Curriculum
Course: What is Crypto
Login
Video lesson

But how does crypto actually work?

Decrypting Bitcoin: How To Transform Finance

Understanding Digital Trust: Bitcoin’s Breakthrough

Imagine a world where you no longer need banks to verify your payments, where you can transact with anyone across the globe without relying on a middleman. This is not some distant dream—it’s the reality that Bitcoin has been pioneering for over a decade. With increasing attention on decentralized finance (DeFi) and digital currencies, understanding Bitcoin’s underlying mechanics is more relevant than ever. This lesson dives into the core concepts behind Bitcoin, from digital signatures to the role of miners in maintaining the network’s security. As part of the Crypto Is FIRE (CFIRE) training program, this exploration will deepen your understanding of how Bitcoin reimagines the nature of money, setting the stage for a broader discussion about its implications for the future of finance.


From Digital Signatures to Mining

At its core, Bitcoin is a digital ledger—a public record of transactions that is transparent and decentralized. Unlike traditional financial systems, where banks and governments maintain control over the flow of money, Bitcoin operates through a network of users who collectively verify and record transactions. The video lesson highlights this shift by guiding viewers through the step-by-step process of creating a secure, trustless system using cryptography. It begins with the concept of digital signatures, which ensure that only the rightful owner of a Bitcoin can authorize a transfer. From there, it introduces the idea of a decentralized ledger maintained through a process called “mining,” where participants solve complex puzzles to validate transactions. The overarching argument is that Bitcoin, and by extension other cryptocurrencies, offers a new way of thinking about trust, money, and digital ownership in a world that increasingly questions centralized control.


Critical Analysis

Strengths of the Video’s Argument

  1. Clear Explanation of Digital Signatures
    The video effectively demystifies digital signatures, comparing them to traditional handwritten signatures but with a cryptographic twist. In traditional finance, a signature on a check verifies the sender’s intent; in Bitcoin, digital signatures use a private key to verify transactions. This concept is crucial for newcomers to grasp, as it forms the basis of security in all cryptocurrencies. The video’s emphasis on the strength of digital signatures, which change for each transaction and are nearly impossible to forge, highlights the robustness of Bitcoin’s security model.

    • Supporting Example: Just as a unique PIN ensures the security of your bank transactions, a private key ensures that only the true owner can authorize a Bitcoin transfer. This one-to-one relationship between keys and ownership is foundational in the crypto world.
  2. Insight into the Role of Mining
    The explanation of mining as a mechanism for validating transactions and securing the network is one of the video’s strongest points. Mining creates a decentralized process where anyone with the computational power can participate in maintaining the Bitcoin network. This contrasts sharply with traditional finance, where a few institutions hold the power to process transactions. The video’s analogy of mining as a lottery where participants guess solutions adds a layer of relatability to this complex process.

    • Why It Matters: This analogy helps viewers understand why mining is energy-intensive and how it keeps the network secure. It sets the stage for discussions around alternative consensus mechanisms like Proof of Stake (PoS), making it a valuable stepping stone for deeper crypto education in CFIRE.
  3. Emphasis on Trust Through Proof of Work (PoW)
    By focusing on the concept of Proof of Work (PoW), the video explains how Bitcoin’s consensus mechanism ensures that no single party can control the ledger. This trustless system, where the longest chain of blocks is considered the valid one, is the cornerstone of Bitcoin’s decentralized nature.

    • Additional Data: Bitcoin’s reliance on PoW has proven resilient even during attempts to disrupt its network, such as the well-known 51% attacks that have targeted smaller blockchains. The sheer computational power behind Bitcoin makes such attacks nearly infeasible, reinforcing the strength of its security.

Areas for Improvement and Counterarguments

  1. Energy Consumption of Proof of Work
    While the video lauds PoW for its ability to secure the network, it does not address the significant environmental concerns associated with Bitcoin mining. As the number of miners increases, so does the network’s energy consumption, leading to criticisms about Bitcoin’s carbon footprint.

    • Counterpoint: Critics argue that this energy use is unsustainable, especially as more eco-friendly alternatives like Proof of Stake (PoS) gain traction. Ethereum’s recent shift to PoS, which drastically reduced its energy consumption, serves as a noteworthy comparison.
    • Nuance: It’s important to balance these concerns with the understanding that Bitcoin’s energy use is often concentrated in regions with surplus renewable energy, highlighting the complexity of this debate.
  2. Limited Transaction Capacity
    The video mentions Bitcoin’s block size, which limits the number of transactions processed per block, leading to higher transaction fees during periods of heavy use. This bottleneck has led some critics to argue that Bitcoin cannot scale effectively as a global payment system.

