Chapter 1: Payment Processor
Learn the magic of hash functions and how signatures work!
Learn about beautiful state & state transitions, as well as how we use this design pattern to construct our simple payment processor!
Learn how signed messages can be used for unsavory ends! Replay protection is critical!
Learn how to implement the UTXO model & why you might want to!
We go over some common pitfalls of building systems which do not account for particularly nasty failure modes--system faults, monopoly pricing, censorship, & fraud. With cryptoeconomics we can make sure these bad things don't happen!
Chapter 2: Network Models
Chapter 3: Proof of Work
Learn to create a blockchain network that uses Proof of Work to validate blocks