Private key sharding is a technique used to distribute a private key into multiple parts, or “shards,” to enhance security and fault tolerance. This method is particularly useful in scenarios where a single point of failure must be avoided, such as in secure communications, cryptocurrency wallets, and distributed systems. What is Private Key Sharding? Private
Read more
Category: Systems
Tutorials and posts on computing, storage and networked systems, and more.
What is BTC SegWit and Its Impact on Transaction Fees
Posted onSegregated Witness (SegWit) is a protocol upgrade for Bitcoin that enhances its scalability and transaction efficiency. Introduced in 2017, SegWit addresses several limitations of the original Bitcoin protocol, including transaction malleability and block size constraints. Understanding SegWit What is SegWit? SegWit stands for “Segregated Witness,” referring to the separation of signature data from transaction data.
Read more
Understanding Bitcoin Transaction Structure: Legacy and Witness Versions
Posted onBitcoin transactions are the backbone of the Bitcoin network, facilitating the transfer of value. Understanding their structure is essential for anyone interested in blockchain technology. This article delves into the details of both legacy and witness (SegWit) transaction structures. Basics of Bitcoin Transactions A Bitcoin transaction comprises inputs and outputs. Inputs are sources of funds,
Read more
Proving Ownership of BTC Multisig Addresses
Posted onProving ownership of a Bitcoin (BTC) address is a crucial aspect in various scenarios. The post Proof of Ownership for BTC Addresses introduced the proof for non-multisig addresses. This guide explores how to prove ownership for different multisig BTC address types, including algorithm specifications and step-by-step methods. What is a Multisig Address? A Bitcoin multisig
Read more
Proof of Ownership for BTC Addresses: A Detailed Guide
Posted onProving ownership of a Bitcoin (BTC) address is a crucial aspect in various scenarios, such as verifying identity in a transaction or demonstrating holdings without revealing private keys. This guide explores how to prove ownership for different BTC address types, including algorithm specifications and step-by-step methods. BTC Address Types P2PKH (Pay-to-Public-Key-Hash) P2SH (Pay-to-Script-Hash) P2WPKH (Pay-to-Witness-Public-Key-Hash)
Read more
A Comprehensive Guide to PGP: Technical Deep Dive
Posted onPretty Good Privacy (PGP) is a robust encryption program that ensures privacy and authentication for data communication. Developed by Phil Zimmermann in 1991, it’s widely used for securing emails, files, and directories. This article explores the technical details of PGP, including its algorithms, key management, and detailed processes for encryption, decryption, and signing. Cryptographic Foundations
Read more
Linear Consistency Model for Computer Systems
Posted onLinear consistency models are crucial in ensuring reliability and coherence in distributed computer systems. These models help manage how systems handle data and operations across multiple nodes, ensuring consistency without sacrificing performance. What is a Linear Consistency Model? In distributed computing, a linear consistency model ensures that operations on distributed data appear as if they
Read more
Understanding Cloud Storage Consistency Models
Posted onCloud storage systems utilize various consistency models to balance performance, availability, and data accuracy. This article explores these models, their trade-offs, and examples of systems using them. We’ll also discuss the CAP theorem and its implications. Consistency Models Strong Consistency Definition: Guarantees that any read operation returns the most recent write for a given piece
Read more
Comparing Paxos and Raft
Posted onPaxos and Raft are both consensus algorithms used to ensure consistency in distributed systems. While they solve similar problems, they have different approaches and design philosophies. Characteristics Paxos Roles: Proposers, Acceptors, Learners. Phases: Two main phases (Prepare/Promise and Propose/Accept). Leader Election: Not explicitly defined, often implemented using Multi-Paxos to handle multiple proposals efficiently. Use Cases:
Read more
Understanding the Paxos Consensus Algorithm
Posted onThe Paxos consensus algorithm is a fundamental concept in distributed computing that ensures a group of distributed systems can agree on a single value, even in the presence of failures. Developed by Leslie Lamport, Paxos is widely used in systems where consistency and fault tolerance are critical, such as databases and distributed ledgers. Consensus Problem
