Key Concepts in Cryptocurrency

Key concepts in cryptocurrency

Transferability Crypto makes transactions with people on the other side of the planet as seamless as paying with cash at your local grocery store.

Privacy When paying with cryptocurrency, you don’t need to provide unnecessary personal information to the merchant. Which means your financial information is protected from being shared with third parties like banks, payment services, advertisers, and credit-rating agencies. And because no sensitive information needs to be sent over the internet, there is very little risk of your financial information being compromised, or your identity being stolen.

Security Almost all cryptocurrencies, including Bitcoin, Ethereum, Tezos, and Bitcoin Cash are secured using technology called a blockchain, which is constantly checked and verified by a huge amount of computing power.

Portability Because your cryptocurrency holdings aren’t tied to a financial institution or government, they are available to you no matter where you are in the world or what happens to any of the global finance system’s major intermediaries.

Transparency Every transaction on the Bitcoin, Ethereum, Tezos, and Bitcoin Cash networks is published publicly, without exception. This means there's no room for manipulation of transactions, changing the money supply, or adjusting the rules mid-game.

Irreversibility Unlike a credit card payment, cryptocurrency payments can’t be reversed. For merchants, this hugely reduces the likelihood of being defrauded. For customers, it has the potential to make commerce cheaper by eliminating one of the major arguments credit card companies make for their high processing fees.

Safety The network powering Bitcoin has never been hacked. And the fundamental ideas behind cryptocurrencies help make them safe: the systems are permissionless and the core software is open-source, meaning countless computer scientists and cryptographers have been able to examine all aspects of the networks and their security.

Previous
Previous

Utility tokens vs. security tokens: what are the differences?

Next
Next

What is a token?