    • Alternative Viewpoint: Layer 2 solutions like the Lightning Network have been developed to address these issues, enabling faster and cheaper transactions without changing Bitcoin’s core protocol.
    • What’s Overlooked: While these solutions offer promise, they add complexity to Bitcoin’s use, which may deter new users. Understanding these trade-offs is crucial for assessing Bitcoin’s role in the future of digital payments.
  3. The Myth of Complete Anonymity
    The video briefly touches on Bitcoin’s decentralized nature but fails to clarify that transactions, while pseudonymous, are not truly anonymous. Every transaction is recorded on a public ledger, allowing sophisticated analysis to potentially trace transactions back to individuals.

    • Critical Insight: This aspect is often misunderstood by newcomers, leading to unrealistic expectations about privacy. It’s important to highlight the difference between Bitcoin’s pseudonymity and privacy-focused coins like Monero or Zcash, which use advanced cryptographic techniques to obscure transaction details.

Connections to Cryptocurrency and Blockchain

Bitcoin’s design principles—decentralization, cryptographic security, and a trustless system—serve as the blueprint for many cryptocurrencies that have followed. Ethereum, for example, builds on Bitcoin’s concepts but introduces smart contracts, allowing for automated, conditional transactions. This adds a layer of programmability to the blockchain, enabling use cases beyond simple payments.

In the world of DeFi, many of these foundational ideas take on new forms. DeFi platforms leverage smart contracts to automate lending, borrowing, and trading without intermediaries. While Bitcoin serves as a store of value akin to digital gold, DeFi platforms like Aave and Uniswap function more like decentralized banks, offering financial services without the need for centralized control. Here, the absence of traditional gatekeepers can open up financial access to millions globally, but it also introduces risks, such as smart contract vulnerabilities.

Bitcoin’s consensus mechanism, PoW, contrasts with newer approaches like Proof of Stake (PoS), seen in Ethereum 2.0. PoS requires validators to hold a certain amount of cryptocurrency to participate in consensus, making it more energy-efficient. While Bitcoin remains the gold standard for security, PoS represents a shift towards more scalable and eco-friendly blockchain models.


Broader Implications and Future Outlook

Bitcoin’s impact goes far beyond cryptocurrency enthusiasts—it has sparked a global conversation about the nature of money, privacy, and trust in institutions. As governments and central banks explore their own digital currencies (CBDCs), Bitcoin’s existence challenges them to reconsider how value and transactions are managed. The rise of CBDCs, like China’s digital yuan, demonstrates that even state actors recognize the power of digital currency, though their centralized nature starkly contrasts with Bitcoin’s ethos.

Looking forward, Bitcoin’s future may hinge on its ability to coexist with these evolving systems. As institutions increasingly allocate Bitcoin as a hedge against inflation, its narrative as “digital gold” could solidify, especially in uncertain economic climates. Yet, the debate over Bitcoin’s energy use and its scalability remains, potentially driving innovation in adjacent areas like sidechains and Lightning Network improvements.

In the context of broader technological advancements, the principles behind Bitcoin’s blockchain have influenced developments in fields as diverse as supply chain management, identity verification, and digital art (NFTs). As the world becomes more digitized, Bitcoin’s blueprint for a trustless system continues to offer inspiration for building systems that operate independently of traditional authorities.


Personal Commentary and Insights

Bitcoin’s journey is, in many ways, a reflection of our own evolving relationship with technology and trust. It’s remarkable to think that a protocol born out of the 2008 financial crisis now stands as a potential challenger to some of the world’s oldest institutions. Personally, I’ve seen how the principles behind Bitcoin have sparked curiosity even among those who initially dismissed it as a fad. The concept of owning money that isn’t controlled by a bank resonates with many, especially in regions where financial instability is a daily reality.

Yet, I believe that Bitcoin’s true value lies in the questions it forces us to ask: Should we continue relying on centralized authorities? How much privacy are we willing to sacrifice for convenience? And can we create a global financial system that’s more inclusive and equitable? These questions are central to the Crypto Is FIRE training program because they push us to think beyond the surface of price movements and toward the deeper implications of decentralized finance.


Conclusion

As we peel back the layers of Bitcoin’s design, it becomes clear that this digital currency is more than a speculative asset—it’s a radical reimagining of what money can be. With a foundation built on cryptographic trust and decentralized consensus, Bitcoin challenges the status quo, offering a glimpse into a future where financial power is more evenly distributed. For those just starting their journey in the Crypto Is FIRE training program, understanding Bitcoin is the first step toward grasping the wider potential of blockchain technology. The world of digital currencies is ever-evolving, and the next lesson will take you deeper into the mechanics of market cycles, helping you navigate the ups and downs

of this dynamic new economy. Let’s continue building your expertise—one block at a time.


Potential Titles

  1. Decrypting Bitcoin: How Digital Trust Transforms Finance
  2. Bitcoin Unveiled: Beyond the Blockchain Buzzwords
  3. From Ledgers to Blockchain: Understanding the Core of Bitcoin

Subheadings

  1. Understanding Digital Trust: Bitcoin’s Breakthrough
  2. Strengths and Weaknesses: A Balanced Perspective
  3. From Digital Signatures to Mining: How Bitcoin Works
  4. Bridging Traditional Finance and the Crypto Ecosystem
  5. What’s Next for Bitcoin and Beyond?

