Ethereum Classic Documentation Release 0.1

Total Page:16

File Type:pdf, Size:1020Kb

Ethereum Classic Documentation Release 0.1 Ethereum Classic Documentation Release 0.1 Ethereum classic community July 31, 2016 Contents 1 Contents 3 1.1 Introduction.............................................3 1.1.1 What is Ethereum?.....................................3 A next generation blockchain................................3 Ethereum Virtual Machine..................................3 How does Ethereum work?..................................4 1.1.2 How to use this guide?...................................6 Using Ethereum: The Basics.................................6 1.1.3 The Classic ‘Release’....................................6 Motivation..........................................6 Goals.............................................6 A Crypto-Decentralist Manifesto...............................6 1.1.4 Web 3: A platform for decentralized apps.........................7 Smart contracts........................................8 DAO.............................................8 1.1.5 History of Ethereum....................................8 Inception...........................................8 The Ethereum Foundation and the ether presale.......................9 ETH/DEV and Ethereum development............................9 The Ethereum Frontier launch................................ 10 1.1.6 Community......................................... 11 Reddit............................................. 11 Ethereum Classic Wiki.................................... 11 Telegram........................................... 12 Slack............................................. 12 Ethereum Improvement Proposals (EIPs).......................... 12 Chinese Community..................................... 12 Russian Community..................................... 12 Indonesian Community.................................... 12 Gitter Rooms (old)...................................... 12 Stack Exchange (old)..................................... 13 Obsolete........................................... 13 1.1.7 The Ethereum Foundation................................. 13 Ethereum Foundation’s faces to the community....................... 14 1.1.8 Contributors......................................... 14 1.2 Ethereum Clients........................................... 17 1.2.1 Choosing a client...................................... 17 Why are there multiple Ethereum clients?.......................... 17 1.2.2 Installing a Client...................................... 17 What should I install on my desktop/laptop?......................... 17 What should I install on my mobile/tablet?......................... 18 What should I install on my SBC?.............................. 18 i 1.2.3 cpp-ethereum........................................ 19 Quick Start.......................................... 19 Details............................................ 20 1.2.4 go-ethereum......................................... 42 1.2.5 pyethapp.......................................... 42 1.2.6 ethereumjs-lib........................................ 43 1.2.7 Ethereum(J)......................................... 43 1.2.8 ethereumH......................................... 43 1.2.9 Parity............................................ 44 1.2.10 ruby-ethereum........................................ 44 1.3 Account Management........................................ 44 1.3.1 Accounts.......................................... 44 1.3.2 Keyfiles........................................... 45 1.3.3 Creating an account..................................... 45 Using geth account new ................................ 45 Using geth console...................................... 46 Using Mist Ethereum wallet................................. 47 Creating a Multi-Signature Wallet in Mist.......................... 48 Using Eth........................................... 49 Using EthKey (deprecated).................................. 50 1.3.4 Importing your presale wallet................................ 51 Using Mist Ethereum wallet................................. 51 Using geth.......................................... 52 1.3.5 Updating an account.................................... 52 Using geth.......................................... 52 1.3.6 Backup and restore accounts................................ 52 Manual backup/restore.................................... 52 Importing an unencrypted private key............................ 53 1.4 Ether................................................. 53 1.4.1 What is ether?........................................ 53 Denominations........................................ 53 1.4.2 Ether supply......................................... 54 1.4.3 Getting ether........................................ 54 Trustless services....................................... 54 List of centralised exchange marketplaces.......................... 55 Centralised fixed rate exchanges............................... 55 Trading and price analytics.................................. 55 1.4.4 Online wallets, paper wallets, and cold storage....................... 55 1.4.5 Sending ether........................................ 56 1.4.6 Gas and ether........................................ 57 1.5 The Ethereum network........................................ 57 1.5.1 Connecting to the Network................................. 57 The Ethereum network.................................... 57 How to connect........................................ 58 Download the blockchain faster............................... 59 Static Nodes, Trusted Nodes, and Boot Nodes........................ 60 1.5.2 Test Networks........................................ 61 Morden testnet........................................ 