<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://en.bitcoin.it/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Udibr</id>
	<title>Bitcoin Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://en.bitcoin.it/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Udibr"/>
	<link rel="alternate" type="text/html" href="https://en.bitcoin.it/wiki/Special:Contributions/Udibr"/>
	<updated>2026-05-02T19:48:40Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Helping_Bitcoin&amp;diff=6342</id>
		<title>Helping Bitcoin</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Helping_Bitcoin&amp;diff=6342"/>
		<updated>2011-03-29T23:27:18Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Third: Be Wise */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;How does one &#039;Help&#039; Bitcoin, if it is a on-line currency that is run by nobody in particular?  Many people who get interested in Bitcoin are at a loss in what ways they can support this community.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==First:  Become Part of the &#039;&#039;Bitcoin Community&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
This doesn&#039;t mean &amp;quot;register on the forum and chat in #Bitcoin-OTC and do what all the other cool kids are doing&amp;quot; this means, finding a community that you would naturally be part of that accept and support bitcoin.  Be that in you workplace, on-line, 4chan, or even in your church.  The Bitcoin community is really just the people all around the world who support the use of bitcoins.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Second:  Be Creative==&lt;br /&gt;
&lt;br /&gt;
Everyone has their own particular talents and abilities; these are unique and wonderful to each person and together bring out colour of life.  The Bitcoin Community is the people in it! Find something that you can do to help, and do it!&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* If you are a super-coder then hacking the bitcoin source may be how you can best help.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Or you are into big computer rigs and high effective computing, then making the best miner may be your favourite way to help.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Some people run businesses, or trade goods in real life.  Maybe accepting Bitcoin for your services would be something you may like to do.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Not least, some people are traders, speculating in Bitcoin improves it liquidity and helps every other person using Bitcoin for real transactions.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are thousands of possible things that people can do to help Bitcoin. Each different task and part that people take on to do adds stability and flexibility to the Bitcoin economy.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Third: Be Wise==&lt;br /&gt;
&lt;br /&gt;
Everyone has limited resources, and not all people think the same way that you do.  Just in real life, don&#039;t trust strangers, do your homework, and be prepared for things to go all wrong.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Don&#039;t expect other people to behave as you &#039;say&#039; that they should behave, and then get upset when they ignore your will. Bitcoin is a big place!  An exciting place and even a dangerous place.  Bitcoin isn&#039;t a mild walk in the park, but going to the Wild West!&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=4527</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=4527"/>
		<updated>2011-02-26T22:11:37Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Putting it all together */ remove description of multiple block chains which was done before.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. A dollar bill is a piece of paper with very low intrinsic value, but which is accepted by people in exchange for valuable products and services in the real world, such as the socks Alice wants to buy. One simple thing Alice can do is to put a dollar bill in an envelope, mail it to Bob, and then wait for Bob to send the socks to her.&lt;br /&gt;
&lt;br /&gt;
Another thing Alice can do is to &amp;quot;wire&amp;quot; the money to Bob. She can do that by first giving her dollar bills to an institution called a bank, the job of which is to safe-keep Alice&#039;s dollar bills and, in return, to give Alice a written promise (called a &amp;quot;bank statement&amp;quot;) that, whenever she wishes, she can come to the bank to take back the same amount of dollar bills that she deposited. Since the money is still Alice&#039;s, she is entitled to do with it whatever she pleases, and the bank (like most banks), for a small fee, will do Alice the service of &amp;quot;giving&amp;quot; the dollar bills to Bob instead of her. This could be done by sending a person to Bob&#039;s door, with Alice&#039;s dollar bills in hand (or, better, fresh new dollar bills, if Alice&#039;s dollar bills are in bad condition), but usually it is done by Alice&#039;s bank by giving the dollar bills to Bob&#039;s bank and informing them that the money is for Bob, who will then see the amount in his next statement, or, if he is in a hurry, the next time he contacts his bank asking about how much money they have for him.&lt;br /&gt;
&lt;br /&gt;
Since banks have many customers, and bank employees require money for doing the job of talking to people and signing documents, banks in recent times have been using machines such as ATMs and web servers, that do the job of &amp;quot;talking&amp;quot; to the customers instead of paid bank employees. The job of these machines is to learn what each customer wants to do with his/her money and, to the extent that it&#039;s possible, act on what the customer wants (for example, ATMs can hand cash). In the end, there is very little human involvement in this process, most of the time. The people can always know how much money out of the money that the bank is safe-keeping is theirs, and they are confident that the numbers they see in their bank statements and on their computer screens stand for the number of dollar bills that that they can get from the bank at any time they wish. They can be so sure of that, that they can accept those numbers in the same way they accept paper dollars (this is similar to the way people started accepting paper dollars as they accepted gold or silver).&lt;br /&gt;
&lt;br /&gt;
However, the fact that machines are used does not change the structure of this system, which is, as it was, based on a central authority (the bank) which is responsible for keeping records about how much money belongs to whom. Everybody has to rely on this central authority to be honest (i.e. to say the truth about how much money they are safe-keeping in total, or at least to make the paper money available upon demand from the owners). Also, every person has to identify him/herself to this authority, by giving his/her real name, in order to be allowed to get their paper bills back or to send money to another person.&lt;br /&gt;
&lt;br /&gt;
Bitcoin is a system of owning and voluntarily transferring amounts of so-called bitcoins, in a manner similar to an on-line banking interface, but anonymously and without reliance on a central authority to decide on what is true. These bitcoins are valuable because they require the spending of real resources (CPU time and electricity) to produce, and they cannot be counterfeited or removed from a person&#039;s ownership without illicit access to his/her computer.&lt;br /&gt;
&lt;br /&gt;
==Preventing stealing==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot access other people&#039;s bitcoins by creating transactions in their names we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key along with the amount she wants to transfer, to the transaction.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, anyone who knows the public keys of both Alice and Bob can now see that Alice agreed to transfer the amount to Bob, because nobody other than Alice has Alice&#039;s private key. Alice would be foolish to give her private key to other people, as this would allow them to sign transactions in her name, removing funds from her balance.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins which belonged to her now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==Preventing double-spending==&lt;br /&gt;
This is how we guarantee that Alice cannot replicate the coin and use it in more than one transaction:&lt;br /&gt;
&lt;br /&gt;
* Details about the [[Transactions|transaction]] are [[Network|sent]] to as many other people&#039;s computers as possible.&lt;br /&gt;
* A chain of [[Blocks|blocks]] that contains a record of all transactions is collectively maintained by all computers (each has a full copy).&lt;br /&gt;
* Blocks are chained in a way that does not allow their data to be modified, without all following blocks becoming invalid.&lt;br /&gt;
* Valid blocks are computationally difficult to create and only valid blocks are allowed in the chain, containing valid transactions.&lt;br /&gt;
* When multiple continuations to this chain appear, the longest such branch is accepted as the correct one and built upon.&lt;br /&gt;
&lt;br /&gt;
When Bob sees that his transaction has been included in a block, which has been made part of the longest and constantly growing block chain, he can be confident that the transaction by Alice has been accepted by other computers as valid and has been recorded, preventing Alice from creating a second transaction with the same coin.&lt;br /&gt;
&lt;br /&gt;
In theory, Alice could generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to everyone as evidence that the coin is still hers. However, that past transaction, which contains a signature from Alice, has already been announced, has already been distributed to a very large number of computers in the bitcoin network and a block containing it has already been generated by someone (otherwise, the first receiver of the coin would have no confirmation). Since the process of generating a block is designed to take a [[Proof_of_work|long time]] and all transactions must be given in such blocks, Alice will be unable to compete with all these computers in the rate at which she can generate blocks. Bob will receive much more blocks from third persons than Alice alone will ever be able to generate, and some of the newer blocks will contain Alice&#039;s previous transaction, telling Bob that Alice has already spent her coin. And since, in the presence of multiple parallel chains of blocks of transactions, the longest such chain is accepted and built upon, the only way for Alice to pass her own version of events is to be in a position to permanently command the majority of the CPU power on the network. We assume no single person or organization can do that and therefore, as long as the people who control the majority of the CPU power are acting honestly, accepting only valid blocks and always choosing the longest chain as the one to extend, Alice&#039;s transaction will be permanently recorded and Alice will be unable to create another transaction with the same coin.&lt;br /&gt;
&lt;br /&gt;
==Anonymity==&lt;br /&gt;
Bitcoin &amp;quot;accounts&amp;quot; do not have people&#039;s names on them and do not have to correspond to individuals. Each balance is simply associated with a public-private key pair and the money &amp;quot;belongs&amp;quot; to whoever has the private key and can sign transactions with it. The transactions that are signed using those keys also don&#039;t have to include names.&lt;br /&gt;
&lt;br /&gt;
Each person can have many such key pairs, each with its own balance, and this can make it more difficult to identify which person owns what amount. In order to protect his [[Anonymity|privacy]], Bob can even generate a new public-private key pair for each individual transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address|address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
==Creation of coins==&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin from Alice is valid. Alice cannot simply generate coins instantly, out of thin air, because the appearance of a coin is a transaction that needs to be accepted by others (it must appear at some place in the chain of blocks). The way that new coins are slowly introduced is this: every computer that manages to generate a block is allowed to put one transaction there in which it gains 50 BTC, without this amount having to come from somewhere. Other computers receiving the block can easily see that the block is valid and accept that this amount belongs to the computer that generated the block. This is called a &amp;quot;proof of work&amp;quot;, because generating blocks is a [[Target|slow]] process that requires Alice to spend real resources (buy recent computer hardware, use electricity and CPU time) and in this way it can be compared to gold mining. Only with a proof of work is Alice allowed to contribute to the [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is an incentive for her to perform this computation work. In addition to this, Alice can shave a small, voluntary [[Transaction_fee|fee]] from the transactions stored in the block.&lt;br /&gt;
&lt;br /&gt;
==Putting it all together==&lt;br /&gt;
Directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
The site shows you the latest blocks in the block chain. The [[Block_chain|block chain]] contains the agreed history of all transactions that took place in the system.&lt;br /&gt;
Note how many blocks were generated in the last hour, should be around 6. Also notice the number of transactions and the total amount transfered in the last hour (last time I checked it was about 64 and 15K.)&lt;br /&gt;
This should give you an indication of how active the system is.&lt;br /&gt;
&lt;br /&gt;
Next, drill into one of these blocks.&lt;br /&gt;
Start by noticing that the block&#039;s [[hash|hash]] begins with a run of zeros, this is what made making it so difficult.&lt;br /&gt;
The computer that generated this block had to run on many &#039;&#039;Nonce&#039;&#039; values (also listed on the block&#039;s page) until it found one that generated this run of zeros.&lt;br /&gt;
Next notice the line titled &#039;&#039;Previous block&#039;&#039;, each block contains the hash of the block that came before it, this is what forms the chain of blocks.&lt;br /&gt;
Now notice all the transactions the block contains. The first transaction is the income earned by the computer that generated this block. It includes a fixed amont of coins created out of thin air and possibly fee collected from other transactions in the same block.&lt;br /&gt;
&lt;br /&gt;
Drill into any of the transactions and you will see how it is made from one or more amounts coming in and out.&lt;br /&gt;
The fact that there can be more than one incoming and outgoing amounts, allow the system to join and break amounts in any possible way allowing for any fractional amount needed (usually cents.)&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also drill too if it also had already taken place.)&lt;br /&gt;
