{"id":359,"date":"2024-12-03T20:19:54","date_gmt":"2024-12-03T20:19:54","guid":{"rendered":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/__unknown__-2\/"},"modified":"2025-03-22T15:14:48","modified_gmt":"2025-03-22T15:14:48","slug":"5","status":"publish","type":"chapter","link":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/","title":{"raw":"Chapter 5 Introduction to Blockchains","rendered":"Chapter 5 Introduction to Blockchains"},"content":{"raw":"<div class=\"__UNKNOWN__\">\r\n<h2>Introduction<\/h2>\r\nhttps:\/\/youtu.be\/OkpXA0B_7rE\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Learning Objectives<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nUpon completion of this chapter, the student will be able to:\r\n<ul>\r\n \t<li>Describe 2 types of Computer Networks, Centralized Vs. Decentralized<\/li>\r\n \t<li>Describe the 3 types of Network Configurations<\/li>\r\n \t<li>Define the foundational concepts of Blockchains in Fintech<\/li>\r\n \t<li>Describe Fintech Peer-to-Peer technologies<\/li>\r\n \t<li>Define Blockchains, their purpose and how Blockchains work<\/li>\r\n \t<li>Describe Ownership and Transfer of Ownership in Blockchains<\/li>\r\n \t<li>Describe Fingerprinting the Data in a Blockchain Record<\/li>\r\n \t<li>Identify key Cryptographic technologies used in Blockchains<\/li>\r\n \t<li>Describe the role of Peers in Blockchain Networks<\/li>\r\n \t<li>Define and Describe Smart Contracts<\/li>\r\n \t<li>Define and Describe Non-Fungible Tokens<\/li>\r\n \t<li>Discuss the different types and uses of Crypto Wallets<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n[ez-toc]\r\n<h2>Blockchain<\/h2>\r\nBlockchain is a transformative technology that \u201cmanufactures\u201d the trust through a decentralized ledger (DeFi) of financial activities, meaning that no single entity controls the technology infrastructure (Cybersecurity Ventures, n.d.). Transactional data is distributed across a network of computers (in Blockchains these are called Nodes), that all have to agree through mutual consensus, that a transaction is valid before it is permanently recorded. This feature allows for transaction records to become immutable- due to advanced Cryptography they can\u2019t be altered, deleted or challenged thus allowing for transparency, security, and validity in recording transactions without the need for a central authority. Transactional data in blockchains is distributed across a network of computers (called Nodes), offering significant security advantages in the face of increasing cybercrime threats (Astra Security, n.d.).\r\n<h2 class=\"import-Normal\"><strong>Fintech in <\/strong><strong>Computer Networks<\/strong><strong> \u2013 The Basics<\/strong><\/h2>\r\n<p class=\"import-Normal\"><em>Computer Networks<\/em> in Financial Technologies are defined as two or more computers connected together. The connection can be through physical wires or through the airways by wireless communications. A computer network allows users to share files such as a Word document or Excel spreadsheets, or process transactions using applications such as Uber, Venmo, CashApp, Meta, X, and thousands of others. Networks can be as small as two laptops (or 2 mobile phones) connected wirelessly, or the largest ever built computer network known as the Internet.<\/p>\r\n\r\n<h2 class=\"import-Normal\"><strong>The Centralized<\/strong><strong> Vs. the Decentralized Networks Model<\/strong><strong>s<\/strong><\/h2>\r\n[caption id=\"\" align=\"alignleft\" width=\"444\"]<img class=\"\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/image1.png\" alt=\"Distributed computer system\" width=\"444\" height=\"330\" \/> <a href=\"https:\/\/www.researchgate.net\/figure\/Distributed-computer-system_fig1_220066154\">Distributed computer system<\/a>. Courtesy of ResearchGate. <a href=\"http:\/\/CC BY-ND 4.0\">CC BY-ND<\/a>[\/caption]\r\n\r\n&nbsp;\r\n<p class=\"import-Normal\">As shown in the figure, <em>Nodes<\/em> <em>(AKA Connected Computers)<\/em> are shown as Terminals and sometimes referred to as Client. Clients are the actual devices owned by you, me and billions of other people and business. Traditionally, and up to around the year 2000, this networking method was used by large institutions such as Banks, Governments, Universities, and large industry that owned and operated very large and very expensive computers known as mainframes. Communication was generally limited to only internal company employees that were connected to the mainframe. Key to centralization was security, and computer manufacturer dependance. All the computers connected in this \u201ccentralized\u201d fashion required that all nodes to be made by the same manufacturer. In a centralized computing model, the nodes are \u201cslaved\u201d to the central processor which decided which node can share information, when it can share its information\u00a0and to whom the information can be sent.Centralized computing models have shown significant vulnerabilities, as evidenced by a high volume of data breaches reported annually (Identity Theft Resource Center, 2023).\"<\/p>\r\n<p class=\"import-Normal\">With the explosive technology change in the 90\u2019s and massive adoption of Personal Computing (PC), industry began moving to full independence from the single computer manufacturer. Prior to the 90\u2019s <em>i<\/em><em>nteroperability<\/em> was a major issue<em>. Interoperability<\/em> <em>issues<\/em> meant that manufacturer A computers could not use equipment made by, nor it could communicate with manufacturer B equipment. Personal Computing also brought along Home Computing, giving rise to work-from-home and remote connectivity. Two key enabling technologies were behind this rise. Firstly, the development of \u201cdecentralized\u201d technologies, and secondly the Internet with its open communication standards.<\/p>\r\n\r\n\r\n[caption id=\"attachment_664\" align=\"alignleft\" width=\"300\"]<img class=\"wp-image-664 size-medium\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/Mainframe-Architecture-1-300x263.png\" alt=\"Mainframe architecture. \" width=\"300\" height=\"263\" \/> <a href=\"https:\/\/www.researchgate.net\/figure\/Mainframe-Architecture_fig2_275405572\">Mainframe Architecture<\/a> Courtesy of ResearchGate. <a href=\"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/\">CC BY-ND<\/a>[\/caption]\r\n<p class=\"import-Normal\">Decentralization freed client computers (nodes) from having to go through a central computer to process its transactions. Any computer device, from any manufacturer (full interoperability) can connect with any other manufacturer\u2019s devices.<\/p>\r\n\r\n<h2 class=\"import-Normal\"><strong>Network <\/strong><strong>Configuration<\/strong><strong>s<\/strong><strong> (Topology)<\/strong><\/h2>\r\nEssentially, there are 3 types of configurations that we call <em>Topologies <\/em><em>of networks<\/em> with many variations on the theme<i>. <\/i><em>Local Area Networks (LAN):<\/em>\r\n\r\nA local area network, is a single set of connected computers located within a single geography (a school campus, or an industrial complex, or an office building). A variation on local, is a single company that has several remote sites (for example HCC has different campuses, in different geographical locations, is still called a Local Area Network, although we use the term as Metropolitan Area Network (MAN). The term \u201clocal\u201d in this instance signifies the singularity of ownership of the network. Your home network is also defined as a Local Area Network. Amongst many other uses, a key purpose of Local Area Networks is to share common resources (think of a single printer that servers an entire floor in an office building).\r\n\r\nhttps:\/\/youtu.be\/RReSGlFFGnk\r\n\r\n<\/div>\r\n<div class=\"__UNKNOWN__\">\r\n\r\nLAN, Standard YouTube License\r\n\r\n<em>Wide Area Network<\/em><em> (WAN)<\/em>. The term \u201cwide\u201d signifies the fact that several local area networks are geographically far apart and are connected through other public networks. The WAN communication is decentralized; however, the LANs remain in a form of centralization due to the fact that owners of the LANs still have control over their individual LANs.\r\n\r\nhttps:\/\/youtu.be\/UL_uh--LuAo\r\n\r\nWAN, Standard YouTube License\r\n\r\nBoth LANs and WANs follow the centralized computing model, in the sense that they are \u201ccentrally\u201d managed. For most companies, businesses, home, schools, etc., their networks are managed by their organization (i.e., for your home network, you buy, install, configure and connect your own equipment to configure it as your home\/local area network, then you join the decentralized portion (WAN or the internet)\r\n\r\n<em>Peer-To-Peer<\/em><em> (P2P)<\/em><em> Networks<\/em>. Peer-to-Peer networks are a type of a \u201cPrivate Connection\u201d of computers. In this private connection, everyone owns and manages their own system. The term \u201cprivate\u201d actually means that only certain members of a particular group of computers and people are \u201clogically\u201d grouped and connected together and contrary to the first 2 types, LAN\u2019s and WAN\u2019s, where the connection is physical. Meaning, the Nodes in a Peer-To-Peer are NOT centrally managed and could exist within a public network such as the internet.\r\n\r\nhttps:\/\/youtu.be\/ie-qRQIQT4I\r\n\r\n[h5p id=\"5\"]\r\n\r\nLisk Academy, Standard YouTube License\r\n<p class=\"import-Normal\">A key characteristic of P2P networks is the use of <em>consens<\/em><em>us<\/em>. Meaning the way the connected computers pass data from one to another is through an agreement mechanism. This mechanism, as we\u2019ll see later, is at the core of how Blockchains work and why they have disrupted so much of the traditional technologies that finance has relied upon.<\/p>\r\n\r\n<h3 class=\"import-Normal\"><strong>Network Communication Protocols<\/strong><\/h3>\r\n<p class=\"import-Normal\">Networks use protocols, which are standardized communication rules for exchanging messages... ensuring protection from the high-frequency hacking attempts that occur every 39 seconds (University of Maryland, n.d.). Think of human protocols of greetings. Typically, when one is addressed by a \u201cGood Morning\u201d greeting, there is an expectation of same or better curtesy is replied back. Computers exchange and share data and processing tasks by organizing the messages into structured protocols (i.e., Client computer-1, sends a message to client computer-2 \u201c Hello, I have Data for you\u201d. Client Computer-2 acknowledge receipt and replies back saying \u201cHello to you too, I am free and able to receive data. Go ahead and send it through\u201d. Client Computer-1. Then sends its data and may request Client Computer-2 to verify receipt. This back and forth messaging typically ends by an \u201cend of session message\u201d that closes the communication gates (ports) between the sender and recipient.<\/p>\r\n<p class=\"import-Normal\">This was an over simplified view of communication protocols between computers. In today\u2019s modern computer systems there are a plethora of different configurations and methods of the two basic <em>Synchronous <\/em>(sender speaks, and receiver listens) as well as <em>Asynchronous<\/em> (both sender and receiver speak and listen at the same time) methods. Current applications such as email, instant messaging, text messaging, video conferencing, voice over IP (VoIP), social media messaging, online forums, online surveys, data-driven marketing, image\/video messaging and a whole list of thousands of others require variation on the theme of synchronous and asynchronous.<\/p>\r\n\r\n<h2 class=\"import-Normal\"><strong>Blockc<\/strong><strong>hains <\/strong><strong>and the relationship to Protocols<\/strong><\/h2>\r\n<p class=\"import-Normal\">As we mentioned earlier, Blockchains are a decentralized form of a <em>public ledger<\/em> (a record of transactions that are seen by, and validated and approved for recording by peers), that is executed on a decentralized network of computers that uses P2P networking messaging relying on a voting principle of agreement that transactions sent\/received are actually valid transactions. The voting structure of this group of computers is what we refer to as <em>consensus<\/em> (agreement). The science and technology of Blockchains is rooted in mathematics especially in the area of coding theory and practical applications that dates back to the early 1970\u2019s.<\/p>\r\n<p class=\"import-Normal\">In 2008 someone by the name Satoshi Nakamoto proposed a new, decentralized form of an electronic cash system which he called Bitcoin. Many believe Satoshi Nakamoto does not exist and the true identity of the author remains a mystery till today. Nevertheless, the underlying principle of this system is a protocol he called Bitcoin (BTC).<\/p>\r\n\r\n<h3 class=\"import-Normal\"><strong>Blockchain<\/strong><strong> is a protocol for Bitcoins<\/strong><\/h3>\r\n[caption id=\"\" align=\"alignright\" width=\"387\"]<img src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/thumb\/2\/2e\/1st_GLAM_WC_libraries_edit-a-thon_catering_receipt_muffins.JPG\/600px-1st_GLAM_WC_libraries_edit-a-thon_catering_receipt_muffins.JPG?20140712134517\" alt=\"Example of a receipt. \" width=\"387\" height=\"387\" \/> <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:1st_GLAM_WC_libraries_edit-a-thon_catering_receipt_muffins.JPG\">Catering Receipt Discott<\/a>\u00a0 <a href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/3.0\/deed.en\">CC BY-SA<\/a>[\/caption]\r\n<p class=\"import-Normal\"><em>Blockchain as a structure of Data<\/em>: Structured data is an organized form of data. Transactions follow a specific protocol (sequential steps that describe how the data is to be organized. e.g., think of a typical paper receipt you receive from a merchant as a single transaction that contains:<\/p>\r\n\r\n<ul>\r\n \t<li>Merchant Name: At the top, bold and prominent.<\/li>\r\n \t<li>Address: Beneath the merchant name, possibly in smaller font.<\/li>\r\n \t<li>Date\/Time: Next, the transaction date and time.<\/li>\r\n \t<li>Itemized List: A list of purchased items with their names, quantities, and prices, followed by any applicable tax and a subtotal.<\/li>\r\n \t<li>Total Amount: At the bottom, the total amount spent.<\/li>\r\n \t<li>Payment Method: Indicates if payment was made by credit card, cash, Debit card, or other means.<\/li>\r\n \t<li>Thank You Note: A simple message. \"Thank you for your purchase!\"<\/li>\r\n<\/ul>\r\n<h3 class=\"import-Normal\"><strong>Blockchain i<\/strong><strong>s an Algorithm<\/strong><\/h3>\r\n<p class=\"import-Normal\">An algorithm in software engineering refers to a series of sequential steps that will be followed by a computer to solve a problem. This often requires a specific <em>Data<\/em> <em>structure<\/em> (method of how the data is organized) to allow for democratic voting and distributed negotiation amongst peers in a network in order to reach consensus (i.e., agreement on the solution).<\/p>\r\n\r\n<h3 class=\"import-Normal\"><strong>Blockchains define Ownership <\/strong><\/h3>\r\n<p class=\"import-Normal\">So you lost the paper receipt in our example, and you go back to the store needing to return an item. How do you prove you actually had paid for it? Receipts can easily be faked. Copies of receipts can also be lost by the merchant, or worst, can be altered by unscrupulous merchants. These are but few examples of a host of issues associated with proving ownership. Witness Testimony is your savior especially if the witness is independent and the more independent witnesses you have the closer to the truth of ownership you\u2019ll get.<\/p>\r\n<p class=\"import-Normal\">In a P2P network, all network participants would have seen and recorded your transaction (i.e., the receipt) and will vouch (again via consensus) on your behalf. Making your claim unquestionable.<\/p>\r\n\r\n\r\n[caption id=\"attachment_354\" align=\"alignleft\" width=\"480\"]<img class=\"wp-image-354 size-full\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/image7-e1733935373890.png\" alt=\"Ownership Block. Long description in the text beside image.\" width=\"480\" height=\"278\" \/> <a href=\"https:\/\/www.researchgate.net\/publication\/387457309_Data_Management_and_Security_in_Blockchain_Networks\">Data Management and Security in Blockchain Networks<\/a><a href=\"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/deed.en\"> CC BY-NC<\/a>[\/caption]\r\n<p class=\"import-Normal\">The image shows how ownership in a block is structured. Every transaction, regardless of merchant, customer, bank, or anyone else that \u201cprocesses\u201d the transaction data, knows and follows the same structure. The Figure shows one complete block. As we have introduced in the Cyber Security chapter, identification is established by applying basic security principles of validating previously agreed upon identifiers such as:<\/p>\r\n\r\n<ul>\r\n \t<li>Logon ID\u2019s<\/li>\r\n \t<li>Passwords<\/li>\r\n \t<li>Personal Identification Numbers (PIN)<\/li>\r\n \t<li>Customer Numbers<\/li>\r\n \t<li>And a host of other possible identifiers<\/li>\r\n<\/ul>\r\n<p class=\"import-Normal\">Security of Blockchains extends the second principle of Cyber Security, Authentication. Authentication provides 2 of the 3 requirements for the Confidentiality, Integrity, and Availability (CIA) principles by preventing anyone, other than the actual owner, from assuming his\/her identity. Authentication proves identity by the 3 key principles of:<\/p>\r\n\r\n<ul>\r\n \t<li><em>Things you have<\/em> (a social security card, a car, a credit card, a school ID, or a Driver\u2019s license amongst many more things we carry)<\/li>\r\n \t<li><em>Things you Know <\/em>(A Person, Place or a Thing that you, and only you, would remember such as name of your 4<sup>th<\/sup> grade teacher; and only you would know your great grand-mother\u2019s maiden name, etc.)<\/li>\r\n \t<li><em>Things you are<\/em> (your blood type, your DNA, your retina imprints, your fingerprints, your voice signature, etc.)<\/li>\r\n<\/ul>\r\n<p class=\"import-Normal\">The third principle of Availability is achieved in Blockchains as well. In a P2P networks, the very nature of it being open to the public (i.e., seen by all nodes, and recorded by all participating nodes) assures that any unauthorized (out of consensus) activity such as errors, omissions, deletions, or even the slightest alteration would immediately be seen by all, whom originally authorized and validated the transaction, causing it to be voted out and replaced by the original transaction or any part thereof. Availability is also achieved by the fact that if 1 node in a P2P network is lost, the block is preserved on multiple other nodes in the system and can easily be regenerated.<\/p>\r\n\r\n<h2 class=\"import-Normal\"><strong>Blockchains<\/strong><strong> -<\/strong> <strong>How <\/strong><strong>Do They <\/strong><strong>Actually Work<\/strong><strong>?<\/strong><\/h2>\r\n<p class=\"import-Normal\">Now that we uncovered the basic fundamentals to Blockchains: the distributed (independent witnesses) consensus-based ledger, the P2P team that approves transactions, and the building blocks of ownership of a transaction, we are ready to proceed with studying how Blockchains actually work. Blockchain generation is a 7-step process:<\/p>\r\n\r\n<h3 class=\"import-Normal\"><strong><em>Step-1 Transaction Ownershi<\/em><\/strong><strong><em>p <\/em><\/strong><\/h3>\r\n<p class=\"import-Normal\">Returning to our receipt for a moment, receipts are, legally, a form of ownership transfer. Monies were exchanged for goods or services transferred from 1<sup>st<\/sup> owner \u2013 the Merchant, to the 2<sup>nd<\/sup> owner the Customer. In the ledger, a complete history of ownership (a track record of ownership transfers) can be managed. An example would be the purchase of a home and title is transferred many times through several generations of homeowners. A complete, accurate, immutable (undeniable) history of ownership can be attained.<\/p>\r\n\r\n<h3 class=\"import-Normal\"><strong><em>Step-2 Protecting Ownership<\/em><\/strong><\/h3>\r\n<p class=\"import-Normal\">It is not enough to have a historical track record of who actually owns a property, but there is an additional need to ensure the prevention of people from falsely claiming it, using it, (and if the property is a home), even occupying it. Strong Cryptography is the1<sup>st<\/sup> line of defense method within Blockchains that guarantees immunity from tampering with the record. Secondly, It assures identifying owners correctly and undeniably via authentication, and by authorizing only the owners to make changes to the record (such as adding a swimming pool to the recently purchased home), and thirdly by achieving consensus from peers to approve the recording of new changes and updates to the record.