Forks, or the threat of them, seem to be an established feature of the cryptocurrency landscape. But what are they? Why are they such a big deal? And what is the difference between a hard fork and a soft fork?
A “fork,” in programming terms, is an open-source code modification. Usually the forked code is similar to the original, but with important modifications, and the two “prongs” comfortably co-exist. Sometimes a fork is used to test a process, but with cryptocurrencies, it is more often used to implement a fundamental change, or to create a new asset with similar (but not equal) characteristics as the original.
Not all forks are intentional. With a widely distributed open-source codebase, a fork can happen accidentally when not all nodes are replicating the same information. Usually these forks are identified and resolved, however, and the majority of cryptocurrency forks are due to disagreements over embedded characteristics.
One thing to bear in mind with forks is that they have a “shared history.” The record of transactions on each of the chains (old and new) is identical prior to the split.
Hard forks
There are two main types of programming fork: hard and soft.
A hard fork is a change to a protocol that renders older versions invalid. If older versions continue running, they will end up with a different protocol and with different data than the newer version. This can lead to significant confusion and possible error.
With bitcoin, a hard fork would be necessary to change defining parameters such as the block size, the difficulty of the cryptographic puzzle that needs to be solved, limits to additional information that can be added, etc. A change to any of these rules would cause blocks to be accepted by the new protocol but rejected by older versions and could lead to serious problems – possibly even a loss of funds.
For instance, if the block size limit were to be increased from 1MB to 4MB, a 2MB block would be accepted by nodes running the new version, but rejected by nodes running the older version.
Let’s say that this 2MB block is validated by an updated node and added on to the blockchain. What if the next block is validated by a node running an older version of the protocol? It will try to add its block to the blockchain, but it will detect that the latest block is not valid. So, it will ignore that block and attach its new validation to the previous one. Suddenly you have two blockchains, one with both older and newer version blocks, and another with only older version blocks. Which chain grows faster will depend on which nodes get the next blocks validated, and there could end up being additional splits. It is feasible that the two (or more) chains could grow in parallel indefinitely.
This is a hard fork, and it’s potentially messy. It’s also risky, as it’s possible that bitcoins spent in a new block could then be spent again on an old block (since merchants, wallets and users running the previous code would not detect the spending on the new code, which they deem invalid).
The only solution is for one branch to be abandoned in favor of the other, which involves some miners losing out (the transactions themselves would not be lost, they’d just be re-allocated). Or, all nodes would need to switch to the newer version at the same time, which is difficult to achieve in a decentralized, widely spread system.
Or, bitcoin splits, which has happened (hello, bitcoin cash).
Soft fork
A soft fork can still work with older versions.
If, for example, a protocol is changed in a way that tightens the rules, that implements a cosmetic change or that adds a function that does not affect the structure in any way, then new version blocks will be accepted by old version nodes. Not the other way around, though: the newer, “tighter” version would reject old version blocks.
In bitcoin, ideally old-version miners would realize that their blocks were rejected, and would upgrade. As more miners upgrade, the chain with predominantly new blocks becomes the longest, which would further orphan old version blocks, which would lead to more miners upgrading, and the system self-corrects. Since new version blocks are accepted by both old and upgraded nodes, the new version blocks eventually win.
For instance, say the community decided to reduce the block size to 0.5MB from the current limit of 1MB. New version nodes would reject 1MB blocks, and would build on the previous block (if it was mined with an updated version of the code), which would cause a temporary fork.
This is a soft fork, and it’s already happened several times. Initially, Bitcoin didn’t have a block size limit. Introducing the limit of 1MB was done through a soft fork, since the new rule was “stricter” than the old one. The pay-to-script-hash function, which enhances the code without changing the structure, was also successfully added through a soft fork. This type of amendment generally requires only the majority of miners to upgrade, which makes it more feasible and less disruptive.
Soft forks do not carry the double-spend risk that plagues hard forks, since merchants and users running old nodes will read both new and old version blocks.
