Professional Documents
Culture Documents
Fintech Sector
Fintech Sector
Blockchain
Name
Institutional Affiliations
Course
Date
2
Table of Contents
Blockchain...................................................................................................................................................3
1. Introduction.......................................................................................................................................3
1.1 Bitcoin History from the beginning up to today................................................................................4
1.1.1 The Genesis: Bitcoin and Nakamoto's Whitepaper (2008)........................................................4
1.1.2 The Birth of Bitcoin (2009)...........................................................................................................4
1.1.3 Early Development and Adoption (2009-2013)...........................................................................4
1.1.4 Blockchain Beyond Bitcoin (2014-2016)......................................................................................4
1.1.5 Challenges and Maturity (2017-2018).........................................................................................4
1.1.6 Enterprise Adoption and Diverse Use Cases (2019-Present).....................................................4
1.2 How Cryptocurrency Transactions Work.........................................................................................5
1.2.1 Initiating the Transaction............................................................................................................5
1.2.2 Broadcasting the Transaction......................................................................................................6
1.2.3 Verification by Network Nodes....................................................................................................6
1.2.4 Inclusion in a Block......................................................................................................................7
1.2.5 Consensus and Confirmation.......................................................................................................7
1.2.6 Transaction Execution..................................................................................................................8
1.2.7 Finality...........................................................................................................................................8
1.2.8 Notification....................................................................................................................................8
1.3 Blockchain Block Validation and Transcription...............................................................................8
1.3.1 Beginnings of Blocks.....................................................................................................................9
1.3.2 Block Validation: Promoting Security and Trust.......................................................................9
1.3.3 Making the Validated Block Available on the Blockchain......................................................10
1.4 Is It Safe to Operate in the Blockchain World in Terms of Security?...........................................11
1.4.1 Learning about Blockchain Technology..................................................................................11
1.4.2 Features of Blockchain Security................................................................................................12
1.4.3 Challenges and Weaknesses.......................................................................................................12
1.4.4 Using the blockchain safely........................................................................................................13
1.4.5 Examples of Blockchain Security Successes.............................................................................13
1.5 Types Of Processing And Differences Between Proof Of Stake And Proof Of Work..................15
1.5.1 Proof of Work (PoW).................................................................................................................15
1.5.2 Proof of Stake (PoS)....................................................................................................................15
3
Blockchain
1. Introduction
Since its beginnings, blockchain technology, also referred to as the "Internet of Value,"
has seen a remarkable transformation. The blockchain path has been characterized by
inventiveness, difficulties, and disruptive potential, from its humble origins as the underpinning
technology for Bitcoin to its broad acceptance in several sectors today (Nuseir, 2021). This
decentralized and irreversible ledger technology has not only upended conventional banking
institutions but also industries as diverse as governance, supply chain management, and
healthcare. A blockchain is an enticing option for a variety of applications due to its fundamental
concepts of decentralization, transparency, and security. According to Nuseir (2021), it has been
positioned as a technology that has the potential to alter industries and rethink how we deal with
and share information because of its ability to promote trust among untrusted parties, remove
It is crucial to comprehend both the blockchain's potential and its limits as we dive deeper
into the technology. This technology has attracted much interest since it promises to improve
security, decrease fraud, and boost efficiency. Scalability issues, regulatory uncertainty, and
privacy risks are just a few of the difficulties it faces (Zook & Grote, 2022). To make educated
judgments about the deployment and acceptance of blockchain, this complexity needs a complete
analysis of its benefits and drawbacks. This in-depth analysis of blockchain technology will look
at its inner workings, historical evolution, and practical applications. It will also look at the
future disruptions it may cause, as well as the moral, legal, and societal issues raised by its
widespread use.
5
Blockchain's history began with the publication of a whitepaper titled "Bitcoin: A Peer-
to-Peer Electronic Cash System" by an unidentified author known only as Satoshi Nakamoto in
October 2008 (Huber & Sornette, 2022). The idea of Bitcoin, a decentralized digital currency,
and the blockchain technology that powers it were outlined in this whitepaper (Chohan, 2022).
