Sign in
Join
Cryptocurrency and blockchain
Bitcoin
Intro: Bitcoin From the Ground Up
Identity (Stage 1)
Transactions (Stage 2)
Record Keeping (Stage 3)
Demo: UTXOs
51% Attack
Consensus (Stage 4)
Part 1 Summary
Bitcoin: A Peer-to-Peer Electronic Cash System
Blockchain and Crypto part 2
Libertarian Dreams
Pre-Bitcoin
Bitcoin Precursors
Bitcoin Invention
Early Bitcoin
Bitcoin Bubble and Altcoins
Bitcoin Headlines
Scalability
Bitcoin Struggles to Scale
Ethereum Timeline
Ethereum Bubble
Choosing a Wallet
Blockchain Community and Politics
Banks and Blockchain
State of the Industry
ICOs
Industry Projects
Part 2 Summary
A Bot Named Willy: Did Mt. Gox’s Automated Trading Pump Bitcoin’s Price?
The Dao, the Hack, the Soft Fork and the Hard Fork
Part 3
Motivations and Definitions
Motivations and Definitions: Integrity of Information
Motivations and Definitions: Cryptographic Hash Functions
Key Properties of Cryptographic Hash Functions
Key Properties of Cryptographic Hash Functions: Preimage Resistance
Key Properties of Cryptographic Hash Functions: Second Preimage Resistance
Key Properties of Cryptographic Hash Functions: Collision Resistance
Key Properties of Cryptographic Hash Functions: Avalanche Effect
SHA256d
Intro: A Tamper-Evident Database
Tamper-Evidence
Dissecting a Block
Dissecting a Block: The Block Header
Merkle Trees
Merkle Trees: Tamper Detection
Merkle Trees: Proof of Inclusion
Previous Block Hash
Proof-of-Work: Partial Preimage Hash Puzzle
Proof-of-Work: Mining
Proof-of-Work: Block Difficulty
Proof-of-Work: Coinbase Transaction
Intro: Signatures and Authentication
Digital Signature Schemes
DSS Key Definitions and Takeaways
From Private Keys to Addresses
Elliptic Curve Cryptography
Elliptic Curve Cryptography: Demo
Elliptic Curve Cryptography: Security
Public Key to Public Key Hash
Public Key Hash to Address
Intro: Bitcoin Script
Remember the UTXO Model?
Contents of a Transaction
Bitcoin Script Reminders
Intro to P2PKH
Demo: P2PKH Example
Proof of Burn
P2PKH vs P2SH
How P2SH Works
Why use P2SH?
Multisignature
Timelocks
Part 3 Summary
Where is Double hashing performed in Bitcoin?
Bitcoin Wallets Explained: How to Choose the Best Wallet for You
Tech explained: Hash puzzles and proofs of work
Part 4
Intro: Types of Users
Key Components
Intro: Wallets
Purpose of a Wallet
Types of Wallets
Types of Wallets: Hot and Cold
Types of Wallets: Hot Wallets
Types of Wallets: Cold Wallets
Key Stretching
Choosing a Wallet
Bitcoin ATMs
Exchanges
Intro: Wallet Mechanics
Simple Payment Verification
Multisignature
Key Generation Best Practices
JBOK Wallets
HD Wallets
Intro: Mining
Recipe for Mining: Overview
Recipe for Mining: Step 0
Recipe for Mining: Step 1
Recipe for Mining: Step 2
Recipe for Mining: Step 3
Recipe for Mining: Step 4
Recipe for Mining: Step 5
Text: Recipe for Mining
Mining Incentives: Intro
Mining Incentives: Block Reward
Mining Incentives: Transaction Fees
Mining Costs: Fixed Costs
Types of Hardware
Mining Costs: Operating Costs
Intro: Real World Mining
ASICs
Mining Pools