61 1.5.3 Setting up a local private testnet.............................. 61 eth (C++ client)........................................ 61 geth (Go client)........................................ 62 1.6 Mining................................................ 64 1.6.1 Introduction......................................... 64 What is mining?....................................... 65 Mining rewards........................................ 65 Ethash DAG......................................... 66 1.6.2 The algorithm........................................ 66 1.6.3 CPU mining......................................... 67 ii Using geth.......................................... 67 1.6.4 GPU mining......................................... 68 Hardware........................................... 68 Ubuntu Linux set-up..................................... 68 Mac set-up.......................................... 69 Windows set-up........................................ 69 Using ethminer with geth................................... 70 Using ethminer with eth................................... 70 1.6.5 Pool mining......................................... 72 Mining pools......................................... 72 1.6.6 Mining resources...................................... 72 POS vs POW......................................... 73 1.7 Contracts and Transactions...................................... 73 1.7.1 Account Types, Gas, and Transactions........................... 73 EOA vs contract accounts.................................. 73 What is a transaction?.................................... 74 What is a message?...................................... 74 What is gas?......................................... 74 Estimating transaction costs................................. 75 Account interactions example - betting contract....................... 76 Signing transactions offline.................................. 78 1.7.2 Contracts.......................................... 79 What is a contract?...................................... 79 Ethereum high level languages................................ 79 Writing a contract...................................... 80 Compiling a contract..................................... 80 Create and deploy a contract................................. 82 Interacting with a contract.................................. 83 Contract metadata...................................... 83 Testing contracts and transactions.............................. 84 1.7.3 Accessing Contracts and Transactions........................... 85 RPC.............................................. 85 Conventions......................................... 85 Deploy contract........................................ 85 Interacting with smart contracts............................... 87 Web3.js............................................ 88 Console............................................ 88 Viewing Contracts and Transactions............................. 89 1.7.4 Mix............................................. 89 Project Editor......................................... 89 Scenarios Editor....................................... 90 State Viewer......................................... 91 Transaction Explorer..................................... 92 JavaScript console...................................... 93 Transaction debugger..................................... 94 Dapps deployment...................................... 94 Code Editor.......................................... 95 1.7.5 Dapps............................................ 95 Dapp directories....................................... 95 Dapp browsers........................................ 96 1.7.6 Developer Tools....................................... 96 Dapp development resources................................. 96 Mix-IDE........................................... 97 IDEs/Frameworks...................................... 97 Ethereum-console.....................................
Recommended publications
  • Peer Co-Movement in Crypto Markets
    Peer Co-Movement in Crypto Markets G. Schwenkler and H. Zheng∗ February 4, 2021y Abstract We show that peer linkages induce significant price co-movement in crypto markets in excess of common risk factors and correlated demand shocks. When large abnormal return shocks hit one crypto, its peers experience unusually large abnormal returns of the opposite sign. These effects are primarily concentrated among smaller peers and revert after several weeks, resulting in predictable returns. We develop trading strategies that exploit this rever- sal, and show that they are profitable even after accounting for trading fees and frictions. We establish our results by identifying crypto peers through co-mentions in online news using novel natural language processing technologies. Keywords: Cryptocurrencies, peers, co-movement, competition, natural language pro- cessing. JEL codes: G12, G14, C82. ∗Schwenkler is at the Department of Finance, Santa Clara University Leavey School of Business. Zheng is at the Department of Finance, Boston University Questrom School of Business. Schwenkler is corresponding author. Email: [email protected], web: http://www.gustavo-schwenkler.com. yThis is a revision of a previous paper by the two authors called \Competition or Contagion: Evidence from Cryptocurrency Markets." We are grateful to Jawad Addoum (discussant), Daniele Bianchi (discussant), Will Cong, Tony Cookson, Sanjiv Das, Seoyoung Kim, Andreas Neuhierl, Farzad Saidi, and Antoinette Schoar, seminar participants at Boston University and the Society for Financial Econometrics, and the participants at the 2020 Finance in the Cloud III Virtual Conference, the 2020 MFA Annual Meeting, the 3rd UWA Blockchain, Cryptocurrency and FinTech Conference, and the 2020 INFORMS Annual Meeting for useful comments and suggestions.
