1 00:00:00,990 --> 00:00:08,310 Now in general unless you're using cash when you make a payment this payment is processed and is transferred 2 00:00:08,310 --> 00:00:14,360 from one account to another using one or more financial institutions or banks. 3 00:00:14,400 --> 00:00:19,850 The same goes when you go online and buy something even if you buy with PayPal or some other method. 4 00:00:19,920 --> 00:00:24,900 Again there is usually one or more financial institution to process that payment. 5 00:00:25,800 --> 00:00:32,140 So as you can see this is a centralized structure where one entity is managing payments. 6 00:00:32,160 --> 00:00:38,550 And we're also interested in that entity to manage our security the security of our account and our 7 00:00:38,550 --> 00:00:39,690 privacy. 8 00:00:39,690 --> 00:00:46,770 Now no matter how well you trust this company or this bank as we seen before centralized structures 9 00:00:47,070 --> 00:00:50,100 are just inherently not private. 10 00:00:50,100 --> 00:00:55,580 The reason for this is because all of the information is stored in one single place. 11 00:00:55,620 --> 00:01:01,080 So even if you trust this company and trust everything about it what about the employees that work at 12 00:01:01,080 --> 00:01:02,130 this place. 13 00:01:02,130 --> 00:01:05,310 What about hackers that manage to gain access to it. 14 00:01:05,310 --> 00:01:12,060 What about other agencies that force this entity to have back doors or to give them access and the list 15 00:01:12,060 --> 00:01:13,510 goes on and on and on. 16 00:01:13,770 --> 00:01:19,130 Simply the idea of keeping everything in one place is not private. 17 00:01:19,140 --> 00:01:27,180 The alternative to this is to use crypto currency which is not controlled or managed by a single entity. 18 00:01:27,240 --> 00:01:33,660 So previously we had the money which is the cash which is stored in a bank or some financial institution 19 00:01:33,870 --> 00:01:38,320 that manages that currency when it comes to crypto currency. 20 00:01:38,370 --> 00:01:47,090 It eliminates the need to a middleman or to an entity that manages this currency Instead it relies on 21 00:01:47,090 --> 00:01:52,370 decentralized peer to peer structure known as block chain. 22 00:01:52,400 --> 00:01:59,570 Now to understand how this works let's have an example where David wants to send money to John to do 23 00:01:59,570 --> 00:01:59,900 this. 24 00:01:59,900 --> 00:02:04,850 The first thing David will do is he'll create a crypto wallet. 25 00:02:04,850 --> 00:02:09,380 You can think of this similar to creating a PDP account. 26 00:02:09,380 --> 00:02:16,470 So the wallet will be associated with two keys a private key and a public key. 27 00:02:16,640 --> 00:02:21,070 And let's say David wants to transfer one coin to his friend John. 28 00:02:21,200 --> 00:02:25,860 So he generates a message or a request similar to this right here. 29 00:02:26,150 --> 00:02:34,040 And he'll sign this request with his private key which will generate a signature or a fingerprint. 30 00:02:34,040 --> 00:02:40,440 So again this is very similar to when we used to sign messages with our private key with PDP. 31 00:02:40,550 --> 00:02:47,360 And the reason why this is done to make sure that whoever inspects this message or this request will 32 00:02:47,360 --> 00:02:54,500 note that this request to transfer one coin from David's account is actually generated by David because 33 00:02:54,560 --> 00:03:02,380 David will never share his private key now once this is signed David it will also include his public 34 00:03:02,380 --> 00:03:09,970 key so that it can be used to verify the signature again similar to what we spoke about in the encryption 35 00:03:09,970 --> 00:03:17,080 section of this course the public key is mathematically related to the private key and therefore it 36 00:03:17,080 --> 00:03:23,840 can be used to verify the signature without revealing information about the private key. 37 00:03:23,860 --> 00:03:30,730 So when this message is inspected by anybody they can use the public key to verify the signature. 38 00:03:30,730 --> 00:03:35,820 And if it checks out we'll know that this message was actually generated by David. 39 00:03:35,860 --> 00:03:40,600 Therefore we can process the transfer of one coin from David to John. 40 00:03:41,560 --> 00:03:49,030 So once this message is generated on David's and David will send this message to the crypto currency 41 00:03:49,030 --> 00:03:50,410 network. 