Skip to main content

Cryptocurrencies, what is it ?

Precious metal, exchange of goods have served as currency in the past, as human race advances and their knowledge of market, financial innovations surfaces. This time its about the Cryptographic currencies.
You might have heard about Block Chain, Bitcoin, Titcoin, Primecoin etc.. all of them are digital way of exchanging values. These frameworks outlines how participants can exchange values securely. Security of transaction is very important as system without faith will not even last for seconds. It has to be time tested and robust.
BTW Why we call it Cryptocurrencies ?
digital because we do not need it in physical form, Cryptocurrencies because this whole thing is bullet proofed by Cryptographic system. Which supports encryption/decryption, public/private keys, transformation, block and stream ciphers almost everything that can make even a Geek to Freak.
Is it Legal ?
The whole idea is to make the value exchange system decentralized. Crptocurrencies are not regulated by Central Banks(Regulatory authority for the country), from that angle its very interesting, Central banks responsibility is to centralized the control of Money supply in the market and act as a regulatory authority for the interest of various stakeholders. However Cryptocurrencies system has decentralized control. Even though the platform is distributed, it works. It is legal in many countries and many others have restricted it. Country have to make decision by keeping this thing in mind that they have to strike balance between Cryptographic currency and currency which is backed by central banks and government.
Stakeholders involved
Miners - Those who mines the block chains and receive intensive. There intensive decreases as the time passes. You need to have sophisticated hardware to act as miner in this crypto currencies network.
These currencies exist in the form of transaction, so there wont be single digital file on you computer, your money here exist on the basis of transactions that you made and these transactions exist in many systems.

Comments

Popular posts from this blog

Mobile Message Organizer

Got a basic requirement that i think every mobile should have, all the mail clients have this facility and i dont see any big difficulties on this other than the storage problem which is not a problem at all as we got GB of spaces in our memory cards. Well i am talking about the organizing the messages in Inbox , categorization of messages. Suppose i want to store all the messages from one of my friend say A in a folder called Personal, my existing mobile device Nokai E71 doesn't have this feature inbuilt (Ofcourse if you want you can make a folder and move the messages manually but here i am talking about the idea of automating this procedure). Only thing we need to do is , we have to store the rules in separate location , rules will be defined by the user and then device will follow these rules.There are no or very less software available which satisfy this requirement for mobile device.this is so simple but basic requirement as per the end user. I am going to make this one ...

Indian Education System : Let's shape it

Good advice is always certain to be ignored, but that's no reason not to give it.                                                                                        By Agatha Christie   This is one of the things that I wanted to write from long back and per my opinion it should be matter of at most important for any educated person of India. Today in this article I would like  focus on reminding people about the importance of education and educational departments  no matter those are government related or privately held. Whatever we are to...

Information Security Profile Questions

One of the friend asked this question in one of the popular forums, i thought I should keep copy of my answer in my blog as well. What sort of interview questions can be asked in information security profile? It depends on your role under information security profile, If you are ininformation security engineering role, questions will be more from tools andtechnologies and security audit and analysis methodologies. Questions may comefrom application security(OWASP TOP10), network security or computer forensics. In the corporate world no one expects an information security engineer to bemaster of all the security disciplines. Questions from different operating system techniques and popular web serversand information security architecture will be asked. Various operating system administrationdetails questions may surface. Vulnerability assessment is another topic whichcan be discussed. Security consultant as a profession itself is about being specialist notjournalist. So solid un...