Podcast
Questions and Answers
Which of the following best describes the primary function of a blockchain wallet?
Which of the following best describes the primary function of a blockchain wallet?
- To execute smart contracts on a blockchain network.
- To provide real-time cryptocurrency market analysis.
- To mine new cryptocurrency blocks.
- To store and manage digital assets, enabling users to perform transactions. (correct)
How do public and private keys work together to secure transactions?
How do public and private keys work together to secure transactions?
- The public key is used to digitally sign transactions, while the private key is used to verify the signature.
- The public key is used to identify the user on the blockchain, while the private key confirms their identity.
- The public key is used to provide an address for depositing and receiving funds, and the private key allows control over the funds. (correct)
- The private key is used to encrypt transactions, and the public key is used to decrypt them.
Which of the following is a key characteristic that distinguishes deterministic wallets from non-deterministic wallets?
Which of the following is a key characteristic that distinguishes deterministic wallets from non-deterministic wallets?
- Deterministic wallets generate keys randomly, while non-deterministic wallets derive keys from a seed value.
- Deterministic wallets only support a single cryptocurrency, while non-deterministic wallets support multiple.
- Deterministic wallets require regular backups, whereas non-deterministic wallets do not due to their random key generation.
- Deterministic wallets derive keys from a seed value, whereas non-deterministic wallets generate keys randomly. (correct)
What is a potential disadvantage of using deterministic wallets that users should be aware of?
What is a potential disadvantage of using deterministic wallets that users should be aware of?
How do Hierarchical Deterministic (HD) wallets improve upon non-deterministic wallets?
How do Hierarchical Deterministic (HD) wallets improve upon non-deterministic wallets?
What is a primary vulnerability associated with brain wallets?
What is a primary vulnerability associated with brain wallets?
In the context of cryptocurrency wallets, what distinguishes paper wallets from hardware wallets?
In the context of cryptocurrency wallets, what distinguishes paper wallets from hardware wallets?
What is a potential risk associated with using online wallets for cryptocurrency storage?
What is a potential risk associated with using online wallets for cryptocurrency storage?
What is the purpose of tokenization in the context of blockchain technology?
What is the purpose of tokenization in the context of blockchain technology?
Which of the following statements accurately distinguishes between fungible and non-fungible tokens?
Which of the following statements accurately distinguishes between fungible and non-fungible tokens?
What is a key characteristic of a definition for a cryptocurrency?
What is a key characteristic of a definition for a cryptocurrency?
How are altcoins generally created?
How are altcoins generally created?
What distinguishes alternative chains from altcoins in the context of approaches to Bitcoin?
What distinguishes alternative chains from altcoins in the context of approaches to Bitcoin?
What primary feature differentiates Zcash from other cryptocurrencies?
What primary feature differentiates Zcash from other cryptocurrencies?
What is the significance of the Scrypt algorithm in Litecoin?
What is the significance of the Scrypt algorithm in Litecoin?
What is a potential negative consequence of a hard fork in a blockchain like Ethereum?
What is a potential negative consequence of a hard fork in a blockchain like Ethereum?
In the context of ERC token standards, what does ERC stand for?
In the context of ERC token standards, what does ERC stand for?
What is the main role of ERC standards?
What is the main role of ERC standards?
What fundamental functionality does ERC-20 provide as a specification?
What fundamental functionality does ERC-20 provide as a specification?
How does ERC-777 enhance the ERC-20 standard?
How does ERC-777 enhance the ERC-20 standard?
What is 'tokenization' described as?
What is 'tokenization' described as?
What is one of the limitations of ERC-20 Fungible Tokens?
What is one of the limitations of ERC-20 Fungible Tokens?
Which standard is an Extension of ERC20?
Which standard is an Extension of ERC20?
Which of the following statements is most accurate?
Which of the following statements is most accurate?
What is a key attribute of Non-deterministic wallets?
What is a key attribute of Non-deterministic wallets?
What is the disadvantage of brain wallets?
What is the disadvantage of brain wallets?
Which altcoin was released in 2016?
Which altcoin was released in 2016?
Which Proof of Work does Litecoin use?
Which Proof of Work does Litecoin use?
Which statement is not true?
Which statement is not true?
Why is it bad to have a hard fork?
Why is it bad to have a hard fork?
Which ERC standard is backwards compatible with ERC-20?
Which ERC standard is backwards compatible with ERC-20?
Which ERC standard Provides additional transaction data?
Which ERC standard Provides additional transaction data?
Which advantage does Allows operators for managed transactions?
Which advantage does Allows operators for managed transactions?
What is a potential downside to using ERC-827?
What is a potential downside to using ERC-827?