Compelling Quotes

  1. “In a world where trust is often in short supply, Bitcoin offers a digital solution that doesn’t ask for blind faith.”
  2. “The history of transactions is the currency—Bitcoin’s ledger is its beating heart, and cryptography is its shield.”
  3. “As the world digitizes, Bitcoin’s blueprint for trustless systems remains a beacon for those envisioning a new financial future.”

This article blends critical analysis with engaging content, providing readers with a deep understanding of Bitcoin’s mechanics and its implications for finance and technology. Let me know if you’d like any adjustments or additions!

Here’s how I’d structure a comprehensive, beginner-friendly lesson based on the transcript provided, tailored for the CryptoIsFire (CFIRE) training plan:


Title: The Foundations of Bitcoin: Decentralized Trust and Cryptographic Security

Overview

In this lesson, we dive into the fascinating world of Bitcoin, exploring the fundamental mechanics that make it a groundbreaking digital currency. From understanding how Bitcoin transactions are recorded on a decentralized ledger to the role of cryptographic security, you’ll gain a solid foundation in what sets Bitcoin apart from traditional financial systems. This lesson is key for grasping the basics of cryptocurrencies, preparing you to navigate the broader crypto market with confidence.


Core Concepts

  1. Decentralized Ledger

    • Traditional Finance: A centralized ledger typically maintained by a bank or financial institution that records transactions.
    • Crypto World: Bitcoin uses a decentralized ledger, known as the blockchain, where transactions are verified by a distributed network of computers (nodes).
    • Why It Matters: Understanding decentralized ledgers is crucial for grasping how cryptocurrencies eliminate the need for intermediaries like banks.
  2. Digital Signatures

    • Traditional Finance: A signature on a check or contract verifies a person’s intent and identity.
    • Crypto World: Digital signatures use cryptographic keys to verify that a transaction was initiated by the rightful owner.
    • Why It Matters: This ensures security and authenticity in digital transactions, a cornerstone of blockchain technology.
  3. Proof of Work (PoW)

    • Traditional Finance: Not directly applicable, but can be thought of as a type of competition where resources (computing power) are used to achieve a goal.
    • Crypto World: Miners solve complex mathematical puzzles to add new transactions to the blockchain, ensuring that the system remains secure and tamper-proof.
    • Why It Matters: PoW is what makes Bitcoin’s network secure and decentralized, preventing double-spending and fraudulent transactions.
  4. Block and Blockchain

    • Traditional Finance: Similar to pages in a ledger book, where each page records transactions.
    • Crypto World: A block is a group of transactions; a blockchain is a chain of these blocks, each connected to the previous one.
    • Why It Matters: The blockchain structure is what makes cryptocurrencies transparent and immutable.
  5. Mining

    • Traditional Finance: Comparable to the way central banks print money, but with a competitive twist.
    • Crypto World: Miners use computing power to validate transactions and secure the network, earning new Bitcoins as a reward.
    • Why It Matters: Mining introduces new coins into circulation and maintains the integrity of the Bitcoin network.
  6. Hash Functions

    • Traditional Finance: Think of it as a digital thumbprint, where a small change results in a completely different outcome.
    • Crypto World: Cryptographic hash functions like SHA-256 secure the blockchain by making it impossible to alter transaction data without redoing the entire computational effort.
    • Why It Matters: Hash functions ensure the security and integrity of each block in the blockchain.

Key Sections

1. Understanding Digital Ledgers

  • Key Points:
    • Digital ledgers record transactions publicly.
    • A decentralized ledger removes the need for a central authority.
    • Bitcoin’s ledger is distributed across nodes.
  • Detailed Explanation: In traditional finance, banks maintain ledgers to track deposits, withdrawals, and transfers. With Bitcoin, the ledger is distributed—every participant (node) maintains a copy. When a transaction occurs, it’s broadcasted across the network, recorded on all copies. This means that no single entity controls the ledger, making it resistant to censorship or manipulation.
  • Crypto Connection: A distributed ledger like Bitcoin’s is revolutionary because it removes the need for trust in a single entity. For example, Ethereum also uses a similar system but allows more complex transactions through smart contracts.
  • Importance: This is foundational for understanding how cryptocurrencies operate without banks, aligning with the CFIRE focus on decentralized finance.

2. Digital Signatures and Security

  • Key Points:
    • Digital signatures verify transaction authenticity.
    • Uses cryptographic keys (public and private).
    • Impossible to forge without the private key.
  • Detailed Explanation: A digital signature in Bitcoin is created using a private key, and it ensures that only the owner of the Bitcoin can authorize a transaction. Just as a handwritten signature verifies a check, a digital signature verifies a Bitcoin transaction. Altering even a small part of the message changes the signature, ensuring the integrity of transactions.
  • Crypto Connection: Digital signatures are crucial for all blockchain transactions, ensuring that ownership of digital assets remains secure. Projects like Polkadot and Cardano also rely on similar mechanisms.
  • Importance: Security is a key concern for newcomers, and understanding digital signatures provides confidence in the system’s reliability.