The double-spending issue with digital currencies, where the same digital token might be used
more than once, was addressed by the blockchain. The blockchain, which Nakamoto invented, is
a decentralized ledger that will securely and openly record all Bitcoin transactions. Proof-of-
work (PoW) is a method that miners, or network users, use to validate and add transactions to the
blockchain.
0." This signaled the creation of the first cryptocurrency, and it contained a message hidden
inside the code that alluded to a day's edition of The Times's lead story, "Chancellor on the brink
of second bailout for banks. According to Böhme et al. 2015, this was an unequivocal
system.
Blockchain technology was mostly connected to cryptocurrencies in the years after the invention
independence from centralized banking institutions all took an interest in Bitcoin. It served as a
platform for online transactions and even the infamous Silk Road bazaar, which was finally
6
taken down by law authorities. Several alternative cryptocurrencies (altcoins) using different
blockchain technologies came into existence during this time (Huber & Sornette, 2022). One of
the original cryptocurrencies was Litecoin, which was introduced in 2011. These tests and
inventions created the framework for blockchain's application outside of virtual currency.
The idea that blockchain may be used for purposes other than cryptocurrencies started to
sink in. Vitalik Buterin introduced the blockchain platform Ethereum in 2014 to facilitate the
development of decentralized apps (dApps) and smart contracts (Mattila, 2016). Turing-
complete scripting was first presented by Ethereum, enabling programmers to create a diverse
variety of applications on its blockchain. A wave of Initial Coin Offerings (ICOs), where new
blockchain companies raised money by issuing tokens on the Ethereum network, resulted from
this development (Chuen et al., 2017). Although this way of raising money was well received
and helped startups raise much money, it also drew regulatory attention owing to the possibility
in 2017. In December 2017, Bitcoin hit an all-time high price of a little under $20,000, igniting a
media frenzy and investor mania (Chernov & Chernova, 2018). However, a significant market
drop that followed this bull run in 2018 caused a more realistic evaluation of blockchain's
cryptocurrencies and initial coin offerings. Governments tried to strike a balance between
innovation, consumer safety, and market stability (Chernov & Chernova, 2018). Meanwhile, as
7
businesses investigated how blockchain may improve transparency, security, and efficiency in
many industries, the market noticed a rising focus on corporate blockchain solutions.
Blockchain technology has developed recently, and a variety of new uses have emerged.
Businesses from a variety of sectors have realized the potential of blockchain for enhancing data
integrity, lowering fraud, and expediting procedures. These sectors include banking, supply
chain, healthcare, and logistics. Some notable developments and trends in the blockchain space
include DeFi Decentralized Finance, Non-Fungible Tokens, CBDCs or central bank digital
DeFi Decentralized Finance; introducing DeFi platforms has changed traditional financial
services. DeFi provides decentralized borrowing, trading, lending, and yield farming so users
may access financial services directly (Möser & Böhme, 2015). Non-Fungible Tokens (NFTs).
NFTs have become incredibly popular for displaying distinctive digital assets, such as works of
art, collectibles, music, and virtual properties. They are purchased and sold on Ethereum-based
blockchain platforms. CBDCs or central bank digital currencies. To enhance payment systems
and financial inclusion, some central banks across the world are investigating the idea of CBDCs
and digitizing their national currencies on blockchain networks: climate change and
consensus methods, such as proof-of-stake (PoS), have been sparked by worries about the
adverse environmental effects of PoW blockchains like Bitcoin (Möser & Böhme, 2015).
The use of cryptocurrencies in transactions has revolutionized how we think about and interact
with money in the digital age. Blockchain technology has made these transactions feasible,
giving people around the world a decentralized and secure way to exchange digital assets.
signals the start of a cryptocurrency transaction. A cryptocurrency wallet, a digital user interface
that enables users to manage their digital assets, is often used for this action. Users begin a
transaction within this wallet by entering the wallet address of the receiver which is a long string
of alphanumeric characters that specifically identify their digital wallet (Mukhopadhyay et al.,
2016). It serves as the last point of the Bitcoin transfer, making sure the money gets to the right
person. Users: Users define the exact amount of bitcoin they desire to transfer in a transaction.
