CRYPTOGRAPHIC HASH FUNCTION - AML - DOUBLE SPENDING - SMART CONTRACTS - PAPER WALLET - BITCOIN TRANSACTION - TESTNET - HYBRID POS/POW - PUBLIC ADDRESS - BLOCK HEIGHT -

in #money7 years ago


CRYPTOGRAPHIC HASH FUNCTION unlike private keys, they act as email addresses that can be published anywhere. a public address is the cryptographic hash of a public key.
AML this causes coins spent that are already spent somewhere else, making one of the receivers end up with nothing. a common flaw in some cryptocurrency blockchains where the system of rules is not in motion properly, allowing malicious users to try and spend their unique codes in multiple places.
DOUBLE SPENDING aml mechanisms can be legal or technical in nature. regulators frequently apply aml techniques to bitcoin exchanges. anti-money laundering techniques are used to stop people converting illegally obtained funds, to appear as though they have been earned legally.
SMART CONTRACTS a number that represents how many blocks are connected on the blockchain.
PAPER WALLET the sha-256 computational algorithm is an example of a cryptographic hash. cryptographic hashes produce a fixed-size and unique hash value from variable-size transaction input.
BITCOIN TRANSACTION used by developers, it's a test blockchain to prevent expending assets on the main chain.
TESTNET in this method, a balance between miners and voters (holders) may be achieved, creating a system of community-based governance by both insiders (holders) and outsiders (miners). a hybrid pos/pow allows for both proof of stake and proof of work as consensus distribution algorithms on the network.
HYBRID POS/POW smart contracts encode business rules ( that are enforced by the participants of the network) in a programmable language onto the blockchain.
PUBLIC ADDRESS all traces of the key are removed from the computer where it was generated. a form of cold storage where a private key for bitcoin address is printed on a piece of paper (with or without encryption).
BLOCK HEIGHT as long as a transaction is unconfirmed, it is pending and can be forged. the transaction is known almost immediately by the whole network. after signed, a transaction is broadcasted in the network, sent from one peer to every other peer. only after a specific amount of time the transaction gets confirmed. when a transaction is confirmed, it is set in stone. a transaction is a file that says, “user_a gives x bitcoin to user_b“ and is signed by user_a‘s private key.
Source + Source


CRYPTOGRAPHIC HASH FUNCTION the sha-256 computational algorithm is an example of a cryptographic hash. cryptographic hashes produce a fixed-size and unique hash value from variable-size transaction input.
AML aml mechanisms can be legal or technical in nature. regulators frequently apply aml techniques to bitcoin exchanges. anti-money laundering techniques are used to stop people converting illegally obtained funds, to appear as though they have been earned legally.
DOUBLE SPENDING this causes coins spent that are already spent somewhere else, making one of the receivers end up with nothing. a common flaw in some cryptocurrency blockchains where the system of rules is not in motion properly, allowing malicious users to try and spend their unique codes in multiple places.
SMART CONTRACTS smart contracts encode business rules ( that are enforced by the participants of the network) in a programmable language onto the blockchain.
PAPER WALLET all traces of the key are removed from the computer where it was generated. a form of cold storage where a private key for bitcoin address is printed on a piece of paper (with or without encryption).
BITCOIN TRANSACTION as long as a transaction is unconfirmed, it is pending and can be forged. the transaction is known almost immediately by the whole network. after signed, a transaction is broadcasted in the network, sent from one peer to every other peer. only after a specific amount of time the transaction gets confirmed. when a transaction is confirmed, it is set in stone. a transaction is a file that says, “user_a gives x bitcoin to user_b“ and is signed by user_a‘s private key.
TESTNET used by developers, it's a test blockchain to prevent expending assets on the main chain.
HYBRID POS/POW in this method, a balance between miners and voters (holders) may be achieved, creating a system of community-based governance by both insiders (holders) and outsiders (miners). a hybrid pos/pow allows for both proof of stake and proof of work as consensus distribution algorithms on the network.
PUBLIC ADDRESS unlike private keys, they act as email addresses that can be published anywhere. a public address is the cryptographic hash of a public key.
BLOCK HEIGHT a number that represents how many blocks are connected on the blockchain.
Source + Source

Latest posts from our Team !



Note for @steemcleaners / @cheetah:

The agreement of our Team:
The following authors decided to create a Team in order to collaborate and share formats and content in our posts. Any copy of content between this Team does not constitute a plagiarism.

@realskilled @matthew.davis @ali.wood @rspower @megan.brown @rstracer @rssniper

Coin Marketplace

STEEM 0.17
TRX 0.15
JST 0.028
BTC 56552.34
ETH 2332.65
USDT 1.00
SBD 2.35