Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material Stichwortverzeichnis 51-Prozent-Attacke 76, 117 Auszahlungsadresse 127 Block-Difficulty 106, 260 Auszahlungsschwelle 127 Anpassung 106 A Block Digest 251 B Abbauperiode 114, 118 Blockkandidat 69 Abschreibung 237 Bandbreite 183 Block Producer 86 Abschwungphase 291 Bargeld 30 Block-Reward 53, 232–233 Abwärme 246 Benchmark, Blockschwierigkeit nutzen 247 Prozessor 224 siehe Block-Difficulty Abzocke 328 Beschwerden von Blocksubvention Adware 225 Nachbarn 330 53, 220, 326 Algorithmen 71, 145 Betriebsausgaben 229 Blockvergütungen 220 ASIC-Hardware 146 Betriebssystem 208 BOINC 323 ohne ASIC 148 Betrug 328 Braiins OS 212 All Time High (ATH) 294 BFGMiner 215 Brandrisiko 329 Alternative Energie­ Bildschirm 208 BTCMiner 215 quellen 249 Billiger Strom 315 Bürgerkrieg 253 Amazon 267 Binance 277 Burn-Adresse 87 AMD-CPU 203 Bitcoin 35 Bylls 267 Amortisationszeit, Mining-Pools 117 Byzantinische ­Ausrüstung 316 Netzwerk 59 Generäle 55 Angegebene Hashrate 168 Peer-to-Peer-Protokoll C Anonyme Täter 121 60 Anpassung der Block­ Proof-of-Work 74 Canaan 177 schwierigkeit 106 Bitcoin Beginners Capital Expenditures Anreize für Miner 53 ­Subreddit 250 (CapEx) 220 Anschaffungskosten 219–220 Bitcoin Improvement Carmichael-Zahlen 41 Antifragil 158 Proposal 180 Cash App 276 Antminer S7 171, 176 Bitcoin Magazine 250 Cash-Burn-Rate (CBR) 291 Antminer S9k 190 Bitcoin-Subreddit 250 CGMiner 215 Antminer S17 Pro-15 176 Bitcoin Talk 250 Chain Tip 82 AntPool 96 Bitcoin Tax 282 Change 64 Application Specific Bitcoin Volatility Change-Adresse 65 Integrated Circuit 57 ­Index 300–301 Client-Server-Netzwerke Arbitrage-Handel 311 Bitcoin-Whitepaper 32 60 ASIC 57, 93, 101 COPYRIGHTEDBitfury 177 MATERIALCloud-Mining 98–99, 129 ASIC-Mining-Rig 176, 189 BitInfoCharts 231, 256, 261 Vergleich mit Pool- Hersteller 176 Bitmain 177 Mining 99 AT&T 267 BitMex 277 Vor- und Nachteile 99 Aufhören oder weiter- Bitrefill 267 Coin-Age 79, 83 machen 305 Bitstamp 277 Coinbase 267, 276 Auroracoin 260 Blackcoin 80 Coin Bills 267 Ausgaben 237–238 Blasenbildung 326 Coin.Dance 97 Ausrüstung Blockchain 34, 53 CoinDesk 250 Hashrate 221 Adresse 43 CoinGate 266 kaufen 266 Nachrichten 42 CoinJournal 250 modernisieren 246 Netzwerk 34, 59 CoinMarketCap 259 Auszahlungen 116 verschlüsselte 40 Coin Mine 178 Kent716630_bindex.indd 331 2/14/2020 2:36:44 PM 332 Stichwortverzeichnis Coins E Festplatte 207 frische 306 Fiatwährung 138 Easyminer 212 zentralisierte Offerings Field Programmable Gate Eater-Adresse 87 140 Array (FPGA) 93 EBang 177 Cointracking 282 Firmeneigene Tokens 140 Effizienz 226 CoinWarz 142, 240 Foldingcoin 323 ASICs 171 FOMO-Investition 278 Cold Wallets 178 Ausrüstung 219 Forging 78 Colocation-Service 188 Mining-Hardware 225 Fork 48, 251, 255 Community 160 und Profitabilität 246 Fork-Kriege 251 Computerausrüstung Effizienzsteigerung 101 FPGA-Chips 213 167 Effizienzvergleich 227 Frische Coins 306 Core-Software von E-Gold 31 Full Nodes 60–61 Kryptowährungen 214 Eigentumsnachweis 54 Full Pay-Per-Share Cost Averaging 278 Eigentumsrechte 34 (FPPS) 119 CPU 203 Einnahmen 238 Fully validating nodes 61 CPU-Mining 92, 209 Einsteiger 113 Crossover-Mining 74 Electricity Cost G Cryptofolio Tax 282 Averaging 279 Garantierte Profite 121 Crypto Mining Tools Elektroinstallation 186 Gebäudekosten 220, 228, 237 (Website) 241 Emissionsrate 54 Gebrauchtgerät 298 CryptoNightR 150 Energiebedarf Geld, digitales 29 Crypto Trader Tax 282 ermitteln 230 Gemini 276 Curecoin 323 Energiekostenmessgerät 230 Genesis-Block 33, 91 Custodial Wallets Energiequellen, Gepatched 158 60, 179, 256 alternative 249 Geräuschpegel 247 Cybercash 31 Energieverbrauch 319 Gesellschaftlicher im