<\/p>\r\n\r\n\r\n[caption id=\"\" align=\"alignright\" width=\"540\"]<img src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/image8.png\" alt=\"Example of digital signature Hash. Long description in text beside image.\" width=\"540\" height=\"414\" \/> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Hash_function#\/media\/File:Hash_table_4_1_1_0_0_1_0_LL.svg\">A hash function that maps names to integers from 0 to 15<\/a>. Public Domain[\/caption]\r\n<p class=\"import-Normal\">An additional safeguard method that\u2019s at the core of Blockchains is the concept of a <em>hash<\/em>. A hash is a digital signature (fingerprint) of the record just created. It is used as a key (cipher code) to prove identity, and to prove a record has not changed. Hash keys can\u2019t be used to reassemble the original block of data. They are only one way. Meaning if you run the hash multiple times on a block of data you\u2019ll always get the same hash number (signature). Hash functions run ONE WAY, meaning you can\u2019t reverse the hash order expecting to read the block. Think of a hash as a paper shredder. Run a book through it and you get thousands of little shreds of different sizes, shapes and colors. Even if you are successful reassembling it, you can\u2019t guaranty that it is the same book. What is constant in a hash is the hash number (i.e., in our example it could be count of the tiny shreds of paper). This count will always be the same no matter how many copies of the same book you run through the shredder.<\/p>\r\n\r\n<h3 class=\"import-Normal\"><strong><em>Step-3 Storing Transaction Data<\/em><\/strong><\/h3>\r\n<p class=\"import-Normal\">Having defined and assured protection to Ownership is a great achievement, however incomplete. A key step is to store the new record in the ledger in such a manner that a historical track is also created. This is accomplished by issuing a new record and a new digital signature (hash) that again uniquely identifies the new transaction. The old hash number is linked to the new block and a new hash number is appended at the end of the new block thus forming a chain-like link from one block of data to the next.<\/p>\r\n\r\n\r\n[caption id=\"attachment_616\" align=\"alignleft\" width=\"400\"]<img class=\" wp-image-616\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_diverse_group_of_people_standing_together_each_-300x171.jpg\" alt=\"Depicting a diverse group of people representing various professions and cultures, symbolizing teamwork and connectivity.\" width=\"400\" height=\"228\" \/> Image generated by OpenAI's DALL\u00b7E[\/caption]\r\n<h3 class=\"import-Normal\"><strong><em>Step-4 Preparing Ledgers to be distributed <\/em><\/strong><\/h3>\r\n<p class=\"import-Normal\">Ledgers as we have seen are a series of structured (organized) data blocks, that contain <em>Block header information<\/em> (who owns the block, how much data is in the block, the type of data in the block and the original hash number of the previous block), followed by the actual transaction data (see our example of a receipt), followed by the new hash number.<\/p>\r\n\r\n<h3 class=\"import-Normal\"><strong><em>Step-5 Distributing the Ledger <\/em><\/strong><\/h3>\r\n<p class=\"import-Normal\">Once the block is organized, it is copied with as many copies as there are nodes in the P2P network by the Peers (remember, there is no central authority that directs who is to make copies, or when. Only a protocol the describes HOW to process it). Nodes, who freely choose to participate in processing a specific block of data, exchange specific details about the block amongst themselves, i.e., each node that accepted a block and made a copy of it, will look for another node that is willing to participate, make a copy and then send it to that node, this continues until consensus is achieved amongst participating nodes.<\/p>\r\n\r\n<h3 class=\"import-Normal\"><strong>Step-6 Adding new transactions to the Block<\/strong><\/h3>\r\n<p class=\"import-Normal\">At this point in the P2P network, all computers have individual copies of the data structure and are allowed to begin adding new transaction data into the ledger. Step-6 is key. The peers (the computers attached to the network), freely decide which transactions they will add into the block, i.e., some may choose only transactions that come from a certain merchant, or transactions for a certain credit card brand, or transactions headed to a certain bank. Think of it as \u201c\u2026who pays the most, gets the service first). We call this transaction aggregation. During the process of transaction aggregation, Peers actually monitor each other\u2019s work turning them into \u201csupervisors\u201d of each others work assuring data integrity as they would, quite easily, point out mistakes made in processing the data which would lead to some, or all the Peers, rejecting the block processed by a specific peer.<\/p>\r\n\r\n<h3 class=\"import-Normal\"><strong>Step-<\/strong><strong>7 <\/strong><strong> The<\/strong><strong> single source of Truth. <\/strong><strong>D<\/strong><strong>eciding<\/strong> <strong>on <\/strong><strong>which Ledgers represent the truth<\/strong><\/h3>\r\n<p class=\"import-Normal\">As we have seen in the previous steps, assembling the blocks by peers, often leads to having blocks containing different transactions (selecting a different credit card, different bank, different merchants, etc.). This was an early issue that the bitcoin algorithm had to solve. This was solved by forcing every node in the P2P network to decide, independently, which transaction history represents the original, i.e., the truth, in such a way that all nodes would agree with the decision.<\/p>\r\n<p class=\"import-Normal\">In several branches of mathematics like decision theory and more precisely the study of Swarm Intelligence, where crowds (i.e., the nodes in a P2P network) follow simple mathematical rules that forces and governs cooperation amongst a homogeneous colony of crowds, working together to find a solution (such as finding an optimal route to the solution). Using the game Chess, for example, imagine you have hundreds or thousands of players faced off with a single opponent, these players each advance one play at a time against the opponent, analyze what the opponent\u2019s possible counter move could be, and then share their findings amongst all peers. Ultimately this leads to winning the game (i.e., the Truth has been determined). Remember, single computers can play the entire chess game board, recording and remembering the outcome of every move of all (10 to the power 120) possible moves, in a matter of minutes. Blockchains are used by many P2P systems such as BitCoins. As of 2024, there are more than 1 Million Bitcoin nodes (computers) around the world. Hence, generating a block of \u201ctrue and approved\u201d set of blocks of approximately 144 blocks every 24 hours. Each new block references the block preceding it and is tagged with a new block identifier. In this manner, all blocks are linked together sequentially (thus the term chain of blocks of transactions) all the way back to the seminal and very first block generated in 2009 by Satoshi Nakamoto.<\/p>\r\n\r\n<h2 class=\"import-Normal\"><strong>T<\/strong><strong>he R<\/strong><strong>ole of Peers in Blockchain Networks<\/strong><\/h2>\r\n<h3 class=\"import-Normal\"><strong>There is No Free Lunch <\/strong><\/h3>\r\n<p class=\"import-Normal\">Peer Nodes on a P2P network that generates new Blockchains are known as Crypto Miners. Crypto Miners are dedicated, highly specialized, and powerful computers (not people) that \u201cmine\u201d the Blockchains process attempting to be the very first miner that solves the complex cryptographic puzzle and reaches consensus (i.e., creating a new block) and verifying authenticity of transactions causes the P2P network to generate the issuance (minting) a new release of a quantity of coins to the miner as a reward. Different Crypto Currency systems (Ethereum and dozens more) use variations on the theme of Blockchains, and some do not use Blockchains at all. For this discussion however, we will explain in detail using the <em>Bitcoin mining<\/em> process:<\/p>\r\n\r\n<h3 class=\"import-Normal\"><em>A <\/em><em>Mining Puzzle (Proof-of-Work)<\/em><\/h3>\r\n<p class=\"import-Normal\">At the core of Bitcoin mining is the concept of <em>Proof-of-Work (PoW)<\/em>. PoW ensures that adding new blocks, by a miner, to the blockchain requires extensive computational effort, making it difficult to manipulate the system. As we have previously seen, to add a new block, miners must create a valid hash (a cryptographic signature) for the block.<\/p>\r\n\r\n<h3 class=\"import-Normal\"><em>Block Rewards and Incentives<\/em><\/h3>\r\n<p class=\"import-Normal\">As per the title of this section No Free Lunch, Financial Technologies minimizes to a great degree the costs associated with processing transactions, however, it does not eliminate all costs. Costs directly associated with handling Transactions through Blockchains and Crypto currency are:<\/p>\r\n\r\n<ul>\r\n \t<li><em>Coins<\/em>: When a miner successfully finds a valid hash, they broadcast the block to the network, and it gets added to the Blockchain. In return, the miner receives 3.12 coins.<\/li>\r\n \t<li><em>Transaction Fees<\/em>: In addition to the block rewards, miners also receive transaction fees paid by users who spend or use the Bitcoin system. These fees vary depending on network demand and the size of the transaction.<\/li>\r\n<\/ul>\r\n<h3 class=\"import-Normal\"><em>Block<\/em><em> Authentication &amp; Validation<\/em><\/h3>\r\n<p class=\"import-Normal\">Once a miner solves the cryptographic puzzle, the new block is broadcasted to the entire Bitcoin network. Other miners and nodes (participants who maintain a copy of the blockchain) validate the block and the transactions within it. They check that the block\u2019s hash is valid, the transactions are legitimate, and that the miner has not <em>double-spent<\/em> Bitcoin or created fraudulent transactions (Wikipedia 2023).<\/p>\r\n<p class=\"import-Normal\">If the block is validated, it is added to the blockchain. The miner who solved the puzzle is now rewarded with the block reward and transaction fees, and the process repeats for the next block.<\/p>\r\n\r\n<h3 class=\"import-Normal\"><em>Difficulty Adjustment<\/em><\/h3>\r\n<p class=\"import-Normal\">The Bitcoin network adjusts the difficulty of the Proof-of-Work puzzle approximately every 2016 blocks (about every two weeks). The goal is to keep the average block time at around 10 minutes. When miners solve for blocks too quickly (due to increased computational power provided by technology improvements), mining difficulty will proportionally increase. If miners are taking longer (due to fewer miners or less computational power), the difficulty decreases.<\/p>\r\n<p class=\"import-Normal\">This adjustment ensures that new bitcoins are created at a consistent rate, approximately every 10 minutes, regardless of the total computational power (hash rate) of the network.<\/p>\r\n\r\n<h3 class=\"import-Normal\"><em>Mining Hardware<\/em><\/h3>\r\n<p class=\"import-Normal\">Initially, Bitcoin mining could be done on standard personal computers. As the Bitcoin network grew and more miners joined, it became necessary to use specialized hardware to remain competitive. Today\u2019s computers used for mining use highly specialized hardware that is specifically designed to only run software that \u201csolves the puzzle\u201d.<\/p>\r\n\r\n<h3 class=\"import-Normal\"><em>Mining Pools<\/em><\/h3>\r\n<p class=\"import-Normal\">Mining is a very resource-intensive process, and with the designed-in, ever increasing difficulty of mining, it\u2019s no longer practical for individual miners (be it people or their computer machines) to mine Bitcoin on their own. To solve this, many miners join <em>mining pools<\/em>, where they combine their computing power to increase the chances of solving the cryptographic puzzle. In a mining pool, miners work together to solve a block. When the pool successfully mines a block, the reward is split among the participants based on how much computational power they contributed. This provides a more stable and consistent income for miners.<\/p>\r\n\r\n\r\n[caption id=\"attachment_613\" align=\"alignright\" width=\"480\"]<img class=\" wp-image-613\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_highly_realistic_depiction_of_two_miners_working-300x171.jpg\" alt=\"Depicting two miners working in a dark, industrial setting, illuminated by the glowing Bitcoin coin.\" width=\"480\" height=\"274\" \/> Image generated by OpenAI's DALL\u00b7E[\/caption]\r\n<h2 class=\"import-Normal\"><strong>Current Applications of Blockchains<\/strong><\/h2>\r\n<p class=\"import-Normal\">The most use of Blockchains in the past decade has been for the generation, storing and exchange of Crypto Currencies. Current uses of blockchains have extended beyond the securing and recording of transactions of the financial industry sweeping many sectors of the economy including supply chain management, healthcare data tracking, voting systems, digital identity verification, real estate transactions, and even art ownership through <em>Non-Fungible Tokens (NFTs),<\/em> all benefiting from the decentralized and tamper-proof nature of blockchain technology. Some of the key business activities that have been revolutionized y Blockchains include:<\/p>\r\n\r\n<h3 class=\"import-Normal\"><strong>Contracts <\/strong><strong>\u2013 The Background<\/strong><\/h3>\r\n<p class=\"import-NormalWeb\">As mentioned earlier, a transaction is a legally binding contract between a buyer and a seller. Traditionally, buying a house for example, was concluded by the Seller and the Buyer coming together at a Title company on what is called the Closing Day to sign 20, or more documents with some exceeding 30 sheets, notarize all the signatures, record the signed paperwork at a local court house (completed passed the closing and may take up to 60 days), exchange monies, and finally receive the keys to the property by the new owner. This process from begin to end, was exhausting and on average took an excess of 30 days. Now take this example and imagine yourself as a business trying to import, or export, a million metric tons of wheat to\/from a faraway country.<\/p>\r\n\r\n<h2 class=\"import-NormalWeb\"><strong>Digital Contracts<\/strong><\/h2>\r\n<p class=\"import-NormalWeb\">A <strong class=\"import-Strong\">digital contract<\/strong> is an agreement between two or more parties in a digital format. Digital contracts typically involve the use of electronic negotiations, signatures, records, and communications to create, manage, and execute digital agreements. Digital contracts can take several forms:<\/p>\r\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Traditional <\/em><\/strong><strong class=\"import-Strong\"><em>Electronic Agreements<\/em><\/strong><strong><em>:<\/em><\/strong> These are agreements that are drafted, signed, and executed electronically. An example is an e-signature (a physical image of a real signature) used in a document signed via an online platform such as Docusign. These run on the traditional internet platform.<\/p>\r\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Fintech-based <\/em><\/strong><strong class=\"import-Strong\"><em>Smart Contracts<\/em><\/strong>: These are self-executing contracts where the terms of the agreement are written into software code and automatically enforced when certain predefined conditions are met. Smart contracts run on blockchain platforms, use digital signature (fingerprint), and they eliminate the need for intermediaries to enforce the agreement.<\/p>\r\n<p class=\"import-NormalWeb\">The concept of digital contracts began as an extension of traditional contract law, adapted to the digital environment, where transactions are increasingly being made online. It became necessary to find ways to ensure that these digital agreements were legally valid, enforceable, and secure.<\/p>\r\n\r\n<h3><strong class=\"import-Strong\"><strong>Evolution<\/strong><\/strong><strong class=\"import-Strong\"><strong> from<\/strong><\/strong> <strong class=\"import-Strong\"><strong>Contracts to <\/strong><\/strong><strong class=\"import-Strong\"><strong>eContracts<\/strong><\/strong><strong class=\"import-Strong\"><strong> to Smart Contracts<\/strong><\/strong><\/h3>\r\n<p class=\"import-NormalWeb\">The idea of digital contracts has its roots in the evolution of digital technology, starting with the early development of <em>Electronic Data Interchange<\/em><em> (EDI)<\/em> followed by the development of the Internet and eCommerce. With the growth of online transactions, the need for digital signatures and secure methods of contract execution arose. Key technology evolutions were:<\/p>\r\n\r\n<h2 class=\"import-NormalWeb\"><em>Electronic Data Interchange (EDI)<\/em><\/h2>\r\n<p class=\"import-NormalWeb\">EDI first emerged in\u00a0the 1960s\u00a0within the transportation industry, marking its early presence in the foundation of what would later become the e-commerce industry;\u00a0its origins can be traced back to the development of standardized electronic communication systems for exchanging business documents between companies. It primarily focused on logistics and supply chains. The Shipping, Logistics and Transportation companies, Governments, Banks and Insurance companies required a maze of hundreds of different forms and sometimes in multiples of different languages. EDI minimized the manually fillable forms by software that standardized terminology and document format to allow computers across the world to exchange documents. This very same technology evolved further in the early 1980\u2019s to standardize any paper-based document to be accepted, processed and transacted between any computers. This is what we know today as Portable Document Format or PDF. Key technologies that aided in the evolution from paper-based Contracts to eContracts included:<\/p>\r\n\r\n<h3 class=\"import-NormalWeb\"><em>The<\/em> <strong class=\"import-Strong\"><em>E-Sign Act<\/em><\/strong><\/h3>\r\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\">The <\/strong>Electronic Signatures in Global and National Commerce Act of 1996 was passed in the United States, allowing electronic signatures to be used in place of traditional handwritten signatures, making digital contracts legally enforceable.<\/p>\r\n\r\n<h3 class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Public Key Infrastructure (PKI)<\/em><\/strong><\/h3>\r\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\">As we studied in the Cryptography chapter<\/strong><strong class=\"import-Strong\"><em>, <\/em><\/strong><strong class=\"import-Strong\"><em>Public Key Infrastructure (PKI)<\/em><\/strong> was established in the early 2000\u2019s as a system to standardize securing communications, allowing the creation of digital signatures and security certificates for verification of contracts.<\/p>\r\n\r\n<h2 class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Blockchain Technology <\/em><\/strong><\/h2>\r\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\">With Satoshi N<\/strong><strong class=\"import-Strong\">akamoto<\/strong><strong class=\"import-Strong\">\u2019<\/strong><strong class=\"import-Strong\">s seminal work <\/strong><strong class=\"import-Strong\">(2009) <\/strong><strong class=\"import-Strong\">on Bitcoins and its foundational cryptographic structure<\/strong><strong class=\"import-Strong\"> using B<\/strong><strong class=\"import-Strong\">lockchain technology<\/strong>, and later (2015) the refinement by Ethereum adapting it to <strong class=\"import-Strong\">smart contracts<\/strong> emerged. Ethereum\u2019s software has the ability to encode and execute complex contracts directly on its blockchain became the foundation for the modern approach to digital contracts. Key features for smart contracts include:<\/p>\r\n\r\n<h3><strong class=\"import-Strong\"><em>Smart Contracts Automation and Self-Execution<\/em><\/strong><\/h3>\r\n<p class=\"import-NormalWeb\">The defining feature of a smart contract is that it is self-executing. This means that once the contract\u2019s terms and conditions (T\u2019s &amp; C\u2019s) are encoded in the contract's code and the contract is deployed on the blockchain, the terms automatically trigger specific actions when predefined conditions are met. For example, a smart contract might automatically release a payment when a certain condition such as the delivery of a product to a customer, is confirmed as met.<\/p>\r\n\r\n<h3><strong class=\"import-Strong\"><em>Immutability<\/em><\/strong><\/h3>\r\n<p class=\"import-NormalWeb\">Once a contract is recorded on the blockchain, it cannot be altered, providing a high level of security. This is important in reducing the risk of fraud and manipulation. The contract's terms are clear and unchangeable, ensuring that all parties involved are held to the agreement as originally written.