<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:media="http://search.yahoo.com/mrss/"><channel><title>Ledger on Stephen Ajulu</title><link>https://ajulu.netlify.app/tags/ledger/</link><atom:link href="https://ajulu.netlify.app/tags/ledger/feed.xml" rel="self" type="application/rss+xml"/><description>Hello, I'm Stephen Ajulu, a seasoned multidisciplinary tech professional with over a decade of experience. I build impactful solutions using design, tech, and engineering in the pursuit of impact.</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><managingEditor>ajulu.b22uf@aleeas.com (Stephen Ajulu)</managingEditor><webMaster>ajulu.b22uf@aleeas.com (Stephen Ajulu)</webMaster><copyright>Stephen Ajulu.</copyright><lastBuildDate>Fri, 08 Jul 2022 09:10:00 +0300</lastBuildDate><item><title>All About Cryptocurrency Wallets: What They Are, How To Keep Them Safe and</title><link>https://ajulu.netlify.app/posts/all-about-cryptocurrency-wallets-what-they-are-how-to-keep-them-safe-and-web-3-identities/</link><pubDate>Fri, 08 Jul 2022 09:10:00 +0300</pubDate><guid>https://ajulu.netlify.app/posts/all-about-cryptocurrency-wallets-what-they-are-how-to-keep-them-safe-and-web-3-identities/</guid><description>&lt;p&gt;You may have heard of digital wallets used to interact with blockchain applications; perhaps you have already used them to make transactions, connect with services, marketplaces, etc. &lt;strong&gt;&lt;em&gt;But do you know how wallets work? What types there are? What are private keys and seed phrases, and why is it critical to keep them secure to protect your assets and your identity on Web3? Are you aware of the most common types of scams that affect wallet users, and do you know how to protect yourself from these scams&lt;/em&gt;&lt;/strong&gt;?&lt;/p&gt;</description><content:encoded><![CDATA[<p>You may have heard of digital wallets used to interact with blockchain applications; perhaps you have already used them to make transactions, connect with services, marketplaces, etc. <strong><em>But do you know how wallets work? What types there are? What are private keys and seed phrases, and why is it critical to keep them secure to protect your assets and your identity on Web3? Are you aware of the most common types of scams that affect wallet users, and do you know how to protect yourself from these scams</em></strong>?</p>
<p>This article answers these questions, with the goal of educating users about one of the most important aspects of Web3 access infrastructure.</p>
<h1 id="wallets-or-keychains">Wallets or keychains?</h1>
<img src="https://miro.medium.com/max/1400/1*z_bALl_urb57HQa0su3FcQ.png" style="width:100%; height: auto;">
<p>In the context of blockchain and Web3, a “wallet” is essentially a <strong><em>cryptographic key management system</em></strong> that doubles as a <strong><em>user interface</em></strong> allowing you to interact with network applications and services by reading and/or modifying the state of the blockchain. It is in this sense, therefore, that we will use the term “wallet” from now on.</p>
<p>Although the use of the term is already widespread, it is somewhat misleading, and it is worth dispelling a common misunderstanding right away. Contrary to popular belief, when you make a transaction on the blockchain you <strong><em>are not</em></strong> “sending” tokens from your wallet to someone else’s wallet. In fact, you are using your private key to sign a transaction and transmit it to the entire blockchain network. Only after the network validates your transaction will it be executed, and then this change will be reflected in the updated balances of your address and the recipient’s address.</p>
<p>In this sense, the term “wallet” is misleading because the applications we use to interact with the blockchain do <strong><em>not store money</em></strong> the way physical wallets do. Instead, they store the private keys that allow you to sign and make transactions, and the public keys that allow you to receive assets. A more apt analogy would be to a <strong><em>keychain</em></strong>, with the important difference that in the case of the blockchain this “keychain” not only manages the keys needed to interact with the network but also shows the record of transactions and the balances of the addresses associated with these keys.</p>
<p>But what exactly are the “keys” that digital wallets manage, and what are they used for?</p>
<h1 id="keys-and-seed-phrases">Keys and seed phrases</h1>
<p>A “key”, in <a href="https://en.wikipedia.org/wiki/Key_(cryptography)">the sense in which the term is used in cryptography</a>, is the basis of a transformation, usually mathematical, of an ordinary message into an unreadable (encrypted) message.</p>
<p>In <a href="https://networkencyclopedia.com/public-key-cryptography/">public-key cryptography</a>, which is the standard used to implement blockchains, a pair of correlated keys are created for this purpose: the first is called <strong>private</strong> because it must be kept secret; the second is called <strong>public</strong> because it can be shared with anyone who wants to receive it. Any participant that has access to your public key can encrypt a message using that key, but only you can read it, using your private key. In addition, you can use your private key to “digitally sign” a message, allowing others to verify that you were the sender; this verification is also done using your public key.</p>
<img src="https://miro.medium.com/max/758/0*g4IGriCGtFQI25P7" style="width:100%; height: auto;">
<p>Public-key cryptography — Source: <a href="https://networkencyclopedia.com/public-key-cryptography/">Network Encyclopedia</a></p>
