{"version":"https://jsonfeed.org/version/1.1","title":"Stephen Ajulu","home_page_url":"https://ajulu.netlify.app/","feed_url":"https://ajulu.netlify.app/tags/ledger/feed.json","description":"Hello, I'm Stephen Ajulu, a seasoned multidisciplinary tech professional with over a decade of experience. I build impactful solutions using design, tech, and engineering in the pursuit of impact.","icon":"https://ajulu.netlify.app/images/me.jpg","authors":[{"name":"Stephen Ajulu","url":"https://stephenajulu.com","avatar":"https://ajulu.netlify.app/images/me.jpg"}],"items":[{"id":"https://ajulu.netlify.app/posts/all-about-cryptocurrency-wallets-what-they-are-how-to-keep-them-safe-and-web-3-identities/","url":"https://ajulu.netlify.app/posts/all-about-cryptocurrency-wallets-what-they-are-how-to-keep-them-safe-and-web-3-identities/","title":"All About Cryptocurrency Wallets: What They Are, How To Keep Them Safe and","summary":"You may have heard of digital wallets used to interact with blockchain applications; perhaps you have already used them to make transactions, connect with services, marketplaces, etc. But do you know how wallets work? What types there are? What are private keys and seed phrases, and why is it critical to keep them secure to protect your assets and your identity on Web3? Are you aware of the most common types of scams that affect wallet users, and do you know how to protect yourself from these scams?\n","content_html":"\u003cp\u003eYou may have heard of digital wallets used to interact with blockchain applications; perhaps you have already used them to make transactions, connect with services, marketplaces, etc. \u003cstrong\u003e\u003cem\u003eBut do you know how wallets work? What types there are? What are private keys and seed phrases, and why is it critical to keep them secure to protect your assets and your identity on Web3? Are you aware of the most common types of scams that affect wallet users, and do you know how to protect yourself from these scams\u003c/em\u003e\u003c/strong\u003e?\u003c/p\u003e\n\u003cp\u003eThis article answers these questions, with the goal of educating users about one of the most important aspects of Web3 access infrastructure.\u003c/p\u003e\n\u003ch1 id=\"wallets-or-keychains\"\u003eWallets or keychains?\u003c/h1\u003e\n\u003cimg src=\"https://miro.medium.com/max/1400/1*z_bALl_urb57HQa0su3FcQ.png\" style=\"width:100%; height: auto;\"\u003e\n\u003cp\u003eIn the context of blockchain and Web3, a “wallet” is essentially a \u003cstrong\u003e\u003cem\u003ecryptographic key management system\u003c/em\u003e\u003c/strong\u003e that doubles as a \u003cstrong\u003e\u003cem\u003euser interface\u003c/em\u003e\u003c/strong\u003e allowing you to interact with network applications and services by reading and/or modifying the state of the blockchain. It is in this sense, therefore, that we will use the term “wallet” from now on.\u003c/p\u003e\n\u003cp\u003eAlthough the use of the term is already widespread, it is somewhat misleading, and it is worth dispelling a common misunderstanding right away. Contrary to popular belief, when you make a transaction on the blockchain you \u003cstrong\u003e\u003cem\u003eare not\u003c/em\u003e\u003c/strong\u003e “sending” tokens from your wallet to someone else’s wallet. In fact, you are using your private key to sign a transaction and transmit it to the entire blockchain network. Only after the network validates your transaction will it be executed, and then this change will be reflected in the updated balances of your address and the recipient’s address.\u003c/p\u003e\n\u003cp\u003eIn this sense, the term “wallet” is misleading because the applications we use to interact with the blockchain do \u003cstrong\u003e\u003cem\u003enot store money\u003c/em\u003e\u003c/strong\u003e the way physical wallets do. Instead, they store the private keys that allow you to sign and make transactions, and the public keys that allow you to receive assets. A more apt analogy would be to a \u003cstrong\u003e\u003cem\u003ekeychain\u003c/em\u003e\u003c/strong\u003e, with the important difference that in the case of the blockchain this “keychain” not only manages the keys needed to interact with the network but also shows the record of transactions and the balances of the addresses associated with these keys.\u003c/p\u003e\n\u003cp\u003eBut what exactly are the “keys” that digital wallets manage, and what are they used for?\u003c/p\u003e\n\u003ch1 id=\"keys-and-seed-phrases\"\u003eKeys and seed phrases\u003c/h1\u003e\n\u003cp\u003eA “key”, in \u003ca href=\"https://en.wikipedia.org/wiki/Key_(cryptography)\"\u003ethe sense in which the term is used in cryptography\u003c/a\u003e, is the basis of a transformation, usually mathematical, of an ordinary message into an unreadable (encrypted) message.\u003c/p\u003e\n\u003cp\u003eIn \u003ca href=\"https://networkencyclopedia.com/public-key-cryptography/\"\u003epublic-key cryptography\u003c/a\u003e, which is the standard used to implement blockchains, a pair of correlated keys are created for this purpose: the first is called \u003cstrong\u003eprivate\u003c/strong\u003e because it must be kept secret; the second is called \u003cstrong\u003epublic\u003c/strong\u003e because it can be shared with anyone who wants to receive it. Any participant that has access to your public key can encrypt a message using that key, but only you can read it, using your private key. In addition, you can use your private key to “digitally sign” a message, allowing others to verify that you were the sender; this verification is also done using your public key.\u003c/p\u003e\n\u003cimg src=\"https://miro.medium.com/max/758/0*g4IGriCGtFQI25P7\" style=\"width:100%; height: auto;\"\u003e\n\u003cp\u003ePublic-key cryptography — Source: \u003ca href=\"https://networkencyclopedia.com/public-key-cryptography/\"\u003eNetwork Encyclopedia\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eA wallet stores and allows you to manage this key pair to interact with a blockchain.\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eA \u003cstrong\u003epublic key\u003c/strong\u003e refers to an address that allows you to send and receive transactions.\u003c/li\u003e\n\u003cli\u003eA \u003cstrong\u003eprivate key\u003c/strong\u003e proves that you own the assets associated with your address.