&lt;br /&gt;
Finally you can drill into any of the  [[Address|addresses]] and see what public information is available.&lt;br /&gt;
&lt;br /&gt;
To get an impression of the amount of activity on the Bitcoin network, you might like to visit the monitoring websites [http://www.bitcoinwatch.com Bitcoin Watch] and [http://www.bitcoinmonitor.com Bitcoin Monitor]. The first has general statistics on the amount and size of transactions, while the latter shows a real-time visualization of events on the Bitcoin network.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
* Installing Bitcoin [[getting started]] &lt;br /&gt;
* [[How bitcoin works]]&lt;br /&gt;
* [[Using Bitcoin]]&lt;br /&gt;
* A gentle introduction to Bitcoin - [[BitcoinMe]]&lt;br /&gt;
* Another introduction, &#039;&#039;The Rebooting Of Money&#039;&#039; podcast is found at [[Bitcoin Money]]&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3723</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3723"/>
		<updated>2011-02-15T02:01:20Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Putting it all together */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
This is how we guarantee that Alice cannot replicate the coin and use it in more than one transaction:&lt;br /&gt;
&lt;br /&gt;
* Details about the [[Transactions|transaction]] are [[Network|sent]] to as many other people&#039;s computers as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of many transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob who can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
&lt;br /&gt;
In theory, Alice could generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as evidence that the coin is still hers. However, that past transaction, which contains a signature from Alice, has already been announced and has already been distributed to a very large number of computers in the bitcoin network. Since the process of generating a block is designed to take a [[Proof_of_work|long time]] and all transactions must be given in such blocks, Alice will be unable to compete with all these computers in the rate with which she can generate blocks. Bob will receive much more blocks from third persons than Alice alone will ever be able to generate, and some of these blocks will contain Alice&#039;s previous transaction, telling Bob that Alice has already spent her coin. And since, in the presence of multiple parallel chains of blocks of transactions, the longest such chain is taken as the truth, the only way for Alice to &amp;quot;pass&amp;quot; her own version of events is to be in a position to command the majority of the CPU power on the network. We assume nobody can do that, therefore Alice cannot undo what she did and cannot spend her coin twice.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address|address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;br /&gt;
=Putting it all together=&lt;br /&gt;
Directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
The site shows you the latest blocks in the block chain. The [[Block_chain|block chain]] contains the agreed history of all transactions that took place in the system.&lt;br /&gt;
Note how many blocks were generated in the last hour, should be around 6. Also notice the number of transactions and the total amount transfered in the last hour (last time I checked it was about 64 and 15K.)&lt;br /&gt;
This should give you an indication of how active the system is.&lt;br /&gt;
&lt;br /&gt;
Next, drill into one of these blocks.&lt;br /&gt;
Start by noticing that the block&#039;s [[hash|hash]] begins with a run of zeros, this is what made making it so difficult.&lt;br /&gt;
The computer that generated this block had to run on many &#039;&#039;Nonce&#039;&#039; values (also listed on the block&#039;s page) until it found one that generated this run of zeros.&lt;br /&gt;
Next notice the line titled &#039;&#039;Previous block&#039;&#039;, each block contains the hash of the block that came before it, this is what forms the chain of blocks.&lt;br /&gt;
Now notice all the transactions the block contains. The first transaction is the income earned by the computer that generated this block. It includes a fixed amont of coins created out of thin air and possibly fee collected from other transactions in the same block. Several blocks starting from the same block could have been generated in parallel but at the end all the computers in the network agree that only one of these blocks is accepted to be part of the block chain. Other blocks are rejected either because they didn&#039;t play according to the rules of the game or  they missed out on some of the transactions.&lt;br /&gt;
&lt;br /&gt;
Drill into any of the transactions and you will see how it is made from one or more amounts coming in and out.&lt;br /&gt;
The fact that there can be more than one incoming and outgoing amounts, allow the system to join and break amounts in any possible way allowing for any fractional amount needed (usually cents.)&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also drill too if it also had already taken place.)&lt;br /&gt;
&lt;br /&gt;
Finally you can drill into any of the  [[Address|addresses]] and see what public information is available.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3721</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3721"/>
		<updated>2011-02-15T01:59:34Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Putting it all together */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
This is how we guarantee that Alice cannot replicate the coin and use it in more than one transaction:&lt;br /&gt;
&lt;br /&gt;
* Details about the [[Transactions|transaction]] are [[Network|sent]] to as many other people&#039;s computers as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of many transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob who can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
&lt;br /&gt;
In theory, Alice could generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as evidence that the coin is still hers. However, that past transaction, which contains a signature from Alice, has already been announced and has already been distributed to a very large number of computers in the bitcoin network. Since the process of generating a block is designed to take a [[Proof_of_work|long time]] and all transactions must be given in such blocks, Alice will be unable to compete with all these computers in the rate with which she can generate blocks. Bob will receive much more blocks from third persons than Alice alone will ever be able to generate, and some of these blocks will contain Alice&#039;s previous transaction, telling Bob that Alice has already spent her coin. And since, in the presence of multiple parallel chains of blocks of transactions, the longest such chain is taken as the truth, the only way for Alice to &amp;quot;pass&amp;quot; her own version of events is to be in a position to command the majority of the CPU power on the network. We assume nobody can do that, therefore Alice cannot undo what she did and cannot spend her coin twice.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address|address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;br /&gt;
=Putting it all together=&lt;br /&gt;
Directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
The site shows you the latest blocks in the block chain. The [[Block_chain|block chain]] contains the agreed history of all transactions that took place in the system.&lt;br /&gt;
Note how many blocks were generated in the last hour, should be around 6. Also notice the number of transactions and the total amount transfered in the last hour (last time I checked it was about 64 and 15K.)&lt;br /&gt;
This should give you an indication of how active the system is.&lt;br /&gt;
&lt;br /&gt;
Next, drill into one of these blocks.&lt;br /&gt;
Start by noticing that the block&#039;s hash begins with a run of zeros, this is what made making it so difficult.&lt;br /&gt;
The computer that generated this block had to run on many &#039;&#039;Nonce&#039;&#039; values (also listed on the block&#039;s page) until it found one that generated this run of zeros.&lt;br /&gt;
Next notice the line titled &#039;&#039;Previous block&#039;&#039;, each block contains the hash of the block that came before it, this is what forms the chain of blocks.&lt;br /&gt;
Now notice all the transactions the block contains. The first transaction is the income earned by the computer that generated this block. It includes a fixed amont of coins created out of thin air and possibly fee collected from other transactions in the same block. Several blocks starting from the same block could have been generated in parallel but at the end all the computers in the network agree that only one of these blocks is accepted to be part of the block chain. Other blocks are rejected either because they didn&#039;t play according to the rules of the game or  they missed out on some of the transactions.&lt;br /&gt;
&lt;br /&gt;
Drill into any of the transactions and you will see how it is made from one or more amounts coming in and out.&lt;br /&gt;
The fact that there can be more than one incoming and outgoing amounts, allow the system to join and break amounts in any possible way allowing for any fractional amount needed (usually cents.)&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also drill too if it also had already taken place.)&lt;br /&gt;
&lt;br /&gt;
Finally you can drill into any of the  [[Address|addresses]] and see what public information is available.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3720</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3720"/>
		<updated>2011-02-15T01:59:11Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Privacy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
This is how we guarantee that Alice cannot replicate the coin and use it in more than one transaction:&lt;br /&gt;
&lt;br /&gt;
* Details about the [[Transactions|transaction]] are [[Network|sent]] to as many other people&#039;s computers as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of many transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob who can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
&lt;br /&gt;
In theory, Alice could generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as evidence that the coin is still hers. However, that past transaction, which contains a signature from Alice, has already been announced and has already been distributed to a very large number of computers in the bitcoin network. Since the process of generating a block is designed to take a [[Proof_of_work|long time]] and all transactions must be given in such blocks, Alice will be unable to compete with all these computers in the rate with which she can generate blocks. Bob will receive much more blocks from third persons than Alice alone will ever be able to generate, and some of these blocks will contain Alice&#039;s previous transaction, telling Bob that Alice has already spent her coin. And since, in the presence of multiple parallel chains of blocks of transactions, the longest such chain is taken as the truth, the only way for Alice to &amp;quot;pass&amp;quot; her own version of events is to be in a position to command the majority of the CPU power on the network. We assume nobody can do that, therefore Alice cannot undo what she did and cannot spend her coin twice.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address|address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;br /&gt;
=Putting it all together=&lt;br /&gt;
Directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
The site shows you the latest blocks in the block chain. The [[Block_chain|block chain]] contains the agreed history of all transactions that took place in the system.&lt;br /&gt;
Note how many blocks were generated in the last hour, should be around 6. Also notice the number of transactions and the total amount transfered in the last hour (last time I checked it was about 64 and 15K.)&lt;br /&gt;
This should give you an indication of how active the system is.&lt;br /&gt;
&lt;br /&gt;
Next, drill into one of these blocks.&lt;br /&gt;
Start by noticing that the block&#039;s hash begins with a run of zeros, this is what made making it so difficult.&lt;br /&gt;
The computer that generated this block had to run on many &#039;&#039;Nonce&#039;&#039; values (also listed on the block&#039;s page) until it found one that generated this run of zeros.&lt;br /&gt;
Next notice the line titled &#039;&#039;Previous block&#039;&#039;, each block contains the hash of the block that came before it, this is what forms the chain of blocks.&lt;br /&gt;
Now notice all the transactions the block contains. The first transaction is the income earned by the computer that generated this block. It includes a fixed amont of coins created out of thin air and possibly fee collected from other transactions in the same block. Several blocks starting from the same block could have been generated in parallel but at the end all the computers in the network agree that only one of these blocks is accepted to be part of the block chain. Other blocks are rejected either because they didn&#039;t play according to the rules of the game or  they missed out on some of the transactions.&lt;br /&gt;
&lt;br /&gt;
Drill into any of the transactions and you will see how it is made from one or more amounts coming in and out.&lt;br /&gt;
The fact that there can be more than one incoming and outgoing amounts, allow the system to join and break amounts in any possible way allowing for any fractional amount needed (usually cents.)&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also drill too if it also had already taken place.)&lt;br /&gt;
&lt;br /&gt;
Finally you can drill into any of the addresses and see what public information is available.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3719</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3719"/>
		<updated>2011-02-15T01:57:19Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Putting it all together */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
This is how we guarantee that Alice cannot replicate the coin and use it in more than one transaction:&lt;br /&gt;
&lt;br /&gt;
* Details about the [[Transactions|transaction]] are [[Network|sent]] to as many other people&#039;s computers as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of many transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob who can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
&lt;br /&gt;
