[{"data":1,"prerenderedAt":762},["ShallowReactive",2],{"i-kinnu:logo":3,"i-kinnu:origami-folding":8,"tile-science-web-3-whats-a-blockchain":12,"i-lucide:chevron-right":757,"i-lucide:menu":760},{"left":4,"top":4,"width":5,"height":5,"rotate":4,"vFlip":6,"hFlip":6,"body":7},0,27,false,"\u003Cg fill=\"none\">\u003Cpath d=\"M0.046875 1.05555C0.046875 1.03541 0.048197 1.01579 0.0507438 0.996728C0.0987149 0.438619 0.586845 0 1.18194 0H25.4398C26.451 0 26.9575 1.171 26.2424 1.85585L15.7301 11.9243L1.31574 0.903476C1.17475 0.79568 1.01137 0.761884 0.859586 0.784111L26.2936 25.1441C27.0086 25.829 26.5022 27 25.4909 27H1.18194C0.555061 27 0.046875 26.5133 0.046875 25.9129V1.05555Z\" fill=\"currentColor\"/>\u003C/g>",{"left":4,"top":4,"width":9,"height":10,"rotate":4,"vFlip":6,"hFlip":6,"body":11},1000,236,"\u003Cg fill=\"none\">\u003Cpath fill-rule=\"evenodd\" clip-rule=\"evenodd\"\n    d=\"M193.68 38.2238C195.994 38.2238 197.87 40.0989 197.87 42.412V231.812C197.87 234.125 195.994 236 193.68 236H4.19013C1.87603 236 2.02305e-07 234.125 0 231.812V42.412C-2.02305e-07 40.0989 1.87603 38.2238 4.19013 38.2238H193.68ZM111.76 89.0072C111.685 87.9474 110.572 87.2905 109.608 87.7376L96.8872 93.641C95.7786 94.1554 95.702 95.7016 96.7545 96.3225L101.579 99.167C94.7045 109.365 90.5733 122.892 90.5732 137.642C90.5733 154.323 95.8569 169.439 104.416 179.945C105.301 181.032 106.9 181.196 107.987 180.311C109.075 179.426 109.238 177.828 108.353 176.741C100.621 167.25 95.6522 153.305 95.6521 137.642C95.6522 123.661 99.6138 111.051 105.963 101.754L110.456 104.403C111.508 105.024 112.826 104.21 112.74 102.991L111.76 89.0072ZM9.63194 136.286C9.14864 136.286 8.75684 136.678 8.75684 137.161C8.7569 137.644 9.14868 138.035 9.63194 138.035H17.2161C17.6993 138.035 18.0912 137.644 18.0912 137.161C18.0912 136.678 17.6994 136.286 17.2161 136.286H9.63194ZM22.6813 136.286C22.198 136.286 21.8062 136.678 21.8062 137.161C21.8063 137.644 22.1981 138.035 22.6813 138.035H30.2655C30.7487 138.035 31.1406 137.644 31.1406 137.161C31.1406 136.678 30.7488 136.286 30.2655 136.286H22.6813ZM35.7464 136.286C35.2631 136.286 34.8713 136.678 34.8713 137.161C34.8713 137.644 35.2631 138.035 35.7464 138.035H44.4973C44.9805 138.035 45.3724 137.644 45.3724 137.161C45.3724 136.678 44.9806 136.286 44.4973 136.286H35.7464ZM49.9977 136.286C49.5144 136.286 49.1226 136.678 49.1226 137.161C49.1226 137.644 49.5144 138.035 49.9977 138.035H57.5819C58.0651 138.035 58.4569 137.644 58.457 137.161C58.457 136.678 58.0651 136.286 57.5819 136.286H49.9977ZM63.0783 136.286C62.595 136.286 62.2032 136.678 62.2032 137.161C62.2033 137.644 62.5951 138.035 63.0783 138.035H70.6625C71.1457 138.035 71.5375 137.644 71.5376 137.161C71.5376 136.678 71.1457 136.286 70.6625 136.286H63.0783ZM76.1277 136.286C75.6444 136.286 75.2526 136.678 75.2526 137.161C75.2527 137.644 75.6445 138.035 76.1277 138.035H83.7119C84.1951 138.035 84.5869 137.644 84.587 137.161C84.587 136.678 84.1951 136.286 83.7119 136.286H76.1277ZM102.266 136.286C101.782 136.286 101.39 136.678 101.39 137.161C101.391 137.644 101.782 138.035 102.266 138.035H109.85C110.333 138.035 110.725 137.644 110.725 137.161C110.725 136.678 110.333 136.286 109.85 136.286H102.266ZM115.338 136.286C114.855 136.286 114.463 136.678 114.463 137.161C114.463 137.644 114.855 138.035 115.338 138.035H122.923C123.406 138.035 123.798 137.644 123.798 137.161C123.798 136.678 123.406 136.286 122.923 136.286H115.338ZM128.403 136.286C127.92 136.286 127.528 136.678 127.528 137.161C127.528 137.644 127.92 138.035 128.403 138.035H135.988C136.471 138.035 136.863 137.644 136.863 137.161C136.863 136.678 136.471 136.286 135.988 136.286H128.403ZM141.468 136.286C140.985 136.286 140.593 136.678 140.593 137.161C140.593 137.644 140.985 138.035 141.468 138.035H149.053C149.536 138.035 149.928 137.644 149.928 137.161C149.928 136.678 149.536 136.286 149.053 136.286H141.468ZM154.541 136.286C154.058 136.286 153.666 136.678 153.666 137.161C153.666 137.644 154.058 138.035 154.541 138.035H162.125C162.609 138.035 163 137.644 163.001 137.161C163.001 136.678 162.609 136.286 162.125 136.286H154.541ZM167.614 136.286C167.131 136.286 166.739 136.678 166.739 137.161C166.739 137.644 167.131 138.035 167.614 138.035H175.198C175.681 138.035 176.073 137.644 176.073 137.161C176.073 136.678 175.681 136.286 175.198 136.286H167.614ZM180.671 136.286C180.188 136.286 179.796 136.678 179.796 137.161C179.796 137.644 180.188 138.035 180.671 138.035H188.255C188.739 138.035 189.13 137.644 189.131 137.161C189.131 136.678 188.739 136.286 188.255 136.286H180.671Z\"\n    fill=\"currentColor\" />\n  \u003Cpath fill-rule=\"evenodd\" clip-rule=\"evenodd\"\n    d=\"M444.85 38.2277C447.164 38.2277 449.04 40.1028 449.04 42.4159V132.928C449.04 135.241 447.164 137.116 444.85 137.116H255.36C253.046 137.116 251.17 135.241 251.17 132.928V42.4159C251.17 40.1028 253.046 38.2277 255.36 38.2277H444.85ZM361.96 125.388C361.618 125.046 361.064 125.046 360.722 125.388L354.534 131.572C354.192 131.914 354.192 132.468 354.534 132.81C354.876 133.151 355.43 133.151 355.772 132.81L361.96 126.624C362.301 126.283 362.301 125.73 361.96 125.388ZM371.047 116.311C370.705 115.969 370.15 115.969 369.809 116.311L364.446 121.671C364.104 122.012 364.104 122.567 364.446 122.908C364.788 123.249 365.342 123.25 365.684 122.908L371.047 117.548C371.388 117.207 371.388 116.652 371.047 116.311ZM380.124 107.246C379.782 106.904 379.227 106.904 378.885 107.246L373.523 112.606C373.181 112.948 373.181 113.502 373.523 113.844C373.864 114.185 374.419 114.185 374.761 113.844L380.124 108.483C380.465 108.142 380.465 107.587 380.124 107.246ZM385.736 65.8841C385.891 64.6727 384.622 63.7845 383.536 64.3434L371.069 70.7636C370.124 71.2504 369.96 72.5334 370.752 73.2424L381.2 82.5938C382.11 83.4081 383.561 82.8672 383.717 81.6557L384.393 76.3725C391.143 77.1933 398.567 80.7709 404.771 86.9711C411.124 93.3213 414.726 100.952 415.43 107.827C415.573 109.221 416.819 110.236 418.214 110.093C419.609 109.95 420.624 108.703 420.481 107.309C419.644 99.1317 415.435 90.4514 408.362 83.3817C401.466 76.489 393.038 72.3185 385.038 71.338L385.736 65.8841ZM389.2 98.1733C388.859 97.8319 388.304 97.8318 387.962 98.1733L382.6 103.534C382.258 103.875 382.258 104.429 382.6 104.771C382.941 105.112 383.496 105.112 383.838 104.771L389.2 99.4108C389.542 99.0693 389.542 98.5149 389.2 98.1733ZM398.262 89.1047C397.92 88.7633 397.365 88.7632 397.024 89.1047L391.661 94.4649C391.319 94.8065 391.319 95.3608 391.661 95.7024C392.002 96.0436 392.557 96.0438 392.899 95.7024L398.262 90.3421C398.603 90.0007 398.603 89.4463 398.262 89.1047ZM416.431 70.9616C416.089 70.6202 415.534 70.6201 415.193 70.9616L409.83 76.3218C409.488 76.6634 409.488 77.2177 409.83 77.5592C410.172 77.9005 410.726 77.9007 411.068 77.5592L416.431 72.199C416.772 71.8575 416.772 71.3032 416.431 70.9616ZM425.508 61.891C425.166 61.5496 424.611 61.5495 424.27 61.891L418.907 67.2512C418.565 67.5928 418.565 68.1471 418.907 68.4887C419.249 68.8299 419.803 68.8301 420.145 68.4887L425.508 63.1284C425.849 62.787 425.849 62.2326 425.508 61.891ZM434.569 52.8146C434.227 52.4731 433.673 52.4731 433.331 52.8146L427.968 58.1748C427.626 58.5163 427.627 59.0706 427.968 59.4122C428.31 59.7534 428.864 59.7537 429.206 59.4122L434.569 54.052C434.91 53.7105 434.91 53.1562 434.569 52.8146ZM443.638 43.7479C443.296 43.4065 442.742 43.4064 442.4 43.7479L437.037 49.1081C436.695 49.4496 436.696 50.004 437.037 50.3455C437.379 50.6868 437.933 50.687 438.275 50.3455L443.638 44.9853C443.98 44.6438 443.979 44.0895 443.638 43.7479Z\"\n    fill=\"currentColor\" />\n  \u003Cpath fill-rule=\"evenodd\" clip-rule=\"evenodd\"\n    d=\"M684.066 38.2277C687.798 38.2281 689.667 42.7391 687.027 45.3773L596.473 135.889C595.687 136.675 594.621 137.116 593.51 137.116H506.335C504.021 137.116 502.145 135.241 502.145 132.928V42.4159C502.145 40.1028 504.021 38.2277 506.335 38.2277H684.066ZM514.603 124.566C514.261 124.224 513.707 124.224 513.365 124.566L507.178 130.751C506.836 131.093 506.836 131.646 507.178 131.988C507.519 132.329 508.073 132.329 508.415 131.988L514.603 125.803C514.945 125.462 514.945 124.908 514.603 124.566ZM523.689 115.491C523.348 115.15 522.794 115.15 522.452 115.491L517.09 120.852C516.748 121.193 516.748 121.747 517.09 122.088C517.431 122.43 517.985 122.43 518.327 122.088L523.689 116.728C524.031 116.386 524.031 115.833 523.689 115.491ZM532.102 65.8295C530.707 65.6872 529.46 66.7017 529.318 68.0957C529.175 69.4896 530.189 70.7355 531.584 70.8787C538.463 71.5825 546.096 75.1826 552.45 81.5329C558.723 87.8037 562.312 95.3226 563.079 102.13L557.738 102.392C556.518 102.452 555.865 103.855 556.607 104.827L565.115 115.969C565.76 116.814 567.051 116.751 567.611 115.847L574.992 103.928C575.635 102.889 574.848 101.555 573.628 101.615L568.161 101.882C568.161 101.878 568.162 101.874 568.161 101.871C567.324 93.6931 563.114 85.0124 556.041 77.9425C548.968 70.873 540.283 66.6668 532.102 65.8295ZM532.766 106.421C532.425 106.079 531.871 106.079 531.529 106.421L526.166 111.781C525.825 112.123 525.825 112.676 526.166 113.018C526.508 113.359 527.062 