<\/p>\r\n\r\n<h2 class=\"import-Normal\"><strong>Non-Fungible Tokens (NFT)<\/strong><strong> and Digital Assets<\/strong><\/h2>\r\n[caption id=\"\" align=\"alignright\" width=\"553\"]<img class=\"\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/image11.jpeg\" alt=\"Mountains Non Fungible Token River\" width=\"553\" height=\"342\" \/> <a href=\"https:\/\/pixabay.com\/illustrations\/mountains-river-nature-landscape-7145101\/\">Mountains Non Fungible Token River<\/a> StefWithAnF <a href=\"https:\/\/pixabay.com\/service\/license-summary\/\">Pixabay\u00a0<\/a>[\/caption]\r\n<p class=\"import-Normal\">Non-Fungible Tokens (NFTs) have rapidly gained attention in the digital world, particularly in the fields of art, collectibles, and gaming. An NFT is a type of digital asset that represents ownership or proof of authenticity of a unique item, typically stored on a blockchain. Unlike cryptocurrencies such as Bitcoin or Ethereum, which are fungible (meaning each unit is identical and can be exchanged one-for-one), NFTs are non-fungible, meaning each token is unique and cannot be exchanged on a like-for-like basis.<\/p>\r\n<p class=\"import-Normal\">As a digital asset, NFT\u2019s represents ownership or proof of authenticity of a unique item, either tangible, or digital (virtual), that is recorded on a blockchain. The key attributes of NFT\u2019s are:<\/p>\r\n\r\n<ul>\r\n \t<li><em>NFT\u2019s are Unique:<\/em> Every NFT has a unique identifier and specific information (metadata), such as the creator\u2019s details, ownership history, and other relevant data, making it distinct from other tokens.<\/li>\r\n \t<li><em>NFT\u2019s are Indivisible:<\/em> Unlike cryptocurrencies that can be divided into smaller units (e.g., 1 BTC can be divided into 100 million satoshis), NFTs cannot be divided. You either own the entire token or none of it.<\/li>\r\n \t<li><em>NFT are Transferable:<\/em> NFTs can be bought, sold, and transferred from one person to another, with each transfer recorded on a blockchain.<\/li>\r\n \t<li><em>NFT\u2019<\/em><em>s document <\/em><em>Provenance and Ownership:<\/em> NFTs provide a way to verify the ownership and history of digital or physical assets, making them useful for collectors and creators.<\/li>\r\n<\/ul>\r\n<h2 class=\"import-Normal\"><strong>How do NFT\u2019s work? <\/strong><\/h2>\r\n<p class=\"import-Normal\">NFTs are typically built using the Ethereum Request for Comment (ERC-721 and ERC-1155) standards, which are types of smart contracts on the Ethereum blockchain. These standards define how NFTs behave and interact with other digital assets on the network.<\/p>\r\n<p class=\"import-Normal\">ERC-721: The ERC-721 standard was the first major standard used to create NFTs on the Ethereum blockchain. It specifies how NFTs should be structured and enables them to be unique, tradable, and trackable.<\/p>\r\n<p class=\"import-Normal\">ERC-1155: The ERC-1155 standard allows for the creation of both fungible and non-fungible tokens within a single smart contract, making it more flexible and efficient than ERC-721 for certain applications (such as gaming).<\/p>\r\n<p class=\"import-Normal\">When someone creates or mints an NFT, they typically go through the following process:<\/p>\r\n<p class=\"import-Normal\"><em>Minting<\/em><em>:<\/em> Minting NFT\u2019s are NOT the same as Minting Cyber Currency. It refers to the creation of the NFT on the blockchain but it involves converting a digital file (such as a photo image, a video clip or movie, or piece of music) into an NFT by associating it with a unique identifier on the blockchain.<\/p>\r\n<p class=\"import-Normal\"><em>Metadata<\/em><em>:<\/em> Metadata is the roadmap of the item under consideration. Think of metadata for a book in a library. The index cards, or the search function, on the library\u2019s computer system tells you the book\u2019s subject, the author, the publisher, the year it was published, a short description of the content, and the location of where in the library you can find the book, all in a small, summary piece of information known as Metadata. Using this analogy, each NFT contains metadata, which include details about the item it represents, such as a painting\u2019s name, scene description, the artist or creator, date it was painted, and any other information that proves its uniqueness such as which gallery had bought it last.<\/p>\r\n<p class=\"import-Normal\"><em>Ownership and Transfer<\/em><em>: <\/em>Once minted, the NFT is owned by the person who created it (unless transferred to another user). Ownership is tracked on the blockchain, giving provenance and ensuring that anyone can verify the authenticity and current owner of the NFT.<\/p>\r\n<p class=\"import-Normal\">Since NFTs exist on a blockchain, transactions involving NFTs are secure, transparent, and recorded permanently, meaning the ownership history of each NFT is publicly available.<\/p>\r\n\r\n<h2 class=\"import-Normal\"><strong>Key Characteristics of NFTs<\/strong><\/h2>\r\n<p class=\"import-Normal\"><em>Indivisibility<\/em>: NFTs are indivisible. Unlike cryptocurrencies, which can be divided into smaller units, NFTs are whole entities and cannot be broken down into fractions. You own the entire NFT or none of it.<\/p>\r\n<p class=\"import-Normal\"><em>Scarcity<\/em><em>:<\/em> NFTs can be scarce or abundant. The creator or project owner can decide how many copies of an NFT are minted. Some NFTs are one-of-a-kind (one unit), while others might have a limited supply (e.g., 100 editions of a digital artwork). This scarcity is what often drives demand and value in the market.<\/p>\r\n<p class=\"import-Normal\"><em>Verifiable Ownership<\/em>: NFTs provide a transparent record of ownership that is visible to everyone on the blockchain. This ensures that ownership can be easily transferred, verified, and proven, without the need for intermediaries.<\/p>\r\n<p class=\"import-Normal\"><em>Interoperability<\/em><em>:<\/em> NFTs, especially those created using standardized protocols can interact with various platforms and applications, enabling users to move them seamlessly across different marketplaces, wallets, or virtual worlds.<\/p>\r\n\r\n<h2 class=\"import-Normal\"><strong>NFT Uses<\/strong><\/h2>\r\n<p class=\"import-Normal\">NFTs have a wide range of use cases across various industries, with their most prominent applications being in art, entertainment, gaming, and collectibles. Some notable examples include:<\/p>\r\n<p class=\"import-Normal\"><em>Digital Art<\/em><em>: <\/em>NFTs have revolutionized the art world by allowing digital artists to sell their work as unique, verifiable pieces. NFTs provide artists with a way to retain control over their creations and ensure that buyers are purchasing original works. NFTs also allow artists to program royalties, so they can earn a percentage of sales whenever their work is resold on the secondary market.<\/p>\r\n<p class=\"import-Normal\"><em>Gaming:<\/em> NFTs are increasingly being used in the gaming industry. In blockchain-based games, NFTs represent in-game assets such as weapons, skins, land, and characters. Players can buy, sell, and trade these assets, often across different games or platforms, thanks to the interoperability of NFTs. Popular games include Axie Infinity, Decentraland, and The Sandbox are examples of NFT-based virtual worlds.<\/p>\r\n<p class=\"import-Normal\"><em>Collectibles<\/em><em>: <\/em>NFTs have gained significant traction in the world of collectibles, allowing people to own and trade digital items like trading cards, music albums, and video clips. For example, NBA Top Shot allows users to buy, sell, and trade officially licensed NBA collectible moments in the form of NFTs.<\/p>\r\n<p class=\"import-Normal\"><em>Intellectual Property and Licensing<\/em><em>:<\/em> NFTs can also be used to represent intellectual property rights. This allows creators to sell ownership or licensing rights of digital content in a transparent and secure way. For example, musicians can tokenize their songs, allowing fans to purchase limited rights or copies.<\/p>\r\n<p class=\"import-Normal\"><em>Virtual Real Estate<\/em><em>:<\/em> NFTs are used to represent ownership of virtual land or property in decentralized virtual worlds like Decentraland\u2122 and Cryptovoxels\u2122. Users can buy, sell, or build on this virtual land, and the ownership of the virtual real estate is recorded as NFTs.<\/p>\r\n<p class=\"import-Normal\"><em>Tickets and Membership<\/em><em>s:<\/em> NFTs can be used as tickets for events or memberships for exclusive clubs. The unique nature of NFTs allows for the creation of verifiable and tamper-proof tickets, preventing counterfeiting and ensuring that tickets cannot be duplicated.<\/p>\r\n\r\n<h2 class=\"import-Normal\" style=\"text-align: justify\"><strong>Crypto <\/strong><strong>Wallets <\/strong><\/h2>\r\n<p class=\"import-NormalWeb\">A <strong class=\"import-Strong\"><em>cryptocurrency wallet<\/em><\/strong> is a digital tool that enables users to interact with various blockchain networks to store, send, and receive cryptocurrencies, such as Bitcoin, NFT\u2019s, and other digital assets. It can be thought of as a bank account for crypto assets, though it does not store the actual coins themselves, instead, it holds the cryptographic keys necessary to interact with the blockchain and manage the user\u2019s crypto asset holdings. These wallets can come in both <strong class=\"import-Strong\">software<\/strong> and <strong class=\"import-Strong\">hardware<\/strong> forms, offering different levels of convenience, security, and control.<\/p>\r\n\r\n\r\n[caption id=\"\" align=\"alignright\" width=\"379\"]<img src=\"https:\/\/live.staticflickr.com\/65535\/51787822217_477d19fb95_b.jpg\" alt=\"Crypto Wallet and Bitcoins.\" width=\"379\" height=\"253\" \/> <a href=\"https:\/\/www.flickr.com\/photos\/194709736@N03\/\">BestCryptoCodes<\/a> <a href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/\">CC BY<\/a>[\/caption]\r\n<p class=\"import-NormalWeb\">There are two main types of cryptographic keys involved:<\/p>\r\n<p class=\"import-Normal\"><strong class=\"import-Strong\">Public Key<\/strong>: A public address or identifier used to receive cryptocurrency. It\u2019s like an account number and can be shared with others to receive funds.<\/p>\r\n<p class=\"import-Normal\"><strong class=\"import-Strong\">Private Key<\/strong>: A secret key used to sign transactions and prove ownership of the assets stored in the wallet. It is like a password and must be kept secure. Anyone with access to the private key can control the assets linked to the corresponding public key.<\/p>\r\n<p class=\"import-NormalWeb\">The wallet manages these keys and facilitates the actions of sending or receiving cryptocurrency.<\/p>\r\n<strong class=\"import-Strong\"><strong>How Do Crypto Wallets Work?<\/strong><\/strong>\r\n<p class=\"import-NormalWeb\">Crypto wallets allow users to interact with the blockchain by signing transactions. Here\u2019s a breakdown of how they work:<\/p>\r\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Initial setup for c<\/em><\/strong><strong class=\"import-Strong\"><em>reating Wallets and <\/em><\/strong><strong class=\"import-Strong\"><em>g<\/em><\/strong><strong class=\"import-Strong\"><em>enerating <\/em><\/strong><strong class=\"import-Strong\"><em>k<\/em><\/strong><strong class=\"import-Strong\"><em>eys<\/em><\/strong>: When you initially set up a cryptocurrency wallet, it generates a pair of cryptographic keys (public and private keys. Refer to our chapter on Cryptography). These keys are mathematically linked, and the private key allows you to access and manage the cryptocurrency associated with the public key. The public key is used to receive funds, while the private key is used to authorize the sending of funds.<\/p>\r\n\r\n<h2 class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Sending and Receiving Cryptocurrency<\/em><\/strong><\/h2>\r\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>Receiving<\/em><\/strong><strong><em>:<\/em><\/strong> To receive cryptocurrency, you provide the sender with your public key (or wallet address). The transaction is recorded on the blockchain, but you don\u2019t need to \"store\" the actual cryptocurrency\u2014it's stored on the blockchain.<\/p>\r\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>Sending<\/em><\/strong><strong><em>:<\/em><\/strong> To send cryptocurrency, you use your private key to sign the transaction. The transaction is then broadcast to the blockchain network, which validates and records it. Only the person with the private key can authorize the transfer, ensuring security and ownership.<\/p>\r\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Transaction Signing<\/em><\/strong><strong><em>:<\/em><\/strong> Wallets sign transactions with the private key to prove that the sender owns the funds and has the right to transfer them. This signature is cryptographically generated and provides evidence of the transaction's authenticity without revealing the private key itself.<\/p>\r\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Blockchain Interaction<\/em><\/strong><strong><em>:<\/em><\/strong> All transactions made through a crypto wallet are recorded on the blockchain. When a transaction is initiated, it is validated by miners or validators (depending on the blockchain) and then added to the ledger.<\/p>\r\n\r\n<h2><strong class=\"import-Strong\"><strong>Types of Crypto Wallets<\/strong><\/strong><\/h2>\r\n<p class=\"import-NormalWeb\">Crypto wallets can be divided into two broad categories: <strong class=\"import-Strong\">Software Wallets<\/strong> and <strong class=\"import-Strong\">Hardware Wallets<\/strong>. Each type comes with different features, levels of security, and use cases.<\/p>\r\n\r\n<h3><strong class=\"import-Strong\">Software Wallets<\/strong><\/h3>\r\nhttps:\/\/youtu.be\/n6cMxZZq400\r\n\r\n(MetaMask, n.d., Standard YouTube License)\r\n<p class=\"import-NormalWeb\">Software wallets are programs or apps that store private keys on a device such as a laptop computer or a cellular smart phone. These wallets are more convenient and accessible but generally come with higher security risks (e.g., hacking, malware, loss or damage to the device).<\/p>\r\n\r\n<h4><strong class=\"import-Strong\">Types of Software Wallets<\/strong><\/h4>\r\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Desktop Wallets<\/em><\/strong><strong><em>:<\/em><\/strong> These wallets are installed on a desktop \/ laptop computer. They are considered secure if the device is protected, but they are vulnerable to malware if the device is compromised. Examples include <strong class=\"import-Strong\">Exodus<\/strong><strong class=\"import-Strong\">\u2122<\/strong> and <strong class=\"import-Strong\">Electrum<\/strong><strong class=\"import-Strong\">\u2122<\/strong><strong>.<\/strong><\/p>\r\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Mobile Wallets<\/em><\/strong><strong><em>:<\/em><\/strong> These are apps designed for mobile smart phones, providing portability and ease of access. Examples include <strong class=\"import-Strong\">Trust Wallet<\/strong><strong class=\"import-Strong\">\u2122<\/strong>, <strong class=\"import-Strong\">MetaMask<\/strong><strong class=\"import-Strong\">\u2122<\/strong>, and <strong class=\"import-Strong\">Coinomi<\/strong><strong class=\"import-Strong\">\u2122<\/strong>. Since mobile devices are always connected to the internet, they may be more prone to attacks if the device is not secure.<\/p>\r\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Web Wallets<\/em><\/strong><em>:<\/em> These are cloud-based wallets that run in web browsers. Web wallets are easily accessible from any device with internet connectivity, but they are also more vulnerable to hacking since the private keys are stored online. Examples include <strong class=\"import-Strong\">Blockchain Wallet<\/strong><strong class=\"import-Strong\">\u2122<\/strong> and <strong class=\"import-Strong\">Coinbase Wallet<\/strong><strong class=\"import-Strong\">\u2122<\/strong>.<\/p>\r\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Browser Extension Wallets<\/em><\/strong><em>:<\/em> These are wallet extensions for browsers like Chrome or Firefox, such as <strong class=\"import-Strong\">MetaMask<\/strong><strong class=\"import-Strong\">\u2122<\/strong>. They are designed primarily for interacting with decentralized applications (dApps) and managing Ethereum-based assets.<\/p>\r\n\r\n<h4><strong class=\"import-Strong\">Contents of a Software Wallet<\/strong><\/h4>\r\n<p class=\"import-Normal\">Software wallets contain:<\/p>\r\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>A <\/em><\/strong><strong class=\"import-Strong\"><em>Private Key<\/em><\/strong><strong><em>:<\/em><\/strong> The secret key that allows you to authorize transactions.<\/p>\r\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>A <\/em><\/strong><strong class=\"import-Strong\"><em>Public Key<\/em><\/strong><strong><em>:<\/em><\/strong> The address you share to receive crypto assets<\/p>\r\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>Transaction History<\/em><\/strong><strong><em>:<\/em><\/strong> A record of all incoming and outgoing transactions associated with the wallet.<\/p>\r\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>Wallet Balance<\/em><\/strong><strong><em>:<\/em><\/strong> A view of the available balance based on the blockchain, showing how much cryptocurrency is available for spending.<\/p>\r\n\r\n<h3><strong class=\"import-Strong\"><strong> Hardware Wallets<\/strong><\/strong><\/h3>\r\nhttps:\/\/youtu.be\/NwAqmM1AgCc\r\n\r\n(Tangem, n.d., Standard YouTube License)\r\n\r\n[h5p id=\"6\"]\r\n<p class=\"import-NormalWeb\">Hardware wallets are physical devices that store private keys offline. They are considered the most secure type of wallet because they are immune to online hacks, phishing attacks, and malware. Hardware wallets are typically used for long-term storage (cold storage) of cryptocurrency.<\/p>\r\n\r\n<h4>Examples of Hardware Wallets<\/h4>\r\n<p class=\"import-Normal\"><strong class=\"import-Strong\">Ledger Nano S \/ X<\/strong><strong class=\"import-Strong\">\u2122<\/strong>: One of the most popular hardware wallets, supporting a wide range of cryptocurrencies, including Bitcoin, Ethereum, and many altcoins.<\/p>\r\n<p class=\"import-Normal\"><strong class=\"import-Strong\">Trezor<\/strong><strong class=\"import-Strong\">\u2122<\/strong>: Another leading hardware wallet, similar to the Ledger, known for its ease of use and security features.<\/p>\r\n<p class=\"import-Normal\"><strong class=\"import-Strong\">KeepKey<\/strong><strong class=\"import-Strong\">\u2122<\/strong>: A hardware wallet with a user-friendly interface, supporting a smaller range of cryptocurrencies but still a reliable option for secure storage.<\/p>\r\n\r\n<h4><strong class=\"import-Strong\">How Hardware Wallets Work<\/strong><\/h4>\r\n<p class=\"import-Normal\">Hardware wallets store private keys in a secure chip on the device, isolated from the internet, which prevents them from being exposed to hackers or malware.<\/p>\r\n<p class=\"import-Normal\">To sign transactions, users must connect their hardware wallet to a computer or mobile device. The transaction is then signed on the device itself, meaning the private key never leaves the wallet.<\/p>\r\n<p class=\"import-Normal\">Hardware wallets often feature a PIN code, passphrase, or other security features to prevent unauthorized access.<\/p>\r\n\r\n<h4><strong class=\"import-Strong\">Contents of a Hardware Wallet<\/strong><\/h4>\r\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>Private Key<\/em><\/strong><strong><em>:<\/em><\/strong> Stored securely in the hardware device, used to sign transactions.<\/p>\r\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>Recovery Seed<\/em><\/strong><em>:<\/em> A 12 to 24-word backup phrase that can be used to recover the wallet in case it is lost or damaged. It is advisable that the Recovery Seed is physically written down and stored away in a safe place.<\/p>\r\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>Wallet Balance<\/em><\/strong>: Information is displayed when connected to a companion app or software, showing the amount of cryptocurrency, the wallet holds.