Flashcards
Blockchain Wallet
Blockchain Wallet
A software program allowing users to buy, sell, and monitor their digital currency or cryptocurrency balance. It stores public and private keys and records transactions on the blockchain.
Non-deterministic wallets
Non-deterministic wallets
Wallets that contain randomly generated private keys. Managing large numbers of keys is difficult and prone to errors.
Deterministic wallets
Deterministic wallets
Wallets where keys are derived from a seed value via hash functions, commonly represented by mnemonic code words.
Hierarchical Deterministic (HD) wallets
Hierarchical Deterministic (HD) wallets
Signup and view all the flashcards
Brain wallets
Brain wallets
Signup and view all the flashcards
Paper and Hardware wallets
Paper and Hardware wallets
Signup and view all the flashcards
Online and Mobile wallets
Online and Mobile wallets
Signup and view all the flashcards
Metamask
Metamask
Signup and view all the flashcards
Tokenization
Tokenization
Signup and view all the flashcards
Non-fungible Tokens (NFT)
Non-fungible Tokens (NFT)
Signup and view all the flashcards
Fungible Tokens
Fungible Tokens
Signup and view all the flashcards
Cryptocurrency
Cryptocurrency
Signup and view all the flashcards
Altcoins
Altcoins
Signup and view all the flashcards
Namecoin
Namecoin
Signup and view all the flashcards
Zcash
Zcash
Signup and view all the flashcards
Litecoin
Litecoin
Signup and view all the flashcards
ERC (Ethereum Request for Comment)
ERC (Ethereum Request for Comment)
Signup and view all the flashcards
Ether (ETH)
Ether (ETH)
Signup and view all the flashcards
ERC-20 Token
ERC-20 Token
Signup and view all the flashcards
Study Notes
- Lecture covers Wallets and Tokens within Blockchain and Cryptocurrency
Wallets
- Blockchain wallets are software programs enabling users to buy, sell, and monitor balances for digital currencies or cryptocurrencies
- Blockchain wallets store private and public keys
- They keep records of all cryptocurrency transactions on the blockchain
- Public Key represents the address to deposit and receive funds
Public and Private Keys
- Analogy of colors illustrates how public and private keys help secure transactions between parties
Types of Wallets
- Non-deterministic Wallets
- These wallets contain randomly generated private keys
- They are nicknamed "just a bunch of keys" wallets
- Bitcoin core client generates keys when first started and as needed
- Disadvantages of non-deterministic wallets:
- Managing many keys can be difficult and error-prone
- Can lead to theft and loss of coins
- Require regular backups
- Need encryption for theft or loss prevention
- Deterministic Wallets derive keys from a seed value using hash functions
- A seed number is generated randomly and usually represented by human-readable mnemonic code words
- Mnemonic code words were defined in Bitcoin Improvement Proposal BIP 39
- The mnemonic phrase can recover all keys, simplifying private key management
- Electrum is an example of a deterministic wallet
- Disadvantage: Single point of failure exists because seed phrase simplifies backup, an entire wallet's contents are at risk if the phrase is compromised or lost.
- Hierarchical Deterministic (HD) Wallets store keys in a tree structure derived from a seed
- The seed generates a parent key (master key) used to generate child then grandchild keys
- This is defined in BIP32 and BIP44
- HD wallets advance non-deterministic wallets by managing multiple addresses and keys more securely and efficiently
- Trezor, Jaxx, and Electrum are commercially available HD wallets
- If the seed phrase is not complex enough or stored improperly, there is potential vulnerability to brute force attacks
- Brain Wallets let users generate private keys and corresponding public addresses using a passphrase or sequence of chosen words
- Unlike hierarchical wallets (which use algorithms to derive keys from a seed), brain wallets directly use the passphrase as the private key
- Disadvantage: Prone to password guessing and brute force attacks; key stretching can slow down attackers.
