Lecture 1 - Intro to Crypto and Cryptocurrencies
Вставка
- Опубліковано 23 лип 2024
- First lecture of the Bitcoin and cryptocurrency technologies online course.
For the accompanying textbook, including the free draft version, see: bitcoinbook.cs.princeton.edu/
In this lecture (click the time to jump to the section):
* Cryptographic hash functions 1:51
* Hash pointers and data structures 20:28
* Digital signatures 29:25
* Public keys as identities 39:04
* A simple cryptocurrency 44:39
Fantastic ! This really exceeded my expectations. I'm very glad I signed up for this and I am really looking forward to future lectures. Thanks !
Never knew trade could be so challenging! Kept running back to these UA-cam videos to learn more about this your video is indeed helpful. Thanks
.Sadly these are one of the changes in trade profit is not always assured..
@Brandon Hussain .Not everyone has the patience and persistence to grow account. Some may end up blowing up their account.
@George Potter .Demo account are risk free
Trade has left me no choice but to keep investing because it makes so much profit for me.
@@harrychapman3172 .I have been during trade offshore and still in yet to earn my first $100, what strategy do you use please.
Excellent. GREAT series. So well presented. Much appreciated. Thank you.
Awesome. builds from ground up and provides great understanding. Thank you.
Fantastic! I really enjoyed the whole lecture. It was very concise, clear and engaging.
0:00 intro
1:47 cryptographic hash functions
20:28 hash pointers and data structures
29:23 digital signatures
39:03 public keys as identities
44:32 a simple cryptocurrency
Thank you so much for this enlightening video it has helped me greatly. Many a time new comers are indecisive on how to start when it comes to their personal investment growth. But great investors can provide proper guidance...
True< this is a scary time for new investors but the best thing you can do is not to make decisions based on emotions. This could actually be a good time to buy more of your high conviction stocks or crypto on a discount. Wealth is created during bear markets, not bull markets. If your portfolio is really affecting your mental health then delete the app and go for a walk. Let the market do its thing and have a long time horizon. I buy and just trade long term more than ever, I have made over 16` btc from day trading with Mark Maxwell in few weeks this is one of the best medium to backup your assets incase it goes bearish…
My growing love for crypto caused me to explore until I came across Mark Maxwell (although I'm trying to avoid sensationalism) he is by far the best. No hype for hype's sake, but great inspiration to trade crypto.
Wow, you know Maxwell too, he has been helping alot of [people recover their losses from the crash, he's all we need right now. Trading has so much advantages as it is volatile, this is a perfect time to partake in it folks.
I invested with Max also, he understands every beginners intention and fix you to a trading plan that matches your capital.
Really amazing lecture.
Thanks for decentralising the knowledge.
a very well delivered and thorough introduction to the foundations of cyber-currencies. Great work!
Hello
thank you for the course, you're a great teacher and communicator!
Hello sir
Your speaking is very clear. Great lecture!
Did you ever buy bitcoin?
Excellent! thank you very much for sharing your knowledge
whoa super detailed may need to see this a few times
appreciable teaching. done a really great job @profs
Very beautifully explained, thanks!
thank you. Excellent start!
Thank you,
Sir, for the accessible lecture.
Excellent lecture covering the key concepts very concisely
Great intro to bitcoin. Thank you for posting this.
Great! So nice to see some real heavy hitting in this space! Thanks.
$1 *****
I miss the time we could ChangeTip, but I'm sure it will be back again stronger and better.
The average fees for a Bitcoin transaction are over $1 right now because of the inane blocksize debate. It is becoming useless for microtransactions.
Let me hug some coins (っ◔◡◔)っ!
19HKMEVXViRMdMj318x5VqTPzJ1ipEBLSK
ua-cam.com/video/fOMVZXLjKYo/v-deo.html
CRI did
Good stuff, much appreciated!
Amazing Lecture prof!
This was a Master Class! Thanks, From Eric Croom Jr,
These are all entirely new concepts for me. It's difficult to grasp and make notes together at this pace!
Thank you so much for doing these.
Great Lecture!
Great lecture!
Love it!!!! nice explanations
Thanks for sharing!
