Bitcoin runs on the PoW model. What happens with PoW is that cryptocurrency miners (a fancy term for people with really high-powered computers) compete against one another to solve complex mathematical equations that are a result of the encryption protecting transactions on a blockchain network. The first miner to solve these equations, and in the process validate a block of transactions, receives what's known as a "block reward." For bitcoin, a block reward is paid as a fraction of digital bitcoin.
In the Bitcoin network, the blockchain is not only shared and maintained by a public network of users — it is also agreed upon. When users join the network, their connected computer receives a copy of the blockchain that is updated whenever a new block of transactions is added. But what if, through human error or the efforts of a hacker, one user’s copy of the blockchain manipulated to be different from every other copy of the blockchain?
Every time a new transaction is initiated, a block is created with the transactions details and broadcast to all the nodes. Every block carries a timestamp, and a reference to the previous block in the chain, to help establish a sequence of events. Once the authenticity of the transaction is established, that block is linked to the previous block, which is linked to the previous block, creating a chain called blockchain. This chain of blocks is replicated across the entire network, and all cryptographically secured which makes it not only challenging, but almost impossible to hack. I say almost impossible because it would take some significant computational power to even attempt something like that. 
Today, in exchange for their personal data people can use social media platforms like Facebook for free. In future, users will have the ability to manage and sell the data their online activity generates. Because it can be easily distributed in small fractional amounts, Bitcoin — or something like it — will most likely be the currency that gets used for this type of transaction.
Third, and maybe most important, blockchain offers the potential to process transactions considerably faster. Whereas banks are often closed on the weekend, and operate during traditional hours, validation of transactions on a blockchain occur 24 hours a day, seven days a week. Some blockchain developers have suggested that their networks can validate transactions in a few seconds, or perhaps instantly. That would be a big improvement over the current wait time for cross-border payments. 
The other primary validation method is PoS. Rather than using a ton of electricity in a competition to solve equations, the PoS method awards the owners of virtual coins the opportunity to validate transactions in a deterministic fashion. In even plainer terms, the more coins you own of a virtual currency operating on the PoS model, the more likely you are to be chosen to validate blocks and add to the blockchain.
The blockchain is maintained by a peer-to-peer network. The network is a collection of nodes which are interconnected to one another. Nodes are individual computers which take in input and performs a function on them and gives an output. The blockchain uses a special kind of network called “peer-to-peer network” which partitions its entire workload between participants, who are all equally privileged, called “peers”. There is no longer one central server, now there are several distributed and decentralized peers.
The technological complexity is explained nicely to a degree which is necessary for the user to understand roughly the whole block chain as a system. Explaining a car and its advantages for humans would start also by describing wheels, motor and steering by hand. A car user does not need to know the details of a motor , electricity etc. He looks at how to move, security, velocity etc.
Well, your data is currently held in a centralized database (just like at Equifax). A centralized database is much easier to hack into because it uses one main server. In this case, all the hacker must do to steal the data, is hack the main server. In a blockchain, there is no main server — there is no central point for a hacker to attack! Here’s a great advantage of blockchain explained.

Even if a user receives a payment in Bitcoins to their public key, they will not be able to withdraw them with the private counterpart. A user’s public key is a shortened version of their private key, created through a complicated mathematical algorithm. However, due to the complexity of this equation, it is almost impossible to reverse the process and generate a private key from a public key. For this reason, blockchain technology is considered confidential.
While confidentiality on the blockchain network protects users from hacks and preserves privacy, it also allows for illegal trading and activity on the blockchain network. The most cited example of blockchain being used for illicit transactions is probably Silk Road, an online “dark web” marketplace operating from February 2011 until October 2013 when it was shut down by the FBI. The website allowed users to browse the website without being tracked and make illegal purchases in bitcoins. Current U.S. regulation prevents users of online exchanges, like those built on blockchain, from full anonymity. In the United States, online exchanges must obtain information about their customers when they open an account, verify the identity of each customer, and confirm that customers do not appear on any list of known or suspected terrorist organizations.
When one person pays another for goods using Bitcoin, computers on the Bitcoin network race to verify the transaction. In order to do so, users run a program on their computers and try to solve a complex mathematical problem, called a “hash.” When a computer solves the problem by “hashing” a block, its algorithmic work will have also verified the block’s transactions. The completed transaction is publicly recorded and stored as a block on the blockchain, at which point it becomes unalterable. In the case of Bitcoin, and most other blockchains, computers that successfully verify blocks are rewarded for their labor with cryptocurrency. (For a more detailed explanation of verification, see: What is Bitcoin Mining?)