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eYou can think of your public key as analogous to your bank account number, and of your private key as analogous to the password you use to access your account and make transactions. As with banking, your public key can be shared with anyone to receive funds, but your private key, like your password, must be kept secret.\u003c/p\u003e\n\u003cimg src=\"https://miro.medium.com/max/1400/0*NmmYtBfXbDpn7D04\" style=\"width:100%; height: auto;\"\u003e \n\u003cp\u003ePublic \u0026amp; Private Keys — Source: Crypto.com\u003c/p\u003e\n\u003cp\u003eMost modern wallet implementations use a single master key, also known as a \u003cem\u003eseed phrase,\u003c/em\u003e to generate the public and private keys. This key generation system is called \u003cstrong\u003edeterministic\u003c/strong\u003e because in it the public and private keys are correlated and can always be reproduced from the same seed.\u003c/p\u003e\n\u003cp\u003eSeed phrases are represented as a list of English words (usually 12, sometimes 24) that you can write down and keep somewhere, and can reuse to retrieve your wallet if for some reason you lose access to it (say, by having a device stolen or damaged).\u003c/p\u003e\n\u003cimg src=\"https://miro.medium.com/max/1400/0*f4sBRgGoSdt8V9ec\" style=\"width:100%; height: auto;\"\u003e\n\u003cp\u003eExample of seed phrases — source: \u003ca href=\"https://blog.realt.co/seed-phrase-101-56e4c9150c43\"\u003eRealt Academy\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eThere are a set of industry standards for wallet implementations that ensure interoperability between different applications. Thanks to these standards, you can easily export and import your keys between wallets from different vendors.\u003c/p\u003e\n\u003ch1 id=\"more-than-keychains--wallets-as-web3-identities\"\u003eMore than keychains — wallets as Web3 identities\u003c/h1\u003e\n\u003cp\u003eThe keychain analogy helps, but it doesn’t catch all the functions of wallets. In a blockchain, nodes are constantly synchronizing the state of the network and updating the history of transactions made. As we saw above, wallets connect you to the blockchain nodes and allow you to read this history and also make transactions, registering new data in the network. In this sense, we can also say that wallets work analogously to a traditional web browser, serving as a gateway to access and interact with Web1 / Web2. Wallets, in turn, are your gateway to Web3. \u003cstrong\u003e\u003cem\u003eBut they go further, and can also serve as your identity in this new environment\u003c/em\u003e\u003c/strong\u003e.\u003c/p\u003e\n\u003cp\u003eIn Web3, \u003ca href=\"http://sinahab.com/identity-and-reputation-in-web-3/\"\u003eidentity and reputation\u003c/a\u003e work very differently from what we are used to today. As a rule, in Web2 our identities are tied to some centralized provider, which almost always requires users to hand over confidential and personal information. Examples of such identities are your Google account, Facebook, Twitter, etc.\u003c/p\u003e\n\u003cimg src=\"https://miro.medium.com/max/1400/0*J4ADchwseloMBReD\" style=\"width:100%; height: auto;\"\u003e\n\u003cp\u003eWeb2 Login — Source: \u003ca href=\"https://dev.to/tadeubdev/login-com-rede-social-usando-laravel-socialite-1i61\"\u003eDev.to\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eIn Web3, you simply link your wallet to a decentralized application (dApp) to be able to interact with it. And unlike Web2 authentication methods, wallet addresses are \u003cstrong\u003e\u003cem\u003epseudonymous\u003c/em\u003e\u003c/strong\u003e by default. If a user chooses to connect the same wallet with multiple dApps, her (pseudonymous) identity can be easily transferable between those dApps, which means that over time the user can build up a sort of \u003cstrong\u003e\u003cem\u003eportable reputation\u003c/em\u003e\u003c/strong\u003e, even without having to reveal her personal information.\u003c/p\u003e\n\u003cimg src=\"https://miro.medium.com/max/1400/0*j1r5XSdmWAW-QHc0\" style=\"width:100%; height: auto;\"\u003e\n\u003cp\u003eWeb3 Login — Source: \u003ca href=\"https://docs.cloud.coinbase.com/wallet-sdk/docs/web3modal\"\u003eCoinbase\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eAs more and more aspects of our lives come to be experienced on Web3 — communication, work, education, entertainment, finance, and so on — all “orchestrated with tokens” (see \u003ca href=\"https://future.a16z.com/why-web3-matters/\"\u003eDixon and McCormick’s definition of Web3\u003c/a\u003e), our very identities will become more and more intertwined with the content of our wallets. For this reason, \u003ca href=\"https://www.forbes.com/sites/alastairjohnson/2022/01/07/a-digital-identity-fit-for-the-metaverse/?sh=6c7417d7184b\"\u003ehaving a portable, privacy-preserving, and secure digital identity\u003c/a\u003e will become of paramount importance in this emerging future.\u003c/p\u003e\n\u003cp\u003e(I delve deeper into issues involving risks to our identities in Web3 and in the Metaverse in \u003ca href=\"https://uxdesign.cc/digital-risks-in-the-metaverse-3bf8f0eda201\"\u003ethis article\u003c/a\u003e.)\u003c/p\u003e\n\u003ch1 id=\"types-of-wallets\"\u003eTypes of wallets\u003c/h1\u003e\n\u003cimg src=\"https://miro.medium.com/max/1400/0*n-eQ0hUKWw2tz0co\" style=\"width:100%; height: auto;\"\u003e\n\u003cp\u003eTypes of Wallets — Source: \u003ca href=\"https://www.odysseydao.com/articles/how-to-use-a-hot-wallet\"\u003eOdyssey DAO\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eThe first important distinction for categorizing wallets concerns whether or not they are connected to the Internet. So-called “hot wallets” are connected to the Internet, while so-called “cold wallets” are kept offline.\u003c/p\u003e\n\u003ch1 id=\"hot-wallets\"\u003eHot wallets\u003c/h1\u003e\n\u003cp\u003eIn hot wallets, the user’s keys are stored and encrypted in the application itself, which is kept online. Examples of hot wallets include:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cstrong\u003e\u003cem\u003eWeb-based wallets\u003c/em\u003e\u003c/strong\u003e (websites or browser extensions)\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003e\u003cem\u003eWallets for mobile devices\u003c/em\u003e\u003c/strong\u003e (Android or iOS applications)\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003e\u003cem\u003eDesktop Wallets\u003c/em\u003e\u003c/strong\u003e (applications installed on your OS)\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eUsing a hot wallet, in its different forms, is generally quite convenient, but along with convenience also comes more risk, since computer networks tend to have hidden vulnerabilities that can be targeted by hackers or malware programs, among other forms of a system intrusion.