This website uses cookies to better the user experience of its visitors. Where applicable, this website uses a cookie control system, allowing users to allow or disallow the use of cookies on their computer/device on their first visit to the website. This complies with recent legislative requirements for websites to obtain explicit consent from users before leaving behind or reading files such as cookies on a user’s computer/device. To learn more click Cookie Policy.

Privacy preference center

Cookies are small files saved to a user’s computer/device hard drive that track, save, and store information about the user’s interactions and website use. They allow a website, through its server, to provide users with a tailored experience within the site. Users are advised to take necessary steps within their web browser security settings to block all cookies from this website and its external serving vendors if they wish to deny the use and saving of cookies from this website to their computer’s/device’s hard drive. To learn more click Cookie Policy.

Manage consent preferences

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Cookies list
Name _rg_session
Provider rubygarage.org
Retention period 2 days
Type First party
Category Necessary
Description The website session cookie is set by the server to maintain the user's session state across different pages of the website. This cookie is essential for functionalities such as login persistence, ensuring a seamless and consistent user experience. The session cookie does not store personal data and is typically deleted when the browser is closed, enhancing privacy and security.
Name m
Provider m.stripe.com
Retention period 1 year 1 month
Type Third party
Category Necessary
Description The m cookie is set by Stripe and is used to help assess the risk associated with attempted transactions on the website. This cookie plays a critical role in fraud detection by identifying and analyzing patterns of behavior to distinguish between legitimate users and potentially fraudulent activity. It enhances the security of online transactions, ensuring that only authorized payments are processed while minimizing the risk of fraud.
Name __cf_bm
Provider .pipedrive.com
Retention period 1 hour
Type Third party
Category Necessary
Description The __cf_bm cookie is set by Cloudflare to support Cloudflare Bot Management. This cookie helps to identify and filter requests from bots, enhancing the security and performance of the website. By distinguishing between legitimate users and automated traffic, it ensures that the site remains protected from malicious bots and potential attacks. This functionality is crucial for maintaining the integrity and reliability of the site's operations.
Name _GRECAPTCHA
Provider .recaptcha.net
Retention period 6 months
Type Third party
Category Necessary
Description The _GRECAPTCHA cookie is set by Google reCAPTCHA to ensure that interactions with the website are from legitimate human users and not automated bots. This cookie helps protect forms, login pages, and other interactive elements from spam and abuse by analyzing user behavior. It is essential for the proper functioning of reCAPTCHA, providing a critical layer of security to maintain the integrity and reliability of the site's interactive features.
Name __cf_bm
Provider .calendly.com
Retention period 30 minutes
Type Third party
Category Necessary
Description The __cf_bm cookie is set by Cloudflare to distinguish between humans and bots. This cookie is beneficial for the website as it helps in making valid reports on the use of the website. By identifying and managing automated traffic, it ensures that analytics and performance metrics accurately reflect human user interactions, thereby enhancing site security and performance.
Name __cfruid
Provider .calendly.com
Retention period During session
Type Third party
Category Necessary
Description The __cfruid cookie is associated with websites using Cloudflare services. This cookie is used to identify trusted web traffic and enhance security. It helps Cloudflare manage and filter legitimate traffic from potentially harmful requests, thereby protecting the website from malicious activities such as DDoS attacks and ensuring reliable performance for genuine users.
Name OptanonConsent
Provider .calendly.com
Retention period 1 year
Type Third party
Category Necessary
Description The OptanonConsent cookie determines whether the visitor has accepted the cookie consent box, ensuring that the consent box will not be presented again upon re-entry to the site. This cookie helps maintain the user's consent preferences and compliance with privacy regulations by storing information about the categories of cookies the user has consented to and preventing unnecessary repetition of consent requests.
Name OptanonAlertBoxClosed
Provider .calendly.com
Retention period 1 year
Type Third party
Category Necessary
Description The OptanonAlertBoxClosed cookie is set after visitors have seen a cookie information notice and, in some cases, only when they actively close the notice. It ensures that the cookie consent message is not shown again to the user, enhancing the user experience by preventing repetitive notifications. This cookie helps manage user preferences and ensures compliance with privacy regulations by recording when the notice has been acknowledged.
Name referrer_user_id
Provider .calendly.com
Retention period 14 days
Type Third party
Category Necessary
Description The referrer_user_id cookie is set by Calendly to support the booking functionality on the website. This cookie helps track the source of referrals to the booking page, enabling Calendly to attribute bookings accurately and enhance the user experience by streamlining the scheduling process. It assists in managing user sessions and preferences during the booking workflow, ensuring efficient and reliable operation.
Name _calendly_session
Provider .calendly.com
Retention period 21 days
Type Third party
Category Necessary
Description The _calendly_session cookie is set by Calendly, a meeting scheduling tool, to enable the meeting scheduler to function within the website. This cookie facilitates the scheduling process by maintaining session information, allowing visitors to book meetings and add events to their calendars seamlessly. It ensures that the scheduling workflow operates smoothly, providing a consistent and reliable user experience.
Name _gat_UA-*
Provider rubygarage.org
Retention period 1 minute
Type First party
Category Analytics
Description The _gat_UA-* cookie is a pattern type cookie set by Google Analytics, where the pattern element in the name contains the unique identity number of the Google Analytics account or website it relates to. This cookie is a variation of the _gat cookie and is used to throttle the request rate, limiting the amount of data collected by Google Analytics on high traffic websites. It helps manage the volume of data recorded, ensuring efficient performance and accurate analytics reporting.
Name _ga
Provider rubygarage.org
Retention period 1 year 1 month 4 days
Type First party
Category Analytics
Description The _ga cookie is set by Google Analytics to calculate visitor, session, and campaign data for the site's analytics reports. It helps track how users interact with the website, providing insights into site usage and performance.
Name _ga_*
Provider rubygarage.org
Retention period 1 year 1 month 4 days
Type First party
Category Analytics
Description The _ga_* cookie is set by Google Analytics to store and count page views on the website. This cookie helps track the number of visits and interactions with the website, providing valuable data for performance and user behavior analysis. It belongs to the analytics category and plays a crucial role in generating detailed usage reports for site optimization.
Name _gid
Provider rubygarage.org
Retention period 1 day
Type First party
Category Analytics
Description The _gid cookie is set by Google Analytics to store information about how visitors use a website and to create an analytics report on the website's performance. This cookie collects data on visitor behavior, including pages visited, duration of the visit, and interactions with the website, helping site owners understand and improve user experience. It is part of the analytics category and typically expires after 24 hours.
Name _dc_gtm_UA-*
Provider rubygarage.org
Retention period 1 minute
Type First party
Category Analytics
Description The _dc_gtm_UA-* cookie is set by Google Analytics to help load the Google Analytics script tag via Google Tag Manager. This cookie facilitates the efficient loading of analytics tools, ensuring that data on user behavior and website performance is accurately collected and reported. It is categorized under analytics and assists in the seamless integration and functioning of Google Analytics on the website.

