๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ

How do transactions get added to a block over the network?

- First, users broadcast their transactions to all network nodes, which gather these transactions into a block, preparing them for confirmation and inclusion in the blockchain.

- Second, the miners compete to find the next block, and broadcast it to all the nodes for verification, along with all the transactions that will be included in that block.

- And third, the nodes check the hash and the transactions, to make sure none of the coins have been spent before. If everything is in order, then the block is added to the chain, and all the transactions in it are considered valid.

In the #Bitcoin network, the longest chain, which represents the most cumulative computational work, is always considered the valid one. When two different blocks are broadcast simultaneously, each node works on the first one it received, but keeps a record of the other one, just in case. When another block is added to one of the previous chains, the other one is discarded, and the longest chain becomes the ๐˜ฐ๐˜ฏ๐˜ญ๐˜บ chain from the nodeโ€™s point of view.

In the Bitcoin network, new transactions don't need to reach ๐˜ฆ๐˜ท๐˜ฆ๐˜ณ๐˜บ node, but must reach many of them to be included in a block. The nodes that miss a block for any reason will automatically request it when receiving the next one. This makes Bitcoin resilient to connectivity issues and ensures reliable transaction propagation.

๐Ÿงต๐Ÿ‘‡

๐—œ๐—ป๐—ฐ๐—ฒ๐—ป๐˜๐—ถ๐˜ƒ๐—ฒ

A unique transaction in each new block rewards the miner with newly created digital coins. This incentivizes network participants to contribute computing power to support and secure the network.

Another incentive to mine is transaction fees, which are generally determined by the amount of data in a transaction, and the number of other transactions waiting to be confirmed.

As the reward of new coins is cut in half every 4 years or so, it will shrink to become less than the transaction fees, which will eventually become the sole source of revenue for the miners.

Not only does this system incentivize participants to secure the network, but also to act honestly and follow the rules. Dishonesty and rule-breaking in #Bitcoin will very likely end badly, but simply playing along with others according to the rules will benefit both you and them.

๐Ÿงต๐Ÿ‘‡

Reply to this note

Please Login to reply.

Discussion

๐—ฅ๐—ฒ๐—ฐ๐—น๐—ฎ๐—ถ๐—บ๐—ถ๐—ป๐—ด ๐——๐—ถ๐˜€๐—ธ ๐—ฆ๐—ฝ๐—ฎ๐—ฐ๐—ฒ

Bitcoin uses Merkle Trees to compact old blocks and save disk space, without compromising its security. Merkle Trees are ways to efficiently verify the integrity of a large set of data by organizing it into a tree-like structure.

When transactions are sufficiently buried under more recent blocks, the network discards the spent transactions that occurred earlier, thus reducing the size of old blocks. This approach ensures the blockchain's long-term sustainability as it continues to grow.

The storage requirements for #Bitcoin block headers are manageable due to their small size, which is approximately 80 bytes. If new blocks are found on average every 10 minutes, then every year about 4.2MB would be added to the blockchain. This means Bitcoinโ€™s hardware requirements should remain easily manageable, especially when considering Mooreโ€™s Law.

For context, Moore's Law is not a ๐˜ญ๐˜ข๐˜ธ like the laws of thermodynamics. Rather, itโ€™s the ๐˜ฐ๐˜ฃ๐˜ด๐˜ฆ๐˜ณ๐˜ท๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ that computer processing power roughly doubles every two years, leading to increasingly powerful and smaller electronic devices.

๐Ÿงต๐Ÿ‘‡

๐—ฆ๐—ถ๐—บ๐—ฝ๐—น๐—ถ๐—ณ๐—ถ๐—ฒ๐—ฑ ๐—ฃ๐—ฎ๐˜†๐—บ๐—ฒ๐—ป๐˜ ๐—ฉ๐—ฒ๐—ฟ๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป

Simplified Payment Verification (SPV) makes it easier to verify #Bitcoin payments for users who don't maintain a full blockchain copy. Users need only the block headers from the longest chain, and a Merkle branch for the transaction they want, to verify a transaction and confirm network acceptance.

If nodes are honest, then SPV can rely on them for transaction verification. However, it becomes vulnerable if a significant portion of the network is controlled by an attacker. To protect against this, users can accept alerts from network nodes that detect invalid blocks. Those with higher security needs may choose to run their own full node, offering more independent security and quicker verification by directly participating in the network.

๐Ÿงต๐Ÿ‘‡

๐—–๐—ผ๐—บ๐—ฏ๐—ถ๐—ป๐—ถ๐—ป๐—ด ๐—ฎ๐—ป๐—ฑ ๐—ฆ๐—ฝ๐—น๐—ถ๐˜๐˜๐—ถ๐—ป๐—ด ๐—ฉ๐—ฎ๐—น๐˜‚๐—ฒ

#Bitcoin transactions are made of inputs (sources of funds) and outputs (destinations for funds). Theyโ€™re designed to be efficiently combined and split as needed.

