Cryptoassets: The Innovative Investor's Guide to Bitcoin and Beyond
Rate it:
Open Preview
Kindle Notes & Highlights
5%
Flag icon
but the Silicon Valley ethos of “break things first, then ask for forgiveness” has found its way to Wall Street.
5%
Flag icon
Self-funded, decentralized organizations are a new species in the global economy that are changing everything we know about business.
6%
Flag icon
The Internet was first conceptualized in the early 1960s to create resilient communication systems that would survive a nuclear attack on the United States.
6%
Flag icon
the key to accomplishing such resilience was decentralization.
6%
Flag icon
Interestingly, however, the Internet has become increasingly centralized over time, potentially endangering its original conception as a “highly survivable system.”
7%
Flag icon
One of the keys to Graham’s book was always reminding the investor to focus on the inherent value of an investment without getting caught in the irrational behavior of the markets.
9%
Flag icon
Governments are good at cutting off the heads of centrally controlled networks like Napster, but pure P2P networks like Gnutella and Tor seem to be holding their own.”
9%
Flag icon
Satoshi’s choice first to employ this functionality by inscribing a note about bank bailouts made it clear he was keen on never letting us forget the failings of the 2008 financial crisis.
10%
Flag icon
It operates in a peer-to-peer manner, the same movement that has driven Uber, Airbnb, and LendingClub to be multibillion-dollar companies in their own realms.
11%
Flag icon
For a deep dive on cryptography, we highly recommend The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Simon Singh.
11%
Flag icon
The solution to this cryptographic puzzle involves combining four variables: the time, a summary of the proposed transactions, the identity of the previous block, and a variable called the nonce.
11%
Flag icon
The nonce is a random number that when combined with the other three variables via what is called a cryptographic hash function results in an output that fits a difficult criteria. The difficulty of meeting this criteria is defined by a parameter that is adjusted dynamically so that one miner finds a solution to this mathematical puzzle roughly every 10 minutes.
11%
Flag icon
called a coinbase transaction, as well as fees for each transaction.
11%
Flag icon
difference between public and private blockchains is similar to that between the Internet and intranets.
12%
Flag icon
We believe that over time the implementation of private blockchains will erode the position held by centralized powerhouses because of the tendency toward open networks. In other words, it’s a foot in the door for further decentralization and the use of public blockchains.
12%
Flag icon
others that are exploring the applications of blockchain technology include the music industry, real estate, insurance, healthcare, networking, polling, supply chains, charities, gun tracking, law enforcement, governments, and more.
12%
Flag icon
Just as machine learning is not just one thing, but composed of the Symbolists, Connectionists, Evolutionaries, Bayesians, and Analogizers,
12%
Flag icon
If these distributed databases of value are to be truly transformational, they will have to interoperate and value one another.
13%
Flag icon
For example, Ethereum’s goal was to serve as a decentralized world computer, whereas Bitcoin aimed to be a decentralized world currency.
13%
Flag icon
The second movement that exploded on the scene questioned whether bitcoin, or any cryptoasset, was necessary to get the value out of blockchain technology.
13%
Flag icon
welcome to the world of private blockchains.
13%
Flag icon
Since Satoshi only places “proof-of-work” directly before “chain,” many early Bitcoiners are adamant that the term blockchain should only be used if it is proof-of-work based.
13%
Flag icon
Since these computers don’t have to worry about attack from the outside—they are operating behind a firewall and collaborating with known entities—it removes the need for a native asset that incentivizes the build-out of a robust network of miners.
14%
Flag icon
In other words, the value creation is in the cost savings, and the entities that own the computers enjoy these savings.
14%
Flag icon
Over time, miner compensation will shift from the issuance of new bitcoin to transaction fees, and if global adoption is great enough, then transaction fees will be sufficient to sustain miners.
14%
Flag icon
Some of the more famous examples include steam, electricity, internal combustion engines, and information technology.
