2Yrยท
Market Opinion for Crypto
๐Ÿคทโ€โ™‚๐Ÿคทโ€โ™€๏ธ Neutral

๐Š๐ซ๐ฒ๐ฉ๐ญ๐จ๐ฐรค๐ก๐ซ๐ฎ๐ง๐ ๐ž๐ง ๐Ÿรผ๐ซ ๐รถ๐ซ๐ฌ๐ž๐ง๐ฃรผ๐ง๐ ๐ž๐ซ / ๐„๐ข๐ง๐ฌ๐ญ๐ž๐ข๐ ๐ž๐ซ (Part 2 - Safety)


You invest in ETF, stocks, real estate, gold, savings or similar, recently heard about these "cryptocurrencies" and now want to join the cool kids discussion? Then please read on. This series of articles reveals the basics of the crypto world, touches on a variety of topics and remains superficial at beginner level - the perfect basis to delve deeper into individual areas on your own or to shine at the regulars' table with dangerous half-knowledge.


Part 1 was about what cryptocurrencies actually are and what added value they can generate. You can find part 1 here: https://app.getquin.com/activity/buTJFYxcSD

In this second part, we'll touch on a few technical details and shed some light on the topic of security. Please forgive me for simplifying some of the facts (and thus making them more suitable for the target group).


๐—œ๐—บ ๐—ฒ๐—ฟ๐˜€๐˜๐—ฒ๐—ป ๐—ง๐—ฒ๐—ถ๐—น ๐—ต๐—ฎ๐˜€๐˜ ๐—ฑ๐˜‚ ๐˜ƒ๐—ผ๐—ป ๐—ž๐—ฟ๐˜†๐—ฝ๐˜๐—ผ๐˜„รค๐—ต๐—ฟ๐˜‚๐—ป๐—ด๐—ฒ๐—ป, ๐— รผ๐—ป๐˜‡๐—ฒ๐—ป ๐˜‚๐—ป๐—ฑ ๐—ฒ๐—ถ๐—ป๐—ฒ๐—บ ๐—ก๐—ฒ๐˜๐˜‡๐˜„๐—ฒ๐—ฟ๐—ธ ๐—ด๐—ฒ๐˜€๐—ฝ๐—ฟ๐—ผ๐—ฐ๐—ต๐—ฒ๐—ป. ๐—Ÿ๐—ฎ๐˜€๐˜€ ๐˜‚๐—ป๐˜€ ๐—ฑ๐—ฎ๐˜€ ๐—ฑ๐—ผ๐—ฐ๐—ต ๐—ฏ๐—ถ๐˜๐˜๐—ฒ ๐—บ๐—ฎ๐—น ๐—ด๐—ฒ๐—ฟ๐—ฎ๐—ฑ๐—ฒ๐˜‡๐—ถ๐—ฒ๐—ต๐—ฒ๐—ป. ๐—”๐˜‚๐˜€ ๐˜„๐—ฎ๐˜€ ๐—ฏ๐—ฒ๐˜€๐˜๐—ฒ๐—ต๐˜ ๐˜€๐—ผ ๐—ฒ๐—ถ๐—ป๐—ฒ ๐—ž๐—ฟ๐˜†๐—ฝ๐˜๐—ผ๐˜„รค๐—ต๐—ฟ๐˜‚๐—ป๐—ด ๐—ฑ๐—ฒ๐—ป๐—ป ๐—ด๐—ฒ๐—ป๐—ฎ๐˜‚?

A cryptocurrency is mainly composed of four components:

1) The crypto network. The network is the set of nodes (distributed computers) that communicate digitally with each other to conduct transactions and create new coins, for example. The crypto network is the executing component, so to speak. In many crypto networks, anyone can run a node. One example is the Ethereum network. [1]

2) The actual currency, a coin [2] or token [3] depending on the context. These are the digital coins that you can send from A to B. For example, the currency of the Ethereum network is called Ether (ETH). I.e., you can send Ether from A to B on the Ethereum network, just like you can send Euros from A to B on the banking network. [4]

3) The storage, in most cases a blockchain. A blockchain does not store the account balance for all addresses in the crypto network, but all transactions ever made in a crypto network. I.e. you can see in a blockchain which address has ever sent how many coins to which other address. If, for example, address A first received 10 coins and then another 5 coins before 7 coins were sent, this implicitly results in an account balance of address A of 10+5-7=8 coins. When a new transaction is made on a crypto network, it is permanently written to memory/blockchain by the nodes. [5]

4) The code / software. The code specifies how the network works. For example, when a transaction is valid or invalid, how coins get from A to B, how and when new transactions are written to the blockchain, ... The code therefore determines how the nodes have to do their work.