How the Blockchain Works

  • 66583 views
  • 8 min
  • Jan 04, 2018
Tania H.

Tania H.

Copywriter

Vlad V.

Vlad V.

Chief Executive Officer

Tags:

Share

Throughout history, humanity has tried different ways to exchange values and protect buyers and sellers. After coins, paper money, and banking systems, today’s most obvious solution for exchanging value is electronic payments.

Credit card systems, the internet, and mobile technologies were all important innovations that improved the convenience, speed, and efficiency of transactions. However, in the modern business environment these transaction mechanisms have their shortcomings, including limited transaction sizes, the need for third-party validation, increasing transaction costs, and a weak trust-based model. Besides, fraud and cyberattacks are unavoidable, which also leads to increasing costs for payment operations.

To address these challenges, the world needed a new type of payment system, or rather a network, that could establish trust, remove intermediary institutions (letting any two parties transact directly with each other), eliminate fraud, and provide secure and efficient escrow mechanisms to protect payers and payees. This was the conclusion reached by a person (or persons) known by the pseudonym Satoshi Nakamoto over 11 years ago in 2008 and set out in this white paper.

Satoshi Nakamoto described a solution based on cryptocurrency and a peer-to-peer distributed timestamp server to generate computational proof of the chronological order of transactions.

In this article we’ll define all these terms, explain how these things support blockchain technology, and explain what it takes to build a blockchain network.

What’s a Blockchain?

A blockchain is a shared ledger that stores information about transactions in a distributed manner.

Blockchain is a shared ledger

These transactions are performed between people within a blockchain, which is formed by its participants’ computers. These computers provide the computing power to constantly maintain the blockchain (by performing computations and verifying transactions).

Such computers are called nodes, and each node in the network owns a full copy of the blockchain.

How Exactly Does the Blockchain Work?

Technically, a blockchain is a chain of blocks ordered in a network of non-trusted peers. Each block references the previous one and contains data, its own hash, and the hash of the previous block.

Hash example

Block

A unit of data stored inside a block may be represented by any value depending on the type of blockchain. A block can store an amount of money, a share in a company, a digital certificate of ownership, a vote during an election, or any other value.

A block stores encrypted details about the parties whose interaction resulted in the data stored in the block. A cryptocurrency block also contains the sender’s and receiver’s encrypted identifiers. A block for an ecommerce transaction will contain the identifiers of the retailer and consumer, for example.

Each block also has a hash. This hash is a value generated from a string of text using a mathematical function. A hash can be compared to a fingerprint, as each hash is unique. Its role is to identify a block and the block’s contents.

Each hash is unique

Once a block is created, a hash is calculated. Changing something inside the block causes the hash to change. So a hash also indicates changes to a block.

Invalid hash

Also, each block contains a hash of the previous block. For instance, if there are three blocks in a blockchain, block 3 will contain the hash of block 2, and block 2 will contain the hash of block 1.

