't encrypted
- Can't replace your servers
Blockchain myths
6. 6
- Voting
- Public registries
- Supply chains
- Decentralized trading
- Reconciliation
What is it good for?
7. Why blockchain?
Participants want to interact without trusted operator
between them
- censorship resistance
- pseudonymous; capable of anonymity
- resilient to failure, collusion points
- audit log against a single hash
11. 11
- Large network where validators (nodes) reach a
consensus that they witnessed the same thing at
the same time
- Use mathematical verification
- Size of the network is important to secure network
Distributed networks
16. 16
- Goal of a digital signature is for anyone who
receives a transaction/message to be able to
confirm the person who wrote the message knew
the corresponding private key
Private key cryptography
20. 20
- To have a 1% chance of guessing a digital
signature on the entire Bitcoin network would have
to work together for:
~5,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 years
Private key cryptography
21. 21
- Returns a string of characters of a fixed size from a
dataset of an arbitrary size;
- They are deterministic;
- Small changes in the input changes the output;
- Quick to compute, “one-way functions”.
Cryptography > hash functions
22. 22
- SHA (Secure Hash Algorithm) published by US
National Institute of Standards and Technology;
- Most blockchains use either SHA or similar
cryptographic hash functions;
- Bitcoin uses SHA-256.
Cryptography > SHA
23. 23
Cryptography > SHA example
“This is my password for this website.”
=
5CC98B74EEC5440694DCB70C55AE60BDB227D3DC81A4A65193660DDED7E60A43
24. 24
Cryptography > SHA example
“This is my password for this website”
=
75ED430F31FADC17699A513A95FA3D21F413704AF08221657FD525DCE9C91483
25. 25
Cryptography > SHA example
75ED430F31FADC17699A513A95FA3D21F413704AF08221657FD525DCE9C91483
5CC98B74EEC5440694DCB70C55AE60BDB227D3DC81A4A65193660DDED7E60A43
26. 26
- Allows to compare and validate passwords or
private information without revealing the
information to network.
Cryptography > hash functions
27. 27
- Each transaction has a number (hash of input
variables);
- Transactions are rolled up into blocks;
- Hash generated for blocks;
- Block input includes, previous block hash,
transactions, miner address & random number.
Cryptography > hash functions
36. - Agreement on the order of transactions
36
Consensus
Different ordering can lead to
double spending
Problem
No one trusts anyone else
Solution
Accept proposals for transaction order and reward
winning proposals
37. 37
- Network mining solves the incentivization problem
- By offering your computer processing power to
service the network, there is a reward available for
one of the computers.
- Self-interest is being used to help service the public
need
Protocol
38. 38
- Protocol eliminates double-spend
- Nodes serving network create and maintain a
history of transactions
- When majority of miners arrive at same solution,
new block is added. Block is timestamped.
Bitcoin consensus models
39. 39
- Miners collect transactions into blocks
- Then submit a proposal for a block after solving a
cryptographic puzzle
Bitcoin mining
40. 40
- Started at 50 BTC and halves every 210,000 blocks
- ~every 3-4 years
- Currently at 12.5 BTC
Coinbase mining reward
43. Proof of Work
- Based on computing power
- Competition on who can solve first each
block’s problem
Proof of Stake
- Creator of new block determined by
wealth, or “stake” in network
43
- Fundamental chain structures are similar or
derivative
- Differences in how network is mined (incentivized)
Blockchain consensus models
44. Proof of Work
- Based on computing power
- Competition on who can solve first each
block’s problem
Proof of Stake
- Creator of new block determined by
wealth, or “stake” in network
44
- Fundamental chain structures are similar or
derivative
- Differences in how network is mined (incentivized)
Blockchain consensus models
Goal is to make it cost-prohibitive
to attack the network
49. Cryptocurrencies
- Digitized currencies, encrypted
through cryptography
- Run on their own blockchains
Tokens
- Assets or utilities (represent coins,
loyalty points, in-game assets)
- Issued on blockchains (Ethereum,
Waves, etc)
49
Cryptocurrencies vs Tokens
52. 52
- Decouple from underlying cryptocurrency
- Configure for behaviour and economic outcomes
Why tokens?
53. 53
- Decentralization or disintermediation is a process
targeted at entities not responsibilities
- Network actors must assume responsibility
Token engineering
54. 54
"A highly structured computer-assisted interpersonal
interactive protocol whose social contract has a
well-known and sufficiently high difficulty of attack."
Aleksandr Bulkin, Coinfund [link]
Decentralized Applications (dApps)
56. 56
- Cryptocurrency networks allow you to manage the
your own private keys
- Services like Coinbase manage a wallet on your
behalf
- If you can’t own the private keys to the wallet, it’s
not a cryptocurrency
Owned vs Managed
58. 58
- Anyone can participate, and everyone is
anonymous
- No trust other than the state of the blockchain
- Typically employ a “mined” currency or transaction
fee (gas) to incentivize
- High cost of participation using Byzantine fault
tolerant consensus like Proof-of-Work (POW)
Public blockchains
60. 60
- Operate among known, identified and vetted participants
- Secures interactions among the group with common
goal but may not fully trust each other
- Relies on the identities of the participants
- Does not require mining
- All transactions and participant identities are recorded,
reducing the risk of malicious code injection
Permissioned blockchains
61. 61
Comparing
Public Permissioned
Data is public Privacy, confidentiality
Transactions are public Private channels
Pseudonymous Known participants
Anyone can join Permissioned
Anyone can access Permissioned
Trustless nodes Semi-trusted nodes
Low tx/s High tx/s
GDPR compliance
65. 65
- Multi-functional code that is the business logic
of the blockchain application
- Can be deployed dynamically
- Can run concurrently (stored and replicated on a
distributed storage platform)
- Autonomous
- Self-sufficient
Smart contracts
66. 66
- order-execute architecture
- Validates and orders transactions and
propagates to all peers
- Each peer executes the transactions
sequentially
Smart contracts
75. 75
- Can create a token, or tokenized asset
- Asset can be coin or alternative currency
- Can also represent real assets (land title, energy
units, minerals, goods & services, record
keeping)
Smart contracts
80. 80
- Native Brave browser
- Blockchain based digital advertising
- BAT traded between publishers, advertisers and
users
basicattentiontoken.org
Basic Attention Token (BAT)
81. 81
- adToken used to economically incentivise
publisher domain registry (quality, data proofing)
adtoken.com
AdChain
82. 82
"A highly structured computer-assisted interpersonal
interactive protocol whose social contract has a
well-known and sufficiently high difficulty of attack."
Aleksandr Bulkin, Coinfund [link]
Decentralized Applications (dApps)