๐—ช๐—ฒ๐—ป๐—ป ๐—ท๐—ฒ๐—ฑ๐—ฒ๐—ฟ ๐—ฒ๐—ถ๐—ป๐—ฒ๐—ป ๐—ก๐—ผ๐—ฑ๐—ฒ ๐—ฏ๐—ฒ๐˜๐—ฟ๐—ฒ๐—ถ๐—ฏ๐—ฒ๐—ป ๐—ธ๐—ฎ๐—ป๐—ป ๐˜‚๐—ป๐—ฑ ๐—ป๐—ถ๐—ฒ๐—บ๐—ฎ๐—ป๐—ฑ ๐—ฑ๐—ถ๐—ฒ ๐—ž๐—ผ๐—ป๐˜๐—ฟ๐—ผ๐—น๐—น๐—ฒ ๐—ต๐—ฎ๐˜, ๐˜„๐—ถ๐—ฒ ๐—ธ๐—ฎ๐—ป๐—ป ๐—ถ๐—ฐ๐—ต ๐—ฑ๐—ฒ๐—บ ๐—ก๐—ฒ๐˜๐˜‡๐˜„๐—ฒ๐—ฟ๐—ธ ๐—ฑ๐—ฎ๐—ป๐—ป ๐˜ƒ๐—ฒ๐—ฟ๐˜๐—ฟ๐—ฎ๐˜‚๐—ฒ๐—ป? ๐—ช๐—ถ๐—ฒ ๐˜„๐—ถ๐—ฟ๐—ฑ ๐—ฏ๐˜€๐—ฝ๐˜„. ๐—•๐—ฒ๐˜๐—ฟ๐˜‚๐—ด ๐˜ƒ๐—ฒ๐—ฟ๐—ต๐—ถ๐—ป๐—ฑ๐—ฒ๐—ฟ๐˜?

Cryptocurrencies are designed in such a way that their network and blockchain can still be trusted even if a part (< 50%) of the network behaves in a malicious way. Malicious behavior occurs, for example, when a participant wants to send the coins in his wallet to two addresses at the same time, or a node tries to manipulate the transaction history of the blockchain.


To prevent such scenarios, cryptocurrencies implement some security mechanisms. For example, the blockchain is not managed by a single node, but is stored in parallel on many nodes. If a node manipulates its locally stored blockchain, the network is not affected because all other nodes still store the original blockchain.


In addition, transactions are validated by the network. The task of the nodes is to check whether it is a valid transaction. For example, whether the sender actually has the number of coins that he wants to send. Again, the nodes agree together on the next valid transactions to be written to the blockchain. Individual malicious nodes do not stand a chance here as long as they are in the minority. [6], [7], [8]


To protect your own wallet from unauthorized access, there is a private key in addition to your public address. Only those in possession of the private key can send coins from the associated wallet to another address. It is therefore extremely important that no one gets hold of your wallet's private key and that you do not lose it. Lost private keys cannot be recovered. [9]


๐—ฆ๐—ฐ๐—ตรถ๐—ป ๐˜‚๐—ป๐—ฑ ๐—ด๐˜‚๐˜, ๐—ฎ๐—ฏ๐—ฒ๐—ฟ ๐˜„๐—ฒ๐—น๐—ฐ๐—ต๐—ฒ๐—ป ๐—”๐—ป๐—ฟ๐—ฒ๐—ถ๐˜‡ ๐—ต๐—ฎ๐—ฏ๐—ฒ๐—ป ๐—ก๐—ผ๐—ฑ๐—ฒ-๐—•๐—ฒ๐˜๐—ฟ๐—ฒ๐—ถ๐—ฏ๐—ฒ๐—ฟ ๐˜‚๐—บ ๐—ฒ๐—ต๐—ฟ๐—น๐—ถ๐—ฐ๐—ต ๐˜‡๐˜‚ ๐˜€๐—ฒ๐—ถ๐—ป?

