Chaum - Ecash ! 1997 Adam Back - Hashcash (Pow System to control email spam) ! 1998 Wei Dai - B-money (Sybil attack - A Single user can take over the node pretending to be other user. An analogy would be attackers can DDos any websites. Sending lot of fake request(what service is fake/real). Completely take over the peer network) ! 1998 Nick Szabo - BitGold ! 1999- Tomas Sander and Ammon - Ecash scheme with Merkel trees ! 2004 Hal Finney - Reusable proof of work ! Conclusion: Relay on a central server that is required to be trusted by everyone Roots of blockchain
current state of the ledger • A language of transactions that changes the ledger state • A protocol used to build consensus among participants around which transactions will be accepted, and in what order, by the ledger. How it works?
The reference to the previous block • The proof of work, also known as a nonce • The timestamp • The Merkle tree root for the transactions included in this block. How it works?