Vergleich 322 D Konsens 163 Energieversorger, Gesetzliches DASH 84–85 Tarife 248 Zahlungsmittel 103 Datenbank 34 Equihash 75, 147 Gewinn 233 delegated Byzantine Fault Equihash 192/7 151 GitHub 155 Tolerance (dBFT) 86 Ereignisse, Goppa-Codes 41 delegated Proof-of-Stake aktuelle 251 GPU 92 (dPoS) 86 Ethash 74, 149 GPU-Miner bauen 198 Dezentrale Ether 74 GPU-Mining-Rigs 177, 197 Währungen 51 Ethereum 35, 85 GPU-Riserkarte 206 Dezentralisierung 161 Fork 253 Grafikkarten 204 Difficulty-Epoche 106 Mining-Pools 117 Grafikprozessor 205 DigiCash 31 Netzwerk 74 Graphical Digitales Geld 29 Ethereum Classic 253 Processing Unit 204 Dish Network 267 ethos 211 Grenzen, physikalische Dollar Cost Averaging Evolution des Mining 91 102 (DCA) 278 Exahashes 94 Gridcoin 323 Double Geometric Method Exit Scam 177 Grin 313 (DGM) 120 Expansion 285, 315 Gyft 267 Double-Spending 55 F Durchsatz 324 H Durchschnitts- Facebook 254 H4SHR8 211 kosteneffekt 278 Faire Verteilung 326 Halbierungen 261 Verkauf 279 Faltung von Proteinen 323 Halong Mining 177 Dust 127 Fehlinvestitionen 219 Händlerkonto 30 Kent716630_bindex.indd 332 2/14/2020 2:36:44 PM Stichwortverzeichnis 333 Hardware 167, 189 K Kryptowährungsadresse 127 Effizienz 225 Kühlung 228 Kabel 206 gebrauchte 298 effiziente 317 Kapitalrendite 233, 238 Hersteller 176 Kosten vermeiden 317 berechnen 219, 233 Kosten 174, 220 Kurseinbruch 298 steigern 309 Nutzungsdauer 175 Kursschwankungen 296 Klimatisierung 220, 317 Schnäppchen 318 Konsens 35, 252 Wallet 180 L gesellschaftlicher 163 Hash 35 LAN-Verbindung 194 Konsensalgorithmen 56 Hashes Latenz 183 Kontrollinstanz, zentrale 54 vs. Solutions 223 LCPoA 88 Kosten Hashing 35, 68 Lebensdauer 157 Hardware 174 Hashing-Board 227 Legale Zahlungsmethode 103 senken 245 Hashrate 94, 143, 221, 225 Legalität von Kryp- Kraken 275 angegebene 168 towährungen 102 Kreditinstitute 31 Einheiten 145 Leistungsaufnahme 170 Kreditkarten 30 Konverter 235 Leistungsmessgerät 230 Kreditkartentransak- Marktplätze 315 Libra 254 tionen 325 und Sicherheit 158 Lieferkette 34 Kritikpunkte 319 verkaufen 290 Lightweight Node 62 Kryptoanarchist 109, 269 HDD 207 Limited Confidence Proof-of- Kryptografie 39, 54 Heizlüfter 246 Activity 88 Krypto-Miner 53, 78, 108 Hive OS 212 Lindy-Effekt 157 Kryptominen 48 Hodln 269, 281, 296 Listening Node 61 Kryptowährungen 29, 51 Honeyminer 116, 130, 211 Litecoin 35, 74 Algorithmen 145 Hot Wallets 178 Mining-Pools 117 alternative 311 Hybrides Proof-of-Stake/ Living Room of Satoshi 268 auswählen 137 Proof-of-Work 82 LocalBitcoins 276 Bestandteile 46 Hybridwährungen 83 Lüfter 208 Börsen 275 Beispiele 84 Lyra2v2 147 Detailseite 152 Nachteile 85 Lyra2z 150 einsetzen 265 Vorteile 85 Geschichte 30 M I Guthaben 47 hodln 269 Mainboard 202 Immersionskühlung 317 Homepage 155 Malware 225 Inflationsrate 54 investieren 271 Marktabschwung 290 Infrastruktur, bestehende Lebensdauer 157 Markteinbruch 299 nutzen 186 Legalität 102 Markterholung 298 Initial Coin Offerings 329 Marktpreis 233 Marktindikatoren 272 Innosilicon 177 Netzwerk 59 Marktkapitalisierung 49 Input 64 neue 312 realisierte 274 Internetmodem 194 pseudonyme 46 Marktpreis 233 Internet über Satellit 183 recherchieren 141 Marktvolatilität 299, 301 Internetverbindung Reserven 291 Masternodes 85 182, 194 spenden 271 Maus 208 Investitionsblase 326 Staub 127 Mayer Multiple 272 Investitionskosten 220 umtauschen 266 Mehrfachausgaben 55 IP-Scanner 195 verschenken 272 Memory Pool 51, 66 J verschiedene schürfen 246 Merkle Report 250 Vertrauen schaffen 54 Messari 250 Joule 171 wechseln 290, 302 Metcalfesches Gesetz 161 Joule/Hash 171 Microsoft 267 Kent716630_bindex.indd 333 2/14/2020 2:36:45 PM 334 Stichwortverzeichnis Mikrotransaktionen 127 NEO 87 