\u003c/p\u003e\n\u003cp\u003eHot wallets can be subdivided into two further categories, having to do with the way the keys are controlled in each case.\u003c/p\u003e\n\u003ch2 id=\"custodial-hot-wallets\"\u003eCustodial hot wallets\u003c/h2\u003e\n\u003cp\u003eThese are wallets managed by an exchange (for example, by Binance, Coinbase, Crypto.com, etc.), and require you to log in with a username and password to access them, just as you would do to access any traditional web application.\u003c/p\u003e\n\u003cp\u003eWith a custodial wallet, you do not own your keys and therefore are not in full control of the assets they manage. As a popular saying in the crypto community goes, “\u003cem\u003enot your keys, not your coins!\u003c/em\u003e”\u003c/p\u003e\n\u003cp\u003eBecause of this, when using custodial wallets you must trust the service provider to securely store your assets and implement strong security measures to prevent unauthorized access. These measures include two-factor authentication (2FA), email confirmation, and biometric authentication, among others. Many exchanges will not allow you to transact until these security measures are properly configured by you.\u003c/p\u003e\n\u003ch2 id=\"non-custodial-hot-wallets\"\u003eNon-custodial hot wallets\u003c/h2\u003e\n\u003cp\u003eThese are self-managed wallets. The keys and assets these applications manage are fully under the control of the users. But since \u003ca href=\"https://en.wikipedia.org/wiki/With_great_power_comes_great_responsibility\"\u003ewith great power comes great responsibility\u003c/a\u003e, this means that users of non-custodial wallets must take care of their own security regarding key and seed phrase storage. If any of these are lost, recovery may be difficult or even impossible, since they are not usually stored on any third-party server.\u003c/p\u003e\n\u003ch1 id=\"cold-wallets\"\u003eCold wallets\u003c/h1\u003e\n\u003cp\u003eCold wallets are, by default, offline. This makes them less convenient than hot wallets, but as a rule, also makes them more secure.\u003c/p\u003e\n\u003cp\u003eExamples of cold wallets include:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cstrong\u003e\u003cem\u003ePaper wallets\u003c/em\u003e\u003c/strong\u003e: as the name implies, a paper wallet is a physical location where private keys and/or seed phrases are written or printed. Since hackers cannot access these records remotely, this method is generally more secure than using a hot wallet connected to the internet. On the other hand, it opens up the potential risk that the piece of paper will be destroyed or lost, which could result in unrecoverable funds.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003e\u003cem\u003eStainless steel wallets\u003c/em\u003e\u003c/strong\u003e: To avoid the risk of destroying a paper wallet in case of fire or flooding, you can also engrave your private keys on a stainless steel plate. Some manufacturers even offer ready-made kits for this type of wallet.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003e\u003cem\u003eHardware wallets\u003c/em\u003e\u003c/strong\u003e: A hardware wallet is an external, dedicated device (usually a USB or Bluetooth device) that stores your keys. You can only sign a transaction by pressing a physical button on the device, which malicious actors cannot control.\u003c/li\u003e\n\u003c/ul\u003e\n\u003ch1 id=\"wallets-with-multiple-signatures-multisig\"\u003eWallets with multiple signatures (multisig)\u003c/h1\u003e\n\u003cp\u003eAlso known as “multisig”, these are wallets that require two or more private key signatures to authorize transactions. This solution is useful for a number of use cases:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eAn individual using a multisig wallet can avoid losing total access to the wallet in a scenario where one key is lost because then there will still be other keys able to sign transactions.\u003c/li\u003e\n\u003cli\u003eMultisig wallets can make misuse of funds and fraud more difficult, which makes them a good option for hedge funds, exchanges, and corporations. Since each authorized person will have a key, and a transaction requires the use of most keys, it becomes impossible for any one individual to unilaterally perform unauthorized transactions.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e(All the wallet types described above have multisig versions — hot, cold, hardware, and so on.)\u003c/p\u003e\n\u003ch1 id=\"how-to-secure-your-wallet\"\u003eHow to secure your wallet\u003c/h1\u003e\n\u003cp\u003eIf your wallet’s private key or seed phrase gets lost or stolen, you not only risk losing access to your assets but, given what was said before, an integral part of your identity on Web3 will be jeopardized. \u003cstrong\u003e\u003cem\u003eTherefore, it is crucial that you learn how to secure your wallet to avoid fraud and identity theft\u003c/em\u003e\u003c/strong\u003e.\u003c/p\u003e\n\u003cp\u003eHere are some tips to ensure the security of your wallet:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\u003cstrong\u003eStore your private keys and your seed phrases in a safe place.\u003c/strong\u003e Consider copying them to paper or stainless steel and storing them very well, or, if you prefer to have online access, use a password manager (such as \u003ca href=\"https://1password.com/\"\u003e1Password\u003c/a\u003e or \u003ca href=\"https://www.lastpass.com/\"\u003eLastPass\u003c/a\u003e).\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eNever share your private keys or seed phrases with anyone.\u003c/strong\u003e No matter who asks — just don’t share!\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eProtect your password.\u003c/strong\u003e If your wallet has a separate password, anyone who obtains it can obtain your private key. So choose a secure password, preferably saving it in a password manager, and using \u003ca href=\"https://authy.com/what-is-2fa/\"\u003e2FA\u003c/a\u003e.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eDon’t leave valuable assets in your everyday hot wallet.\u003c/strong\u003e Instead, put those assets in a cold wallet or in a separate hot wallet with reinforced security. If you have a lot of assets in your wallet and share your address publicly, sooner or later someone will try to pull a scam using this information and some social engineering techniques.