3. Proof of Work and Consensus

  • Key Points:
    • Miners solve puzzles to validate transactions.
    • The longest chain is considered the valid one.
    • Creates a trustless system where computational effort replaces human trust.
  • Detailed Explanation: Proof of Work (PoW) is like a competitive game where miners guess a solution to a complex puzzle. The winner adds a new block to the blockchain and receives a reward. This process secures the network by making it expensive and time-consuming to alter the blockchain. The more computational power behind a chain, the more trustworthy it is.
  • Crypto Connection: PoW is used in Bitcoin but has alternatives like Proof of Stake (PoS) in Ethereum 2.0, where validators are chosen based on the number of tokens they hold.
  • Importance: Understanding consensus mechanisms is vital for evaluating different cryptocurrencies, making this a key part of the CFIRE journey.

4. Mining and the Creation of New Coins

  • Key Points:
    • Mining introduces new Bitcoins into circulation.
    • It’s a reward for validating transactions.
    • Halving events reduce the mining reward over time.
  • Detailed Explanation: In traditional economies, central banks print money. In Bitcoin, miners earn new coins through the mining process, but with a twist—every 210,000 blocks, the reward halves, reducing the rate at which new coins enter circulation. This built-in scarcity is one reason why Bitcoin is often referred to as “digital gold.”
  • Crypto Connection: Halving events make Bitcoin increasingly scarce, driving up demand. It’s one of the reasons for Bitcoin’s meteoric rise in value over the years.
  • Importance: This concept ties into the CFIRE lesson on crypto economics, emphasizing scarcity and value.

The Crypto Perspective

In each section, we see how Bitcoin reimagines traditional finance concepts through decentralization, cryptography, and incentives. These differences create opportunities but also come with challenges—like the high energy costs of mining and the difficulty of achieving mass adoption.


Examples

  1. Digital Ledger Example: In traditional finance, your bank account reflects transactions the bank records. In Bitcoin, if Alice sends 1 BTC to Bob, this is recorded across thousands of computers worldwide.
  2. Proof of Work Example: Imagine a raffle where you must guess the right number. In Bitcoin, miners keep guessing until they find the correct answer, proving they put in the effort.
  3. Mining Reward Example: Just like a central bank might incentivize banks to lend more, Bitcoin incentivizes miners with rewards, but these rewards decrease over time, promoting scarcity.

Real-World Applications

  • Bitcoin as a Store of Value: Often compared to gold, Bitcoin’s limited supply makes it a hedge against inflation.
  • Decentralized Payments: Unlike traditional banks, Bitcoin allows peer-to-peer payments without intermediaries, reducing costs and increasing accessibility in regions with limited banking infrastructure.

Cause and Effect Relationships

  • Mining Rewards and Scarcity: As rewards decrease, Bitcoin’s scarcity increases, potentially driving demand and price.
  • Proof of Work and Security: More computational power makes the Bitcoin network more secure, preventing double-spending.

Challenges and Solutions

  • Challenge: Energy consumption of Bitcoin mining.
    • Solution: Transitioning to more energy-efficient mechanisms like Proof of Stake (seen in other blockchains).
  • Challenge: Understanding technical concepts.
    • Solution: User-friendly wallets and exchanges help newcomers engage with Bitcoin without needing deep technical knowledge.

Key Takeaways

  1. Decentralization removes the need for trust in banks.
  2. Digital signatures secure transactions and prove ownership.
  3. Proof of Work ensures network integrity.
  4. Mining introduces new coins and ensures security through competition.
  5. Bitcoin’s built-in scarcity through halving events creates a unique economic model.

Discussion Questions and Scenarios

  1. How does decentralization make Bitcoin different from traditional banks?
  2. Why might Proof of Work be more secure but less energy-efficient than other consensus methods?
  3. What might happen if Bitcoin’s mining rewards were not halved over time?
  4. Compare Bitcoin’s digital signatures to the verification methods used in traditional finance.
  5. Imagine a world where Bitcoin replaces traditional currencies—what challenges might arise?

Additional Resources and Next Steps

  • Further Reading: Mastering Bitcoin by Andreas Antonopoulos, Bitcoin whitepaper by Satoshi Nakamoto.
  • Websites: Block Explorer for real-time blockchain data.
  • Next Concepts: Learn about smart contracts, explore alternative consensus mechanisms like Proof of Stake, and delve into Ethereum’s blockchain.

###

Glossary

  • Digital Signature: A cryptographic code that verifies a sender’s identity.
  • Hash Function: A function that converts an input into a fixed-length string of bits.
  • Proof of Work: A system where computational power is used to validate transactions.
  • Mining: The process of creating new Bitcoins by solving cryptographic puzzles.
  • Blockchain: A distributed ledger of transactions grouped into blocks.