Due to the high degree of divisibility of cryptocurrencies, this might be a fraction of one.
Transaction Fee: A transaction fee is a small sum paid by the sender to encourage miners to
include their transactions in the upcoming block (more on this later). Depending on network
Digital Signatures: To prove ownership of the bitcoin being delivered, cryptographic signatures
created with the sender's private key are used. These signatures guarantee that a transaction can
The sender's wallet broadcasts the transaction to the Bitcoin network once the transaction
details have been input and verified. Sharing transaction data with a network of nodes or
9
dispersed computers that uphold the blockchain record is necessary to do this. With this move, a
Network nodes start a rigorous process of verification as soon as they receive the
transaction. Their main objective is to make sure the transaction is secure and legitimate
(Mukhopadhyay et al., 2016). This verification procedure includes the following crucial checks:
Correct Formatting: Nodes certify that the transaction follows the predetermined structure and
format for the specific cryptocurrency network. Any modifications to the typical format are
Sufficient Funds: It is essential to make sure that the sender has enough money on hand to cover
the transaction's total cost as well as any related fees. The transaction will be rejected if there is
Digital Signatures: The nodes use the supplied digital signatures to verify the transaction's
legitimacy. To verify that these signatures match the transaction data and are consistent with the
sender's private key, they are decrypted using the sender's public key.
Preventing duplicate spending, or the simultaneous use of the same cash in several transactions,
is one of the main difficulties in digital currency transactions (Mukhopadhyay et al., 2016).
Before approving a transaction, nodes make sure the Bitcoin has not previously been used
elsewhere.
A block comprises all valid transactions that have successfully made it through the
verification process. Miners, an essential component of the Bitcoin network, are involved in the
process of producing a new block. In networks like Bitcoin, a mechanism known as proof of
10
work (PoW) is used to solve complex mathematical problems for miners. The right to add a new
block to the blockchain and create a new block is given to the first miner to crack the riddle.
When a miner successfully creates a block containing the transaction and adds it to the
blockchain, the transaction is confirmed. But for increased security, blockchain networks
frequently demand several confirmations. The transaction has more confirmations with each new
block that is added to the blockchain after the initial one (Peck, 2017). Depending on the
particular blockchain and its consensus method, the amount of confirmations needed may
change.
The recipient's wallet notifies the sender of the incoming transaction when it has been
verified and added to the blockchain. The received bitcoin is now available to the receiver and
under their control in their wallet. They are free to decide whether to save it, exchange it, or use
it.
1.2.7 Finality
irreversible and permanent once it is approved and recorded on the blockchain. The essential
feature of blockchain technology that makes the transaction history unbreakable and visible is
finality.
1.2.8 Notification
Notifications verifying the transaction's successful conclusion may be sent to the sender
and the recipient. These notifications provide the parties with peace of mind and act as a digital
encryption, and money. By offering safe, decentralized, and transparent ways to move digital
assets, they have upended established banking systems. Anyone who wants to take part in this
fast-changing digital economy must comprehend the complexities of Bitcoin transactions, from
their inception through confirmation. According to Peck (2017), the ideas behind cryptocurrency
transactions will stay at the vanguard of innovation as blockchain technology develops and finds
new uses, altering how we conduct financial transactions in the contemporary world.
The distributed ledger of blockchain technology, which is known for being decentralized
transcription. This essay will examine the complex procedure used to validate and transcribe
transactions. According to the preceding article, the process starts when a user conducts a
comprehend the fundamental elements of a block before diving into the validation and
informational transactions (like those involving bitcoins) or any data pertinent to the objective of
Block Header: The block header is a crucial element that includes the following fields:
Previous Block's Hash: A chronological chain is formed by connecting each block to the one
before it via its distinct hash. This assures that previously recorded data is unchangeable.