<p>A wallet stores and allows you to manage this key pair to interact with a blockchain.</p>
<ul>
<li>A <strong>public key</strong> refers to an address that allows you to send and receive transactions.</li>
<li>A <strong>private key</strong> proves that you own the assets associated with your address.</li>
</ul>
<p>You can think of your public key as analogous to your bank account number, and of your private key as analogous to the password you use to access your account and make transactions. As with banking, your public key can be shared with anyone to receive funds, but your private key, like your password, must be kept secret.</p>
<img src="https://miro.medium.com/max/1400/0*NmmYtBfXbDpn7D04" style="width:100%; height: auto;"> 
<p>Public &amp; Private Keys — Source: Crypto.com</p>
<p>Most modern wallet implementations use a single master key, also known as a <em>seed phrase,</em> to generate the public and private keys. This key generation system is called <strong>deterministic</strong> because in it the public and private keys are correlated and can always be reproduced from the same seed.</p>
<p>Seed phrases are represented as a list of English words (usually 12, sometimes 24) that you can write down and keep somewhere, and can reuse to retrieve your wallet if for some reason you lose access to it (say, by having a device stolen or damaged).</p>
<img src="https://miro.medium.com/max/1400/0*f4sBRgGoSdt8V9ec" style="width:100%; height: auto;">
<p>Example of seed phrases — source: <a href="https://blog.realt.co/seed-phrase-101-56e4c9150c43">Realt Academy</a></p>
<p>There are a set of industry standards for wallet implementations that ensure interoperability between different applications. Thanks to these standards, you can easily export and import your keys between wallets from different vendors.</p>
<h1 id="more-than-keychains--wallets-as-web3-identities">More than keychains — wallets as Web3 identities</h1>
<p>The keychain analogy helps, but it doesn’t catch all the functions of wallets. In a blockchain, nodes are constantly synchronizing the state of the network and updating the history of transactions made. As we saw above, wallets connect you to the blockchain nodes and allow you to read this history and also make transactions, registering new data in the network. In this sense, we can also say that wallets work analogously to a traditional web browser, serving as a gateway to access and interact with Web1 / Web2. Wallets, in turn, are your gateway to Web3. <strong><em>But they go further, and can also serve as your identity in this new environment</em></strong>.</p>
<p>In Web3, <a href="http://sinahab.com/identity-and-reputation-in-web-3/">identity and reputation</a> work very differently from what we are used to today. As a rule, in Web2 our identities are tied to some centralized provider, which almost always requires users to hand over confidential and personal information. Examples of such identities are your Google account, Facebook, Twitter, etc.</p>
<img src="https://miro.medium.com/max/1400/0*J4ADchwseloMBReD" style="width:100%; height: auto;">
<p>Web2 Login — Source: <a href="https://dev.to/tadeubdev/login-com-rede-social-usando-laravel-socialite-1i61">Dev.to</a></p>
<p>In Web3, you simply link your wallet to a decentralized application (dApp) to be able to interact with it. And unlike Web2 authentication methods, wallet addresses are <strong><em>pseudonymous</em></strong> by default. If a user chooses to connect the same wallet with multiple dApps, her (pseudonymous) identity can be easily transferable between those dApps, which means that over time the user can build up a sort of <strong><em>portable reputation</em></strong>, even without having to reveal her personal information.</p>
<img src="https://miro.medium.com/max/1400/0*j1r5XSdmWAW-QHc0" style="width:100%; height: auto;">
<p>Web3 Login — Source: <a href="https://docs.cloud.coinbase.com/wallet-sdk/docs/web3modal">Coinbase</a></p>
<p>As more and more aspects of our lives come to be experienced on Web3 — communication, work, education, entertainment, finance, and so on — all “orchestrated with tokens” (see <a href="https://future.a16z.com/why-web3-matters/">Dixon and McCormick’s definition of Web3</a>), our very identities will become more and more intertwined with the content of our wallets. For this reason, <a href="https://www.forbes.com/sites/alastairjohnson/2022/01/07/a-digital-identity-fit-for-the-metaverse/?sh=6c7417d7184b">having a portable, privacy-preserving, and secure digital identity</a> will become of paramount importance in this emerging future.</p>
<p>(I delve deeper into issues involving risks to our identities in Web3 and in the Metaverse in <a href="https://uxdesign.cc/digital-risks-in-the-metaverse-3bf8f0eda201">this article</a>.)</p>
<h1 id="types-of-wallets">Types of wallets</h1>
<img src="https://miro.medium.com/max/1400/0*n-eQ0hUKWw2tz0co" style="width:100%; height: auto;">
<p>Types of Wallets — Source: <a href="https://www.odysseydao.com/articles/how-to-use-a-hot-wallet">Odyssey DAO</a></p>
<p>The first important distinction for categorizing wallets concerns whether or not they are connected to the Internet. So-called “hot wallets” are connected to the Internet, while so-called “cold wallets” are kept offline.</p>
<h1 id="hot-wallets">Hot wallets</h1>
<p>In hot wallets, the user’s keys are stored and encrypted in the application itself, which is kept online. Examples of hot wallets include:</p>
<ul>
<li><strong><em>Web-based wallets</em></strong> (websites or browser extensions)</li>
<li><strong><em>Wallets for mobile devices</em></strong> (Android or iOS applications)</li>
