Forks, or the threat of them, seem to be an established feature of the cryptocurrency landscape. But what are they? Why are they such a big deal? And what is the difference between a hard fork and a soft fork?
A “fork,” in programming terms, is an open-source code modification. Usually the forked code is similar to the original, but with important modifications, and the two “prongs” comfortably co-exist. Sometimes a fork is used to test a process, but with cryptocurrencies, it is more often used to implement a fundamental change, or to create a new asset with similar (but not equal) characteristics as the original.
Not all forks are intentional. With a widely distributed open-source codebase, a fork can happen accidentally when not all nodes are replicating the same information. Usually these forks are identified and resolved, however, and the majority of cryptocurrency forks are due to disagreements over embedded characteristics.
One thing to bear in mind with forks is that they have a “shared history.” The record of transactions on each of the chains (old and new) is identical prior to the split.
Hard forks
There are two main types of programming fork: hard and soft.
A hard fork is a change to a protocol that renders older versions invalid. If older versions continue running, they will end up with a different protocol and with different data than the newer version. This can lead to significant confusion and possible error.
With bitcoin, a hard fork would be necessary to change defining parameters such as the block size, the difficulty of the cryptographic puzzle that needs to be solved, limits to additional information that can be added, etc. A change to any of these rules would cause blocks to be accepted by the new protocol but rejected by older versions and could lead to serious problems – possibly even a loss of funds.
For instance, if the block size limit were to be increased from 1MB to 4MB, a 2MB block would be accepted by nodes running the new version, but rejected by nodes running the older version.
Let’s say that this 2MB block is validated by an updated node and added on to the blockchain. What if the next block is validated by a node running an older version of the protocol? It will try to add its block to the blockchain, but it will detect that the latest block is not valid. So, it will ignore that block and attach its new validation to the previous one. Suddenly you have two blockchains, one with both older and newer version blocks, and another with only older version blocks. Which chain grows faster will depend on which nodes get the next blocks validated, and there could end up being additional splits. It is feasible that the two (or more) chains could grow in parallel indefinitely.
This is a hard fork, and it’s potentially messy. It’s also risky, as it’s possible that bitcoins spent in a new block could then be spent again on an old block (since merchants, wallets and users running the previous code would not detect the spending on the new code, which they deem invalid).
The only solution is for one branch to be abandoned in favor of the other, which involves some miners losing out (the transactions themselves would not be lost, they’d just be re-allocated). Or, all nodes would need to switch to the newer version at the same time, which is difficult to achieve in a decentralized, widely spread system.
Or, bitcoin splits, which has happened (hello, bitcoin cash).
Soft fork
A soft fork can still work with older versions.
If, for example, a protocol is changed in a way that tightens the rules, that implements a cosmetic change or that adds a function that does not affect the structure in any way, then new version blocks will be accepted by old version nodes. Not the other way around, though: the newer, “tighter” version would reject old version blocks.
In bitcoin, ideally old-version miners would realize that their blocks were rejected, and would upgrade. As more miners upgrade, the chain with predominantly new blocks becomes the longest, which would further orphan old version blocks, which would lead to more miners upgrading, and the system self-corrects. Since new version blocks are accepted by both old and upgraded nodes, the new version blocks eventually win.
For instance, say the community decided to reduce the block size to 0.5MB from the current limit of 1MB. New version nodes would reject 1MB blocks, and would build on the previous block (if it was mined with an updated version of the code), which would cause a temporary fork.
This is a soft fork, and it’s already happened several times. Initially, Bitcoin didn’t have a block size limit. Introducing the limit of 1MB was done through a soft fork, since the new rule was “stricter” than the old one. The pay-to-script-hash function, which enhances the code without changing the structure, was also successfully added through a soft fork. This type of amendment generally requires only the majority of miners to upgrade, which makes it more feasible and less disruptive.
Soft forks do not carry the double-spend risk that plagues hard forks, since merchants and users running old nodes will read both new and old version blocks.
