thank you . this was good. But some questions - 1. Who comes up with the mathematical puzzle to solve? 2. Or is it hard coded in the blockchain protocol? 3. if yes - is it wired to get more and more complex as the technology improves with decades? 4. Can you give me an example of a mathematical puzzle that is used to solve to give the node the power to confirm a transaction and add it to blockchain? 5. how is the 51% malicious thing will be solved?
Answer to your last question - it currently can't, but owning 51% of like a block chain is almost impossible. It means you have to have spent 100s of billions of dollars just to have the computing power to change the following block-hashes, and the cost will out weigh the reward. Therefore, if you aren't as rich as Elon Musk, and have the iq of a monkey, it's practically impossible to have 51%
This is very very well explain. I'm currently into one blockchain course but I could not understand 51% attach and proof of work till now in one short video from u Sir. Thank you so much for your time. Fly High.
51% attack means um.. if a person/group has control of more than or equal to 51% nodes in the blockchain database, then they have the power to alter the verifications i mean give their own verifications and similarly affect the blockchain
May I know 1/ who / which party posts or design these mathematical questions for miners to solve? 2/ are these mathematical questions generated randomly? Thank you
Example of mathematical calculation for concensus algo and Nonce calculation :: Find two numbers which give difference of 2 ? Those Numbers can be anything .
51% is not hacking blockchains, it's only potentially may lead to possibility of performing double spend attack. But you should also own funds for double spend.
Who is handling that full node of which you are talking about, If that full node is validating the new nodes and making the decisions then that full node can we say as an indirect central authority ??
Sir which language should we learn for indian market, as i am confused about JavaScript some told me that you should learn python for indian market. i have little bit interest in JavaScript
You are doing the task that is assigned. So you won't be able to juice out the computational power for your malicious activity. Hence your malicious activity won't be completed as it won't get enough resources to do so. Thus, you are not malicious node even if you intend to be
@@dazelmann6589 i will be assigned the task to add a block after I win the puzzle. So the task assigned is already completed and I have my whole computing power to become malicious.
If any transaction is made from A to B, then all nodes will also be able to see this transaction? How? and in what format is this secracy between A and B is stored in all other nodes ledgers?
If the transaction has occurred in a bitcoin blockchain, every other node can see the transaction. In fact, any other person can check the transaction using block explorers. However, bitcoin addresses will be 32-34 bit random numbers so nobody can trace the actual owners.
Plz upload class 12 computer science (python) syllabus chapter wise video of new session 2019 20 CBSE Plz it will helpfull for class 12 students of new batch
Because transactions is cryptographically signed messages, signed by senders private key. Easy to validate sender pub-adr & priv-sign valid or invalid. transactions are verified by nodes on receive. Unconfirmed transactions, form mempool-merkle tree for next block.
Yes... BRUCE FORCE... I knew it... MAY THE FORCE BE WITH YOU...
lmaoooo im deddddddd
This 51% attack concept is very well explained in one episode of silicon valley web series😅
Which one?
@@ADARSHSINGH-bu3cc I guess, it is the final episode of season 5
thank you . this was good. But some questions -
1. Who comes up with the mathematical puzzle to solve?
2. Or is it hard coded in the blockchain protocol?
3. if yes - is it wired to get more and more complex as the technology improves with decades?
4. Can you give me an example of a mathematical puzzle that is used to solve to give the node the power to confirm a transaction and add it to blockchain?
5. how is the 51% malicious thing will be solved?
Answer to your last question - it currently can't, but owning 51% of like a block chain is almost impossible. It means you have to have spent 100s of billions of dollars just to have the computing power to change the following block-hashes, and the cost will out weigh the reward. Therefore, if you aren't as rich as Elon Musk, and have the iq of a monkey, it's practically impossible to have 51%
I just have one question. Why are they solving questions. Can’t the node be added automatically by referencing other nodes in the blockchain
This is very very well explain. I'm currently into one blockchain course but I could not understand 51% attach and proof of work till now in one short video from u Sir. Thank you so much for your time. Fly High.
51% attack means um.. if a person/group has control of more than or equal to 51% nodes in the blockchain database, then they have the power to alter the verifications i mean give their own verifications and similarly affect the blockchain
Thanks for not making us wait for long to get a new video.
Please keep it up sir.