<li><strong><em>Desktop Wallets</em></strong> (applications installed on your OS)</li>
</ul>
<p>Using a hot wallet, in its different forms, is generally quite convenient, but along with convenience also comes more risk, since computer networks tend to have hidden vulnerabilities that can be targeted by hackers or malware programs, among other forms of a system intrusion.</p>
<p>Hot wallets can be subdivided into two further categories, having to do with the way the keys are controlled in each case.</p>
<h2 id="custodial-hot-wallets">Custodial hot wallets</h2>
<p>These are wallets managed by an exchange (for example, by Binance, Coinbase, Crypto.com, etc.), and require you to log in with a username and password to access them, just as you would do to access any traditional web application.</p>
<p>With a custodial wallet, you do not own your keys and therefore are not in full control of the assets they manage. As a popular saying in the crypto community goes, “<em>not your keys, not your coins!</em>”</p>
<p>Because of this, when using custodial wallets you must trust the service provider to securely store your assets and implement strong security measures to prevent unauthorized access. These measures include two-factor authentication (2FA), email confirmation, and biometric authentication, among others. Many exchanges will not allow you to transact until these security measures are properly configured by you.</p>
<h2 id="non-custodial-hot-wallets">Non-custodial hot wallets</h2>
<p>These are self-managed wallets. The keys and assets these applications manage are fully under the control of the users. But since <a href="https://en.wikipedia.org/wiki/With_great_power_comes_great_responsibility">with great power comes great responsibility</a>, this means that users of non-custodial wallets must take care of their own security regarding key and seed phrase storage. If any of these are lost, recovery may be difficult or even impossible, since they are not usually stored on any third-party server.</p>
<h1 id="cold-wallets">Cold wallets</h1>
<p>Cold wallets are, by default, offline. This makes them less convenient than hot wallets, but as a rule, also makes them more secure.</p>
<p>Examples of cold wallets include:</p>
<ul>
<li><strong><em>Paper wallets</em></strong>: as the name implies, a paper wallet is a physical location where private keys and/or seed phrases are written or printed. Since hackers cannot access these records remotely, this method is generally more secure than using a hot wallet connected to the internet. On the other hand, it opens up the potential risk that the piece of paper will be destroyed or lost, which could result in unrecoverable funds.</li>
<li><strong><em>Stainless steel wallets</em></strong>: To avoid the risk of destroying a paper wallet in case of fire or flooding, you can also engrave your private keys on a stainless steel plate. Some manufacturers even offer ready-made kits for this type of wallet.</li>
<li><strong><em>Hardware wallets</em></strong>: A hardware wallet is an external, dedicated device (usually a USB or Bluetooth device) that stores your keys. You can only sign a transaction by pressing a physical button on the device, which malicious actors cannot control.</li>
</ul>
<h1 id="wallets-with-multiple-signatures-multisig">Wallets with multiple signatures (multisig)</h1>
<p>Also known as “multisig”, these are wallets that require two or more private key signatures to authorize transactions. This solution is useful for a number of use cases:</p>
<ul>
<li>An individual using a multisig wallet can avoid losing total access to the wallet in a scenario where one key is lost because then there will still be other keys able to sign transactions.</li>
<li>Multisig wallets can make misuse of funds and fraud more difficult, which makes them a good option for hedge funds, exchanges, and corporations. Since each authorized person will have a key, and a transaction requires the use of most keys, it becomes impossible for any one individual to unilaterally perform unauthorized transactions.</li>
</ul>
<p>(All the wallet types described above have multisig versions — hot, cold, hardware, and so on.)</p>
<h1 id="how-to-secure-your-wallet">How to secure your wallet</h1>
<p>If your wallet’s private key or seed phrase gets lost or stolen, you not only risk losing access to your assets but, given what was said before, an integral part of your identity on Web3 will be jeopardized. <strong><em>Therefore, it is crucial that you learn how to secure your wallet to avoid fraud and identity theft</em></strong>.</p>
<p>Here are some tips to ensure the security of your wallet:</p>
<ol>
<li><strong>Store your private keys and your seed phrases in a safe place.</strong> Consider copying them to paper or stainless steel and storing them very well, or, if you prefer to have online access, use a password manager (such as <a href="https://1password.com/">1Password</a> or <a href="https://www.lastpass.com/">LastPass</a>).</li>
<li><strong>Never share your private keys or seed phrases with anyone.</strong> No matter who asks — just don’t share!</li>
<li><strong>Protect your password.</strong> If your wallet has a separate password, anyone who obtains it can obtain your private key. So choose a secure password, preferably saving it in a password manager, and using <a href="https://authy.com/what-is-2fa/">2FA</a>.</li>
<li><strong>Don’t leave valuable assets in your everyday hot wallet.</strong> Instead, put those assets in a cold wallet or in a separate hot wallet with reinforced security. If you have a lot of assets in your wallet and share your address publicly, sooner or later someone will try to pull a scam using this information and some social engineering techniques.</li>
