BCT Notes
BCT Notes
Unlike traditional money, Bitcoin can be lost, stolen, or accidentally sent, with
no way to recover it.
Security Principles
1. Decentralization:
2. Consensus Algorithm:
Bitcoin transactions are specific to a value and recipient, and they do not
reveal personal info.
Blockchain 1
Users are responsible for keeping their keys secret, which can be difficult,
especially on smartphones or laptops.
Many hacks occur because users fail to secure their keys properly.
Do not take control of keys away from users or take transactions off the
blockchain, as this centralizes control and makes systems vulnerable to hacks.
Bitcoin’s decentralized security is compromised when funds are taken off the
blockchain.
Root of Trust
Traditional security relies on a "root of trust," with layers of trust built from the
simplest parts (e.g., hardware) to more complex systems (e.g., software).
Bitcoin’s root of trust is the blockchain itself, starting with the genesis block.
2. Hardware Wallets:
3. Balancing Risk:
While theft is a risk, losing your bitcoin due to lost keys or files is a bigger
risk.
Blockchain 2
Complex security measures can sometimes lead to accidental loss of
access to your Bitcoin.
4. Diversifying Risk:
Don’t keep all your Bitcoin in one wallet. Use multiple wallets for different
purposes (e.g., small amounts in an online wallet and larger amounts in
cold storage).
For larger amounts, use multi-signature wallets that require multiple people
or devices to sign a transaction.
6. Survivability:
In case of incapacity or death, users should plan for how their Bitcoin can
be accessed by trusted individuals.
Blockchain 3
Key points include:
Bitcoin does not have centralized accounts; instead, pieces of Bitcoin, called
Unspent Transaction Outputs (UTXOs), are linked to specific addresses
controlled by private keys.
Transactions are published to the mempool where they remain 'pending' until
a miner includes them in a block, at which point they are considered
confirmed.
Private key: A secret key that authorizes the spending of Bitcoin from the
corresponding public address. This key must be kept confidential to prevent
theft.
Blockchain 4
Input Counter & Inputs: Specify previous transaction details (TxID, Index,
Unlocking Script).
Output Counter & Outputs: Specify transaction output details (Value, Locking
Script).
2. Digital Signatures: The transaction is signed with your private key, proving
you are the rightful owner of the Bitcoin being sent.
Miners receive a combination of newly minted Bitcoin and transaction fees for
validating blocks. Transactions with higher fees are more likely to be included
in the next block, especially during network congestion.
Blockchain 5
Theft, fraud, money laundering, and other illicit activities are common.
1. Ransomware Attacks:
2. Cryptocurrency Scams:
Cryptos are used for Ponzi schemes, phishing, and investment scams.
Websites on the dark web use crypto for illegal activities like drug trade,
arms dealing, and human trafficking.
4. Cryptocurrency Theft:
Hackers use phishing and social engineering to steal crypto and launder
it on the blockchain.
5. Terror Funding:
Example: Israel seized $1.7 million in crypto from terror groups in 2023.
Blockchain 6
It’s hard to catch crypto criminals due to the anonymous nature of
cryptocurrencies.
Famous Cases:
One of the biggest Bitcoin exchange hacks. 850,000 bitcoins (worth $500
million) were stolen.
Darknet marketplace exit scam. 96,000 bitcoins stolen ($6 billion today).
119,756 bitcoins ($72 million) stolen. Bitfinex reduced all account balances
by 36%.
Blockchain 7
CEO allegedly died, and $250 million in customer funds disappeared.
$534 million worth of NEM altcoins stolen from the Japanese exchange.
Promised high returns for lending Bitcoin, but was an unsustainable Ponzi
scheme.
Ransomware Payments:
Darknet Markets:
Platforms like Silk Road used Bitcoin for illegal transactions (e.g., drugs,
weapons).
Investors artificially inflate the price of a coin, then sell at a profit, leaving
others with losses.
2. Fake ICOs:
Blockchain 8
spread in social groups.
Key Features:
1. Decentralization: No central authority; nodes communicate randomly with
each other.
5. Fault Tolerance: Can handle node failures as the gossip continues across
other nodes.
How It Works:
1. Peer Selection: Each node randomly selects a few peers to share data with.
5. Convergence: Over time, all nodes will have the same shared data.
Blockchain 9
2. Rumor-Mongering: New information is spread by selecting a subset of nodes,
using fewer resources.
Advantages:
Low Overhead: Requires minimal communication between nodes.
Use Cases:
Distributed databases
Cluster management
Cryptocurrency Exchanges
Cryptocurrency exchanges are platforms where users can trade digital currencies
like Bitcoin, Ethereum, and Tether. These exchanges serve as digital marketplaces
for buying and selling cryptocurrencies, operating similarly to stock exchanges
but dealing in digital assets.
Blockchain 10
Afterward, users can select a cryptocurrency and trade based on their
preferences.
High liquidity
Faster transactions
Disadvantages:
Vulnerable to hacking
Disadvantages:
Lower liquidity
Blockchain 11
Hybrid Exchanges
A hybrid exchange combines the features of both CEX and DEX. It aims to offer
the user-friendliness and liquidity of a centralized exchange with the privacy and
security of a decentralized one.
Pros:
Convenience of CEX
Cons:
4.9. E-Governance
Blockchain 12
Definition of e-Governance
E-Governance involves the use of Information and Communication Technology
(ICT) to improve the functions of the government, focusing on creating a SMART
governance system:
SMART Governance
Simple: Streamlining rules and processes with ICT for a user-friendly
government.
Blockchain 13
5. West Virginia: Blockchain-based voting system for overseas military
personnel.
Advantages of E-Governance
Enhanced delivery and efficiency of services.
Interactions in E-Governance
1. G2C (Government to Citizens): Improves service accessibility and quality.
Blockchain 14
IT Act (2000) and its amendment in 2008.
Challenges in E-Governance
Involving multiple stakeholders in decision-making.
Blockchain in E-Governance
Smart Contracts: Self-enforcing agreements coded into blockchain,
automatically executing when conditions are met. Decentralized deployment
ensures security.
Blockchain 15
1. Trust and Transparency: Smart Contracts foster trust by requiring stakeholder
consent for changes, preventing unethical practices.
Blockchain 16