0% found this document useful (0 votes)
19 views

BCT Notes

Uploaded by

info.hashdeals
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

BCT Notes

Uploaded by

info.hashdeals
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Blockchain

What is Bitcoin Security?


Bitcoin security at rest is about securing bitcoin stored in digital wallets.

The Bitcoin network uses multiple layers of security, including transaction


hashing, mining, and block confirmations.

Unlike traditional money, Bitcoin can be lost, stolen, or accidentally sent, with
no way to recover it.

Security Principles
1. Decentralization:

Bitcoin is decentralized, meaning users control their funds.

Traditional banks rely on centralized control to keep the system secure.

2. Consensus Algorithm:

Bitcoin uses a proof-of-work system, not access control, meaning no


encryption is needed for Bitcoin traffic.

3. Preventing Identity Theft:

Traditional systems use private identifiers (like credit card numbers),


which can be stolen and used to take more money.

Bitcoin transactions are specific to a value and recipient, and they do not
reveal personal info.

4. Authorization and Security:

Bitcoin payments can’t be forged or used to authorize additional


payments.

Transactions can be sent over unsecured networks without risk.

5. Prevent Hacking with Secure Keys:

Blockchain 1
Users are responsible for keeping their keys secret, which can be difficult,
especially on smartphones or laptops.

Many hacks occur because users fail to secure their keys properly.

Developing Bitcoin Systems Securely


The main principle for Bitcoin security is decentralization.

Do not take control of keys away from users or take transactions off the
blockchain, as this centralizes control and makes systems vulnerable to hacks.

Off Blockchain Systems


Off-blockchain transactions centralize control and are vulnerable to
manipulation.

Bitcoin’s decentralized security is compromised when funds are taken off the
blockchain.

Root of Trust
Traditional security relies on a "root of trust," with layers of trust built from the
simplest parts (e.g., hardware) to more complex systems (e.g., software).

Bitcoin’s root of trust is the blockchain itself, starting with the genesis block.

Trusting anything outside of the blockchain introduces vulnerabilities.

User Security Best Practices


1. Physical Bitcoin Storage:

Bitcoin keys can be stored physically (e.g., on paper) in what is called


“cold storage.”

2. Hardware Wallets:

Hardware wallets are designed specifically to store Bitcoin securely, with


limited interfaces, making them harder to hack.

3. Balancing Risk:

While theft is a risk, losing your bitcoin due to lost keys or files is a bigger
risk.

Blockchain 2
Complex security measures can sometimes lead to accidental loss of
access to your Bitcoin.

4. Diversifying Risk:

Don’t keep all your Bitcoin in one wallet. Use multiple wallets for different
purposes (e.g., small amounts in an online wallet and larger amounts in
cold storage).

5. Multi-Sig and Governance:

For larger amounts, use multi-signature wallets that require multiple people
or devices to sign a transaction.

6. Survivability:

In case of incapacity or death, users should plan for how their Bitcoin can
be accessed by trusted individuals.

Problems with Current Systems


General-purpose operating systems aren’t secure enough for storing digital
money.

Even advanced systems like those in financial services are frequently


breached.

Benefits of Bitcoin Adoption


Bitcoin incentivizes better computer security.

The rise of Bitcoin has led to innovations in hardware encryption, multi-


signature technology, and digital escrow.

3.4. Bitcoin Transaction

What Is a Bitcoin Transaction?


A Bitcoin transaction represents the transfer of value on the Bitcoin blockchain. In
essence, it involves participant A transferring a designated amount of Bitcoin to
participant B. Transactions are facilitated through wallets, which can be on mobile,
desktop, or specialized hardware.

Blockchain 3
Key points include:

A Bitcoin transaction is a transfer of Bitcoin from one address to another, and


must be signed by the sender to be valid.

Bitcoin does not have centralized accounts; instead, pieces of Bitcoin, called
Unspent Transaction Outputs (UTXOs), are linked to specific addresses
controlled by private keys.

Transactions are published to the mempool where they remain 'pending' until
a miner includes them in a block, at which point they are considered
confirmed.

How Does a Bitcoin Transaction Work?


Sending a Bitcoin transaction is simple: users enter the amount and the recipient's
address in their wallet and press send.

Public-key cryptography ensures transaction integrity on the Bitcoin network.

Public and Private Keys:


Public key: A public address where Bitcoin can be received. Public keys are
safe to share with others.

Private key: A secret key that authorizes the spending of Bitcoin from the
corresponding public address. This key must be kept confidential to prevent
theft.

Structure of a Bitcoin Transaction:


A Bitcoin transaction records the transfer of value between participants, and it
consists of:

1. Input: The source of Bitcoin being spent.

2. Output: The destination address to which Bitcoin is being sent.

Standard Bitcoin transaction fields:

Version: Transaction version (4 bytes).