<li><strong>Carefully check any website URL, email address, or social network profile before taking any action involving your wallet.</strong> Scammers usually pose as a trusted platform to phish your seed phrase or private key.</li>
<li><strong>Turn off private messaging in apps like Discord and Telegram, and never interact with unknown assets (such as NFTs) that appear “out of nowhere” in your wallet.</strong> These are two common attack vectors that scammers use.</li>
</ol>
<p>In addition to these general tips, here are some suggestions of best practices for using <strong><em>cold wallets</em></strong> specifically:</p>
<ol>
<li><strong>Your seed phrase is more important than the device itself</strong>. If your cold wallet is damaged, you can always recover your assets by importing your seed phrase into another wallet. Therefore, prioritize the safety of the seed phrase as indicated above.</li>
<li><strong>Do not use the seed phrase from a hot wallet in your cold wallet</strong>. The purpose of the cold wallet is to store a seed phrase offline. Reusing a hot wallet seed phrase in the cold wallet means bringing back all the problems of online storage.</li>
<li><strong>Be very wary of cold wallet phishing attempts</strong>. Buy a cold wallet only from the official websites of the manufacturers (such as Ledger and Trezor). Do not respond to “support” emails, letters, or private messages asking for your seed phrase.</li>
</ol>
<h1 id="common-frauds-involving-wallets-and-tips-to-avoid-them">Common frauds involving wallets, and tips to avoid them</h1>
<p>One of the main goals of scammers regarding the Web3 space is to trick you into sharing your private key or your seed phrase. Here is a list of common scams for this purpose, and tips for avoiding them.</p>
<h2 id="phishing-attacks-by-fake-customer-support-accounts"><em>Phishing attacks by fake customer support accounts</em></h2>
<p>Scammers send a message via email, social network, SMS, etc., informing you that there has been some kind of problem with your wallet — for example, “Your Metamask account has been hacked.” The criminals then try to convince you to share your private key or your seed phrase, supposedly to verify that you really own the “hacked” account. If this happens:</p>
<ul>
<li>Carefully check the website URL, email address, social profile, or phone number from which the message originated.</li>
<li>Even if the source <em>seems</em> reliable, remember: <em>no reputable platform will ask for your private key or seed phrase</em>!</li>
</ul>
<img src="https://miro.medium.com/max/1400/0*O-IrBUBEjQXPPrmd" style="width:100%; height: auto;">
<p>MetaMask’s Fake Support Attack — Source: <a href="https://www.odysseydao.com/articles/how-to-avoid-wallet-scams">Odyssey DAO</a></p>
<img src="https://miro.medium.com/max/1400/0*q3mOnjpmFdQqCak0" style="width:100%; height: auto;">
<p>Trust Wallet Fake Support Attack — Source: <a href="https://learn.rainbow.me/how-to-avoid-crypto-scams">Rainbow</a></p>
<h2 id="airdrops-of-fake-tokens-and-nfts">Airdrops of fake tokens and NFTs</h2>
<p>Since wallet addresses are public, literally anyone can send tokens or NFTs to these addresses. This is usually not a big problem, because you can simply choose to ignore them; but some cybercriminals have developed ways to send tokens that can execute transactions on your account as soon as you interact with them. In this sense, one could compare these tokens to a trojan that allows hackers to access your computer as soon as you interact with a malicious file. A more detailed analysis of this type of scam, including an explanatory video, can be found <a href="https://medium.com/metamask/phisher-watch-airdrop-scams-82eea95d9b2a">here</a>.</p>
<p>As a precaution, be very careful with “freebies” and “gifts”, usually offered by fake profiles on social networks or by private instant messages on Discord servers or in Telegram groups. <strong><em>Never interact with a token of unknown origin in your wallet!</em></strong></p>
<h2 id="blind-signing">Blind-signing</h2>
<p>Another recent and still little-known type of attack used to steal digital assets from wallets is <a href="https://www.ledger.com/academy/cryptos-greatest-weakness-blind-signing-explained">blind signing</a>. This attack takes advantage of the fact that users who employ their wallets to interact with dApps and NFTs often do not review the code of the smart contracts underlying these applications and therefore may end up signing and authorizing transactions without knowing exactly what they are signing and authorizing.</p>
<p>For example, it is sometimes necessary to grant a third party — say, cryptocurrency exchange or an NFT marketplace — permission to conduct transactions involving tokens within your wallet. Once third-party access is approved, users can exchange tokens or list NFTs for sale without paying additional fees each time. The attackers have found ways to trick victims into giving them third-party approval over the contents of their wallets, which can be transferred to other addresses controlled by the criminals.</p>
<h2 id="fake-hardware-wallets">Fake hardware wallets</h2>
<p>One very ingenious scam involves sending some sort of correspondence — it can be an email or even a <a href="https://www.ledger.com/phishing-campaigns-status#phishing-campaigns">physical letter in the mail</a>, “signed” by a CEO of a hardware wallet manufacturer — that tries to convince the user that their wallet has suffered some sort of attack and needs to be replaced. Sometimes a new device is even sent along with the letter. But these new devices have been hacked to provide access to the fraudsters, who then clone the wallet using the previously created seed phrase to gain access to the user’s funds.</p>