However, the problem is for people residing in countries where there is no Bitcoin exchange and users have no option of transferring funds from their bank accounts to purchase Bitcoins. This makes it really hard for the users to hold Bitcoins now and with the prices surging at a rapid pace, it might be too late for many to get hold of Bitcoins. But that is where we come to rescue. How you may ask. We have come up with other options through which you can buy Bitcoins.
The price of bitcoins has gone through cycles of appreciation and depreciation referred to by some as bubbles and busts.[153] In 2011, the value of one bitcoin rapidly rose from about US$0.30 to US$32 before returning to US$2.[154] In the latter half of 2012 and during the 2012–13 Cypriot financial crisis, the bitcoin price began to rise,[155] reaching a high of US$266 on 10 April 2013, before crashing to around US$50.[156] On 29 November 2013, the cost of one bitcoin rose to a peak of US$1,242.[157] In 2014, the price fell sharply, and as of April remained depressed at little more than half 2013 prices. As of August 2014 it was under US$600.[158] During their time as bitcoin developers, Gavin Andresen[159] and Mike Hearn[160] warned that bubbles may occur.
Governmental Services: National identity management systems, taxes/internal revenue monitoring, voting, and land management are just a few examples in which a blockchain ecosystem could be leveraged by public authorities. The State of Illinois, for example, recently launched a birth registry and identification system trial.6 The African nation of Ghana has also enabled land registration based on blockchain technology.7

Blockchain does not store any of its information in a central location. Instead, the blockchain is copied and spread across a network of computers. Whenever a new block is added to the blockchain, every computer on the network updates its blockchain to reflect the change. By spreading that information across a network, rather than storing it in one central database, blockchain becomes more difficult to tamper with. If a copy of the blockchain fell into the hands of a hacker, only a single copy of information, rather than the entire network, would be compromised.
However, trading Bitcoin successfully is not a matter of luck or guesswork. Profitable traders spend a substantial amount of time learning how to trade and how to overcome the many risks involved with trading. Successful traders know they might lose money in the short term but they look at it as an investment in their education, since they are aiming for the long term.

At its core, a blockchain is a digital ledger shared among any number of stakeholders with an interest in keeping better track of information and transactions. Everybody gets a copy of the same distributed information. Nothing can be removed. And because a blockchain is a decentralized system, a consensus of stakeholders has to agree before something is added to the ledger.
Theoretically, it is possible for a hacker to take advantage of the majority rule in what is referred to as a 51% attack. Here’s how it would happen. Let’s say that there are 5 million computers on the Bitcoin network, a gross understatement for sure but an easy enough number to divide. In order to achieve a majority on the network, a hacker would need to control at least 2.5 million and one of those computers. In doing so, an attacker or group of attackers could interfere with the process of recording new transactions. They could send a transaction — and then reverse it, making it appear as though they still had the coin they just spent. This vulnerability, known as double-spending, is the digital equivalent of a perfect counterfeit and would enable users to spend their Bitcoins twice.
Bitcoin is a new currency that was created in 2009 by an unknown person using the alias Satoshi Nakamoto. Transactions are made with no middle men – meaning, no banks! Bitcoin can be used to book hotels on Expedia, shop for furniture on Overstock and buy Xbox games. But much of the hype is about getting rich by trading it. The price of bitcoin skyrocketed into the thousands in 2017.
The problem with the hardware wallet is the availability. It takes few weeks or sometimes months to get delivered as the demand is very high. If you are starting now, you can use a mobile wallet to store Bitcoin and later transfer the Bitcoins to a hardware wallet. If you need Bitcoins for daily use and need to store a smaller amount, you can use a mobile wallet such as MyCelium, Jaxx or Coinomi.
Many blockchain primers and infographics dive into the cryptography, trying to explain to lay people how "consensus algorithms", "hash functions" and digital signatures all work. In their enthusiasm, they can speed past the fundamental question of what blockchain was really designed to do. I've long been worried about a lack of critical thinking around blockchain and the activity it's inspired. If you want to develop blockchain applications you only need to know what blockchain does, and not how it does it.
Behind the scenes, the Bitcoin network is sharing a massive public ledger called the "block chain". This ledger contains every transaction ever processed which enables a user's computer to verify the validity of each transaction. The authenticity of each transaction is protected by digital signatures corresponding to the sending addresses therefore allowing all users to have full control over sending bitcoins.

The private key (comparable to an ATM PIN) is meant to be a guarded secret, and only used to authorize Bitcoin transmissions. Thus, it’s the “private key” that is kept in a Bitcoin wallet. Some safeguards for a Bitcoin wallet include: encrypting the wallet with a strong password and choosing the cold storage option, i.e. storing it offline. In the case of Coinbase, they offer a secure "multisig vault" to host your keys, which you can sign up for. 

The prediction market application Augur makes share offerings on the outcome of real-world events. Participants can earn money by buying into the correct prediction. The more shares purchased in the correct outcome, the higher the payout will be. With a small commitment of funds (less than a dollar), anyone can ask a question, create a market based on a predicted outcome, and collect half of all transaction fees the market generates.
Disclaimer: Investing in cryptocurrencies and Initial Coin Offerings ("ICOs") is highly risky and speculative, and this article is not a recommendation by Investopedia or the writer to invest in cryptocurrencies or ICOs. Since each individual's situation is unique, a qualified professional should always be consulted before making any financial decisions. Investopediamakes no representations or warranties as to the accuracy or timeliness of the information contained herein. As of the date this article was written, the author owns less than 1 BTC, and no positions in any of the other companies mentioned in this piece. Investopedia does not make recommendations about particular stocks. 
On 3 January 2009, the bitcoin network was created when Nakamoto mined the first block of the chain, known as the genesis block.[19][20] Embedded in the coinbase of this block was the following text: "The Times 03/Jan/2009 Chancellor on brink of second bailout for banks."[10] This note has been interpreted as both a timestamp and a comment on the instability caused by fractional-reserve banking.[21]:18