A single input can be easily split into the outputs that include what the payee keeps, and any change the sender should get back. And multiple inputs can be combined into a single output, if payment is exact. This flexibility allows Bitcoin transactions to accommodate various scenarios and streamline the process of handling value.

Satoshi notes here regarding an issue called "fan-out" โ€” in which a transaction relies on multiple previous transactions, each of which depends on numerous others, creating a web of dependencies that can become unwieldy. But Bitcoin's design ensures that transactions only reference the necessary inputs and outputs, without requiring all the underlying transaction details.

๐Ÿงต๐Ÿ‘‡

๐—ฃ๐—ฟ๐—ถ๐˜ƒ๐—ฎ๐—ฐ๐˜†

In the legacy banking system, privacy is protected by a trusted central authority. But in #Bitcoin, there is no trusted central authority, and all transactions are publicly announced on the blockchain. So how can you maintain your privacy while using Bitcoin?

Satoshiโ€™s proposed solution is to keep public keys anonymous. None of your personally identifying information is kept on the blockchain, so if you send some bitcoin to a friend, all that anyone can see is that ๐˜ด๐˜ฐ๐˜ฎ๐˜ฆ๐˜ฐ๐˜ฏ๐˜ฆ sent that amount of bitcoin to someone else โ€” or, perhaps they sent it to another wallet of their own ๐Ÿค” โ€” but they canโ€™t tell ๐˜ธ๐˜ฉ๐˜ฐ sent or received it.

As an additional precaution, one could employ a fresh pair of cryptographic keys (a private key and a public key) for each transaction. This can make it harder for even the very observant to determine who owns what bitcoin. But if multiple inputs that appeared to be owned by different users are combined in a single transaction, that will reveal the fact that theyโ€™re all owned by the same individual.

And if your public key is ever tied to your identity, such as when you buy bitcoin through an exchange that requires your personal information, it can be very difficult to regain your privacy.

๐Ÿงต๐Ÿ‘‡

๐—–๐—ฎ๐—น๐—ฐ๐˜‚๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€

If an attacker strives to create an alternate blockchain thatโ€™s longer than the honest one, it's essential to understand that Bitcoin's security and integrity remain intact. The system has protections against arbitrary alterations, such as generating invalid bitcoin or seizing someone elseโ€™s funds.

The main way for an attacker to exploit #Bitcoin is by modifying one of their recent transactions. In other words, they could buy something with bitcoin, and then undo the transaction. But even this would need to follow the system's rules and withstand scrutiny from honest nodes.

In the realm of Bitcoin's security, there's an ongoing competition between the honest chain (the legitimate blockchain) and an attacker's chain (a potentially malicious blockchain). Satoshi likens this contest to a "Binomial Random Walk", which is a statistical model where something moves unpredictably from one state to another.

Essentially, this description portrays the race between the honest and attacker's chains as a series of random events, with each additional block being a โ€œstepโ€ in this unpredictable journey. Seeing it this way helps us grasp the probabilistic nature of their competition, and the factors influencing their progress.

Itโ€™s possible to calculate the probability of an attacker catching up to the legitimate chain. Satoshi compared this to a "Gambler's Ruin" problem, in which a hypothetical gambler begins with a deficit and has unlimited resources to continue playing. This mirrors an attacker attempting to catch up to the honest blockchain when the attacker's chain is initially behind.

The probability being calculated is similar to assessing the likelihood of the gambler ever reaching the point of breaking even in their betting game. This provides a formal method to gauge the likelihood of these events happening over time.

As we calculate the probability of an attacker catching up to the honest blockchain, we see that ๐˜ต๐˜ฉ๐˜ฆ๐˜ช๐˜ณ ๐˜ค๐˜ฉ๐˜ข๐˜ฏ๐˜ค๐˜ฆ๐˜ด ๐˜ฅ๐˜ช๐˜ฎ๐˜ช๐˜ฏ๐˜ช๐˜ด๐˜ฉ ๐˜ฆ๐˜น๐˜ฑ๐˜ฐ๐˜ฏ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ข๐˜ญ๐˜ญ๐˜บ as the number of blocks they need to catch up with increases.

This analysis even gives the attacker the benefit of the doubt, assuming he has greater computational power than the honest nodes. But even then, ๐—ถ๐—ณ ๐˜๐—ต๐—ฒ ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐—ฒ๐—ฟ ๐—ฑ๐—ผ๐—ฒ๐˜€๐—ป'๐˜ ๐—ด๐—ฎ๐—ถ๐—ป ๐—ฎ ๐˜€๐˜‚๐—ฏ๐˜€๐˜๐—ฎ๐—ป๐˜๐—ถ๐—ฎ๐—น ๐—น๐—ฒ๐—ฎ๐—ฑ ๐—ฎ๐˜ ๐˜๐—ต๐—ฒ ๐—ผ๐˜‚๐˜๐˜€๐—ฒ๐˜, ๐˜๐—ต๐—ฒ๐—ถ๐—ฟ ๐—ฐ๐—ต๐—ฎ๐—ป๐—ฐ๐—ฒ๐˜€ ๐—ผ๐—ณ ๐˜€๐˜‚๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐—ณ๐—ฎ๐—น๐—น ๐—ผ๐˜ƒ๐—ฒ๐—ฟ ๐˜๐—ถ๐—บ๐—ฒ.

