Publish cryptocurrency page
This commit is contained in:
parent
51c60f2015
commit
860b969e56
|
@ -0,0 +1,105 @@
|
|||
---
|
||||
layout: post
|
||||
title: Cryptocurrency
|
||||
subtitle: Introduction to Cryptocurrency terminology
|
||||
gh-repo: daattali/beautiful-jekyll
|
||||
gh-badge: [star, fork, follow]
|
||||
tags: [introduction,cryptocurrency,terminology]
|
||||
---
|
||||
|
||||
|
||||
## 1 Introduction
|
||||
|
||||
Monero project offers a decentralized and anonymous open-source
|
||||
cryptocurrency with a regular update cycle that does not limit the user
|
||||
to use certain software or hardware. With such an open approach, it
|
||||
is often difficult for users to keep up and be aware of many choices on
|
||||
the client side, that can be either good or bad for them.
|
||||
As cryptocurrency usage is rising in general, it is also more and
|
||||
more frequent to encounter malicious sites or software developers
|
||||
that aim to take control over users funds to gain an easy profit. This
|
||||
thesis focuses on the Monero usage and mining from usable security
|
||||
view to explain the current state in the Monero ecosystem and reflect
|
||||
the real-world usage data from both users and miners surveys.
|
||||
The goal of this thesis is to map usage habits of Monero cryptocur-
|
||||
rency users and miners from both technological as well as security
|
||||
view. Another goal is to create a detailed user guideline for user-
|
||||
friendly and secure usage of the Monero cryptocurrency including
|
||||
key management and backup strategy. For miners, the goal is to im-
|
||||
plement an automated deployment of mining rigs using one of the
|
||||
popular configuration management tools.
|
||||
To find an answer to such research questions and to get real world
|
||||
usage data, I conducted a Monero User Research survey in which
|
||||
113 participants shared their habits regarding Monero cryptocurrency.
|
||||
Based on the survey results and IT industry practices I proposed a
|
||||
Monero usage and storage best practices guide that covers the key
|
||||
generation, wallet management, and a secure backup scheme.
|
||||
Aside from clients, key parts of Monero are also miners and Mon-
|
||||
ero network itself. As miners are the ones who verify transactions and
|
||||
keep the network running, it was important to describe the mining
|
||||
software and categories which are later used in the Monero Miners
|
||||
Research survey. In the survey, 60 miners shared technical informa-
|
||||
tion about their current mining setups. This was later reflected in the
|
||||
proposed guide for designing secure mining environment in which
|
||||
the automation was the main aspect.
|
||||
The thesis describes a detailed overview of wallet and its types,
|
||||
as well as ways how to attack the wallet, followed by transaction
|
||||
features in the Monero and problems in Monero environment from
|
||||
both Monero network and Monero malware sides.
|
||||
The thesis is divided into 10 Chapters. The first three Chapters
|
||||
describe Monero cryptocurrency, its development cycle, transactions
|
||||
in the network, wallets, multisig together with cryptocurrency com-
|
||||
petitors, problems in Monero environment and overall Monero use
|
||||
case. The fifth and sixth Chapters describe the Monero User Research,
|
||||
its results and propos a detailed guideline for best practices in Monero
|
||||
usage and storage. The eight and ninth Chapters describe the Mon-
|
||||
ero Miners Research, its results and the design of the secure mining
|
||||
environment. The last Chapter covers the final conclusion.
|
||||
|
||||
|
||||
## 2 Cryptocurrency
|
||||
|
||||
This Chapter is aimed as a starting point that explains terms and tech-
|
||||
nology that will occur throughout the following pages and Chapters.
|
||||
Although these terms provide only a short description, it is recom-
|
||||
mended for every reader to swift through them as in later pages they
|
||||
are discussed and used in detail thoroughly.
|
||||
**Cryptocurrency** is a digital currency that is designed to use cryp-
|
||||
tography to secure and verify its transactions. Cryptocurrencies are
|
||||
decentralized as opposed to traditional money transaction systems
|
||||
used in the banks. Decentralization is established by using distributed
|
||||
blockchain that functions as a transaction database within the currency.
|
||||
First cryptocurrency available was Bitcoin [1].
|
||||
**Altcoin** is a term used for every cryptocurrency that is not Bitcoin.
|
||||
**The fork** happens when developers create a copy of existing project
|
||||
codebase and start their path of development with it.
|
||||
**The market capitalization** (market cap) is a total value of cryp-
|
||||
tocurrency that refers to the total number of emitted coins multiplied
|
||||
by the value of the coin.
|
||||
**The blockchain** is a technology responsible for storing every trans-
|
||||
action that has ever been processed in the cryptocurrency, also often
|
||||
called as a ledger. The main purpose of the blockchain is to ensure the
|
||||
validity of completed transactions.
|
||||
**Transactions** within cryptocurrency are processed together as
|
||||
blocks that are verified by miners and then added to the blockchain
|
||||
as a new mined block.
|
||||
**The wallet** is a storage medium that holds private and public keys
|
||||
by which the user can access, send and receive funds. Wallet effectively
|
||||
does not have the coins but is rather a key to access them from the
|
||||
blockchain.
|
||||
**The node** is a computer connected to the cryptocurrency network.
|
||||
The node is often referred to as a full node which means that the
|
||||
computer maintains a full copy of blockchain. This results in node
|
||||
downloading every block and transaction and checking them against
|
||||
cryptocurrency rules, especially whether the transaction has correct
|
||||
signatures, data format and the right number of emitted coins per
|
||||
block.
|
||||
|
||||
**The mining** process is done by miners that verify transactions on
|
||||
the network and adds them to the blockchain together in the form of
|
||||
a block which results in new coins being emitted as a reward for block
|
||||
solving.
|
||||
**Mining in pools** is the way how individual miners pool their com-
|
||||
putational resources. Due to resources pooling, there is a higher chance
|
||||
of solving the block, therefore gaining the reward of newly emitted
|
||||
coins.
|
Loading…
Reference in New Issue