So now we can get into some of the blockchain basics. So here we have a diagram of, you know, the Web 2.0 world. So we're going to be comparing the Web 2.0 to Web 3.0 architecture. So in here, you know, we have a diagram of, you know, a user trying to access a, you know, website or application or whatever it is on their mobile or desktop. That request is then being sent to, you know, the web server which is then sent to the API server which is then sent to the database server. Once that request has been accessed, the data has been accessed, it will then send it right back down to the API server, then the web server and back to show up on the user's laptop or mobile device.
So now for the Web 3.0 architecture, we have someone trying to access a decentralized application that was built using, you know, HTML, JavaScript and CSS. What happens is that that request is then sent to a computer or a node on the blockchain and then once that has been accessed, it shows up on the user's device.
So now that we have sort of a high-level overview of kind of the Web 2.0 and Web 3.0 architecture, we can go into the blockchain workflow and how everything works. So here's a diagram of someone requesting a transaction. Once that transaction request has been broadcasted, so the first step would be the request has been broadcasted to a network consisting of computers, which are also known as nodes. And what these nodes do is that they validate the transaction, and then once it has been verified, the transaction is then put onto a block of data consisting of other users and other transactions that is then added to the existing blockchain, where it stays permanent and can never be changed. And that is when the transaction is complete.
So now we can get into some of the crypto basics. So here we have the private and public key. So how is the private key, I guess, derived, right? So it's basically a large random number, and then it does some fancy math stuff, which we won't get into for simplicity's sake. And then you have the private key. Now, the main thing to point out here is that the private key is really not meant for sharing. So this is how people can get access to all things in your wallet and can do whatever they want if they have access to your private key. So that's never meant to be shared. Public key, you can share with whoever you want. That's for someone who wants to transfer you something or anything like that, you can always share your public key. And how that is derived is using your private key and then also some even more fancy math stuff, and then you have your public key.
So now that we have a kind of overview of private and public keys, we can compare blockchain accounts to user accounts in Web2. Now, obviously, they are very different, and it's not similar to user accounts in Web2. So here, like I explained earlier, the accounts on blockchain are derived from private keys and public keys that are randomly generated. So now that we have sort of an understanding of public and private keys, we can look at an example scenario of signing and receiving a message. So here we have Bob that creates his message for Alice. So Bob uses an app to sign his message with his private key, which creates a signature and sends it to Alice. So it's important to know that it's not the private key that's being sent to Alice.
Comments