You skipped the concept of nonce ..just repeating the same things🤦♀️
Thanks for giving such useful information.. Sir how to reduce this computational power in pow?
May I know 1/ who / which party posts or design these mathematical questions for miners to solve? 2/ are these mathematical questions generated randomly? Thank you
This is simply the clearest explenation of blockchain. Bravo sir!
I expected more explanation of "some computing to solve puzzle".
very excited for the upcoming videos and thanks a lot sir for all the videos; u r jst awesome in all ur explanations :short but very clear
Sir really you are great.its very useful for people who don't know even the basics of blockchain and it's contents..Yours is great work.
Example of mathematical calculation for concensus algo and Nonce calculation ::
Find two numbers which give difference of 2 ?
Those Numbers can be anything .
Can you please make videos on latest technologies , like nodejs (tutorials and project) , bash programming and project , ruby ,etc
51% is not hacking blockchains, it's only potentially may lead to possibility of performing double spend attack. But you should also own funds for double spend.
Who is handling that full node of which you are talking about, If that full node is validating the new nodes and making the decisions then that full node can we say as an indirect central authority ??
blockchain is decentralized technology their isn't single authority it's multi authority network
what if someone tries to hack last block?
Who will give the puzzle to all the node in a network???
Magnificent Explanation, Awesome one Sir 👌👌
the way the music comes in at 4:38 makes it seem like hes clapping lol
But what if a malicious node won
Group can win, not a single node
Doesn't really matter, but 51% is 50%+1 if we want to be perfectly precise, or am I mistaken?
Awesome Explanation with awesome visualisation.
I request you to make a video on implementation of Blockchain in java or python.
Sir can u please make videos on competitive programming. ...?
(Please reply)
Block chain mining is profitable or not based on the present situation
So when a common person (no computing knowledge) is using blockchain and wants to make a transaction, who cracks the proof of work code for them?
Sir which language should we learn for indian market,
as i am confused about JavaScript some told me that you should learn python for indian market. i have little bit interest in JavaScript
please explain about Nonce bit more sir.
Why can't the miner that gets to mine the latest block tamper with the transaction data in this block?
if i am spending huge amount of computing power how do you know that i am not malicious
yep i have the same doubt
You are doing the task that is assigned.
So you won't be able to juice out the computational power for your malicious activity.
Hence your malicious activity won't be completed as it won't get enough resources to do so.
Thus, you are not malicious node even if you intend to be
@@dazelmann6589 i will be assigned the task to add a block after I win the puzzle. So the task assigned is already completed and I have my whole computing power to become malicious.
2:15 what are you trying to say man?👀
Sir a great doubt.blockchain is a platform like internet to connect or it also needs Internet to run
Thank You!
he still did not explain the mathematical problem of PoW. I was expecting that.
when you say transactions.....what does it actually mean?????
If any transaction is made from A to B, then all nodes will also be able to see this transaction? How? and in what format is this secracy between A and B is stored in all other nodes ledgers?
If the transaction has occurred in a bitcoin blockchain, every other node can see the transaction. In fact, any other person can check the transaction using block explorers. However, bitcoin addresses will be 32-34 bit random numbers so nobody can trace the actual owners.
so its fair to say why Bitcoin worth is so high just due to this consensus algo..
Can you please provide Java with AWS
I didn't understand from 2:12 to 2:21 that is attacks made use less can any one tell me
who issues the math problem and who validates the solution ?
Plz upload class 12 computer science (python) syllabus chapter wise video of new session 2019 20 CBSE
Plz it will helpfull for class 12 students of new batch
wait what did I listen welcome back, everyone?....xD
What if no one can resolve mathematical problems.
Please make videos on DJango
Its already there see the python playlist after video 78 the Django playlist will start
Its already there... U can find it in python playlist
Why cant the hacker just mine the last block with a malacious transaction of his own?
Because transactions is cryptographically signed messages, signed by senders private key. Easy to validate sender pub-adr & priv-sign valid or invalid.
transactions are verified by nodes on receive. Unconfirmed transactions, form mempool-merkle tree for next block.
What is malicious node I can't unterstant that one word
Node acting maliciously, forging transaction or trying to forge blocks.
We want all alogs used plz , we bug u for that.
what is this vidio about.
Hi
Mati matical
Speak too fast.
I don’t understand you
Listen carefully mate 😉