14%
Flag icon
Innovation Trigger •   Peak of Inflated Expectations •   Trough of Disillusionment •   Slope of Enlightenment •   Plateau of Productivity
14%
Flag icon
While it’s hard to predict where blockchain technology currently falls on Gartner’s Hype Cycle (these things are always easier in retrospect), we would posit that Bitcoin is emerging from the Trough of Disillusionment.
15%
Flag icon
A currency fulfills three well-defined purposes: to serve as a means of exchange, store of value, and unit of account.
15%
Flag icon
In an increasingly digital world, it only makes sense that we have digital commodities, such as compute power, storage capacity, and network bandwidth.
16%
Flag icon
something has value and can be used as a currency without government support and without a physical form is one of the most significant accomplishments in monetary history.
16%
Flag icon
The difficulty of this proof-of-work process was recalibrated automatically every two weeks with the goal of keeping the amount of time between blocks at an average of 10 minutes.
16%
Flag icon
It is bitcoin’s scarce supply schedule that makes many think of it as digital gold.14
17%
Flag icon
block hashing algorithm called scrypt, which is memory intensive and harder for specialized chips like ASICs to gain a significant edge upon.
17%
Flag icon
allow communities to create a system of money out of chains of trust.
17%
Flag icon
Using this concept, payments can “ripple” through the network via these chains of trust.
17%
Flag icon
What’s important to recognize is that Ripple’s consensus algorithm relied on trust of some sort, which was vastly different from Bitcoin’s proof-of-work design that assumed anyone could be a bad actor.
17%
Flag icon
investor: with a new cryptocurrency, it’s always important to understand how it’s being distributed and to whom (we’ll discuss this further in Chapter 12). If
17%
Flag icon
Ripple has since pivoted away from being a transaction mechanism for the common person and instead now “enables banks to send real-time international payments across networks.”
18%
Flag icon
Markus’s team later chose to issue roughly 5 billion coins each year, and this created a vastly different supply schedule from those of the deflationary bitcoin and litecoin.
18%
Flag icon
Dogecoin mostly gained traction amongst Internet tippers.
18%
Flag icon
Auroracoin is a cautionary tale for both investors and developers. What began as a seemingly powerful and compelling use case for a cryptoasset suffered from its inability to provide value
19%
Flag icon
Adam Back is considered the inspiration for Satoshi’s proof-of-work algorithm and is president of Blockstream, one of the most important companies in the Bitcoin space. In March 2014, he tweeted about CryptoNote, saying it was one of the few ideas in the cryptocurrency space outside of Bitcoin that held a “defensible rationale for existence.”50 Some may ask why
19%
Flag icon
A key differentiator between a scam and good intent is the communication and rationale of the developer team behind the issuance model.
19%
Flag icon
The most defining feature of Monero is its use of ring signatures, a cryptographic technology that had been evolving since 1991.55
19%
Flag icon
While many are suspicious of such privacy, it should be noted that it has tremendous benefits for fungibility. Fungibility refers to the fact that any unit of currency is as valuable as another unit of equal denomination.
19%
Flag icon
A danger for bitcoin, especially for balances known to have been used for illegal activity, is that if an exchange or other service blacklists that balance, then that balance becomes illiquid and arguably less valuable than other balances of bitcoin.
19%
Flag icon
Monero’s supply schedule is a hybrid of Litecoin and Dogecoin. For monero, a new block is appended to its blockchain every 2 minutes, similar to Litecoin’s 2.5 minutes.
19%
Flag icon
From our perspective, if there is a major disruption or error in the launch of a cryptocurrency that significantly skews its distribution, then that cryptocurrency should be relaunched.
20%
Flag icon
The Zcash team is led by Zooko Wilcox, whom we have mentioned prior as an early employee at David Chaum’s DigiCash. Through his time at DigiCash and longstanding involvement in cryptography and cryptoassets, Zooko has become one of the most respected members in the community.
« Prev 1 3 4 5