Skip to main content

Cryptocurrency: A Boon or a Bane

Cryptocurrencies... 



 
A topic we all love to talk about and the topic we know the least about as basically it is the news nowadays cryptocurrencies news. Well it is bitcoin for most, for some even Ethereum (Ether), but do we actually know since the very start of Bitcoin in 2009, over 7,000 different variants of cryptocurrencies have been created.

 

So, what is this cryptocurrency and why is it a topic to talk about?


Well simply saying cryptocurrency is no different than the form of currency that we use but in the case of cryptocurrency it is not specific to a nation or a continent it can be used anywhere and everywhere through the internet  (might be too early to say that but yeah) , the basic reason for the boom in the cryptocurrency market is due to the fact it is a decentralized currency wherein each and every transaction is stored in a distributed ledger (Blockchain). And there is no central authority governing its issue and transactions.

 

Why and what is the reliability?



Well for most of these cryptocurrencies (Bitcoin, Ethereum, Bitcoin Cash,... 7000 remember; for this context, we will stick to Bitcoin) use a ledger-based system known as Blockchain for verification and data consensus, and the distributed data is backed by cryptography. And the fact that no central entity holding the power or data for any kind of transaction. With the feature of Exchange and Atomic swaps, it is even more convenient to use.


Transaction

For each and every transaction to happen certain standards are to be met which is verified by UTXO (Unspent Transactional Output) these standards include:

  • Proof of ownership: For the very beginning of each transaction there is proof of ownership needed this is basically in the form of private keys or hash to the specific ledger makes the owner of the private key associated with the file in the Blockchain.

 

  • Available Funds: Once the owner is verified now this is a basic as well as a crucial step verifying that the ledger associated with the owner whether it has the specific amount for the transaction or not if yes UTXO moves to the third and the last step and if no the transaction is denied and the process is canceled.  

 

  •  No other transaction using the same fund: This stage is quite a bit technical so basically in this step the system verifies that no two different transactions is happening simultaneously from the same owner.

Now once the UTXO verifies the transaction the data is stored in the ledger in the hash format and then a data consensus takes place by the method of Consensus voting which is one CPU one vote not the one identity one vote, the ledger verifies the legit hash of each transaction and then it is stored through the network without the network even knowing which or whose transaction is it (Cryptography).


 

Cryptocurrency a boom or bane:


Analyzing the growth of cryptocurrencies especially talking about Bitcoins since the beginning in 2009 it has covered a vast journey in a short span of time since the very initial years when its market value was estimated around $0.0008 to $0.08 for a single coin in 2010 to as high as $19,783 per bitcoin in late-2017 and then again averaging around $7,000 as of April 2020 and then again within a few months recently touching its all-time high of $19,860 on November 30, 2020, at a current price of over $19,500 per unit, bitcoin’s market cap today is hovering at around $362 billion dollars so it is no doubt that cryptocurrencies are a big boon with a few ups and downs just as any other currency.


"The big money is not in the buying or selling, but the waiting"

 -Charlie Munger

Comments

Popular posts from this blog

Privacy and Confidentiality

Differences Privacy : Basically the term privacy refers to keeping your information yours or limiting it to close family or your friends or your contacts,  Whereas on the other hand,  Confidentiality: talks about that a subjects information will stay a secret but this time from the perspective of the person receiving that information.  For example : on any social media platform we tend to share our information to limited or specific people or groups that is a matter of privacy concerns, but the same when it is about our passwords, our biometrics, our messages ,ATM pins, CVV these are all confidential information. These are some basic terms but play a vital role in our everyday lives , we all need privacy we don't want anyone sniffing our day to day activities we all want our space and that's the reason why being secure not just online but offline too is needed. Because privacy is not just  what we demand for its a right we all have. #RightToPrivacy ...

CyberAwareness

Cyber Security One of the most fundamental terms used by many practiced by none. We often use this heavy term to designate ourselves with the modern growing digital world.  Every single device in today's world is related to our lives one way or the other each of these devices know our day to day activities as they make our lives simpler as for example we often use Google Maps to find our way around day to day ,we use certain apps that manage our daily activities as they keep a track of our activities on daily basis. Now comes a bitter part if an intruder or maybe someone else get a hand on these apps identifying them as you gets to know everything that app knows about you everything from morning to evening, where we stay ,what we watch , what we do, our credit card details and many more.  In this digital age things have been a bit easier no doubt but at a big risk . Being secure in the digital age is very essential .Being a part of this day to day digital age we ha...

Critical Urban Infrastructure

  Urban Infrastructure is at a critical stage from a cybersecurity perspective. When we mostly talk about cybersecurity, we take computers into play, mobile devices, IOT’s but the infrastructure well unfortunately no we never even think that the infrastructure is at a potential risk. As Infrastructure is also a tempting place for adversaries. Not just the infrastructure but the Urban-Infrastructure, as living in the digital age just how everything seems to be so easily available and accomplished it is even for those sneaky adversaries whose only intention is to compromise the system in any way possible and just for information every single system infrastructure that we use in our day-to-day commute including communications, money dispensers, banks, waste management, cabs, traffic signals, vehicles, electricity, water, health care and well everything is controlled digitally one way or the other. And in an Urban Infrastructure everything will be as easy as a push of a button (no...