this post was submitted on 24 Jul 2025
986 points (99.3% liked)

196

5400 readers
725 users here now

Be sure to follow the rule before you head out.


Rule: You must post before you leave.



Other rules

Behavior rules:

Posting rules:

NSFW: NSFW content is permitted but it must be tagged and have content warnings. Anything that doesn't adhere to this will be removed. Content warnings should be added like: [penis], [explicit description of sex]. Non-sexualized breasts of any gender are not considered inappropriate and therefore do not need to be blurred/tagged.

Also, when sharing art (comics etc.) please credit the creators.

If you have any questions, feel free to contact us on our matrix channel or email.

Other 196's:

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] InnerScientist@lemmy.world 1 points 4 days ago* (last edited 4 days ago)
  • You need to verify transactions aren't fraudulent
    • source of trust on this can't be centralized, thats what visa/mastercard are
  • You need to be able to calculate a balance
    • traditional currency does this by physically possessing things
      • you can't "own" data; it's fungible i.e. it can be copied trivially. If I copy my wallet onto your computer, who owns it?
    • digital currency gets around this with a ledger
      • that's the detailed log of transactions
      • the transactions in the log are signed with cryptographic keys, the validity of the signature can be verified with the corresponding public keys. The owner of the private key (which never leaves your PC) is the owner of that wallet and is the only one who can generate the signature - the wallet has a 1:1 mapping to the public and private keys

(This is also why you don't need accounts, your PC generates a random Private key, generates the corresponding Public key and that's your wallet. Everyone accepts that it is your wallet because you have its private key)

This is just the very basic system that is traceable and there are newer schemes that are better.

Edit:
RingCT
Stealth Addresses
ring signatures
Transactions over Tor/I2P
Dandelion++