    [Show full text]
  • CASP) Software-Only, Ledger Agnostic, Platform Agnostic, Crypto Agile Bank-Grade Security for Crypto Assets
    Protect Your Crypto Assets with Unbound’s Crypto Assets Security Platform (CASP) Software-Only, Ledger Agnostic, Platform Agnostic, Crypto Agile Bank-Grade Security for Crypto Assets Mathematically proven security Cryptography is one of the foundational security elements used by guarantee – the key material never organizations to protect sensitive data, transactions, services and identities. exists in the clear throughout its At the core of any cryptography implementation is the management of lifecycle including creation, in-use cryptographic keys and their protection from compromise and misuse. and at-rest With crypto assets, the protection of private keys is top priority, since the Any currency, any ledger, any private key is used to sign each transaction. It is therefore mandatory platform, any client to keep the key secure – not only from compromise, but also from any Programmatically derived malicious usage – as it takes only one fraudulent transaction (i.e. a single sign addresses (BIP 32/44) that are operation, to empty a wallet). cryptographically protected Backed by proven mathematical guarantees of security, Unbound’s Crypto Stronger and more flexible than Asset Security Platform (CASP) provides its customers with a software-only multi-signature – ledger-agnostic support of flexible quorum security platform that is as safe as hardware. With CASP, one can fully manage structures, any number of human the keys’ lifecycle, define cryptographically-based approval policies, while and/or servers, internal and supporting any currency, any ledger, any platform and any client type. external, that are required to sign a transaction Any Currency, Any Ledger, Any Platform Infinite scalability – easily scale capacity when and where it is Traditionally, securing the keys and secrets that guard the organizations’ most needed valuable assets required the use of dedicated hardware, such as hardware Intuitive and easy to use SDK – security modules (HSMs) and smartcards.
    [Show full text]
  • Blockchain – Operator Opportunities Version 1.0 July 2018
    Blockchain – Operator Opportunities Version 1.0 July 2018 About the GSMA The GSMA represents the interests of mobile operators worldwide, uniting more than 750 operators with over 350 companies in the broader mobile ecosystem, including handset and device makers, software companies, equipment providers and internet companies, as well as organisations in adjacent industry sectors. The GSMA also produces the industry-leading MWC events held annually in Barcelona, Los Angeles and Shanghai, as well as the Mobile 360 Series of regional conferences. For more information, please visit the GSMA corporate website at www.gsma.com. Follow the GSMA on Twitter: @GSMA. About the GSMA Internet Group The GSMA Internet Group (IG) is the key working group which researches, analyses and measures the potential opportunities and impacts of new web and internet technologies on mobile operator networks and platforms. We maintain the most up-to-date knowledge base of new internet and web innovations through intelligence gathering of available global research and active participation in key Standards organisations. www.gsma.com/workinggroups Authors: Peter Ajn Vanleeuwen, KPN Douwe van de Ruit, KPN Contributors: Dan Druta, AT&T Axel Nennker, Deutsche Telecom Shamit Bhat, GSMA Rinze Cats, KPN Kaissar Jabr, Monty Holding Page 2 of 36 Table of Contents Blockchain – Operator Opportunities ............................................................................ 1 Version 1.0 ...............................................................................................................................
    [Show full text]
  • Implementation of Smart Contracts for Blockchain Based Iot Applications
    Implementation of smart contracts for blockchain based IoT applications Georgios Papadodimas, Georgios Palaiokrasas, Antoniοs Litke, Theodora Varvarigou Electrical and Computer Engineering Department National Technical University of Athens Athens, Greece [email protected], [email protected], [email protected], [email protected] Abstract—An increasing number of people, organizations [11], funding mechanisms [12] and many more. A milestone and corporations are expressing their interest in the for the course of blockchain technology was the development decentralization technology of the blockchain. The creation of of Ethereum project, offering new solutions by enabling smart the blockchain marks the time when we start building contracts’ implementation and execution. The Ethereum distributed peer-to-peer networks consisting of non-trusting blockchain is a Turing complete platform for executing smart members that interact with each other without a trusted contracts [13], [14], and not just a ledger serving financial intermediary but in a verifiable manner. In this paper, we transactions. It is a suite of tools and protocols for the creation propose a decentralized application (DApp) based on and operation of Decentralized Applications (DApps), blockchain technology for sharing Internet of Things (IoT) “applications that run exactly as programmed without any sensors’ data, and demonstrate various challenges addressed possibility of downtime, censorship, fraud or third-party during the development process. This application combines blockchain technology with IoT and operates through smart interference”. It also supports a contract-oriented, high-level, contracts that are executed on the Ethereum blockchain. More Turing-complete programming language [15], allowing specifically the application is a platform for sharing (buying and anyone to write smart contracts and create DApps.