<p>If something like this happens, simply throw these devices in the trash and inform the manufacturer of the attempt.</p>
<img src="https://miro.medium.com/max/1400/0*o7NaXbI0hqh_aLHA" style="width:100%; height: auto;">
<p>A fake letter signed by “Ledger CEO” — Source: <a href="https://www.ledger.com/phishing-campaigns-status#phishing-campaigns">Ledger</a></p>
<p>Speaking of Web3 Identities, Unstoppable Domains is on a mission to create the best web3 domains and identities on the planet. Their domains fix a lot of issues such as long complex crypto addresses, sign-in with your web3 ID, and more. My Web3 Domain is stephenajulu.crypto. Get your own now at a discounted price. Free minting and no renewal fees: <a href="https://unstoppabledomains.pxf.io/qnXOv5"><strong>Unstoppable Domains</strong></a></p>
<h3 id="1365885"><a href="https://unstoppabledomains.pxf.io/c/3290657/1365885/15384">Blockchain.com Premium Domains</a></h3>  
<img height="0" width="0" src="https://imp.pxf.io/i/3290657/1365885/15384" style="position:absolute;visibility:hidden;" border="0" />
<h1 id="sources-and-further-reading">Sources and Further Reading</h1>
<ul>
<li><a href="https://uxdesign.cc/wallets-as-web3-identities-77fd2f7acb17"><strong>Wallets as web3 identities</strong></a> <em>By</em> <a href="https://linktr.ee/jonadas"><strong><em>Jônadas Techio</em></strong></a> <strong><em>—</em></strong> <em>Blockchain Solutions Architect &amp; Web3 Evangelist @</em> <a href="https://axur.com/"><em>Axur</em></a>(Medium)</li>
<li><a href="https://crypto.com/university/crypto-wallets">What is a Crypto Wallet? A Beginner’s Guide</a> (Crypto.com)</li>
<li><a href="https://www.coinbase.com/learn/crypto-basics/what-is-a-crypto-wallet">What is a crypto wallet? | Coinbase</a></li>
<li><a href="https://networkencyclopedia.com/public-key-cryptography/">Public Key Cryptography — Network Encyclopedia</a></li>
<li><a href="https://blog.realt.co/seed-phrase-101-56e4c9150c43">Seed Phrase 101</a> (Realt Academy)</li>
<li><a href="https://www.odysseydao.com/articles/how-to-use-a-hot-wallet">How to use a hot wallet?</a> (Odyssey DAO)</li>
<li><a href="https://juliawu.medium.com/the-anatomy-of-metamask-28b0d68721d2">The Anatomy of MetaMask. An X-ray of Web3’s Beloved Fox | by Julia Wu | Jun, 2022</a></li>
<li><a href="https://www.odysseydao.com/articles/how-to-use-a-cold-wallet">How to use a cold wallet?</a> (Odyssey DAO)</li>
<li><a href="https://crypto.com/university/what-is-a-hardware-wallet">What is a Hardware Wallet and How Does it Work?</a> (Crypto.com)</li>
<li><a href="https://learn.rainbow.me/how-to-avoid-crypto-scams">How to avoid crypto scams</a> (Rainbow)</li>
<li><a href="https://www.odysseydao.com/articles/how-to-avoid-wallet-scams">How to avoid wallet scams?</a> (Odyssey DAO)</li>
<li><a href="https://conteudo.axur.com/en/ebook-digital-risks-blockchain-and-web3">Digital Risks in Blockchain and Web3</a> (Axur — Free Ebook)</li>
<li><a href="https://uxdesign.cc/digital-risks-in-the-metaverse-3bf8f0eda201">Digital risks in the Metaverse</a> (Medium)</li>
</ul>
]]></content:encoded><media:content url="https://ajulu.netlify.app/images/piggybank-3akqgjoowvi-unsplash.jpg" medium="image"/></item><item><title>Applications and Use Cases of Blockchain Technology</title><link>https://ajulu.netlify.app/posts/applications-and-use-cases-of-blockchain-technology/</link><pubDate>Thu, 09 Dec 2021 13:01:00 +0300</pubDate><guid>https://ajulu.netlify.app/posts/applications-and-use-cases-of-blockchain-technology/</guid><description>&lt;h3 id="1-money-transfers"&gt;&lt;strong&gt;1. Money transfers&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The original concept behind the invention of &lt;a href="https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/"&gt;blockchain technology&lt;/a&gt; is still a great application. Money transfers using &lt;a href="https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/"&gt;blockchain&lt;/a&gt; can be less expensive and faster than using existing money transfer services. This is especially true of cross-border transactions, which are often slow and expensive. Even in the modern U.S. financial system, money transfers between accounts can take days, while a blockchain transaction takes minutes.&lt;/p&gt;
&lt;h3 id="2-financial-exchanges"&gt;&lt;strong&gt;2. Financial exchanges&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Many companies have popped up over the past few years offering decentralized cryptocurrency exchanges. Using &lt;a href="https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/"&gt;blockchain&lt;/a&gt; for exchanges allows for faster and less expensive transactions. Moreover, a &lt;a href="https://stephenajulu.com/blog/decentralized-finance-defined/"&gt;decentralized exchange&lt;/a&gt; doesn&amp;rsquo;t require investors to deposit their assets with the centralized authority, which means they maintain greater control and security. While &lt;a href="https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/"&gt;blockchain&lt;/a&gt;-based exchanges primarily deal in cryptocurrency, the concept could be applied to more traditional investments as well.&lt;/p&gt;</description><content:encoded><![CDATA[<h3 id="1-money-transfers"><strong>1. Money transfers</strong></h3>