In principle, two aspects play a role. First, a cryptocurrency that is not trusted is worthless. If I alone have control over the majority of a crypto network and manipulate the associated cryptocurrency, users will notice. Usage will decline and the price will fall. I am cutting my own flesh, so to speak - unless my goal is not economic gain, but the destruction of the cryptocurrency.


In addition, node operators will receive a reward for honest behavior in the form of coins of the respective cryptocurrency. These coins are either newly created and / or sourced from the transaction costs incurred when transferring from address A to address B. [10]


๐—œ๐˜€๐˜ ๐—ฒ๐—ถ๐—ป ๐—”๐—ป๐—ด๐—ฟ๐—ถ๐—ณ๐—ณ ๐—ฎ๐˜‚๐—ณ ๐—ฒ๐—ถ๐—ป๐—ฒ ๐—ž๐—ฟ๐˜†๐—ฝ๐˜๐—ผ๐˜„รค๐—ต๐—ฟ๐˜‚๐—ป๐—ด ๐—ฑ๐—ฒ๐—ป๐—ป๐—ผ๐—ฐ๐—ต ๐—บรถ๐—ด๐—น๐—ถ๐—ฐ๐—ต? ๐—›๐—ฎ๐˜€๐˜ ๐—ฑ๐˜‚ ๐—ฒ๐—ถ๐—ป ๐—ฝ๐—ฎ๐—ฎ๐—ฟ ๐—•๐—ฒ๐—ถ๐˜€๐—ฝ๐—ถ๐—ฒ๐—น๐—ฒ ๐—ณรผ๐—ฟ ๐˜€๐—ผ๐—น๐—ฐ๐—ต๐—ฒ ๐—”๐—ป๐—ด๐—ฟ๐—ถ๐—ณ๐—ณ๐—ฒ?

Crypto networks are based on software. No complex software is bug-free. If an attacker were to discover and exploit a serious flaw in a crypto network, this could make it possible for them to steal or generate coins. This not only affects the cryptocurrency itself, but also software that uses a cryptocurrency. For example, in 2016, attackers successfully exploited a vulnerability in a DAO (decentralized organization) on the Ethereum blockchain and stole $60 million worth of Ether. As a result, the Ethereum Blockchain was split into Ethereum (ETH) and Ethereum Classic (ETC) (a so-called hard fork). While Ethereum reset its blockchain to the state it was in before the attack, the Ethereum Classic blockchain remained unchanged. [11]


It is entirely conceivable that a participant could gain control of more than 50% of the network and thus manipulate it. If this situation is exploited, it is called a 51% attack. In fact, in 2014, a so-called mining pool [12] controlled more than 50% of the Bitcoin network for a few hours [13]. However, this situation was not exploited. The mining pool subsequently voluntarily committed to never control more than 50% of the network again [14]. Ethereum Classic was the victim of several 51% attacks in 2020 [15] while two Bitcoin Cash mining pools (not to be confused with Bitcoin!) conducted a "benign" 51% attack in 2019 to delete two "ownerless" coins [16]. To what extent any form of 51% attack should be considered "benign" remains to be seen.


Another attack vector arises when coins are managed by central institutions, e.g. crypto exchanges. Crypto exchanges have a large amount of coins and are correspondingly lucrative targets for hackers. In 2014, the then largest crypto exchange, Mt. Gox, had 840,000 bitcoin stolen [17]. But even nowadays, crypto exchanges are still successfully attacked on a regular basis. For example, in 2022, approximately 33 million USD were stolen from crypto.com stolen [18].


In addition, the private key that secures a wallet can also be attacked. For example, a wallet's private key can be stored in a location that a hacker can gain access to. Of course, a wallet owner can also be forced to transfer his coins or reveal his private key under the threat or execution of force [19]. Unlike in the banking network, there is no way to reverse such transactions. Since the private keys must be generated by software, there are also opportunities for attack. On pp. https://iotaseed.io/ it was possible to generate private keys for the cryptocurrency Iota in 2017 and 2018. Stupidly, the operators of the site stored the private keys themselves and used them to steal 10 million euros in Iota [20].