In theory, Alice could generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as evidence that the coin is still hers. However, that past transaction, which contains a signature from Alice, has already been announced and has already been distributed to a very large number of computers in the bitcoin network. Since the process of generating a block is designed to take a [[Proof_of_work|long time]] and all transactions must be given in such blocks, Alice will be unable to compete with all these computers in the rate with which she can generate blocks. Bob will receive much more blocks from third persons than Alice alone will ever be able to generate, and some of these blocks will contain Alice&#039;s previous transaction, telling Bob that Alice has already spent her coin. And since, in the presence of multiple parallel chains of blocks of transactions, the longest such chain is taken as the truth, the only way for Alice to &amp;quot;pass&amp;quot; her own version of events is to be in a position to command the majority of the CPU power on the network. We assume nobody can do that, therefore Alice cannot undo what she did and cannot spend her coin twice.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;br /&gt;
=Putting it all together=&lt;br /&gt;
Directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
The site shows you the latest blocks in the block chain. The [[Block_chain|block chain]] contains the agreed history of all transactions that took place in the system.&lt;br /&gt;
Note how many blocks were generated in the last hour, should be around 6. Also notice the number of transactions and the total amount transfered in the last hour (last time I checked it was about 64 and 15K.)&lt;br /&gt;
This should give you an indication of how active the system is.&lt;br /&gt;
&lt;br /&gt;
Next, drill into one of these blocks.&lt;br /&gt;
Start by noticing that the block&#039;s hash begins with a run of zeros, this is what made making it so difficult.&lt;br /&gt;
The computer that generated this block had to run on many &#039;&#039;Nonce&#039;&#039; values (also listed on the block&#039;s page) until it found one that generated this run of zeros.&lt;br /&gt;
Next notice the line titled &#039;&#039;Previous block&#039;&#039;, each block contains the hash of the block that came before it, this is what forms the chain of blocks.&lt;br /&gt;
Now notice all the transactions the block contains. The first transaction is the income earned by the computer that generated this block. It includes a fixed amont of coins created out of thin air and possibly fee collected from other transactions in the same block. Several blocks starting from the same block could have been generated in parallel but at the end all the computers in the network agree that only one of these blocks is accepted to be part of the block chain. Other blocks are rejected either because they didn&#039;t play according to the rules of the game or  they missed out on some of the transactions.&lt;br /&gt;
&lt;br /&gt;
Drill into any of the transactions and you will see how it is made from one or more amounts coming in and out.&lt;br /&gt;
The fact that there can be more than one incoming and outgoing amounts, allow the system to join and break amounts in any possible way allowing for any fractional amount needed (usually cents.)&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also drill too if it also had already taken place.)&lt;br /&gt;
&lt;br /&gt;
Finally you can drill into any of the addresses and see what public information is available.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3708</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3708"/>
		<updated>2011-02-14T23:13:40Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Putting it all together */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;br /&gt;
=Putting it all together=&lt;br /&gt;
Directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
The site shows you the latest blocks in the block chain. The [[Block_chain|block chain]] contains the agreed history of all transactions that took place in the system.&lt;br /&gt;
Note how many blocks were generated in the last hour, should be around 6. Also notice the number of transactions and the total amount transfered in the last hour (last time I checked it was about 64 and 15K.)&lt;br /&gt;
This should give you an indication of how active the system is.&lt;br /&gt;
&lt;br /&gt;
Next, drill into one of these blocks.&lt;br /&gt;
Start by noticing that the block&#039;s hash begins with a run of zeros, this is what made making it so difficult.&lt;br /&gt;
The computer that generated this block had to run on many &#039;&#039;Nonce&#039;&#039; values (also listed on the block&#039;s page) until it found one that generated this run of zeros.&lt;br /&gt;
Next notice the line titled &#039;&#039;Previous block&#039;&#039;, each block contains the hash of the block that came before it, this is what forms the chain of blocks.&lt;br /&gt;
Now notice all the transactions the block contains. The first transaction is the income earned by the computer that generated this block. It includes a fixed amont of coins created out of thin air and possibly fee collected from other transactions in the same block. Several blocks starting from the same block could have been generated in parallel but at the end all the computers in the network that only one of these blocks is accepted to be part of the block chain. Other blocks are rejected either because they didn&#039;t play according to the rules of the game or  they missed out on some of the transactions.&lt;br /&gt;
&lt;br /&gt;
Drill into any of the transactions and you will see how it is made from one or more amounts coming in and out.&lt;br /&gt;
The fact that there can be more than one incoming and outgoing amounts, allow the system to join and break amounts in any possible way allowing for any fractional amount needed (usually cents.)&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also drill too if it also had already taken place.)&lt;br /&gt;
&lt;br /&gt;
Finally you can drill into any of the addresses and see what public information is available.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3701</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3701"/>
		<updated>2011-02-14T18:47:20Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Putting it all together */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;br /&gt;
=Putting it all together=&lt;br /&gt;
Directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
The site shows you the latest blocks in the block chain. The [[Block_chain|block chain]] contains the agreed history of all transactions that took place in the system.&lt;br /&gt;
Note how many blocks were generated in the last hour, should be around 6. Also notice the number of transactions and the total amount transfered in the last hour (last time I checked it was about 64 and 15K.)&lt;br /&gt;
This should give you an indication of how active the system is.&lt;br /&gt;
&lt;br /&gt;
Next, drill into one of these blocks.&lt;br /&gt;
Start by noticing that the block&#039;s hash begins with a run of zeros, this is what made making it so difficult.&lt;br /&gt;
The computer that generated this block had to run on many &#039;&#039;Nonce&#039;&#039; values (also listed on the block&#039;s page) until it found one that generated this run of zeros.&lt;br /&gt;
Next notice the line titled &#039;&#039;Previous block&#039;&#039;, each block contains the hash of the block that came before it, this is what forms the chain of blocks.&lt;br /&gt;
Now notice all the transactions the block contains. The first transaction is the income earned by the computer that generated this block. It includes 50 units created out of thin air and possibly fee collected from other transactions in the same block.&lt;br /&gt;
&lt;br /&gt;
Drill into any of the transactions and you will see how it is made from one or more amounts coming in and out.&lt;br /&gt;
The fact that there can be more than one incoming and outgoing amounts, allow the system to join and break amounts in any possible way allowing for any fractional amount needed (usually cents.)&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also drill too if it also had already taken place.)&lt;br /&gt;
&lt;br /&gt;
Finally you can drill into any of the addresses and see what public information is available.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3700</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3700"/>
		<updated>2011-02-14T18:43:45Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Putting it all together */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;br /&gt;
=Putting it all together=&lt;br /&gt;
Directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
The site shows you the latest blocks in the block chain. The [[Blocak_chain|block chain]] contains the agreed history of all transactions that took place in the system.&lt;br /&gt;
Note how many blocks were generated in the last hour, should be around 6. Also notice the number of transactions and the total amount transfered in the last hour (last time I checked it was about 64 and 15K.)&lt;br /&gt;
This should give you an indication of how active the system is.&lt;br /&gt;
&lt;br /&gt;
Next, drill into one of these blocks.&lt;br /&gt;
Start by noticing that the block&#039;s hash begins with a run of zeros, this is what made making it so difficult.&lt;br /&gt;
The computer that generated this block had to run on many &#039;&#039;Nonce&#039;&#039; values (also listed on the block&#039;s page) until it found one that generated this run of zeros.&lt;br /&gt;
Next notice the line titled &#039;&#039;Previous block&#039;&#039;, each block contains the hash of the block that came before it, this is what forms the chain of blocks.&lt;br /&gt;
Now notice all the transactions the block contains. The first transaction is the income earned by the computer that generated this block. It includes 50 units created out of thin air and possibly fee collected from other transactions in the same block.&lt;br /&gt;
&lt;br /&gt;
Drill into any of the transactions and you will see how it is made from one or more amounts coming in and out.&lt;br /&gt;
The fact that there can be more than one incoming and outgoing amounts, allow the system to join and break amounts in any possible way allowing for any fractional amount needed (usually cents.)&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also drill too if it also had already taken place.)&lt;br /&gt;
&lt;br /&gt;
Finally you can drill into any of the addresses and see what public information is available.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3699</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3699"/>
		<updated>2011-02-14T18:42:40Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Putting it all together */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;br /&gt;
=Putting it all together=&lt;br /&gt;
Directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
The site shows you the latest blocks in the block chain. The block chain contains the agreed history of all transactions that took place in the system.&lt;br /&gt;
Note how many blocks were generated in the last hour, should be around 6. Also notice the number of transactions and the total amount transfered in the last hour (last time I checked it was about 64 and 15K.)&lt;br /&gt;
This should give you an indication of how active the system is.&lt;br /&gt;
&lt;br /&gt;
Next, drill into one of these blocks.&lt;br /&gt;
Start by noticing that the block&#039;s hash begins with a run of zeros, this is what made making it so difficult.&lt;br /&gt;
The computer that generated this block had to run on many &#039;&#039;Nonce&#039;&#039; values (also listed on the block&#039;s page) until it found one that generated this run of zeros.&lt;br /&gt;
Next notice the line titled &#039;&#039;Previous block&#039;&#039;, each block contains the hash of the block that came before it, this is what forms the chain of blocks.&lt;br /&gt;
Now notice all the transactions the block contains. The first transaction is the income earned by the computer that generated this block. It includes 50 units created out of thin air and possibly fee collected from other transactions in the same block.&lt;br /&gt;
&lt;br /&gt;
Drill into any of the transactions and you will see how it is made from one or more amounts coming in and out.&lt;br /&gt;
The fact that there can be more than one incoming and outgoing amounts, allow the system to join and break amounts in any possible way allowing for any fractional amount needed (usually cents.)&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also drill too if it also had already taken place.)&lt;br /&gt;
&lt;br /&gt;
Finally you can drill into any of the addresses and see what public information is available.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3677</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3677"/>
		<updated>2011-02-14T02:27:36Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Putting it all together */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;br /&gt;
=Putting it all together=&lt;br /&gt;
Instead of reading endless wikipages you can directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
The site shows you the latest blocks in the block chain which are the latest recording of transactions taking place.&lt;br /&gt;
Note how many blocks were generated in the last hour, should be around 6. Also notice the total amount transfered in the last hour (last time I checked it was about 15K.)&lt;br /&gt;
This the volume of the bitcoin system and it gives you an indication of how active the system is.&lt;br /&gt;
&lt;br /&gt;
Next, drill into one of these blocks.&lt;br /&gt;
Start by noticing that the block&#039;s hash begins with a run of zeros, this is what made making it so difficult.&lt;br /&gt;
The computer that generated this block had to run on many &#039;&#039;Nonce&#039;&#039; values (also listed on the block&#039;s page) until it found one that generated this run of zeros.&lt;br /&gt;
Next notice the line titled &#039;&#039;Previous block&#039;&#039;, each block contains the hash of the block that came before it, this is what forms the chain of blocks.&lt;br /&gt;
Now notice all the transactions the block contains. The first transaction is the income earned by the computer that generated this block. It includes 50 units created out of thin air and possibly fee collected from other transactions in the same block.&lt;br /&gt;
&lt;br /&gt;
Drill into any of the transactions and you will see how it is made from one or more amounts coming in and out.&lt;br /&gt;
The fact that there can be more than one incoming and outgoing amounts, allow the system to join and break amounts in any possible way allowing for any fractional amount needed (usually cents.)&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also drill too if it also had already taken place.)&lt;br /&gt;
&lt;br /&gt;
Finally you can drill into any of the addresses and see what public information is available.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3676</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3676"/>
		<updated>2011-02-14T02:25:20Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Putting it all together */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;br /&gt;