42 00:03:50,680 --> 00:03:59,500 Now this network is basically a number of computers usually of high specs that keep a copy of all transactions 43 00:03:59,500 --> 00:04:02,840 done using this crypto currency. 44 00:04:03,010 --> 00:04:10,300 These computers are usually referred to as minors because they get paid coins for maintaining the ledger 45 00:04:10,360 --> 00:04:13,690 or this record of transactions. 46 00:04:13,690 --> 00:04:18,610 Now this record of transactions is known as a block chain. 47 00:04:18,610 --> 00:04:24,810 So it's a public record that contains all transactions made with this crypto currency. 48 00:04:24,910 --> 00:04:32,880 And each miner each computer on the cryptocurrency network contains a copy of all of these transactions. 49 00:04:32,890 --> 00:04:36,480 So it contains a copy of the block chain. 50 00:04:36,790 --> 00:04:40,510 So David's message is sent to the currency network. 51 00:04:40,510 --> 00:04:46,270 It will get verified and if it checks out it will be added to the block chain. 52 00:04:46,300 --> 00:04:53,710 So this message will be added as a new block to the existing lock chain stored by each one of these 53 00:04:53,710 --> 00:04:56,600 computers or miners. 54 00:04:56,780 --> 00:04:57,400 So right here. 55 00:04:57,410 --> 00:04:59,930 I have a zoomed in diagram of the block chain. 56 00:04:59,930 --> 00:05:07,100 So each one of the miners of the computers contains a copy of this and you can think of each one of 57 00:05:07,100 --> 00:05:12,110 these blocks as a transaction that happened in the past. 58 00:05:12,320 --> 00:05:18,680 The latest one being the one that David just generated in which he transferred a coin to John but the 59 00:05:18,680 --> 00:05:24,220 others are just other transactions that have been done in the past. 60 00:05:24,260 --> 00:05:28,470 So as you can see this is a decentralized structure. 61 00:05:28,550 --> 00:05:32,830 It is not owned by anybody and not controlled by anybody. 62 00:05:32,840 --> 00:05:39,500 Anyone can join this network and use their computer for mining so anyone can download a copy of this 63 00:05:39,500 --> 00:05:45,820 block chain and start mining and start helping maintain this cryptocurrency network. 64 00:05:45,830 --> 00:05:52,610 Now we can also see that this implementation is private because I'm using names in here so I'm saying 65 00:05:52,610 --> 00:05:57,110 we're transferring one coin from David to John or here from Bob to Alice. 66 00:05:57,110 --> 00:06:00,470 But in reality real names are not used. 67 00:06:00,470 --> 00:06:03,440 Instead wallet addresses are used. 68 00:06:03,440 --> 00:06:09,560 So the contents of the blocks even though they're public you'll see the content of it saying it's transferring 69 00:06:09,590 --> 00:06:13,760 from a long address to another long address. 70 00:06:13,760 --> 00:06:20,450 And as long as the users are using proper OPSEC keeping their real identity separate from their fake 71 00:06:20,450 --> 00:06:27,650 identity connecting using the term network and using all of the tips and methods that we discussed to 72 00:06:27,650 --> 00:06:35,630 stay private and as anonymous as possible these addresses will not link to their real identities. 73 00:06:35,750 --> 00:06:42,950 With that being said the fact that the whole ledger or the whole block chain is public means that we 74 00:06:42,950 --> 00:06:47,690 can read all of the transactions done using this crypto currency. 75 00:06:47,690 --> 00:06:54,980 Therefore even though these addresses don't link to real identities we can analyze a specific address 76 00:06:55,220 --> 00:07:01,370 and see all of the transactions it got involved in so we can see all of the money that left this address 77 00:07:01,610 --> 00:07:08,600 and all of the money that entered this address therefore will even be able to calculate the current 78 00:07:08,600 --> 00:07:11,810 balance in this specific account. 79 00:07:11,810 --> 00:07:16,250 Now you can obviously just create multiple addresses to get around this. 80 00:07:16,250 --> 00:07:22,670 There are also other methods to increase anonymity and privacy and make it hard to see where money is 81 00:07:22,670 --> 00:07:24,970 going and where it's leaving from. 82 00:07:25,040 --> 00:07:31,940 And you can simply just use a more private cryptocurrency like Monaro which we'll talk about later on 83 00:07:31,940 --> 00:07:33,250 in the course. 84 00:07:33,590 --> 00:07:39,800 For now I just wanted to give you a basic understanding on how crypto currencies work. 85 00:07:39,800 --> 00:07:45,050 And this is pretty much how bitcoin works which is the most popular cryptocurrency.