<p>The original concept behind the invention of <a href="https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/">blockchain technology</a> is still a great application. Money transfers using <a href="https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/">blockchain</a> can be less expensive and faster than using existing money transfer services. This is especially true of cross-border transactions, which are often slow and expensive. Even in the modern U.S. financial system, money transfers between accounts can take days, while a blockchain transaction takes minutes.</p>
<h3 id="2-financial-exchanges"><strong>2. Financial exchanges</strong></h3>
<p>Many companies have popped up over the past few years offering decentralized cryptocurrency exchanges. Using <a href="https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/">blockchain</a> for exchanges allows for faster and less expensive transactions. Moreover, a <a href="https://stephenajulu.com/blog/decentralized-finance-defined/">decentralized exchange</a> doesn&rsquo;t require investors to deposit their assets with the centralized authority, which means they maintain greater control and security. While <a href="https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/">blockchain</a>-based exchanges primarily deal in cryptocurrency, the concept could be applied to more traditional investments as well.</p>
<h3 id="3-lending"><strong>3. Lending</strong></h3>
<p>Lenders can use <a href="https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/">blockchain</a> to execute collateralized loans through <a href="https://stephenajulu.com/blog/what-are-smart-contracts-smart-contracts-explained/">smart contracts</a>. Smart contracts built on the <a href="https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/">blockchain</a> allow certain events to automatically trigger things like a service payment, a margin call, full repayment of the loan, and release of collateral. As a result, loan processing is faster and less expensive, and lenders can offer better rates.</p>
<h3 id="4-insurance"><strong>4. Insurance</strong></h3>
<p>Using smart contracts on a <a href="https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/">blockchain</a> can provide greater transparency for customers and insurance providers. Recording all claims on a blockchain would keep customers from making duplicate claims for the same event. Furthermore, using smart contracts can speed up the process for claimants to receive payments.</p>
<h3 id="5-real-estate"><strong>5. Real estate</strong></h3>
<p>Real estate transactions require a ton of paperwork to verify financial information and ownership and then transfer deeds and titles to new owners. Using blockchain technology to record real estate transactions can provide a more secure and accessible means of verifying and transferring ownership. That can speed up transactions, reduce paperwork, and save money.</p>
<h3 id="6-secure-personal-information"><strong>6. Secure personal information</strong></h3>
<p>Keeping data such as your Social Security number, date of birth, and other identifying information on a public ledger (e.g., a blockchain) may actually be more secure than current systems more susceptible to hacks. Blockchain technology can be used to secure access to identifying information while improving access for those who need it in industries such as travel, healthcare, finance, and education.</p>
<h3 id="7-voting"><strong>7. Voting</strong></h3>
<p>If personally identifiable information is held on a blockchain, that puts us just one step away from also being able to vote using blockchain technology. Using blockchain technology can make sure that nobody votes twice, only eligible voters are able to vote, and votes cannot be tampered with. What&rsquo;s more, it can increase access to voting by making it as simple as pressing a few buttons on your smartphone. At the same time, the cost of running an election would substantially decrease.</p>
<h3 id="8-government-benefits"><strong>8. Government benefits</strong></h3>
<p>Another way to use digital identities stored on a blockchain is for the administration of government benefits such as welfare programs, Social Security, and Medicare. Using blockchain technology could reduce fraud and the costs of operations. Meanwhile, beneficiaries can receive funds more quickly through digital disbursement on the blockchain.</p>
<h3 id="9-securely-share-medical-information"><strong>9. Securely share medical information</strong></h3>
<p>Keeping medical records on a blockchain can allow doctors and medical professionals to obtain accurate and up-to-date information on their patients. That can ensure that patients seeing multiple doctors get the best care possible. It can also speed up the system for pulling medical records, allowing for more timely treatment in some cases. And, if insurance information is held in the database, doctors can easily verify whether a patient is insured and their treatment is covered.</p>
<h3 id="10-artist-royalties"><strong>10. Artist royalties</strong></h3>
<p>Using blockchain technology to track music and film files distributed over the internet can make sure that artists are paid for their work. Since blockchain technology was invented to ensure the same file doesn&rsquo;t exist in more than one place, it can be used to help reduce piracy. What&rsquo;s more, using a blockchain to track playbacks on streaming services and a smart contract to distribute payments can provide greater transparency and the assurance that artists receive the money they&rsquo;re owed.</p>
<h3 id="11-non-fungible-tokens"><strong>11. Non-fungible tokens</strong></h3>
