1. Start with a hard-coded list of peers
2. Connect to a random subset of known peers
3. Ask connected peers for their known peers
4. GOTO 2
1. Listen for incoming data from connected peers
2. If you're seen a piece of data before, ignore it
3. If not, broadcast it to all connected peers
4. GOTO 1
1. Maintain a reputation score for each connected peer
2. Increment for each valid broadcast received
3. Decrement for each invalid broadcast received
4. If reputation falls below threshold, blacklist peer
THERE ARE NO GOOD "TRUST" PICTURES ON GOOGLE
OBLIGATORY IMAGE OF PADLOCKS WHILST TALKING PUBLIC/PRIVATE KEY CRYPTO
Coins are created during some kind of cryptographic voodoo ceremony which occurs during mining
Coins are created by mutual agreement of users.
The validation code run by nodes treats the first transaction in a block as an exception.
The inputs of the first transaction are not validated.
IMAGE STOLEN, BUT THEN THE SONG WAS AWFUL, SO IT'S MORALLY LEGIT
Proof of work is some kind of cryptographic witch-hunt to provide ultimate validation of a block
Proof of work could be any problem which is hard to compute but easy to verify.
It exists to artificially slow down the block creation time.
This permits time for the unreliable and slow network to come to a consensus.
<FIN>