PIVX 85 Millicent 31 NeoScrypt 148 PoA 88 Miner 53, 79 NetBSD 252 PoB 87 Miner der letzten Instanz 108 Netzteil 185, 191, 207 PoC 88 Mine Shop 178 Netzwerk-Hashrate 231 PoET 88 Mining-Betrieb Newegg 266 Poloniex 276 erweitern oder NiceHash 116, 211 Pool-Account 125 modernisieren 268 Niedrige Kurse 297 Poolgebühren 122 Mining vs. Investition 280 Node 35, 51, 59, 96 Pool-Mining 95, 99, 168, 210 Steuer 280 räumliche Verteilung 163 Einnahmen berechnen vergrößern 268 Typen 61 236 Mining-Farmen 98 Nonce 69, 73 Programme 211 Mining-Foren 157 Nonlistening Full Node 61 Vergleich mit Mining-Pool 96, 114, 224 Nutzungsdauer, Cloud-Mining 99 Anreize und Hardware 175 Vor- und Nachteile 97 Vergütungen 118 NVT Ratio 273 Pool-Software 209 Ausrüstung 115 NVT Signal 273 Poolspezifische auswählen 97, 115 NXT 80 Einstellungen 126 Auszahlungen 116 PoS 77, 140 bekannte Pools 117 O PoS-Kryptowährungen 80 Gebühren 122 Off-Chain-Daten 251 PoW 71, 140 Honeyminer 130 Öffentliche Power Distribution Unit 184 Ideologie 120 Schlüssel 41, 47 Preise, Hardware 174 Informationen 232 Online-Marktplätze 318 Preisinflation 329 prozentualer Anteil 123 Online-Profitabili- Premined-Coins 76 Recherche 128 tätsrechner 239 Premining 48, 312 Reputation 121 OpenBSD 252 Primecoin 323 Serverauswahl 126 Operational Primzahlen 323 Mining-Rig 52, 56, 189 Expenditures 229 Private Schlüssel 41, 47 poolspezifische OpEx 229 Nachrichten signieren 43 Einstellungen 126 Output 64 Problem der Rahmen 199 Overstock 266 byzantinischen Mining-Runde 114, 118 Generäle 55 MiningSky 178 P Profitabilität 141, 219 Miningstore 177 Paid by Coins 268 durch Effizienz 246 MiningStore AU 178 Panda Miner B Pro 178 Profitabilitätsrechner Minting 78 Paper-Wallet 179 153, 239–240 Modernisierung, Pay-Per-Last N Shares Programme für das Ausrüstung 246 (PPLNS) 119 Pool-Mining 211 Monero 75 Pay-Per-Share (PPS) 119 Proof-of-Activity 88 Mining-Pools 118 PCIe-Stromkabel 192 Proof-of-Burn 87 Mooresches Gesetz 101 PDU 185 Proof-of-Capacity 88 Mother of Dragons 213 Peercoin 85 Proof-of-Elapsed Time 88 Multi-Level-Marketing- Peercoin-Whitepaper 77 Proof-of-Stake 56 Systeme 121 Peer-to-Peer-Kryp- Algorithmen 77 MVRV Ratio 274 towährungssystem 58 Auswahlverfahren 78 Funktionsweise 78 N Peer-to-Peer-Netzwerk
Recommended publications
  • Characterizing Ethereum's Mining Power Decentralization at a Deeper
    Characterizing Ethereum’s Mining Power Decentralization at a Deeper Level Liyi Zeng∗§, Yang Chen†§, Shuo Chen†, Xian Zhang†, Zhongxin Guo†, Wei Xu∗, Thomas Moscibroda‡ ∗Institute for Interdisciplinary Information Sciences, Tsinghua University †Microsoft Research ‡Microsoft Azure §Contacts: [email protected], [email protected] Abstract—For proof-of-work blockchains such as Ethereum, than 50% of the total power has grown from several the mining power decentralization is an important discussion hundred to several thousand. Overall, the power is more point in the community. Previous studies mostly focus on the decentralized at the participant level than 4 years ago. aggregated power of the mining pools, neglecting the pool participants who are the source of the pools’ power. In this paper, However, we also find that this number varied signif- we present the first large-scale study of the pool participants icantly over time, which means it requires continuous in Ethereum’s mining pools. Pool participants are not directly tracking. Additionally, as our current data and method- observable because they communicate with their pools via private ology cannot de-anonymize the participants, it’s possible channels. However, they leave “footprints” on chain as they that some participants split themselves into many smaller use Ethereum accounts to anonymously receive rewards from mining pools. For this study, we combine several data sources ones for various reasons, which could make our estima- to identify 62,358,646 pool reward transactions sent by 47 tion inaccurate if not completely off the target. Further pools to their participants over Ethereum’s entire near 5-year study to improve the estimation accuracy is important.