<\/p>\r\n\r\n<h3><strong class=\"import-Strong\"><strong>Comparative Differences<\/strong><\/strong><strong class=\"import-Strong\"><strong> Between Software and Hardware Wallets<\/strong><\/strong><\/h3>\r\n<table>\r\n<thead>\r\n<tr>\r\n<th style=\"border: 0.5pt solid windowtext;text-align: center\"><strong class=\"import-Strong\"><strong>Wallet Features<\/strong><\/strong><\/th>\r\n<th style=\"border: 0.5pt solid windowtext;text-align: center\"><strong class=\"import-Strong\"><strong>Software Wallets<\/strong><\/strong><\/th>\r\n<th class=\"TableGrid-C\" style=\"border: 0.5pt solid windowtext;text-align: center\"><strong class=\"import-Strong\"><strong>Hardware Wallets<\/strong><\/strong><\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr class=\"TableGrid-R\">\r\n<th class=\"TableGrid-C\" style=\"border: 0.5pt solid windowtext\">&nbsp;\r\n\r\n<strong class=\"import-Strong\">Security<\/strong><\/th>\r\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Are Vulnerable to malware, phishing, and online attacks<\/td>\r\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Are highly secure due to offline storage of private keys<\/td>\r\n<\/tr>\r\n<tr class=\"TableGrid-R\">\r\n<th class=\"TableGrid-C\" style=\"border: 0.5pt solid windowtext\">&nbsp;\r\n\r\n<strong class=\"import-Strong\">Convenience<\/strong><\/th>\r\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Accessible from any device with internet connectivity<\/td>\r\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Requires physical device and connection to computer\/phone<\/td>\r\n<\/tr>\r\n<tr class=\"TableGrid-R\">\r\n<th class=\"TableGrid-C\" style=\"border: 0.5pt solid windowtext\">&nbsp;\r\n\r\n<strong class=\"import-Strong\">Uses<\/strong><\/th>\r\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Ideal for frequent trading and smaller amounts<\/td>\r\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Ideal for long-term storage of large amounts of crypto<\/td>\r\n<\/tr>\r\n<tr class=\"TableGrid-R\">\r\n<th class=\"TableGrid-C\" style=\"border: 0.5pt solid windowtext\">&nbsp;\r\n\r\n<strong class=\"import-Strong\">Cost<\/strong><\/th>\r\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Free or low-cost<\/td>\r\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Typically range from $50 to $200 depending on model<\/td>\r\n<\/tr>\r\n<tr class=\"TableGrid-R\">\r\n<th class=\"TableGrid-C\" style=\"border: 0.5pt solid windowtext\">&nbsp;\r\n\r\n<strong class=\"import-Strong\">Backup Method<\/strong><\/th>\r\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Backup can be stored on cloud or external device<\/td>\r\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Backup via a recovery seed, which must be kept offline<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<h3><strong class=\"import-Strong\">Table 6-1 Comparative Analysis of Software Vs. Hardware Crypto Wallets<\/strong><\/h3>\r\n<h3><strong class=\"import-Strong\"><strong>Additional Features of <\/strong><\/strong><strong class=\"import-Strong\"><strong>some <\/strong><\/strong><strong class=\"import-Strong\"><strong>Crypto Wallets<\/strong><\/strong><\/h3>\r\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Multi<\/em><\/strong><strong class=\"import-Strong\"><em>-<\/em><\/strong><strong class=\"import-Strong\"><em>signature Wallets<\/em><\/strong><strong><em>:<\/em><\/strong> These wallets require more than one private key to authorize a transaction. This adds an extra layer of security, often used by organizations or individuals who want to ensure no single party can move the funds without approval from others.<\/p>\r\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Decentralized Finance (DeFi) Integration<\/em><\/strong><strong><em>:<\/em><\/strong> Some wallets (like MetaMask) allow users to interact with decentralized finance protocols directly from the wallet interface, enabling activities like lending, borrowing, or trading directly from the wallet without needing centralized exchanges.<\/p>\r\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Staking<\/em><\/strong><strong><em>:<\/em><\/strong> Some crypto wallets allow users to stake certain cryptocurrencies (like Ethereum 2.0 or Cardano) directly from the wallet, allowing them to earn rewards for participating in the network\u2019s consensus mechanism. Some refer to this as passive income.<\/p>\r\n<p class=\"import-NormalWeb\" style=\"margin-left: 36pt\">Certain types of Networks do not use Miners as is done for Bitcoins to form transaction validation and to reach consensus. By staking an amount of crypto currency specified by the network means setting aside a specified amount of crypto coins for some period in time. This is also called <em>locking a stake<\/em>. During this period of time, crypto coins can\u2019t be traded, or sold by the staker. Having a stake in the system makes that individual a \u201cValidator\u201d. Validators are the folks that run and manage the blockchain distribution as previously mentioned. i.e. they are, in function, very similar to the miners of bitcoins. Validators are rewarded for their participation based on the amount they have \u201cdeposited\u201d as stake in the system. This function is known as <em>Proof-of-Stake<\/em><em> (<\/em><em>PoS<\/em>). The process for Proof-of-Stake is very similar to that of Bitcoin\u2019s Proof-of-Work (PoW).<\/p>\r\n\r\n<div class=\"textbox\">\r\n<h3><strong>Licenses and Attribution<\/strong><\/h3>\r\n<h4>CC Licensed Content, Original<\/h4>\r\n<span data-teams=\"true\">This educational material includes AI-generated content from ChatGPT by OpenAI. The original content created by Mohammed Kotaiche from Hillsborough Community College is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License\u00a0<a id=\"menur5so\" class=\"fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn\" title=\"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/deed.en\" href=\"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/deed.en\" rel=\"noreferrer noopener\" aria-label=\"Link CC BY-NC 4.0\">CC BY-NC 4.0<\/a><\/span>\r\n\r\n<hr \/>\r\n\r\n<h4><strong>CC Licensed Content Included<\/strong><\/h4>\r\n<ul>\r\n \t<li><a href=\"https:\/\/www.researchgate.net\/figure\/Distributed-computer-system_fig1_220066154\">Distributed computer system<\/a>. Courtesy of ResearchGate.\u00a0<a href=\"http:\/\/cc%20by-nd%204.0\/\">CC BY-ND<\/a><\/li>\r\n \t<li>Wikipedia contributors. (2023). <em>Environmental impact of Bitcoin<\/em>. In <em>Wikipedia<\/em>. Retrieved December 4, 2024, from <a href=\"https:\/\/en.wikipedia.org\/wiki\/Environmental_impact_of_bitcoin\" target=\"_new\" rel=\"noopener\">Wikipedia: Environmental Impact of Bitcoin<\/a><\/li>\r\n \t<li>Wikipedia contributors. (2023). <em>Cryptocurrency<\/em>. In <em>Wikipedia<\/em>. Retrieved December 4, 2024, from <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptocurrency\" target=\"_new\" rel=\"noopener\">Wikipedia: Cryptocurrency<\/a><\/li>\r\n \t<li><a href=\"https:\/\/www.researchgate.net\/figure\/Mainframe-Architecture_fig2_275405572\">Mainframe Architecture<\/a>\u00a0Courtesy of ResearchGate.\u00a0<a href=\"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/\">CC BY-ND<\/a><\/li>\r\n \t<li><a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:1st_GLAM_WC_libraries_edit-a-thon_catering_receipt_muffins.JPG\">Catering Receipt Discott<\/a>\u00a0\u00a0<a href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/3.0\/deed.en\">CC BY-SA<\/a><\/li>\r\n \t<li><a href=\"https:\/\/www.researchgate.net\/publication\/387457309_Data_Management_and_Security_in_Blockchain_Networks\">Data Management and Security in Blockchain Networks<\/a><a href=\"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/deed.en\">\u00a0CC BY-NC<\/a><\/li>\r\n \t<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Hash_function#\/media\/File:Hash_table_4_1_1_0_0_1_0_LL.svg\">A hash function that maps names to integers from 0 to 15<\/a>. Public Domain<\/li>\r\n \t<li><a href=\"https:\/\/pixabay.com\/illustrations\/mountains-river-nature-landscape-7145101\/\">Mountains Non Fungible Token River<\/a>\u00a0StefWithAnF\u00a0<a href=\"https:\/\/pixabay.com\/service\/license-summary\/\">Pixabay <\/a><\/li>\r\n \t<li><a href=\"https:\/\/www.flickr.com\/photos\/194709736@N03\/\">BestCryptoCodes<\/a>\u00a0<a href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/\">CC BY<\/a><\/li>\r\n<\/ul>\r\n<h4>Other Licensed Content Included<\/h4>\r\n<ul>\r\n \t<li>Astra Security. (n.d.). <i>Cybercrime statistics<\/i>. Retrieved from <a href=\"https:\/\/www.astrasecurity.com\/cybercrime-statistics\" target=\"_blank\" rel=\"noopener\">Astra Security\u2019s Cybercrime Statistics<\/a>.<\/li>\r\n \t<li>Basel Committee on Banking Supervision. (2019). <i>Basel III: Finalising post-crisis reforms<\/i>. Retrieved from <a href=\"https:\/\/www.bis.org\/bcbs\/publ\/d424.htm\" target=\"_blank\" rel=\"noopener\">Basel III: Finalising Post-Crisis Reforms on the BIS Website<\/a>.<\/li>\r\n \t<li>Cybersecurity and Infrastructure Security Agency (CISA). (n.d.). <i>The attack on Colonial Pipeline: What we\u2019ve learned and what we\u2019ve done over the past two years<\/i>. Retrieved from <a href=\"https:\/\/www.cisa.gov\/colonial-pipeline-attack-lessons\" target=\"_blank\" rel=\"noopener\">CISA\u2019s Summary of the Colonial Pipeline Attack<\/a>.<\/li>\r\n \t<li>Cybersecurity Ventures. (n.d.). <i>Cybercrime to cost the world $10.5 trillion annually by 2025<\/i>. Retrieved from <a href=\"https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Ventures\u2019 Cybercrime Cost Projection<\/a>.<\/li>\r\n \t<li>Demolition Kitchen Video. (2016, November 1). <i>Master Charge Card \u2013 Television commercial, 16mm<\/i> [Video]. Internet Archive. Retrieved from <a href=\"https:\/\/archive.org\/details\/master-charge-card-television-commercial\" target=\"_blank\" rel=\"noopener\">Master Charge Card Commercial on Internet Archive<\/a>.<\/li>\r\n \t<li>Hedges, B. (2019, May 20). <i>How BankAmericard became Visa \u2013 Story of the first credit card<\/i> [Video]. YouTube. Retrieved from <a href=\"https:\/\/www.youtube.com\/watch?v=zceRRcLJfPg\" target=\"_blank\" rel=\"noopener\">How BankAmericard Became Visa \u2013 Story of the First Credit Card on YouTube<\/a>.<\/li>\r\n \t<li>Identity Theft Resource Center. (2023). <i>2023 Data Breach Report<\/i>. Retrieved from <a href=\"https:\/\/www.idtheftcenter.org\/data-breach-reports\/\" target=\"_blank\" rel=\"noopener\">Identity Theft Resource Center\u2019s 2023 Data Breach Report<\/a>.<\/li>\r\n \t<li>MetaMask. (n.d.). <i>How to setup the crypto wallet browser extension<\/i> [Video]. YouTube. Retrieved from <a href=\"https:\/\/www.youtube.com\/watch?v=Vj5WGmVhK2k\" target=\"_blank\" rel=\"noopener\">MetaMask\u2019s Crypto Wallet Setup Guide on YouTube<\/a>.<\/li>\r\n \t<li>Tangem. (n.d.). <i>Tangem Ring: Experience the future of crypto wallets<\/i> [Video]. YouTube. Retrieved December 4, 2024, from <a href=\"https:\/\/www.youtube.com\/watch?v=NwAqmM1AgCc\" target=\"_blank\" rel=\"noopener\">Tangem Ring Video on YouTube<\/a>.<\/li>\r\n \t<li>The History Guy: History Deserves to Be Remembered. (2019, November 29). <i>History in plastic: Credit cards<\/i> [Video]. YouTube. Retrieved from <a href=\"https:\/\/www.youtube.com\/watch?v=LA44KRSv9ds\" target=\"_blank\" rel=\"noopener\">History in Plastic: Credit Cards on YouTube<\/a>.<\/li>\r\n \t<li>University of Maryland. (n.d.). <i>Study: Hackers attack every 39 seconds<\/i>. A. James Clark School of Engineering. Retrieved from <a href=\"https:\/\/eng.umd.edu\/news\/story\/study-hackers-attack-every-39-seconds\" target=\"_blank\" rel=\"noopener\">University of Maryland\u2019s Hackers Attack Every 39 Seconds Study<\/a>.\r\n<ul>\r\n \t<li style=\"list-style-type: none\">\r\n<ul>\r\n \t<li style=\"list-style-type: none\">\r\n<ul>\r\n \t<li style=\"list-style-type: none\"><\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>","rendered":"<div class=\"__UNKNOWN__\">\n<h2><span class=\"ez-toc-section\" id=\"Introduction\"><\/span>Introduction<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><iframe loading=\"lazy\" id=\"oembed-1\" title=\"Introduction to Blockchains\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/OkpXA0B_7rE?feature=oembed&#38;rel=0\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>Upon completion of this chapter, the student will be able to:<\/p>\n<ul>\n<li>Describe 2 types of Computer Networks, Centralized Vs. Decentralized<\/li>\n<li>Describe the 3 types of Network Configurations<\/li>\n<li>Define the foundational concepts of Blockchains in Fintech<\/li>\n<li>Describe Fintech Peer-to-Peer technologies<\/li>\n<li>Define Blockchains, their purpose and how Blockchains work<\/li>\n<li>Describe Ownership and Transfer of Ownership in Blockchains<\/li>\n<li>Describe Fingerprinting the Data in a Blockchain Record<\/li>\n<li>Identify key Cryptographic technologies used in Blockchains<\/li>\n<li>Describe the role of Peers in Blockchain Networks<\/li>\n<li>Define and Describe Smart Contracts<\/li>\n<li>Define and Describe Non-Fungible Tokens<\/li>\n<li>Discuss the different types and uses of Crypto Wallets<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<p><span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav>\n<ul class='ez-toc-list ez-toc-list-level-1 ' >\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Introduction\" >Introduction<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Blockchain\" >Blockchain<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Fintech_in_Computer_Networks_%E2%80%93_The_Basics\" >Fintech in Computer Networks \u2013 The Basics<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#The_Centralized_Vs_the_Decentralized_Networks_Models\" >The Centralized Vs. the Decentralized Networks Models<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Network_Configurations_Topology\" >Network Configurations (Topology)<\/a>\n<ul class='ez-toc-list-level-3' >\n<li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Network_Communication_Protocols\" >Network Communication Protocols<\/a><\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Blockchains_and_the_relationship_to_Protocols\" >Blockchains and the relationship to Protocols<\/a>\n<ul class='ez-toc-list-level-3' >\n<li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Blockchain_is_a_protocol_for_Bitcoins\" >Blockchain is a protocol for Bitcoins<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Blockchain_is_an_Algorithm\" >Blockchain is an Algorithm<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Blockchains_define_Ownership\" >Blockchains define Ownership<\/a><\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Blockchains_%E2%80%93_How_Do_They_Actually_Work\" >Blockchains &#8211; How Do They Actually Work?<\/a>\n<ul class='ez-toc-list-level-3' >\n<li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Step-1_Transaction_Ownership\" >Step-1 Transaction Ownership<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Step-2_Protecting_Ownership\" >Step-2 Protecting Ownership<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Step-3_Storing_Transaction_Data\" >Step-3 Storing Transaction Data<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Step-4_Preparing_Ledgers_to_be_distributed\" >Step-4 Preparing Ledgers to be distributed<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Step-5_Distributing_the_Ledger\" >Step-5 Distributing the Ledger<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Step-6_Adding_new_transactions_to_the_Block\" >Step-6 Adding new transactions to the Block<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Step-7_The_single_source_of_Truth_Deciding_on_which_Ledgers_represent_the_truth\" >Step-7  The single source of Truth. Deciding on which Ledgers represent the truth<\/a><\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#The_Role_of_Peers_in_Blockchain_Networks\" >The Role of Peers in Blockchain Networks<\/a>\n<ul class='ez-toc-list-level-3' >\n<li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#There_is_No_Free_Lunch\" >There is No Free Lunch<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#A_Mining_Puzzle_Proof-of-Work\" >A Mining Puzzle (Proof-of-Work)<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Block_Rewards_and_Incentives\" >Block Rewards and Incentives<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Block_Authentication_Validation\" >Block Authentication &amp; Validation<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Difficulty_Adjustment\" >Difficulty Adjustment<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Mining_Hardware\" >Mining Hardware<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Mining_Pools\" >Mining Pools<\/a><\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Current_Applications_of_Blockchains\" >Current Applications of Blockchains<\/a>\n<ul class='ez-toc-list-level-3' >\n<li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Contracts_%E2%80%93_The_Background\" >Contracts \u2013 The Background<\/a><\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Digital_Contracts\" >Digital Contracts<\/a>\n<ul class='ez-toc-list-level-3' >\n<li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Evolution_from_Contracts_to_eContracts_to_Smart_Contracts\" >Evolution from Contracts to eContracts to Smart Contracts<\/a><\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-31\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Electronic_Data_Interchange_EDI\" >Electronic Data Interchange (EDI)<\/a>\n<ul class='ez-toc-list-level-3' >\n<li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-32\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#The_E-Sign_Act\" >The E-Sign Act<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-33\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Public_Key_Infrastructure_PKI\" >Public Key Infrastructure (PKI)<\/a><\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-34\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Blockchain_Technology\" >Blockchain Technology<\/a>\n<ul class='ez-toc-list-level-3' >\n<li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-35\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Smart_Contracts_Automation_and_Self-Execution\" >Smart Contracts Automation and Self-Execution<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-36\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Immutability\" >Immutability<\/a><\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-37\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Non-Fungible_Tokens_NFT_and_Digital_Assets\" >Non-Fungible Tokens (NFT) and Digital Assets<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-38\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#How_do_NFTs_work\" >How do NFT\u2019s work?<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-39\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Key_Characteristics_of_NFTs\" >Key Characteristics of NFTs<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-40\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#NFT_Uses\" >NFT Uses<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-41\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Crypto_Wallets\" >Crypto Wallets<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-42\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Sending_and_Receiving_Cryptocurrency\" >Sending and Receiving Cryptocurrency<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-43\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Types_of_Crypto_Wallets\" >Types of Crypto Wallets<\/a>\n<ul class='ez-toc-list-level-3' >\n<li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-44\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Software_Wallets\" >Software Wallets<\/a>\n<ul class='ez-toc-list-level-4' >\n<li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-45\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Types_of_Software_Wallets\" >Types of Software Wallets<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-46\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Contents_of_a_Software_Wallet\" >Contents of a Software Wallet<\/a><\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-47\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Hardware_Wallets\" >Hardware Wallets<\/a>\n<ul class='ez-toc-list-level-4' >\n<li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-48\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Examples_of_Hardware_Wallets\" >Examples of Hardware Wallets<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-49\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#How_Hardware_Wallets_Work\" >How Hardware Wallets Work<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-50\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Contents_of_a_Hardware_Wallet\" >Contents of a Hardware Wallet<\/a><\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-51\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Comparative_Differences_Between_Software_and_Hardware_Wallets\" >Comparative Differences Between Software and Hardware Wallets<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-52\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Table_6-1_Comparative_Analysis_of_Software_Vs_Hardware_Crypto_Wallets\" >Table 6-1 Comparative Analysis of Software Vs. Hardware Crypto Wallets<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-53\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Additional_Features_of_some_Crypto_Wallets\" >Additional Features of some Crypto Wallets<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-54\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Licenses_and_Attribution\" >Licenses and Attribution<\/a>\n<ul class='ez-toc-list-level-4' >\n<li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-55\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#CC_Licensed_Content_Original\" >CC Licensed Content, Original<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-56\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#CC_Licensed_Content_Included\" >CC Licensed Content Included<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-57\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/5\/#Other_Licensed_Content_Included\" >Other Licensed Content Included<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/nav>\n<\/div>\n<h2><span class=\"ez-toc-section\" id=\"Blockchain\"><\/span>Blockchain<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Blockchain is a transformative technology that \u201cmanufactures\u201d the trust through a decentralized ledger (DeFi) of financial activities, meaning that no single entity controls the technology infrastructure (Cybersecurity Ventures, n.d.). Transactional data is distributed across a network of computers (in Blockchains these are called Nodes), that all have to agree through mutual consensus, that a transaction is valid before it is permanently recorded. This feature allows for transaction records to become immutable- due to advanced Cryptography they can\u2019t be altered, deleted or challenged thus allowing for transparency, security, and validity in recording transactions without the need for a central authority. Transactional data in blockchains is distributed across a network of computers (called Nodes), offering significant security advantages in the face of increasing cybercrime threats (Astra Security, n.d.).