113.359 527.403 113.018L532.766 107.657C533.108 107.316 533.108 106.762 532.766 106.421ZM541.843 97.3445C541.501 97.003 540.948 97.003 540.606 97.3445L535.243 102.705C534.901 103.046 534.902 103.6 535.243 103.941C535.585 104.283 536.139 104.283 536.48 103.941L541.843 98.5809C542.185 98.2393 542.185 97.686 541.843 97.3445ZM550.92 88.2778C550.578 87.9363 550.025 87.9363 549.683 88.2778L544.32 93.638C543.978 93.9796 543.978 94.5329 544.32 94.8745C544.662 95.2161 545.215 95.2161 545.557 94.8745L550.92 89.5142C551.262 89.1727 551.262 88.6193 550.92 88.2778ZM569.066 70.1405C568.724 69.799 568.17 69.7991 567.829 70.1405L562.466 75.5008C562.124 75.8423 562.124 76.3956 562.466 76.7372C562.808 77.0788 563.361 77.0788 563.703 76.7372L569.066 71.377C569.407 71.0354 569.407 70.4821 569.066 70.1405ZM578.143 61.0699C577.801 60.7284 577.247 60.7285 576.906 61.0699L571.543 66.4302C571.201 66.7717 571.201 67.3251 571.543 67.6666C571.885 68.0082 572.438 68.0082 572.78 67.6666L578.143 62.3064C578.484 61.9648 578.484 61.4115 578.143 61.0699ZM587.219 51.9896C586.878 51.6481 586.324 51.6481 585.982 51.9896L580.62 57.3498C580.278 57.6914 580.278 58.2447 580.62 58.5863C580.961 58.9279 581.515 58.9279 581.857 58.5863L587.219 53.2261C587.561 52.8845 587.561 52.3312 587.219 51.9896ZM596.288 42.9249C595.947 42.5833 595.392 42.5833 595.05 42.9249L589.689 48.2851C589.347 48.6267 589.347 49.18 589.689 49.5216C590.03 49.863 590.584 49.8631 590.926 49.5216L596.288 44.1613C596.63 43.8198 596.63 43.2664 596.288 42.9249Z\"\n    fill=\"currentColor\" />\n  \u003Cpath fill-rule=\"evenodd\" clip-rule=\"evenodd\"\n    d=\"M850.814 38.2277C854.547 38.2281 856.416 42.739 853.777 45.3773L763.223 135.889C762.437 136.674 761.371 137.116 760.26 137.116H673.176C669.443 137.116 667.574 132.605 670.213 129.966L760.768 39.4544C761.554 38.6692 762.62 38.2277 763.731 38.2277H850.814ZM761.338 121.8C760.855 121.8 760.463 122.191 760.463 122.674V131.13H762.213V122.674C762.213 122.191 761.821 121.8 761.338 121.8ZM761.338 108.971C760.855 108.971 760.463 109.363 760.463 109.846V118.301H762.213V109.846C762.213 109.363 761.821 108.971 761.338 108.971ZM761.338 96.1402C760.855 96.1406 760.463 96.5321 760.463 97.0149V105.47H762.213V97.0149C762.213 96.532 761.821 96.1404 761.338 96.1402ZM782.263 71.887C781.043 71.951 780.395 73.3571 781.139 74.3257L784.474 78.6631C779.115 82.951 771.242 85.7443 762.35 85.7444C753.366 85.7442 745.421 82.8944 740.059 78.5305C738.972 77.6461 737.373 77.8099 736.488 78.8961C735.602 79.983 735.766 81.582 736.853 82.467C743.231 87.6574 752.348 90.8207 762.35 90.8209C772.209 90.8208 781.205 87.746 787.568 82.6884L790.833 86.9341C791.577 87.9025 793.103 87.6391 793.479 86.4767L797.791 73.138C798.118 72.127 797.33 71.1017 796.268 71.1566L782.263 71.887ZM761.338 70.4847C760.855 70.4851 760.463 70.8767 760.463 71.3594V79.8147H762.213V71.3594C762.213 70.8766 761.821 70.485 761.338 70.4847ZM761.338 57.656C760.855 57.6564 760.463 58.048 760.463 58.5307V66.986H762.213V58.5307C762.213 58.0479 761.821 57.6563 761.338 57.656ZM761.338 44.8293C760.855 44.8297 760.463 45.2212 760.463 45.704V54.1592H762.213V45.704C762.213 45.2211 761.821 44.8295 761.338 44.8293Z\"\n    fill=\"currentColor\" />\n  \u003Cpath\n    d=\"M995.759 38.2277C999.53 38.228 1001.42 42.5171 998.752 45.0253L959.55 81.9005L905.796 41.5363C905.271 41.1418 904.662 41.0182 904.096 41.0994L997.485 130.319C1000.15 132.828 998.262 137.116 994.491 137.116H905.298C902.96 137.116 901.065 135.333 901.065 133.134V42.0941C901.065 42.0204 901.07 41.9483 901.079 41.8786C901.258 39.8345 903.079 38.2277 905.298 38.2277H995.759Z\"\n    fill=\"currentColor\" />\n  \u003Cpath\n    d=\"M505.873 0C506.657 4.57042e-05 507.307 0.195499 507.823 0.587023C508.338 0.969046 508.596 1.53802 508.596 2.29251C508.596 2.76034 508.467 3.19015 508.209 3.58162C507.951 3.96344 507.497 4.26401 506.848 4.48361V4.54114C507.65 4.67487 508.205 4.96191 508.51 5.4012C508.816 5.83087 508.969 6.31772 508.969 6.86193C508.969 7.74056 508.672 8.41851 508.08 8.89604C507.497 9.38304 506.733 9.62731 505.787 9.62738C504.861 9.62738 504.158 9.42172 503.68 9.0111C503.212 8.60054 502.935 8.08005 502.849 7.44993L503.881 7.10571L503.924 7.24028C504.035 7.54934 504.211 7.82925 504.454 8.07986C504.731 8.36635 505.166 8.50986 505.758 8.50989C506.465 8.50989 506.943 8.32772 507.191 7.9648C507.449 7.6019 507.579 7.20078 507.579 6.7615C507.579 6.2173 507.378 5.80683 506.977 5.52992C506.585 5.25295 505.93 5.10026 505.013 5.07161V4.15402C505.901 4.12537 506.489 3.92484 506.776 3.55237C507.062 3.18009 507.206 2.82242 507.206 2.47876C507.206 1.62801 506.752 1.17539 505.845 1.12237L505.658 1.11749C505.467 1.11752 505.242 1.14605 504.985 1.2033C504.736 1.25105 504.511 1.3274 504.31 1.43245L504.081 2.56457L503.05 2.44951L503.322 0.687461C503.666 0.49653 504.068 0.33454 504.526 0.200875C504.985 0.0671945 505.434 0 505.873 0Z\"\n    fill=\"currentColor\" />\n  \u003Cpath\n    d=\"M905.727 2.30616L904.638 2.4066L904.466 1.26083H901.428V3.72497C901.533 3.71544 901.643 3.71034 901.757 3.71034H902.086C902.755 3.71034 903.386 3.78668 903.979 3.93949C904.58 4.09229 905.068 4.38363 905.44 4.8132C905.822 5.23335 906.014 5.84949 906.014 6.66106C906.014 7.64468 905.722 8.38068 905.14 8.86776C904.557 9.36434 903.783 9.6127 902.818 9.61275C901.91 9.61275 901.213 9.40711 900.725 8.99648C900.248 8.59544 899.96 8.08007 899.865 7.44993L900.911 7.10571C901.007 7.49723 901.203 7.8271 901.499 8.09449C901.795 8.37131 902.211 8.50985 902.746 8.50989C903.395 8.50989 903.869 8.33787 904.165 7.99405C904.461 7.65981 904.609 7.22507 904.609 6.69031C904.609 5.87861 904.337 5.3625 903.792 5.14279C903.248 4.91361 902.612 4.79958 901.886 4.79955C901.695 4.79955 901.489 4.80365 901.27 4.8132C901.059 4.82275 900.854 4.83701 900.653 4.85611L900.224 4.44071V0.143343H905.569L905.727 2.30616Z\"\n    fill=\"currentColor\" />\n  \u003Cpath fill-rule=\"evenodd\" clip-rule=\"evenodd\"\n    d=\"M765.49 6.04576H766.966L766.837 7.14862H765.49V9.48404H764.185V7.14862H759.857L759.713 6.04576L762.909 0.143343H765.49V6.04576ZM760.96 6.04576H764.185V1.26083H763.541L760.96 6.04576Z\"\n    fill=\"currentColor\" />\n  \u003Cpath d=\"M4.80573 6.47481H6.41154V7.60693H1.81068V6.47481H3.50235V1.27546H1.81068V0.143343H4.80573V6.47481Z\"\n    fill=\"currentColor\" />\n  \u003Cpath\n    d=\"M254.359 0C255.353 0 256.055 0.239186 256.466 0.716715C256.877 1.18447 257.083 1.68072 257.083 2.20573C257.083 2.85516 256.849 3.44346 256.38 3.96875C255.912 4.49397 255.348 4.96638 254.689 5.38657C254.039 5.79717 253.437 6.15968 252.883 6.47481H256.423L256.538 5.42948L257.599 5.51529L257.426 7.60693H251.407L251.292 6.58987C252.582 5.73032 253.638 4.98523 254.46 4.35489C255.281 3.71509 255.693 3.05632 255.693 2.37832C255.693 1.53787 255.166 1.11749 254.115 1.12237L254.115 1.11749C253.924 1.11754 253.695 1.14604 253.427 1.2033C253.16 1.25104 252.916 1.32238 252.697 1.41783L252.467 2.47876L251.45 2.3637L251.707 0.60165C252.118 0.401088 252.563 0.253475 253.041 0.15797C253.519 0.0529708 253.958 1.99446e-05 254.359 0Z\"\n    fill=\"currentColor\" />\u003C/g>",{"tile":13,"orbsWithOnlyMarkdownPages":278},{"id":14,"data":15,"type":16,"maxContentLevel":19,"version":20,"orbs":21},"66c5e3d7-8e72-4f97-ac9f-7ca43608b9dc",{"type":16,"title":17,"tagline":18},9,"What's a Blockchain?","An overview of the technology that makes everything in Web3 possible.",3,1,[22,77,126,178,228],{"id":23,"data":24,"type":25,"version":20,"maxContentLevel":19,"pages":27},"2e19d269-9e35-4229-930f-f9e30ca30cf5",{"type":25,"title":26},2,"Introduction to Blockchain",[28,45,63],{"id":29,"data":30,"type":20,"maxContentLevel":19,"version":20,"reviews":34},"fdb9d099-67f5-4d20-9498-63817ae8af67",{"type":20,"title":31,"markdownContent":32,"audioMediaId":33},"What is the blockchain?","In Web2 databases, information is stored in one location, usually in a central server of the company who owns it. Think of Amazon or Facebook. They administer their own databases in secret, only making specific elements public. \n\nWhoever controls this database has supreme power over its data. If Facebook wants to delete or silence certain contents, it has all the power to do so. Web2 databases are centralized, where the owner and only the owner is in full control.\n\n ![Graph](image://ed0a4d21-9b62-44e1-850c-6a5f5aa6b1a6 \"Traditional database structures put huge power into the hands of corporations\")\n\nContrary to Web2 databases, blockchains function as decentralized databases. Every participant of the blockchain has a copy of all the data. The source of truth is whatever the majority of blockchain participants support. Since anyone can participate in validating the blockchain, it functions as a super-democratized system of truth and data. If thirty computers say that an apple belongs to Dylan, and one says it belongs to Dan, there is no doubt that the apple belongs to Dylan. People trust that the majority of nodes contain the truth.