=Putting it all together=&lt;br /&gt;
Instead of reading endless wikipages you can directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
The site shows you the latest blocks in the block chain which are the latest recording of transactions taking place.&lt;br /&gt;
Note how many blocks were generated in the last hour, should be around 6. Also notice the total amount transfered in the last hour (last time I checked it was about 15K.)&lt;br /&gt;
This the volume of the bitcoin system and it gives you an indication of how active the system is.&lt;br /&gt;
&lt;br /&gt;
Next, drill into one of these blocks.&lt;br /&gt;
Start by noticing that the block&#039;s hash begins with a run of zeros, this is what made making it so difficult.&lt;br /&gt;
The computer that generated this block had to run on many &#039;&#039;Nonce&#039;&#039; values (also listed on the block&#039;s page) until it found one that generated this run of zeros.&lt;br /&gt;
Next notice the line titled &#039;&#039;Previous block&#039;&#039;, each block contains the hash of the block that came before it, this is what forms the chain of blocks.&lt;br /&gt;
Now notice all the transactions the block contains.&lt;br /&gt;
&lt;br /&gt;
Drill into any of the transactions and you will see how it is made from one or more amounts coming in and out.&lt;br /&gt;
The fact that there can be more than one incoming and outgoing amounts, allow the system to join and break amounts in any possible way allowing for any fractional amount needed (usually cents.)&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also drill too if it also had already taken place.)&lt;br /&gt;
&lt;br /&gt;
Finally you can drill into any of the addresses and see what public information is available.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3675</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3675"/>
		<updated>2011-02-14T02:17:19Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Putting it all in action */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;br /&gt;
=Putting it all together=&lt;br /&gt;
Instead of reading endless wikipages you can directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
The site shows you the latest blocks in the block chain which are the latest recording of transactions taking place.&lt;br /&gt;
Note how many blocks were generated in the last hour, should be around 6.&lt;br /&gt;
Drill into one of these blocks.&lt;br /&gt;
Start by noticing that the block&#039;s hash begins with a run of zeros, this is what made making it so difficult. The computer that generated this block had to run on many &#039;&#039;Nonce&#039;&#039; values (also listed on the block&#039;s page) until it found one that generated this run of zeros.&lt;br /&gt;
Next notice the line titled &#039;&#039;Previous block&#039;&#039;, each block contains the hash of the block that came before it, this is what forms the chain of blocks.&lt;br /&gt;
Now notice all the transactions the block contains.&lt;br /&gt;
Drill into any of the transactions and you will see how it is made from amounts coming in and out.&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also drill too if it also had already taken place.)&lt;br /&gt;
Finally you can drill into the address and see what public information is available.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3674</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3674"/>
		<updated>2011-02-14T02:17:01Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Putting it all in action */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;br /&gt;
=Putting it all in action=&lt;br /&gt;
Instead of reading endless wikipages you can directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
The site shows you the latest blocks in the block chain which are the latest recording of transactions taking place.&lt;br /&gt;
Note how many blocks were generated in the last hour, should be around 6.&lt;br /&gt;
Drill into one of these blocks.&lt;br /&gt;
Start by noticing that the block&#039;s hash begins with a run of zeros, this is what made making it so difficult. The computer that generated this block had to run on many &#039;&#039;Nonce&#039;&#039; values (also listed on the block&#039;s page) until it found one that generated this run of zeros.&lt;br /&gt;
Next notice the line titled &#039;&#039;Previous block&#039;&#039;, each block contains the hash of the block that came before it, this is what forms the chain of blocks.&lt;br /&gt;
Now notice all the transactions the block contains.&lt;br /&gt;
Drill into any of the transactions and you will see how it is made from amounts coming in and out.&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also drill too if it also had already taken place.)&lt;br /&gt;
Finally you can drill into the address and see what public information is available.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3673</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3673"/>
		<updated>2011-02-14T02:15:13Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Putting it all in action */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;br /&gt;
=Putting it all in action=&lt;br /&gt;
Instead of reading endless wikipages you can directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
The site shows you the latest blocks in the block chain which are the latest recording of transactions taking place.&lt;br /&gt;
Note how many blocks were generated in the last hour, should be around 6.&lt;br /&gt;
Drill into one of these blocks.&lt;br /&gt;
Start by noticing that the block&#039;s hash begins with a run of zeros, this is what made making it so difficult. The computer that generated this block had to run on many &#039;&#039;Nonce&#039;&#039; values (also listed on the block&#039;s page) until it found one that generated this run of zeros. Next notice the previous block, each block contains the hash of the block that came before it, this is what forms the chain of blocks.&lt;br /&gt;
Now notice all the transactions the block contains.&lt;br /&gt;
Drill into any of the transactions and you will see how it is made from amounts coming in and out.&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also drill too if it also had already taken place.)&lt;br /&gt;
Finally you can drill into the address and see what public information is available.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3672</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3672"/>
		<updated>2011-02-14T02:08:03Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Putting it all in action */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;br /&gt;
=Putting it all in action=&lt;br /&gt;
Instead of reading endless wikipages you can directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
Start with the latest blocks in the block chain.&lt;br /&gt;
Drill into one of them to see all the transactions it contains.&lt;br /&gt;
Drill into any of the transactions and you will see how it is made from amounts coming in and out.&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also drill too if it also had already taken place.)&lt;br /&gt;
Finally you can drill into the address and see what public information is available.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3671</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3671"/>
		<updated>2011-02-14T02:06:19Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Putting it all in action */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;br /&gt;
=Putting it all in action=&lt;br /&gt;
Instead of reading endless wikipages you can directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer].&lt;br /&gt;
Start with the latest blocks in the block chain. Drilling into one of them to see all the transactions it contains.&lt;br /&gt;
Drill into any of the transactions and you will see how it is made from amounts coming in and out.&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can also drill too if it also had already taken place.)&lt;br /&gt;
Finally you can drill into the address and see what public information is available.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3670</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3670"/>
		<updated>2011-02-14T02:03:19Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Creation of coins */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;br /&gt;
=Putting it all in action=&lt;br /&gt;
Instead of reading endless wikipages you can directly experience the system in action by visting [http://blockexplorer.com/ Bitcoin Block Explorer] web site.&lt;br /&gt;
You start with the latest real blocks in the block chain. Drilling into one of these blocks, shows you all the transactions that were signed by it.&lt;br /&gt;
Drilling into one of the transactions shows you how each transaction is made from amounts coming in and out.&lt;br /&gt;
Each incoming amount is a transaction from the past (which you can also drill to) coming from an address of someone&lt;br /&gt;
and each outgoing amount is addressed to someone and will be part of a future transaction (which you can drill too if it also had already taken place.)&lt;br /&gt;
Finally you can drill into the address and see what public information is available.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=API_reference_(JSON-RPC)&amp;diff=3668</id>
		<title>API reference (JSON-RPC)</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=API_reference_(JSON-RPC)&amp;diff=3668"/>
		<updated>2011-02-14T01:08:42Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Controlling Bitcoin */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Controlling Bitcoin ==&lt;br /&gt;
&lt;br /&gt;
Run &#039;&#039;bitcoind&#039;&#039; or &#039;&#039;bitcoin -server&#039;&#039;. You can control it via the command-line or by HTTP-JSON-RPC commands.&lt;br /&gt;
&lt;br /&gt;
Under Linux create ~/.bitcoin/bitcoin.conf. Under Windows create bitcoin.conf in the Bitcoin data directory. Under OS X in /Users/udi/Library/Application\ Support/Bitcoin/&lt;br /&gt;
&lt;br /&gt;
bitcoin.conf:&lt;br /&gt;
  rpcuser=myusername&lt;br /&gt;
  rpcpassword=secretpassword&lt;br /&gt;
&lt;br /&gt;
Now run:&lt;br /&gt;
  $ ./bitcoind&lt;br /&gt;
  bitcoin server starting&lt;br /&gt;
  $ ./bitcoind help&lt;br /&gt;
&lt;br /&gt;
A [[Original Bitcoin client/API Calls list|list of RPC calls]] will be shown.&lt;br /&gt;
&lt;br /&gt;
  $ ./bitcoind getbalance&lt;br /&gt;
  2000.00000&lt;br /&gt;
&lt;br /&gt;
== JSON-RPC ==&lt;br /&gt;
&lt;br /&gt;
Running Bitcoin with the -server argument (or running bitcoind) tells it to function as a [http://json-rpc.org/wiki/specification|HTTP JSON-RPC] server, but &lt;br /&gt;
[http://en.wikipedia.org/wiki/Basic_access_authentication|HTTP Basic access authentication] must be used when communicating with it, and, for security, by default, the server only accepts connections from other processes on the same machine.  If your HTTP or JSON library requires you to specify which &#039;realm&#039; is authenticated, use &#039;jsonrpc&#039;.&lt;br /&gt;
&lt;br /&gt;
Bitcoin supports SSL (https) JSON-RPC connections beginning with version 0.3.14.  See the [[Enabling SSL on original client daemon|rpcssl wiki page]] for setup instructions and a list of all bitcoin.conf configuration options.&lt;br /&gt;
&lt;br /&gt;
To access the server you should find a [http://json-rpc.org/wiki/implementations|suitable library] for your language.&lt;br /&gt;
&lt;br /&gt;
== Python ==&lt;br /&gt;
&lt;br /&gt;
For Python, [http://json-rpc.org/wiki/python-json-rpc python-jsonrpc] is perfect.  Python-jsonrpc automatically generates Python methods corresponding to the functions above.  For example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;python&amp;quot;&amp;gt;&lt;br /&gt;
  from jsonrpc import ServiceProxy&lt;br /&gt;
  &lt;br /&gt;
  access = ServiceProxy(&amp;quot;http://user:password@127.0.0.1:8332&amp;quot;)&lt;br /&gt;
  access.getinfo()&lt;br /&gt;
  access.listreceivedbyaddress(6)&lt;br /&gt;
  access.sendtoaddress(&amp;quot;11yEmxiMso2RsFVfBcCa616npBvGgxiBX&amp;quot;, 10)&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== PHP ==&lt;br /&gt;
&lt;br /&gt;
The [https://github.com/mikegogulski/bitcoin-php bitcoin-php] library provides an abstraction layer around a JSON-RPC-HTTP(S) connection to Bitcoin. Example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;php&amp;quot;&amp;gt;&lt;br /&gt;
  include_once(&amp;quot;bitcoin.inc&amp;quot;);&lt;br /&gt;
  $bitcoin_client = new BitcoinClient(&amp;quot;https&amp;quot;, &amp;quot;username&amp;quot;, &amp;quot;password&amp;quot;, &amp;quot;localhost&amp;quot;, 8332, &amp;quot;/path/to/server.cert&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
  if (TRUE !== ($fault = $bitcoin_client-&amp;gt;can_connect()))&lt;br /&gt;
    die(&#039;Connection to Bitcoin failed. Fault: &#039;, $fault);&lt;br /&gt;
&lt;br /&gt;
  try {&lt;br /&gt;
    $address = $bitcoin_client-&amp;gt;query(&amp;quot;getnewaddress&amp;quot;, $label);&lt;br /&gt;
  } catch (BitcoinClientException $e) {&lt;br /&gt;
    die(&#039;getnewaddress failed. Fault: &#039;, $e-&amp;gt;getMessage());&lt;br /&gt;
  }&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The [http://jsonrpcphp.org/ JSON-RPC PHP] library also makes it very easy to connect to Bitcoin.  For example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;php&amp;quot;&amp;gt;&lt;br /&gt;
  require_once &#039;jsonRPCClient.php&#039;;&lt;br /&gt;
  &lt;br /&gt;
  $bitcoin = new jsonRPCClient(&#039;http://user:pass@127.0.0.1:8332/&#039;);&lt;br /&gt;
   &lt;br /&gt;
  echo &amp;quot;&amp;lt;pre&amp;gt;\n&amp;quot;;&lt;br /&gt;
  print_r($bitcoin-&amp;gt;getinfo()); echo &amp;quot;\n&amp;quot;;&lt;br /&gt;
  echo &amp;quot;Received: &amp;quot;.$bitcoin-&amp;gt;getreceivedbylabel(&amp;quot;Your Address&amp;quot;).&amp;quot;\n&amp;quot;;&lt;br /&gt;
  echo &amp;quot;&amp;lt;/pre&amp;gt;&amp;quot;;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Java ==&lt;br /&gt;
&lt;br /&gt;
The easiest way to tell Java to use HTTP Basic authentication is to set a default Authenticator:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
  final String rpcuser =&amp;quot;...&amp;quot;;&lt;br /&gt;
  final String rpcpassword =&amp;quot;...&amp;quot;;&lt;br /&gt;
  &lt;br /&gt;
  Authenticator.setDefault(new Authenticator() {&lt;br /&gt;
      protected PasswordAuthentication getPasswordAuthentication() {&lt;br /&gt;
          return new PasswordAuthentication (rpcuser, rpcpassword.toCharArray());&lt;br /&gt;
      }&lt;br /&gt;
  });&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Once that is done, any JSON-RPC library for Java (or ordinary URL POSTs) may be used to communicate with the Bitcoin server.&lt;br /&gt;
&lt;br /&gt;
== Perl ==&lt;br /&gt;
&lt;br /&gt;
The JSON::RPC package from CPAN can be used to communicate with Bitcoin.  You must set the client&#039;s credentials; for example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;perl&amp;quot;&amp;gt;&lt;br /&gt;
  use JSON::RPC::Client;&lt;br /&gt;
  use Data::Dumper;&lt;br /&gt;