Marker & Flag: Indicate if SegWit is used (optional).

Blockchain 4
Input Counter & Inputs: Specify previous transaction details (TxID, Index,
Unlocking Script).

Output Counter & Outputs: Specify transaction output details (Value, Locking
Script).

Witness: For SegWit transactions.

Lock Time: Timestamp after which the transaction is valid.

Steps for a Bitcoin Transaction:


1. Creating a Transaction: You create a transaction in your wallet, specifying the
sender’s and recipient’s addresses, the amount, and a transaction fee for
miners.

2. Digital Signatures: The transaction is signed with your private key, proving
you are the rightful owner of the Bitcoin being sent.

3. Broadcasting & Confirmations: The signed transaction is broadcast to the


network and placed in the mempool. Miners pick it up to include in the
blockchain after solving a mathematical problem.

4. Transaction Finalization: Once confirmed by miners and added to the


blockchain, the transaction is considered complete after six confirmations to
ensure security and prevent double-spending.

Bitcoin Transaction Fees:


Transaction fees are determined by the user. Higher fees result in faster
processing since miners prioritize higher-fee transactions.

Bitcoin blocks have a maximum size of 1MB, so only a limited number of


transactions can be included in each block.

Miners receive a combination of newly minted Bitcoin and transaction fees for
validating blocks. Transactions with higher fees are more likely to be included
in the next block, especially during network congestion.

3.7 Role of Bitcoin Crimes


Crimes Associated with Bitcoin:

Blockchain 5
Theft, fraud, money laundering, and other illicit activities are common.

Bitcoin and other cryptocurrencies (like Ethereum) are attractive to criminals


because of their anonymity and lack of regulation.

Types of Crypto Crimes:

1. Ransomware Attacks:

Ransomware as a Service (RaaS) allows attackers to lease ransomware


for a cut of the ransom.

Cryptocurrencies are used for ransom payments due to their anonymous


and borderless nature.

Example: In 2023, ransomware payouts reached $449.1 million in just the


first half of the year.

2. Cryptocurrency Scams:

Cryptos are used for Ponzi schemes, phishing, and investment scams.

Example: The PlusToken Ponzi scheme defrauded people of $2.35 billion


in 2019.

3. Darknet Markets & Illicit Trade:

Websites on the dark web use crypto for illegal activities like drug trade,
arms dealing, and human trafficking.

In 2022, over $1.5 billion worth of cryptocurrency was transacted on


darknet markets.

4. Cryptocurrency Theft:

Hackers use phishing and social engineering to steal crypto and launder
it on the blockchain.

Example: In 2022, hackers stole $4 billion in crypto.

5. Terror Funding:

Terrorists use crypto to fund their organizations, making tracing difficult.

Example: Israel seized $1.7 million in crypto from terror groups in 2023.

Challenges for Law Enforcement:

Blockchain 6
It’s hard to catch crypto criminals due to the anonymous nature of
cryptocurrencies.

Authorities need advanced blockchain analytics to track and stop criminals.

3.8 Dark Side of Bitcoin Crimes


Bitcoin’s decentralized nature has led to groundbreaking innovation, but it also
facilitates serious cybercrimes.

Famous Cases:

1. Mt. Gox Hack (2014):

One of the biggest Bitcoin exchange hacks. 850,000 bitcoins (worth $500
million) were stolen.

Led to Mt. Gox's bankruptcy and shattered trust in crypto exchanges.

2. Sheep Marketplace Heist (2013):

Darknet marketplace exit scam. 96,000 bitcoins stolen ($6 billion today).

3. NiceHash Hack (2017):

Mining service hacked. 4,000 bitcoins ($63 million) were stolen.

4. BitGrail Exchange Hack (2018):

Hackers stole 17 million Nano coins worth $195 million.

5. Parity Wallet Hack (2017):

$300 million worth of Ether frozen due to a code vulnerability.

6. The DAO Attack (2016):

Hackers stole $60 million worth of Ether by exploiting a smart contract


vulnerability.

7. Bitfinex Hack (2016):

119,756 bitcoins ($72 million) stolen. Bitfinex reduced all account balances
by 36%.

8. QuadrigaCX Exit Scam (2019):

Blockchain 7
CEO allegedly died, and $250 million in customer funds disappeared.

9. Coincheck Hack (2018):

$534 million worth of NEM altcoins stolen from the Japanese exchange.

10. PlusToken Scam:

Ponzi scheme that defrauded investors of over $2 billion worth of Bitcoin.

11. Bitconnect Scam:

Promised high returns for lending Bitcoin, but was an unsustainable Ponzi
scheme.