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eCarefully check any website URL, email address, or social network profile before taking any action involving your wallet.\u003c/strong\u003e Scammers usually pose as a trusted platform to phish your seed phrase or private key.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eTurn off private messaging in apps like Discord and Telegram, and never interact with unknown assets (such as NFTs) that appear “out of nowhere” in your wallet.\u003c/strong\u003e These are two common attack vectors that scammers use.\u003c/li\u003e\n\u003c/ol\u003e\n\u003cp\u003eIn addition to these general tips, here are some suggestions of best practices for using \u003cstrong\u003e\u003cem\u003ecold wallets\u003c/em\u003e\u003c/strong\u003e specifically:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\u003cstrong\u003eYour seed phrase is more important than the device itself\u003c/strong\u003e. If your cold wallet is damaged, you can always recover your assets by importing your seed phrase into another wallet. Therefore, prioritize the safety of the seed phrase as indicated above.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eDo not use the seed phrase from a hot wallet in your cold wallet\u003c/strong\u003e. The purpose of the cold wallet is to store a seed phrase offline. Reusing a hot wallet seed phrase in the cold wallet means bringing back all the problems of online storage.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eBe very wary of cold wallet phishing attempts\u003c/strong\u003e. Buy a cold wallet only from the official websites of the manufacturers (such as Ledger and Trezor). Do not respond to “support” emails, letters, or private messages asking for your seed phrase.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch1 id=\"common-frauds-involving-wallets-and-tips-to-avoid-them\"\u003eCommon frauds involving wallets, and tips to avoid them\u003c/h1\u003e\n\u003cp\u003eOne of the main goals of scammers regarding the Web3 space is to trick you into sharing your private key or your seed phrase. Here is a list of common scams for this purpose, and tips for avoiding them.\u003c/p\u003e\n\u003ch2 id=\"phishing-attacks-by-fake-customer-support-accounts\"\u003e\u003cem\u003ePhishing attacks by fake customer support accounts\u003c/em\u003e\u003c/h2\u003e\n\u003cp\u003eScammers send a message via email, social network, SMS, etc., informing you that there has been some kind of problem with your wallet — for example, “Your Metamask account has been hacked.” The criminals then try to convince you to share your private key or your seed phrase, supposedly to verify that you really own the “hacked” account. If this happens:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eCarefully check the website URL, email address, social profile, or phone number from which the message originated.\u003c/li\u003e\n\u003cli\u003eEven if the source \u003cem\u003eseems\u003c/em\u003e reliable, remember: \u003cem\u003eno reputable platform will ask for your private key or seed phrase\u003c/em\u003e!\u003c/li\u003e\n\u003c/ul\u003e\n\u003cimg src=\"https://miro.medium.com/max/1400/0*O-IrBUBEjQXPPrmd\" style=\"width:100%; height: auto;\"\u003e\n\u003cp\u003eMetaMask’s Fake Support Attack — Source: \u003ca href=\"https://www.odysseydao.com/articles/how-to-avoid-wallet-scams\"\u003eOdyssey DAO\u003c/a\u003e\u003c/p\u003e\n\u003cimg src=\"https://miro.medium.com/max/1400/0*q3mOnjpmFdQqCak0\" style=\"width:100%; height: auto;\"\u003e\n\u003cp\u003eTrust Wallet Fake Support Attack — Source: \u003ca href=\"https://learn.rainbow.me/how-to-avoid-crypto-scams\"\u003eRainbow\u003c/a\u003e\u003c/p\u003e\n\u003ch2 id=\"airdrops-of-fake-tokens-and-nfts\"\u003eAirdrops of fake tokens and NFTs\u003c/h2\u003e\n\u003cp\u003eSince wallet addresses are public, literally anyone can send tokens or NFTs to these addresses. This is usually not a big problem, because you can simply choose to ignore them; but some cybercriminals have developed ways to send tokens that can execute transactions on your account as soon as you interact with them. In this sense, one could compare these tokens to a trojan that allows hackers to access your computer as soon as you interact with a malicious file. A more detailed analysis of this type of scam, including an explanatory video, can be found \u003ca href=\"https://medium.com/metamask/phisher-watch-airdrop-scams-82eea95d9b2a\"\u003ehere\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eAs a precaution, be very careful with “freebies” and “gifts”, usually offered by fake profiles on social networks or by private instant messages on Discord servers or in Telegram groups. \u003cstrong\u003e\u003cem\u003eNever interact with a token of unknown origin in your wallet!\u003c/em\u003e\u003c/strong\u003e\u003c/p\u003e\n\u003ch2 id=\"blind-signing\"\u003eBlind-signing\u003c/h2\u003e\n\u003cp\u003eAnother recent and still little-known type of attack used to steal digital assets from wallets is \u003ca href=\"https://www.ledger.com/academy/cryptos-greatest-weakness-blind-signing-explained\"\u003eblind signing\u003c/a\u003e. This attack takes advantage of the fact that users who employ their wallets to interact with dApps and NFTs often do not review the code of the smart contracts underlying these applications and therefore may end up signing and authorizing transactions without knowing exactly what they are signing and authorizing.\u003c/p\u003e\n\u003cp\u003eFor example, it is sometimes necessary to grant a third party — say, cryptocurrency exchange or an NFT marketplace — permission to conduct transactions involving tokens within your wallet. Once third-party access is approved, users can exchange tokens or list NFTs for sale without paying additional fees each time. The attackers have found ways to trick victims into giving them third-party approval over the contents of their wallets, which can be transferred to other addresses controlled by the criminals.\u003c/p\u003e\n\u003ch2 id=\"fake-hardware-wallets\"\u003eFake hardware wallets\u003c/h2\u003e\n\u003cp\u003eOne very ingenious scam involves sending some sort of correspondence — it can be an email or even a \u003ca href=\"https://www.ledger.com/phishing-campaigns-status#phishing-campaigns\"\u003ephysical letter in the mail\u003c/a\u003e, “signed” by a CEO of a hardware wallet manufacturer — that tries to convince the user that their wallet has suffered some sort of attack and needs to be replaced. Sometimes a new device is even sent along with the letter. But these new devices have been hacked to provide access to the fraudsters, who then clone the wallet using the previously created seed phrase to gain access to the user’s funds.