   &lt;br /&gt;
  my $client = new JSON::RPC::Client;&lt;br /&gt;
  &lt;br /&gt;
  $client-&amp;gt;ua-&amp;gt;credentials(&lt;br /&gt;
     &#039;localhost:8332&#039;, &#039;jsonrpc&#039;, &#039;user&#039; =&amp;gt; &#039;password&#039;  # REPLACE WITH YOUR bitcoin.conf rpcuser/rpcpassword&lt;br /&gt;
      );&lt;br /&gt;
  &lt;br /&gt;
  my $uri = &#039;http://localhost:8332/&#039;;&lt;br /&gt;
  my $obj = {&lt;br /&gt;
      method  =&amp;gt; &#039;getinfo&#039;,&lt;br /&gt;
      params  =&amp;gt; [],&lt;br /&gt;
   };&lt;br /&gt;
   &lt;br /&gt;
  my $res = $client-&amp;gt;call( $uri, $obj );&lt;br /&gt;
   &lt;br /&gt;
  if ($res){&lt;br /&gt;
      if ($res-&amp;gt;is_error) { print &amp;quot;Error : &amp;quot;, $res-&amp;gt;error_message; }&lt;br /&gt;
      else { print Dumper($res-&amp;gt;result); }&lt;br /&gt;
  } else {&lt;br /&gt;
      print $client-&amp;gt;status_line;&lt;br /&gt;
  }&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== .NET (C#) ==&lt;br /&gt;
The communication with rpc service can be achieved using the standard httprequest/response objects.&lt;br /&gt;
A library for serialising and deserialising Json will make your life a lot easier:&lt;br /&gt;
&lt;br /&gt;
* JayRock for .NET 4.0&lt;br /&gt;
* Json.Net for .NET 2.0 and above &lt;br /&gt;
&lt;br /&gt;
The following example uses Json.Net:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;csharp&amp;quot;&amp;gt;&lt;br /&gt;
 HttpWebRequest webRequest = (HttpWebRequest)WebRequest.Create(&amp;quot;http://localhost.:8332&amp;quot;);&lt;br /&gt;
 webRequest.Credentials = new NetworkCredential(&amp;quot;user&amp;quot;, &amp;quot;pwd&amp;quot;);&lt;br /&gt;
 /// important, otherwise the service can&#039;t desirialse your request properly&lt;br /&gt;
 webRequest.ContentType = &amp;quot;application/json-rpc&amp;quot;;&lt;br /&gt;
 webRequest.Method = &amp;quot;POST&amp;quot;;&lt;br /&gt;
  &lt;br /&gt;
 JObject joe = new JObject();&lt;br /&gt;
 joe.Add(new JProperty(&amp;quot;jsonrpc&amp;quot;, &amp;quot;1.0&amp;quot;));&lt;br /&gt;
 joe.Add(new JProperty(&amp;quot;id&amp;quot;, &amp;quot;1&amp;quot;));&lt;br /&gt;
 joe.Add(new JProperty(&amp;quot;method&amp;quot;, Method));&lt;br /&gt;
 // params is a collection values which the method requires..&lt;br /&gt;
 if (Params.Keys.Count == 0)&lt;br /&gt;
 {&lt;br /&gt;
  joe.Add(new JProperty(&amp;quot;params&amp;quot;, new JArray()));&lt;br /&gt;
 }&lt;br /&gt;
 else&lt;br /&gt;
 {&lt;br /&gt;
     JArray props = new JArray();&lt;br /&gt;
     // add the props in the reverse order!&lt;br /&gt;
     for (int i = Params.Keys.Count - 1; i &amp;gt;= 0; i--)&lt;br /&gt;
     {&lt;br /&gt;
        .... // add the params&lt;br /&gt;
     }&lt;br /&gt;
     joe.Add(new JProperty(&amp;quot;params&amp;quot;, props));&lt;br /&gt;
     }&lt;br /&gt;
  &lt;br /&gt;
     // serialize json for the request&lt;br /&gt;
     string s = JsonConvert.SerializeObject(joe);&lt;br /&gt;
     byte[] byteArray = Encoding.UTF8.GetBytes(s);&lt;br /&gt;
     webRequest.ContentLength = byteArray.Length;&lt;br /&gt;
     Stream dataStream = webRequest.GetRequestStream();&lt;br /&gt;
     dataStream.Write(byteArray, 0, byteArray.Length);&lt;br /&gt;
     dataStream.Close();&lt;br /&gt;
     &lt;br /&gt;
     &lt;br /&gt;
     WebResponse webResponse = webRequest.GetResponse();&lt;br /&gt;
     &lt;br /&gt;
     ... // deserialze the response&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Command line (cURL) ==&lt;br /&gt;
&lt;br /&gt;
You can also send commands and see results using [http://curl.haxx.se/ cURL] or some other command-line HTTP-fetching utility; for example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
  curl --user user --data-binary &#039;{&amp;quot;jsonrpc&amp;quot;: &amp;quot;1.0&amp;quot;, &amp;quot;id&amp;quot;:&amp;quot;curltest&amp;quot;, &amp;quot;method&amp;quot;: &amp;quot;getinfo&amp;quot;, &amp;quot;params&amp;quot;: [] }&#039; &lt;br /&gt;
    -H &#039;content-type: text/plain;&#039; http://127.0.0.1:8332/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You will be prompted for your rpcpassword, and then will see something like:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;javascript&amp;quot;&amp;gt;&lt;br /&gt;
  {&amp;quot;result&amp;quot;:{&amp;quot;balance&amp;quot;:0.000000000000000,&amp;quot;blocks&amp;quot;:59952,&amp;quot;connections&amp;quot;:48,&amp;quot;proxy&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;generate&amp;quot;:false,&lt;br /&gt;
     &amp;quot;genproclimit&amp;quot;:-1,&amp;quot;difficulty&amp;quot;:16.61907875185736,&amp;quot;error&amp;quot;:null,&amp;quot;id&amp;quot;:&amp;quot;curltest&amp;quot;}&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Articles using content from the old wiki]]&lt;br /&gt;
[[Category:Technical]]&lt;br /&gt;
[[Category:Developer]]&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3666</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3666"/>
		<updated>2011-02-14T00:57:31Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Privacy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his [[Anonymity|privacy]], Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3664</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3664"/>
		<updated>2011-02-13T23:54:24Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Creation of coins */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions. The coin received by Alice is used as an incentive for the computation work she performed in addition Alice can shave a small [[Transaction_fee|fee]] from the transactions stored in the block and use it as an additional incentive.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3663</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3663"/>
		<updated>2011-02-13T23:48:03Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Creation of coins */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created block is part of a [[Block_chain|chain of blocks]] that together keep a record of all transactions.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3662</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3662"/>
		<updated>2011-02-13T23:45:00Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Creation of coins */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a [[Target|slow]] process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created work helps validate the entire bitcoin system.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3661</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3661"/>
		<updated>2011-02-13T23:43:05Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Creation of coins */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
To guarantee that an eavesdropper, Eve, cannot replicate bitcoins we use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system, each person, such as Alice and Bob, has a pair of public and private keys which he/she stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the transaction to give some of his bitcoins to somebody else, but any one can validate the signature using the user’s public key. The bitcoins, in Alice&#039;s hands, already contain a signature by whoever sent her the amount.&lt;br /&gt;
&lt;br /&gt;
* Bob sends his public key to Alice.&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content.&lt;br /&gt;
* Alice signs the transaction with her secret private key.&lt;br /&gt;
&lt;br /&gt;
As a result, the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob.&lt;br /&gt;
&lt;br /&gt;
Later on, when Bob will transfer the same coins to Charley, he will do the same thing: receive from Charley his public key, add a new transaction to the coin&#039;s chain of transactions and sign it with his (Bob) private key. But only Bob can do this, because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public key that is already in the chain.&lt;br /&gt;
&lt;br /&gt;
Eve cannot change who the coins belong to by replacing Bob’s public key with her public key, because Alice signed the transfer to Bob using her private key, declaring that the coins now belong to Bob, and Alice&#039;s private key is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that [[Target|manages]] to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a slow process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created work helps validate the entire bitcoin system.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3656</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3656"/>
		<updated>2011-02-13T23:17:51Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* By the sender */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;plainlinks&amp;quot; style=&amp;quot;border: 1px solid red; width: 100%; background-color: #fcc; padding: 10px; margin-bottom: 25px;&amp;quot;&amp;gt;This page requires copy editing and improvement.&amp;lt;/div&amp;gt;&lt;br /&gt;
Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an eavesdropper==&lt;br /&gt;
How do we guaranty that an eavesdropper, Eve, does not replicate the bit coin:&lt;br /&gt;
* We will use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system a person has a pair of public and private keys which Bob stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the coins content, but any one can validate the signature using the user’s public key. The coin content, in Alice hands, already contains Alice public key&lt;br /&gt;
* Bob sends his public key to Alice&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content&lt;br /&gt;
* Alice signs the entire coin’s content with her secret private key.&lt;br /&gt;
As a result the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob. Later on when Bob will transfer the same coin to Charley he will do the same thing: receive from Charley his public key, add it to the coin’s content and sign the new coin with his (Bob) private key. But only Bob can do this last step because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public that is already imprinted in the coin’s content. Eve can’t modify the coin’s content and replace Bob’s public key with her public key because the coin was signed with Alice private key that is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is [[Network|sent]] to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a slow process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created work helps validate the entire bitcoin system.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:FAQ&amp;diff=3651</id>
		<title>Help:FAQ</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:FAQ&amp;diff=3651"/>
		<updated>2011-02-13T21:04:32Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* What are bitcoins? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Here you will find answers to the most commonly asked questions.&lt;br /&gt;
&lt;br /&gt;
== General ==&lt;br /&gt;
=== What are bitcoins? ===&lt;br /&gt;
Bitcoins or coins are the main unit of currency of the Bitcoin system. A commonly used shorthand for bitcoins is “BTC” to refer to a price in Bitcoins (eg: “100 BTC”)&lt;br /&gt;
A Bitcoin isn&#039;t actually a &#039;thing&#039; you can point at. It is just a number associated with a [[Address|Bitcoin Address]]. See also an [[Introduction|easy intro]] to bitcoin.&lt;br /&gt;
&lt;br /&gt;
=== How are new Bitcoins created? ===&lt;br /&gt;
&lt;br /&gt;
[[File:total_bitcoins_over_time_graph.png|thumb|Number of bitcoins over time, assuming a perfect 10-minute interval.]]&lt;br /&gt;
New coins are generated by a network node each time it finds the solution to a certain mathematical problem (i.e. creates a new [[block]]), which is difficult to perform and can demonstrate a [[proof of work]].  The reward for solving a block is [[controlled inflation|automatically adjusted]] so that in the first 4 years of the Bitcoin network, 10,500,000 coins will be created. The amount is halved each 4 years, so it will be 5,250,000 in years 4-8, 2,625,000 in years 8-12 and so on. Thus the total number of coins will approach 21,000,000 over time.&lt;br /&gt;
&lt;br /&gt;
In addition, built into the network is a system that attempts to allocate new coins in blocks about every 10 minutes, on average, somewhere on the network.  As the number of people who are using the Bitcoin software to attempt to generate these new coins changes, the difficulty of creating new coins changes.  This happens in a manner that is agreed upon by the network as a whole, based upon the time taken to generate the previous 2016 blocks.  The difficulty is therefore related to the average computing resources devoted to generate these new coins over the time it took to create these previous blocks.  The likelihood of somebody &amp;quot;discovering&amp;quot; one of these blocks is based on the computer they are using compared to all of the computers also generating blocks on the network.&lt;br /&gt;
&lt;br /&gt;
=== What&#039;s the current total amount of Bitcoins in existence?  ===&lt;br /&gt;
&lt;br /&gt;
[http://blockexplorer.com/q/totalbc Current count]&lt;br /&gt;
&lt;br /&gt;
The number of blocks times the coin value of a block is the number of coins in existence. The coin value of a block is 50 BTC for each of the first 210,000 blocks, 25 BTC for the next 210,000 blocks, then 12.5 BTC, 6.25 BTC and so on.&lt;br /&gt;
&lt;br /&gt;
=== How divisible are Bitcoins?  ===&lt;br /&gt;
&lt;br /&gt;
Technically, a Bitcoin can be divided down to 8 decimals using existing data structures, so 0.00000001 BTC is the smallest amount currently possible.  Discussions about and ideas for ways to provide for even smaller quantities of Bitcoins may be created in the future if the need for them ever arises. For convenience, the program currently accepts only 2 decimal places as quantities smaller than 0.01 BTC are considered of trivial value and are usually used only to attack the network.&lt;br /&gt;
&lt;br /&gt;
=== How does the halving work when the number gets really small? ===&lt;br /&gt;
&lt;br /&gt;
The reward will go from 0.00000001 to 0. Then no more coins will likely be created.  &lt;br /&gt;
&lt;br /&gt;
The calculation is done as a right bitwise shift of a 64-bit signed integer. The integer is equal to the number of Bitcoins * 100,000,000. This is how all Bitcoin balances/values are stored internally.&lt;br /&gt;
&lt;br /&gt;
Keep in mind that using current rules this will take nearly 100 years before it becomes an issue and Bitcoins may change considerably before that happens.&lt;br /&gt;
&lt;br /&gt;
=== How long will it take to generate all the coins? ===&lt;br /&gt;
&lt;br /&gt;
The last block that will generate coins will be block #6,929,999. This should be generated around year 2140. Then the total number of coins in circulation will remain static at 20,999,999.9769.&lt;br /&gt;
&lt;br /&gt;
Even if the allowed precision is expanded from the current 8 decimals, the total BTC in circulation will always be slightly below 21 million (assuming everything else stays the same). For example, with 16 decimals of precision, the end total BTC would be 20999999.999999999496.&lt;br /&gt;
&lt;br /&gt;
