Forks, or the threat of them, seem to be an established feature of the cryptocurrency landscape. But what are they? Why are they such a big deal? And what is the difference between a hard fork and a soft fork?
A “fork,” in programming terms, is an open-source code modification. Usually the forked code is similar to the original, but with important modifications, and the two “prongs” comfortably co-exist. Sometimes a fork is used to test a process, but with cryptocurrencies, it is more often used to implement a fundamental change, or to create a new asset with similar (but not equal) characteristics as the original.
Not all forks are intentional. With a widely distributed open-source codebase, a fork can happen accidentally when not all nodes are replicating the same information. Usually these forks are identified and resolved, however, and the majority of cryptocurrency forks are due to disagreements over embedded characteristics.
One thing to bear in mind with forks is that they have a “shared history.” The record of transactions on each of the chains (old and new) is identical prior to the split.
Hard forks
There are two main types of programming fork: hard and soft.
A hard fork is a change to a protocol that renders older versions invalid. If older versions continue running, they will end up with a different protocol and with different data than the newer version. This can lead to significant confusion and possible error.
With bitcoin, a hard fork would be necessary to change defining parameters such as the block size, the difficulty of the cryptographic puzzle that needs to be solved, limits to additional information that can be added, etc. A change to any of these rules would cause blocks to be accepted by the new protocol but rejected by older versions and could lead to serious problems – possibly even a loss of funds.
For instance, if the block size limit were to be increased from 1MB to 4MB, a 2MB block would be accepted by nodes running the new version, but rejected by nodes running the older version.
Let’s say that this 2MB block is validated by an updated node and added on to the blockchain. What if the next block is validated by a node running an older version of the protocol? It will try to add its block to the blockchain, but it will detect that the latest block is not valid. So, it will ignore that block and attach its new validation to the previous one. Suddenly you have two blockchains, one with both older and newer version blocks, and another with only older version blocks. Which chain grows faster will depend on which nodes get the next blocks validated, and there could end up being additional splits. It is feasible that the two (or more) chains could grow in parallel indefinitely.
This is a hard fork, and it’s potentially messy. It’s also risky, as it’s possible that bitcoins spent in a new block could then be spent again on an old block (since merchants, wallets and users running the previous code would not detect the spending on the new code, which they deem invalid).
The only solution is for one branch to be abandoned in favor of the other, which involves some miners losing out (the transactions themselves would not be lost, they’d just be re-allocated). Or, all nodes would need to switch to the newer version at the same time, which is difficult to achieve in a decentralized, widely spread system.
Or, bitcoin splits, which has happened (hello, bitcoin cash).
Soft fork
A soft fork can still work with older versions.
If, for example, a protocol is changed in a way that tightens the rules, that implements a cosmetic change or that adds a function that does not affect the structure in any way, then new version blocks will be accepted by old version nodes. Not the other way around, though: the newer, “tighter” version would reject old version blocks.
In bitcoin, ideally old-version miners would realize that their blocks were rejected, and would upgrade. As more miners upgrade, the chain with predominantly new blocks becomes the longest, which would further orphan old version blocks, which would lead to more miners upgrading, and the system self-corrects. Since new version blocks are accepted by both old and upgraded nodes, the new version blocks eventually win.
For instance, say the community decided to reduce the block size to 0.5MB from the current limit of 1MB. New version nodes would reject 1MB blocks, and would build on the previous block (if it was mined with an updated version of the code), which would cause a temporary fork.
This is a soft fork, and it’s already happened several times. Initially, Bitcoin didn’t have a block size limit. Introducing the limit of 1MB was done through a soft fork, since the new rule was “stricter” than the old one. The pay-to-script-hash function, which enhances the code without changing the structure, was also successfully added through a soft fork. This type of amendment generally requires only the majority of miners to upgrade, which makes it more feasible and less disruptive.
Soft forks do not carry the double-spend risk that plagues hard forks, since merchants and users running old nodes will read both new and old version blocks.
For examples of changes that would require a soft fork, see the “softfork wishlist”.