    [Show full text]
  • Crypto Research Report ‒ April 2019 Edition
    April 2019 Edition VI. “When the Tide Goes Out…” Investments: Gold and Bitcoin, Stronger Together Technical Analysis: Spring Awakening? Cryptocurrency Mining in Theory and Practice Demelza Kelso Hays Mark J. Valek We would like to express our profound gratitude to our premium partners for supporting the Crypto Research Report: www.cryptofunds.li Contents Editorial ............................................................................................................................................... 4 In Case You Were Sleeping: When the Tide Goes Out…............................................................... 5 Back to the Roots ............................................................................................................................................. 6 How Long Will This Bear Market Last .............................................................................................................. 7 A Tragic Story Traverses the World ................................................................................................................. 9 When the tide goes out… ............................................................................................................................... 10 A State Cryptocurrency? ................................................................................................................................ 12 Support is Increasing ..................................................................................................................................... 14
    [Show full text]
  • Asymmetric Proof-Of-Work Based on the Generalized Birthday Problem
    Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem Alex Biryukov Dmitry Khovratovich University of Luxembourg University of Luxembourg [email protected] [email protected] Abstract—The proof-of-work is a central concept in modern Long before the rise of Bitcoin it was realized [20] that cryptocurrencies and denial-of-service protection tools, but the the dedicated hardware can produce a proof-of-work much requirement for fast verification so far made it an easy prey for faster and cheaper than a regular desktop or laptop. Thus the GPU-, ASIC-, and botnet-equipped users. The attempts to rely on users equipped with such hardware have an advantage over memory-intensive computations in order to remedy the disparity others, which eventually led the Bitcoin mining to concentrate between architectures have resulted in slow or broken schemes. in a few hardware farms of enormous size and high electricity In this paper we solve this open problem and show how to consumption. An advantage of the same order of magnitude construct an asymmetric proof-of-work (PoW) based on a compu- is given to “owners” of large botnets, which nowadays often tationally hard problem, which requires a lot of memory to gen- accommodate hundreds of thousands of machines. For prac- erate a proof (called ”memory-hardness” feature) but is instant tical DoS protection, this means that the early TLS puzzle to verify. Our primary proposal Equihash is a PoW based on the schemes [8], [17] are no longer effective against the most generalized birthday problem and enhanced Wagner’s algorithm powerful adversaries.