Excellent lecture. Very very good stuff
For cryptocurrency mining and how to make good wages on your invested funds contact me (isaacken70@gmail.com ) and I'll show you how i made over $500k in 3 months and the secrets behind it.
great lecture very well explained thanks.....
34:43 Where exactly you draw the line that separates plausible numbers and non-plausible numbers?
Qestions:
14:00: "...returning as commitment: is it "hash(key) + Message" *or* "hash(key+message)"?
14:15: When the key+message was given to the verifier so he could hash it for comparsion?
Great lecture!
Ah, this is like being back in Uni. Reminds me of my Computer Engineering and Electronics days.
THANK SIR, GOD BLESS AMERICA AND GREECE-ROMAN.
Slide: Commitment API. The line commit(msg) := (H(key|msg), H(key)) probably needs to read commit(msg) := (H(key|msg), key).
Yep, that's a mistake.
Good catch.
can you just briefly explain the difference?
13:45 So commit(msg) returns (com, key), where in reality this is equal to (H(key|msg), H(key)). Does this mean that the key which is to be published is actually equal to H(key)? In that case, how could it possibly be that the verification method which uses the published key(aka H(key)) could ever succeed, since it will always be doing: verify(com, H(key), msg):=H(H(key)|msg)==com bearing in mind that com=H(key|msg).
@24min: re tampering: i undertand that tampering is not possible in th middle of the block chain but what if the tampering occurs at the very end of the chain (at the most recent "link").
would that not be possible?
Nice ! Thanks
Can anyone answer what software I would use to calculate these commands? Com, key, msg, etc? How can I implement what I am learning in this video?
BRILLIANT
Thank you for providing the world with this infinitely valuable and accessible resource! 100000 satoshis *****
at 23:10 are the blocks going from left to right or right to left ?
I have a thought about the identity in Privacy. When analyzing the behavior of an address to find out who that is, isn't it a good idea to use Machine Learning to run through the layers and to update the output over time? The activity of the address can be the input layer, the probability that that is Joe would be the output layer.
This is actually a bitcoin course that I can understand. I'm waiting for episode 2, when will it be uploaded?
Arrow pointers under heading of 'Blockchain' and 'Detecting Tempering' should point to previous/parent block H( ). It correctly mentions previous H( ) though arrow pointer shows next H( ). Both Bitcoin and Ethereum Block Header stores parent H( ) which is previous H( ). Please correct this.
If last block data is tempered, how will it hamper the previous blocks?
At 7 mins 24 seconds, I believe speaker meant: "If hash values are same, then X and Y have to be equal".
Agreed. Adding timestamp link: 7:18
22:27 why we are not calling it next pointer instead of prev??
Is signature the way to prove , that someone is holding certain private key? Other words do we have another API for signature saying: isTheSameSK(pk,sig1,sig2)? This is like asking: is sig1 and sig2 made by the same person ? Or i can send a msg2 to this person and ask to sign it and later verify he also signed msg1?
16:08 "Let me just go through it "Bit-by-bit"" lol
Time for a 4th rewatch?
Yes.
Are these videos available somewhere for legal download or are they only on youTube?
I heard that educational token(LEDU coin) is currently paying project creators for their work, any thought on it
Slide Commitment API: What's the purpose of the key? The only thing you publish at beginning is commitment. Message is kept secret until opening envelope. So you can easily do only com=h(msg) and publish com. Nobody can reveal msg from com. Message originator can't forge original message because he can't find msg' with the same hash h(msg)=h(msg'). Everything works without the key as well. All you need is clear hash.
I lost it on the meteor HAHAHAHAHAHAHAHA
A good blog to begin with cryptos and blockchain
i-am-in-crypto.blogspot.com/2020/07/coming-soon.html
I would like feedback on this concept
Imagine a hash being generated by number string occurring only once in space+time would that not eliminate any "collisions?"
Where can we get the lecture PPT?
Are these lectures the same ones being used for Coursera's Cryptocurrency course? I'd just sign up for the course but I hear the assignments on this specific course are pretty frustrating.
More Qeustions:
@23:48
- How is the data from in a tamper-evident log stored? In a key value store? Since you are not using pointers to memory you need an auxilary store right?