\n\nImagine trying to change the Bible. You could amend a passage in your own copy, but it would be easy for someone to point to the millions of other copies on earth to show that your version is fake. If you wanted to actually change the Bible, you’d have to access and change every single copy on earth – an impossible task.\n\n","e5fbca11-7098-48f7-81d1-c5a7a4e7f5fd",[35],{"id":36,"data":37,"type":38,"version":20,"maxContentLevel":19},"dac82f30-b784-4ae3-86df-14122607e421",{"type":38,"reviewType":39,"spacingBehaviour":20,"clozeQuestion":40,"clozeWords":42},11,4,[41],"Web2 databases are centralized, while blockchains are decentralized databases.",[43,44],"centralized","decentralized",{"id":46,"data":47,"type":20,"maxContentLevel":19,"version":20,"reviews":51},"7ad144d9-6c14-4115-9f66-571f31b6a613",{"type":20,"title":48,"markdownContent":49,"audioMediaId":50},"Two types of blockchain","The Blockchain has exciting new potential applications, both for organizations internally and for individuals. \n\nOne type of Blockchain use is to grant everyone access. This works well for things like cryptocurrencies. Anyone can buy or sell Bitcoin, contributing to the blockchain. Since access to editing these blockchains are entirely open, these are referred to as permissionless Blockchains.\n\nAnother type of Blockchain restricts access to a small group of users. This might be done for supply chain management between a handful of companies. In these situations, a shipping company may not trust the supplier of coffee beans, the roaster may not trust the shipping company, and the store may not trust the roaster, but in a well-architected ‘permissioned’ or ‘private’ blockchain, each entity can store its relevant documentation about its piece of the supply chain in an immutable ledger. \n\n ![Graph](image://2f1c6da7-56b2-48c0-8145-d6f78ff65057 \"Private blockchains could revolutionize supply chains for goods such as coffee\")\n\nThey can then share only the relevant information to other suppliers in the chain to ensure quality, quantity, and freshness are maintained throughout the entire process to the customer. \n\n","b53b06a2-8648-4694-ad17-04e3db42a572",[52],{"id":53,"data":54,"type":38,"version":20,"maxContentLevel":19},"348e59a6-bb53-4edd-9f0a-3b9b5d8d1882",{"type":38,"reviewType":19,"spacingBehaviour":20,"multiChoiceQuestion":55,"multiChoiceCorrect":57,"multiChoiceIncorrect":59},[56],"What type of blockchain restricts access to a small group of users?",[58],"Permissioned or private",[60,61,62],"Permissionless","Open-access","Public",{"id":64,"data":65,"type":20,"maxContentLevel":19,"version":20,"reviews":69},"23d66e43-78cb-4661-be51-1516ffb077c6",{"type":20,"title":66,"markdownContent":67,"audioMediaId":68},"Why does the blockchain work?","Imagine a bug caught in amber. When it is first trapped, there’s not much amber around the fly. Over the following weeks, months, or years, the tree continues to ooze sap, trapping pine needles, then leaves, then bark, and maybe later even other insects. As time progresses, the initial ‘layer’ of amber around the mosquito is buried quite deep with dozens of other layers and debris surrounding it.\n\n\n ![Graph](image://9262f258-3b33-4afd-bfe3-9b28c2dbee92 \"Blockchains preserve a dated image, which it's very hard to tamper with without it being noticeable\")\n\nThe blockchain works along similar principles. Each piece of information in the database exists in a ‘block’ – think of it like an insect or pine needle preserved in a layer of amber. Each block of information is verifiable, and timestamped – just as anyone can look at an insect in amber and see what kind of insect it is, and also tell how long it has been in there, relative to the other layers.\n\nTampering with the outermost layer (i.e. the most recent block) is somewhat straightforward since it’s not trapped very deep. Removing a pine needle from 5 layers deep, however, is nearly impossible without indicating that the amber has been tampered with. This is also true with blockchain. It’s essentially impossible to change the information in older blocks without it being obvious to everyone else that you’ve done so.\n\nThis makes blockchains an extremely secure way to store information over time, that everyone can agree is authoritative.\n\n","ed07069e-63f0-4b3d-a09b-e42e70c8a83e",[70],{"id":71,"data":72,"type":38,"version":20,"maxContentLevel":19},"135868fc-083a-4981-a225-1c151a198c5e",{"type":38,"reviewType":20,"spacingBehaviour":20,"activeRecallQuestion":73,"activeRecallAnswers":75},[74],"Why are blockchains similar to amber?",[76],"They can preserve things for everyone to see, but it's very hard for anyone to tamper with them without it being obvious to everyone else.",{"id":78,"data":79,"type":25,"version":20,"maxContentLevel":19,"pages":81},"f320ecb2-a81b-4588-9629-c80523add2e7",{"type":25,"title":80},"Encryption and Hashing",[82,96,112],{"id":83,"data":84,"type":20,"maxContentLevel":19,"version":20,"reviews":88},"1d4dcd62-81c9-4714-b93e-b99be57debd7",{"type":20,"title":85,"markdownContent":86,"audioMediaId":87},"Introduction to encryption","Encryption is the process through which information is converted into a form where it cannot be read by intercepting parties. This is done by applying an algorithm, which is essentially a process, applied to a piece of data. For example, to encrypt a word, you might change each letter to its next letter. This is known as a Caesar Cipher.\n\n ![Graph](image://88872acd-d7c2-4986-bfc8-40f49053b2fb \"A traditional Caesar Cipher\")\n\nEncryption used in modern computing is more mathematical, applying complex mathematical formulae to the text inputs. This takes advantage of advances in computational power and makes it harder to break the cipher.\n\nIn addition, even though services like WhatsApp encrypt their messages, it is not just messages sent between humans which end up encrypted. In fact, data which is sent solely between computers like timestamps, amounts of money in your bank account and even code can be encrypted to stop hackers from intercepting or interfering with it. If something is encrypted, while hackers can change it to something nonsensical to stop it from arriving, without knowing the encryption method they’re unable to alter or read the data.\n\n","1ccaa02b-4892-4edb-9aa4-b652b9974a5e",[89],{"id":90,"data":91,"type":38,"version":20,"maxContentLevel":19},"1635f2ef-812e-4b70-a91c-1e486f06cac1",{"type":38,"reviewType":39,"spacingBehaviour":20,"clozeQuestion":92,"clozeWords":94},[93],"Encryption is the process through which information is converted into a form where it cannot be read by intercepting parties.",[95],"Encryption",{"id":97,"data":98,"type":20,"maxContentLevel":19,"version":20,"reviews":102},"c8e7ab66-d98e-4a26-b315-0e0bfadd8e15",{"type":20,"title":99,"markdownContent":100,"audioMediaId":101},"Hashing","Hashing is one type of one-way type of encryption. A hash is a mathematical encryption algorithm that essentially turns data into an encrypted form, all of which are the same size. \n\nImagine you have two bananas and an orange. If you put them into a blender, you will be left with a smoothie. If you give a drop of that smoothie to your friend, it is impossible for them to turn the smoothie back into two bananas and an orange. However, if they have two bananas and an orange themself and put them in a blender, they will get an identical smoothie. They can then compare the two smoothies to ensure that they are the same. \n\nHashing functions work similarly. They take any input of words or numbers and generate a unique output. So you can feed words and sentences like “hello”, “¿Cómo estás?” or “Voulez vous coucher avec moi?” into the hashing algorithm, and get a unique, but consistent output.\n\nLet’s look at a little visual illustration below of the most popular hashing algorithm, SHA256.\n\nWhen we feed the word “rice” into SHA256, we get the following output:\n\n ![Graph](image://7a0973ac-a7cc-4696-aa25-ed3a2cd8fd41 \" \")\n\nThe same input will always produce the same output. But, a slightly different input will generate a vastly different output:\n\n ![Graph](image://484f8751-3ca2-41d3-b606-52f4ef64b485 \" \")\n\nHowever, you can never go from hash back to the original input.\n\n","81987580-898a-41ec-b0e4-7707f21a9d90",[103],{"id":104,"data":105,"type":38,"version":20,"maxContentLevel":19},"4b2c8163-8f76-491d-a008-6654c8db0a14",{"type":38,"reviewType":25,"spacingBehaviour":20,"binaryQuestion":106,"binaryCorrect":108,"binaryIncorrect":110},[107],"What is hashing?",[109],"A one-way type of encryption that turns data into an encrypted form, all of which are the same size",[111],"A two-way type of encryption that allows information to be translated back to its original message",{"id":113,"data":114,"type":20,"maxContentLevel":19,"version":20,"reviews":118},"ff07a1dd-e806-4d98-a1b5-84e5de02addc",{"type":20,"title":115,"markdownContent":116,"audioMediaId":117},"How is hashing used in the blockchain?","Hashing actually has multiple functions in blockchain technologies. \n\nFirst, it’s vital to secure your assets. As you probably know by now, the only thing that Jenny needs to unlock her bitcoin is her private key. It functions like a key to a super-duper secure safe. Only with the private key can she access her funds. When Jenny attempts to make a transaction, her private key is hashed to her public address, and her ownership is confirmed. \n\n ![Graph](image://3d7b90b8-6f1c-4b11-b999-d3a26e2e89e3 \"Hashing is essential for wallet keys to work\")\n\nTo send bitcoin to Martha, Jenny finally needs Martha’s public address, and Jenny can pay back Martha for all the martinis they had last Friday night.