Final Note

Ready to deepen your understanding? In the next lesson of the CFIRE training plan, we’ll explore how to analyze the market cycles of cryptocurrencies, giving you the skills to time your entry and exit points like a pro. Let’s keep the momentum going!


This structure provides a comprehensive yet engaging breakdown of the Bitcoin basics while connecting traditional finance concepts to their crypto counterparts. Let me know if you’d like adjustments or additions!

Read Video Transcript
What does it mean to have a Bitcoin?  Many people have heard of Bitcoin, that it’s a fully digital currency with no government to issue it,  and that no banks need to manage accounts and verify transactions,  and also that no one really knows who invented it.  And yet many people don’t know the answer to this question, at least not in full.
 To get there, and to make sure that the technical details underlying the answer actually feel  motivated, what we’re going to do is walk through, step by step, how you might have  invented your own version of Bitcoin.  We’ll start with you keeping track of payments with your friends using a communal ledger,  and then as you start to trust your friends and the world around you less and less, and  if you’re clever enough to bring in a few ideas from cryptography to help circumvent  the need for trust, what you end up with is what’s called a cryptocurrency.
 You see, Bitcoin is just the first implemented example of a cryptocurrency, and now there  are thousands more on exchanges with traditional currencies.  Walking the path of inventing your own can help to set the foundations for understanding  some of the more recent players in the game, and recognizing when and why there’s room  for different design choices.
 In fact, one of the reasons I chose this topic is that in the last year, there’s been a  huge amount of attention and investment and, well, honestly, hype directed at these currencies.  And I’m not going to comment or speculate on the current or future exchange rates,  but I think we’d all agree that anyone looking to buy a cryptocurrency  should really know what it is.
 And I don’t just mean in terms of analogies with vague connections to gold mining.  I mean an actual direct description of what the computers are doing  when we send, receive, and create cryptocurrencies.  One thing worth stressing, by the way, is that even though you and I are going to dig into the  details here, and that takes meaningful time, you don’t actually need to know those details if you  just want to use the cryptocurrency.
 Just like you don’t need to know the details of what happens  under the hood when you swipe a credit card. Like any digital payment, there’s lots of user-friendly applications that let you just  send and receive the currencies without thinking about what’s going on.  The difference is that the backbone underlying this is not a bank that verifies transactions.  Instead, it’s a clever system of decentralized trustless verification based on some of the  math born in cryptography.
 But to start, I want you to actually set aside the thought of cryptocurrencies and all that  just for a few minutes.  We’re going to begin the story with something more down to earth, ledgers and digital signatures.  If you and your friends exchange money pretty frequently, you know, paying your share of  the dinner bill and such, it can be inconvenient to exchange cash all the time.
 So you might keep a communal ledger that records all of the payments that you intend to make  some point in the future.  You know, Alice pays Bob $20, Bob pays Charlie $40, things like that.  This ledger is going to be something public and accessible to everyone, like a website  where anyone can go and just add new lines.
 And let’s say that at the end of every month you you all get together, look at the list of transactions,  and settle up.  If you spent more than you received,  you put that money in the pot,  and if you received more than you spent,  you take that money out.  So the protocol for being part of this very simple system  might look like this.
 Anyone can add lines to the ledger,  and at the end of every month,  you all get together and settle up.  Now one problem with a public ledger like this is that anyone can add a line.  So what’s to prevent Bob from going and writing Alice pays Bob $100 without Alice approving?  How are we supposed to trust that all of these transactions are what the sender meant them to be?  Well, this is where the first bit of cryptography  comes in. Digital signatures. Like handwritten signatures, the idea here is that Alice should
 be able to add something next to that transaction that proves that she has seen it and that she’s  approved of it. And it should be infeasible for anyone else to forge that signature.  At first, it might seem like a digital signature shouldn’t even be possible.  I mean, whatever data makes up that signature can just be read and copied by a computer,  so how do you prevent forgeries?  Well, the way this works is that everyone generates what’s called a public key-private  key pair, each of which looks like some string of bits.
 The private key is sometimes also called a secret key, so that we can abbreviate it as  SK while abbreviating the public key as PK.  Now as the name suggests, this secret key is something you want to keep to yourself.  In the real world, your handwritten signature looks the same no matter what document you’re  signing.
 But a digital signature is actually much stronger, because it changes for different messages. It looks like some string of ones and zeros,  commonly something like 256 bits, and altering the message even slightly completely changes  what the signature on that message should look like.
 Speaking a little more formally,  producing a signature involves a function that depends both on the message itself and on your private key.  The private key ensures that only you can produce that signature, and the fact that it depends on the message means that no one can just copy one of your signatures and then forge it on another message.
 Hand in hand with this is a second function used to verify that a signature is valid.  And this is where the public key comes into play.  All it does is output true or false to indicate if this was a signature produced by the private key  associated with the public key that you’re using for verification.
