Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Transcript of Bitcoin Security
Expensive transfer fees
Fraud and scams Why Bitcoin? Anonymous Transfers Secure Transaction No Banks! Bitcoin Solutions Transfers happen directly between two users
User identities are concealed Every transaction is secured with private key
Peer to peer network verifies transactions No more exorbitant transfer fees
No central location storing your information
No minimum balance or prerequisites Bob generates a public and private key Bob and Alice exchange public keys Bob creates a message... Anyone in the network can decode the message using Bob's public key How does Bob send Bitcoins to Alice? Alice generates a public and private key From: <Bob's Public Key>
I am sending 20BTC to <Alice's Public Key> And signs it with his private key Then he sends it to the network Cost Function Economy As Blocks A function that is computationally expensive
Either costs time or energy History of the economy is encoded in blocks
The economy is advanced by "mining" github.com/bitcoin
bitcoin.org Attack! Forced Double Spending Cancer Nodes Wallet Theft What Is Bitcoin? Cryptographic Currency Storage, transmission, and generation of currency is mathematically and cryptographically secure Peer 2 Peer Financial network is maintained by clients
Transactions happen directly between users Old fashioned made new: steal a wallet An attacker tries to get their Bitcoins back A network user is configured to be hostile by Corey Alexander
and Ryan Wilson-Perkin