<p><a href="https://stephenajulu.com/blog/what-are-nfts-non-fungible-tokens-explained/">Non-fungible tokens</a>, or NFTs, are commonly thought of as ways to own the rights to digital art. Since the blockchain prevents data from existing in two places, putting an NFT on the blockchain guarantees that only a single copy of a piece of digital art exists. That can make it like <a href="https://www.fool.com/investing/stock-market/market-sectors/communication/media-stocks/art-investment/">investing in physical art</a> but without the drawbacks of storage and maintenance.</p>
<p>NFTs can have varied applications, and ultimately they&rsquo;re a way to convey ownership of anything that can be represented by data. That could be the deed to a house, the broadcast rights to a video, or an event ticket. Anything remotely unique could be an NFT.</p>
<h3 id="12-logistics-and-supply-chain-tracking"><strong>12. Logistics and supply chain tracking</strong></h3>
<p>Using blockchain technology to track items as they move through a logistics or supply chain network can provide several advantages. First of all, it provides greater ease of communication between partners since data is available on a secure public ledger. Second, it provides greater security and data integrity since the data on the blockchain can&rsquo;t be altered. That means logistics and supply chain partners can work together more easily with greater trust that the data they&rsquo;ve provided is accurate and up to date.</p>
<h3 id="13-secure-internet-of-things-networks"><strong>13. Secure Internet of Things networks</strong></h3>
<p>The Internet of Things (IoT) is making our lives easier, but it&rsquo;s also opening the door for nefarious actors to access our data or take control of important systems. Blockchain technology can provide greater security by storing passwords and other data on a decentralized network instead of a centralized server. Additionally, it offers protection against data tampering since a blockchain is practically immutable.</p>
<h3 id="14-data-storage"><strong>14. Data storage</strong></h3>
<p>Adding blockchain technology to a data storage solution can provide greater security and integrity. Since data can be stored in a decentralized manner, it will be more difficult to hack into and wipe out all the data on the network, whereas a centralized data storage provider may only have a few points of redundancy. It also means greater access to data since access isn&rsquo;t necessarily reliant on the operations of a single company. In some cases, using blockchain for data storage may also be less expensive.</p>
<h3 id="15-gambling"><strong>15. Gambling</strong></h3>
<p>The gambling industry can use blockchain to provide several benefits to players. One of the biggest benefits of operating a casino on the blockchain is the transparency it provides to potential gamblers. Since every transaction is recorded on the blockchain, bettors can see that the games are fair and the casino pays out. Furthermore, by using blockchain, there&rsquo;s no need to provide personal information, including a bank account, which may be a hurdle for some would-be gamblers. It also provides a workaround for regulatory restrictions since players can gamble anonymously and the decentralized network isn&rsquo;t susceptible to a government shutdown.</p>
<h3 id="blockchain-is-in-its-infancy">Blockchain is in its infancy</h3>
<p>Blockchain technology has only been around for a dozen years, and businesses are still exploring new ways to apply the technology to support their operations. With the growing amount of digital data used in our lives, there&rsquo;s a growing need for the data security, access, transparency, and integrity blockchain can provide.</p>
<p>Source: <a href="https://www.fool.com/investing/stock-market/market-sectors/financials/blockchain-stocks/blockchain-applications/">The Motley Fool</a></p>
]]></content:encoded><media:content url="https://ajulu.netlify.app/images/mit-algorand-01.jpg" medium="image"/></item><item><title>What are Smart Contracts? How Do They Work? Smart Contracts Explained</title><link>https://ajulu.netlify.app/posts/what-are-smart-contracts-smart-contracts-explained/</link><pubDate>Thu, 09 Dec 2021 11:00:00 +0300</pubDate><guid>https://ajulu.netlify.app/posts/what-are-smart-contracts-smart-contracts-explained/</guid><description>&lt;p&gt;A &lt;strong&gt;smart contract&lt;/strong&gt; is a computer program or a transaction protocol that is intended to automatically execute, control, or document legally relevant events and actions according to the terms of a contract or an agreement. The objectives of smart contracts are the reduction of need in trusted intermediates, arbitrations, and enforcement costs, fraud losses, as well as the reduction of malicious and accidental exceptions.&lt;/p&gt;
&lt;p&gt;The code and the agreements contained therein exist across a distributed, decentralized &lt;a href="https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/"&gt;blockchain&lt;/a&gt; network. The code controls the execution, and transactions are trackable and irreversible.&lt;/p&gt;</description><content:encoded><![CDATA[<p>A <strong>smart contract</strong> is a computer program or a transaction protocol that is intended to automatically execute, control, or document legally relevant events and actions according to the terms of a contract or an agreement. The objectives of smart contracts are the reduction of need in trusted intermediates, arbitrations, and enforcement costs, fraud losses, as well as the reduction of malicious and accidental exceptions.</p>
<p>The code and the agreements contained therein exist across a distributed, decentralized <a href="https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/">blockchain</a> network. The code controls the execution, and transactions are trackable and irreversible.</p>