    [Show full text]
  • Linking Wallets and Deanonymizing Transactions in the Ripple Network
    Proceedings on Privacy Enhancing Technologies ; 2016 (4):436–453 Pedro Moreno-Sanchez*, Muhammad Bilal Zafar, and Aniket Kate* Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network Abstract: The decentralized I owe you (IOU) transac- 1 Introduction tion network Ripple is gaining prominence as a fast, low- cost and efficient method for performing same and cross- In recent years, we have observed a rather unexpected currency payments. Ripple keeps track of IOU credit its growth of IOU transaction networks such as Ripple [36, users have granted to their business partners or friends, 40]. Its pseudonymous nature, ability to perform multi- and settles transactions between two connected Ripple currency transactions across the globe in a matter of wallets by appropriately changing credit values on the seconds, and potential to monetize everything [15] re- connecting paths. Similar to cryptocurrencies such as gardless of jurisdiction have been pivotal to their suc- Bitcoin, while the ownership of the wallets is implicitly cess so far. In a transaction network [54, 55, 59] such as pseudonymous in Ripple, IOU credit links and transac- Ripple [10], users express trust in each other in terms tion flows between wallets are publicly available in an on- of I Owe You (IOU) credit they are willing to extend line ledger. In this paper, we present the first thorough each other. This online approach allows transactions in study that analyzes this globally visible log and charac- fiat money, cryptocurrencies (e.g., bitcoin1) and user- terizes the privacy issues with the current Ripple net- defined currencies, and improves on some of the cur- work.
    [Show full text]
  • User Manual Ledger Nano S
    User Manual Ledger Nano S Version control 4 Check if device is genuine 6 Buy from an official Ledger reseller 6 Check the box contents 6 Check the Recovery sheet came blank 7 Check the device is not preconfigured 8 Check authenticity with Ledger applications 9 Summary 9 Learn more 9 Initialize your device 10 Before you start 10 Start initialization 10 Choose a PIN code 10 Save your recovery phrase 11 Next steps 11 Update the Ledger Nano S firmware 12 Before you start 12 Step by step instructions 12 Restore a configuration 18 Before you start 19 Start restoration 19 Choose a PIN code 19 Enter recovery phrase 20 If your recovery phrase is not valid 20 Next steps 21 Optimize your account security 21 Secure your PIN code 21 Secure your 24-word recovery phrase 21 Learn more 22 Discover our security layers 22 Send and receive crypto assets 24 List of supported applications 26 Applications on your Nano S 26 Ledger Applications on your computer 27 Third-Party applications on your computer 27 If a transaction has two outputs 29 Receive mining proceeds 29 Receiving a large amount of small transactions is troublesome 29 In case you received a large amount of small payments 30 Prevent problems by batching small transactions 30 Set up and use Electrum 30 Set up your device with EtherDelta 34 Connect with Radar Relay 36 Check the firmware version 37 A new Ledger Nano S 37 A Ledger Nano S in use 38 Update the firmware 38 Change the PIN code 39 Hide accounts with a passphrase 40 Advanced Passphrase options 42 How to best use the passphrase feature 43
    [Show full text]
  • Versus Decentralized Prediction Markets for Financial Assets
    Wolfgang Pacher Centralized- versus Decentralized Prediction Markets for Financial Assets Are blockchain-based prediction market applications simply the better solution to forecasting financial assets? MASTER THESIS submitted in fulfilment of the requirements for the degree of Master of Science Programme: Master's programme Applied Business Administration Branch of study: General Management Alpen-Adria-Universität Klagenfurt Evaluator Assoc.Prof.Mag.Dr. Alexander Brauneis Alpen-Adria-Universität Klagenfurt Institut für Finanzmanagement Klagenfurt, May 2019 Affidavit I hereby declare in lieu of an oath that - the submitted academic paper is entirely my own work and that no auxiliary materials have been used other than those indicated, - I have fully disclosed all assistance received from third parties during the process of writing the thesis, including any significant advice from supervisors, - any contents taken from the works of third parties or my own works that have been included either literally or in spirit have been appropriately marked and the respective source of the information has been clearly identified with precise bibliographical references (e.g. in footnotes), - to date, I have not submitted this paper to an examining authority either in Austria or abroad and that - when passing on copies of the academic thesis (e.g. in bound, printed or digital form), I will ensure that each copy is fully consistent with the submitted digital version. I understand that the digital version of the academic thesis submitted will be used for the purpose of conducting a plagiarism assessment. I am aware that a declaration contrary to the facts will have legal consequences. Wolfgang Pacher m.p.