Mining Pool Schemes
Mining Pool Pros and Cons
Mining Pool Stats
Types of Miners
Supplement: Lightweight Mining
Intro: Bitcoin Governance
Ensuring Decentralization
Ensuring Decentralization: ASIC Resistance
Ensuring Decentralization: ASIC Debate
Eliminating Waste
Consensus Updates: Bitcoin Core
Consensus Updates: Forks
Consensus Updates: BIPs
Text: Part 4 Summary
Mining Bitcoin with pencil and paper: 0.67 hashes per day
ViaBTC Rises: How A Mysterious Miner Could Decide Bitcoin’s Future
Antbleed: Bitcoin’s Newest New Controversy Explained
Part 5
Intro: Pool Strategies
Pool Reward Scheme Review
Pool Hopping
Pool Cannibalization
Nash Equilibrium and the Tragedy of the Commons
Supplement: Game Theory
Intro: Double Spending
Race Attack
Defense: Confirmations
Demo: Confirmations
Probability Analysis
Goldfinger Attack
Intro: Censorship Attacks
Censorship Attacks: Naive Censorship
Censorship Attacks: Punitive Forking
Censorship Attacks: Feather Forking
Intro: Selfish Mining
Selfish Mining Attacks
Intro: Defenses
Block Validation
Fork Publishment
Uniform Tie Breaking
Publish or Perish: Overview
Publish or Perish: Overview
Publish or Perish: Analysis
The Bitcoin Network
Text: Part 5 Summary
SELFISH MINING: A 25 ATTACK AGAINST THE BITCOIN NETWORK
Part 6
Intro: Smart Contracts
Bitcoin Review
Smart Contracts Overview
Intro: Ethereum
High Level Overview
Ethereum vs. Bitcoin
Ethereum Features
Intro: Ethereum Virtual Machine
Understanding the Ethereum Virtual Machine
Ethereum Virtual Machine: Overview
Ethereum Conclusions
Intro: Ethereum Use Cases
Basic Use Cases: Smart Assets
Basic Use Cases: Multisig
Basic Use Cases: Proof of Existence
Advanced Use Cases: Land Titles
Advanced Use Cases: Prediction Markets
Advanced Use Cases: Supply Chain
Advanced Use Cases: Smart Energy Grids
Advanced Use Cases: After Hours Trading
Blockchain vs. Internet
Blockchain Generalizations: Part 1
Blockchain Generalizations: Part 2
Blockchain Generalizations: Part 3
Supplement: Use Cases
Blockchain Use Cases Takeaways
Intro: Ethereum Ecosystem
Community Leaders
Ethereum Research
Text: Part 6 Summary
Articles List
Cryptocurrency and blockchain
Economy
Growth and GDP
GDP per capita
Inflation
Boom or recession?
The GDP indicator
GDP – detailed
GDP – international
Real GDP
GDI
The economy – The barometer indicator
Purchasing Managers’ Index – PMI
Forecasts about the economy
Fintech
Tax planning
Courses
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Create an account
Sign up
Welcome!
Register for an account
your email
your username
A password will be e-mailed to you.
Password recovery
Recover your password
your email
Search
My account
Get into your account.
Login
Register
News
Hub
About NewsHub
Contact Us
Privacy Policy
Terms of Use
Premium Content
Read our exclusive articles
Facebook
Instagram
Twitter
Cryptocurrency and blockchain
Bitcoin
Blockchain and Crypto part 2
Part 3
Part 4
Part 5
Part 6
Economy
Growth and GDP
Fintech
Tax planning
Courses
23.4
C
New York
Search
My account
Get into your account.