<\/p>\n<h2 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Fintech_in_Computer_Networks_%E2%80%93_The_Basics\"><\/span><strong>Fintech in <\/strong><strong>Computer Networks<\/strong><strong> \u2013 The Basics<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"import-Normal\"><em>Computer Networks<\/em> in Financial Technologies are defined as two or more computers connected together. The connection can be through physical wires or through the airways by wireless communications. A computer network allows users to share files such as a Word document or Excel spreadsheets, or process transactions using applications such as Uber, Venmo, CashApp, Meta, X, and thousands of others. Networks can be as small as two laptops (or 2 mobile phones) connected wirelessly, or the largest ever built computer network known as the Internet.<\/p>\n<h2 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"The_Centralized_Vs_the_Decentralized_Networks_Models\"><\/span><strong>The Centralized<\/strong><strong> Vs. the Decentralized Networks Model<\/strong><strong>s<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<figure style=\"width: 444px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/image1.png\" alt=\"Distributed computer system\" width=\"444\" height=\"330\" \/><figcaption class=\"wp-caption-text\"><a href=\"https:\/\/www.researchgate.net\/figure\/Distributed-computer-system_fig1_220066154\">Distributed computer system<\/a>. Courtesy of ResearchGate. <a href=\"http:\/\/CC BY-ND 4.0\">CC BY-ND<\/a><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p class=\"import-Normal\">As shown in the figure, <em>Nodes<\/em> <em>(AKA Connected Computers)<\/em> are shown as Terminals and sometimes referred to as Client. Clients are the actual devices owned by you, me and billions of other people and business. Traditionally, and up to around the year 2000, this networking method was used by large institutions such as Banks, Governments, Universities, and large industry that owned and operated very large and very expensive computers known as mainframes. Communication was generally limited to only internal company employees that were connected to the mainframe. Key to centralization was security, and computer manufacturer dependance. All the computers connected in this \u201ccentralized\u201d fashion required that all nodes to be made by the same manufacturer. In a centralized computing model, the nodes are \u201cslaved\u201d to the central processor which decided which node can share information, when it can share its information\u00a0and to whom the information can be sent.Centralized computing models have shown significant vulnerabilities, as evidenced by a high volume of data breaches reported annually (Identity Theft Resource Center, 2023).&#8221;<\/p>\n<p class=\"import-Normal\">With the explosive technology change in the 90\u2019s and massive adoption of Personal Computing (PC), industry began moving to full independence from the single computer manufacturer. Prior to the 90\u2019s <em>i<\/em><em>nteroperability<\/em> was a major issue<em>. Interoperability<\/em> <em>issues<\/em> meant that manufacturer A computers could not use equipment made by, nor it could communicate with manufacturer B equipment. Personal Computing also brought along Home Computing, giving rise to work-from-home and remote connectivity. Two key enabling technologies were behind this rise. Firstly, the development of \u201cdecentralized\u201d technologies, and secondly the Internet with its open communication standards.<\/p>\n<figure id=\"attachment_664\" aria-describedby=\"caption-attachment-664\" style=\"width: 300px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-664 size-medium\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/Mainframe-Architecture-1-300x263.png\" alt=\"Mainframe architecture.\" width=\"300\" height=\"263\" srcset=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/Mainframe-Architecture-1-300x263.png 300w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/Mainframe-Architecture-1-65x57.png 65w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/Mainframe-Architecture-1-225x197.png 225w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/Mainframe-Architecture-1-350x306.png 350w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/Mainframe-Architecture-1.png 474w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-664\" class=\"wp-caption-text\"><a href=\"https:\/\/www.researchgate.net\/figure\/Mainframe-Architecture_fig2_275405572\">Mainframe Architecture<\/a> Courtesy of ResearchGate. <a href=\"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/\">CC BY-ND<\/a><\/figcaption><\/figure>\n<p class=\"import-Normal\">Decentralization freed client computers (nodes) from having to go through a central computer to process its transactions. Any computer device, from any manufacturer (full interoperability) can connect with any other manufacturer\u2019s devices.<\/p>\n<h2 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Network_Configurations_Topology\"><\/span><strong>Network <\/strong><strong>Configuration<\/strong><strong>s<\/strong><strong> (Topology)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Essentially, there are 3 types of configurations that we call <em>Topologies <\/em><em>of networks<\/em> with many variations on the theme<i>. <\/i><em>Local Area Networks (LAN):<\/em><\/p>\n<p>A local area network, is a single set of connected computers located within a single geography (a school campus, or an industrial complex, or an office building). A variation on local, is a single company that has several remote sites (for example HCC has different campuses, in different geographical locations, is still called a Local Area Network, although we use the term as Metropolitan Area Network (MAN). The term \u201clocal\u201d in this instance signifies the singularity of ownership of the network. Your home network is also defined as a Local Area Network. Amongst many other uses, a key purpose of Local Area Networks is to share common resources (think of a single printer that servers an entire floor in an office building).<\/p>\n<p><iframe loading=\"lazy\" id=\"oembed-2\" title=\"What is a LAN (Local Area Network)?\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/RReSGlFFGnk?feature=oembed&#38;rel=0\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<\/div>\n<div class=\"__UNKNOWN__\">\n<p>LAN, Standard YouTube License<\/p>\n<p><em>Wide Area Network<\/em><em> (WAN)<\/em>. The term \u201cwide\u201d signifies the fact that several local area networks are geographically far apart and are connected through other public networks. The WAN communication is decentralized; however, the LANs remain in a form of centralization due to the fact that owners of the LANs still have control over their individual LANs.<\/p>\n<p><iframe loading=\"lazy\" id=\"oembed-3\" title=\"What is a WAN (Wide Area Network)?\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/UL_uh--LuAo?feature=oembed&#38;rel=0\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>WAN, Standard YouTube License<\/p>\n<p>Both LANs and WANs follow the centralized computing model, in the sense that they are \u201ccentrally\u201d managed. For most companies, businesses, home, schools, etc., their networks are managed by their organization (i.e., for your home network, you buy, install, configure and connect your own equipment to configure it as your home\/local area network, then you join the decentralized portion (WAN or the internet)<\/p>\n<p><em>Peer-To-Peer<\/em><em> (P2P)<\/em><em> Networks<\/em>. Peer-to-Peer networks are a type of a \u201cPrivate Connection\u201d of computers. In this private connection, everyone owns and manages their own system. The term \u201cprivate\u201d actually means that only certain members of a particular group of computers and people are \u201clogically\u201d grouped and connected together and contrary to the first 2 types, LAN\u2019s and WAN\u2019s, where the connection is physical. Meaning, the Nodes in a Peer-To-Peer are NOT centrally managed and could exist within a public network such as the internet.<\/p>\n<p><iframe loading=\"lazy\" id=\"oembed-4\" title=\"What is a Peer to Peer Network? Blockchain P2P Networks Explained\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/ie-qRQIQT4I?feature=oembed&#38;rel=0\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<div id=\"h5p-5\">\n<div class=\"h5p-iframe-wrapper\"><iframe id=\"h5p-iframe-5\" class=\"h5p-iframe\" data-content-id=\"5\" style=\"height:1px\" src=\"about:blank\" frameBorder=\"0\" scrolling=\"no\" title=\"What is a Peer to Peer Network? Blockchain P2P Networks Explained: Transcript\"><\/iframe><\/div>\n<\/div>\n<p>Lisk Academy, Standard YouTube License<\/p>\n<p class=\"import-Normal\">A key characteristic of P2P networks is the use of <em>consens<\/em><em>us<\/em>. Meaning the way the connected computers pass data from one to another is through an agreement mechanism. This mechanism, as we\u2019ll see later, is at the core of how Blockchains work and why they have disrupted so much of the traditional technologies that finance has relied upon.<\/p>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Network_Communication_Protocols\"><\/span><strong>Network Communication Protocols<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">Networks use protocols, which are standardized communication rules for exchanging messages&#8230; ensuring protection from the high-frequency hacking attempts that occur every 39 seconds (University of Maryland, n.d.). Think of human protocols of greetings. Typically, when one is addressed by a \u201cGood Morning\u201d greeting, there is an expectation of same or better curtesy is replied back. Computers exchange and share data and processing tasks by organizing the messages into structured protocols (i.e., Client computer-1, sends a message to client computer-2 \u201c Hello, I have Data for you\u201d. Client Computer-2 acknowledge receipt and replies back saying \u201cHello to you too, I am free and able to receive data. Go ahead and send it through\u201d. Client Computer-1. Then sends its data and may request Client Computer-2 to verify receipt. This back and forth messaging typically ends by an \u201cend of session message\u201d that closes the communication gates (ports) between the sender and recipient.<\/p>\n<p class=\"import-Normal\">This was an over simplified view of communication protocols between computers. In today\u2019s modern computer systems there are a plethora of different configurations and methods of the two basic <em>Synchronous <\/em>(sender speaks, and receiver listens) as well as <em>Asynchronous<\/em> (both sender and receiver speak and listen at the same time) methods. Current applications such as email, instant messaging, text messaging, video conferencing, voice over IP (VoIP), social media messaging, online forums, online surveys, data-driven marketing, image\/video messaging and a whole list of thousands of others require variation on the theme of synchronous and asynchronous.<\/p>\n<h2 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Blockchains_and_the_relationship_to_Protocols\"><\/span><strong>Blockc<\/strong><strong>hains <\/strong><strong>and the relationship to Protocols<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"import-Normal\">As we mentioned earlier, Blockchains are a decentralized form of a <em>public ledger<\/em> (a record of transactions that are seen by, and validated and approved for recording by peers), that is executed on a decentralized network of computers that uses P2P networking messaging relying on a voting principle of agreement that transactions sent\/received are actually valid transactions. The voting structure of this group of computers is what we refer to as <em>consensus<\/em> (agreement). The science and technology of Blockchains is rooted in mathematics especially in the area of coding theory and practical applications that dates back to the early 1970\u2019s.<\/p>\n<p class=\"import-Normal\">In 2008 someone by the name Satoshi Nakamoto proposed a new, decentralized form of an electronic cash system which he called Bitcoin. Many believe Satoshi Nakamoto does not exist and the true identity of the author remains a mystery till today. Nevertheless, the underlying principle of this system is a protocol he called Bitcoin (BTC).<\/p>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Blockchain_is_a_protocol_for_Bitcoins\"><\/span><strong>Blockchain<\/strong><strong> is a protocol for Bitcoins<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<figure style=\"width: 387px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/thumb\/2\/2e\/1st_GLAM_WC_libraries_edit-a-thon_catering_receipt_muffins.JPG\/600px-1st_GLAM_WC_libraries_edit-a-thon_catering_receipt_muffins.JPG?20140712134517\" alt=\"Example of a receipt.\" width=\"387\" height=\"387\" \/><figcaption class=\"wp-caption-text\"><a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:1st_GLAM_WC_libraries_edit-a-thon_catering_receipt_muffins.JPG\">Catering Receipt Discott<\/a>\u00a0 <a href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/3.0\/deed.en\">CC BY-SA<\/a><\/figcaption><\/figure>\n<p class=\"import-Normal\"><em>Blockchain as a structure of Data<\/em>: Structured data is an organized form of data. Transactions follow a specific protocol (sequential steps that describe how the data is to be organized. e.g., think of a typical paper receipt you receive from a merchant as a single transaction that contains:<\/p>\n<ul>\n<li>Merchant Name: At the top, bold and prominent.<\/li>\n<li>Address: Beneath the merchant name, possibly in smaller font.<\/li>\n<li>Date\/Time: Next, the transaction date and time.<\/li>\n<li>Itemized List: A list of purchased items with their names, quantities, and prices, followed by any applicable tax and a subtotal.<\/li>\n<li>Total Amount: At the bottom, the total amount spent.<\/li>\n<li>Payment Method: Indicates if payment was made by credit card, cash, Debit card, or other means.<\/li>\n<li>Thank You Note: A simple message. &#8220;Thank you for your purchase!&#8221;<\/li>\n<\/ul>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Blockchain_is_an_Algorithm\"><\/span><strong>Blockchain i<\/strong><strong>s an Algorithm<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">An algorithm in software engineering refers to a series of sequential steps that will be followed by a computer to solve a problem. This often requires a specific <em>Data<\/em> <em>structure<\/em> (method of how the data is organized) to allow for democratic voting and distributed negotiation amongst peers in a network in order to reach consensus (i.e., agreement on the solution).<\/p>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Blockchains_define_Ownership\"><\/span><strong>Blockchains define Ownership <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">So you lost the paper receipt in our example, and you go back to the store needing to return an item. How do you prove you actually had paid for it? Receipts can easily be faked. Copies of receipts can also be lost by the merchant, or worst, can be altered by unscrupulous merchants. These are but few examples of a host of issues associated with proving ownership. Witness Testimony is your savior especially if the witness is independent and the more independent witnesses you have the closer to the truth of ownership you\u2019ll get.<\/p>\n<p class=\"import-Normal\">In a P2P network, all network participants would have seen and recorded your transaction (i.e., the receipt) and will vouch (again via consensus) on your behalf. Making your claim unquestionable.<\/p>\n<figure id=\"attachment_354\" aria-describedby=\"caption-attachment-354\" style=\"width: 480px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-354 size-full\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/image7-e1733935373890.png\" alt=\"Ownership Block. Long description in the text beside image.\" width=\"480\" height=\"278\" srcset=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/image7-e1733935373890.png 480w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/image7-e1733935373890-300x174.png 300w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/image7-e1733935373890-65x38.png 65w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/image7-e1733935373890-225x130.png 225w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/image7-e1733935373890-350x203.png 350w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><figcaption id=\"caption-attachment-354\" class=\"wp-caption-text\"><a href=\"https:\/\/www.researchgate.net\/publication\/387457309_Data_Management_and_Security_in_Blockchain_Networks\">Data Management and Security in Blockchain Networks<\/a><a href=\"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/deed.en\"> CC BY-NC<\/a><\/figcaption><\/figure>\n<p class=\"import-Normal\">The image shows how ownership in a block is structured. Every transaction, regardless of merchant, customer, bank, or anyone else that \u201cprocesses\u201d the transaction data, knows and follows the same structure. The Figure shows one complete block. As we have introduced in the Cyber Security chapter, identification is established by applying basic security principles of validating previously agreed upon identifiers such as:<\/p>\n<ul>\n<li>Logon ID\u2019s<\/li>\n<li>Passwords<\/li>\n<li>Personal Identification Numbers (PIN)<\/li>\n<li>Customer Numbers<\/li>\n<li>And a host of other possible identifiers<\/li>\n<\/ul>\n<p class=\"import-Normal\">Security of Blockchains extends the second principle of Cyber Security, Authentication. Authentication provides 2 of the 3 requirements for the Confidentiality, Integrity, and Availability (CIA) principles by preventing anyone, other than the actual owner, from assuming his\/her identity. Authentication proves identity by the 3 key principles of:<\/p>\n<ul>\n<li><em>Things you have<\/em> (a social security card, a car, a credit card, a school ID, or a Driver\u2019s license amongst many more things we carry)<\/li>\n<li><em>Things you Know <\/em>(A Person, Place or a Thing that you, and only you, would remember such as name of your 4<sup>th<\/sup> grade teacher; and only you would know your great grand-mother\u2019s maiden name, etc.)<\/li>\n<li><em>Things you are<\/em> (your blood type, your DNA, your retina imprints, your fingerprints, your voice signature, etc.)<\/li>\n<\/ul>\n<p class=\"import-Normal\">The third principle of Availability is achieved in Blockchains as well. In a P2P networks, the very nature of it being open to the public (i.e., seen by all nodes, and recorded by all participating nodes) assures that any unauthorized (out of consensus) activity such as errors, omissions, deletions, or even the slightest alteration would immediately be seen by all, whom originally authorized and validated the transaction, causing it to be voted out and replaced by the original transaction or any part thereof. Availability is also achieved by the fact that if 1 node in a P2P network is lost, the block is preserved on multiple other nodes in the system and can easily be regenerated.<\/p>\n<h2 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Blockchains_%E2%80%93_How_Do_They_Actually_Work\"><\/span><strong>Blockchains<\/strong><strong> &#8211;<\/strong> <strong>How <\/strong><strong>Do They <\/strong><strong>Actually Work<\/strong><strong>?