All things you should know about Cryptocurrency

Get Started. It's Free
or sign up with your email address
Cryptocurrency by Mind Map: Cryptocurrency

1. (Notable) Altcoins

1.1. Litecoin

2. Bitcoin

2.1. Knowledge Base

2.1.1. News Bitcoin Magazine CoinDesk The Genesis Block

2.1.2. Learning Resources Bitcoin Wiki General FAQ

2.1.3. Charts and Statistics

2.1.4. Forums & SNS BitcoinTalk Forum Reddit's Bitcoin Community Bitcoin StackExchange (Q&A) Facebook Page Google+ Bitcoin Community

2.2. Operation

2.2.1. Bitcoin Foundation

2.2.2. Conferences and Events

2.3. Bitcoin Network

2.3.1. Historical Incidents or Alerts Bitcoin - Network status and alerts

2.3.2. Features Bitcoins can be transferred between arbitrary nodes on the network. Transactions Irreversible Transactions are broadcasted within seconds and verified within 10 to 60 minutes. Double spending is prevented by using a block chain. Transactions can be received at any time regardless of whether your computer is turned on or off. Nobody owns the Bitcoin network much like no one owns the technology behind email. Bitcoin is controlled by all Bitcoin users around the world.

2.3.3. Current Status

2.4. Protocol

2.5. Trading & Exchange Market

2.5.1. Futures MPEx MT4 796 Futures

2.5.2. Stocks BTC-E Bitstamp

2.5.3. Funds

2.5.4. Bunds


2.6. Merchants & Payment


2.6.2. BitPay

2.7. Economic Rules

2.7.1. Hard limit of about 21 million Bitcoins.

2.7.2. Bitcoins are divisible to 8 decimal places yielding a total of approx. 21×1014 currency units.

2.7.3. Transactions are cheap, and mostly free (Transaction fees).

2.8. Developement

2.8.1. Founder Satoshi Nakamoto 中本哲史

2.8.2. Core developers

2.8.3. Software Projects Bitcoin-Qt bitcoinj MultiBit Bitcoin Wallet for Android Armory Electrum picocoin python-bitcoinlib Bits of Proof Enterprise Bitcoin Server

3. (Bitcoin) Blockchain

3.1. Transactions

3.2. Blocks

3.3. trusted timestamping (timelock)

3.4. Coloring

4. Mining

4.1. Mining Schemes

4.1.1. PoW cryptographic hashing algorithm SHA-256(d) hash Scrypt hash 1CC/2CC/TWN hash Momentum hash

4.1.2. PoS Peercoin(PPC)

4.1.3. PoB

4.1.4. PoE

4.1.5. PoD

4.2. Mining Hardware

4.2.1. CPU

4.2.2. GPU

4.2.3. FPGA miners

4.2.4. ASIC miners

4.3. Mining Difficulty

4.3.1. Diff retarget

4.4. Mining Rewards

4.5. Pooled Mining

4.5.1. Pros Pooled mining generates a steadier income. Pooled mining can generate a 1-2% higher income (before fees, if any) due to long polling provided by the pools.

4.5.2. Cons Pool mining can suffer interruptions from outages at the pool provider. Pooled mining tends to generate a smaller income due to fees being charged and transaction fees not being cashed out. Pools might be part of attack scenarios.

4.5.3. Leading Pools Merged Mining BTC Guild Bitcoin Mining Eligius Bitcoin Mining Discus Fish (F2Pool) Bitcoin Mining Litecoin Mining Protoshares Mining Slush Bitcoin Mining P2Pool decentralized Bitcoin mining

4.5.4. Reward Types & Explanation PPLNS PPS Others Visual examples of the various payout methods Comparison of mining pools

4.6. Solo Mining

4.6.1. Pros Solo mining is less prone to outages resulting in higher uptime. Solo mining doesn't incur any fees. For each discovered block, 25 BTC and the transaction fees are paid to the miner.

4.6.2. Cons Solo mining tends to generate more erratic income. Solo mining wastes time due to only supporting getwork pull. Solo Mining needs a large amount of hashing power, thus it's almost impossible to do with bitcoins, while mining alt-coins in solo mode is still acceptable

4.7. Mining Software

5. Usage & Solution

5.1. General Trading

5.1.1. fee

5.2. Micropayments

6. Distribution

6.1. Node

6.2. public ledger

6.3. wallets

6.3.1. Addresses

6.3.2. Desktop wallets

6.3.3. Mobile wallets

6.3.4. Web wallets

6.3.5. Cold storage Paper wallets

7. History

8. Encryption & Signing

9. Spreading

9.1. Geographical

9.2. Value

9.3. Media

9.4. Users

10. Compliance & Legal Status



10.3. Virtual Currency Schemes - European Central Bank

10.4. Application of FinCEN’s Regulations to Persons Administering, Exchanging, or Using Virtual Currencies

10.5. AML

11. Security

11.1. Common_Vulnerabilities

11.1.1. 51% Attack

11.1.2. Double Spending Race attack Finney attack Vector76 attack Brute force attack

12. Features

12.1. Decentralized

12.2. Pseudonymous

12.3. Digital currency secured and validated by cryptography

12.4. Digital Medium of Exchange

12.5. Supporting real-time, independent transfer

12.6. Peer to Peer, data saved on the net

12.7. The generation algorithm defines, in advance, how currency will be created and at what rate.

13. Cryptocurrency All-in-One Mindmap v0.2 by LuoboTiX