    [Show full text]
  • Blockchain Interoperability (Part 3) Polkadot
    December 2020 Blockchain Interoperability (Part 3) Polkadot The Digital Investor Redefining Finance for the New Economy The Digital Investor January 2021 Table of Contents Abstract 2 1. Introduction 3 2. The foundation of Web 3.0 3 3. Architecture 4 4. Consensus mechanism 4 5. Stakeholders 5 6. Economics 5 7. Valuation 7 8. Conclusion 9 Abstract Polkadot is a promising project that should interest investors. First, interoperability increas- es digital asset utilisation, and Polkadot offers all the broadest type of interoperability. The success of DeFi, as a specific interoperability application, shows the potential of these types of solutions. Second, Polkadot and its framework Substrate democratise blockchain Authors development. We expect developers to use this platform to populate the ecosystem with new applications. Both these points together are likely to help Polkadot achieve higher Yves Longchamp network effect. Head of Research SEBA Bank AG Saurabh Deshpande Research Analyst B&B Analytics Private Limited Contact [email protected] 2 Blockchain Interoperability (Part 3) Polkadot 1. Interoperability may take Introduction many forms. In this edition of the Digital Investor, we focus In the November 2020 Digital Investor, we introduced blockchain interoperability or block- on interoperability in a broad chains’ ability to exchange information between different ecosystems. We concluded that interoperability facilitates secure and trustless value exchange, and we expect interop- sense. Polkadot aims to erability solutions to capture value in the future. Therefore, we think that interoperability connect all types of solutions demand investor attention. blockchains and transfer all Interoperability may take many forms. In this edition of The Digital Investor, we focus on types of messages between interoperability in a broad sense.
    [Show full text]
  • Metamask Pre-Assignment
    MMS 562F: Tech Driven Transformation MetaMask Pre-Assignment Campbell R. Harvey Duke University and NBER February 2021 Setup • Metamask is a cryptocurrency wallet that is used to interface with the Ethereum-based Apps • We will be setting up this Wallet on your mobile device (iOS or Android only) – If you are unable to use a mobile device, the end of this deck has a web browser tutorial (Page 19) – If you already have MetaMask on your browser, the end of this deck has a tutorial to link your Web Account to the Mobile App (Page 25) Campbell R. Harvey 2021 2 Setup • Download the Metamask app from the App Store or Google Play Store • Click Get Started • Click Create a new wallet • Create a new account by typing in a password of your choosing and pressing “Create” • Go through the prompts to secure your wallet • Store Secret Backup Phrase in a secure location, ideally paper or a password manager – not on your phone or computer. • Type in secret backup phrase Campbell R. Harvey 2021 3 1 Using MetaMask 1. Network • This determines which Ethereum Network you are using. Click on this to see all network options in a 2 dropdown. For this class we will only discuss or use the Main Ethereum Network and the Ropsten Test Network. 3 Campbell R. Harvey 2021 4 1 Using MetaMask 1. Network • The Ethereum Mainnet is where live ether (ETH) with real value exists and is 2 used for payment and applications. I will refer to this as the “main network” or the “mainnet” 3 Campbell R.
    [Show full text]
  • PWC and Elwood
    2020 Crypto Hedge Fund Report Contents Introduction to Crypto Hedge Fund Report 3 Key Takeaways 4 Survey Data 5 Investment Data 6 Strategy Insights 6 Market Analysis 7 Assets Under Management (AuM) 8 Fund performance 9 Fees 10 Cryptocurrencies 11 Derivatives and Leverage 12 Non-Investment Data 13 Team Expertise 13 Custody and Counterparty Risk 15 Governance 16 Valuation and Fund Administration 16 Liquidity and Lock-ups 17 Legal and Regulatory 18 Tax 19 Survey Respondents 20 About PwC & Elwood 21 Introduction to Crypto Hedge Fund report In this report we provide an overview of the global crypto hedge fund landscape and offer insights into both quantitative elements (such as liquidity terms, trading of cryptocurrencies and performance) and qualitative aspects, such as best practice with respect to custody and governance. By sharing these insights with the broader crypto industry, our goal is to encourage the adoption of sound practices by market participants as the ecosystem matures. The data contained in this report comes from research that was conducted in Q1 2020 across the largest global crypto hedge funds by assets under management (AuM). This report specifically focuses on crypto hedge funds and excludes data from crypto index/tracking/passive funds and crypto venture capital funds. 3 | 2020 Crypto Hedge Fund Report Key Takeaways: Size of the Market and AuM: Performance and Fees: • We estimate that the total AuM of crypto hedge funds • The median crypto hedge fund returned +30% in 2019 (vs - globally increased to over US$2 billion in 2019 from US$1 46% in 2018). billion the previous year.