- Does the prev H(arrow) include the prev pointer AND the data or just the data? It would make more sense to include both right?
anyone knows: are all coins are immutable? thanks!
Does anyone have answers to the quiz of this course ?
What's the difference between the commitment and signature API's?
Ho boy that's how you know they're real academics ... 3 minutes in and it's an college senior-level algorithms lecture
Sir will u please post the week 1 assingment answer file
What is the point of Powerpoint if you just put the words you are speaking into it?
Thank you
This is where 99% of the people in this world don't understand how bitcoin actually works. They only know the bitcoin price news....
789overdrive And it's those people that will ruin bitcoin's potential future and just turn it into another financial bubble.
HEllo, would it be possible to have the slides of this course?
Hello Sir
very good
Can I get slides of lecture , please?
Ummmm, cryptographic vegetables, tasty :D
perfect
"relies on hairy math" best quote
What's the song used in these videos?
Yes whats the music! Great, great lectures. Thanks!
what exactly is the commitment API ? is this kind of api an application programming interface ?
I can recommend Mr William charle he is a good broker and also expert in crypto currency he can help you get More informations and knowledge about Bitcoin
He's available on what's app
*+1 8 1 8 7 2 2 9 1 4 5*
Please, I want solution of exercises to chapter 1
Typing out my questions as I make my way through the video... I'll probably be posting multiple times...
- When discussing the commitment API around the @14:28 mark, why do hash the 256 bit key? H(key)
- Is it because we do "H(key | msg)" and theres some sort of communitive property?
- Is "binding" essentially the same as saying the hash function is collision-free (impossible to find collisions)
at 7:16 he says "that if we know X and Y have the same hash, then it's safe to assume that X and Y are different"
Did he mean to say that they are the same?
The formula above shows "If we know H(x)=H(y), it's safe to assume that x=y"
yeah he meant that they are the same.
yes H(x)=H(y) it is safe to assume x=y but it is rare situations where H(x)=H(Y) where x!=y it means it is difficult to find where Hash values are same with different X and Y. I think this is the concept he explained. If I make any mistake please correct me .
I want to learn it
He looks like Tim Cook.
On a bad day
Why complaints? this is "intro" yes
Great work .Would like to request Blockchain sync that covers and the technical background for Peer to peer network. Covering Topics like
1. Bitcoin Peer Discovery 2. Inital Block Download 3. HeaderFirst Block Downloads. 4. Orphan Blocks and 5. Alerts Mis behvaing nodes. These are all topics that have been added to bitcoin documentation on bitcoin.org/en/developer-guide#orphan-blocks and are closely related to Stanford lecture for 4 Gen Peer-to-Peer Technology.
Tammm
"Earth will be destroyed by giant meteor in next 2 seconds which... did not happen" :D great lecture
Surprised Disney has not requested a take-down of this video.
A course for gentlemen
l
2:47
In the past several years, the use and prevalence of virtual currency have increased exponentially. The proliferation of digital assets has changed the way goods and services are exchanged and has allowed for faster and cheaper transactions. But with this new technology comes the increased risk of fraudulent activity - especially tax fraud. Recently, the Internal Revenue Service (“IRS”) has made it abundantly clear through guidance, amendments to tax forms, and even warning letters to Americans suspected of tax fraud, that it is getting very serious about virtual currency tax compliance.
The IRS and the Department of Justice (the “DOJ”) appear to be poised to commence a flurry of enforcement actions against virtual currency tax fraud offenders. Likely to be entangled in these enforcement actions are virtual currency institutions and companies that regulators suspect facilitated their customers’ tax evasion. It is thus imperative for all entities in the virtual currency industry to ensure their compliance programs are equipped to detect and prevent the facilitation of virtual currency tax fraud.
34:31
How rich would Satoshi be,if he mined 90% of the Bitcoin supply?
0:51
So... invest in GoofyCoin?
anyone else got rich from the time this came out? :D
36:28
Illustrations are too abstract and lack practical examples or meaningful analogies. Stopped at 27:30.
vegetables are great...
He looks like Tim Cook
I had to turn on the subtitles concat - a - what? concatenate... shoulda paid attention in math...