 I won’t go into the details of how exactly both these functions work,  but the idea is that it should be completely infeasible  to find a valid signature if you don’t know the secret key.  Specifically, there’s no strategy better than just guessing and checking random signatures,  which you can check using the public key that everyone knows.
 Now think about how many signatures there are with a length of 256 bits.  That’s 2 to the power of 256. This  is a stupidly large number. To call it astronomically large would be giving way too much credit  to astronomy. In fact, I made a supplemental video devoted just to illustrating what a  huge number this is.
 Right here, let’s just say that when you verify that a signature  against a given message is valid,  you can feel extremely confident that the only way someone could have produced it  is if they knew the secret key associated with the public key you used for verification.  Now making sure that people sign transactions on the ledger is pretty good,  but there’s one slight loophole.
 If Alice signs a transaction like Alice pays Bob $100, even though Bob can’t forge Alice’s signature on a new  message, he could just copy that same line as many times as he wants. I mean  that message signature combination remains valid. To get around this, what we  do is make it so that when you sign a transaction, the message has to also  include some sort of unique ID associated  with that transaction.
 That way, if Alice pays Bob $100 multiple times, each one of those lines  on the ledger requires a completely new signature. Alright, great. Digital signatures remove a huge  aspect of trust in this initial protocol. But even still, if you were to really do this,  you would be relying on an honor system of sorts. Namely, you’re trusting that  everyone will actually follow through and settle up in cash at the end of each  month.
 What if, for example, Charlie racks up thousands of dollars in debt and just  refuses to show up? The only real reason to revert back to cash to settle up is  if some people owe a lot of money.  So maybe you have the clever idea that you never actually have to settle up in cash,  as long as you have some way to prevent people from spending too much more than they take in.  Maybe what you do is start by having everyone pay $100 into the pot,  and then have the first few lines of the ledger read,  Alice gets $100, Bob gets $100, Charlie gets $100 into the pot and then have the first few lines of the ledger read Alice gets $100 Bob gets $100 Charlie gets 100
 etc  now  Just don’t accept any transactions where someone is spending more than they already have on that ledger  for example  If the first two transactions are Charlie pays Alice $50 and Charlie pays Bob  $50 if he were to try to add CharliePaysYou $20,  that would be invalid, as invalid as if he had never signed it.
 Notice, this means that verifying a transaction requires knowing the full history of transactions  up to that point.  And this is, more or less, also going to be true in cryptocurrencies, though there is  a little room for optimization.  What’s interesting here is that this step removes the connection between the ledger  and actual physical US dollars.
 In theory, if everyone in the world was using this ledger,  you could live your whole life just sending and receiving money on this ledger without ever having  to convert to real US dollars. In fact, to emphasize this point, let’s start referring to the quantities  on the ledger as ledger dollars, or LD for short.
 You are of course free to exchange ledger dollars  for real US dollars. For example, maybe Alice gives Bob a $10 bill in the real world in exchange  for him adding and signing the transaction  Bob pays Alice $10 ledger dollars to this communal ledger.  But exchanges like that, they’re not going to be guaranteed by the protocol.  It’s now more analogous to how you might exchange dollars for euros,  or any other currency on the open market.
 It’s just its own independent thing.  This is the first important thing to understand  about Bitcoin, or any other cryptocurrency. What it is, is a ledger. The history of transactions  is the currency. Of course, with Bitcoin, money doesn’t enter the ledger with people buying in  using cash. I’ll get to how new money enters the ledger in just a few minutes.
 But before that, there’s actually an even more significant difference between our current  system of ledger dollars and how cryptocurrencies work.  So far I’ve said that this ledger is in some public place, like a website where anyone  can add new lines.  But that would require trusting a central location, namely who hosts the website, who  controls the rules of adding  new lines.
 To remove that bit of trust, we’ll have everybody keep their own copy of the ledger.  Then when you want to make a transaction, like Alice Pays Bob 100 Ledger Dollars, what  you do is broadcast that out into the world for people to hear and to record on their  own private ledgers.  But unless you do something more, this system is absurdly bad.
 How could you get everyone to agree on what the right ledger is?  When Bob receives a transaction, like Alice pays Bob 10 ledger dollars, how can he be  sure that everyone else received and believes that same transaction?  That he’ll be able to later on go to Charlie and use those same 10 ledger dollars to make a transaction.
 Really, imagine yourself just listening to  transactions being broadcast. How can you be sure that everyone else is recording the same  transactions and in the same order? This is really the heart of the issue. This is an interesting  puzzle. Can you come up with a protocol for how to accept or reject transactions, and in what  order, so that you can feel confident that anyone else in the world who is following  that same protocol has a personal ledger that looks the same as yours?  This is the problem addressed in the original Bitcoin paper.
 At a high level, the solution that Bitcoin offers is to trust whichever ledger has the  most computational work put into it.  I’ll take a moment to explain exactly what that means, it involves this thing called  a cryptographic hash function.  The general idea that we’ll build to is that if you use computational work as a basis for  what to trust, you can make  it so that fraudulent transactions and conflicting ledgers would require an infeasible amount  of computation to bring about.