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"import-Normal\">Now that we uncovered the basic fundamentals to Blockchains: the distributed (independent witnesses) consensus-based ledger, the P2P team that approves transactions, and the building blocks of ownership of a transaction, we are ready to proceed with studying how Blockchains actually work. Blockchain generation is a 7-step process:<\/p>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Step-1_Transaction_Ownership\"><\/span><strong><em>Step-1 Transaction Ownershi<\/em><\/strong><strong><em>p <\/em><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">Returning to our receipt for a moment, receipts are, legally, a form of ownership transfer. Monies were exchanged for goods or services transferred from 1<sup>st<\/sup> owner \u2013 the Merchant, to the 2<sup>nd<\/sup> owner the Customer. In the ledger, a complete history of ownership (a track record of ownership transfers) can be managed. An example would be the purchase of a home and title is transferred many times through several generations of homeowners. A complete, accurate, immutable (undeniable) history of ownership can be attained.<\/p>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Step-2_Protecting_Ownership\"><\/span><strong><em>Step-2 Protecting Ownership<\/em><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">It is not enough to have a historical track record of who actually owns a property, but there is an additional need to ensure the prevention of people from falsely claiming it, using it, (and if the property is a home), even occupying it. Strong Cryptography is the1<sup>st<\/sup> line of defense method within Blockchains that guarantees immunity from tampering with the record. Secondly, It assures identifying owners correctly and undeniably via authentication, and by authorizing only the owners to make changes to the record (such as adding a swimming pool to the recently purchased home), and thirdly by achieving consensus from peers to approve the recording of new changes and updates to the record.<\/p>\n<figure style=\"width: 540px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/image8.png\" alt=\"Example of digital signature Hash. Long description in text beside image.\" width=\"540\" height=\"414\" \/><figcaption class=\"wp-caption-text\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/Hash_function#\/media\/File:Hash_table_4_1_1_0_0_1_0_LL.svg\">A hash function that maps names to integers from 0 to 15<\/a>. Public Domain<\/figcaption><\/figure>\n<p class=\"import-Normal\">An additional safeguard method that\u2019s at the core of Blockchains is the concept of a <em>hash<\/em>. A hash is a digital signature (fingerprint) of the record just created. It is used as a key (cipher code) to prove identity, and to prove a record has not changed. Hash keys can\u2019t be used to reassemble the original block of data. They are only one way. Meaning if you run the hash multiple times on a block of data you\u2019ll always get the same hash number (signature). Hash functions run ONE WAY, meaning you can\u2019t reverse the hash order expecting to read the block. Think of a hash as a paper shredder. Run a book through it and you get thousands of little shreds of different sizes, shapes and colors. Even if you are successful reassembling it, you can\u2019t guaranty that it is the same book. What is constant in a hash is the hash number (i.e., in our example it could be count of the tiny shreds of paper). This count will always be the same no matter how many copies of the same book you run through the shredder.<\/p>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Step-3_Storing_Transaction_Data\"><\/span><strong><em>Step-3 Storing Transaction Data<\/em><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">Having defined and assured protection to Ownership is a great achievement, however incomplete. A key step is to store the new record in the ledger in such a manner that a historical track is also created. This is accomplished by issuing a new record and a new digital signature (hash) that again uniquely identifies the new transaction. The old hash number is linked to the new block and a new hash number is appended at the end of the new block thus forming a chain-like link from one block of data to the next.<\/p>\n<figure id=\"attachment_616\" aria-describedby=\"caption-attachment-616\" style=\"width: 400px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-616\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_diverse_group_of_people_standing_together_each_-300x171.jpg\" alt=\"Depicting a diverse group of people representing various professions and cultures, symbolizing teamwork and connectivity.\" width=\"400\" height=\"228\" srcset=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_diverse_group_of_people_standing_together_each_-300x171.jpg 300w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_diverse_group_of_people_standing_together_each_-1024x585.jpg 1024w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_diverse_group_of_people_standing_together_each_-768x439.jpg 768w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_diverse_group_of_people_standing_together_each_-1536x878.jpg 1536w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_diverse_group_of_people_standing_together_each_-65x37.jpg 65w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_diverse_group_of_people_standing_together_each_-225x129.jpg 225w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_diverse_group_of_people_standing_together_each_-350x200.jpg 350w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_diverse_group_of_people_standing_together_each_.jpg 1792w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-616\" class=\"wp-caption-text\">Image generated by OpenAI&#8217;s DALL\u00b7E<\/figcaption><\/figure>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Step-4_Preparing_Ledgers_to_be_distributed\"><\/span><strong><em>Step-4 Preparing Ledgers to be distributed <\/em><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">Ledgers as we have seen are a series of structured (organized) data blocks, that contain <em>Block header information<\/em> (who owns the block, how much data is in the block, the type of data in the block and the original hash number of the previous block), followed by the actual transaction data (see our example of a receipt), followed by the new hash number.<\/p>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Step-5_Distributing_the_Ledger\"><\/span><strong><em>Step-5 Distributing the Ledger <\/em><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">Once the block is organized, it is copied with as many copies as there are nodes in the P2P network by the Peers (remember, there is no central authority that directs who is to make copies, or when. Only a protocol the describes HOW to process it). Nodes, who freely choose to participate in processing a specific block of data, exchange specific details about the block amongst themselves, i.e., each node that accepted a block and made a copy of it, will look for another node that is willing to participate, make a copy and then send it to that node, this continues until consensus is achieved amongst participating nodes.<\/p>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Step-6_Adding_new_transactions_to_the_Block\"><\/span><strong>Step-6 Adding new transactions to the Block<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">At this point in the P2P network, all computers have individual copies of the data structure and are allowed to begin adding new transaction data into the ledger. Step-6 is key. The peers (the computers attached to the network), freely decide which transactions they will add into the block, i.e., some may choose only transactions that come from a certain merchant, or transactions for a certain credit card brand, or transactions headed to a certain bank. Think of it as \u201c\u2026who pays the most, gets the service first). We call this transaction aggregation. During the process of transaction aggregation, Peers actually monitor each other\u2019s work turning them into \u201csupervisors\u201d of each others work assuring data integrity as they would, quite easily, point out mistakes made in processing the data which would lead to some, or all the Peers, rejecting the block processed by a specific peer.<\/p>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Step-7_The_single_source_of_Truth_Deciding_on_which_Ledgers_represent_the_truth\"><\/span><strong>Step-<\/strong><strong>7 <\/strong><strong> The<\/strong><strong> single source of Truth. <\/strong><strong>D<\/strong><strong>eciding<\/strong> <strong>on <\/strong><strong>which Ledgers represent the truth<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">As we have seen in the previous steps, assembling the blocks by peers, often leads to having blocks containing different transactions (selecting a different credit card, different bank, different merchants, etc.). This was an early issue that the bitcoin algorithm had to solve. This was solved by forcing every node in the P2P network to decide, independently, which transaction history represents the original, i.e., the truth, in such a way that all nodes would agree with the decision.<\/p>\n<p class=\"import-Normal\">In several branches of mathematics like decision theory and more precisely the study of Swarm Intelligence, where crowds (i.e., the nodes in a P2P network) follow simple mathematical rules that forces and governs cooperation amongst a homogeneous colony of crowds, working together to find a solution (such as finding an optimal route to the solution). Using the game Chess, for example, imagine you have hundreds or thousands of players faced off with a single opponent, these players each advance one play at a time against the opponent, analyze what the opponent\u2019s possible counter move could be, and then share their findings amongst all peers. Ultimately this leads to winning the game (i.e., the Truth has been determined). Remember, single computers can play the entire chess game board, recording and remembering the outcome of every move of all (10 to the power 120) possible moves, in a matter of minutes. Blockchains are used by many P2P systems such as BitCoins. As of 2024, there are more than 1 Million Bitcoin nodes (computers) around the world. Hence, generating a block of \u201ctrue and approved\u201d set of blocks of approximately 144 blocks every 24 hours. Each new block references the block preceding it and is tagged with a new block identifier. In this manner, all blocks are linked together sequentially (thus the term chain of blocks of transactions) all the way back to the seminal and very first block generated in 2009 by Satoshi Nakamoto.<\/p>\n<h2 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"The_Role_of_Peers_in_Blockchain_Networks\"><\/span><strong>T<\/strong><strong>he R<\/strong><strong>ole of Peers in Blockchain Networks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"There_is_No_Free_Lunch\"><\/span><strong>There is No Free Lunch <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">Peer Nodes on a P2P network that generates new Blockchains are known as Crypto Miners. Crypto Miners are dedicated, highly specialized, and powerful computers (not people) that \u201cmine\u201d the Blockchains process attempting to be the very first miner that solves the complex cryptographic puzzle and reaches consensus (i.e., creating a new block) and verifying authenticity of transactions causes the P2P network to generate the issuance (minting) a new release of a quantity of coins to the miner as a reward. Different Crypto Currency systems (Ethereum and dozens more) use variations on the theme of Blockchains, and some do not use Blockchains at all. For this discussion however, we will explain in detail using the <em>Bitcoin mining<\/em> process:<\/p>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"A_Mining_Puzzle_Proof-of-Work\"><\/span><em>A <\/em><em>Mining Puzzle (Proof-of-Work)<\/em><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">At the core of Bitcoin mining is the concept of <em>Proof-of-Work (PoW)<\/em>. PoW ensures that adding new blocks, by a miner, to the blockchain requires extensive computational effort, making it difficult to manipulate the system. As we have previously seen, to add a new block, miners must create a valid hash (a cryptographic signature) for the block.<\/p>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Block_Rewards_and_Incentives\"><\/span><em>Block Rewards and Incentives<\/em><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">As per the title of this section No Free Lunch, Financial Technologies minimizes to a great degree the costs associated with processing transactions, however, it does not eliminate all costs. Costs directly associated with handling Transactions through Blockchains and Crypto currency are:<\/p>\n<ul>\n<li><em>Coins<\/em>: When a miner successfully finds a valid hash, they broadcast the block to the network, and it gets added to the Blockchain. In return, the miner receives 3.12 coins.<\/li>\n<li><em>Transaction Fees<\/em>: In addition to the block rewards, miners also receive transaction fees paid by users who spend or use the Bitcoin system. These fees vary depending on network demand and the size of the transaction.<\/li>\n<\/ul>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Block_Authentication_Validation\"><\/span><em>Block<\/em><em> Authentication &amp; Validation<\/em><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">Once a miner solves the cryptographic puzzle, the new block is broadcasted to the entire Bitcoin network. Other miners and nodes (participants who maintain a copy of the blockchain) validate the block and the transactions within it. They check that the block\u2019s hash is valid, the transactions are legitimate, and that the miner has not <em>double-spent<\/em> Bitcoin or created fraudulent transactions (Wikipedia 2023).<\/p>\n<p class=\"import-Normal\">If the block is validated, it is added to the blockchain. The miner who solved the puzzle is now rewarded with the block reward and transaction fees, and the process repeats for the next block.<\/p>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Difficulty_Adjustment\"><\/span><em>Difficulty Adjustment<\/em><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">The Bitcoin network adjusts the difficulty of the Proof-of-Work puzzle approximately every 2016 blocks (about every two weeks). The goal is to keep the average block time at around 10 minutes. When miners solve for blocks too quickly (due to increased computational power provided by technology improvements), mining difficulty will proportionally increase. If miners are taking longer (due to fewer miners or less computational power), the difficulty decreases.<\/p>\n<p class=\"import-Normal\">This adjustment ensures that new bitcoins are created at a consistent rate, approximately every 10 minutes, regardless of the total computational power (hash rate) of the network.<\/p>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Mining_Hardware\"><\/span><em>Mining Hardware<\/em><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">Initially, Bitcoin mining could be done on standard personal computers. As the Bitcoin network grew and more miners joined, it became necessary to use specialized hardware to remain competitive. Today\u2019s computers used for mining use highly specialized hardware that is specifically designed to only run software that \u201csolves the puzzle\u201d.<\/p>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Mining_Pools\"><\/span><em>Mining Pools<\/em><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-Normal\">Mining is a very resource-intensive process, and with the designed-in, ever increasing difficulty of mining, it\u2019s no longer practical for individual miners (be it people or their computer machines) to mine Bitcoin on their own. To solve this, many miners join <em>mining pools<\/em>, where they combine their computing power to increase the chances of solving the cryptographic puzzle. In a mining pool, miners work together to solve a block. When the pool successfully mines a block, the reward is split among the participants based on how much computational power they contributed. This provides a more stable and consistent income for miners.<\/p>\n<figure id=\"attachment_613\" aria-describedby=\"caption-attachment-613\" style=\"width: 480px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-613\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_highly_realistic_depiction_of_two_miners_working-300x171.jpg\" alt=\"Depicting two miners working in a dark, industrial setting, illuminated by the glowing Bitcoin coin.\" width=\"480\" height=\"274\" srcset=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_highly_realistic_depiction_of_two_miners_working-300x171.jpg 300w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_highly_realistic_depiction_of_two_miners_working-1024x585.jpg 1024w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_highly_realistic_depiction_of_two_miners_working-768x439.jpg 768w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_highly_realistic_depiction_of_two_miners_working-1536x878.jpg 1536w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_highly_realistic_depiction_of_two_miners_working-65x37.jpg 65w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_highly_realistic_depiction_of_two_miners_working-225x129.jpg 225w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_highly_realistic_depiction_of_two_miners_working-350x200.jpg 350w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/A_highly_realistic_depiction_of_two_miners_working.jpg 1792w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><figcaption id=\"caption-attachment-613\" class=\"wp-caption-text\">Image generated by OpenAI&#8217;s DALL\u00b7E<\/figcaption><\/figure>\n<h2 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Current_Applications_of_Blockchains\"><\/span><strong>Current Applications of Blockchains<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"import-Normal\">The most use of Blockchains in the past decade has been for the generation, storing and exchange of Crypto Currencies. Current uses of blockchains have extended beyond the securing and recording of transactions of the financial industry sweeping many sectors of the economy including supply chain management, healthcare data tracking, voting systems, digital identity verification, real estate transactions, and even art ownership through <em>Non-Fungible Tokens (NFTs),<\/em> all benefiting from the decentralized and tamper-proof nature of blockchain technology. Some of the key business activities that have been revolutionized y Blockchains include:<\/p>\n<h3 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Contracts_%E2%80%93_The_Background\"><\/span><strong>Contracts <\/strong><strong>\u2013 The Background<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-NormalWeb\">As mentioned earlier, a transaction is a legally binding contract between a buyer and a seller. Traditionally, buying a house for example, was concluded by the Seller and the Buyer coming together at a Title company on what is called the Closing Day to sign 20, or more documents with some exceeding 30 sheets, notarize all the signatures, record the signed paperwork at a local court house (completed passed the closing and may take up to 60 days), exchange monies, and finally receive the keys to the property by the new owner. This process from begin to end, was exhausting and on average took an excess of 30 days. Now take this example and imagine yourself as a business trying to import, or export, a million metric tons of wheat to\/from a faraway country.<\/p>\n<h2 class=\"import-NormalWeb\"><span class=\"ez-toc-section\" id=\"Digital_Contracts\"><\/span><strong>Digital Contracts<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"import-NormalWeb\">A <strong class=\"import-Strong\">digital contract<\/strong> is an agreement between two or more parties in a digital format. Digital contracts typically involve the use of electronic negotiations, signatures, records, and communications to create, manage, and execute digital agreements. Digital contracts can take several forms:<\/p>\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Traditional <\/em><\/strong><strong class=\"import-Strong\"><em>Electronic Agreements<\/em><\/strong><strong><em>:<\/em><\/strong> These are agreements that are drafted, signed, and executed electronically. An example is an e-signature (a physical image of a real signature) used in a document signed via an online platform such as Docusign. These run on the traditional internet platform.<\/p>\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Fintech-based <\/em><\/strong><strong class=\"import-Strong\"><em>Smart Contracts<\/em><\/strong>: These are self-executing contracts where the terms of the agreement are written into software code and automatically enforced when certain predefined conditions are met. Smart contracts run on blockchain platforms, use digital signature (fingerprint), and they eliminate the need for intermediaries to enforce the agreement.