Skip to content

Book-Bit & Coin

Triple Entry Accounting & Blockchain

Triple entry accounting was introduced by Ian Grigg in 2005 (Triple Entry Accounting (iang.org). Bitcoin blockchain is a perfect system on which triple entry accounting can be implemented. This is not only because Bitcoin blockchain is an ideal 'independent third-party' to keep and verify the third entry (cryptographically signed cross-entity receipts as transaction records), but also because it provides a highly efficient built-in payment system.

Read more... The full content of this chapter is available in the two-volume book:

Bit & Coin

Merging Digitality and Physicality

Volume IDigital Humanity’s Truth Layer - The New Internet, its Authenticity Layer, and Applications
Introduction
Order on Amazon

Volume IIBitcoin, Blockchain, and Beyond - Essays of Science, Economics, Law, Ethics, and Controversies
Introduction
(coming soon)

The US needs leadership in Blockchain and the New Internet

Statements of purpose: In this document, we first point out the existing problems in the field of blockchain and cryptocurrencies, but it is not our belief that a crackdown by the US government can be the primary solution to the problem. Rather, our focus is to point out the right direction of the technological development...

Read more... The full content of this chapter is available in the two-volume book:

Bit & Coin

Merging Digitality and Physicality

Volume IDigital Humanity’s Truth Layer - The New Internet, its Authenticity Layer, and Applications
Introduction
Order on Amazon

Volume IIBitcoin, Blockchain, and Beyond - Essays of Science, Economics, Law, Ethics, and Controversies
Introduction
(coming soon)

Value – creation, definition & transaction

From an abstract point of view, the three most fundamental elements of the human economic and financial system are: (1) creation of value (2) definition of value (3) transaction of value.   Creation of value ‘Creation of value‘ is the central purpose of a productive economy. It should not be controversial to say that value is...

Read more... The full content of this chapter is available in the two-volume book:

Bit & Coin

Merging Digitality and Physicality

Volume IDigital Humanity’s Truth Layer - The New Internet, its Authenticity Layer, and Applications
Introduction
Order on Amazon

Volume IIBitcoin, Blockchain, and Beyond - Essays of Science, Economics, Law, Ethics, and Controversies
Introduction
(coming soon)

Switching to PoS – Ethereum’s predicted corruption

Ethereum is about to switch from Proof-of-Work (PoW) to Proof-of-Stake (PoS). It is a predictable stage of corruption for an account-based system like Ethereum (see below). But it is incredible that people, even institutional investors, actually thought PoS was going to scale Ethereum.  It’s scientifically impossible, because scalability has to do with parallelization, which is...

Read more... The full content of this chapter is available in the two-volume book:

Bit & Coin

Merging Digitality and Physicality

Volume IDigital Humanity’s Truth Layer - The New Internet, its Authenticity Layer, and Applications
Introduction
Order on Amazon

Volume IIBitcoin, Blockchain, and Beyond - Essays of Science, Economics, Law, Ethics, and Controversies
Introduction
(coming soon)

More proof that UTXO is superior to account-based systems

The biggest structural and elemental difference between Bitcoin and Ethereum is that the former uses Unspent Transaction Output (UTXO) while the latter uses an account-based model. UTXO is like cash, In that every bill or coin is independent from each other. As long as a dollar bill itself is authentic, the validity of a transfer...

Read more... The full content of this chapter is available in the two-volume book:

Bit & Coin

Merging Digitality and Physicality

Volume IDigital Humanity’s Truth Layer - The New Internet, its Authenticity Layer, and Applications
Introduction
Order on Amazon

Volume IIBitcoin, Blockchain, and Beyond - Essays of Science, Economics, Law, Ethics, and Controversies
Introduction
(coming soon)

The unsecure Lightning Network as BTC’s layer 2 scaling protocol

“University of Illinois researchers have discovered a vulnerability in Bitcoin’s most popular second layer scaling protocol, the Lightning Network. Cosimo Sguanci and Anastasios Sidiropoulos published an academic paper describing a hypothetical attack based on a collusion of node operators. At the time of publication, they estimated that a coalition of 30 nodes could steal 750...

Read more... The full content of this chapter is available in the two-volume book:

Bit & Coin

Merging Digitality and Physicality

Volume IDigital Humanity’s Truth Layer - The New Internet, its Authenticity Layer, and Applications
Introduction
Order on Amazon

Volume IIBitcoin, Blockchain, and Beyond - Essays of Science, Economics, Law, Ethics, and Controversies
Introduction
(coming soon)

Craig Wright is Satoshi, counterarguments

Concerning the identity of Satoshi, someone suggested that I “dig deeper.” I appreciate the suggestion for more diligence, but I’ve done more than my share. And I’ve got more important things to do than proving someone’s identity, even if it is one as important as Satoshi’s. I’ve carefully looked into the arguments against Wright. They...

Read more... The full content of this chapter is available in the two-volume book:

Bit & Coin

Merging Digitality and Physicality

Volume IDigital Humanity’s Truth Layer - The New Internet, its Authenticity Layer, and Applications
Introduction
Order on Amazon

Volume IIBitcoin, Blockchain, and Beyond - Essays of Science, Economics, Law, Ethics, and Controversies
Introduction
(coming soon)

More on layer 2 solutions

With Ethereum merge rolling out, the cryptoverse is excited. I tried to pour some cold water in this article: Layer 2 solutions I doubt many will pay attention. But I still feel compelled to shout out, seeing a train going at a wrong direction. As written in the previous article Layer 2 solutions, rollups are...

Read more... The full content of this chapter is available in the two-volume book:

Bit & Coin

Merging Digitality and Physicality

Volume IDigital Humanity’s Truth Layer - The New Internet, its Authenticity Layer, and Applications
Introduction
Order on Amazon

Volume IIBitcoin, Blockchain, and Beyond - Essays of Science, Economics, Law, Ethics, and Controversies
Introduction
(coming soon)

Layer 2 solutions

Bitcoin Core (BTC) and Ethereum failing to scale has opened the doors for a variety of layer-2 solutions (L2 solutions). The supporters of these unscalable blockchains set their hopes on L2 solutions in no small measure. Because these blockchains’ nonscalability is inherent with their fundamental designs rather than a temporary development limitation, L2 is their...

Read more... The full content of this chapter is available in the two-volume book:

Bit & Coin

Merging Digitality and Physicality

Volume IDigital Humanity’s Truth Layer - The New Internet, its Authenticity Layer, and Applications
Introduction
Order on Amazon

Volume IIBitcoin, Blockchain, and Beyond - Essays of Science, Economics, Law, Ethics, and Controversies
Introduction
(coming soon)

Anonymity and Privacy

In the world of blockchain and cryptocurrencies, there’s a struggle over the distinction between anonymity and privacy.  Even some of the most articulate people struggle and stumble over explaining these concepts. The struggle is due to misunderstanding of the concepts and reality. Sure, one can make a distinction based on the literal meaning of the words....

Read more... The full content of this chapter is available in the two-volume book:

Bit & Coin

Merging Digitality and Physicality

Volume IDigital Humanity’s Truth Layer - The New Internet, its Authenticity Layer, and Applications
Introduction
Order on Amazon

Volume IIBitcoin, Blockchain, and Beyond - Essays of Science, Economics, Law, Ethics, and Controversies
Introduction
(coming soon)