\u003c/p\u003e\n\u003cp\u003eIf something like this happens, simply throw these devices in the trash and inform the manufacturer of the attempt.\u003c/p\u003e\n\u003cimg src=\"https://miro.medium.com/max/1400/0*o7NaXbI0hqh_aLHA\" style=\"width:100%; height: auto;\"\u003e\n\u003cp\u003eA fake letter signed by “Ledger CEO” — Source: \u003ca href=\"https://www.ledger.com/phishing-campaigns-status#phishing-campaigns\"\u003eLedger\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eSpeaking of Web3 Identities, Unstoppable Domains is on a mission to create the best web3 domains and identities on the planet. Their domains fix a lot of issues such as long complex crypto addresses, sign-in with your web3 ID, and more. My Web3 Domain is stephenajulu.crypto. Get your own now at a discounted price. Free minting and no renewal fees: \u003ca href=\"https://unstoppabledomains.pxf.io/qnXOv5\"\u003e\u003cstrong\u003eUnstoppable Domains\u003c/strong\u003e\u003c/a\u003e\u003c/p\u003e\n\u003ch3 id=\"1365885\"\u003e\u003ca href=\"https://unstoppabledomains.pxf.io/c/3290657/1365885/15384\"\u003eBlockchain.com Premium Domains\u003c/a\u003e\u003c/h3\u003e  \n\u003cimg height=\"0\" width=\"0\" src=\"https://imp.pxf.io/i/3290657/1365885/15384\" style=\"position:absolute;visibility:hidden;\" border=\"0\" /\u003e\n\u003ch1 id=\"sources-and-further-reading\"\u003eSources and Further Reading\u003c/h1\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https://uxdesign.cc/wallets-as-web3-identities-77fd2f7acb17\"\u003e\u003cstrong\u003eWallets as web3 identities\u003c/strong\u003e\u003c/a\u003e \u003cem\u003eBy\u003c/em\u003e \u003ca href=\"https://linktr.ee/jonadas\"\u003e\u003cstrong\u003e\u003cem\u003eJônadas Techio\u003c/em\u003e\u003c/strong\u003e\u003c/a\u003e \u003cstrong\u003e\u003cem\u003e—\u003c/em\u003e\u003c/strong\u003e \u003cem\u003eBlockchain Solutions Architect \u0026amp; Web3 Evangelist @\u003c/em\u003e \u003ca href=\"https://axur.com/\"\u003e\u003cem\u003eAxur\u003c/em\u003e\u003c/a\u003e(Medium)\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://crypto.com/university/crypto-wallets\"\u003eWhat is a Crypto Wallet? A Beginner’s Guide\u003c/a\u003e (Crypto.com)\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.coinbase.com/learn/crypto-basics/what-is-a-crypto-wallet\"\u003eWhat is a crypto wallet? | Coinbase\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://networkencyclopedia.com/public-key-cryptography/\"\u003ePublic Key Cryptography — Network Encyclopedia\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://blog.realt.co/seed-phrase-101-56e4c9150c43\"\u003eSeed Phrase 101\u003c/a\u003e (Realt Academy)\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.odysseydao.com/articles/how-to-use-a-hot-wallet\"\u003eHow to use a hot wallet?\u003c/a\u003e (Odyssey DAO)\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://juliawu.medium.com/the-anatomy-of-metamask-28b0d68721d2\"\u003eThe Anatomy of MetaMask. An X-ray of Web3’s Beloved Fox | by Julia Wu | Jun, 2022\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.odysseydao.com/articles/how-to-use-a-cold-wallet\"\u003eHow to use a cold wallet?\u003c/a\u003e (Odyssey DAO)\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://crypto.com/university/what-is-a-hardware-wallet\"\u003eWhat is a Hardware Wallet and How Does it Work?\u003c/a\u003e (Crypto.com)\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://learn.rainbow.me/how-to-avoid-crypto-scams\"\u003eHow to avoid crypto scams\u003c/a\u003e (Rainbow)\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.odysseydao.com/articles/how-to-avoid-wallet-scams\"\u003eHow to avoid wallet scams?\u003c/a\u003e (Odyssey DAO)\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://conteudo.axur.com/en/ebook-digital-risks-blockchain-and-web3\"\u003eDigital Risks in Blockchain and Web3\u003c/a\u003e (Axur — Free Ebook)\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://uxdesign.cc/digital-risks-in-the-metaverse-3bf8f0eda201\"\u003eDigital risks in the Metaverse\u003c/a\u003e (Medium)\u003c/li\u003e\n\u003c/ul\u003e\n","date_published":"2022-07-08T09:10:00+03:00","image":"https://ajulu.netlify.app/images/piggybank-3akqgjoowvi-unsplash.jpg","tags":["tech","cryptocurrencies","cryptocurrency","wallets","digital wallets","crypto wallet","hot wallet","cold wallet","seed phrase","metamask","coinbase wallet","crypto scams","wallet scams","blockchain","web3","metaverse","rainbow","risks","ledger","hardware wallets","airdrops","nfts","unstoppable domains","web3 domains","domains","nftdomains"]},{"id":"https://ajulu.netlify.app/posts/applications-and-use-cases-of-blockchain-technology/","url":"https://ajulu.netlify.app/posts/applications-and-use-cases-of-blockchain-technology/","title":"Applications and Use Cases of Blockchain Technology","summary":"1. Money transfers The original concept behind the invention of blockchain technology is still a great application. Money transfers using blockchain can be less expensive and faster than using existing money transfer services. This is especially true of cross-border transactions, which are often slow and expensive. Even in the modern U.S. financial system, money transfers between accounts can take days, while a blockchain transaction takes minutes.\n2. Financial exchanges Many companies have popped up over the past few years offering decentralized cryptocurrency exchanges. Using blockchain for exchanges allows for faster and less expensive transactions. Moreover, a decentralized exchange doesn\u0026rsquo;t require investors to deposit their assets with the centralized authority, which means they maintain greater control and security. While blockchain-based exchanges primarily deal in cryptocurrency, the concept could be applied to more traditional investments as well.\n","content_html":"\u003ch3 id=\"1-money-transfers\"\u003e\u003cstrong\u003e1. Money transfers\u003c/strong\u003e\u003c/h3\u003e\n\u003cp\u003eThe original concept behind the invention of \u003ca href=\"https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/\"\u003eblockchain technology\u003c/a\u003e is still a great application. Money transfers using \u003ca href=\"https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/\"\u003eblockchain\u003c/a\u003e can be less expensive and faster than using existing money transfer services. This is especially true of cross-border transactions, which are often slow and expensive. Even in the modern U.S. financial system, money transfers between accounts can take days, while a blockchain transaction takes minutes.