<\/p>\n<p class=\"import-NormalWeb\">The concept of digital contracts began as an extension of traditional contract law, adapted to the digital environment, where transactions are increasingly being made online. It became necessary to find ways to ensure that these digital agreements were legally valid, enforceable, and secure.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Evolution_from_Contracts_to_eContracts_to_Smart_Contracts\"><\/span><strong class=\"import-Strong\"><strong>Evolution<\/strong><\/strong><strong class=\"import-Strong\"><strong> from<\/strong><\/strong> <strong class=\"import-Strong\"><strong>Contracts to <\/strong><\/strong><strong class=\"import-Strong\"><strong>eContracts<\/strong><\/strong><strong class=\"import-Strong\"><strong> to Smart Contracts<\/strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-NormalWeb\">The idea of digital contracts has its roots in the evolution of digital technology, starting with the early development of <em>Electronic Data Interchange<\/em><em> (EDI)<\/em> followed by the development of the Internet and eCommerce. With the growth of online transactions, the need for digital signatures and secure methods of contract execution arose. Key technology evolutions were:<\/p>\n<h2 class=\"import-NormalWeb\"><span class=\"ez-toc-section\" id=\"Electronic_Data_Interchange_EDI\"><\/span><em>Electronic Data Interchange (EDI)<\/em><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"import-NormalWeb\">EDI first emerged in\u00a0the 1960s\u00a0within the transportation industry, marking its early presence in the foundation of what would later become the e-commerce industry;\u00a0its origins can be traced back to the development of standardized electronic communication systems for exchanging business documents between companies. It primarily focused on logistics and supply chains. The Shipping, Logistics and Transportation companies, Governments, Banks and Insurance companies required a maze of hundreds of different forms and sometimes in multiples of different languages. EDI minimized the manually fillable forms by software that standardized terminology and document format to allow computers across the world to exchange documents. This very same technology evolved further in the early 1980\u2019s to standardize any paper-based document to be accepted, processed and transacted between any computers. This is what we know today as Portable Document Format or PDF. Key technologies that aided in the evolution from paper-based Contracts to eContracts included:<\/p>\n<h3 class=\"import-NormalWeb\"><span class=\"ez-toc-section\" id=\"The_E-Sign_Act\"><\/span><em>The<\/em> <strong class=\"import-Strong\"><em>E-Sign Act<\/em><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\">The <\/strong>Electronic Signatures in Global and National Commerce Act of 1996 was passed in the United States, allowing electronic signatures to be used in place of traditional handwritten signatures, making digital contracts legally enforceable.<\/p>\n<h3 class=\"import-NormalWeb\"><span class=\"ez-toc-section\" id=\"Public_Key_Infrastructure_PKI\"><\/span><strong class=\"import-Strong\"><em>Public Key Infrastructure (PKI)<\/em><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\">As we studied in the Cryptography chapter<\/strong><strong class=\"import-Strong\"><em>, <\/em><\/strong><strong class=\"import-Strong\"><em>Public Key Infrastructure (PKI)<\/em><\/strong> was established in the early 2000\u2019s as a system to standardize securing communications, allowing the creation of digital signatures and security certificates for verification of contracts.<\/p>\n<h2 class=\"import-NormalWeb\"><span class=\"ez-toc-section\" id=\"Blockchain_Technology\"><\/span><strong class=\"import-Strong\"><em>Blockchain Technology <\/em><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\">With Satoshi N<\/strong><strong class=\"import-Strong\">akamoto<\/strong><strong class=\"import-Strong\">\u2019<\/strong><strong class=\"import-Strong\">s seminal work <\/strong><strong class=\"import-Strong\">(2009) <\/strong><strong class=\"import-Strong\">on Bitcoins and its foundational cryptographic structure<\/strong><strong class=\"import-Strong\"> using B<\/strong><strong class=\"import-Strong\">lockchain technology<\/strong>, and later (2015) the refinement by Ethereum adapting it to <strong class=\"import-Strong\">smart contracts<\/strong> emerged. Ethereum\u2019s software has the ability to encode and execute complex contracts directly on its blockchain became the foundation for the modern approach to digital contracts. Key features for smart contracts include:<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Smart_Contracts_Automation_and_Self-Execution\"><\/span><strong class=\"import-Strong\"><em>Smart Contracts Automation and Self-Execution<\/em><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-NormalWeb\">The defining feature of a smart contract is that it is self-executing. This means that once the contract\u2019s terms and conditions (T\u2019s &amp; C\u2019s) are encoded in the contract&#8217;s code and the contract is deployed on the blockchain, the terms automatically trigger specific actions when predefined conditions are met. For example, a smart contract might automatically release a payment when a certain condition such as the delivery of a product to a customer, is confirmed as met.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Immutability\"><\/span><strong class=\"import-Strong\"><em>Immutability<\/em><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-NormalWeb\">Once a contract is recorded on the blockchain, it cannot be altered, providing a high level of security. This is important in reducing the risk of fraud and manipulation. The contract&#8217;s terms are clear and unchangeable, ensuring that all parties involved are held to the agreement as originally written.<\/p>\n<h2 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Non-Fungible_Tokens_NFT_and_Digital_Assets\"><\/span><strong>Non-Fungible Tokens (NFT)<\/strong><strong> and Digital Assets<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<figure style=\"width: 553px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2024\/12\/image11.jpeg\" alt=\"Mountains Non Fungible Token River\" width=\"553\" height=\"342\" \/><figcaption class=\"wp-caption-text\"><a href=\"https:\/\/pixabay.com\/illustrations\/mountains-river-nature-landscape-7145101\/\">Mountains Non Fungible Token River<\/a> StefWithAnF <a href=\"https:\/\/pixabay.com\/service\/license-summary\/\">Pixabay\u00a0<\/a><\/figcaption><\/figure>\n<p class=\"import-Normal\">Non-Fungible Tokens (NFTs) have rapidly gained attention in the digital world, particularly in the fields of art, collectibles, and gaming. An NFT is a type of digital asset that represents ownership or proof of authenticity of a unique item, typically stored on a blockchain. Unlike cryptocurrencies such as Bitcoin or Ethereum, which are fungible (meaning each unit is identical and can be exchanged one-for-one), NFTs are non-fungible, meaning each token is unique and cannot be exchanged on a like-for-like basis.<\/p>\n<p class=\"import-Normal\">As a digital asset, NFT\u2019s represents ownership or proof of authenticity of a unique item, either tangible, or digital (virtual), that is recorded on a blockchain. The key attributes of NFT\u2019s are:<\/p>\n<ul>\n<li><em>NFT\u2019s are Unique:<\/em> Every NFT has a unique identifier and specific information (metadata), such as the creator\u2019s details, ownership history, and other relevant data, making it distinct from other tokens.<\/li>\n<li><em>NFT\u2019s are Indivisible:<\/em> Unlike cryptocurrencies that can be divided into smaller units (e.g., 1 BTC can be divided into 100 million satoshis), NFTs cannot be divided. You either own the entire token or none of it.<\/li>\n<li><em>NFT are Transferable:<\/em> NFTs can be bought, sold, and transferred from one person to another, with each transfer recorded on a blockchain.<\/li>\n<li><em>NFT\u2019<\/em><em>s document <\/em><em>Provenance and Ownership:<\/em> NFTs provide a way to verify the ownership and history of digital or physical assets, making them useful for collectors and creators.<\/li>\n<\/ul>\n<h2 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"How_do_NFTs_work\"><\/span><strong>How do NFT\u2019s work? <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"import-Normal\">NFTs are typically built using the Ethereum Request for Comment (ERC-721 and ERC-1155) standards, which are types of smart contracts on the Ethereum blockchain. These standards define how NFTs behave and interact with other digital assets on the network.<\/p>\n<p class=\"import-Normal\">ERC-721: The ERC-721 standard was the first major standard used to create NFTs on the Ethereum blockchain. It specifies how NFTs should be structured and enables them to be unique, tradable, and trackable.<\/p>\n<p class=\"import-Normal\">ERC-1155: The ERC-1155 standard allows for the creation of both fungible and non-fungible tokens within a single smart contract, making it more flexible and efficient than ERC-721 for certain applications (such as gaming).<\/p>\n<p class=\"import-Normal\">When someone creates or mints an NFT, they typically go through the following process:<\/p>\n<p class=\"import-Normal\"><em>Minting<\/em><em>:<\/em> Minting NFT\u2019s are NOT the same as Minting Cyber Currency. It refers to the creation of the NFT on the blockchain but it involves converting a digital file (such as a photo image, a video clip or movie, or piece of music) into an NFT by associating it with a unique identifier on the blockchain.<\/p>\n<p class=\"import-Normal\"><em>Metadata<\/em><em>:<\/em> Metadata is the roadmap of the item under consideration. Think of metadata for a book in a library. The index cards, or the search function, on the library\u2019s computer system tells you the book\u2019s subject, the author, the publisher, the year it was published, a short description of the content, and the location of where in the library you can find the book, all in a small, summary piece of information known as Metadata. Using this analogy, each NFT contains metadata, which include details about the item it represents, such as a painting\u2019s name, scene description, the artist or creator, date it was painted, and any other information that proves its uniqueness such as which gallery had bought it last.<\/p>\n<p class=\"import-Normal\"><em>Ownership and Transfer<\/em><em>: <\/em>Once minted, the NFT is owned by the person who created it (unless transferred to another user). Ownership is tracked on the blockchain, giving provenance and ensuring that anyone can verify the authenticity and current owner of the NFT.<\/p>\n<p class=\"import-Normal\">Since NFTs exist on a blockchain, transactions involving NFTs are secure, transparent, and recorded permanently, meaning the ownership history of each NFT is publicly available.<\/p>\n<h2 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"Key_Characteristics_of_NFTs\"><\/span><strong>Key Characteristics of NFTs<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"import-Normal\"><em>Indivisibility<\/em>: NFTs are indivisible. Unlike cryptocurrencies, which can be divided into smaller units, NFTs are whole entities and cannot be broken down into fractions. You own the entire NFT or none of it.<\/p>\n<p class=\"import-Normal\"><em>Scarcity<\/em><em>:<\/em> NFTs can be scarce or abundant. The creator or project owner can decide how many copies of an NFT are minted. Some NFTs are one-of-a-kind (one unit), while others might have a limited supply (e.g., 100 editions of a digital artwork). This scarcity is what often drives demand and value in the market.<\/p>\n<p class=\"import-Normal\"><em>Verifiable Ownership<\/em>: NFTs provide a transparent record of ownership that is visible to everyone on the blockchain. This ensures that ownership can be easily transferred, verified, and proven, without the need for intermediaries.<\/p>\n<p class=\"import-Normal\"><em>Interoperability<\/em><em>:<\/em> NFTs, especially those created using standardized protocols can interact with various platforms and applications, enabling users to move them seamlessly across different marketplaces, wallets, or virtual worlds.<\/p>\n<h2 class=\"import-Normal\"><span class=\"ez-toc-section\" id=\"NFT_Uses\"><\/span><strong>NFT Uses<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"import-Normal\">NFTs have a wide range of use cases across various industries, with their most prominent applications being in art, entertainment, gaming, and collectibles. Some notable examples include:<\/p>\n<p class=\"import-Normal\"><em>Digital Art<\/em><em>: <\/em>NFTs have revolutionized the art world by allowing digital artists to sell their work as unique, verifiable pieces. NFTs provide artists with a way to retain control over their creations and ensure that buyers are purchasing original works. NFTs also allow artists to program royalties, so they can earn a percentage of sales whenever their work is resold on the secondary market.<\/p>\n<p class=\"import-Normal\"><em>Gaming:<\/em> NFTs are increasingly being used in the gaming industry. In blockchain-based games, NFTs represent in-game assets such as weapons, skins, land, and characters. Players can buy, sell, and trade these assets, often across different games or platforms, thanks to the interoperability of NFTs. Popular games include Axie Infinity, Decentraland, and The Sandbox are examples of NFT-based virtual worlds.<\/p>\n<p class=\"import-Normal\"><em>Collectibles<\/em><em>: <\/em>NFTs have gained significant traction in the world of collectibles, allowing people to own and trade digital items like trading cards, music albums, and video clips. For example, NBA Top Shot allows users to buy, sell, and trade officially licensed NBA collectible moments in the form of NFTs.<\/p>\n<p class=\"import-Normal\"><em>Intellectual Property and Licensing<\/em><em>:<\/em> NFTs can also be used to represent intellectual property rights. This allows creators to sell ownership or licensing rights of digital content in a transparent and secure way. For example, musicians can tokenize their songs, allowing fans to purchase limited rights or copies.<\/p>\n<p class=\"import-Normal\"><em>Virtual Real Estate<\/em><em>:<\/em> NFTs are used to represent ownership of virtual land or property in decentralized virtual worlds like Decentraland\u2122 and Cryptovoxels\u2122. Users can buy, sell, or build on this virtual land, and the ownership of the virtual real estate is recorded as NFTs.<\/p>\n<p class=\"import-Normal\"><em>Tickets and Membership<\/em><em>s:<\/em> NFTs can be used as tickets for events or memberships for exclusive clubs. The unique nature of NFTs allows for the creation of verifiable and tamper-proof tickets, preventing counterfeiting and ensuring that tickets cannot be duplicated.<\/p>\n<h2 class=\"import-Normal\" style=\"text-align: justify\"><span class=\"ez-toc-section\" id=\"Crypto_Wallets\"><\/span><strong>Crypto <\/strong><strong>Wallets <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"import-NormalWeb\">A <strong class=\"import-Strong\"><em>cryptocurrency wallet<\/em><\/strong> is a digital tool that enables users to interact with various blockchain networks to store, send, and receive cryptocurrencies, such as Bitcoin, NFT\u2019s, and other digital assets. It can be thought of as a bank account for crypto assets, though it does not store the actual coins themselves, instead, it holds the cryptographic keys necessary to interact with the blockchain and manage the user\u2019s crypto asset holdings. These wallets can come in both <strong class=\"import-Strong\">software<\/strong> and <strong class=\"import-Strong\">hardware<\/strong> forms, offering different levels of convenience, security, and control.<\/p>\n<figure style=\"width: 379px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/live.staticflickr.com\/65535\/51787822217_477d19fb95_b.jpg\" alt=\"Crypto Wallet and Bitcoins.\" width=\"379\" height=\"253\" \/><figcaption class=\"wp-caption-text\"><a href=\"https:\/\/www.flickr.com\/photos\/194709736@N03\/\">BestCryptoCodes<\/a> <a href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/\">CC BY<\/a><\/figcaption><\/figure>\n<p class=\"import-NormalWeb\">There are two main types of cryptographic keys involved:<\/p>\n<p class=\"import-Normal\"><strong class=\"import-Strong\">Public Key<\/strong>: A public address or identifier used to receive cryptocurrency. It\u2019s like an account number and can be shared with others to receive funds.<\/p>\n<p class=\"import-Normal\"><strong class=\"import-Strong\">Private Key<\/strong>: A secret key used to sign transactions and prove ownership of the assets stored in the wallet. It is like a password and must be kept secure. Anyone with access to the private key can control the assets linked to the corresponding public key.<\/p>\n<p class=\"import-NormalWeb\">The wallet manages these keys and facilitates the actions of sending or receiving cryptocurrency.<\/p>\n<p><strong class=\"import-Strong\"><strong>How Do Crypto Wallets Work?<\/strong><\/strong><\/p>\n<p class=\"import-NormalWeb\">Crypto wallets allow users to interact with the blockchain by signing transactions. Here\u2019s a breakdown of how they work:<\/p>\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Initial setup for c<\/em><\/strong><strong class=\"import-Strong\"><em>reating Wallets and <\/em><\/strong><strong class=\"import-Strong\"><em>g<\/em><\/strong><strong class=\"import-Strong\"><em>enerating <\/em><\/strong><strong class=\"import-Strong\"><em>k<\/em><\/strong><strong class=\"import-Strong\"><em>eys<\/em><\/strong>: When you initially set up a cryptocurrency wallet, it generates a pair of cryptographic keys (public and private keys. Refer to our chapter on Cryptography). These keys are mathematically linked, and the private key allows you to access and manage the cryptocurrency associated with the public key. The public key is used to receive funds, while the private key is used to authorize the sending of funds.<\/p>\n<h2 class=\"import-NormalWeb\"><span class=\"ez-toc-section\" id=\"Sending_and_Receiving_Cryptocurrency\"><\/span><strong class=\"import-Strong\"><em>Sending and Receiving Cryptocurrency<\/em><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>Receiving<\/em><\/strong><strong><em>:<\/em><\/strong> To receive cryptocurrency, you provide the sender with your public key (or wallet address). The transaction is recorded on the blockchain, but you don\u2019t need to &#8220;store&#8221; the actual cryptocurrency\u2014it&#8217;s stored on the blockchain.<\/p>\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>Sending<\/em><\/strong><strong><em>:<\/em><\/strong> To send cryptocurrency, you use your private key to sign the transaction. The transaction is then broadcast to the blockchain network, which validates and records it. Only the person with the private key can authorize the transfer, ensuring security and ownership.<\/p>\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Transaction Signing<\/em><\/strong><strong><em>:<\/em><\/strong> Wallets sign transactions with the private key to prove that the sender owns the funds and has the right to transfer them. This signature is cryptographically generated and provides evidence of the transaction&#8217;s authenticity without revealing the private key itself.<\/p>\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Blockchain Interaction<\/em><\/strong><strong><em>:<\/em><\/strong> All transactions made through a crypto wallet are recorded on the blockchain. When a transaction is initiated, it is validated by miners or validators (depending on the blockchain) and then added to the ledger.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Types_of_Crypto_Wallets\"><\/span><strong class=\"import-Strong\"><strong>Types of Crypto Wallets<\/strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"import-NormalWeb\">Crypto wallets can be divided into two broad categories: <strong class=\"import-Strong\">Software Wallets<\/strong> and <strong class=\"import-Strong\">Hardware Wallets<\/strong>. Each type comes with different features, levels of security, and use cases.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Software_Wallets\"><\/span><strong class=\"import-Strong\">Software Wallets<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><iframe loading=\"lazy\" id=\"oembed-5\" title=\"MetaMask | How To Setup The Crypto Wallet Browser Extension\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/n6cMxZZq400?feature=oembed&#38;rel=0\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>(MetaMask, n.d., Standard YouTube License)<\/p>\n<p class=\"import-NormalWeb\">Software wallets are programs or apps that store private keys on a device such as a laptop computer or a cellular smart phone. These wallets are more convenient and accessible but generally come with higher security risks (e.g., hacking, malware, loss or damage to the device).