\n\nConsidering blockchain’s reliance on encryption, there are countless other areas that hashing is implemented to ensure security and privacy on the blockchain. \n\n","98742ff9-f132-4e46-baaa-c2b98b2f21c6",[119],{"id":120,"data":121,"type":38,"version":20,"maxContentLevel":19},"3160d490-ebcd-4a42-bdbd-b5468263af83",{"type":38,"reviewType":39,"spacingBehaviour":20,"clozeQuestion":122,"clozeWords":124},[123],"The kind of algorithm that is essential to securing crypto assets is called hashing.",[125],"hashing",{"id":127,"data":128,"type":25,"version":20,"maxContentLevel":19,"pages":130},"e90d33fd-c103-45e8-9d18-fbb30ecfc711",{"type":25,"title":129},"Consensus Mechanisms",[131,146,163],{"id":132,"data":133,"type":20,"maxContentLevel":19,"version":20,"reviews":137},"b1e0b5f3-7f36-4405-a570-1c5bd49851fc",{"type":20,"title":134,"markdownContent":135,"audioMediaId":136},"Consensus mechanisms","A blockchain exists as a series of blocks of data, which are verifiable but unmodifiable. But who is taking the time to keep the system alive and well? For blockchains to work, it’s essential that people spend the time and money required to validate the network.\n\nThis is where ‘consensus mechanisms’ come in. They are aptly named: these are mechanisms for proving consensus about the data on the blockchain. To use the earlier analogy, consensus mechanisms are the processes people use for verifying that their smoothies have the same fruit in them.\n\nAll blockchains require consensus mechanisms, and there are a number of different approaches to creating them. The two most famous are ‘Proof-of-Work’ – used by Bitcoin, and ‘Proof-of-Stake’, now used by Ethereum and most other newer blockchains.\n","0290a3fd-02ab-408f-ac6f-3284116d8d3b",[138],{"id":139,"data":140,"type":38,"version":20,"maxContentLevel":19},"600f7a70-7cd8-4958-9b64-09cfd365994a",{"type":38,"reviewType":39,"spacingBehaviour":20,"clozeQuestion":141,"clozeWords":143},[142],"The two most famous consensus mechanisms are ‘Proof-of-Work’ – used by Bitcoin, and ‘Proof-of-Stake’, now used by Ethereum and most other newer blockchains.",[144,145],"Proof-of-Work","Proof-of-Stake",{"id":147,"data":148,"type":20,"maxContentLevel":19,"version":20,"reviews":151},"57f6952d-82dc-4eab-87e8-4b8ba4245f9a",{"type":20,"title":144,"markdownContent":149,"audioMediaId":150},"The two main consensus mechanisms are Proof-of-Work and Proof-of-Stake. They are different ways of achieving the same goal – incentivizing people to spend the time and computing power to keep the blockchain alive and well.\n\nProof-of-Work works by requiring participants - known as miners - to solve complicated math problems to verify transactions on the blockchain. \n\nThese math problems are very expensive by design to keep malevolent actors at bay. Attacks on the blockchain are disincentivized, since it takes a lot of computing power and energy to mine a block.\n\nIn theory, if you had over 50% of the computing power in the network, you could proclaim yourself as a billionaire and send tons of faulty transactions to yourself. But, because mining is so, so expensive, such fraudulent activity is effectively impossible. And even if it was, as soon as you’d changed the ledger, people would realize – and lose trust in the currency. Since the only thing giving crypto value is trust, hacking large cryptos is impossible and uneconomical.\n\nHowever, since energy is expensive, validators need a financial incentive. This is created through cryptocurrency rewards. Anyone who dedicates computing power to mining will be rewarded with that blockchain’s currency for doing so.\n","57072611-7b4f-4f48-91b2-2b05105a9c63",[152],{"id":153,"data":154,"type":38,"version":20,"maxContentLevel":19},"d11ce484-18b0-4793-a30b-42b6e6674e04",{"type":38,"reviewType":19,"spacingBehaviour":20,"multiChoiceQuestion":155,"multiChoiceCorrect":157,"multiChoiceIncorrect":159},[156],"What term is given to people running Proof-of-Work consensus mechanisms on dedicated computers?",[158],"Miners",[160,161,162],"Workers","Hackers","Block-builders",{"id":164,"data":165,"type":20,"maxContentLevel":19,"version":20,"reviews":168},"4277112d-a1fd-4bbb-9c28-2d651dade2b9",{"type":20,"title":145,"markdownContent":166,"audioMediaId":167},"The other major consensus mechanism used is Proof-of-Stake. This was invented as an alternative to Proof-of-Work when people realized the financial and environmental costs of using so much energy to validate the blockchain.\n\nProof-of-Stake instead requires participants in the network to ‘stake’ some of their coins – to put them up as collateral. In return, they are entered into a pool of people. One (or a handful) of these people is randomly selected to run the computer operation required to validate the block in the chain. Because they have skin in the game – their money is at stake as collateral – it can be safely assumed that they will not tamper with the block, otherwise they risk losing their ‘staked collateral.’\n\nProof-of-Stake is generally considered to be a superior, more efficient and environmentally-friendly alternative to Proof-of-Work. The biggest blockchain in the world – Bitcoin – runs on Proof-of-Work. But most new development and activity in the blockchain space is occurring on Ethereum or other chains that use Proof-of-Stake.\n","aef71934-b52d-4846-b99f-02d97a338754",[169],{"id":170,"data":171,"type":38,"version":20,"maxContentLevel":19},"cf35e204-5847-4aee-8dc1-9b99d68bc37e",{"type":38,"reviewType":25,"spacingBehaviour":20,"binaryQuestion":172,"binaryCorrect":174,"binaryIncorrect":176},[173],"What is the incentive for people not to tamper with blocks in a Proof-of-Stake blockchain?",[175],"Not losing their staked collateral",[177],"Being sued by the Ethereum Foundation",{"id":179,"data":180,"type":25,"version":20,"maxContentLevel":19,"pages":182},"1b15e73d-2c96-4dcb-b459-93e7a2eb1d9f",{"type":25,"title":181},"Applications and Benefits of Blockchain",[183,198,214],{"id":184,"data":185,"type":20,"maxContentLevel":19,"version":20,"reviews":189},"775a207d-91fb-4b01-a814-8d3ccd85aa44",{"type":20,"title":186,"markdownContent":187,"audioMediaId":188},"Uses of blockchain","There are many different potential uses of the blockchain that capitalize on its many advantages. In fact, the blockchain is expected to become the primary mechanism for widely used databases as Web3 rolls out and becomes increasingly popular.\n\n ![Graph](image://2c394c69-aebb-442f-97e2-107f3ebf6432 \"Blockchain is tamper-proof, unlike virtually any system of data storage in existence\")\n\nOne category of things which are likely to be added to the blockchain are things which want to be made resistant to tampering. Examples of these include digital currencies, real estate ownership and intellectual property ownership records.\n\nAnother category of things which are likely to be added to the blockchain are things which need to be kept private. Examples of these include personal information data, medical histories and mental health records.\n\n","59b0d113-5bdd-443f-a084-ce52dd33e73c",[190],{"id":191,"data":192,"type":38,"version":20,"maxContentLevel":19},"786be27a-7001-4b07-930a-db1aab3c3eaa",{"type":38,"reviewType":39,"spacingBehaviour":20,"clozeQuestion":193,"clozeWords":195},[194],"One category of things which are likely to be added to the blockchain are things which want to be made resistant to tampering.",[196,197],"blockchain","tampering",{"id":199,"data":200,"type":20,"maxContentLevel":19,"version":20,"reviews":204},"e2d2b97e-683f-4bda-b729-94a3be66ab7c",{"type":20,"title":201,"markdownContent":202,"audioMediaId":203},"Benefits of blockchain","One of the benefits of blockchain is that it is effectively impossible for any agent to make changes to a database without those changes being visible to everyone. In Web2, you would only need to access and edit the database in order to change its elements. This means that theoretically, if you had access to your bank’s database, you would be able to move money from someone else to yourself without their permission.\n\nProponents of blockchain say that it's safer because, in the blockchain, it is impossible to change other people’s blocks once they are in the chain. However, given that modern banking databases are safeguarded with consistency reviews, one-time-passwords, two-factor authentication and complicated encryption, your money is pretty safe in the bank too.