Double spending and immutability in blockchain
In the last article, we looked at the process of mining in blockchain in depth. This article will look at how blockchain avoids double spending and how it manages to be immutable. Before we learn…
In the last article, we looked at the process of mining in blockchain in depth. This article will look at how blockchain avoids double spending and how it manages to be immutable. Before we learn…
React 18 introduced a completely new paradigm to the frontend realm in the form of React Server Components (RSC). Next.js 13 followed suit by introducing support for RSC through their app directory, which is in…
We looked at Merkle proof in the previous article and that concluded our discussions on blocks and their structure. In this article, we shall look at the process of mining in detail. There are two…
In the last article, we discussed the Merkle tree and how we can use that to ensure integrity, that is, to make sure that no transaction got added to the block after a miner mined…
In this article, we talk about block structure in blockchain, the block header and how we generate the Merkle root.…
We looked at the Proof-of-Work algorithm in the previous article, and in this article, we shall look at how we adjust the target hash based on the difficulty value to keep the transaction time constant.…
In the previous article, we saw how we use a puzzle to achieve consensus. In this article, we will see how we use Proof of Work as the puzzle and how it works. As we…
In the previous article, we saw how we order transactions in a blockchain by hashing transactions. However, this alone doesn’t help achieve consensus as we haven’t found a way to solve the confusion we talked…
In the previous article, we took a look at how we verify transactions in detail. In this article, we will look at why the order of transactions matters and how we can establish an order.…
We discussed proving ownership of bitcoins in the previous article. Let’s discuss how verifying transactions works at length in this article. Remember that earlier we learned that the pubkey script has a few scripts in…
This article discusses blockchain account addresses, how they are used to prove ownership of bitcoins and how blockchain transactions work.…
In the previous article, we discussed hashing, asymmetric encryption, and digital signatures. In this article, we will dwell on how blockchain transactions work. An easier way to learn how blockchain transactions work is by following…
In this article we will learn about hashing, asymmetric encryption, and how we use them to produce digital signatures.…
Let’s look at how we can adapt the right mental model of useEffect to fix the exhaustive-deps warning.…
I had a tryst with the eslint exhaustive-deps rule recently. It made me go down the rabbit hole and realize that I have been using the useEffect hook wrong. In this article, I will be…
useTransition and useDeferredValue are two new hooks React introduced with React 18 earlier this year. These two hooks make use of React’s concurrent rendering to allow developers to provide a better user experience in their…