๐——๐—ฎ๐˜€ ๐—ธ๐—น๐—ถ๐—ป๐—ด๐˜ ๐—ด๐—ฟ๐—ฎ๐˜‚๐—ฒ๐—ป๐˜ƒ๐—ผ๐—น๐—น! ๐—˜๐˜€ ๐—ถ๐˜€๐˜ ๐—ฑ๐—ผ๐—ฐ๐—ต ๐—ป๐˜‚๐—ฟ ๐—ฒ๐—ถ๐—ป๐—ฒ ๐—™๐—ฟ๐—ฎ๐—ด๐—ฒ ๐—ฑ๐—ฒ๐—ฟ ๐—ญ๐—ฒ๐—ถ๐˜, ๐—ฏ๐—ถ๐˜€ ๐—ฎ๐—น๐—น๐—ฒ ๐—ž๐—ฟ๐˜†๐—ฝ๐˜๐—ผ๐˜„รค๐—ต๐—ฟ๐˜‚๐—ป๐—ด๐—ฒ๐—ป ๐—ด๐—ฒ๐—ต๐—ฎ๐—ฐ๐—ธ๐˜ ๐˜„๐—ฒ๐—ฟ๐—ฑ๐—ฒ๐—ป!

Crypto is a relatively young technology and like any new technology, there are teething problems that are gradually being ironed out. If you want to minimize the risk, you can bet on established cryptocurrencies like Bitcoin and Ethereum. Both currencies have been around for a very long time. Accordingly, the probability that there are still serious and undiscovered vulnerabilities in the code is relatively low. In addition, changes to the code are meticulously reviewed by a large community. Younger cryptocurrencies with a smaller community, faster development cycles and more disruptive technology are potentially more vulnerable here.


To prevent the risk of successful network attacks, you should choose cryptocurrencies with large, distributed, and decentralized networks whenever possible. No one actor should control large parts of the crypto network. The size and distribution of the crypto network should keep that unlikely for the future. Unfortunately, decentralization is not that easy to measure. [21] proposes two approaches to this. However, decentrality is not only important in the network itself. For example, a risk also arises if the code of a cryptocurrency is mainly developed by one person or one institution. Who checks that a backdoor is not built in here after all?


To reduce the likelihood of losing a large amount of coins, you should not let these coins be managed by central institutions like a crypto exchange. Instead, it is a good idea to use a hardware wallet for safekeeping at home [22].


๐— ๐—ฒ๐—ถ๐—ป ๐—ž๐—ผ๐—ฝ๐—ณ ๐—พ๐˜‚๐—ฎ๐—น๐—บ๐˜. ๐—ฆ๐—ถ๐—ป๐—ฑ ๐—ž๐—ฟ๐˜†๐—ฝ๐˜๐—ผ๐˜„รค๐—ต๐—ฟ๐˜‚๐—ป๐—ด๐—ฒ๐—ป ๐—ท๐—ฒ๐˜๐˜‡๐˜ ๐˜€๐—ถ๐—ฐ๐—ต๐—ฒ๐—ฟ ๐˜‚๐—ป๐—ฑ ๐—ฑ๐—ฒ๐˜‡๐—ฒ๐—ป๐˜๐—ฟ๐—ฎ๐—น ๐—ผ๐—ฑ๐—ฒ๐—ฟ ๐—ป๐—ถ๐—ฐ๐—ต๐˜?

It depends. Many smaller cryptocurrencies advertise better features (e.g., faster speed) than the top dogs. Often, however, one has to accept compromises in decentralization and security (keyword blockchain trilemma [23]). If the security of cryptocurrencies plays an important role for you, you should deal with this aspect of a cryptocurrency before you invest in it. Personally, I consider the decentralization and security of Bitcoin and Ethereum to be sufficient, and that of all other coins to be at least worth checking.


๐—ข๐—ธ๐—ฎ๐˜† ... ๐—ด๐—ฒ๐—ป๐˜‚๐—ด ๐—ง๐—ฒ๐—ฐ๐—ต๐—ป๐—ถ๐—ธ. ๐—œ๐—ฐ๐—ต ๐—ฏ๐—ถ๐—ป ๐—ฝ๐—ฟ๐—ถ๐—บรค๐—ฟ ๐—œ๐—ป๐˜ƒ๐—ฒ๐˜€๐˜๐—ผ๐—ฟ ๐˜‚๐—ป๐—ฑ ๐—บรถ๐—ฐ๐—ต๐˜๐—ฒ ๐—บ๐—ฒ๐—ถ๐—ป ๐—š๐—ฒ๐—น๐—ฑ ๐˜ƒ๐—ฒ๐—ฟ๐—บ๐—ฒ๐—ต๐—ฟ๐—ฒ๐—ป. ๐—ช๐—ถ๐—ฒ ๐—ด๐—ฒ๐—ต๐˜๐˜€ ๐˜„๐—ฒ๐—ถ๐˜๐—ฒ๐—ฟ?