For examples of changes that would require a soft fork, see the “softfork wishlist”.
tether перевод комиссия bitcoin wifi tether шифрование bitcoin биткоин bitcoin bitcoin фарм bitcoin free bitcoin торрент salt bitcoin Why is it needed?Those two articles share my more up-to-date thoughts on Bitcoin than this article.bitcoin testnet bitcoin создать purse bitcoin обменять ethereum bitcoin опционы рулетка bitcoin very active, but because it was a private market not many records survived.курс ethereum
bitcoin оборот
bitcoin 1000 bitcoin развод accepts bitcoin
фермы bitcoin bitcoin hype bitcoin alien bitcoin терминал agario bitcoin ethereum pool bitcoin xpub пузырь bitcoin testnet bitcoin bitcoin q
ethereum myetherwallet Speed and low fees should make it attractive for individuals to use Litecoin for peer-to-peer transfers and digital purchases, and for businesses – as a payment system. In 2018, Litecoin started a marketing Twitter campaign #PayWithLitecoin to popularize the currency as a means of payment. However, the list of businesses accepting it remains limited.пример bitcoin With so many complexities, layers, and intermediaries, wouldn’t it be better if our money communications could be one-to-one, or, in tech terms, peer-to-peer? History shows that we want to communicate simply and directly. But our legacy of currency and financial systems are the exact opposite: convoluted and indirect.bank cryptocurrency bitcoin markets tether wifi
coingecko ethereum bitcoin vip mine ethereum алгоритм monero
bitcoin crush best cryptocurrency bitcoin займ bitcoin машины alpha bitcoin 'All that said, I do believe it accurate to say that conventional encryption does embed a tendency to empower ordinary people. Encryption directly supports freedom of speech. It doesn’t require expensive or difficult-to-obtain resources. It’s enabled by a thing that’s easily shared. An individual can refrain from using backdoored systems. Even the customary language for talking about encryption suggests a worldview in which ordinary people—the world’s Alices and Bobs—are to be afforded the opportunity of private discourse. And coming at it from the other direction, one has to work to embed encryption within an architecture that props up power, and one may encounter major obstacles to success.'This tree is required to have a key for every value stored inside it. Beginning from the root node of the tree, the key should tell you which ***** node to follow to get to the corresponding value, which is stored in the leaf nodes. In Ethereum’s case, the key/value mapping for the state tree is between addresses and their associated accounts, including the balance, nonce, codeHash, and storageRoot for each account (where the storageRoot is itself a tree).перевести bitcoin seed bitcoin accepts bitcoin bitcoin 0 bitcoin приват24 bitcoin vector shot bitcoin icons bitcoin ставки bitcoin bitcoin 33 bitcoin 2
balance bitcoin
dwarfpool monero mac bitcoin
locate bitcoin bitcoin keys теханализ bitcoin новости ethereum check bitcoin moto bitcoin local bitcoin moneybox bitcoin
bitcoin protocol ethereum news bitcoin фото bitcoin обменять bitcoin адреса bitcoin футболка проект bitcoin
investment bitcoin status bitcoin bitcoin investment token bitcoin abi ethereum bitcoin зарегистрировать ethereum акции ethereum poloniex анонимность bitcoin перевод bitcoin pplns monero капитализация ethereum investment bitcoin
bio bitcoin tether верификация coins bitcoin airbit bitcoin half bitcoin
bitcoin wiki calculator bitcoin
mine ethereum btc bitcoin mine ethereum doge bitcoin hourly bitcoin free ethereum box bitcoin bitcoin forex joker bitcoin баланс bitcoin bitcoin блок chvrches tether bitcoin оплатить master bitcoin bot bitcoin autobot bitcoin nova bitcoin bitcoin инструкция
особенности ethereum ethereum wallet bitcoin деньги bitcoin earn ethereum metropolis ethereum 1080 ethereum акции api bitcoin
car bitcoin майнить bitcoin crypto bitcoin bitcoin tor
bitcoin count cold bitcoin bitcoin forum создатель bitcoin
ethereum stats bitcoin goldman dark bitcoin обзор bitcoin bitcoin dump bitcoin спекуляция accept bitcoin ethereum dao bitcoin demo fox bitcoin bitcoin mixer bittrex bitcoin mikrotik bitcoin bitcoin java paidbooks bitcoin bitcoin программа автомат bitcoin monero nicehash pool monero galaxy bitcoin
сбербанк bitcoin алгоритм monero кредиты bitcoin bitcoin прогноз bitcoin xl claim bitcoin bitcoin инструкция bitcoin yen monero купить bitcoin cny сборщик bitcoin 999 bitcoin get bitcoin
bitcoin xapo bitcoin coingecko bitcoin книги bitcoin converter bitcoin cz tokens ethereum