Each block is connected

If anyone changes the data in a single block, the hash of that particular block changes, but it also makes the whole chain invalid.

Ivalid hash

A hash is a great tool for identifying attempts to change data in blocks. However, a hash algorithm alone is not enough to ensure the security of a blockchain. To mitigate attempts to corrupt the blockchain and to ensure security, blockchain techmology also uses a process called proof-of-work.

Proof-of-Work

Proof-of-work is a process of producing data that’s hard to get but easy to verify. In the context of a blockchain, proof-of-work is about solving mathematical problems. If a problem is successfully solved, then a new block can be added to the blockchain. On average, performing proof-of-work calculations and adding a new block to the chain takes about 10 minutes.

What’s behind the proof-of-work process?

This mechanism can be compared to a game of dice. Let’s say there’s a specific number – nine, for example – that a player needs to roll. Most likely, the player will need several attempts. But sooner or later, he’ll get nine.

Now let’s add more players to the game. Whoever rolls the correct number first wins.

Proof-of-work is like a game of dice

This is effectively how proof-of-work functions. Of course, in a blockchain the problem that needs to be solved is way more difficult than rolling nine in a game of dice, but the concept is the same.

Computers that form the blockchain network race to solve a mathematical problem to receive a reward and be the first to add the next block to the chain.

Mathematical problems in blockchain have to be hard to solve but easy to check in order to prevent cheating.

Together, hashing and the proof-of-work mechanism ensure the security to the whole blockchain network.

Longest Chain

Since a blockchain consists of an enormous number of nodes, each of them is simultaneously performing proof-of-work. Thus, a situation when several nodes manage to complete proof-of-work with a valid result are pretty common. When this happens it’s called a hard fork, which describes exactly what happens to the blockchain – it forks.

Blockchain forks

When new blocks are created and added to one of these forked chains, it becomes the longest and again the only valid chain. Blocks from other forked chains get rejected by blockchain nodes, and all the transactions contained in those blocks are sent for verification again.

Blockchain verification

So far, the longest fork reached is no more than five blocks in a row.

Wallet

Along with hashing and proof-of-work, a blockchain wallet also works to ensure the safety of transactions and prevent fraud. A wallet generates paired public and private keys that further ensure the security of transactions.

A public key can be compared to a postbox. Anyone can put a letter inside of it, but they can’t get that letter back. Only a postal worker who has a private key can open the postbox and get the letter.

This is similar to how keys within a blockchain work. Anyone can send a transaction using a public key to the address of a receiver. This is similar to putting a letter in a postbox. But only the owner of that address who also has the private key can access the value of that transaction.

The process of keys exchange

Distributed Network

Anyone is allowed to join a blockchain peer-to-peer network. When someone joins a network, this person gets a full copy of the blockchain. Distributed storage of data accompanied by effective hashing and proof-of-work mechanisms helps to prevent nearly any fraud.

For instance, in order to add a block containing an invalid hash or invalid data, duplicate an existing block, or perform a fraudulent transaction, an attacker would have to hack the computer of every blockchain participant and slip in the invalid block.

Blockchain is a protected network

However, even if this were possible, none of the nodes would verify such a block. It would just be ignored, as if it never existed in the first place.

Blockchain Implementation

One of the most popular uses of the blockchain is for cryptocurrency. Cryptocurrencies like Bitcoin, Litecoin, and others aren’t issued or controlled by a central authority. Decentralization allows these blockchain currencies to take the first steps toward an alternative financial model with no intermediaries.

Another area revolutionized by the blockchain is trading and making deals. Traditional contracts are being replaced by smart contracts that are unbreakable, eliminating third parties and working for a wide range of applications: employment contracts, wholesale and retails purchases, agreements for buying property, agreements securing intellectual property rights, insurance, and even marriage contracts. We’ll talk about smart contracts in a separate article.

The blockchain can go far beyond cryptocurrencies and smart contracts, however. The blockchain makes it possible to store, track, and transfer data about real estate objects and land, property rights and medical history, commercial transactions and taxes, and more.

The blockchain is capable of disrupting even such monopolistic spheres as energy management, governance, and law enforcement (as we shared in our recent article on how to implement the blockchain in different business spheres).

Final Thoughts

Gradually, blockchain technology is changing the way we trade, opening new opportunities for individuals and businesses and, aside from its applications in financial services, will become the basis for numerous businesses across industries.

We’re pretty sure that in the right hands, nearly any business idea that’s built on technology can benefit from a blockchain.

If you’re interested in getting more curated content on the blockchain and other emerging technologies, subscribe to our newsletter below.

CONTENTS

Tags:

Authors:

Tania H.

Tania H.

Copywriter

Vlad V.

Vlad V.

Chief Executive Officer

Rate this article!

Nay
So-so
Not bad
Good
Wow
26 rating, average 4.65 out of 5

Share article with

Comments (0)

There are no comments yet

Leave a comment

Subscribe via email and know it all first!