- Paper Wallets are paper-based with printed key material requiring physical security for storage
- These wallets can be generated online from service providers like bitcoinpaperwallet.com or bitaddress.org
- Hardware Wallets typically use a tamper resistant device to store keys
- Another is to use a tamper-resistant device to store keys
- A custom-built device or Secure Element (SE) in NFC phone can be used
- Trezor and Ledger (various types) are common Bitcoin hardware wallets
- Online Wallets are stored online, provided as a service, and usually via the cloud
- Users can manage their wallets and perform functions via a web interface
- Users must trust the online wallet service provider, e.g., GreenAddress
- Mobile Wallets are installed on mobile devices
- They enable payments via smartphone cameras which can scan QR codes quickly
- They're available for Android and iOS; examples include Blockchain, breadwallet, Copay, and Jaxx
- Web wallets and hosted wallets as well as "physical storage facilities" like Xapo and Vo1t can be considered mobile wallets
Metamask Wallet
- Ethereum wallet that can be installed as a Chrome extension
- Helps run dApps without being part of the Ethereum network
- Interfaces with Infura (where smart contracts can be run)
Tokenization
- Tokenization converts rights to an asset into a digital token on a blockchain
- Assets (not just money) can be linked digitally to a token
- Gold, real estate, and stocks can be represented on a blockchain using tokens
- Two token types:
- Non-fungible
- Fungible
Non-Fungible Tokens (NFTs)
- NFTs are cryptographic tokens representing something unique
- NFTs are not interchangeable
- NFTs are not divisible into smaller units
- Applications:
- Creating verifiable digital scarcity
- Crypto gaming, such as Crypto Kitties on Ethereum
- Representing digital art or music ownership
- The Non-Fungible Token protocol is defined in ERC-721 (a token standard).
Fungible Tokens
- These tokens can be exchanged with any other token of the same type of divisible into smaller units
- Not uniform in nature, all tokens are identical to each other in nature
- Similar to fiat currencies
- Fungible token standard is defined in ERC-20
Cryptocurrencies Definition
- Digital currency using cryptographic techniques to regulate currency generation and verify fund transfers
- Operates independently of a central bank
Altcoins
- An altcoin is generated in the case of a hard fork via forking, all together new code or modification of old code
- Methods of providing the initial amount of new coins when a cryptocurrency is launched
- Could create a new blockchain: Proof of Burn (PoB), Proof of ownership, Pegged sidechains
First Altcoin
- Namecoin was the first alternative coin project, introduced in 2011
- Two categories for bitcoin alternatives, based on primary purpose:
- Alternative chains aim to build a decentralized blockchain platform
- Altcoins intend to introduce a new virtual currency
Other Altcoins
- Prevalent altcoins other than Namecoin include Zcash, Litecoin, and Primecoin
- Zcash was introduced in 2016
Zcash Data
- Zcash is the first currency to use Zero-Knowledge Proofs (ZK-SNARKs) for complete user privacy
- These proofs are concise and easy to verify, maintaining privacy
- Setting up initial parameters is a complicated process and needs to set up the proving key and verifying key
- Attribute data for Zcash:
- Launch Date: 28/10/16
- Currency code: ZEC
- Maximum coins: 21 million (like Bitcoin)
- Block Time: 10 minutes
- Consensus: Proof of Work (equihash)
- Difficulty adjustment algorithm: DigiShield V3 (modified)
- Mining hardware: CPU, GPU
- Difficulty adjustment period: 1 block
Litecoin Data
- Litecoin is a fork of the Bitcoin source code (2011)
- Uses Scrypt as PoW for faster transactions, with a faster block generation time of 2.5 minutes
- Scrypt features:
- Memory hard function for the SHA-256 based PoW algorithm
- Originally proposed as Password-Based Key Derivation Function (PBKDF)
- A large array of pseudorandom bits must be held in memory
- Algorithm is based on the Time-Memory Trade-Off (TMTO)
- Difficulty readjustment is achieved every 3.5 days roughly due to faster block generation time
- Litecoin total coin supply is 84 million
Hard Fork in Ethereum
- A hard fork on Ethereum created a new currency : Ethereum Classic (ETC)
- Ethereum Classic is the old chain and Ether is the new chain
- Bad because: opposes decentralization, splits user community due to disagreement
- Raises the question of distinction between the Altcoin with either ETH or ETC because it is the result of a chain split
ERC Token Standards
- ERC (Ethereum Request for Comment) constitutes technical documentation outlining guidelines and rules for creating & deploying smart contracts on the Ethereum blockchain
- ERC-20, 721, 777, 1155 are examples of commonly used ERC standards
ERC-20 and ERC-777 Fungible Tokens
- Ether (ETH) serves as the native token in Ethereum for verifying transactions
- ERC-20 creates smart contract-enabled fungible tokens within the Ethereum ecosystem
- ERC-20 properties:
- Interchangable and compatible with currencies and smart contracts
- Guarantees operation with compatible dApps
- Provides transaction receipts
- Widely used and Supported
- High gas costs, low scalability, slow transaction speed.
- ERC-777 has backward compatibility with ERC-20 and is more efficient for token transfers
Comparing standards ERC-223 and ERC-827
- ERC-20 is the most widely used with no protection
- ERC-223 has backward compatibility and provides token loss protection
- ERC-777 has backward compatibility, introduces hooks, improves interaction and safety
- ERC-827, backward compatibility, Single-step transfer of date, higher gas cost and requires security due to hooks
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.