\u003c/p\u003e\n\u003ch3 id=\"2-financial-exchanges\"\u003e\u003cstrong\u003e2. Financial exchanges\u003c/strong\u003e\u003c/h3\u003e\n\u003cp\u003eMany companies have popped up over the past few years offering decentralized cryptocurrency exchanges. Using \u003ca href=\"https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/\"\u003eblockchain\u003c/a\u003e for exchanges allows for faster and less expensive transactions. Moreover, a \u003ca href=\"https://stephenajulu.com/blog/decentralized-finance-defined/\"\u003edecentralized exchange\u003c/a\u003e doesn\u0026rsquo;t require investors to deposit their assets with the centralized authority, which means they maintain greater control and security. While \u003ca href=\"https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/\"\u003eblockchain\u003c/a\u003e-based exchanges primarily deal in cryptocurrency, the concept could be applied to more traditional investments as well.\u003c/p\u003e\n\u003ch3 id=\"3-lending\"\u003e\u003cstrong\u003e3. Lending\u003c/strong\u003e\u003c/h3\u003e\n\u003cp\u003eLenders can use \u003ca href=\"https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/\"\u003eblockchain\u003c/a\u003e to execute collateralized loans through \u003ca href=\"https://stephenajulu.com/blog/what-are-smart-contracts-smart-contracts-explained/\"\u003esmart contracts\u003c/a\u003e. Smart contracts built on the \u003ca href=\"https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/\"\u003eblockchain\u003c/a\u003e allow certain events to automatically trigger things like a service payment, a margin call, full repayment of the loan, and release of collateral. As a result, loan processing is faster and less expensive, and lenders can offer better rates.\u003c/p\u003e\n\u003ch3 id=\"4-insurance\"\u003e\u003cstrong\u003e4. Insurance\u003c/strong\u003e\u003c/h3\u003e\n\u003cp\u003eUsing smart contracts on a \u003ca href=\"https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/\"\u003eblockchain\u003c/a\u003e can provide greater transparency for customers and insurance providers. Recording all claims on a blockchain would keep customers from making duplicate claims for the same event. Furthermore, using smart contracts can speed up the process for claimants to receive payments.\u003c/p\u003e\n\u003ch3 id=\"5-real-estate\"\u003e\u003cstrong\u003e5. Real estate\u003c/strong\u003e\u003c/h3\u003e\n\u003cp\u003eReal estate transactions require a ton of paperwork to verify financial information and ownership and then transfer deeds and titles to new owners. Using blockchain technology to record real estate transactions can provide a more secure and accessible means of verifying and transferring ownership. That can speed up transactions, reduce paperwork, and save money.\u003c/p\u003e\n\u003ch3 id=\"6-secure-personal-information\"\u003e\u003cstrong\u003e6. Secure personal information\u003c/strong\u003e\u003c/h3\u003e\n\u003cp\u003eKeeping data such as your Social Security number, date of birth, and other identifying information on a public ledger (e.g., a blockchain) may actually be more secure than current systems more susceptible to hacks. Blockchain technology can be used to secure access to identifying information while improving access for those who need it in industries such as travel, healthcare, finance, and education.\u003c/p\u003e\n\u003ch3 id=\"7-voting\"\u003e\u003cstrong\u003e7. Voting\u003c/strong\u003e\u003c/h3\u003e\n\u003cp\u003eIf personally identifiable information is held on a blockchain, that puts us just one step away from also being able to vote using blockchain technology. Using blockchain technology can make sure that nobody votes twice, only eligible voters are able to vote, and votes cannot be tampered with. What\u0026rsquo;s more, it can increase access to voting by making it as simple as pressing a few buttons on your smartphone. At the same time, the cost of running an election would substantially decrease.\u003c/p\u003e\n\u003ch3 id=\"8-government-benefits\"\u003e\u003cstrong\u003e8. Government benefits\u003c/strong\u003e\u003c/h3\u003e\n\u003cp\u003eAnother way to use digital identities stored on a blockchain is for the administration of government benefits such as welfare programs, Social Security, and Medicare. Using blockchain technology could reduce fraud and the costs of operations. Meanwhile, beneficiaries can receive funds more quickly through digital disbursement on the blockchain.\u003c/p\u003e\n\u003ch3 id=\"9-securely-share-medical-information\"\u003e\u003cstrong\u003e9. Securely share medical information\u003c/strong\u003e\u003c/h3\u003e\n\u003cp\u003eKeeping medical records on a blockchain can allow doctors and medical professionals to obtain accurate and up-to-date information on their patients. That can ensure that patients seeing multiple doctors get the best care possible. It can also speed up the system for pulling medical records, allowing for more timely treatment in some cases. And, if insurance information is held in the database, doctors can easily verify whether a patient is insured and their treatment is covered.\u003c/p\u003e\n\u003ch3 id=\"10-artist-royalties\"\u003e\u003cstrong\u003e10. Artist royalties\u003c/strong\u003e\u003c/h3\u003e\n\u003cp\u003eUsing blockchain technology to track music and film files distributed over the internet can make sure that artists are paid for their work. Since blockchain technology was invented to ensure the same file doesn\u0026rsquo;t exist in more than one place, it can be used to help reduce piracy. What\u0026rsquo;s more, using a blockchain to track playbacks on streaming services and a smart contract to distribute payments can provide greater transparency and the assurance that artists receive the money they\u0026rsquo;re owed.\u003c/p\u003e\n\u003ch3 id=\"11-non-fungible-tokens\"\u003e\u003cstrong\u003e11. Non-fungible tokens\u003c/strong\u003e\u003c/h3\u003e\n\u003cp\u003e\u003ca href=\"https://stephenajulu.com/blog/what-are-nfts-non-fungible-tokens-explained/\"\u003eNon-fungible tokens\u003c/a\u003e, or NFTs, are commonly thought of as ways to own the rights to digital art. Since the blockchain prevents data from existing in two places, putting an NFT on the blockchain guarantees that only a single copy of a piece of digital art exists. That can make it like \u003ca href=\"https://www.fool.com/investing/stock-market/market-sectors/communication/media-stocks/art-investment/\"\u003einvesting in physical art\u003c/a\u003e but without the drawbacks of storage and maintenance.