    [Show full text]
  • Zcash Protocol Speci Cation
    Zcash Protocol Specication Version 2018.0-beta-14 Daira Hopwood† Sean Bowe† — Taylor Hornby† — Nathan Wilcox† March 11, 2018 Abstract. Zcash is an implementation of the Decentralized Anonymous Payment scheme Zerocash, with security xes and adjustments to terminology, functionality and performance. It bridges the exist- ing transparent payment scheme used by Bitcoin with a shielded payment scheme secured by zero- knowledge succinct non-interactive arguments of knowledge (zk-SNARKs). It attempts to address the problem of mining centralization by use of the Equihash memory-hard proof-of-work algorithm. This specication denes the Zcash consensus protocol and explains its differences from Zerocash and Bitcoin. Keywords: anonymity, applications, cryptographic protocols, electronic commerce and payment, nancial privacy, proof of work, zero knowledge. Contents 1 1 Introduction 5 1.1 Caution . .5 1.2 High-level Overview . .5 2 Notation 7 3 Concepts 8 3.1 Payment Addresses and Keys . .8 3.2 Notes...........................................................9 3.2.1 Note Plaintexts and Memo Fields . .9 3.3 The Block Chain . 10 3.4 Transactions and Treestates . 10 3.5 JoinSplit Transfers and Descriptions . 11 3.6 Note Commitment Trees . 11 3.7 Nullier Sets . 12 3.8 Block Subsidy and Founders’ Reward . 12 3.9 Coinbase Transactions . 12 † Zerocoin Electric Coin Company 1 4 Abstract Protocol 12 4.1 Abstract Cryptographic Schemes . 12 4.1.1 Hash Functions . 12 4.1.2 Pseudo Random Functions . 13 4.1.3 Authenticated One-Time Symmetric Encryption . 13 4.1.4 Key Agreement . 13 4.1.5 Key Derivation . 14 4.1.6 Signature . 15 4.1.6.1 Signature with Re-Randomizable Keys .
    [Show full text]
  • Understanding the Motivations, Challenges and Needs of Blockchain Software Developers: a Survey
    Empirical Software Engineering manuscript No. (will be inserted by the editor) Understanding the Motivations, Challenges and Needs of Blockchain Software Developers: A Survey Amiangshu Bosu · Anindya Iqbal · Rifat Shahriyar · Partha Chakroborty Received: November 6, 2018 / Accepted: March 19, 2019 Abstract The blockchain technology has potential applications in various areas such as smart-contracts, Internet of Things (IoT), land registry, supply chain man- agement, storing medical data, and identity management. Although the Github currently hosts more than six thousand active Blockchain software (BCS) projects, few software engineering research has investigated these projects and its' contrib- utors. Although the number of BCS projects is growing rapidly, the motivations, challenges, and needs of BCS developers remain a puzzle. Therefore, the primary objective of this study is to understand the motivations, challenges, and needs of BCS developers and analyze the differences between BCS and non-BCS development. On this goal, we sent an online survey to 1,604 active BCS developers identified via mining the Github repositories of 145 popular BCS projects. The survey received 156 responses that met our criteria for analysis. The results suggest that the majority of the BCS developers are experienced in non-BCS development and are primarily motivated by the ideology of creating a decentralized financial system. Although most of the BCS projects are Open Source Software (OSS) projects by nature, more than 93% of our respondents found BCS development somewhat different from a non-BCS development as BCS projects have higher emphasis on security and reliability than most of the non- BCS projects. Other differences include: higher costs of defects, decentralized and hostile environment, technological complexity, and difficulty in upgrading the soft- ware after release.
