Cryptoeconomics.Study

Cryptoeconomics.Study

  • Course
  • Community
  • Contribute
  • Languages iconEnglish
    • 中文

›1.5 Centralized Systems

Getting Started

  • Welcome
  • Development Setup
  • Course Overview

Ch1: Payment Processor

    1.0 Chapter Overview

    • Lecture

    1.1 Hashes and Signatures

    • Lecture
    • Code Challenge

    1.2 Payment Processor

    • Lecture
    • Code Challenge

    1.3 Replay Protection

    • Lecture
    • Code Challenge

    1.4 Account Model vs UTXOs

    • Lecture
    • Code Challenge

    1.5 Centralized Systems

    • Lecture
    • Code Challenge

Ch2: Network Models

    2.0 Chapter Overview

    • Lecture

    2.1 Networks and Synchrony

    • Lecture

    2.2 Double Spends

    • Lecture
    • Code Challenge

    2.3 Latency-Based Consensus

    • Lecture
    • Code Challenge

    2.4 Proof of Authority

    • Lecture
    • Code Challenge

Ch3 Proof of Work

    3.0 Chapter Overview

    • Lecture

    3.1 Decentralized Consensus and Blockchains

    • Lecture

    3.2 Bitcoin and Nakamoto Consensus

    • Lecture
    • Code Challenge

    3.3 Merkle Trees

    • Lecture
    • Code Challenge

    3.4 Game Thoery in Bitcoin

    • Lecture
    • Code Challenge

    3.5 Selfish Mining

    • Lecture
    • Code Challenge

More

  • Resources
  • Glossary
Edit

Lecture


Properties of Centralized Systems

  • We go over some common pitfalls of building systems which do not account for particularly nasty failure modes--system faults, monopoly pricing, censorship, & fraud. With cryptoeconomics we can make sure these bad things don't happen!





Slides

Google Sheets Link


Ch1.5 Overview

Benefits:

  • Easy to build and reason about.
  • Simple to scale.
  • Semi Privacy preserving. (only the operator has your data)

Downsides:

  • Single point of failure
  • If the operator is removed (eg. servers burn down, servers seized by authorities), the entire system breaks.
  • Censorship
  • The operator can censor users and change their balances, and it is very difficult for users to prove malfeasance. This is because there is no client-side validation
  • Fraud
  • Because the operator has complete control, they can steal money directly from users.
  • The only safeguard against this kind of misbehavior is the legal system & social reputation. Even these threats are not enough--see Bitconnect, Mt. Gox, and many other exchanges which have been hacked. Also, theft is often unprovable
  • These downsides limit what can be built on top of these systems.
    • Regulation and bureaucracy dictate the speed of innovation

Let’s decentralize :)

Yay blockchains


Recommended Resources

Why Decentralization Matters - Chris Dixon of a16z explains why decentralization matters for the next wave of innovation and human cooperation (with helpful diagrams!)

Why Decentralize? - A visual walk-through of a centralized payment processor and why decentralization is important.

Nightmare Market Scam - Because sometimes your paranoid dreams do come true...

Tether / Bitfinex Scam - Yes, that Tether. The one used by almost every small crypto currency exchange that simply won't die. It seems to be working very well, almost a little too well...


Last updated on 9/3/2019 by burrrata
← Code ChallengeCode Challenge →
  • Benefits:
  • Downsides:
  • Let’s decentralize :)
  • Recommended Resources
Course
Getting Started
Community
ForumContributors
More
BlogNewsletterGitHub
Copyright © 2019 Cryptoeconomics.Study