=== If no more coins are going to be generated, will more blocks be created? ===&lt;br /&gt;
&lt;br /&gt;
Absolutely!  Even before the creation of coins ends, the use of [[transaction fee|transaction fees]] will likely make creating new blocks more valuable from the fees than the new coins being created.  When coin generation ends, what will sustain the ability to use bitcoins will be these fees entirely.  There will be blocks generated after block #6,929,999, assuming that people are still using Bitcoins at that time.&lt;br /&gt;
&lt;br /&gt;
== Networking ==&lt;br /&gt;
&lt;br /&gt;
=== Do I need to configure my firewall to run bitcoin? ===&lt;br /&gt;
&lt;br /&gt;
Bitcoin will connect to other nodes, usually on tcp port 8333. You will need to allow outgoing TCP connections to port 8333 if you want to allow your bitcoin client to connect to many nodes. Bitcoin will also try to connect to IRC (tcp port 6667) to meet other nodes to connect to.&lt;br /&gt;
&lt;br /&gt;
If you want to restrict your firewall rules to a few ips and/or don&#039;t want to allow IRC connection, you can find stable nodes in the [[Fallback Nodes|fallback nodes list]].&lt;br /&gt;
&lt;br /&gt;
[[fr:FAQ]]&lt;br /&gt;
{{fromold|bitcoins}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Technical]]&lt;br /&gt;
[[Category:Vocabulary]]&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:FAQ&amp;diff=3632</id>
		<title>Help:FAQ</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:FAQ&amp;diff=3632"/>
		<updated>2011-02-13T18:59:32Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* What&amp;#039;s the current total amount of Bitcoins in existence? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Here you will find answers to the most commonly asked questions.&lt;br /&gt;
&lt;br /&gt;
== General ==&lt;br /&gt;
=== What are bitcoins? ===&lt;br /&gt;
Bitcoins or coins are the main unit of currency of the Bitcoin system. A commonly used shorthand for bitcoins is “BTC” to refer to a price in Bitcoins (eg: “100 BTC”)&lt;br /&gt;
A Bitcoin isn&#039;t actually a &#039;thing&#039; you can point at. It is just a number associated with a [[Address|Bitcoin Address]]. See also an [[Easy_Intro|easy intro]] to bitcoin.&lt;br /&gt;
&lt;br /&gt;
=== How are new Bitcoins created? ===&lt;br /&gt;
&lt;br /&gt;
[[File:total_bitcoins_over_time_graph.png|thumb|Number of bitcoins over time, assuming a perfect 10-minute interval.]]&lt;br /&gt;
New coins are generated by a network node each time it finds the solution to a certain mathematical problem (i.e. creates a new [[block]]), which is difficult to perform and can demonstrate a [[proof of work]].  The reward for solving a block is [[controlled inflation|automatically adjusted]] so that in the first 4 years of the Bitcoin network, 10,500,000 coins will be created. The amount is halved each 4 years, so it will be 5,250,000 in years 4-8, 2,625,000 in years 8-12 and so on. Thus the total number of coins will approach 21,000,000 over time.&lt;br /&gt;
&lt;br /&gt;
In addition, built into the network is a system that attempts to allocate new coins in blocks about every 10 minutes, on average, somewhere on the network.  As the number of people who are using the Bitcoin software to attempt to generate these new coins changes, the difficulty of creating new coins changes.  This happens in a manner that is agreed upon by the network as a whole, based upon the time taken to generate the previous 2016 blocks.  The difficulty is therefore related to the average computing resources devoted to generate these new coins over the time it took to create these previous blocks.  The likelihood of somebody &amp;quot;discovering&amp;quot; one of these blocks is based on the computer they are using compared to all of the computers also generating blocks on the network.&lt;br /&gt;
&lt;br /&gt;
=== What&#039;s the current total amount of Bitcoins in existence?  ===&lt;br /&gt;
&lt;br /&gt;
[http://blockexplorer.com/q/totalbc Current count]&lt;br /&gt;
&lt;br /&gt;
The number of blocks times the coin value of a block is the number of coins in existence. The coin value of a block is 50 BTC for each of the first 210,000 blocks, 25 BTC for the next 210,000 blocks, then 12.5 BTC, 6.25 BTC and so on.&lt;br /&gt;
&lt;br /&gt;
=== How divisible are Bitcoins?  ===&lt;br /&gt;
&lt;br /&gt;
Technically, a Bitcoin can be divided down to 8 decimals using existing data structures, so 0.00000001 BTC is the smallest amount currently possible.  Discussions about and ideas for ways to provide for even smaller quantities of Bitcoins may be created in the future if the need for them ever arises. For convenience, the program currently accepts only 2 decimal places as quantities smaller than 0.01 BTC are considered of trivial value and are usually used only to attack the network.&lt;br /&gt;
&lt;br /&gt;
=== How does the halving work when the number gets really small? ===&lt;br /&gt;
&lt;br /&gt;
The reward will go from 0.00000001 to 0. Then no more coins will likely be created.  &lt;br /&gt;
&lt;br /&gt;
The calculation is done as a right bitwise shift of a 64-bit signed integer. The integer is equal to the number of Bitcoins * 100,000,000. This is how all Bitcoin balances/values are stored internally.&lt;br /&gt;
&lt;br /&gt;
Keep in mind that using current rules this will take nearly 100 years before it becomes an issue and Bitcoins may change considerably before that happens.&lt;br /&gt;
&lt;br /&gt;
=== How long will it take to generate all the coins? ===&lt;br /&gt;
&lt;br /&gt;
The last block that will generate coins will be block #6,929,999. This should be generated around year 2140. Then the total number of coins in circulation will remain static at 20,999,999.9769.&lt;br /&gt;
&lt;br /&gt;
Even if the allowed precision is expanded from the current 8 decimals, the total BTC in circulation will always be slightly below 21 million (assuming everything else stays the same). For example, with 16 decimals of precision, the end total BTC would be 20999999.999999999496.&lt;br /&gt;
&lt;br /&gt;
=== If no more coins are going to be generated, will more blocks be created? ===&lt;br /&gt;
&lt;br /&gt;
Absolutely!  Even before the creation of coins ends, the use of [[transaction fee|transaction fees]] will likely make creating new blocks more valuable from the fees than the new coins being created.  When coin generation ends, what will sustain the ability to use bitcoins will be these fees entirely.  There will be blocks generated after block #6,929,999, assuming that people are still using Bitcoins at that time.&lt;br /&gt;
&lt;br /&gt;
== Networking ==&lt;br /&gt;
&lt;br /&gt;
=== Do I need to configure my firewall to run bitcoin? ===&lt;br /&gt;
&lt;br /&gt;
Bitcoin will connect to other nodes, usually on tcp port 8333. You will need to allow outgoing TCP connections to port 8333 if you want to allow your bitcoin client to connect to many nodes. Bitcoin will also try to connect to IRC (tcp port 6667) to meet other nodes to connect to.&lt;br /&gt;
&lt;br /&gt;
If you want to restrict your firewall rules to a few ips and/or don&#039;t want to allow IRC connection, you can find stable nodes in the [[Fallback Nodes|fallback nodes list]].&lt;br /&gt;
&lt;br /&gt;
[[fr:FAQ]]&lt;br /&gt;
{{fromold|bitcoins}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Technical]]&lt;br /&gt;
[[Category:Vocabulary]]&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:FAQ&amp;diff=3631</id>
		<title>Help:FAQ</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:FAQ&amp;diff=3631"/>
		<updated>2011-02-13T18:36:43Z</updated>

		<summary type="html">&lt;p&gt;Udibr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Here you will find answers to the most commonly asked questions.&lt;br /&gt;
&lt;br /&gt;
== General ==&lt;br /&gt;
=== What are bitcoins? ===&lt;br /&gt;
Bitcoins or coins are the main unit of currency of the Bitcoin system. A commonly used shorthand for bitcoins is “BTC” to refer to a price in Bitcoins (eg: “100 BTC”)&lt;br /&gt;
A Bitcoin isn&#039;t actually a &#039;thing&#039; you can point at. It is just a number associated with a [[Address|Bitcoin Address]]. See also an [[Easy_Intro|easy intro]] to bitcoin.&lt;br /&gt;
&lt;br /&gt;
=== How are new Bitcoins created? ===&lt;br /&gt;
&lt;br /&gt;
[[File:total_bitcoins_over_time_graph.png|thumb|Number of bitcoins over time, assuming a perfect 10-minute interval.]]&lt;br /&gt;
New coins are generated by a network node each time it finds the solution to a certain mathematical problem (i.e. creates a new [[block]]), which is difficult to perform and can demonstrate a [[proof of work]].  The reward for solving a block is [[controlled inflation|automatically adjusted]] so that in the first 4 years of the Bitcoin network, 10,500,000 coins will be created. The amount is halved each 4 years, so it will be 5,250,000 in years 4-8, 2,625,000 in years 8-12 and so on. Thus the total number of coins will approach 21,000,000 over time.&lt;br /&gt;
&lt;br /&gt;
In addition, built into the network is a system that attempts to allocate new coins in blocks about every 10 minutes, on average, somewhere on the network.  As the number of people who are using the Bitcoin software to attempt to generate these new coins changes, the difficulty of creating new coins changes.  This happens in a manner that is agreed upon by the network as a whole, based upon the time taken to generate the previous 2016 blocks.  The difficulty is therefore related to the average computing resources devoted to generate these new coins over the time it took to create these previous blocks.  The likelihood of somebody &amp;quot;discovering&amp;quot; one of these blocks is based on the computer they are using compared to all of the computers also generating blocks on the network.&lt;br /&gt;
&lt;br /&gt;
=== What&#039;s the current total amount of Bitcoins in existence?  ===&lt;br /&gt;
&lt;br /&gt;
[http://blockexplorer.com/q/totalbc Current count]&lt;br /&gt;
&lt;br /&gt;
The number of blocks times the coin value of a block is the number of coins in existence. The coin value of a block is 50 BTC for each of the first 210,000 blocks, 25 BTC for the next 210,000 blocks, then 12.5 BTC, 7.25 BTC and so on.&lt;br /&gt;
&lt;br /&gt;
=== How divisible are Bitcoins?  ===&lt;br /&gt;
&lt;br /&gt;
Technically, a Bitcoin can be divided down to 8 decimals using existing data structures, so 0.00000001 BTC is the smallest amount currently possible.  Discussions about and ideas for ways to provide for even smaller quantities of Bitcoins may be created in the future if the need for them ever arises. For convenience, the program currently accepts only 2 decimal places as quantities smaller than 0.01 BTC are considered of trivial value and are usually used only to attack the network.&lt;br /&gt;
&lt;br /&gt;
=== How does the halving work when the number gets really small? ===&lt;br /&gt;
&lt;br /&gt;
The reward will go from 0.00000001 to 0. Then no more coins will likely be created.  &lt;br /&gt;
&lt;br /&gt;
The calculation is done as a right bitwise shift of a 64-bit signed integer. The integer is equal to the number of Bitcoins * 100,000,000. This is how all Bitcoin balances/values are stored internally.&lt;br /&gt;
&lt;br /&gt;
Keep in mind that using current rules this will take nearly 100 years before it becomes an issue and Bitcoins may change considerably before that happens.&lt;br /&gt;
&lt;br /&gt;
=== How long will it take to generate all the coins? ===&lt;br /&gt;
&lt;br /&gt;
The last block that will generate coins will be block #6,929,999. This should be generated around year 2140. Then the total number of coins in circulation will remain static at 20,999,999.9769.&lt;br /&gt;
&lt;br /&gt;
Even if the allowed precision is expanded from the current 8 decimals, the total BTC in circulation will always be slightly below 21 million (assuming everything else stays the same). For example, with 16 decimals of precision, the end total BTC would be 20999999.999999999496.&lt;br /&gt;
&lt;br /&gt;
=== If no more coins are going to be generated, will more blocks be created? ===&lt;br /&gt;
&lt;br /&gt;
Absolutely!  Even before the creation of coins ends, the use of [[transaction fee|transaction fees]] will likely make creating new blocks more valuable from the fees than the new coins being created.  When coin generation ends, what will sustain the ability to use bitcoins will be these fees entirely.  There will be blocks generated after block #6,929,999, assuming that people are still using Bitcoins at that time.&lt;br /&gt;
&lt;br /&gt;
== Networking ==&lt;br /&gt;
&lt;br /&gt;
=== Do I need to configure my firewall to run bitcoin? ===&lt;br /&gt;
&lt;br /&gt;
Bitcoin will connect to other nodes, usually on tcp port 8333. You will need to allow outgoing TCP connections to port 8333 if you want to allow your bitcoin client to connect to many nodes. Bitcoin will also try to connect to IRC (tcp port 6667) to meet other nodes to connect to.&lt;br /&gt;
&lt;br /&gt;
If you want to restrict your firewall rules to a few ips and/or don&#039;t want to allow IRC connection, you can find stable nodes in the [[Fallback Nodes|fallback nodes list]].&lt;br /&gt;
&lt;br /&gt;
[[fr:FAQ]]&lt;br /&gt;
{{fromold|bitcoins}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Technical]]&lt;br /&gt;
[[Category:Vocabulary]]&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3625</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3625"/>
		<updated>2011-02-13T16:41:17Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* By the sender */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an Eavesdropper==&lt;br /&gt;
How do we guaranty that an eavesdropper, Eve, does not replicate the bit coin:&lt;br /&gt;
* We will use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system a person has a pair of public and private keys which Bob stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the coins content, but any one can validate the signature using the user’s public key. The coin content, in Alice hands, already contains Alice public key&lt;br /&gt;
* Bob sends his public key to Alice&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content&lt;br /&gt;
* Alice signs the entire coin’s content with her secret private key.&lt;br /&gt;
As a result the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob. Later on when Bob will transfer the same coin to Charley he will do the same thing: receive from Charley his public key, add it to the coin’s content and sign the new coin with his (Bob) private key. But only Bob can do this last step because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public that is already imprinted in the coin’s content. Eve can’t modify the coin’s content and replace Bob’s public key with her public key because the coin was signed with Alice private key that is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is sent to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a [[Proof_of_work|long time]] and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a slow process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created work helps validate the entire bitcoin system.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3623</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3623"/>