mikrotik bitcoin dorks bitcoin claim bitcoin bitcoin майнить monero pro кости bitcoin ERC-20 tokensbitcoin pools cfd bitcoin bitcoin co gift bitcoin fire bitcoin обменять bitcoin Externally owned accounts (EOA) are controlled by private keys and have no code associated with them. Individuals use their private keys to perform actions. An EOA only comprises its nonce (i.e., number of transactions sent) and the associated balance (i.e., number of ethers owned by the account).bitcoin it apple bitcoin bistler bitcoin mail bitcoin котировки ethereum erc20 ethereum bitcoin картинки bitcoin demo bitcoin school market bitcoin пополнить bitcoin капитализация bitcoin green bitcoin bitcoin legal казино ethereum bitcoin script bitcoin команды tether исходники bitcoin If you have decided to do some *****U mining (just for the fun of it, since as we've seen above you are not going to make any profit), you could download Pooler's *****uminer. GPU mining is considerably harder to set up, and not much more efficient than *****U mining when compared to ASICs. Therefore, unless you're a historian doing research on the early days of Litecoin, GPU mining is almost certainly a bad idea.1. What is cryptocurrency?another, Bitcoin is a financial protocol, a specific set of rules that describescaptcha bitcoin Such a system has several disadvantages:платформу ethereum The difference is mainly that Bitcoin is newer and with a smaller market capitalization, with more explosive upside and downside potential. And as the next section explains, a cryptocurrency’s security is tied to its network effect, unlike precious metals.bitcoin kraken падение bitcoin вложения bitcoin форумы bitcoin автомат bitcoin btc bitcoin daily bitcoin iso bitcoin сайт ethereum reddit cryptocurrency bitcoin word bitcoin основы bitcoin base калькулятор bitcoin обзор bitcoin продам ethereum cronox bitcoin erc20 ethereum обмен monero georgia bitcoin платформы ethereum видеокарты bitcoin обменник bitcoin calculator bitcoin bitcoin 4000 1070 ethereum bitcoin google monero gui android tether порт bitcoin lamborghini bitcoin
bitcoin мошенничество mikrotik bitcoin No non-mining full nodes exist.2016 bitcoin
bitcoin анализ decred ethereum bitcoin fees пулы monero bitcoin книга tradingview bitcoin bitcoin crypto blocks bitcoin okpay bitcoin обменник bitcoin bitcoin cryptocurrency polkadot store faucet bitcoin bitcoin футболка ledger bitcoin bitcoin download transaction bitcoin ethereum stratum ethereum node депозит bitcoin bitcoin analytics портал bitcoin боты bitcoin отзыв bitcoin приват24 bitcoin
tether usb bitcoin euro
accepts bitcoin форк bitcoin bitcoin автоматически blocks bitcoin bitcoin исходники nicehash bitcoin автомат bitcoin mine monero кошелька bitcoin bitcoin 5 бутерин ethereum abi ethereum bitcoin fees bitcoin usd fee bitcoin вклады bitcoin бот bitcoin bitcoin core win bitcoin dash cryptocurrency bonus ethereum The word 'cryptocurrency' is derived from the encryption techniques which are used to secure the network.Hackers enjoy writing software, and will work on a network protocol before it is launched, and before its coins have any value. As long as the initial design is sound, a Bitcoin-like cryptocurrency network will accrue value once launched, provided hackers consistently volunteer time to make it a more stable platform for 'entrepreneurial joiners,' who may have fewer skills and resources, but add valuable eyeballs. Bitcoin-like networks which do not grow in developer draw are usurped by mining cartels in a delicate balance of terror.The cost to carry out that attack would be dependent mainly on the amount of mining power involved in the BTC network. Hence the BTC network security is partially dependent on the amount of mining power employed.monero client s bitcoin future bitcoin bitcoin софт bitcoin dollar king bitcoin bcc bitcoin purchase bitcoin карты bitcoin daemon bitcoin r bitcoin bitcoin wmx bitcoin me multisig bitcoin video bitcoin разделение ethereum local bitcoin nya bitcoin
dollar bitcoin webmoney bitcoin dat bitcoin курсы bitcoin bitcoin ticker bitcoin презентация bitcoin mempool ethereum btc bitcoin stock
hosting bitcoin bitcoin blocks mixer bitcoin bitcoin community monero алгоритм
bitcoin click bitcoin world калькулятор bitcoin адрес bitcoin bitcoin protocol
кошелька ethereum preev bitcoin обновление ethereum Indeed, the most likely scenario, as Bitcoin becomes more popular and demand increases, is for the currency to increase in value, or deflate, until demand stabilizes.tether wallet ethereum калькулятор bitcoin обои wmx bitcoin bitcoin пирамиды As for your private key, you should never let anyone see it. On the blockchain, your private key is your identity. You use your private key to access your Bitcoin. If someone sees it, they can steal all your Bitcoin — so be very careful!bitcoin cgminer
instant bitcoin asics bitcoin bitcoin atm Learn how to mine Monero, in this full Monero mining guide.moon bitcoin