The expanding computational power of the honest network makes it progressively harder for the attacker to overtake it. This beautifully demonstrates the security and robustness of the Bitcoin network.

Next, Satoshi delves into the question of how long a bitcoin recipient may wish to wait, in order to have enough confidence that the transaction can never be altered. He describes a scenario that involves a cautious recipient who wants to guard against a possibly malicious sender who intends to alter the transaction.

As a countermeasure to prevent a dishonest sender from preparing a fraudulent transaction in advance, the recipient can generate a new pair of cryptographic keys and provide the sender with the new public key just before signing the transaction. This approach reduces the window of opportunity for the sender to work on an attacking chain ahead of time.

Then Satoshi explains how waiting for Bitcoin transactions to be confirmed is crucial for transaction security. He estimates the potential progress an attacker might make during this waiting period, using statistical calculations, including Poisson distributions (๐˜ช.๐˜ฆ. ๐˜ข ๐˜ฎ๐˜ฆ๐˜ต๐˜ฉ๐˜ฐ๐˜ฅ ๐˜ง๐˜ฐ๐˜ณ ๐˜ฑ๐˜ณ๐˜ฆ๐˜ฅ๐˜ช๐˜ค๐˜ต๐˜ช๐˜ฏ๐˜จ ๐˜ณ๐˜ข๐˜ฏ๐˜ฅ๐˜ฐ๐˜ฎ ๐˜ฐ๐˜ค๐˜ค๐˜ถ๐˜ณ๐˜ณ๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ๐˜ช๐˜ฏ ๐˜ข ๐˜ด๐˜ฑ๐˜ฆ๐˜ค๐˜ช๐˜ง๐˜ช๐˜ค ๐˜ฑ๐˜ฆ๐˜ณ๐˜ช๐˜ฐ๐˜ฅ ๐˜ฐ๐˜ง ๐˜ต๐˜ช๐˜ฎ๐˜ฆ, ๐˜ถ๐˜ด๐˜ช๐˜ฏ๐˜จ ๐˜ข๐˜ท๐˜ฆ๐˜ณ๐˜ข๐˜จ๐˜ฆ๐˜ด), to determine the expected value of the attacker's progress.

When all the mathematical probabilities are taken into account, letโ€™s just say the attacker would be better off just using Bitcoin honestly. ๐Ÿ˜‰

๐Ÿงต๐Ÿ‘‡

๐—–๐—ผ๐—ป๐—ฐ๐—น๐˜‚๐˜€๐—ถ๐—ผ๐—ป

The Bitcoin Whitepaper presents a system for electronic transactions that eliminates the need for trust in a central authority. It achieves this through the use of digital signatures to determine ownership, and introduces a peer-to-peer network with a proof-of-work mechanism to prevent double-spending.

#Bitcoin is designed to be robust and unstructured, allowing nodes to operate independently and participate in the consensus mechanism, thus enforcing rules and incentives.

Bitcoin's true innovation is its ability to create a decentralized, secure, and reliable money, which is revolutionizing the world from its deepest foundations.

๐Ÿงต๐Ÿ‘‡

Thatโ€™s it! Thatโ€™s my easy-to-read summary of the Bitcoin Whitepaper! ๐ŸŽ‰

Did that help you understand the Whitepaper better?

Give it a ๐—Ÿ๐—ถ๐—ธ๐—ฒ๐Ÿค™ and ๐—•๐—ผ๐—ผ๐—ธ๐—บ๐—ฎ๐—ฟ๐—ธ๐Ÿ”– this for future use.

Know anyone who would appreciate this?

๐—ฆ๐—ต๐—ฎ๐—ฟ๐—ฒ๐Ÿ”„ this thread with them.

The Bitcoin Whitepaper is now 15 years old! ๐Ÿคฉ

๐—›๐—ฎ๐—ฝ๐—ฝ๐˜† ๐—ช๐—ต๐—ถ๐˜๐—ฒ๐—ฝ๐—ฎ๐—ฝ๐—ฒ๐—ฟ ๐——๐—ฎ๐˜†! ๐ŸŽ‚

I have been reading topics about bitcoin for sometime,and i still am having a bit of a hard time on fully understanding it...

Also i'm wondering why isn't it still accepted or used as money by the majority?how can people get it/understand it, if it still not be used?