<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Types_of_Software_Wallets\"><\/span><strong class=\"import-Strong\">Types of Software Wallets<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Desktop Wallets<\/em><\/strong><strong><em>:<\/em><\/strong> These wallets are installed on a desktop \/ laptop computer. They are considered secure if the device is protected, but they are vulnerable to malware if the device is compromised. Examples include <strong class=\"import-Strong\">Exodus<\/strong><strong class=\"import-Strong\">\u2122<\/strong> and <strong class=\"import-Strong\">Electrum<\/strong><strong class=\"import-Strong\">\u2122<\/strong><strong>.<\/strong><\/p>\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Mobile Wallets<\/em><\/strong><strong><em>:<\/em><\/strong> These are apps designed for mobile smart phones, providing portability and ease of access. Examples include <strong class=\"import-Strong\">Trust Wallet<\/strong><strong class=\"import-Strong\">\u2122<\/strong>, <strong class=\"import-Strong\">MetaMask<\/strong><strong class=\"import-Strong\">\u2122<\/strong>, and <strong class=\"import-Strong\">Coinomi<\/strong><strong class=\"import-Strong\">\u2122<\/strong>. Since mobile devices are always connected to the internet, they may be more prone to attacks if the device is not secure.<\/p>\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Web Wallets<\/em><\/strong><em>:<\/em> These are cloud-based wallets that run in web browsers. Web wallets are easily accessible from any device with internet connectivity, but they are also more vulnerable to hacking since the private keys are stored online. Examples include <strong class=\"import-Strong\">Blockchain Wallet<\/strong><strong class=\"import-Strong\">\u2122<\/strong> and <strong class=\"import-Strong\">Coinbase Wallet<\/strong><strong class=\"import-Strong\">\u2122<\/strong>.<\/p>\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Browser Extension Wallets<\/em><\/strong><em>:<\/em> These are wallet extensions for browsers like Chrome or Firefox, such as <strong class=\"import-Strong\">MetaMask<\/strong><strong class=\"import-Strong\">\u2122<\/strong>. They are designed primarily for interacting with decentralized applications (dApps) and managing Ethereum-based assets.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Contents_of_a_Software_Wallet\"><\/span><strong class=\"import-Strong\">Contents of a Software Wallet<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p class=\"import-Normal\">Software wallets contain:<\/p>\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>A <\/em><\/strong><strong class=\"import-Strong\"><em>Private Key<\/em><\/strong><strong><em>:<\/em><\/strong> The secret key that allows you to authorize transactions.<\/p>\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>A <\/em><\/strong><strong class=\"import-Strong\"><em>Public Key<\/em><\/strong><strong><em>:<\/em><\/strong> The address you share to receive crypto assets<\/p>\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>Transaction History<\/em><\/strong><strong><em>:<\/em><\/strong> A record of all incoming and outgoing transactions associated with the wallet.<\/p>\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>Wallet Balance<\/em><\/strong><strong><em>:<\/em><\/strong> A view of the available balance based on the blockchain, showing how much cryptocurrency is available for spending.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Hardware_Wallets\"><\/span><strong class=\"import-Strong\"><strong> Hardware Wallets<\/strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><iframe loading=\"lazy\" id=\"oembed-6\" title=\"Tangem Ring. Experience the Future of Crypto Wallets.\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/NwAqmM1AgCc?feature=oembed&#38;rel=0\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>(Tangem, n.d., Standard YouTube License)<\/p>\n<div id=\"h5p-6\">\n<div class=\"h5p-iframe-wrapper\"><iframe id=\"h5p-iframe-6\" class=\"h5p-iframe\" data-content-id=\"6\" style=\"height:1px\" src=\"about:blank\" frameBorder=\"0\" scrolling=\"no\" title=\"Tangem Ring. Experience the Future of Crypto Wallets: Transcript\"><\/iframe><\/div>\n<\/div>\n<p class=\"import-NormalWeb\">Hardware wallets are physical devices that store private keys offline. They are considered the most secure type of wallet because they are immune to online hacks, phishing attacks, and malware. Hardware wallets are typically used for long-term storage (cold storage) of cryptocurrency.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Examples_of_Hardware_Wallets\"><\/span>Examples of Hardware Wallets<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p class=\"import-Normal\"><strong class=\"import-Strong\">Ledger Nano S \/ X<\/strong><strong class=\"import-Strong\">\u2122<\/strong>: One of the most popular hardware wallets, supporting a wide range of cryptocurrencies, including Bitcoin, Ethereum, and many altcoins.<\/p>\n<p class=\"import-Normal\"><strong class=\"import-Strong\">Trezor<\/strong><strong class=\"import-Strong\">\u2122<\/strong>: Another leading hardware wallet, similar to the Ledger, known for its ease of use and security features.<\/p>\n<p class=\"import-Normal\"><strong class=\"import-Strong\">KeepKey<\/strong><strong class=\"import-Strong\">\u2122<\/strong>: A hardware wallet with a user-friendly interface, supporting a smaller range of cryptocurrencies but still a reliable option for secure storage.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"How_Hardware_Wallets_Work\"><\/span><strong class=\"import-Strong\">How Hardware Wallets Work<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p class=\"import-Normal\">Hardware wallets store private keys in a secure chip on the device, isolated from the internet, which prevents them from being exposed to hackers or malware.<\/p>\n<p class=\"import-Normal\">To sign transactions, users must connect their hardware wallet to a computer or mobile device. The transaction is then signed on the device itself, meaning the private key never leaves the wallet.<\/p>\n<p class=\"import-Normal\">Hardware wallets often feature a PIN code, passphrase, or other security features to prevent unauthorized access.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Contents_of_a_Hardware_Wallet\"><\/span><strong class=\"import-Strong\">Contents of a Hardware Wallet<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>Private Key<\/em><\/strong><strong><em>:<\/em><\/strong> Stored securely in the hardware device, used to sign transactions.<\/p>\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>Recovery Seed<\/em><\/strong><em>:<\/em> A 12 to 24-word backup phrase that can be used to recover the wallet in case it is lost or damaged. It is advisable that the Recovery Seed is physically written down and stored away in a safe place.<\/p>\n<p class=\"import-Normal\"><strong class=\"import-Strong\"><em>Wallet Balance<\/em><\/strong>: Information is displayed when connected to a companion app or software, showing the amount of cryptocurrency, the wallet holds.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Comparative_Differences_Between_Software_and_Hardware_Wallets\"><\/span><strong class=\"import-Strong\"><strong>Comparative Differences<\/strong><\/strong><strong class=\"import-Strong\"><strong> Between Software and Hardware Wallets<\/strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<table>\n<thead>\n<tr>\n<th style=\"border: 0.5pt solid windowtext;text-align: center\"><strong class=\"import-Strong\"><strong>Wallet Features<\/strong><\/strong><\/th>\n<th style=\"border: 0.5pt solid windowtext;text-align: center\"><strong class=\"import-Strong\"><strong>Software Wallets<\/strong><\/strong><\/th>\n<th class=\"TableGrid-C\" style=\"border: 0.5pt solid windowtext;text-align: center\"><strong class=\"import-Strong\"><strong>Hardware Wallets<\/strong><\/strong><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr class=\"TableGrid-R\">\n<th class=\"TableGrid-C\" style=\"border: 0.5pt solid windowtext\">&nbsp;<\/p>\n<p><strong class=\"import-Strong\">Security<\/strong><\/th>\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Are Vulnerable to malware, phishing, and online attacks<\/td>\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Are highly secure due to offline storage of private keys<\/td>\n<\/tr>\n<tr class=\"TableGrid-R\">\n<th class=\"TableGrid-C\" style=\"border: 0.5pt solid windowtext\">&nbsp;<\/p>\n<p><strong class=\"import-Strong\">Convenience<\/strong><\/th>\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Accessible from any device with internet connectivity<\/td>\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Requires physical device and connection to computer\/phone<\/td>\n<\/tr>\n<tr class=\"TableGrid-R\">\n<th class=\"TableGrid-C\" style=\"border: 0.5pt solid windowtext\">&nbsp;<\/p>\n<p><strong class=\"import-Strong\">Uses<\/strong><\/th>\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Ideal for frequent trading and smaller amounts<\/td>\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Ideal for long-term storage of large amounts of crypto<\/td>\n<\/tr>\n<tr class=\"TableGrid-R\">\n<th class=\"TableGrid-C\" style=\"border: 0.5pt solid windowtext\">&nbsp;<\/p>\n<p><strong class=\"import-Strong\">Cost<\/strong><\/th>\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Free or low-cost<\/td>\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Typically range from $50 to $200 depending on model<\/td>\n<\/tr>\n<tr class=\"TableGrid-R\">\n<th class=\"TableGrid-C\" style=\"border: 0.5pt solid windowtext\">&nbsp;<\/p>\n<p><strong class=\"import-Strong\">Backup Method<\/strong><\/th>\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Backup can be stored on cloud or external device<\/td>\n<td class=\"TableGrid-C\" style=\"vertical-align: middle;border: solid windowtext 0.5pt\">Backup via a recovery seed, which must be kept offline<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><span class=\"ez-toc-section\" id=\"Table_6-1_Comparative_Analysis_of_Software_Vs_Hardware_Crypto_Wallets\"><\/span><strong class=\"import-Strong\">Table 6-1 Comparative Analysis of Software Vs. Hardware Crypto Wallets<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h3><span class=\"ez-toc-section\" id=\"Additional_Features_of_some_Crypto_Wallets\"><\/span><strong class=\"import-Strong\"><strong>Additional Features of <\/strong><\/strong><strong class=\"import-Strong\"><strong>some <\/strong><\/strong><strong class=\"import-Strong\"><strong>Crypto Wallets<\/strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Multi<\/em><\/strong><strong class=\"import-Strong\"><em>&#8211;<\/em><\/strong><strong class=\"import-Strong\"><em>signature Wallets<\/em><\/strong><strong><em>:<\/em><\/strong> These wallets require more than one private key to authorize a transaction. This adds an extra layer of security, often used by organizations or individuals who want to ensure no single party can move the funds without approval from others.<\/p>\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Decentralized Finance (DeFi) Integration<\/em><\/strong><strong><em>:<\/em><\/strong> Some wallets (like MetaMask) allow users to interact with decentralized finance protocols directly from the wallet interface, enabling activities like lending, borrowing, or trading directly from the wallet without needing centralized exchanges.<\/p>\n<p class=\"import-NormalWeb\"><strong class=\"import-Strong\"><em>Staking<\/em><\/strong><strong><em>:<\/em><\/strong> Some crypto wallets allow users to stake certain cryptocurrencies (like Ethereum 2.0 or Cardano) directly from the wallet, allowing them to earn rewards for participating in the network\u2019s consensus mechanism. Some refer to this as passive income.<\/p>\n<p class=\"import-NormalWeb\" style=\"margin-left: 36pt\">Certain types of Networks do not use Miners as is done for Bitcoins to form transaction validation and to reach consensus. By staking an amount of crypto currency specified by the network means setting aside a specified amount of crypto coins for some period in time. This is also called <em>locking a stake<\/em>. During this period of time, crypto coins can\u2019t be traded, or sold by the staker. Having a stake in the system makes that individual a \u201cValidator\u201d. Validators are the folks that run and manage the blockchain distribution as previously mentioned. i.e. they are, in function, very similar to the miners of bitcoins. Validators are rewarded for their participation based on the amount they have \u201cdeposited\u201d as stake in the system. This function is known as <em>Proof-of-Stake<\/em><em> (<\/em><em>PoS<\/em>). The process for Proof-of-Stake is very similar to that of Bitcoin\u2019s Proof-of-Work (PoW).<\/p>\n<div class=\"textbox\">\n<h3><span class=\"ez-toc-section\" id=\"Licenses_and_Attribution\"><\/span><strong>Licenses and Attribution<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><span class=\"ez-toc-section\" id=\"CC_Licensed_Content_Original\"><\/span>CC Licensed Content, Original<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span data-teams=\"true\">This educational material includes AI-generated content from ChatGPT by OpenAI. The original content created by Mohammed Kotaiche from Hillsborough Community College is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License\u00a0<a id=\"menur5so\" class=\"fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn\" title=\"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/deed.en\" href=\"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/deed.en\" rel=\"noreferrer noopener\" aria-label=\"Link CC BY-NC 4.0\">CC BY-NC 4.0<\/a><\/span><\/p>\n<hr \/>\n<h4><span class=\"ez-toc-section\" id=\"CC_Licensed_Content_Included\"><\/span><strong>CC Licensed Content Included<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><a href=\"https:\/\/www.researchgate.net\/figure\/Distributed-computer-system_fig1_220066154\">Distributed computer system<\/a>. Courtesy of ResearchGate.\u00a0<a href=\"http:\/\/cc%20by-nd%204.0\/\">CC BY-ND<\/a><\/li>\n<li>Wikipedia contributors. (2023). <em>Environmental impact of Bitcoin<\/em>. In <em>Wikipedia<\/em>. Retrieved December 4, 2024, from <a href=\"https:\/\/en.wikipedia.org\/wiki\/Environmental_impact_of_bitcoin\" target=\"_new\" rel=\"noopener\">Wikipedia: Environmental Impact of Bitcoin<\/a><\/li>\n<li>Wikipedia contributors. (2023). <em>Cryptocurrency<\/em>. In <em>Wikipedia<\/em>. Retrieved December 4, 2024, from <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptocurrency\" target=\"_new\" rel=\"noopener\">Wikipedia: Cryptocurrency<\/a><\/li>\n<li><a href=\"https:\/\/www.researchgate.net\/figure\/Mainframe-Architecture_fig2_275405572\">Mainframe Architecture<\/a>\u00a0Courtesy of ResearchGate.\u00a0<a href=\"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/\">CC BY-ND<\/a><\/li>\n<li><a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:1st_GLAM_WC_libraries_edit-a-thon_catering_receipt_muffins.JPG\">Catering Receipt Discott<\/a>\u00a0\u00a0<a href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/3.0\/deed.en\">CC BY-SA<\/a><\/li>\n<li><a href=\"https:\/\/www.researchgate.net\/publication\/387457309_Data_Management_and_Security_in_Blockchain_Networks\">Data Management and Security in Blockchain Networks<\/a><a href=\"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/deed.en\">\u00a0CC BY-NC<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Hash_function#\/media\/File:Hash_table_4_1_1_0_0_1_0_LL.svg\">A hash function that maps names to integers from 0 to 15<\/a>. Public Domain<\/li>\n<li><a href=\"https:\/\/pixabay.com\/illustrations\/mountains-river-nature-landscape-7145101\/\">Mountains Non Fungible Token River<\/a>\u00a0StefWithAnF\u00a0<a href=\"https:\/\/pixabay.com\/service\/license-summary\/\">Pixabay <\/a><\/li>\n<li><a href=\"https:\/\/www.flickr.com\/photos\/194709736@N03\/\">BestCryptoCodes<\/a>\u00a0<a href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/\">CC BY<\/a><\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Other_Licensed_Content_Included\"><\/span>Other Licensed Content Included<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li>Astra Security. (n.d.). <i>Cybercrime statistics<\/i>. Retrieved from <a href=\"https:\/\/www.astrasecurity.com\/cybercrime-statistics\" target=\"_blank\" rel=\"noopener\">Astra Security\u2019s Cybercrime Statistics<\/a>.<\/li>\n<li>Basel Committee on Banking Supervision. (2019). <i>Basel III: Finalising post-crisis reforms<\/i>. Retrieved from <a href=\"https:\/\/www.bis.org\/bcbs\/publ\/d424.htm\" target=\"_blank\" rel=\"noopener\">Basel III: Finalising Post-Crisis Reforms on the BIS Website<\/a>.<\/li>\n<li>Cybersecurity and Infrastructure Security Agency (CISA). (n.d.). <i>The attack on Colonial Pipeline: What we\u2019ve learned and what we\u2019ve done over the past two years<\/i>. Retrieved from <a href=\"https:\/\/www.cisa.gov\/colonial-pipeline-attack-lessons\" target=\"_blank\" rel=\"noopener\">CISA\u2019s Summary of the Colonial Pipeline Attack<\/a>.<\/li>\n<li>Cybersecurity Ventures. (n.d.). <i>Cybercrime to cost the world $10.5 trillion annually by 2025<\/i>. Retrieved from <a href=\"https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Ventures\u2019 Cybercrime Cost Projection<\/a>.<\/li>\n<li>Demolition Kitchen Video. (2016, November 1). <i>Master Charge Card \u2013 Television commercial, 16mm<\/i> [Video]. Internet Archive. Retrieved from <a href=\"https:\/\/archive.org\/details\/master-charge-card-television-commercial\" target=\"_blank\" rel=\"noopener\">Master Charge Card Commercial on Internet Archive<\/a>.<\/li>\n<li>Hedges, B. (2019, May 20). <i>How BankAmericard became Visa \u2013 Story of the first credit card<\/i> [Video]. YouTube. Retrieved from <a href=\"https:\/\/www.youtube.com\/watch?v=zceRRcLJfPg\" target=\"_blank\" rel=\"noopener\">How BankAmericard Became Visa \u2013 Story of the First Credit Card on YouTube<\/a>.<\/li>\n<li>Identity Theft Resource Center. (2023). <i>2023 Data Breach Report<\/i>. Retrieved from <a href=\"https:\/\/www.idtheftcenter.org\/data-breach-reports\/\" target=\"_blank\" rel=\"noopener\">Identity Theft Resource Center\u2019s 2023 Data Breach Report<\/a>.<\/li>\n<li>MetaMask. (n.d.). <i>How to setup the crypto wallet browser extension<\/i> [Video]. YouTube. Retrieved from <a href=\"https:\/\/www.youtube.com\/watch?v=Vj5WGmVhK2k\" target=\"_blank\" rel=\"noopener\">MetaMask\u2019s Crypto Wallet Setup Guide on YouTube<\/a>.<\/li>\n<li>Tangem. (n.d.). <i>Tangem Ring: Experience the future of crypto wallets<\/i> [Video]. YouTube. Retrieved December 4, 2024, from <a href=\"https:\/\/www.youtube.com\/watch?v=NwAqmM1AgCc\" target=\"_blank\" rel=\"noopener\">Tangem Ring Video on YouTube<\/a>.<\/li>\n<li>The History Guy: History Deserves to Be Remembered. (2019, November 29). <i>History in plastic: Credit cards<\/i> [Video]. YouTube. Retrieved from <a href=\"https:\/\/www.youtube.com\/watch?v=LA44KRSv9ds\" target=\"_blank\" rel=\"noopener\">History in Plastic: Credit Cards on YouTube<\/a>.<\/li>\n<li>University of Maryland. (n.d.). <i>Study: Hackers attack every 39 seconds<\/i>. A. James Clark School of Engineering. Retrieved from <a href=\"https:\/\/eng.umd.edu\/news\/story\/study-hackers-attack-every-39-seconds\" target=\"_blank\" rel=\"noopener\">University of Maryland\u2019s Hackers Attack Every 39 Seconds Study<\/a>.\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li style=\"list-style-type: none\"><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"author":2,"menu_order":5,"comment_status":"open","ping_status":"closed","template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-359","chapter","type-chapter","status-publish","hentry"],"part":3,"_links":{"self":[{"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/pressbooks\/v2\/chapters\/359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/wp\/v2\/comments?post=359"}],"version-history":[{"count":97,"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/pressbooks\/v2\/chapters\/359\/revisions"}],"predecessor-version":[{"id":1233,"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/pressbooks\/v2\/chapters\/359\/revisions\/1233"}],"part":[{"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/pressbooks\/v2\/parts\/3"}],"metadata":[{"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/pressbooks\/v2\/chapters\/359\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/wp\/v2\/media?parent=359"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/pressbooks\/v2\/chapter-type?post=359"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/wp\/v2\/contributor?post=359"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/wp\/v2\/license?post=359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}