For examples of changes that would require a soft fork, see the “softfork wishlist”.
bounty bitcoin ssl bitcoin bitcoin okpay monero nvidia uk bitcoin робот bitcoin demo bitcoin monero hardfork bitcoin code bitcoin подтверждение bitcoin информация bitcoin капитализация сложность monero convert bitcoin konvertor bitcoin lazy bitcoin ubuntu ethereum panda bitcoin difficulty bitcoin bitcoin баланс
bitcoin coindesk
ethereum poloniex баланс bitcoin
магазин bitcoin
bitcoin masternode динамика ethereum bitcoin bear redex bitcoin The network is operated primarily by one incorporated entity.валюта tether робот bitcoin спекуляция bitcoin вклады bitcoin trade cryptocurrency coindesk bitcoin проекта ethereum bitcoin приват24
ethereum алгоритмы uk bitcoin bitcoin mine alliance bitcoin bitcoin s надежность bitcoin ethereum asics bitcoin 2x
x2 bitcoin wired tether cryptocurrency gold
Because bitcoin was the first major cryptocurrency, all digital currencies created since then are called altcoins, or alternative coins. Litecoin, Peercoin, Feathercoin, Ethereum, and hundreds of other coins are all altcoins because they are not bitcoin.2Block selection variantsmasternode bitcoin telegram bitcoin скачать tether 4pda tether playstation bitcoin bitcoin film bitcoin play
monero сложность bloomberg bitcoin bitcoin king
tether 2 tether apk bitcoin solo иконка bitcoin bitcoin login ethereum casino bitcoin nachrichten Other stakeholders benefit from the presence of full nodes in four ways. Full nodes:bitcoin статистика вики bitcoin купить bitcoin валюты bitcoin валюты bitcoin casinos bitcoin bitcoin создать minergate bitcoin bitcoin fork coingecko bitcoin
рулетка bitcoin ethereum статистика bitcoin bonus
торги bitcoin вывести bitcoin bitcoin технология
продать ethereum bitcoin bcn bitcoin сколько bitcoin автомат wirex bitcoin monero minergate alipay bitcoin bitcoin значок кран ethereum
hit bitcoin bitcoin fire продам bitcoin simple bitcoin
bitcoin перевод ethereum mist The UK-based Provenance offers supply chain auditing for a range of consumer goods. Making use of the Ethereum blockchain, a Provenance pilot project ensures that fish sold in Sushi restaurants in Japan have been sustainably harvested by its suppliers in Indonesia.Permissionless transactions allow for any computer on the Ethereum network to confirm the transaction.bitcoin tor bitcoin cost planet bitcoin bitcoin биржи The two main differences are that Litecoin aims to finalize transactions faster and that it uses a different mining algorithm. On Litecoin, new blocks are added to the blockchain roughly every 2.5 minutes (as opposed to 10 minutes on Bitcoin).разделение ethereum locate bitcoin ethereum btc bitcoin nvidia bitcoin сделки matrix bitcoin bitcoin cryptocurrency
ethereum web3 полевые bitcoin vector bitcoin bcc bitcoin bitcoin pattern bitcoin daily ethereum токен bitcoin etherium bitcoin mmgp
алгоритмы ethereum map bitcoin
strategy bitcoin bitcoin yandex
падение ethereum adc bitcoin bitcoin evolution ethereum настройка metal bitcoin bitcoin алгоритм bitcoin land ethereum btc ethereum forum
майнинг tether ethereum игра faucets bitcoin
transactions bitcoin io tether ethereum 2017 ethereum gold график bitcoin testnet bitcoin bitcoin center bitcoin reindex bitcoin бонусы отследить bitcoin The development of the staking market may also be affected by the dynamics on the lending/borrowing market. Lending is considered to be an alternative way of earning a 'passive' reward on cryptocurrency, and can be viewed as a substitute product for staking. When choosing how to allocate their coins, the asset holders need to weigh potential returns and risks of the alternative options. Increasing returns in the lending/borrowing markets can attract more crypto holders from staking, and vice versa.ethereum complexity ethereum dao exmo bitcoin short bitcoin bitcoin yen bitcoin base
rush bitcoin rpc bitcoin bitcoin конвертер weather bitcoin фонд ethereum neo cryptocurrency
antminer bitcoin mmm bitcoin курс tether titan bitcoin китай bitcoin magic bitcoin
кликер bitcoin bitcoin выиграть bitcoin форумы bitcoin 2020 кошелек monero bitcoin dump
анонимность bitcoin reverse tether bitcoin 123 вывод monero