<p>Smart contracts permit trusted transactions and agreements to be carried out among disparate, anonymous parties without the need for a central authority, legal system, or external enforcement mechanism.</p>
<p>Smart contracts are made possible by <a href="https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/">blockchains</a>, a network of computers that work together to enforce rules on the network without requiring the help of an intermediary.</p>
<h3 id="how-smart-contracts-work">How smart contracts work</h3>
<p>Smart contracts work by following simple “if/when…then…” statements that are written into code on a blockchain. A network of computers executes the actions when predetermined conditions have been met and verified. These actions could include releasing funds to the appropriate parties, registering a vehicle, sending notifications, or issuing a ticket. The <a href="https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/">blockchain</a> is then updated when the transaction is completed. That means the transaction cannot be changed, and only parties who have been granted permission can see the results.</p>
<p>Within a smart contract, there can be as many stipulations as needed to satisfy the participants that the task will be completed satisfactorily. To establish the terms, participants must determine how transactions and their data are represented on the blockchain, agree on the “if/when&hellip;then…” rules that govern those transactions, explore all possible exceptions, and define a framework for resolving disputes.</p>
<p>Then the smart contract can be programmed by a developer – although increasingly, organizations that use <a href="https://stephenajulu.com/blog/what-is-blockchain-how-does-it-work-blockchain-explained/">blockchain</a> for business provide templates, web interfaces, and other online tools to simplify structuring smart contracts.</p>
<p>With conventional contracts, a document outlines the terms of a relationship between two parties, which is enforceable by law. If one Party A violates the terms, Party B can take Party A to court for not complying with the agreement. A smart contract fortifies such agreements in code so the rules are automatically enforced without courts (or any third party) getting involved.</p>
<h3 id="benefits-of-smart-contracts">Benefits of smart contracts</h3>
<ul>
<li><strong>Speed, efficiency, and accuracy:</strong> Once a condition is met, the contract is executed immediately. Because smart contracts are digital and automated, there’s no paperwork to process and no time spent reconciling errors that often result from manually filling in documents.</li>
<li><strong>Trust and transparency:</strong> Because there’s no third party involved, and because encrypted records of transactions are shared across participants, there’s no need to question whether information has been altered for personal benefit.</li>
<li><strong>Security:</strong> Blockchain transaction records are encrypted, which makes them very hard to hack. Moreover, because each record is connected to the previous and subsequent records on a distributed ledger, hackers would have to alter the entire chain to change a single record.</li>
<li><strong>Savings:</strong> Smart contracts remove the need for intermediaries to handle transactions and, by extension, their associated time delays and fees.</li>
</ul>
<h3 id="what-can-smart-contracts-be-used-for">What can smart contracts be used for?</h3>
<p>Some common ways of using smart contracts are:</p>
<ul>
<li><strong>Multisignature accounts</strong>: Funds can only be spent when a required percentage of people agree.</li>
<li><strong>Encoding financial agreements</strong>: Manage agreements between users. Say, if one person buys insurance from an insurance company, the rules of when the insurance can be redeemed can be programmed into a smart contract.</li>
<li><strong>Agreements based on the outside world</strong>: Pull in data from the outside world (financial, political, or whatever) with the help of oracles.</li>
<li><strong>Provide the third party</strong>: Similar to how a software library works, smart contracts can work with other smart contracts in a chain.</li>
<li><strong>Storage</strong>: Store information about an application, such as domain registration information or membership records. Storage in a blockchain like Ethereum is unique in that the data is immutable and can&rsquo;t be erased.</li>
</ul>
<h3 id="examples-of-blockchain-platforms-supporting-smart-contracts">Examples of <a href="https://stephenajulu.com/blog/6-cryptocurrencies-blockchains-with-massive-potential/">blockchain platforms</a> supporting smart contracts</h3>
<ul>
<li><strong>Bitcoin:</strong> Provides a Turing-incomplete script language that allows the creation of custom smart contracts on top of Bitcoin like multisignature accounts, payment channels, escrows, time locks, atomic cross-chain trading, oracles, or multi-party lottery with no operator.</li>
<li><strong>Cardano:</strong> A blockchain platform for smart contracts, using proof of stake</li>
<li><strong>Ethereum:</strong> Implements a Turing-complete language on its blockchain, a prominent smart contract framework.</li>
<li><strong>EOS.IO:</strong> A blockchain platform for smart contracts</li>
<li><strong>Tezos:</strong> A blockchain platform modifying its own set of rules with minimal disruption to the network through an on-chain governance model</li>
</ul>
]]></content:encoded><media:content url="https://ajulu.netlify.app/images/smart-contract-featured-image.png" medium="image"/></item></channel></rss>