 Again, I’ll remind you that this is getting well into the weeds beyond what anyone would  need to know just to use a currency like this.  But it’s a really cool idea, and if you understand it, you understand the heart of  Bitcoin and other cryptocurrencies.  So first things first, what’s a hash function?  The inputs for one of these functions can be any kind of message or file, it really doesn’t matter.
 And the output is a string of bits with some kind of fixed length, like 256 bits.  This output is called the hash, or the digest of the message, and the intent is that it looks  random.  It’s not random, it always gives the same output for a given input, but the idea is  that if you slightly change the input, maybe editing just one of the characters, the resulting  hash changes completely.
 In fact, for the hash function that I’m showing here, called SHA256, the way the output changes  as you slightly change that input is entirely unpredictable.  This is not just any hash function, it’s a cryptographic hash function.  That means it’s infeasible to compute in the reverse direction.  If I show you some string of 1s and 0s, and ask you to find an input so that the SHA-256 hash of that input gives this exact string of bits,  you will have no better method than to just guess and check. And again, if you
 want to feel for how much computation would be needed to go through 2 to the  256 guesses, just take a look at the supplement video. I actually had way too much fun writing that thing.  You might think that if you just really dig into the details of how exactly this function works,  you could reverse engineer the appropriate input without having to guess and check.
 But no one has ever figured out a way to do that.  Interestingly, there’s no cold hard rigorous proof that it’s hard to compute in the reverse  direction.  And yet a huge amount of modern security depends on cryptographic hash functions and the idea  that they have this property.  If you were to look at what algorithms underlie the secure connection that your browser is  making with YouTube right now, or that it makes with your bank, you will likely see  the name SHA256 show up in  there.
 For right now, our focus will just be on how such a function can prove that a particular  list of transactions is associated with a large amount of computational effort.  Imagine someone shows you a list of transactions, and they say, hey, I found a special number  so that when you put that number at the end  of this list of transactions and apply SHA-256 to the entire thing, the first 30 bits of  that output are all zeros.
 How hard do you think it was for them to find that number?  Well, for a random message, the probability that a hash happens to start with 30 successive  zeros is 1 in 2 to the 30, which is about 1 in a billion.  And because SHA-256 is a cryptographic hash function,  the only way to find a special number like that is just guessing and checking.
 So this person almost certainly had to go through about a billion different numbers before finding this special one.  And once you know that number, it’s really quick to verify.  You just run the hash and see that there are 30 zeros.  So in other words, you can verify that they went through a large amount of work, but without  having to go through that same effort yourself.
 This is called a proof of work.  And importantly, all of this work is intrinsically tied to the list of transactions.  If you change one of those transactions, even slightly, it would completely change the hash.  So you’d have to go through another billion guesses to find a new proof of work, a new  number that makes it so that the hash of the altered list together with this new number  starts with 30 zeros.
 So now think back to our distributed ledger situation.  Everyone is there broadcasting transactions, and we want a way for them to agree on what  the correct ledger is.  As I said, the core idea behind the original Bitcoin paper is to have everyone trust whichever  ledger has the most work put into it.  The way this works is to first organize a given ledger into blocks, where each block  consists of a list of transactions  together with a proof of work. That is, a special number so that the hash of the whole block starts
 with a bunch of zeros. For the moment let’s say that it has to start with, oh, 60 zeros,  but later we’ll return back to a more systematic way you might want to choose that number.  In the same way that a transaction is only considered valid when it’s signed by the  sender, a block is only considered valid if it has a proof of work.
 And also, to make sure that there’s a standard order to these blocks, we’ll make it so  that a block has to contain the hash of the previous block at its header.  That way, if you were to go back and change any one of the blocks, or to swap the order of two blocks,  it would change the block that comes after it, which changes that block’s hash, which changes the one that comes after it, and so on.
 That would require redoing all of the work, finding a new special number for each of these blocks that makes their hashes start with 60 zeros.  Because blocks are chained together like this, instead of calling it a ledger, it’s common  to call it a blockchain.  As part of our updated protocol, we’ll now allow anyone in the world to be a block creator.
 What that means is that they’re going to listen for transactions being broadcast, collect  them into some block, and then do a whole bunch of work to find a special number that  makes the hash of that block start with 60 zeros.  Then once they find it, they broadcast out the block they found.  To reward a block creator for all this work, when she puts together a block, we’ll allow  her to include a very special transaction at the top of it, in which she gets, say,  10 ledger dollars out of thin air.
 This is called the block reward, and it’s an exception to our usual rules about whether  or not to accept transactions.  It doesn’t come from anyone, so it doesn’t have to be signed.  It also means that the total number of ledger dollars in our economy increases with each  new block.  Creating blocks is often called mining, since it requires doing a lot of work and it introduces  new bits of currency into the economy.