12
Timestamp: The timestamp indicates the time the block was produced, which helps the
Merkle Root: To preserve data integrity, a Merkle tree data structure consolidates each
Nonce: Miners use the nonce throughout the mining process (Proof of Work) to obtain a hash
establishing the legitimacy and veracity of the data in a block. This validation procedure
comprises several stages that taken collectively guarantee the block's reliability:
transaction's data is used to produce the hash, which is a distinctive alphanumeric string (Peck,
2017). The Merkle root, which is kept in the block header, is created by combining the various
Proof of Work (PoW) or Consensus Mechanism: In networks like Bitcoin, miners compete by
altering the block's nonce to find solutions to challenging mathematical riddles. This procedure
necessitates a lot of processing power and acts as a check to make sure that only valid blocks are
added to the blockchain. The block is broadcast to the network for validation once a miner has
Validation by Network Nodes: Network nodes independently verify newly mined blocks after
Block Format: Nodes make sure that the block follows the blockchain network's predetermined
Transaction Validity: Every transaction in the block is carefully examined to make sure it
complies with the network's requirements, such as the sender having enough coins, having valid
Proof of Work: Nodes verify that the nonce results in a hash that satisfies the network's
consensus requirements when paired with the other data in the block.
Consensus: Network node consensus is achieved throughout the validation process. Before a
block is added to the blockchain, a majority of nodes must concur that it is genuine. This
A block is added to the blockchain once the network has successfully confirmed it. The
block's data must be permanent and unchangeable, and this transcribing procedure completes that
process:
Block Addition: The validated block is included in the chain of previous blocks on the
blockchain. The block header links it to the chain and the chain to the prior block, forming a
Propagation: Every node in the network receives the newly inserted block. To add the new
Finality: A block becomes immutable and irrevocable once it is added to the blockchain. It is a
permanent component of the ledger, and each network node stores its data.
Consistency Check: To make sure that all versions of the blockchain are in sync, nodes run
consistency checks regularly. Consensus procedures are used to settle any contradictions.
14
many sectors. Its popularity in financial systems, supply chains, healthcare, and other industries
is due to its promise of decentralization, transparency, and tamper resistance (Bozic, 2016).
However, enormous promise also means considerable scrutiny, particularly when it comes to
security. This article investigates the issue of whether using the blockchain is secure.
Transparency is improved by the fact that all network members can see the transactions that are
Data integrity is ensured via immutability, which makes it almost hard to change or remove data
Data security is ensured by cryptographic procedures, which guard against unwanted access.
Blockchain networks validate transactions using consensus algorithms like Proof of Work
(PoW) or Proof of Stake (PoS). These techniques make it harder for hostile actors to take over
the network by requiring network users to complete challenging mathematical puzzles or stake
tokens. By using encryption, data on the blockchain is protected from unauthorized access and
modification (Bozic et., 2016) Additionally, in protecting transactions and digital signatures,
cryptographic procedures make it difficult for hackers to tamper with them. Decentralization
15
which is the lack of a central authority makes it difficult for a network to be compromised by a
susceptibility. Also, it uses immutable records. A transaction that has been recorded on the
blockchain cannot be changed beyond that point. This immutability guarantees the integrity of
transaction history.
51% Attacks: In PoW-based blockchains, the ledger might be manipulated by a single actor
with more than 50% of the network's computing power (Chaudhry & Yousaf, 2018). To do this,
Smart Contract Vulnerabilities: Smart contracts, which are self-executing contracts written in
code and executed on the blockchain, may have bugs. Chaudhry & Yousaf, (2018) asserts that,
financial losses may arise from exploiting these weaknesses, as demonstrated by events like the
DAO attack
Management of private keys: Users are responsible for carefully securing their private keys.
Access to digital assets is lost when a private key is lost, and there is no way to get them back.