I'm glad you brought that up! In the next part, we'll actually look at how to make money with cryptocurrencies. You can find the 3rd part here https://app.getquin.com/activity/ZgfENSuSRD



Sources and read more:


[1] https://academy.binance.com/en/glossary/node

[2] https://academy.binance.com/en/glossary/coin

[3] https://academy.binance.com/en/glossary/token

[4] https://ethereum.org/de/eth/

[5] https://academy.binance.com/en/glossary/blockchain

[6] https://www.bitpanda.com/academy/de/lektionen/wie-funktioniert-eine-blockchain

[7] https://www.bitpanda.com/academy/de/lektionen/was-ist-double-spending-und-warum-ist-es-ein-problem/

[8] https://academy.binance.com/en/articles/what-is-a-blockchain-consensus-algorithm

[9] https://www.coinbase.com/learn/crypto-basics/what-is-a-private-key

[10] https://academy.binance.com/en/glossary/block-reward

[11] https://www.gemini.com/cryptopedia/the-dao-hack-makerdao

[12] https://www.bitpanda.com/academy/de/lektionen/wofur-gibt-es-mining-pools-und-wie-funktionieren-sie/

[13] https://www.theguardian.com/technology/2014/jun/16/bitcoin-currency-destroyed-51-attack-ghash-io

[14] https://www.bitpanda.com/academy/de/lektionen/was-ist-ein-51-angriff-und-wie-wird-er-verhindert/

[15] https://www.coindesk.com/markets/2020/08/29/ethereum-classic-hit-by-third-51-attack-in-a-month/

[16] https://de.cointelegraph.com/news/two-miners-purportedly-execute-51-attack-on-bitcoin-cash-blockchain

[17] https://www.buybitcoinworldwide.com/mt-gox-hack/

[18] https://www.btc-echo.de/news/crypto-com-hack-mehr-geld-gestohlen-133356/

[19] https://www.watson.ch/digital/kryptow%C3%A4hrungen/139925245-raeuber-foltern-bitcoin-besitzer-wegen-passwort-und-erbeuten-millionen

[20] https://iotaseed.io/

[21] https://www.sciencedirect.com/science/article/pii/S2405959521000977

[22] https://www.btc-echo.de/ratgeber/bitcoin-hardware-wallet-vergleich/

[23] https://www.gemini.com/cryptopedia/blockchain-trilemma-decentralization-scalability-definition



#anfรคnger
#sicherheit
#learn
#esel
#crypto

attachment
26
26 Comments

profile image
Fridays 11 o'clock and the gold donkey knocks out such a board๐Ÿคฏ Thanks for the effort and all the info!๐Ÿ™๐Ÿป The Iota- Story I did not yet know
โ€ข
8
โ€ข
View all 2 further answers
profile image
So, but still quickly written the 2nd part before my vacation ready and rausgehauen. Part 3 lasts but then a good deal longer. The donkey goes skiing for now ๐Ÿ˜Ž
โ€ข
6
โ€ข
View all 4 further answers
profile image
@ccf. Laugh my head is now also smoking
โ€ข
4
โ€ข
View all 2 further answers
profile image
@ccf Good ass, have fun skiing.
โ€ข
4
โ€ข
Show answer
profile image
@ccf very readable ๐Ÿ’ช๐Ÿผ
โ€ข
4
โ€ข
profile image
I knew everything already, but I'm not smarter than you, so @ccf ๐Ÿš€๐Ÿš€๐Ÿš€
โ€ข
4
โ€ข
profile image
@ccf thank you for your work dear donkey ๐Ÿ™
โ€ข
3
โ€ข
profile image
๐Ÿ˜ Knowledge makes Ah! You can guess the ccf ๐Ÿš€
โ€ข
3
โ€ข
View all 2 further answers
profile image
Thank you for the post, looking forward to part 3!!!!
โ€ข
1
โ€ข
Deleted User
2Yr
Comment was deleted
Show answer
Join the conversation