Login
Register
News
Hub
About NewsHub
Contact Us
Privacy Policy
Terms of Use
Premium Content
Read our exclusive articles
Facebook
Instagram
Twitter
Cryptocurrency and blockchain
Bitcoin
Intro: Bitcoin From the Ground Up
Identity (Stage 1)
Transactions (Stage 2)
Record Keeping (Stage 3)
Demo: UTXOs
51% Attack
Consensus (Stage 4)
Part 1 Summary
Bitcoin: A Peer-to-Peer Electronic Cash System
Blockchain and Crypto part 2
Libertarian Dreams
Pre-Bitcoin
Bitcoin Precursors
Bitcoin Invention
Early Bitcoin
Bitcoin Bubble and Altcoins
Bitcoin Headlines
Scalability
Bitcoin Struggles to Scale
Ethereum Timeline
Ethereum Bubble
Choosing a Wallet
Blockchain Community and Politics
Banks and Blockchain
State of the Industry
ICOs
Industry Projects
Part 2 Summary
A Bot Named Willy: Did Mt. Gox’s Automated Trading Pump Bitcoin’s Price?
The Dao, the Hack, the Soft Fork and the Hard Fork
Part 3
Motivations and Definitions
Motivations and Definitions: Integrity of Information
Motivations and Definitions: Cryptographic Hash Functions
Key Properties of Cryptographic Hash Functions
Key Properties of Cryptographic Hash Functions: Preimage Resistance
Key Properties of Cryptographic Hash Functions: Second Preimage Resistance
Key Properties of Cryptographic Hash Functions: Collision Resistance
Key Properties of Cryptographic Hash Functions: Avalanche Effect
SHA256d
Intro: A Tamper-Evident Database
Tamper-Evidence
Dissecting a Block
Dissecting a Block: The Block Header
Merkle Trees
Merkle Trees: Tamper Detection
Merkle Trees: Proof of Inclusion
Previous Block Hash
Proof-of-Work: Partial Preimage Hash Puzzle
Proof-of-Work: Mining
Proof-of-Work: Block Difficulty
Proof-of-Work: Coinbase Transaction
Intro: Signatures and Authentication
Digital Signature Schemes
DSS Key Definitions and Takeaways
From Private Keys to Addresses
Elliptic Curve Cryptography
Elliptic Curve Cryptography: Demo
Elliptic Curve Cryptography: Security
Public Key to Public Key Hash
Public Key Hash to Address
Intro: Bitcoin Script
Remember the UTXO Model?
Contents of a Transaction
Bitcoin Script Reminders
Intro to P2PKH
Demo: P2PKH Example
Proof of Burn
P2PKH vs P2SH
How P2SH Works
Why use P2SH?
Multisignature
Timelocks
Part 3 Summary
Where is Double hashing performed in Bitcoin?
Bitcoin Wallets Explained: How to Choose the Best Wallet for You
Tech explained: Hash puzzles and proofs of work
Part 4
Intro: Types of Users
Key Components
Intro: Wallets
Purpose of a Wallet
Types of Wallets
Types of Wallets: Hot and Cold
Types of Wallets: Hot Wallets
Types of Wallets: Cold Wallets
Key Stretching
Choosing a Wallet
Bitcoin ATMs
Exchanges
Intro: Wallet Mechanics
Simple Payment Verification
Multisignature
Key Generation Best Practices
JBOK Wallets
HD Wallets
Intro: Mining
Recipe for Mining: Overview
Recipe for Mining: Step 0
Recipe for Mining: Step 1
Recipe for Mining: Step 2
Recipe for Mining: Step 3
Recipe for Mining: Step 4
Recipe for Mining: Step 5
Text: Recipe for Mining
Mining Incentives: Intro
Mining Incentives: Block Reward
Mining Incentives: Transaction Fees
Mining Costs: Fixed Costs
Types of Hardware
Mining Costs: Operating Costs
Intro: Real World Mining
ASICs
Mining Pools
Mining Pool Schemes
Mining Pool Pros and Cons
Mining Pool Stats
Types of Miners
Supplement: Lightweight Mining
Intro: Bitcoin Governance
Ensuring Decentralization
Ensuring Decentralization: ASIC Resistance
Ensuring Decentralization: ASIC Debate
Eliminating Waste
Consensus Updates: Bitcoin Core
Consensus Updates: Forks
