The technological complexity is explained nicely to a degree which is necessary for the user to understand roughly the whole block chain as a system. Explaining a car and its advantages for humans would start also by describing wheels, motor and steering by hand. A car user does not need to know the details of a motor , electricity etc. He looks at how to move, security, velocity etc.

Transparency: even though personal information on blockchain is kept private, the technology itself is almost always open source. That means that users on the blockchain network can modify the code as they see fit, so long as they have a majority of the network’s computational power backing them. Keeping data on the blockchain open source also makes tampering with data that much more difficult. With millions of computers on the blockchain network at any given time, for example, it is unlikely that anyone could make a change without being noticed.
The common assumption that Bitcoins are stored in a wallet is technically incorrect. Bitcoins are not stored anywhere. Bitcoin balances are kept using public and private “keys,” which are long strings of numbers and letters linked through the mathematical encryption algorithm that was used to create them. The public key (comparable to an international bank account number or IBAN) serves as the address published to the world, and to which others may send Bitcoins.
The blockchain potentially cuts out the middleman for these types of transactions. Personal computing became accessible to the general public with the invention of the Graphical User Interface (GUI), which took the form of a “desktop”. Similarly, the most common GUI devised for the blockchain are the so-called “wallet” applications, which people use to buy things with Bitcoin, and store it along with other cryptocurrencies.
Peer to peer (P2P) electronic cash is simply described as online money sent from one person to another without the need for a trusted third-party. As described in the original Bitcoin whitepaper by Satoshi Nakamoto, P2P cash makes use of digital signatures as part of the solution, but the main benefits are lost if a trusted third party is still required to prevent fraud. This makes P2P cash a trustless and safe way to transact without the need of intermediaries.
One of the solutions offered by Deloitte is the inclusion of a QR-code in a receipt. The QR-code is set to contain all the relevant information regarding the purchase: item, serial number, date of purchase and so on. With it, the QR-code also holds instructions on how to find a ‘warranty bot’ on Facebook Messenger. The user can then send a picture of the receipt to that bot, the engine unwraps the QR-code and stores all the product information on the Blockchain.
Double spending means, as the name suggests, that a Bitcoin user is illicitly spending the same money twice. With physical currency, this isn't an issue: Once you hand someone a greenback $20 bill to buy a bottle of vodka, you no longer have it, so there's no danger you could use that same $20 to buy lotto tickets next door. With digital currency, however, as the Investopedia dictionary explains, "there is a risk that the holder could make a copy of the digital token and send it to a merchant or another party while retaining the original."
Some people would say that trading is a form of gambling. While there these two things have something in common, there are also fundamental differences. When you gamble (and assuming that it's a fair game) you have a certain probability of winning and losing. When you trade assets, this gets much more complex. I don't want to go into too much detail here. I just want to outline the concept how you can earn Bitcoins with trading.
You'd have to get a fast mining rig or, more realistically, join a mining pool--a group of miners who combine their computing power and split the mined bitcoin. Mining pools are comparable to those Powerball clubs whose members buy lottery tickets en masse and agree to share any winnings. A disproportionately large number of blocks are mined by pools rather than by individual miners.
According to the European Central Bank, the decentralization of money offered by bitcoin has its theoretical roots in the Austrian school of economics, especially with Friedrich von Hayek in his book Denationalisation of Money: The Argument Refined,[121] in which he advocates a complete free market in the production, distribution and management of money to end the monopoly of central banks.[122]:22

In some cases, earning bitcoin is the most practical option for someone if their business is already operating. There is no real transition most businesses need to undergo in order to earn bitcoin: It is as simple as providing the option for people to pay with it with services like BTCPay or BitPay. You can even just add a BTC wallet address to an invoice.
The second piece of software needed is the mining software itself—the most popular is called GUIMiner. When launched, the program begins to mine on its own—looking for the magic combination that will open that padlock to the block of transactions. The program keeps running and the faster and more powerful a miner's PC is, the faster the miner will start generating bitcoins.
Blockchain technology uses an algorithm to assign a cryptographic hash (a unique string of letters and numbers—also sometimes called the “digital fingerprint”) to each block. In addition to the hash, each block contains timestamped sets of prior transactions, plus the hash of the previous block—which is what creates the immutable link between sequential blocks in the chain.
As a merchant one of your main goals is to be able to accept and process payments as quickly and seamlessly as possible so you can make your customers happy and receive payments without any headaches. Bitcoin Cash is the solution, as it has fast and low-cost transactions. As the world goes digital, electronic currencies such as Bitcoin are becoming the go-to method for paying online and in retail shops. Easily accept Bitcoin Cash directly or use third-party providers to accept Bitcoin Cash using their platforms and convert all or part of the sale into local fiat currency.

Though each bitcoin transaction is recorded in a public log, names of buyers and sellers are never revealed – only their wallet IDs. While that keeps bitcoin users’ transactions private, it also lets them buy or sell anything without easily tracing it back to them. That’s why it has become the currency of choice for people online buying drugs or other illicit activities.


Because of bitcoin's decentralized nature and its trading on online exchanges located in many countries, regulation of bitcoin has been difficult. However, the use of bitcoin can be criminalized, and shutting down exchanges and the peer-to-peer economy in a given country would constitute a de facto ban.[162] The legal status of bitcoin varies substantially from country to country and is still undefined or changing in many of them. Regulations and bans that apply to bitcoin probably extend to similar cryptocurrency systems.[163]
I would like to second the motion that some time be spent cleaning up the grammar. Great opportunities to educate about great topics can be squandered through inattention to the quality of presentation. I’ve tried reading this several times and have to agree that it’s quite painful to get through–not because it’s inaccurate, but simply because it’s garbled in critical spots. One suggestion is to let a skilled copy editor review text prior to its release. Sites that don’t proofread their content run the risk of being dismissed as less than reliable. Often I want to refer others interested in learning about CC to specific information sites but can’t yet recommend this one.
To be accepted by the rest of the network, a new block must contain a proof-of-work (PoW).[67] The system used is based on Adam Back's 1997 anti-spam scheme, Hashcash.[5][83] The PoW requires miners to find a number called a nonce, such that when the block content is hashed along with the nonce, the result is numerically smaller than the network's difficulty target.[3]:ch. 8 This proof is easy for any node in the network to verify, but extremely time-consuming to generate, as for a secure cryptographic hash, miners must try many different nonce values (usually the sequence of tested values is the ascending natural numbers: 0, 1, 2, 3, ...[3]:ch. 8) before meeting the difficulty target.
×