\n\nA second benefit of the blockchain is that interactions can be conducted pseudonymously. Instead of having to give a third party your name, so they can store it alongside your money, the database in the blockchain only relies on where the blockchains exist digitally to identify them.\n\n![Graph](image://7c48a954-fff5-42cc-9760-cad3314f92c2 \"Code ensures that transactions can be conducted anonymously\")\n\nFinally, it cuts out the third-party entirely. This means that even if you live in a location where a trusted, stable bank doesn’t exist, you can still rely on the safety of your money. Moreover, you don’t need to pay transaction fees or rely on the bank not to lose your money on poor investments, cutting out the middleman.\n\n","7e5e1543-037e-4ddd-8842-66078778bfe3",[205],{"id":206,"data":207,"type":38,"version":20,"maxContentLevel":19},"e94eb2db-febb-4f6f-95a6-58689d1b0af6",{"type":38,"reviewType":25,"spacingBehaviour":20,"binaryQuestion":208,"binaryCorrect":210,"binaryIncorrect":212},[209],"What is one of the benefits of blockchain?",[211],"It is impossible to change other people’s blocks once they are in the chain.",[213],"It uses less power than traditional servers",{"id":215,"data":216,"type":20,"maxContentLevel":19,"version":20,"reviews":220},"a57ee1d1-95ff-421b-8665-70af79603aa5",{"type":20,"title":217,"markdownContent":218,"audioMediaId":219},"Drawbacks of blockchain","However, there are also some key disadvantages to blockchains. \n\nWith a centralized database - like those of a bank - the government is able to quickly view criminal activity and hold people accountable. However, in a decentralized system, that’s far more difficult. Because people operate pseudonymously, fraudulent or criminal activity is harder to trace. That means that blockchains could become a hotbed for illegal activity, including drug trafficking, or money laundering.\n\nNevertheless, blockchains stand as a permanent and immutable public record of transactions. If, therefore, pseudonymous transactions can be identified by law enforcement, crypto could prove much easier to trace than, for example, cash. \n\nSecondly, as with any new technology, users unfamiliar with the blockchain might not trust it with their information or personal finances. Alternatively, this lack of familiarity might mean that they are susceptible to scams that prey on human errors rather than technological ones.\n\nFinally, frequently hashing and storing large amounts of information can take computational power. This means that until someone devises a hardware or software solution, blockchains will be slow. Moreover, the energy required to maintain the blockchain so that all blocks are online in multiple copies for checking is large, which itself will mean higher costs.\n\n","2286683b-eb1f-47b8-9bec-1a8b3f25393b",[221],{"id":222,"data":223,"type":38,"version":20,"maxContentLevel":19},"4bd10d06-cf1d-4fa7-a71b-1d345589c082",{"type":38,"reviewType":20,"spacingBehaviour":20,"activeRecallQuestion":224,"activeRecallAnswers":226},[225],"Why are cryptocurrencies and blockchains appealing to criminals?",[227],"They are much harder to trace than centralized technologies",{"id":229,"data":230,"type":25,"version":20,"maxContentLevel":19,"pages":232},"524cb8e6-2630-40c5-807f-643169409405",{"type":25,"title":231},"Challenges and Drawbacks of Blockchain",[233,247,263],{"id":234,"data":235,"type":20,"maxContentLevel":19,"version":20,"reviews":239},"d29a9da0-f02b-4992-90b3-6b33ea7b4330",{"type":20,"title":236,"markdownContent":237,"audioMediaId":238},"Electricity costs and climate change","Proof-of-Work blockchains have extremely heavy requirements when it comes to electricity. In fact, Bitcoin alone uses 150 Terawatt Hours, more electricity than Argentina, every single year. Computers will draw significant amounts of power in order to simply sustain the blockchain in the background, without even mentioning the process of extending it.\n\nIn the modern day, this poses a significant challenge because of the impacts of climate change. Currently, all of our methods of generating electricity have an impact on the climate. Even solar panels take away land from nature and can require unsustainable practices to build. As a result, the introduction of a vast new framework that requires copious amounts of electricity threatens our planet. \n\nThat being said, many blockchains are turning away from Proof-of-Work. 2022 saw the historic Ethereum ‘Merge’, where the Ethereum blockchain switched to Proof-of-Stake after a huge collective effort by the Ethereum Foundation. The move will cut the energy consumption of Ethereum by 99.95%.\n","e7d3849e-664b-46b3-80a1-77649d1183a8",[240],{"id":241,"data":242,"type":38,"version":20,"maxContentLevel":19},"050ba27d-552b-4152-94ec-7cb9c0479d83",{"type":38,"reviewType":39,"spacingBehaviour":20,"clozeQuestion":243,"clozeWords":245},[244],"In 2022, the Ethereum blockchain switched from Proof-of-Work to Proof-of-Stake, which will cut energy consumption by 99.95%.",[145,246],"99.95",{"id":248,"data":249,"type":20,"maxContentLevel":19,"version":20,"reviews":253},"6955de04-c7c7-413f-a88c-1b7c83f8c471",{"type":20,"title":250,"markdownContent":251,"audioMediaId":252},"What is the weak link in the blockchain?","One of the potential uses of the blockchain in the future will be to reliably track the ownership of real world assets. Usually, this involves an asset holder logging the transaction in the blockchain. However, there is a weak link in this system: humans.\n\nWhat if you give something to a friend and forget to log it in the blockchain? It won’t be logged in the Blockchain, so your friend won’t be the registered owner - they’ll never be able to sell or transfer ownership to anyone else. Here’s another problem: what if someone dies, and you inherit the property? Obviously, the previous owner will never be able to log the change in ownership in the Blockchain.\n\nIn order for the Blockchain to reach a state where it covers all of our needs, developers are going to have to think of innovative new solutions to the problems associated with human errors and imperfections.\n","e1a90fed-94e6-49bd-9d68-0583671e21ba",[254],{"id":255,"data":256,"type":38,"version":20,"maxContentLevel":19},"0ba72f91-fd62-4216-b5b4-0da4d2f52468",{"type":38,"reviewType":25,"spacingBehaviour":20,"binaryQuestion":257,"binaryCorrect":259,"binaryIncorrect":261},[258],"One of the potential uses of the blockchain in the future will be to reliably track the ownership of real world assets.",[260],"True",[262],"False",{"id":264,"data":265,"type":20,"maxContentLevel":19,"version":20,"reviews":269},"17a5247b-d322-433f-8f18-b10dc82df8ad",{"type":20,"title":266,"markdownContent":267,"audioMediaId":268},"Gas fees","Another drawback of the blockchain is that transactions are not free. While traditional banks often earn money indirectly and mostly don’t charge for transactions, blockchains charge fees every time you send money. On the blockchain, transaction fees are explicit and paid to the network participants, who help check that transactions are legitimate. This is done through consensus mechanisms: getting multiple different computers, also known as nodes, to check the authenticity of another block.\n\nIn the Ethereum network, these transaction fees are called ‘gas fees’. These are something you will need to pay each time you make a transaction on the blockchain. These fees can rack up quickly. When networks are congested fees can shoot up and it’s possible that some are upwards of $60 for each transaction - and potentially thousands for large transactions at peak times.","be3b1d29-1182-44a9-a472-c53bde9b5cff",[270],{"id":271,"data":272,"type":38,"version":20,"maxContentLevel":19},"1641224a-96e0-46bc-9b40-41cd75df438a",{"type":38,"reviewType":39,"spacingBehaviour":20,"clozeQuestion":273,"clozeWords":275},[274],"On the blockchain, transaction fees are called  ‘gas fees’ and can be upwards of $60 for each transaction.",[276,277],"gas","$60",[279,393,517,595,694],{"id":23,"data":24,"type":25,"version":20,"maxContentLevel":19,"pages":280},[281,323,358],{"id":29,"data":30,"type":20,"maxContentLevel":19,"version":20,"reviews":34,"parsed":282},{"data":283,"body":286,"toc":321},{"title":284,"description":285},"","In Web2 databases, information is stored in one location, usually in a central server of the company who owns it. Think of Amazon or Facebook. They administer their own databases in secret, only making specific elements public.",{"type":287,"children":288},"root",[289,296,301,311,316],{"type":290,"tag":291,"props":292,"children":293},"element","p",{},[294],{"type":295,"value":285},"text",{"type":290,"tag":291,"props":297,"children":298},{},[299],{"type":295,"value":300},"Whoever controls this database has supreme power over its data. If Facebook wants to delete or silence certain contents, it has all the power to do so. Web2 databases are centralized, where the owner and only the owner is in full