Regulatory and Legal Risks: Because blockchain technology is decentralized, it may present
regulatory and legal difficulties (Sayadi et al., 2018). Globally, governments are still developing
The adoption of best practices is necessary for operating correctly on the blockchain:
16
Protect private keys and wallet credentials with secure wallet management. Use secure software
Due Diligence: Research blockchain initiatives, exchanges, and smart contracts in-depth before
Stay Informed: Keep abreast with blockchain news, security recommendations, and new
Select Reputable Exchanges: When trading cryptocurrencies, select exchanges with robust
security protocols that have a good reputation. Azbeg et al., (2021) hold that, for account access,
enable two-factor authentication (2FA). Before implementing smart contracts, check them for
flaws in the code and vulnerabilities. For increased security, think about formal verification
techniques. Back up your wallet's data and private keys regularly. Backups should be kept in
Phishing Caution: Be wary of phishing efforts. Verify website addresses and avoid providing
In the blockchain industry, there have been significant security lapses and difficulties, yet
Bitcoin: Since its launch in 2009, Bitcoin, the first cryptocurrency based on a blockchain, has
functioned safely. It has a solid track record for security and has resisted many attacks.
Ethereum 2.0: With Ethereum 2.0, PoS will replace PoW as the dominant consensus algorithm
on Ethereum, the second-largest blockchain by market capitalization (Azbeg et al., 2021). This
DeFi Projects: Decentralized Finance (DeFi) initiatives have garnered billions of dollars in
value, demonstrating confidence in the security of blockchain technology. This achievement has
been made possible via open governance and audited smart contracts.
Supply Chain: To improve traceability and lower fraud, supply networks are using blockchain
technology. Maintaining the integrity of supply chain data depends on the security of these
networks.
How we think about security in the digital era has fundamentally altered because of
blockchain technology. It offers a strong defense against a variety of conventional cyber threats
because of its decentralized and cryptographic properties. It is not a miracle cure, and
weaknesses and difficulties remain to be resolved. In the end, the safety of using a blockchain
depends on several variables, including user behavior, the particular blockchain network being
utilized, and the overall regulatory landscape (Azbeg et al., 2021).Users and businesses may
operate safely on the blockchain and take advantage of its disruptive potential while minimizing
risks by following best practices, remaining educated, and exercising caution. Despite its
difficulties, blockchain still marks a significant advancement in the search for safe and open
digital transactions and data management. The blockchain ecosystem is well-positioned to keep
enhancing security precautions and extending its uses across many sectors through continued
1.5 Types Of Processing And Differences Between Proof Of Stake And Proof Of Work
Specific consensus mechanisms govern how transactions are handled, and new blocks are
added to the blockchain, which is how blockchain technology works. Proof of Work (PoW) and
The first and best-known consensus technique is PoW, which is prominently employed in
Bitcoin. To validate and add new blocks to the blockchain, miners must solve challenging
mathematical riddles( Bentov et al., 2016). The first miner to solve the riddle successfully
transmits the new block to the network as the other miners compete to do so. This method uses a
lot of computer power and consumes much energy. PoW is praised for its security since it would
be costly and time-consuming to change a transaction in a block without also changing all the
projects, including Polkadot, Cardano, and Ethereum. In PoS, the number of cryptocurrency
tokens that players "stake" or lock up as collateral determines which individuals are picked to
build new blocks and validate transactions (Gaži et al., 2019). The amount of bitcoin a
participant wagers determines their likelihood of getting selected as a validator. PoS is said to be
more energy-efficient than PoW since it doesn't need mining, which uses many resources.
In PoS, mining processes need a large amount of computing and energy usage while in PoS
1.6.2 Security
PoW is Known for its strong security since it would take a tremendous amount of computing
labor to attack the network but PoS security depends on validators' financial investment in the
network, as it becomes less safe if the majority of validators engage in destructive behavior.
19
1.6.3 Decentralization
PoW is generally seen as more decentralized because mining is open to anybody with the
necessary gear (Bentov et., 2016); while PoS validators must possess a sizable quantity of
1.6.4 Scalability
PoW has scalability issues, which frequently results in longer transaction processing times while
PoS allows for speedier transaction validation and improved scalability by selecting validators
1.7 Possible Future Uses That Could Disrupt The Fintech Sector
Thanks to the disruptive potential of blockchain technology, the financial industry has
experienced a spectacular transition. Blockchain, which was first recognized as the foundational
technology for cryptocurrencies like Bitcoin, has found a variety of uses across the financial
services industry, altering established procedures and opening the door for new ones.