12. OneCoin Pyramid Scheme:

A fraudulent digital currency that raked in $4 billion.

Ransomware Payments:

Bitcoin is often used for ransomware payments, enabling cybercriminals to


remain anonymous.

Darknet Markets:

Platforms like Silk Road used Bitcoin for illegal transactions (e.g., drugs,
weapons).

Scams and Fraud:

1. Pump and Dump Schemes:

Investors artificially inflate the price of a coin, then sell at a profit, leaving
others with losses.

2. Fake ICOs:

Fraudsters create fake initial coin offerings (ICOs) to trick investors.

These crimes show the vulnerabilities of cryptocurrency markets, exchanges,


and wallets, leading to the need for better security and regulations.

Gossip Protocol (4.4) Notes


Definition: Gossip protocol (or epidemic protocol) is used in peer-to-peer
(P2P) systems for spreading information, similar to how gossip or rumors

Blockchain 8
spread in social groups.

Purpose: Helps in disseminating data across all members in distributed


systems, especially in dynamic environments.

Key Features:
1. Decentralization: No central authority; nodes communicate randomly with
each other.

2. Probabilistic Selection: Peers are selected randomly to share information,


promoting fast information spread.

3. Asynchronous Communication: Nodes gossip without synchronized


schedules, allowing flexible and resilient communication.

4. Scalability: Works efficiently even as the system grows larger.

5. Fault Tolerance: Can handle node failures as the gossip continues across
other nodes.

6. Eventual Consistency: All nodes will eventually converge to the same


information.

How It Works:
1. Peer Selection: Each node randomly selects a few peers to share data with.

2. Information Exchange: Nodes share and receive data, ensuring that


information propagates across the network.

3. Propagation: As gossip spreads, more nodes receive the data, leading to


wider distribution.

4. Iterative Process: Repeated cycles of peer selection and information sharing


ensure full data dissemination.

5. Convergence: Over time, all nodes will have the same shared data.

Types of Gossip Protocol:


1. Anti-Entropy: Synchronizes node states by periodically exchanging full
datasets or summaries.

Blockchain 9
2. Rumor-Mongering: New information is spread by selecting a subset of nodes,
using fewer resources.

3. Epidemic Broadcast: Information is spread rapidly using a parameter (fanout)


that determines how many nodes are contacted.

Advantages:
Low Overhead: Requires minimal communication between nodes.

Adaptability: Adjusts to network changes dynamically.

Efficiency: Enables data spread without significant resource use.

Use Cases:
Distributed databases

Cluster management

Peer-to-peer networks like BitTorrent, blockchain, and Kafka

Cryptocurrency Exchanges
Cryptocurrency exchanges are platforms where users can trade digital currencies
like Bitcoin, Ethereum, and Tether. These exchanges serve as digital marketplaces
for buying and selling cryptocurrencies, operating similarly to stock exchanges
but dealing in digital assets.

What are Cryptocurrency Exchanges?


Cryptocurrency exchanges allow users to buy, sell, and trade cryptocurrencies
and other digital assets. These platforms are privately owned and often charge
transaction fees. Popular digital assets available on these exchanges include
Bitcoin (BTC), Ethereum (ETH), and various fiat currencies. The exchanges also
offer different trading options, such as margin trading and futures.

How Do Cryptocurrency Exchanges Work?


To start using a cryptocurrency exchange, users must create an account,
complete a KYC process, and fund the account with fiat or digital currencies.

Blockchain 10
Afterward, users can select a cryptocurrency and trade based on their
preferences.

Types of Cryptocurrency Exchanges

Centralized Exchanges (CEX)


These exchanges are similar to traditional stock exchanges, where a central
authority regulates and monitors transactions. Popular examples include Binance,
Coinbase, and Kraken. CEXs are user-friendly and offer higher security, but they
also charge transaction fees and store assets, posing risks if they are hacked or
go bankrupt.
Advantages:

User-friendly for beginners

High liquidity

Faster transactions

Disadvantages:

Vulnerable to hacking

High transaction fees

Decentralized Exchanges (DEX)


DEXs operate without a central authority, allowing peer-to-peer transactions.
Users have full custody of their digital assets and maintain privacy. Popular DEXs
include Uniswap, PancakeSwap, and dYdX.
Advantages:

Full custody of assets

Less market manipulation

More privacy and security

Disadvantages:

Complex for beginners

Lower liquidity

Blockchain 11
Hybrid Exchanges
A hybrid exchange combines the features of both CEX and DEX. It aims to offer
the user-friendliness and liquidity of a centralized exchange with the privacy and
security of a decentralized one.