		<updated>2011-02-13T16:36:05Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* By the sender */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an Eavesdropper==&lt;br /&gt;
How do we guaranty that an eavesdropper, Eve, does not replicate the bit coin:&lt;br /&gt;
* We will use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system a person has a pair of public and private keys which Bob stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the coins content, but any one can validate the signature using the user’s public key. The coin content, in Alice hands, already contains Alice public key&lt;br /&gt;
* Bob sends his public key to Alice&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content&lt;br /&gt;
* Alice signs the entire coin’s content with her secret private key.&lt;br /&gt;
As a result the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob. Later on when Bob will transfer the same coin to Charley he will do the same thing: receive from Charley his public key, add it to the coin’s content and sign the new coin with his (Bob) private key. But only Bob can do this last step because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public that is already imprinted in the coin’s content. Eve can’t modify the coin’s content and replace Bob’s public key with her public key because the coin was signed with Alice private key that is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* Details about the [[Transactions|transaction]] is sent to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a long time and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a slow process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created work helps validate the entire bitcoin system.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3622</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3622"/>
		<updated>2011-02-13T16:34:23Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* By the sender */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an Eavesdropper==&lt;br /&gt;
How do we guaranty that an eavesdropper, Eve, does not replicate the bit coin:&lt;br /&gt;
* We will use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system a person has a pair of public and private keys which Bob stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the coins content, but any one can validate the signature using the user’s public key. The coin content, in Alice hands, already contains Alice public key&lt;br /&gt;
* Bob sends his public key to Alice&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content&lt;br /&gt;
* Alice signs the entire coin’s content with her secret private key.&lt;br /&gt;
As a result the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob. Later on when Bob will transfer the same coin to Charley he will do the same thing: receive from Charley his public key, add it to the coin’s content and sign the new coin with his (Bob) private key. But only Bob can do this last step because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public that is already imprinted in the coin’s content. Eve can’t modify the coin’s content and replace Bob’s public key with her public key because the coin was signed with Alice private key that is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* The transaction is sent to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Blocks|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a long time and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a slow process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created work helps validate the entire bitcoin system.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3621</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3621"/>
		<updated>2011-02-13T16:33:16Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* By the sender */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an Eavesdropper==&lt;br /&gt;
How do we guaranty that an eavesdropper, Eve, does not replicate the bit coin:&lt;br /&gt;
* We will use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system a person has a pair of public and private keys which Bob stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the coins content, but any one can validate the signature using the user’s public key. The coin content, in Alice hands, already contains Alice public key&lt;br /&gt;
* Bob sends his public key to Alice&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content&lt;br /&gt;
* Alice signs the entire coin’s content with her secret private key.&lt;br /&gt;
As a result the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob. Later on when Bob will transfer the same coin to Charley he will do the same thing: receive from Charley his public key, add it to the coin’s content and sign the new coin with his (Bob) private key. But only Bob can do this last step because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public that is already imprinted in the coin’s content. Eve can’t modify the coin’s content and replace Bob’s public key with her public key because the coin was signed with Alice private key that is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* The transaction is sent to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Block|block]], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a long time and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a slow process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created work helps validate the entire bitcoin system.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3620</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3620"/>
		<updated>2011-02-13T16:33:05Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* By the sender */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an Eavesdropper==&lt;br /&gt;
How do we guaranty that an eavesdropper, Eve, does not replicate the bit coin:&lt;br /&gt;
* We will use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system a person has a pair of public and private keys which Bob stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the coins content, but any one can validate the signature using the user’s public key. The coin content, in Alice hands, already contains Alice public key&lt;br /&gt;
* Bob sends his public key to Alice&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content&lt;br /&gt;
* Alice signs the entire coin’s content with her secret private key.&lt;br /&gt;
As a result the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob. Later on when Bob will transfer the same coin to Charley he will do the same thing: receive from Charley his public key, add it to the coin’s content and sign the new coin with his (Bob) private key. But only Bob can do this last step because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public that is already imprinted in the coin’s content. Eve can’t modify the coin’s content and replace Bob’s public key with her public key because the coin was signed with Alice private key that is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* The transaction is sent to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back a [[Block|block], which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a long time and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a slow process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created work helps validate the entire bitcoin system.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3619</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3619"/>
		<updated>2011-02-13T16:30:37Z</updated>

		<summary type="html">&lt;p&gt;Udibr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [[Main_Page|bitcoin]]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an Eavesdropper==&lt;br /&gt;
How do we guaranty that an eavesdropper, Eve, does not replicate the bit coin:&lt;br /&gt;
* We will use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system a person has a pair of public and private keys which Bob stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the coins content, but any one can validate the signature using the user’s public key. The coin content, in Alice hands, already contains Alice public key&lt;br /&gt;
* Bob sends his public key to Alice&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content&lt;br /&gt;
* Alice signs the entire coin’s content with her secret private key.&lt;br /&gt;
As a result the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob. Later on when Bob will transfer the same coin to Charley he will do the same thing: receive from Charley his public key, add it to the coin’s content and sign the new coin with his (Bob) private key. But only Bob can do this last step because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public that is already imprinted in the coin’s content. Eve can’t modify the coin’s content and replace Bob’s public key with her public key because the coin was signed with Alice private key that is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* The transaction is sent to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back block, which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a long time and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a slow process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created work helps validate the entire bitcoin system.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3618</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3618"/>
		<updated>2011-02-13T16:29:47Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* By an Eavesdropper */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [http://www.bitcoin.org bitcoin]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an Eavesdropper==&lt;br /&gt;
How do we guaranty that an eavesdropper, Eve, does not replicate the bit coin:&lt;br /&gt;
* We will use a [[Wikipedia:Public-key_cryptography|public key system]] to make digital signatures. In this system a person has a pair of public and private keys which Bob stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the coins content, but any one can validate the signature using the user’s public key. The coin content, in Alice hands, already contains Alice public key&lt;br /&gt;
* Bob sends his public key to Alice&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content&lt;br /&gt;
* Alice signs the entire coin’s content with her secret private key.&lt;br /&gt;
As a result the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob. Later on when Bob will transfer the same coin to Charley he will do the same thing: receive from Charley his public key, add it to the coin’s content and sign the new coin with his (Bob) private key. But only Bob can do this last step because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public that is already imprinted in the coin’s content. Eve can’t modify the coin’s content and replace Bob’s public key with her public key because the coin was signed with Alice private key that is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* The transaction is sent to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back block, which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a long time and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a slow process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created work helps validate the entire bitcoin system.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3617</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3617"/>
		<updated>2011-02-13T16:28:27Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* By an Eavesdropper */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [http://www.bitcoin.org bitcoin]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an Eavesdropper==&lt;br /&gt;
How do we guaranty that an eavesdropper, Eve, does not replicate the bit coin:&lt;br /&gt;
* We will use a [http://en.wikipedia.org/wiki/Public-key_cryptography public key system] to make digital signatures. In this system a person has a pair of public and private keys which Bob stores in a safe [[Wallet|wallet]]. Only the user with his secret private key can sign a document, such as the coins content, but any one can validate the signature using the user’s public key. The coin content, in Alice hands, already contains Alice public key&lt;br /&gt;
* Bob sends his public key to Alice&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content&lt;br /&gt;
* Alice signs the entire coin’s content with her secret private key.&lt;br /&gt;
As a result the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob. Later on when Bob will transfer the same coin to Charley he will do the same thing: receive from Charley his public key, add it to the coin’s content and sign the new coin with his (Bob) private key. But only Bob can do this last step because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public that is already imprinted in the coin’s content. Eve can’t modify the coin’s content and replace Bob’s public key with her public key because the coin was signed with Alice private key that is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* The transaction is sent to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back block, which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a long time and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a slow process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created work helps validate the entire bitcoin system.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3616</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3616"/>
		<updated>2011-02-13T16:26:57Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* Privacy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [http://www.bitcoin.org bitcoin]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an Eavesdropper==&lt;br /&gt;
How do we guaranty that an eavesdropper, Eve, does not replicate the bit coin:&lt;br /&gt;
* We will use a [http://en.wikipedia.org/wiki/Public-key_cryptography public key system] to make digital signatures. In this system a person has a pair of public and private keys. Only the user with his secret private key can sign a document, such as the coins content, but any one can validate the signature using the user’s public key. The coin content, in Alice hands, already contains Alice public key&lt;br /&gt;
* Bob sends his public key to Alice&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content&lt;br /&gt;
* Alice signs the entire coin’s content with her secret private key.&lt;br /&gt;