 But when you hear or read about miners, keep in mind that what they’re really doing is  listening for transactions, creating blocks, broadcasting those blocks, and getting rewarded  with new money for doing so.  From the miner’s perspective, each block is kind of like a miniature lottery, where everyone  is guessing numbers as fast as they can until one lucky individual finds a special number  that makes the hash of the block start with many zeros, and they get the reward.
 For anyone else who just wants to use this system to make payments, instead of listening  for transactions, they all start listening just for blocks being broadcast by miners, and updating their own personal copies of the  blockchain.  Now the key addition to our protocol is that if you hear two distinct blockchains with  conflicting transaction histories, you defer to the longest one, the one with the most  work put into it.
 If there’s a tie, just wait until you hear an additional block that makes one of them longer.  So even though there’s no central authority, and everyone is maintaining their own copy of the blockchain,  if everyone agrees to give preference to whichever blockchain has the most work put into it,  we have a way to arrive at decentralized consensus.
 To see why this makes for a trustworthy system, and to understand at what point you should  trust that a payment is legit, it’s actually really helpful to walk through exactly what  it would take to fool someone using this system.  Maybe Alice is trying to fool Bob with a fraudulent block.  Namely, she tries to send him one that includes her paying him 100 ledger dollars, but without  broadcasting that block to the rest of the network.
 That way everyone else still  thinks that she has those hundred ledger dollars. To do this she would have to  find a valid proof of work before all of the other miners, each working on their  own block. And that could definitely happen. Maybe Alice just happens to win  this miniature lottery before everyone else.  But Bob is still going to be hearing the broadcasts made by other miners.
 So to keep him believing this fraudulent block, Alice would have to do all of the work herself  to keep adding blocks on this special fork in Bob’s blockchain that’s different from  what he’s hearing from the rest of the miners.  Remember, as per the protocol, Bob always trusts the longest chain that he knows about.
 Alice might be able to keep this up for a few blocks,  if just by chance she happens to find blocks more quickly  than the rest of the miners on the network all combined.  But unless she has close to 50% of the computing resources among all of the miners,  the probability becomes overwhelming that the blockchain that all of the computing resources among all of the miners, the probability becomes  overwhelming that the blockchain that all of the other miners are working on grows faster than the single
 fraudulent blockchain that Alice is feeding to Bob.  So after enough time, Bob’s just going to reject what he’s hearing from Alice in favor of the longer chain that everyone else is working on.  Notice that means that you shouldn’t necessarily trust a new block that you hear immediately.  Instead, you should wait for several new blocks to be added on top of it.
 If you still haven’t heard of any longer blockchains, you can trust that this block  is part of the same chain that everyone else is using.  And with that, we’ve hit all the main ideas.  This distributed ledger system based on a proof of work is more or less how the Bitcoin  protocol works, and how many other cryptocurrencies work.
 There’s just a few details to clear up.  Earlier I said that the proof of work might be to find a special number so that the hash  of the block starts with 60 zeros.  The way the actual Bitcoin protocol works is to  periodically change that number of zeros so that it should take on average 10 minutes to find a new  block.
 So as there are more and more miners added to the network, the challenge actually gets harder  and harder in such a way that this miniature lottery only has about one winner every 10 minutes.  Many newer cryptocurrencies actually have much shorter block times than that.  And all of the money in Bitcoin ultimately comes from some block reward.  In the beginning, these rewards were 50 Bitcoin per block.
 There’s actually a great website you can go to called Block Explorer  that makes it easy to look through the Bitcoin blockchain.  And if you look at the very first few blocks on the chain,  they contain no transactions other than that 50 Bitcoin reward to the miner.  But every 210,000 blocks, which is about every 4 years, that reward gets cut in half.
 Right now, the reward is 12.5 Bitcoin per block.  Because this reward decreases geometrically over time, it means there will never be more  than 21 million bitcoin in existence.  However, this doesn’t mean miners will stop earning money.  In addition to the block reward, miners can also pick up transaction fees.
 The way this works is that whenever you make a payment, you can purely optionally include  a little transaction fee with it that will go to the miner of whichever block includes that payment.  The reason you might do that is to incentivize miners to actually include the transaction  that you broadcast into the next block.
 You see, in Bitcoin, each block is limited to about 2400 transactions, which many critics  argue is unnecessarily restrictive.  For comparison, Visa processes an average of about 1700 transactions per second, and  they’re capable of handling more than 24000 per second.  This comparatively slow processing on Bitcoin makes for higher transaction fees, since that’s  what determines which transactions miners choose to include in a new block.
 All of this is far from a comprehensive  coverage of cryptocurrencies. There are still many nuances and alternate design  choices that I haven’t even touched, but my hope is that this can provide a  stable WaitButWhy style tree trunk of understanding for anyone looking to add  a few more branches with further reading.  Like I said at the start, one of the motives behind this is that a lot of money has started  flowing towards cryptocurrencies, and even though I don’t want to make any claims about  whether that’s a good or bad investment, I really do think that it’s healthy for people getting into the game to at least know the fundamentals of the technology.