A new age of digital payments and international transfers has begun, thanks to blockchain
technology. For instance, the XRP Ledger from Ripple is proof of the potential of blockchain
affordable. Banks and financial organizations have adopted this technology to speed up
blockchain technology. This invention enables the representation of assets like real estate,
corporate shares, and artwork as digital tokens on a blockchain. Platforms like tZERO have used
20
blockchain to provide fractional ownership, more liquidity, and easier trading. Financial markets
verification. For instance, SelfKey provides a platform for decentralized identity management.
Users may securely maintain and exchange their identification information, which improves
Know Your Customer (KYC) and Anti-Money Laundering (AML) compliance processes' speed
and security.
1.8.1 Pros
Smart Contracts- Smart contracts are self-executing contracts with predefined rules.
Blockchain enables their automation, leading to Efficiency. Smart contracts automate complex
processes, reducing the need for intermediaries and speeding up transactions (Niranjanamurthy et
al., 2019). Accuracy; Automation eliminates human errors and ensures contract terms are
executed precisely.
payments. Efficient Settlement: Faster settlement times translate into lower operational costs for
financial institutions.
21
1.8.2 Cons
Privacy Concerns- Contrary to popular belief, blockchain is not entirely anonymous. While
transactions are pseudonymous (associated with cryptographic addresses), tracing and analyzing
transaction patterns is possible. This has raised concerns about user privacy.
Limited Adoption- While blockchain technology has gained attention and interest, it has yet to
be widely adopted. This is due to various factors, including the complexity of implementation,
regulatory uncertainties, and the lack of interoperability between different blockchain networks.
Energy Consumption- Many blockchain networks, especially those that use proof-of-work
consensus mechanisms like Bitcoin and Ethereum, consume massive amounts of energy
(Niranjanamurthy et al., 2019). The mining process, integral to these networks, requires powerful
1.9 Conclusion
opened up new possibilities while solving enduring problems through applications like digital
payments, asset tokenization, and smart contracts. The adaptability and disruptive potential of
blockchain remain at the forefront as the fintech sector changes. Stakeholders must adequately
use this technology, taking into account both its advantages and disadvantages, to spur
innovation and improve financial services in the future. A new age of financial technology
already significantly impacted the fintech industry. Its voyage is still far from over, however.
The blockchain's revolutionary potential is still developing, and its following disruptions in
References
Azbeg, K., Ouchetto, O., Jai Andaloussi, S., & Fetjah, L. (2021). An overview of blockchain
Bentov, I., Gabizon, A., & Mizrahi, A. (2016, February). Cryptocurrencies without proof of
work. In International conference on financial cryptography and data security (pp. 142-
Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, technology, and
Bozic, N., Pujolle, G., & Secci, S. (2016). A tutorial on blockchain and applications to secure
network control-planes. 2016 3rd Smart Cloud Networks & Systems (SCNS), 1-8.
Conference on Open Source Systems and Technologies (ICOSST) (pp. 54-63). IEEE.
Chernov, A., & Chernova, V. (2018). Global blockchain technology market analysis-current
situations and forecast. Economic and Social Development: Book of Proceedings, 143-
152.
Chuen, D. L. K., Guo, L., & Wang, Y. (2017). Cryptocurrency: A new investment
Gaži, P., Kiayias, A., & Zindros, D. (2019, May). Proof-of-stake sidechains. In 2019 IEEE
Huber, T. A., & Sornette, D. (2022). Boom, bust, and bitcoin: bitcoin-bubbles as innovation
Möser, M., & Böhme, R. (2015). Trends, tips, tolls: A longitudinal study of Bitcoin transaction
BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised
Mukhopadhyay, U., Skjellum, A., Hambolu, O., Oakley, J., Yu, L., & Brooks, R. (2016,
and mortar (B&M) grocery stores. Business Process Management Journal, 27(4), 1256-
1274.
Peck, M. E. (2017). Blockchains: How they work and why they'll change the world. IEEE
Sayadi, S., Rejeb, S. B., & Choukair, Z. (2018, November). Blockchain challenges and security
Zook, M., & Grote, M. H. (2022). Blockchain financial geographies: Disrupting space, agency