    [Show full text]
  • Coinbase Explores Crypto ETF (9/6) Coinbase Spoke to Asset Manager Blackrock About Creating a Crypto ETF, Business Insider Reports
    Crypto Week in Review (9/1-9/7) Goldman Sachs CFO Denies Crypto Strategy Shift (9/6) GS CFO Marty Chavez addressed claims from an unsubstantiated report earlier this week that the firm may be delaying previous plans to open a crypto trading desk, calling the report “fake news”. Coinbase Explores Crypto ETF (9/6) Coinbase spoke to asset manager BlackRock about creating a crypto ETF, Business Insider reports. While the current status of the discussions is unclear, BlackRock is said to have “no interest in being a crypto fund issuer,” and SEC approval in the near term remains uncertain. Looking ahead, the Wednesday confirmation of Trump nominee Elad Roisman has the potential to tip the scales towards a more favorable cryptoasset approach. Twitter CEO Comments on Blockchain (9/5) Twitter CEO Jack Dorsey, speaking in a congressional hearing, indicated that blockchain technology could prove useful for “distributed trust and distributed enforcement.” The platform, given its struggles with how best to address fraud, harassment, and other misuse, could be a prime testing ground for decentralized identity solutions. Ripio Facilitates Peer-to-Peer Loans (9/5) Ripio began to facilitate blockchain powered peer-to-peer loans, available to wallet users in Argentina, Mexico, and Brazil. The loans, which utilize the Ripple Credit Network (RCN) token, are funded in RCN and dispensed to users in fiat through a network of local partners. Since all details of the loan and payments are recorded on the Ethereum blockchain, the solution could contribute to wider access to credit for the unbanked. IBM’s Payment Protocol Out of Beta (9/4) Blockchain World Wire, a global blockchain based payments network by IBM, is out of beta, CoinDesk reports.
    [Show full text]
  • La Criptomoneda
    LA CRIPTOMONEDA LA CRIPTOMONEDA 1 LA CRIPTOMONEDA CONTENIDO 1. ¿Cuál es la criptomoneda más rentable para invertir? …………… Pág.6 2. NEO (NEO; antes AntShares) …………………………………………Pág.7 3. NEM (XEM) ……………………………………………………………….Pág.8 4. Ripple (XRP) ……………………………………………………………. Pág.9 5. Stellar (XLM) ……………………………………………………………. Pág.10 6. Ethereum (ETH) ………………………………………………………… Pág.11 7. Dash (Dash; antes Darkcoin o XCoin) ………………………………. Pág.12 8. Tron (TXR) ………………………………………………………………. Pág.13 9. Litecoin (LTC) ……………………………………………………………Pág.14 10. Cardano (ADA) …………………………………………………………. Pág.15 11. Monero (XMR) …………………………………………………………… Pág.16 12. Iota (Miota) ……………………………………………………………… Pág.17 13. Bitcoin (BTC) ……………………………………………………………. Pág.19 14. Bitcoin Cash (BCH)………………………………………………………. Pág. 21 15. Qué es una ICO: la ‘bolsa’ basada en las criptomonedas………… Pág.23 16. Qué es una ICO ………………………………………………………… Pág.24 2 LA CRIPTOMONEDA 17. Cómo se compra una ICO ……………………………………………... Pág. 26 18. ¿QUÉ ES LA MINERÍA DE BITCOINS (CRIPTOMONEDAS)?.......... Pág.28 19. MINERÍA BITCOIN ………………………………………………………. Pág.29 20. ¿CÓMO MINAR CRIPTOMONEDAS? …………………………………Pág.32 21. PRUEBA DE TRABAJO (PROOF-OF-WORK) ………………………. Pág.33 22. Minero ASIC de Bitcoin con fuente de 1.300 vatios ………………… Pág. 35 23. PRUEBA DE PARTICIPACIÓN (PROOF-OF-STAKE) ………………. Pág.38 24. Votación de delegados para forging en Lisk. ………………………. Pág.40 25. GRUPOS DE MINERÍA (MINING POOLS) ……………………………Pág.42 26. Participación de mercado de grupos de minería de Bitcoin. …….. Pág.46 27. MINERÍA EN LA NUBE (CLOUD MINING) …………………………... Pág. 48 28. Minería de criptomonedas para novatos ……………………………. Pág. 50 29. ORIGEN DEL VALOR …………………………………………………... Pág.52 30. HARDWARE NECESARIO ……………………………………………….Pág.57 31. ASPECTOS A TENER EN CUENTA PARA HARDWARE …………..Pág. 60 32. GPU ……………………………………………………………………….. Pág. 63 33. ELEGIR UNA CRIPTOMONEDA PARA CRIPTOMINAR …………….Pág. 67 34. CONSUMO ELÉCTRICO …………………………………………………Pág.74 3 LA CRIPTOMONEDA 35.
