In this article, let's try to find how many blocks a recipient should wait for before accepting a transaction. …Read…
In the previous article, we found the probability of double-spending. In this article, let's look at the probability of an…
We tried to understand the 51% attack through the gambler's ruin problem and the probability of a gambler winning T…
This article discusses the solution to the gambler's ruin problem as a precursor to understanding the probability of double spending.…
So far, we have briefly touched upon the idea of the 51% attack and how it actually allows double spending…
We looked at double spending and immutability in blockchain in the previous article. In this article, let’s discuss forks in…
In the last article, we looked at the process of mining in blockchain in depth. This article will look at…
We looked at Merkle proof in the previous article and that concluded our discussions on blocks and their structure. In…
In the last article, we discussed the Merkle tree and how we can use that to ensure integrity, that is,…
In this article, we talk about block structure in blockchain, the block header and how we generate the Merkle root.…Read…
We looked at the Proof-of-Work algorithm in the previous article, and in this article, we shall look at how we…
In the previous article, we saw how we use a puzzle to achieve consensus. In this article, we will see…
In the previous article, we saw how we order transactions in a blockchain by hashing transactions. However, this alone doesn’t…
In the previous article, we took a look at how we verify transactions in detail. In this article, we will…
We discussed proving ownership of bitcoins in the previous article. Let’s discuss how verifying transactions works at length in this…
This article discusses blockchain account addresses, how they are used to prove ownership of bitcoins and how blockchain transactions work.…Read…