馃攳
What is Double Spending? Bitcoin Double Spending Problem Explained | Bitpanda Academy Lesson 4 - YouTube
Channel: Bitpanda
[0]
According to the Bitcoin white paper,
a double spend should never happen.
[4]
Double spending in cryptocurrencies is one
[6]
of the main reasons why crypto
currencies use block chain technology.
[10]
So what is a double spend?
[11]
And how is it prevented?
[13]
We're back with another
Bitpanda Academy video.
[16]
I'm Jessica Walker.
Let's get into the video.
[23]
Well, double spending means that the same
unit of cryptocurrency could be spent
[27]
twice, if you go to the supermarket and
with your one Euro, you purchase one soft
[32]
drink, you then can't use that same
one year to purchase a loaf of bread.
[35]
You've spent that money, but in
[37]
cryptocurrency, double spending would
destroy the trust in the cryptocurrency.
[44]
So double spending is a major computing
[47]
problem that is solved
by every cryptocurrency.
[49]
If not, the cryptocurrency in question is
[52]
essentially worthless because anyone can
duplicate a transaction with the currency
[57]
at any time. Cryptocurrencies prevent
double spending by using block chain that
[62]
combines an open ledger with
a cryptographic algorithm.
[65]
It sounds more complicated than it is.
[67]
So let me walk you through it.
[70]
So, why is double spending so important?
[72]
Well, double spending would basically
[74]
destroy the technological grounds
on which blockchain is founded.
[78]
A database that is not only tamper..Proof,
but also records every single transaction
[83]
that's ever taken place
within the network.
[85]
Therefore, it's potential to execute
[88]
double spending would fundamentally
undermine the trust in a cryptocurrency
[92]
like Bitcoin or any other
blockchain database.
[95]
And you typically see the value
decrease as a reaction to this.
[102]
So preventing double spending can actually
be explained in five simple steps.
[107]
That is many nodes, or as we like to call
computers, that communicate with each
[111]
other constantly forming
a peer-to-peer network.
[115]
If I send you one Bitcoin, that
[117]
information is sent to all nodes that
are running on Bitcoin software.
[120]
Every node on the network saves this
[122]
information that you now have one
Bitcoin and I no longer have it.
[127]
If I try to spend that bitcoin that I just
gave you again, the network rejects my
[132]
transaction because it knows that
you are the owner of that Bitcoin.
[136]
So, now we've solved the
double spending problem.
[138]
If only it was that simple. So, it's also
important to know, the networks are
[142]
designed to prevent
double spending attacks.
[145]
Cryptocurrencies need to have BFTs
built into that protocol.
[150]
BFTs mean that a computer system has to
[152]
keep functioning to a level of
satisfaction if errors or breakdowns
[156]
occur. Even if some of the
participants try to cheat the system.
[160]
In line with this ownership structures of
crypto currencies are recorded in the
[164]
blockchain, a public ledger or a high tech
database, while being simultaneously
[169]
confirmed by cryptographic
protocols and the crypto community.
[173]
As all transactions are openly recorded
[176]
and secured in an open ledger running on
thousands of computers all over the
[180]
world at the same time, everyone sees the
transactions that have already been made.
[185]
In the case of Bitcoin, transactions are
[187]
verified by miners who ensure the
transactions during the verification
[191]
process are irreversible, final and cannot
be modified by computers. Therefore,
[196]
solving the issue of
potential double spending.
[200]
So, when is a double spend possible?
[202]
Well, there is one of three ways.
[204]
Let me walk you through them.
[206]
First up, a race attack is a double spend
attack where two transactions are sent in
[211]
a quick succession and only one
is confirmed on the blockchain.
[215]
The next attack can only be performed
by a miner. This is a Finney attack.
[220]
The miner premines
[221]
a transaction into a block from one wallet
to another. Like a race attack, a finney
[226]
attack is only possible if the recipient
attack is an unconfirmed transaction.
[232]
Next, a 51% attack is when 51%
[235]
of the network actually manages to
be controlled by a single entity.
[239]
Then the entity has control of the hashing
power, giving them the opportunity to
[243]
rewrite blocks and add fraudulent
transactions to a ledger.
[247]
Sophisticated or larger cryptocurrency n
etworks are actually pretty much immune to
[251]
double spending due to their large hash
rate. So this is highly unlikely that they
[256]
be at risk with such a thing because
conducting such an attack would be so
[260]
expensive that it actually wouldn't
be worthwhile for the hacker.
[264]
So there we have covered what is double
[266]
spending, the three types of attack that
make cryptocurrency vulnerable to double
[270]
spending. And we hope you
found this video useful.
[273]
As always, be sure to subscribe to the
[275]
Bitpanda YouTube channel to not
miss any other content like this.
[278]
I'm just Jessica Walker.
You're watching Bitpanda Academy.
Most Recent Videos:
You can go back to the homepage right here: Homepage