    [Show full text]
  • A Survey on Consensus Mechanisms and Mining Strategy Management
    1 A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks Wenbo Wang, Member, IEEE, Dinh Thai Hoang, Member, IEEE, Peizhao Hu, Member, IEEE, Zehui Xiong, Student Member, IEEE, Dusit Niyato, Fellow, IEEE, Ping Wang, Senior Member, IEEE Yonggang Wen, Senior Member, IEEE and Dong In Kim, Fellow, IEEE Abstract—The past decade has witnessed the rapid evolution digital tokens between Peer-to-Peer (P2P) users. Blockchain in blockchain technologies, which has attracted tremendous networks, especially those adopting open-access policies, are interests from both the research communities and industries. The distinguished by their inherent characteristics of disinterme- blockchain network was originated from the Internet financial sector as a decentralized, immutable ledger system for transac- diation, public accessibility of network functionalities (e.g., tional data ordering. Nowadays, it is envisioned as a powerful data transparency) and tamper-resilience [2]. Therefore, they backbone/framework for decentralized data processing and data- have been hailed as the foundation of various spotlight Fin- driven self-organization in flat, open-access networks. In partic- Tech applications that impose critical requirement on data ular, the plausible characteristics of decentralization, immutabil- security and integrity (e.g., cryptocurrencies [3], [4]). Further- ity and self-organization are primarily owing to the unique decentralized consensus mechanisms introduced by blockchain more, with the distributed consensus provided by blockchain networks. This survey is motivated by the lack of a comprehensive networks, blockchains are fundamental to orchestrating the literature review on the development of decentralized consensus global state machine1 for general-purpose bytecode execution. mechanisms in blockchain networks. In this survey, we provide a Therefore, blockchains are also envisaged as the backbone systematic vision of the organization of blockchain networks.
    [Show full text]
  • Altcoins, Ethereum Projects, and More – Bonus Content
    Altcoins, Ethereum projects, and More – Bonus Content Welcome to the bonus online content for Mastering Blockchain – Third Edition! This content complements the main text, with the intention to enhance the reader learning experience. The material covered here has not been included in the core book for reasons of brevity and scope, but it contains valuable information, and has thus been included here for reference and further learning. We'll list and briefly describe the topics covered in these pages here, as an idea of what will be covered in this package. The topics are best read in conjunction with the chapters specified here, but can also be accessed as a reference guide for various topics at any point! • Bitcoin forks: It is recommended that this topic is read after Chapter 7, Bitcoin Network and Payments. It covers alternative Bitcoin projects such as Bitcoin Cash and Bitcoin Unlimited. • Alternative coins: This is intended to be read in conjunction with Chapter 9, Alternative Coins. This topic covers some important cryptocurrency projects such as Zcash and Primecoin. We cover in detail, among other things, how various clients can be installed, and how mining can be performed. • Ethereum networks, trading and investment: It's recommended to read this material with Chapter 11, Ethereum 101. This topic briefly introduces the different types of Ethereum networks and some technical details. Also, we introduce some basics regarding the trading and investment of ether, the Ethereum cryptocurrency. • Ethereum EVM opcodes: This topic should be read in conjunction with Chapter 12, Further Ethereum. Here, we list all EVM opcodes, with descriptions and some technical details, such as their opcode representation and gas consumption.
    [Show full text]
  • Zcash Protocol Speci Cation
    Zcash Protocol Specication Version 2016.0-beta-1.10 as intended for the Zcash release of autumn 2016 Daira Hopwood Sean Bowe — Taylor Hornby — Nathan Wilcox October 30, 2016 Contents 1 1 Introduction 4 1.1 Caution . .4 1.2 High-level Overview . .4 2 Notation 5 3 Concepts 7 3.1 Payment Addresses and Keys . .7 3.2 Notes...........................................................7 3.2.1 Note Plaintexts and Memo Fields . .8 3.3 Transactions, Blocks, and the Block Chain . .8 3.4 JoinSplit Transfers and Descriptions . .9 3.5 Note Commitment Tree . .9 3.6 Nullier Set . 10 3.7 Block Subsidy and Founders’ Reward . 10 3.8 Coinbase Transactions . 10 4 Abstract Protocol 10 4.1 Abstract Cryptographic Functions . 10 4.1.1 Hash Functions . 10 4.1.2 Pseudo Random Functions . 10 4.1.3 Authenticated One-Time Symmetric Encryption . 11 4.1.4 Key Agreement . 11 1 4.1.5 Key Derivation . 12 4.1.6 Signatures . 12 4.1.7 Commitment . 13 4.1.8 Zero-Knowledge Proving System . 13 4.2 Key Components . 14 4.3 JoinSplit Descriptions . 14 4.4 Sending Notes . 15 4.4.1 Dummy Notes . 16 4.5 Merkle path validity . 16 4.6 Non-malleability . 17 4.7 Balance . 17 4.8 Note Commitments and Nulliers . 17 4.9 JoinSplit Statement . 17 4.10 In-band secret distribution . 18 4.10.1 Encryption . 19 4.10.2 Decryption by a Recipient . 19 5 Concrete Protocol 20 5.1 Caution . 20 5.2 Integers, Bit Sequences, and Endianness . 20 5.3 Constants .