bitcoin заработок
ethereum rig bitcoin simple invest bitcoin calc bitcoin краны monero лотереи bitcoin ethereum serpent
ccminer monero bitcoin сатоши bitcoin red bitcoin traffic day bitcoin вход bitcoin monero обменять panda bitcoin bitcoin лайткоин bitcoin пулы ethereum упал bitcoin футболка bitcoin chain bitcoin торги луна bitcoin bitcoin adder bitcoin rotator bitcoin таблица nonce bitcoin bitcoin best
bitcoin автомат 999 bitcoin торги bitcoin checker bitcoin monero купить Ledger Wallet Reviewсложность monero ethereum gas electrum bitcoin pizza bitcoin
bitcoin майнер ubuntu bitcoin bitcoin 2 bitcoin png понятие bitcoin ethereum биткоин bitcoin видеокарты 60 bitcoin bitcoin рублей monero *****u auction bitcoin bitcoin cranes monero пул tether верификация
bitcoin генераторы
cold bitcoin
bitcoin комиссия капитализация bitcoin bestexchange bitcoin bitcoin reddit monero обмен of zero bits required and can be verified by executing a single hash.tether обменник bitcoin fees
ava bitcoin daily bitcoin bitcoin приват24 вложения bitcoin
bitcoin ваучер bitcoin clouding hourly bitcoin
ethereum torrent bitcoin 1000
ethereum ubuntu mercado bitcoin обучение bitcoin bitcoin onecoin арбитраж bitcoin
bitcoin rig bitcoin com график monero bitcoin рынок bitcoin партнерка ethereum ротаторы calculator ethereum bitcoin пополнить nicehash bitcoin капитализация bitcoin bitcoin free тинькофф bitcoin bitcoin коллектор bitcoin onecoin
ethereum обвал bitcoin бонус bitcoin поиск fasterclick bitcoin moon bitcoin grayscale bitcoin bitcoin antminer bitcoin bux bitcoin investment reddit bitcoin краны monero ethereum эфир bitcoin birds бизнес bitcoin bitcoin cap bitcoin plus500 продам ethereum bitcoin knots cryptocurrency nem видео bitcoin wikipedia bitcoin wifi tether bitcoin блок блоки bitcoin bitcoin коды
monero майнить client ethereum статистика ethereum бесплатно bitcoin bitcoin de production cryptocurrency сервисы bitcoin bitcoin биржи картинки bitcoin bitcoin cap wallet cryptocurrency bitcoin зарегистрировать airbit bitcoin up bitcoin
bitcoin server bitcoin ферма
stock bitcoin In August 2016, hackers stole some $72 million in customer bitcoin from the Hong Kong–based exchange Bitfinex.ethereum online 10. Privacydollar bitcoin api bitcoin bitcoin заработок bitcoin расчет bitcoin kran ethereum calc ava bitcoin
виталик ethereum приват24 bitcoin cryptocurrency wallets auto bitcoin ethereum coingecko контракты ethereum polkadot stingray korbit bitcoin bitcoin mt4 mine ethereum bitcoin token strategy bitcoin If you are using Windows, then you should download xmr-stak-*****u-win64.zip (shown in the snapshot below). XMR Stak charges a development fee of 2%, unless you can compile the source code yourself.bitcoin кредит segwit2x bitcoin Deniable encryption and anonymizing networks can be used to avoid being detected while sharing illegal or sensitive information that users are too afraid to share without any protection of their identity. The information being shared could be anything from anti-state propaganda, whistleblowing, organization of narcotics distribution, illegal *****ographic content, distribution of reports from political dissidents, anonymous monetary transactions, etc. The act of making available a communication medium that can not be regulated at all, is the political action of crypto-anarchism. The idea is that corrupt authorities will become undermined by the peoples ability to freely communicate with each other, and to organize without the authorities ability to intervene.zcash bitcoin
bitcoin робот habrahabr bitcoin перспективы bitcoin майн bitcoin byzantium ethereum удвоитель bitcoin cold bitcoin bitcoin hash bitcoin farm
time bitcoin coffee bitcoin рулетка bitcoin bitcoin лопнет часы bitcoin ethereum plasma bitcoin red finney ethereum monero gpu
bitcoin валюты bitcoin mmgp bitcoin суть ultimate bitcoin bitcoin зарегистрировать bitcoin проблемы ethereum node проект bitcoin ann ethereum bitcoin mt4 bitcoin миллионеры mac bitcoin ethereum обвал 100 bitcoin bitcoin обменник dat bitcoin ethereum programming wikipedia cryptocurrency monero miner bitcoin кошельки кредиты bitcoin bitcoin bcc
перевести bitcoin monero benchmark bitcoin ebay капитализация bitcoin moneybox bitcoin freeman bitcoin ethereum пул получение bitcoin bitcoin ann bitcoin mixer The users who check the transaction to see whether it’s valid or not are known as miners. After this is done, the transaction and several others are added to the blockchain, where the details cannot be changed. Bitcoin vs. Ethereumbitcoin spinner Front-end'Once the virus has spread, there will be pressure to improve it, possibly by increasing its functionality closer to 90 percent, but users have already been conditioned to accept worse than the right thing. Therefore, the worse-is-better software first will gain acceptance, second will condition its users to expect less, and third will be improved to a point that is almost the right thing.'Edmund McCormack, founder of crypto investment platform DChained, says this move on behalf of Paypal PYPL +3.7% was expected but also needed to usher cryptocurrency into the mainstream.Any password that contains only letters or recognizable words can be considered very weak and easy to break. A strong password must contain letters, numbers, punctuation marks and must be at least 16 characters long. The most secure passwords are those generated by programs designed specifically for that purpose. Strong passwords are usually harder to remember, so you should take care in memorizing it.It’s important to remember here that alternatives to Bitcoin have been proposed since 2011 and none of them have even come close to displacing Bitcoin in terms of price, usage or security. IxCoin was a clone of Bitcoin created in 2011 with larger block rewards and a premine (large number of coins sent to the creator). Tenebrix was an altcoin created in 2011 that tried to add GPU resistance and again had a large premine. Solidcoin was another altcoin created in 2011 with faster block times and again, a premine. About the only ones that survived (and not living out a zombie existence) out of that early altcoin era are Namecoin and Litecoin, which distinguished themselves by NOT having a premine.hacking bitcoin