control.",{"type":290,"tag":291,"props":302,"children":303},{},[304],{"type":290,"tag":305,"props":306,"children":310},"img",{"alt":307,"src":308,"title":309},"Graph","image://ed0a4d21-9b62-44e1-850c-6a5f5aa6b1a6","Traditional database structures put huge power into the hands of corporations",[],{"type":290,"tag":291,"props":312,"children":313},{},[314],{"type":295,"value":315},"Contrary to Web2 databases, blockchains function as decentralized databases. Every participant of the blockchain has a copy of all the data. The source of truth is whatever the majority of blockchain participants support. Since anyone can participate in validating the blockchain, it functions as a super-democratized system of truth and data. If thirty computers say that an apple belongs to Dylan, and one says it belongs to Dan, there is no doubt that the apple belongs to Dylan. People trust that the majority of nodes contain the truth.",{"type":290,"tag":291,"props":317,"children":318},{},[319],{"type":295,"value":320},"Imagine trying to change the Bible. You could amend a passage in your own copy, but it would be easy for someone to point to the millions of other copies on earth to show that your version is fake. If you wanted to actually change the Bible, you’d have to access and change every single copy on earth – an impossible task.",{"title":284,"searchDepth":25,"depth":25,"links":322},[],{"id":46,"data":47,"type":20,"maxContentLevel":19,"version":20,"reviews":51,"parsed":324},{"data":325,"body":327,"toc":356},{"title":284,"description":326},"The Blockchain has exciting new potential applications, both for organizations internally and for individuals.",{"type":287,"children":328},[329,333,338,343,351],{"type":290,"tag":291,"props":330,"children":331},{},[332],{"type":295,"value":326},{"type":290,"tag":291,"props":334,"children":335},{},[336],{"type":295,"value":337},"One type of Blockchain use is to grant everyone access. This works well for things like cryptocurrencies. Anyone can buy or sell Bitcoin, contributing to the blockchain. Since access to editing these blockchains are entirely open, these are referred to as permissionless Blockchains.",{"type":290,"tag":291,"props":339,"children":340},{},[341],{"type":295,"value":342},"Another type of Blockchain restricts access to a small group of users. This might be done for supply chain management between a handful of companies. In these situations, a shipping company may not trust the supplier of coffee beans, the roaster may not trust the shipping company, and the store may not trust the roaster, but in a well-architected ‘permissioned’ or ‘private’ blockchain, each entity can store its relevant documentation about its piece of the supply chain in an immutable ledger.",{"type":290,"tag":291,"props":344,"children":345},{},[346],{"type":290,"tag":305,"props":347,"children":350},{"alt":307,"src":348,"title":349},"image://2f1c6da7-56b2-48c0-8145-d6f78ff65057","Private blockchains could revolutionize supply chains for goods such as coffee",[],{"type":290,"tag":291,"props":352,"children":353},{},[354],{"type":295,"value":355},"They can then share only the relevant information to other suppliers in the chain to ensure quality, quantity, and freshness are maintained throughout the entire process to the customer.",{"title":284,"searchDepth":25,"depth":25,"links":357},[],{"id":64,"data":65,"type":20,"maxContentLevel":19,"version":20,"reviews":69,"parsed":359},{"data":360,"body":362,"toc":391},{"title":284,"description":361},"Imagine a bug caught in amber. When it is first trapped, there’s not much amber around the fly. Over the following weeks, months, or years, the tree continues to ooze sap, trapping pine needles, then leaves, then bark, and maybe later even other insects. As time progresses, the initial ‘layer’ of amber around the mosquito is buried quite deep with dozens of other layers and debris surrounding it.",{"type":287,"children":363},[364,368,376,381,386],{"type":290,"tag":291,"props":365,"children":366},{},[367],{"type":295,"value":361},{"type":290,"tag":291,"props":369,"children":370},{},[371],{"type":290,"tag":305,"props":372,"children":375},{"alt":307,"src":373,"title":374},"image://9262f258-3b33-4afd-bfe3-9b28c2dbee92","Blockchains preserve a dated image, which it's very hard to tamper with without it being noticeable",[],{"type":290,"tag":291,"props":377,"children":378},{},[379],{"type":295,"value":380},"The blockchain works along similar principles. Each piece of information in the database exists in a ‘block’ – think of it like an insect or pine needle preserved in a layer of amber. Each block of information is verifiable, and timestamped – just as anyone can look at an insect in amber and see what kind of insect it is, and also tell how long it has been in there, relative to the other layers.",{"type":290,"tag":291,"props":382,"children":383},{},[384],{"type":295,"value":385},"Tampering with the outermost layer (i.e. the most recent block) is somewhat straightforward since it’s not trapped very deep. Removing a pine needle from 5 layers deep, however, is nearly impossible without indicating that the amber has been tampered with. This is also true with blockchain. It’s essentially impossible to change the information in older blocks without it being obvious to everyone else that you’ve done so.",{"type":290,"tag":291,"props":387,"children":388},{},[389],{"type":295,"value":390},"This makes blockchains an extremely secure way to store information over time, that everyone can agree is authoritative.",{"title":284,"searchDepth":25,"depth":25,"links":392},[],{"id":78,"data":79,"type":25,"version":20,"maxContentLevel":19,"pages":394},[395,425,482],{"id":83,"data":84,"type":20,"maxContentLevel":19,"version":20,"reviews":88,"parsed":396},{"data":397,"body":399,"toc":423},{"title":284,"description":398},"Encryption is the process through which information is converted into a form where it cannot be read by intercepting parties. This is done by applying an algorithm, which is essentially a process, applied to a piece of data. For example, to encrypt a word, you might change each letter to its next letter. This is known as a Caesar Cipher.",{"type":287,"children":400},[401,405,413,418],{"type":290,"tag":291,"props":402,"children":403},{},[404],{"type":295,"value":398},{"type":290,"tag":291,"props":406,"children":407},{},[408],{"type":290,"tag":305,"props":409,"children":412},{"alt":307,"src":410,"title":411},"image://88872acd-d7c2-4986-bfc8-40f49053b2fb","A traditional Caesar Cipher",[],{"type":290,"tag":291,"props":414,"children":415},{},[416],{"type":295,"value":417},"Encryption used in modern computing is more mathematical, applying complex mathematical formulae to the text inputs. This takes advantage of advances in computational power and makes it harder to break the cipher.",{"type":290,"tag":291,"props":419,"children":420},{},[421],{"type":295,"value":422},"In addition, even though services like WhatsApp encrypt their messages, it is not just messages sent between humans which end up encrypted. In fact, data which is sent solely between computers like timestamps, amounts of money in your bank account and even code can be encrypted to stop hackers from intercepting or interfering with it. If something is encrypted, while hackers can change it to something nonsensical to stop it from arriving, without knowing the encryption method they’re unable to alter or read the data.",{"title":284,"searchDepth":25,"depth":25,"links":424},[],{"id":97,"data":98,"type":20,"maxContentLevel":19,"version":20,"reviews":102,"parsed":426},{"data":427,"body":429,"toc":480},{"title":284,"description":428},"Hashing is one type of one-way type of encryption. A hash is a mathematical encryption algorithm that essentially turns data into an encrypted form, all of which are the same size.",{"type":287,"children":430},[431,435,440,445,450,455,463,468,475],{"type":290,"tag":291,"props":432,"children":433},{},[434],{"type":295,"value":428},{"type":290,"tag":291,"props":436,"children":437},{},[438],{"type":295,"value":439},"Imagine you have two bananas and an orange. If you put them into a blender, you will be left with a smoothie. If you give a drop of that smoothie to your friend, it is impossible for them to turn the smoothie back into two bananas and an orange. However, if they have two bananas and an orange themself and put them in a blender, they will get an identical smoothie. They can then compare the two smoothies to ensure that they are the same.",{"type":290,"tag":291,"props":441,"children":442},{},[443],{"type":295,"value":444},"Hashing functions work similarly. They take any input of words or numbers and generate a unique output. So you can feed words and sentences like “hello”, “¿Cómo estás?” or “Voulez vous coucher avec moi?” into the hashing algorithm, and get a unique, but consistent output.",{"type":290,"tag":291,"props":446,"children":447},{},[448],{"type":295,"value":449},"Let’s look at a little visual illustration below of the most popular hashing