    [Show full text]
  • Vývoj Elektronických Plateb Development of Electronic Payments
    Masarykova univerzita Ekonomicko-správní fakulta Studijní obor: Finance Vývoj elektronických plateb Development of Electronic Payments Diplomová práce Vedoucí diplomové práce: Autor: prof. Ing. Jiří DVOŘÁK, DrSc. Mgr. Bc. Lucia MOŤKOVÁ Brno, 2017 Jméno autora: Lucia Moťková Název diplomové práce: Vývoj elektronických plateb Název práce v angličtině: Development of Electronic Payments Katedra: Katedra financí Vedoucí diplomové práce: prof. Ing. Jiří Dvořák, DrSc. Rok obhajoby: 2017 Anotace Diplomová práce klasifikuje peníze a elektronické (digitální) peníze, mezi které řadí i pohledávky z vkladů na bankovních účtech a soukromé elektronické peníze, včetně kryptoměn (bitcoin). Popisuje aspekty elektronických peněz a různých způsobů provádění elektronických plateb i jejich současnou právní regulaci v České republice, s cílem vytvoření modelů vývoje elektronických peněz a elektronických plateb a modelu elektronického bankovnictví. Autorka dále uvádí některá doporučení: doporučení retailovým klientům bank ve vztahu k realizaci elektronických plateb, doporučení státu ve vztahu k zajištění možnosti sledování peněžních toků a konečně doporučení bankám ve vztahu k vylepšení stávajících produktů, zejména v souvislosti s autentizací elektronických plateb. Annotation The diploma thesis classifies money and electronic (digital) money, among which claims on deposit bank accounts and private electronic money, including cryptocurrencies (bitcoin), are also classified. The features of electronic money and various methods of the realization of electronic
    [Show full text]
  • 51% Attack” January 2019
    PHILIP OWRUTSKY, PH.D., CFA VICE PRESIDENT, INVESTMENT STRATEGIST, CLIENT ADVISORY VIEWPOINTS FROM THE ACADIAN TEAM CRYPTOS’ ACHILLES HEEL: THE RISE OF THE “51% ATTACK” JANUARY 2019 • As of January 8th, Ethereum Classic is experiencing a “51% attack,” whereby malicious agents have stolen over $1.1 million by assuming control of enough computing power to falsify the currency’s transaction history. During 2018, several other cryptocurrencies were subject to similar attacks that netted fraudsters over $20 million. • We believe that these attacks threaten the very core of an entire class of cryptocurrencies, those based on the “proof-of-work” paradigm, which includes Bitcoin. • Paradoxically, the threat to this class of currencies has been exacerbated by their very success; namely, their integration into mainstream financial institutional frameworks. Bitcoin and other cryptocurrencies that are based on As of this writing, such an attack is underway what is known as a “proof-of-work” paradigm1 represent against the Ethereum Classic cryptocurrency. This isn’t a valuable technological advancement. Their underlying the first currency to fall victim. In 2018, malicious agents methodology allows for the maintenance of a provably successfully attacked several other cryptocurrencies in correct public ledger of transactions without the need this manner, pocketing over $20 million in the process for a central, trusted party to maintain it. That ledger’s (Table 1). By securing majority computing power veracity, and, thus, these cryptocurrencies’ credibility, associated with a currency, the perpetrators have been depends on an inviolable condition: that no individual or able to “double-spend” coins by undoing their side of syndicate can control a majority of the computing power anonymous transactions, retaining both their coins and associated with the platform.
    [Show full text]