\u003c/p\u003e\n\u003cp\u003eNFTs can have varied applications, and ultimately they\u0026rsquo;re a way to convey ownership of anything that can be represented by data. That could be the deed to a house, the broadcast rights to a video, or an event ticket. Anything remotely unique could be an NFT.\u003c/p\u003e\n\u003ch3 id=\"12-logistics-and-supply-chain-tracking\"\u003e\u003cstrong\u003e12. Logistics and supply chain tracking\u003c/strong\u003e\u003c/h3\u003e\n\u003cp\u003eUsing blockchain technology to track items as they move through a logistics or supply chain network can provide several advantages. First of all, it provides greater ease of communication between partners since data is available on a secure public ledger. Second, it provides greater security and data integrity since the data on the blockchain can\u0026rsquo;t be altered. That means logistics and supply chain partners can work together more easily with greater trust that the data they\u0026rsquo;ve provided is accurate and up to date.\u003c/p\u003e\n\u003ch3 id=\"13-secure-internet-of-things-networks\"\u003e\u003cstrong\u003e13. Secure Internet of Things networks\u003c/strong\u003e\u003c/h3\u003e\n\u003cp\u003eThe Internet of Things (IoT) is making our lives easier, but it\u0026rsquo;s also opening the door for nefarious actors to access our data or take control of important systems. Blockchain technology can provide greater security by storing passwords and other data on a decentralized network instead of a centralized server. Additionally, it offers protection against data tampering since a blockchain is practically immutable.\u003c/p\u003e\n\u003ch3 id=\"14-data-storage\"\u003e\u003cstrong\u003e14. Data storage\u003c/strong\u003e\u003c/h3\u003e\n\u003cp\u003eAdding blockchain technology to a data storage solution can provide greater security and integrity. Since data can be stored in a decentralized manner, it will be more difficult to hack into and wipe out all the data on the network, whereas a centralized data storage provider may only have a few points of redundancy. It also means greater access to data since access isn\u0026rsquo;t necessarily reliant on the operations of a single company. In some cases, using blockchain for data storage may also be less expensive.\u003c/p\u003e\n\u003ch3 id=\"15-gambling\"\u003e\u003cstrong\u003e15. Gambling\u003c/strong\u003e\u003c/h3\u003e\n\u003cp\u003eThe gambling industry can use blockchain to provide several benefits to players. One of the biggest benefits of operating a casino on the blockchain is the transparency it provides to potential gamblers. Since every transaction is recorded on the blockchain, bettors can see that the games are fair and the casino pays out. Furthermore, by using blockchain, there\u0026rsquo;s no need to provide personal information, including a bank account, which may be a hurdle for some would-be gamblers. It also provides a workaround for regulatory restrictions since players can gamble anonymously and the decentralized network isn\u0026rsquo;t susceptible to a government shutdown.\u003c/p\u003e\n\u003ch3 id=\"blockchain-is-in-its-infancy\"\u003eBlockchain is in its infancy\u003c/h3\u003e\n\u003cp\u003eBlockchain technology has only been around for a dozen years, and businesses are still exploring new ways to apply the technology to support their operations. With the growing amount of digital data used in our lives, there\u0026rsquo;s a growing need for the data security, access, transparency, and integrity blockchain can provide.\u003c/p\u003e\n\u003cp\u003eSource: \u003ca href=\"https://www.fool.com/investing/stock-market/market-sectors/financials/blockchain-stocks/blockchain-applications/\"\u003eThe Motley Fool\u003c/a\u003e\u003c/p\u003e\n","date_published":"2021-12-09T13:01:00+03:00","image":"https://ajulu.netlify.app/images/mit-algorand-01.jpg","tags":["technology","finance","blockchain","hyperledger","ledger","blockchains","blocks","decentralized","decentralized finance","cryptography","cryptocurrencies","cryptocurrency","crypto","gamefi","nft","non fungible tokens","blockchain technology","dao","defi","digitization","finance and economy","fintech","financial technology"]},{"id":"https://ajulu.netlify.app/posts/what-are-smart-contracts-smart-contracts-explained/","url":"https://ajulu.netlify.app/posts/what-are-smart-contracts-smart-contracts-explained/","title":"What are Smart Contracts? How Do They Work? Smart Contracts Explained","summary":"A smart contract is a computer program or a transaction protocol that is intended to automatically execute, control, or document legally relevant events and actions according to the terms of a contract or an agreement. The objectives of smart contracts are the reduction of need in trusted intermediates, arbitrations, and enforcement costs, fraud losses, as well as the reduction of malicious and accidental exceptions.\nThe code and the agreements contained therein exist across a distributed, decentralized blockchain network. The code controls the execution, and transactions are trackable and irreversible.\n","content_html":"\u003cp\u003eA \u003cstrong\u003esmart contract\u003c/strong\u003e is a computer program or a transaction protocol that is intended to automatically execute, control, or document legally relevant events and actions according to the terms of a contract or an agreement. The objectives of smart contracts are the reduction of need in trusted intermediates, arbitrations, and enforcement costs, fraud losses, as well as the reduction of malicious and accidental exceptions.\u003c/p\u003e\n\u003cp\u003eThe code and the agreements contained therein exist across a distributed, decentralized \u003ca href=\"https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/\"\u003eblockchain\u003c/a\u003e network. The code controls the execution, and transactions are trackable and irreversible.\u003c/p\u003e\n\u003cp\u003eSmart contracts permit trusted transactions and agreements to be carried out among disparate, anonymous parties without the need for a central authority, legal system, or external enforcement mechanism.