algorithm, SHA256.",{"type":290,"tag":291,"props":451,"children":452},{},[453],{"type":295,"value":454},"When we feed the word “rice” into SHA256, we get the following output:",{"type":290,"tag":291,"props":456,"children":457},{},[458],{"type":290,"tag":305,"props":459,"children":462},{"alt":307,"src":460,"title":461},"image://7a0973ac-a7cc-4696-aa25-ed3a2cd8fd41"," ",[],{"type":290,"tag":291,"props":464,"children":465},{},[466],{"type":295,"value":467},"The same input will always produce the same output. But, a slightly different input will generate a vastly different output:",{"type":290,"tag":291,"props":469,"children":470},{},[471],{"type":290,"tag":305,"props":472,"children":474},{"alt":307,"src":473,"title":461},"image://484f8751-3ca2-41d3-b606-52f4ef64b485",[],{"type":290,"tag":291,"props":476,"children":477},{},[478],{"type":295,"value":479},"However, you can never go from hash back to the original input.",{"title":284,"searchDepth":25,"depth":25,"links":481},[],{"id":113,"data":114,"type":20,"maxContentLevel":19,"version":20,"reviews":118,"parsed":483},{"data":484,"body":486,"toc":515},{"title":284,"description":485},"Hashing actually has multiple functions in blockchain technologies.",{"type":287,"children":487},[488,492,497,505,510],{"type":290,"tag":291,"props":489,"children":490},{},[491],{"type":295,"value":485},{"type":290,"tag":291,"props":493,"children":494},{},[495],{"type":295,"value":496},"First, it’s vital to secure your assets. As you probably know by now, the only thing that Jenny needs to unlock her bitcoin is her private key. It functions like a key to a super-duper secure safe. Only with the private key can she access her funds. When Jenny attempts to make a transaction, her private key is hashed to her public address, and her ownership is confirmed.",{"type":290,"tag":291,"props":498,"children":499},{},[500],{"type":290,"tag":305,"props":501,"children":504},{"alt":307,"src":502,"title":503},"image://3d7b90b8-6f1c-4b11-b999-d3a26e2e89e3","Hashing is essential for wallet keys to work",[],{"type":290,"tag":291,"props":506,"children":507},{},[508],{"type":295,"value":509},"To send bitcoin to Martha, Jenny finally needs Martha’s public address, and Jenny can pay back Martha for all the martinis they had last Friday night.",{"type":290,"tag":291,"props":511,"children":512},{},[513],{"type":295,"value":514},"Considering blockchain’s reliance on encryption, there are countless other areas that hashing is implemented to ensure security and privacy on the blockchain.",{"title":284,"searchDepth":25,"depth":25,"links":516},[],{"id":127,"data":128,"type":25,"version":20,"maxContentLevel":19,"pages":518},[519,541,573],{"id":132,"data":133,"type":20,"maxContentLevel":19,"version":20,"reviews":137,"parsed":520},{"data":521,"body":523,"toc":539},{"title":284,"description":522},"A blockchain exists as a series of blocks of data, which are verifiable but unmodifiable. But who is taking the time to keep the system alive and well? For blockchains to work, it’s essential that people spend the time and money required to validate the network.",{"type":287,"children":524},[525,529,534],{"type":290,"tag":291,"props":526,"children":527},{},[528],{"type":295,"value":522},{"type":290,"tag":291,"props":530,"children":531},{},[532],{"type":295,"value":533},"This is where ‘consensus mechanisms’ come in. They are aptly named: these are mechanisms for proving consensus about the data on the blockchain. To use the earlier analogy, consensus mechanisms are the processes people use for verifying that their smoothies have the same fruit in them.",{"type":290,"tag":291,"props":535,"children":536},{},[537],{"type":295,"value":538},"All blockchains require consensus mechanisms, and there are a number of different approaches to creating them. The two most famous are ‘Proof-of-Work’ – used by Bitcoin, and ‘Proof-of-Stake’, now used by Ethereum and most other newer blockchains.",{"title":284,"searchDepth":25,"depth":25,"links":540},[],{"id":147,"data":148,"type":20,"maxContentLevel":19,"version":20,"reviews":151,"parsed":542},{"data":543,"body":545,"toc":571},{"title":284,"description":544},"The two main consensus mechanisms are Proof-of-Work and Proof-of-Stake. They are different ways of achieving the same goal – incentivizing people to spend the time and computing power to keep the blockchain alive and well.",{"type":287,"children":546},[547,551,556,561,566],{"type":290,"tag":291,"props":548,"children":549},{},[550],{"type":295,"value":544},{"type":290,"tag":291,"props":552,"children":553},{},[554],{"type":295,"value":555},"Proof-of-Work works by requiring participants - known as miners - to solve complicated math problems to verify transactions on the blockchain.",{"type":290,"tag":291,"props":557,"children":558},{},[559],{"type":295,"value":560},"These math problems are very expensive by design to keep malevolent actors at bay. Attacks on the blockchain are disincentivized, since it takes a lot of computing power and energy to mine a block.",{"type":290,"tag":291,"props":562,"children":563},{},[564],{"type":295,"value":565},"In theory, if you had over 50% of the computing power in the network, you could proclaim yourself as a billionaire and send tons of faulty transactions to yourself. But, because mining is so, so expensive, such fraudulent activity is effectively impossible. And even if it was, as soon as you’d changed the ledger, people would realize – and lose trust in the currency. Since the only thing giving crypto value is trust, hacking large cryptos is impossible and uneconomical.",{"type":290,"tag":291,"props":567,"children":568},{},[569],{"type":295,"value":570},"However, since energy is expensive, validators need a financial incentive. This is created through cryptocurrency rewards. Anyone who dedicates computing power to mining will be rewarded with that blockchain’s currency for doing so.",{"title":284,"searchDepth":25,"depth":25,"links":572},[],{"id":164,"data":165,"type":20,"maxContentLevel":19,"version":20,"reviews":168,"parsed":574},{"data":575,"body":577,"toc":593},{"title":284,"description":576},"The other major consensus mechanism used is Proof-of-Stake. This was invented as an alternative to Proof-of-Work when people realized the financial and environmental costs of using so much energy to validate the blockchain.",{"type":287,"children":578},[579,583,588],{"type":290,"tag":291,"props":580,"children":581},{},[582],{"type":295,"value":576},{"type":290,"tag":291,"props":584,"children":585},{},[586],{"type":295,"value":587},"Proof-of-Stake instead requires participants in the network to ‘stake’ some of their coins – to put them up as collateral. In return, they are entered into a pool of people. One (or a handful) of these people is randomly selected to run the computer operation required to validate the block in the chain. Because they have skin in the game – their money is at stake as collateral – it can be safely assumed that they will not tamper with the block, otherwise they risk losing their ‘staked collateral.’",{"type":290,"tag":291,"props":589,"children":590},{},[591],{"type":295,"value":592},"Proof-of-Stake is generally considered to be a superior, more efficient and environmentally-friendly alternative to Proof-of-Work. The biggest blockchain in the world – Bitcoin – runs on Proof-of-Work. But most new development and activity in the blockchain space is occurring on Ethereum or other chains that use Proof-of-Stake.",{"title":284,"searchDepth":25,"depth":25,"links":594},[],{"id":179,"data":180,"type":25,"version":20,"maxContentLevel":19,"pages":596},[597,627,662],{"id":184,"data":185,"type":20,"maxContentLevel":19,"version":20,"reviews":189,"parsed":598},{"data":599,"body":601,"toc":625},{"title":284,"description":600},"There are many different potential uses of the blockchain that capitalize on its many advantages. In fact, the blockchain is expected to become the primary mechanism for widely used databases as Web3 rolls out and becomes increasingly popular.",{"type":287,"children":602},[603,607,615,620],{"type":290,"tag":291,"props":604,"children":605},{},[606],{"type":295,"value":600},{"type":290,"tag":291,"props":608,"children":609},{},[610],{"type":290,"tag":305,"props":611,"children":614},{"alt":307,"src":612,"title":613},"image://2c394c69-aebb-442f-97e2-107f3ebf6432","Blockchain is tamper-proof, unlike virtually any system of data storage in existence",[],{"type":290,"tag":291,"props":616,"children":617},{},[618],{"type":295,"value":619},"One category of things which are likely to be added to the blockchain are things which want to be made resistant to tampering. Examples of these include digital currencies, real estate ownership and intellectual property ownership records.",{"type":290,"tag":291,"props":621,"children":622},{},[623],{"type":295,"value":624},"Another category of things which are likely to be added to the blockchain are things which need to be kept private. Examples of these include personal information data, medical histories and mental health