Pros:

Privacy and security of DEX

Convenience of CEX

Cons:

New and less developed

Things to Check Before Selecting a Crypto Exchange


Registration: Ensure the exchange is registered in your country.

Transparency: Check how the exchange handles your funds.

Security: Review its security features and whether it discloses its


cryptocurrency reserves.

Customer Support: Ensure they offer reliable customer support.

Reputation: Research the exchange’s history, security issues, and customer


reviews.

Differences Between Cryptocurrency Exchanges and Wallets


Exchanges: Facilitate crypto trading and might include custodial wallets.

Wallets: Focus on securely sending, receiving, and storing cryptocurrencies


and often use private keys.

Selecting a Crypto Exchange


When choosing an exchange, consider its security features, fees, currency pairs
offered, and withdrawal options. It's crucial to select one that fits your specific
investment needs.

4.9. E-Governance

Blockchain 12
Definition of e-Governance
E-Governance involves the use of Information and Communication Technology
(ICT) to improve the functions of the government, focusing on creating a SMART
governance system:

Simple: Simplifying government procedures.

Moral: Enhancing efficiency with technology interventions.

Accountable: Implementing systems to ensure accountability.

Responsive: Streamlining processes for faster responses.

Transparent: Ensuring information is publicly available.

Blockchain plays a significant role in transforming e-governance by improving


transparency, security, and efficiency, fostering trust, and reducing corruption.

SMART Governance
Simple: Streamlining rules and processes with ICT for a user-friendly
government.

Moral: Utilizing technology to enhance administrative and political machinery


efficiency.

Accountable: Ensuring public service accountability through performance


tracking.

Responsive: Speeding up and simplifying processes.

Transparent: Providing open access to governmental data, ensuring


transparency.

Blockchain in E-Governance Worldwide


1. Estonia: E-Residency program ensures secure digital identities using
blockchain.

2. Dubai: Aims for a fully blockchain-powered government by enhancing


services across sectors.

3. Georgia: Uses blockchain for land registry, securing property titles.

4. Singapore: TradeTrust streamlines verification and prevents trade fraud.

Blockchain 13
5. West Virginia: Blockchain-based voting system for overseas military
personnel.

Countries Adopting Blockchain


Dubai: Blockchain in government services, aiming for a "Smart City."

Estonia: Implementing blockchain for sustainable governance.

Brazil: Moving voting processes to Ethereum.

Chile: Using Ethereum for energy data tracking.

Switzerland: Offering digital IDs on Ethereum.

Canada: Using Ethereum to ensure transparency in government grants.

Advantages of E-Governance
Enhanced delivery and efficiency of services.

Better government-business interactions.

Citizen empowerment through accessible information.

Reduced corruption and increased transparency.

Cost savings and organizational restructuring.

Interactions in E-Governance
1. G2C (Government to Citizens): Improves service accessibility and quality.

2. G2B (Government to Business): Cuts red tape and fosters transparency in


licensing, permits, and procurement.

3. G2G (Government to Government): Enhances interaction between


governmental departments.

4. G2E (Government to Employees): Streamlines processes for improved


employee satisfaction.

E-Governance Initiatives in India


National Task Force on IT (1998) and Ministry of IT (1999).

Blockchain 14
IT Act (2000) and its amendment in 2008.

Various state-level e-governance projects like e-Seva and Bhoomi.

National e-Governance Plan (NeGP) with 31 Mission Mode Projects (MMPs).

National Policy on IT (2012).

Key Features of E-Governance


Decision Making: Involves all stakeholders through online portals.

Management: Transparent management of people and projects.

Services: Provided through online services for improved delivery.

Transactions: Digital transactions increase efficiency and reduce costs.

Maturity Models in E-Governance


1. Gartner Study – Four Phase Model

2. IBM Study – Four Waves Model

3. Laynee & Lee Study – Four Stage Model

4. Adaptive E-Government Maturity Model

5. Citizen-Oriented E-Government Maturity Model

Challenges in E-Governance
Involving multiple stakeholders in decision-making.

Building trustworthiness in services.

Ensuring security and data loss prevention.

Monitoring large, complex projects across diverse users.

Blockchain in E-Governance
Smart Contracts: Self-enforcing agreements coded into blockchain,
automatically executing when conditions are met. Decentralized deployment
ensures security.

Blockchain Addressing E-Governance Issues

Blockchain 15
1. Trust and Transparency: Smart Contracts foster trust by requiring stakeholder
consent for changes, preventing unethical practices.

2. Efficiency: Eliminating intermediaries lowers costs and speeds up


transactions.

3. Availability: Decentralization ensures no single point of failure and reduces


risks of data breaches.

4. Data Security: Blockchain’s encryption, digital certificates, and signatures


protect against data breaches.

Blockchain 16

You might also like