Bill is a writer, geek, crypto-curious polyheurist, a dog's best friend and coffee addict. Information security expert, encryption software with interests in P2P networking, decentralized applications (dApps), smart contracts and crypto based payment solutions. Crypto Bill has published a total of 415 Posts
Latest Updates by Crypto Bill
ELI5: What is Tornado Cash?
Tornado Cash is a decentralized cryptocurrency tumbler. It is implemented as an Ethereum smart contract and can be used to mix cryptocurrency UTXO's, unlinking the on-chain relati...
Understand the Double Spending problem
As implied by the name, a double spending problem happens when a transaction is processed twice while your account balance is only subtracted once.
This, of course, can only h...
ELI5 How to mine Litecoin
Litecoin has consistently been one of the most popular cryptocurrencies since its inception in 2011.
It was initially forked from the main Bitcoin source code by a developer ca...
avax-python Network Message Pipeline
Here's a short overview of the avax-python Avalanche message pipeline.
We've followed the reference Go implementation as closely as possible, but the Python code is still in ve...
avax-python Implementation Notes
Here you'll find a few implementation notes about avax-python. This is mainly targeted at developers who wish to work on the Python source code.
Python <- Go
Avalanche AVAX : An obvious 20x is upon us [Avalanche Price Opinion]
Price prediction is the riskiest business out there – and this article may well be the riskiest thing I’ve ever written. But this seems like such an obvious one to me, I’m a bit surprised others haven’t put this out there before. Perhaps everyone’s just quietly filling the bags with Avalanche before it explodes? Time […]
ELI5 How AVAX validation works [Avalanche Protocol]
According to the Avalanche AVAX token distribution policy, almost 50% of all AVAX in existence will go towards validator rewards (see chart at the top). Since the Avalanche protocol burns all fees, the only source of inflation in the AVAX ecosystem is the validation reward. This presents a great opportunity for those who join the […]
Scrape AVAX network peers using avax-python
P2P networking is the single most important technical functionality in all cryptocurrency implementations. The decentralized nature of Bitcoin, AVAX, Ethereum and others requires peers to talk to each other 24×7 in order to find out about transactions, new blocks, vertices (for DAG-based cryptos like AVAX) and so on. Even if you had the world’s most […]
AVAX mainnet officially launched [Sept 22, 2020]
AVAX mainnet has launched with thunderous success! As we write this article, AVAX has gained over 620% (8 AM UTC) in the first 4 hours of trading at Binance. Volume stood at impressive U$ 72 million in just hours (> $100 million when we last updated this text 1 hour later). Despite some profit-taking during […]
Double spending is a condition where the same value can be spent twice, revealing a flaw in the payment processing system.
Irreversible transactions are a characteristic of digital payment systems which offer trustless decentralization. The irreversibility is necessary in order to guarantee that no transaction will be undone once committed by the network.
A process or system by which multiple parties are able to reach consensus. In the context of cryptocurrencies, it's the process which allows for everyone to agree on everyone else's money balance. E.g. Bitcoin employs Nakamoto consensus via PoW mining.
Proof of Stake
Proof of Stake is a consensus mechanism in which block verifiers prove their commitment to the network by staking their coins instead of by proving they performed some work (contrast with Proof of Work).
Staking is the process by which users delegate their Proof of Stake voting rights to a staking pool. The pool then verifies transactions on the users' behalf and, similarly to mining pools, share some of the profits back with the stakers.
Litecoin is a first generation cryptocurrency which was originally forked from the Bitcoin source code. It substituted Bitcoin's SHA256 hashing algorithm for Scrypt as an attempt to make ASIC mining impossible.