records.",{"title":284,"searchDepth":25,"depth":25,"links":626},[],{"id":199,"data":200,"type":20,"maxContentLevel":19,"version":20,"reviews":204,"parsed":628},{"data":629,"body":631,"toc":660},{"title":284,"description":630},"One of the benefits of blockchain is that it is effectively impossible for any agent to make changes to a database without those changes being visible to everyone. In Web2, you would only need to access and edit the database in order to change its elements. This means that theoretically, if you had access to your bank’s database, you would be able to move money from someone else to yourself without their permission.",{"type":287,"children":632},[633,637,642,647,655],{"type":290,"tag":291,"props":634,"children":635},{},[636],{"type":295,"value":630},{"type":290,"tag":291,"props":638,"children":639},{},[640],{"type":295,"value":641},"Proponents of blockchain say that it's safer because, in the blockchain, it is impossible to change other people’s blocks once they are in the chain. However, given that modern banking databases are safeguarded with consistency reviews, one-time-passwords, two-factor authentication and complicated encryption, your money is pretty safe in the bank too.",{"type":290,"tag":291,"props":643,"children":644},{},[645],{"type":295,"value":646},"A second benefit of the blockchain is that interactions can be conducted pseudonymously. Instead of having to give a third party your name, so they can store it alongside your money, the database in the blockchain only relies on where the blockchains exist digitally to identify them.",{"type":290,"tag":291,"props":648,"children":649},{},[650],{"type":290,"tag":305,"props":651,"children":654},{"alt":307,"src":652,"title":653},"image://7c48a954-fff5-42cc-9760-cad3314f92c2","Code ensures that transactions can be conducted anonymously",[],{"type":290,"tag":291,"props":656,"children":657},{},[658],{"type":295,"value":659},"Finally, it cuts out the third-party entirely. This means that even if you live in a location where a trusted, stable bank doesn’t exist, you can still rely on the safety of your money. Moreover, you don’t need to pay transaction fees or rely on the bank not to lose your money on poor investments, cutting out the middleman.",{"title":284,"searchDepth":25,"depth":25,"links":661},[],{"id":215,"data":216,"type":20,"maxContentLevel":19,"version":20,"reviews":220,"parsed":663},{"data":664,"body":666,"toc":692},{"title":284,"description":665},"However, there are also some key disadvantages to blockchains.",{"type":287,"children":667},[668,672,677,682,687],{"type":290,"tag":291,"props":669,"children":670},{},[671],{"type":295,"value":665},{"type":290,"tag":291,"props":673,"children":674},{},[675],{"type":295,"value":676},"With a centralized database - like those of a bank - the government is able to quickly view criminal activity and hold people accountable. However, in a decentralized system, that’s far more difficult. Because people operate pseudonymously, fraudulent or criminal activity is harder to trace. That means that blockchains could become a hotbed for illegal activity, including drug trafficking, or money laundering.",{"type":290,"tag":291,"props":678,"children":679},{},[680],{"type":295,"value":681},"Nevertheless, blockchains stand as a permanent and immutable public record of transactions. If, therefore, pseudonymous transactions can be identified by law enforcement, crypto could prove much easier to trace than, for example, cash.",{"type":290,"tag":291,"props":683,"children":684},{},[685],{"type":295,"value":686},"Secondly, as with any new technology, users unfamiliar with the blockchain might not trust it with their information or personal finances. Alternatively, this lack of familiarity might mean that they are susceptible to scams that prey on human errors rather than technological ones.",{"type":290,"tag":291,"props":688,"children":689},{},[690],{"type":295,"value":691},"Finally, frequently hashing and storing large amounts of information can take computational power. This means that until someone devises a hardware or software solution, blockchains will be slow. Moreover, the energy required to maintain the blockchain so that all blocks are online in multiple copies for checking is large, which itself will mean higher costs.",{"title":284,"searchDepth":25,"depth":25,"links":693},[],{"id":229,"data":230,"type":25,"version":20,"maxContentLevel":19,"pages":695},[696,718,740],{"id":234,"data":235,"type":20,"maxContentLevel":19,"version":20,"reviews":239,"parsed":697},{"data":698,"body":700,"toc":716},{"title":284,"description":699},"Proof-of-Work blockchains have extremely heavy requirements when it comes to electricity. In fact, Bitcoin alone uses 150 Terawatt Hours, more electricity than Argentina, every single year. Computers will draw significant amounts of power in order to simply sustain the blockchain in the background, without even mentioning the process of extending it.",{"type":287,"children":701},[702,706,711],{"type":290,"tag":291,"props":703,"children":704},{},[705],{"type":295,"value":699},{"type":290,"tag":291,"props":707,"children":708},{},[709],{"type":295,"value":710},"In the modern day, this poses a significant challenge because of the impacts of climate change. Currently, all of our methods of generating electricity have an impact on the climate. Even solar panels take away land from nature and can require unsustainable practices to build. As a result, the introduction of a vast new framework that requires copious amounts of electricity threatens our planet.",{"type":290,"tag":291,"props":712,"children":713},{},[714],{"type":295,"value":715},"That being said, many blockchains are turning away from Proof-of-Work. 2022 saw the historic Ethereum ‘Merge’, where the Ethereum blockchain switched to Proof-of-Stake after a huge collective effort by the Ethereum Foundation. The move will cut the energy consumption of Ethereum by 99.95%.",{"title":284,"searchDepth":25,"depth":25,"links":717},[],{"id":248,"data":249,"type":20,"maxContentLevel":19,"version":20,"reviews":253,"parsed":719},{"data":720,"body":722,"toc":738},{"title":284,"description":721},"One of the potential uses of the blockchain in the future will be to reliably track the ownership of real world assets. Usually, this involves an asset holder logging the transaction in the blockchain. However, there is a weak link in this system: humans.",{"type":287,"children":723},[724,728,733],{"type":290,"tag":291,"props":725,"children":726},{},[727],{"type":295,"value":721},{"type":290,"tag":291,"props":729,"children":730},{},[731],{"type":295,"value":732},"What if you give something to a friend and forget to log it in the blockchain? It won’t be logged in the Blockchain, so your friend won’t be the registered owner - they’ll never be able to sell or transfer ownership to anyone else. Here’s another problem: what if someone dies, and you inherit the property? Obviously, the previous owner will never be able to log the change in ownership in the Blockchain.",{"type":290,"tag":291,"props":734,"children":735},{},[736],{"type":295,"value":737},"In order for the Blockchain to reach a state where it covers all of our needs, developers are going to have to think of innovative new solutions to the problems associated with human errors and imperfections.",{"title":284,"searchDepth":25,"depth":25,"links":739},[],{"id":264,"data":265,"type":20,"maxContentLevel":19,"version":20,"reviews":269,"parsed":741},{"data":742,"body":744,"toc":755},{"title":284,"description":743},"Another drawback of the blockchain is that transactions are not free. While traditional banks often earn money indirectly and mostly don’t charge for transactions, blockchains charge fees every time you send money. On the blockchain, transaction fees are explicit and paid to the network participants, who help check that transactions are legitimate. This is done through consensus mechanisms: getting multiple different computers, also known as nodes, to check the authenticity of another block.",{"type":287,"children":745},[746,750],{"type":290,"tag":291,"props":747,"children":748},{},[749],{"type":295,"value":743},{"type":290,"tag":291,"props":751,"children":752},{},[753],{"type":295,"value":754},"In the Ethereum network, these transaction fees are called ‘gas fees’. These are something you will need to pay each time you make a transaction on the blockchain. These fees can rack up quickly. When networks are congested fees can shoot up and it’s possible that some are upwards of $60 for each transaction - and potentially thousands for large transactions at peak times.",{"title":284,"searchDepth":25,"depth":25,"links":756},[],{"left":4,"top":4,"width":758,"height":758,"rotate":4,"vFlip":6,"hFlip":6,"body":759},24,"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"m9 18l6-6l-6-6\"/>",{"left":4,"top":4,"width":758,"height":758,"rotate":4,"vFlip":6,"hFlip":6,"body":761},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M4 5h16M4 12h16M4 19h16\"/>",1778179444139]