-
Asymmetric Cryptography
Allows for secure communication without having to agree on a secret key or code to encrypt and decrypt messages. Alice and Bob are always used as the two people communicating in these scenarios Both have 2 keys – a PRIVATE and a PUBLIC key. The private key is a random number. In bitcoin, the private…
-
Ethereum Token Standards Brief Intro
Each of the token standards starts with “ERC”. ERC is an acronym for “Ethereum Request for Comments”. ERCs are standards at the application level. They can include more than just token standards. Other examples are name registries, “library/package formats”. The ERC token standards allow applications and smart contracts to interact with them in a predictable…
-
Blockchains As Cities
Great article on Medium by Haseeb Qureshi to help make sense of the evolving cryptocurrency world. I particularly liked the predictions that follow from his model. Analogies are frequently used to explain the crypto space, e.g. bitcoin as digital gold. They inevitably fall short. They are just a bridge or a catalyst to help develop…
-
Finding Image Files For NFTs
I have been saving the images of some of my NFTs by downloading them from OpenSea. I wanted to know if those images were the highest resolution ones available. Then I started to wonder about the actual files themselves – where are they stored? how do I find them? What happens if a random server…
-
Directed Acyclic Graph (DAG) Structure In Brief
https://academy.binance.com/en/articles/what-is-a-directed-acyclic-graph-dag-in-cryptocurrency A different database structure than blockchain The structure is made up of vertices and edges (lines connecting). Each vertex is a transaction There are no blocks, no mining per se There is a small proof of work operation that’s done when a node submits a transaction. This is done to validate previous transactions and…
-
Staking. A primer.
Earning From Your Tokens Cryptocurrencies that allow staking use a “proof of stake”, or “PoS” for short, consensus mechanism. A consensus mechanism is the process used to make sure transactions are verified and secured without the use of any middleman, bank, or payment processor. If you stake your cryptocurrency, it becomes part of this process.…
-
HODL origin story
It started with a misspelling in a post on Bitcointalk, a cryptocurrency forum, on December 18, 2013. The misspelling stuck, became a meme, and is used commonly in the crypto space. The post is hilarious, evidently written by someone that was drunk at the time. It was a rant written in response to a sharp…