As a result the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob. Later on when Bob will transfer the same coin to Charley he will do the same thing: receive from Charley his public key, add it to the coin’s content and sign the new coin with his (Bob) private key. But only Bob can do this last step because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public that is already imprinted in the coin’s content. Eve can’t modify the coin’s content and replace Bob’s public key with her public key because the coin was signed with Alice private key that is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* The transaction is sent to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back block, which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a long time and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. The only thing David will know is the [[Address]] of Bob which is a shortened (hashed) version of his public key.&lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a slow process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created work helps validate the entire bitcoin system.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3615</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3615"/>
		<updated>2011-02-13T16:17:30Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* By an Eavesdropper */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [http://www.bitcoin.org bitcoin]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an Eavesdropper==&lt;br /&gt;
How do we guaranty that an eavesdropper, Eve, does not replicate the bit coin:&lt;br /&gt;
* We will use a [http://en.wikipedia.org/wiki/Public-key_cryptography public key system] to make digital signatures. In this system a person has a pair of public and private keys. Only the user with his secret private key can sign a document, such as the coins content, but any one can validate the signature using the user’s public key. The coin content, in Alice hands, already contains Alice public key&lt;br /&gt;
* Bob sends his public key to Alice&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content&lt;br /&gt;
* Alice signs the entire coin’s content with her secret private key.&lt;br /&gt;
As a result the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob. Later on when Bob will transfer the same coin to Charley he will do the same thing: receive from Charley his public key, add it to the coin’s content and sign the new coin with his (Bob) private key. But only Bob can do this last step because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public that is already imprinted in the coin’s content. Eve can’t modify the coin’s content and replace Bob’s public key with her public key because the coin was signed with Alice private key that is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* The transaction is sent to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back block, which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a long time and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. However, Bob will have to keep the private key of each coin he received until he spends it. &lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a slow process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created work helps validate the entire bitcoin system.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3614</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3614"/>
		<updated>2011-02-13T16:16:23Z</updated>

		<summary type="html">&lt;p&gt;Udibr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Alice is far away from Bob and wants to buy his [http://www.grasshillalpacas.com/alpacaproductsforbitcoinoffer.html Alpaca socks]. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [http://www.bitcoin.org bitcoin]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an Eavesdropper==&lt;br /&gt;
How do we guaranty that an eavesdropper, Eve, does not replicate the bit coin:&lt;br /&gt;
* We will use a public key system to make digital signatures. In this system a person has a pair of public and private keys. Only the user with his secret private key can sign a document, such as the coins content, but any one can validate the signature using the user’s public key. The coin content, in Alice hands, already contains Alice public key&lt;br /&gt;
* Bob sends his public key to Alice&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content&lt;br /&gt;
* Alice signs the entire coin’s content with her secret private key.&lt;br /&gt;
As a result the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob. Later on when Bob will transfer the same coin to Charley he will do the same thing: receive from Charley his public key, add it to the coin’s content and sign the new coin with his (Bob) private key. But only Bob can do this last step because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public that is already imprinted in the coin’s content. Eve can’t modify the coin’s content and replace Bob’s public key with her public key because the coin was signed with Alice private key that is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* The transaction is sent to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back block, which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a long time and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. However, Bob will have to keep the private key of each coin he received until he spends it. &lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a slow process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created work helps validate the entire bitcoin system.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3613</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3613"/>
		<updated>2011-02-13T16:14:50Z</updated>

		<summary type="html">&lt;p&gt;Udibr: /* By an Eavesdropper */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Alice is far away from Bob and wants to buy his Alpaca socks. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [http://www.bitcoin.org bitcoin]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an Eavesdropper==&lt;br /&gt;
How do we guaranty that an eavesdropper, Eve, does not replicate the bit coin:&lt;br /&gt;
* We will use a public key system to make digital signatures. In this system a person has a pair of public and private keys. Only the user with his secret private key can sign a document, such as the coins content, but any one can validate the signature using the user’s public key. The coin content, in Alice hands, already contains Alice public key&lt;br /&gt;
* Bob sends his public key to Alice&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content&lt;br /&gt;
* Alice signs the entire coin’s content with her secret private key.&lt;br /&gt;
As a result the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob. Later on when Bob will transfer the same coin to Charley he will do the same thing: receive from Charley his public key, add it to the coin’s content and sign the new coin with his (Bob) private key. But only Bob can do this last step because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public that is already imprinted in the coin’s content. Eve can’t modify the coin’s content and replace Bob’s public key with her public key because the coin was signed with Alice private key that is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* The transaction is sent to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back block, which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a long time and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. However, Bob will have to keep the private key of each coin he received until he spends it. &lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a slow process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created work helps validate the entire bitcoin system.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3612</id>
		<title>Help:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help:Introduction&amp;diff=3612"/>
		<updated>2011-02-13T16:13:28Z</updated>

		<summary type="html">&lt;p&gt;Udibr: Created page with &amp;quot;Alice is far away from Bob and wants to buy his Alpaca socks. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail hi...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Alice is far away from Bob and wants to buy his Alpaca socks. In return, she wants to send him a dollar. She can use something like paypal with its limitations or she can mail him a dollar bill. But a dollar bill is just an item with very low intrinsic value that is accepted by Alice and Bob to represent something significant in the real world like socks. Instead of mailing the bill itself, Alice could have emailed a number, like the serial number imprinted on her dollar bill, and save on stamps and time, we will call this number a [http://www.bitcoin.org bitcoin]. The bitcoin is used as a unit of account to measure the value of the socks Bob gave to Alice. Once Bob receives the bitcoin he would like to know that there is a good chance that he will be able to use the bitcoin to buy other products of similar value in the immediate future (means of exchange) or in the long term future (asset) and he needs to know if there are any unwanted side effects to using it.&lt;br /&gt;
&lt;br /&gt;
For the transaction to take place, Alice needs to have a bitcoin to start with and Bob needs to decide if he accepts the bitcoin in return for his socks. The value of a bitcoin is affected:&lt;br /&gt;
* The bitcoin can’t be replicated (counterfeited) and used again by Alice or someone else eavesdropping to the transaction.&lt;br /&gt;
* Alice can’t create more bitcoins out off thin air without limit&lt;br /&gt;
* However, there should be some mechanism that introduces new bitcoins out of thin air into the system, otherwise there would not be enough bitcoins to make it popular by many people. But this mechanism should be agreed by all (fare) and it should be slow otherwise bitcoins cannot be used to store asset.&lt;br /&gt;
* Bob needs to know that it will be relatively easy for him to find other people that will accept his bitcoin in the same way that he did, this is a circular problem that requires other people to go through the same decision process &lt;br /&gt;
Bob may consider the following side effects:&lt;br /&gt;
* Bob needs to know that it will be hard to steal or confiscate his bitcoin once he received it.&lt;br /&gt;
* Like regular cash, Bob will like to know that his privacy is kept, and other people that will receive the bitcoin in the future will not be able to personally track him.&lt;br /&gt;
&lt;br /&gt;
=Counterfeiting=&lt;br /&gt;
==By an Eavesdropper==&lt;br /&gt;
How do we guaranty that an eavesdropped, Eve, does not replicate the bit coin:&lt;br /&gt;
* We will use a public key system to make digital signatures. In this system a person has a pair of public and private keys. Only the user with his secret private key can sign a document, such as the coins content, but any one can validate the signature using the user’s public key. The coin content, in Alice hands, already contains Alice public key&lt;br /&gt;
* Bob sends his public key to Alice&lt;br /&gt;
* Alice adds Bob’s public key to the coin’s content&lt;br /&gt;
* Alice signs the entire coin’s content with her secret private key.&lt;br /&gt;
As a result the new coin, that Eve may be intercepting, contains the public key of both Alice and Bob. Later on when Bob will transfer the same coin to Charley he will do the same thing: receive from Charley his public key, add it to the coin’s content and sign the new coin with his (Bob) private key. But only Bob can do this last step because only Bob has the private key which is necessary for signing and which is the only private key to match Bob’s public that is already imprinted in the coin’s content. Eve can’t modify the coin’s content and replace Bob’s public key with her public key because the coin was signed with Alice private key that is kept secret from Eve. So if Charley accepts that the original coin was in the hands of Alice he will also accept the fact that this coin was later passed to Bob and now Bob is passing this same coin to him.&lt;br /&gt;
&lt;br /&gt;
==By the sender==&lt;br /&gt;
How to guaranty that Alice does not replicate the coin and use it in more than one transaction:&lt;br /&gt;
* The transaction is sent to as many other people (to their computers) as possible&lt;br /&gt;
* At least one of the computers sends back block, which is just a large document that includes details of the transaction and other unrelated transactions. The block is sent to as many other people as possible.&lt;br /&gt;
* Eventually the block reaches Bob that can validate that his transaction was recorded and no other transaction for the same coin was made in the past.&lt;br /&gt;
* In theory, Alice can generate a spoofed block in which her past usage of the same coin does not appear and try to send this block to Bob as an evidence that the coin is OK. But the process of generating a block is designed to take a long time and she is not likely to generate it on time. Keep in mind that Bob is using a new public key for each transaction so Alice can’t prepare in advance. In addition, many other computers are working in parallel to generate an honest block and one of them is more likely to finish before her. In any case, eventually competing blocks will arrive to Bob that will indication that Alice’s coin was already in use.&lt;br /&gt;
&lt;br /&gt;
=Privacy=&lt;br /&gt;
In order to protect his privacy, Bob can generate a new public-private key pair for each transaction. So David receiving the coin from Charley will not be able to identify who is the second person in the list of transactions. However, Bob will have to keep the private key of each coin he received until he spends it. &lt;br /&gt;
&lt;br /&gt;
=Creation of coins=&lt;br /&gt;
As we saw, both Bob and Charley need to verify that the original coin that Alice started with is valid. Alice can’t just generate coins out of thin air because the appearance of a coin is also a transaction that needs to be accepted by others (in their blocks.) The only way she can cause a coin to appear in a block is to generate the block herself, and this is exactly how new coins are slowly introduced: every computer that manages to generate a block is allowed to put one transaction in it in which it receives one coin. Other computers receiving the block can validate that only one coin is created and they can then accept this new coin as valid. Generating blocks is a slow process that requires Alice to spend computer hardware, electricity bill and time and it can be compared to gold mining. It is also a constructive work because the created work helps validate the entire bitcoin system.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=Help_talk:Introduction&amp;diff=3611</id>
		<title>Help talk:Introduction</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=Help_talk:Introduction&amp;diff=3611"/>
		<updated>2011-02-13T16:12:23Z</updated>

		<summary type="html">&lt;p&gt;Udibr: Created page with &amp;quot;I would like to create this page, describing bitcoin in an easy manner.&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I would like to create this page, describing bitcoin in an easy manner.&lt;/div&gt;</summary>
		<author><name>Udibr</name></author>
	</entry>
</feed>