    [Show full text]
  • Review Articles
    review articles DOI:10.1145/3372115 system is designed to achieve common Software weaknesses in cryptocurrencies security goals: transaction integrity and availability in a highly distributed sys- create unique challenges in responsible tem whose participants are incentiv- revelations. ized to cooperate.38 Users interact with the cryptocurrency system via software BY RAINER BÖHME, LISA ECKEY, TYLER MOORE, “wallets” that manage the cryptograph- NEHA NARULA, TIM RUFFING, AND AVIV ZOHAR ic keys associated with the coins of the user. These wallets can reside on a local client machine or be managed by an online service provider. In these appli- cations, authenticating users and Responsible maintaining confidentiality of crypto- graphic key material are the central se- curity goals. Exchanges facilitate trade Vulnerability between cryptocurrencies and between cryptocurrencies and traditional forms of money. Wallets broadcast cryptocur- Disclosure in rency transactions to a network of nodes, which then relay transactions to miners, who in turn validate and group Cryptocurrencies them together into blocks that are ap- pended to the blockchain. Not all cryptocurrency applications revolve around payments. Some crypto- currencies, most notably Ethereum, support “smart contracts” in which general-purpose code can be executed with integrity assurances and recorded DESPITE THE FOCUS on operating in adversarial on the distributed ledger. An explosion of token systems has appeared, in environments, cryptocurrencies have suffered a litany which particular functionality is ex- of security and privacy problems. Sometimes, these pressed and run on top of a cryptocur- rency.12 Here, the promise is that busi- issues are resolved without much fanfare following ness logic can be specified in the smart a disclosure by the individual who found the hole.
    [Show full text]
  • Ethereum Introduction
    Cryptocurrencies & Security on the Blockchain Ethereum Introduction Prof. Tom Austin San José State University Some Brief Ethereum Facts • Number 2 cryptocurrency by market cap. – Not why we are studying it • Core developers – Vitalik Buterin (creator) – Gavin Wood • Block 0 mined July 30, 2015 Ethereum Prehistory: Mastercoin • Protocol layer on top of Bitcoin • Focused on financial contracts – Two-party contracts with enforced terms • October 2013: Vitalik suggested a more flexible scripting language – More limited vision – Not Turing-complete December 2013: Ethereum Proposal • The name "Ethereum" first appears in print • Transaction fees for different actions included – Computational steps paid for in ether (this concept changed later) – Once fees exhausted, processing stops • Contracts became accounts in their own right More History • Gavin Wood joins project – Designs the Ethereum Virtual Machine (EVM). – Writes "The Yellow Paper" in 2014. • Gas model changes – Miners explicitly vote on gas price. – Previous approaches allowed them to implicitly do this anyway. Account Types • Externally owned accounts (EOAs) – Equivalent to accounts in Bitcoin – Have a private key • Contract accounts – Have contract code – No private key • Cannot initiate transactions – Can react to transactions and call other contracts – Contain data Common Features with Bitcoin • Digital currency – Called ether (ETH) • Not "ethereum" – Smallest unit: wei • Proof-of-work blockchain – Ethash – designed to be ASIC-resistant – Much quicker: 14-15 second block time – Plans to move to proof-of-stake (Casper) • Peer-to-peer network Differences from Bitcoin • Turing-complete virtual machine – Almost… – Brings up a lot of security issues • Gas – Prevents denial-of-service attacks – Transactions specify • ETH earmarked for gas • gas-rate • Less conservative development culture – "Move fast and break things" – More frequent hard-forks – Expect changes Lab, Part 1 Create Ethereum MetaMask wallet.
    [Show full text]