\u003c/p\u003e\n\u003cp\u003eSmart contracts are made possible by \u003ca href=\"https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/\"\u003eblockchains\u003c/a\u003e, a network of computers that work together to enforce rules on the network without requiring the help of an intermediary.\u003c/p\u003e\n\u003ch3 id=\"how-smart-contracts-work\"\u003eHow smart contracts work\u003c/h3\u003e\n\u003cp\u003eSmart contracts work by following simple “if/when…then…” statements that are written into code on a blockchain. A network of computers executes the actions when predetermined conditions have been met and verified. These actions could include releasing funds to the appropriate parties, registering a vehicle, sending notifications, or issuing a ticket. The \u003ca href=\"https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/\"\u003eblockchain\u003c/a\u003e is then updated when the transaction is completed. That means the transaction cannot be changed, and only parties who have been granted permission can see the results.\u003c/p\u003e\n\u003cp\u003eWithin a smart contract, there can be as many stipulations as needed to satisfy the participants that the task will be completed satisfactorily. To establish the terms, participants must determine how transactions and their data are represented on the blockchain, agree on the “if/when\u0026hellip;then…” rules that govern those transactions, explore all possible exceptions, and define a framework for resolving disputes.\u003c/p\u003e\n\u003cp\u003eThen the smart contract can be programmed by a developer – although increasingly, organizations that use \u003ca href=\"https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/\"\u003eblockchain\u003c/a\u003e for business provide templates, web interfaces, and other online tools to simplify structuring smart contracts.\u003c/p\u003e\n\u003cp\u003eWith conventional contracts, a document outlines the terms of a relationship between two parties, which is enforceable by law. If one Party A violates the terms, Party B can take Party A to court for not complying with the agreement. A smart contract fortifies such agreements in code so the rules are automatically enforced without courts (or any third party) getting involved.\u003c/p\u003e\n\u003ch3 id=\"benefits-of-smart-contracts\"\u003eBenefits of smart contracts\u003c/h3\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cstrong\u003eSpeed, efficiency, and accuracy:\u003c/strong\u003e Once a condition is met, the contract is executed immediately. Because smart contracts are digital and automated, there’s no paperwork to process and no time spent reconciling errors that often result from manually filling in documents.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eTrust and transparency:\u003c/strong\u003e Because there’s no third party involved, and because encrypted records of transactions are shared across participants, there’s no need to question whether information has been altered for personal benefit.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eSecurity:\u003c/strong\u003e Blockchain transaction records are encrypted, which makes them very hard to hack. Moreover, because each record is connected to the previous and subsequent records on a distributed ledger, hackers would have to alter the entire chain to change a single record.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eSavings:\u003c/strong\u003e Smart contracts remove the need for intermediaries to handle transactions and, by extension, their associated time delays and fees.\u003c/li\u003e\n\u003c/ul\u003e\n\u003ch3 id=\"what-can-smart-contracts-be-used-for\"\u003eWhat can smart contracts be used for?\u003c/h3\u003e\n\u003cp\u003eSome common ways of using smart contracts are:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cstrong\u003eMultisignature accounts\u003c/strong\u003e: Funds can only be spent when a required percentage of people agree.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eEncoding financial agreements\u003c/strong\u003e: Manage agreements between users. Say, if one person buys insurance from an insurance company, the rules of when the insurance can be redeemed can be programmed into a smart contract.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eAgreements based on the outside world\u003c/strong\u003e: Pull in data from the outside world (financial, political, or whatever) with the help of oracles.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eProvide the third party\u003c/strong\u003e: Similar to how a software library works, smart contracts can work with other smart contracts in a chain.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eStorage\u003c/strong\u003e: Store information about an application, such as domain registration information or membership records. Storage in a blockchain like Ethereum is unique in that the data is immutable and can\u0026rsquo;t be erased.\u003c/li\u003e\n\u003c/ul\u003e\n\u003ch3 id=\"examples-of-blockchain-platforms-supporting-smart-contracts\"\u003eExamples of \u003ca href=\"https://stephenajulu.com/blog/6-cryptocurrencies-blockchains-with-massive-potential/\"\u003eblockchain platforms\u003c/a\u003e supporting smart contracts\u003c/h3\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cstrong\u003eBitcoin:\u003c/strong\u003e Provides a Turing-incomplete script language that allows the creation of custom smart contracts on top of Bitcoin like multisignature accounts, payment channels, escrows, time locks, atomic cross-chain trading, oracles, or multi-party lottery with no operator.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eCardano:\u003c/strong\u003e A blockchain platform for smart contracts, using proof of stake\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eEthereum:\u003c/strong\u003e Implements a Turing-complete language on its blockchain, a prominent smart contract framework.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eEOS.IO:\u003c/strong\u003e A blockchain platform for smart contracts\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eTezos:\u003c/strong\u003e A blockchain platform modifying its own set of rules with minimal disruption to the network through an on-chain governance model\u003c/li\u003e\n\u003c/ul\u003e\n","date_published":"2021-12-09T11:00:00+03:00","image":"https://ajulu.netlify.app/images/smart-contract-featured-image.png","tags":["technology","smart contracts","blockchain","decentralized","ledger","hyperledger","digital ledger","cryptocurrencies","crypto","bitcoin","ethereum"]}]}