Read more
Understanding the Raft Consensus Protocol
Posted onThe Raft consensus protocol is a distributed consensus algorithm designed to be more understandable than other consensus algorithms like Paxos. It ensures that a cluster of servers can agree on the state of a system even in the presence of failures. Key Concepts Raft divides the consensus problem into three relatively independent subproblems: Leader Election:
Read more
Installing Zlib in Ubuntu 22.04
Posted onZlib is a popular open-source compression library used by many software applications to compress and decompress data. It provides fast and efficient compression and decompression algorithms that can be used to reduce the size of data, which can improve performance and reduce storage requirements. In this post, we will discuss how to install zlib in
Read more
Decentralized Exchanges (DEX) vs. Centralized Exchanges (CEX): A Technical Comparison
Posted onCryptocurrency exchanges have revolutionized the way we trade digital assets, with two main types of exchanges dominating the market: decentralized exchanges (DEX) and centralized exchanges (CEX). In this article, we’ll compare the DEX and CEX from a technical perspective. Decentralized Exchanges (DEX) DEX operate on a decentralized blockchain network, such as Ethereum, and are built
Read more
The Impact of Blockchain and Crypto Technologies on Global Financial Markets
Posted onWelcome to the groundbreaking world of cryptocurrency and blockchain technologies! These cutting-edge technologies are shaking up the global financial environment and paving the path for a more transparent and decentralized future. Consider blockchain technology to be a digital counterpart of a ledger book. It is a secure and immutable digital ledger that records all transactions
Read more
SPF, DKIM and DMARC to Stop Email Sender Fraud: Intro and How to
Posted onEmail sender fraud is an annoying problem. Malicious email senders send spam emails with email senders that are under non-authorized domain names. This may affect the reputation of the domains used by the fraud sender. On another hand, lots emails will be rejected and reverted back, which causes lots additional work to the domain administrators.
Read more
How to Query Transaction By ID in Hyperledger Fabric 2.0
Posted onQuerying transaction content out from a blockchain network is a common practice used by common scenarios like exploring the blockchain history or verifying the blockchain transaction content from a known ID. In Hyperledger Fabric, the transaction can be queried using a special system chaincode QSCC (Query System Chaincode) which is for ledger and other Fabric-related
Read more
How to Install Hyperledger Fabric 2.0 in Ubuntu 18.04
Posted onHyperledger Fabric is a consortium blockchain system. It’s performance is relatively good and its modular architecture enables it to be usable in many scenarios. Hyperledger Fabric itself has rich documents and samples of test networks. For beginners, deploying a new network for trying and testing still consumes quite some time. In this post, we will
Read more
How to synchronize OneDrive and OneDrive for Business files in Linux using Insync
Posted onOneDrive is one of the good cloud storage services available and there is a business version called OneDrive for Business. Microsoft’s Office 365 plan is widely used including Exchange Email service and OneDrive for Business. However, there is no official client released yet for Linux users. Insync is a third party cloud storage syncing software
Read more
Do big data stream processing in the stream way
Posted onReading: Years in Big Data. Months with Apache Flink. 5 Early Observations With Stream Processing: https://data-artisans.com/blog/early-observations-apache-flink. The article suggest adopting the right solution, Flink, for big data processing. Flink is interesting and built for stream processing. The broader view and take away may be to solve problems using the right solution. We saw many painful
Read more
How to deactivate a LVM logical volume on Linux?
Posted onHow to deactivate a LVM logical volume activated by #vgchange -aay on Linux You may need to make a LVM volume group inactive and thus unknown to the kernel. To deactivate a volume group, use the -a (–activate) argument of the vgchange command. To deactivates the volume group vg, use this command # vgchange -a
Read more