Technical Category - Page 2

Bitcoin Gold replay protection by @Gal
We'd like to clear up a few misconceptions for those in doubt about what, exactly, the Bitcoing Gold replay protection (or lack thereof) really means. There is no Bitcoin Gold ...
Estimating Cardano ADA Staking Rewards by Gal Crypto
July 2020 Update Cardano has finally released the Shelley mainnet. From this point forward, staking rewards will no longer be estimated. Once epoch 210 is concluded, we'll have...
ELI5: What is BetterHash? by @Gal
BetterHash is a cryptocurrency mining method developed by Bitcoin Core developer Matt Corallo. The main idea behind BetterHash is to improve decentralization of Bitcoin mining ...
What is Turing completeness and how does it relate to cryptocurrencies? by @Gal
Turing-completeness refers to a characteristic of computing platforms where a computer that is deemed Turing-complete can execute all programs that a Turing Machine would be able ...
ELI5 Zero Knowledge (ZKP) cryptocurrency proofs? by @Gal
In cryptographic theory, a zero knowledge proof is a method by which you can convince someone, who does not necessarily trust you, that you possess a piece of knowledge (proof) wi...
ELI5 : What is a Directed Acyclic Graph (DAG)? by @Gal
A Directed Acyclic Graph, or DAG, is a graph where no "loops" exist. You can only traverse a DAG in the forward direction, even if you take different paths in the graph. Ess...
What is “formal verification” of cryptocurrency software? by @Gal
You may have heard that Cardano ADA is aiming for formal verification of its core software. What does it mean for software programs to be formally verified? Why is it important...
Understand the Double Spending problem by @Gal
As the name implies, the double spending problem consists in executing a transaction twice while subtracting only once from your balance. This, of course, represents a failed fina...
ELI5 PoW – What are Proof of Work algorithms? by @Gal
Proof of Work (PoW) is a cryptographically secure consensus mechanism which guarantees that network participants who do not necessarily know each other are able to prove that they...
The CryptoNight and CryptoNight Light PoW Algorithms by @Gal
CryptoNight is a Proof-of-Work algorithm which aims to be CPU-mining friendly. CryptoNight Lite A lighter version of CryptoNight which uses memory cache pages half the size ...