Blockchain and cryptocurrency are two terms that you will encounter in the media several times a week. Sometimes it is about the prices, sometimes about the robbery of an ‘Exchange’. Everyone talks about it and everyone can mention a number of characteristics of blockchain and cryptocurrency.
But what about the underlying technology right now? Why is it apparently still possible to steal money while blockchain is considered safe? Why are huge amounts of hardware needed for mining and what is that anyway?
Many people know answers to some of these questions, few know all the answers. In order to actually determine what these phenomena can mean for our daily lives and to develop new areas of application, a deeper understanding is necessary.
This blog is the first in a series that goes deeper into the underlying technology, which relies heavily on cryptography. The blog series will start by illuminating the cryptographic background and, because we will have all the ingredients available at a certain moment, will make a small detour to certificates, such as those used on secure (https) websites.
In addition to the blogs in which the concepts are explained, there will also be blogs about the problems, weaknesses and common mistakes regarding these concepts, in order to give a complete picture of the use of technology and what to look for when using this technology.
Many of the mistakes are obvious, yet they are made over and over again and ultimately pose a great risk to safety and privacy. As an example, it can be mentioned here that there are still a huge number of websites that do not store passwords or do not store them in an encrypted manner, even though doing this the right way requires little extra effort.
The entire blog series:
- Checksums and hashes; checksums and hashes are check numbers. They allow you to check whether a piece of information about which the number has been calculated has remained unchanged since the number was calculated.
- Keys & encryption; encryption is the conversion of information into a “secret language” which can only be traced back to the original data by using the key.
- Blockchain; this is the basic technique used for application in the cryptocurrency that uses hashes, keys and encryption.
- Bitcoin; we use the best-known cryptocurrency as an example in this blog series.
- Other blockchain applications; other possible and useful applications of blockchain technology.
For every subject, with the exception of the latter, two blogs will be published. One with the explanation and one on the dark side of the discussed technology.