Consensus Updates: BIPs
Text: Part 4 Summary
Mining Bitcoin with pencil and paper: 0.67 hashes per day
ViaBTC Rises: How A Mysterious Miner Could Decide Bitcoin’s Future
Antbleed: Bitcoin’s Newest New Controversy Explained
Part 5
Intro: Pool Strategies
Pool Reward Scheme Review
Pool Hopping
Pool Cannibalization
Nash Equilibrium and the Tragedy of the Commons
Supplement: Game Theory
Intro: Double Spending
Race Attack
Defense: Confirmations
Demo: Confirmations
Probability Analysis
Goldfinger Attack
Intro: Censorship Attacks
Censorship Attacks: Naive Censorship
Censorship Attacks: Punitive Forking
Censorship Attacks: Feather Forking
Intro: Selfish Mining
Selfish Mining Attacks
Intro: Defenses
Block Validation
Fork Publishment
Uniform Tie Breaking
Publish or Perish: Overview
Publish or Perish: Overview
Publish or Perish: Analysis
The Bitcoin Network
Text: Part 5 Summary
SELFISH MINING: A 25 ATTACK AGAINST THE BITCOIN NETWORK
Part 6
Intro: Smart Contracts
Bitcoin Review
Smart Contracts Overview
Intro: Ethereum
High Level Overview
Ethereum vs. Bitcoin
Ethereum Features
Intro: Ethereum Virtual Machine
Understanding the Ethereum Virtual Machine
Ethereum Virtual Machine: Overview
Ethereum Conclusions
Intro: Ethereum Use Cases
Basic Use Cases: Smart Assets
Basic Use Cases: Multisig
Basic Use Cases: Proof of Existence
Advanced Use Cases: Land Titles
Advanced Use Cases: Prediction Markets
Advanced Use Cases: Supply Chain
Advanced Use Cases: Smart Energy Grids
Advanced Use Cases: After Hours Trading
Blockchain vs. Internet
Blockchain Generalizations: Part 1
Blockchain Generalizations: Part 2
Blockchain Generalizations: Part 3
Supplement: Use Cases
Blockchain Use Cases Takeaways
Intro: Ethereum Ecosystem
Community Leaders
Ethereum Research
Text: Part 6 Summary
Articles List
Cryptocurrency and blockchain
Economy
Growth and GDP
GDP per capita
Inflation
Boom or recession?
The GDP indicator
GDP – detailed
GDP – international
Real GDP
GDI
The economy – The barometer indicator
Purchasing Managers’ Index – PMI
Forecasts about the economy
Fintech
Tax planning
Courses
Tag:
crypto
Cryptocurrency Trading – What is it and how does it work?
Cryptocurrency and blockchain
September 12, 2022
fintechter bitcoin
The Bitcoin price’s super weekend – has risen over 15 percent since Friday
Cryptocurrency and blockchain
September 11, 2022
The Bitcoin price's super weekend - has risen over 15 percent since Friday
Breaking News
Cryptocurrency Trading – What is it and how does it work?
The Bitcoin price’s super weekend – has risen over 15 percent since Friday
Bitcoin price again above 20,000 dollars – may be due to weakened dollar
Read our courses: learn the basics of Cryptocurrency, economics, finance, investments and fintech with our simple courses
How can I optimize my tax for cryptocurrency?
Recent articles
Cryptocurrency Trading – What is it and how does it work?
Cryptocurrency and blockchain
September 12, 2022
The Bitcoin price’s super weekend – has risen over 15 percent since Friday
Cryptocurrency and blockchain
September 11, 2022
Bitcoin price again above 20,000 dollars – may be due to weakened dollar
Cryptocurrency and blockchain
September 11, 2022
Read our courses: learn the basics of Cryptocurrency, economics, finance, investments and fintech with our simple courses
Tax planning
September 11, 2022
How can I optimize my tax for cryptocurrency?
Tax planning
September 11, 2022
Cryptocurrencies still a “tax haven”
Tax planning
September 11, 2022