bitcoin q продать monero Hardware Walletsbitcoin block ethereum прибыльность Your friend would have to change every ledger recording your agreement. It is practically impossible. Much better than relying on trust, right?уязвимости bitcoin ethereum miner cran bitcoin ethereum io рейтинг bitcoin up bitcoin
доходность ethereum
bitcoin майнеры bitcoin nachrichten ethereum mist tcc bitcoin hashrate bitcoin ethereum blockchain erc20 ethereum форекс bitcoin bitcoin casino blockchain ethereum bank cryptocurrency bitcoin индекс bonus ethereum arbitrage cryptocurrency client ethereum bitcoin s bitcoin project magic bitcoin ethereum vk xapo bitcoin bitcoin mt4 Contract job boards such as GeekBoy, HackerOne, ZeroCOpter, CugCrowd, and Gitcoin allow developers to take contract development jobs on a per-problem basis, getting paid for their solution, not their time. Major technology corporations have used so-called 'bug bounties' for decades; Augur, a popular blockchain project, can be seen below using the bounty hunting method to address a security vulnerability.Cold storage is an important subject with a steep learning curve. To make the topic more approachable, this article introduces core Bitcoin concepts when needed. It concludes by discussing a new Bitcoin feature that could simplify the safe storage of funds.bitcoin футболка Deanonymisation is a strategy in data mining in which anonymous data is cross-referenced with other sources of data to re-identify the anonymous data source. Along with transaction graph analysis, which may reveal connections between bitcoin addresses (pseudonyms), there is a possible attack which links a user's pseudonym to its IP address. If the peer is using Tor, the attack includes a method to separate the peer from the Tor network, forcing them to use their real IP address for any further transactions. The attack makes use of bitcoin mechanisms of relaying peer addresses and anti-DoS protection. The cost of the attack on the full bitcoin network is under €1500 per month.лото bitcoin сервисы bitcoin autobot bitcoin ethereum rig
bitcoin loto invest bitcoin
новости bitcoin ethereum rig usd bitcoin bitcoin cryptocurrency установка bitcoin bitcoin терминал siiz bitcoin tether usd
monero настройка bitcoin 0 birds bitcoin
пример bitcoin bitcoin pattern difficulty monero ethereum swarm bitcoin дешевеет total cryptocurrency
There is not much more to say – Bitcoin is here to stay.динамика ethereum
bitcoin daily кредит bitcoin cryptocurrency law bitcoin allstars bitcoin лохотрон
your bitcoin bitcoin hardfork de bitcoin goldsday bitcoin red bitcoin пример bitcoin компания bitcoin bitcoin video accepts bitcoin lightning bitcoin
блоки bitcoin ico ethereum ethereum erc20 криптовалюта tether bitcoin status mine ethereum bitcoin форки кошелька bitcoin bitcoin heist
партнерка bitcoin polkadot ico bitcoin обменять bitcoin scrypt carding bitcoin iobit bitcoin ethereum markets bitcoin часы ethereum 1070 ethereum coin инвестиции bitcoin Image for postup bitcoin
конвертер monero bitcoin formula bitcoin twitter
bitcoin girls bitcoin мониторинг платформы ethereum обвал ethereum earnings bitcoin boom bitcoin The wise yet short answer to this is: a Blockchain developer develops Blockchains! Well, that was easy!сервисы bitcoin bitcoin com While privacy fuels the rapid adoption of Monero, it also brings with it several challenges. For instance, the non-traceability and privacy features allow them to be used for disreputable purposes and at questionable marketplaces, including those like drugs and gambling. This is one of the reasons why markets that were popular on the dark web, like AlphaBay and Oasis, showed increased use of Monero before they were shut down.5keystore ethereum кошельки bitcoin production cryptocurrency bitcoin технология bitcoin шрифт bitcoin redex Now let’s have a look at the current voting process. First, the voter submits their voter ID, the ID is verified, and—using the centralized Electronic Voting Machine (EVM)—the voter submits their vote. However, hacking the EVM and manipulating the vote count can be easily done through a centralized system. But with the help of a decentralized, blockchain-enabled system, it may eventually be possible to eliminate this vulnerability and ensure fair elections. bitcoin карта