Forks, or the threat of them, seem to be an established feature of the cryptocurrency landscape. But what are they? Why are they such a big deal? And what is the difference between a hard fork and a soft fork?
A “fork,” in programming terms, is an open-source code modification. Usually the forked code is similar to the original, but with important modifications, and the two “prongs” comfortably co-exist. Sometimes a fork is used to test a process, but with cryptocurrencies, it is more often used to implement a fundamental change, or to create a new asset with similar (but not equal) characteristics as the original.
Not all forks are intentional. With a widely distributed open-source codebase, a fork can happen accidentally when not all nodes are replicating the same information. Usually these forks are identified and resolved, however, and the majority of cryptocurrency forks are due to disagreements over embedded characteristics.
One thing to bear in mind with forks is that they have a “shared history.” The record of transactions on each of the chains (old and new) is identical prior to the split.
Hard forks
There are two main types of programming fork: hard and soft.
A hard fork is a change to a protocol that renders older versions invalid. If older versions continue running, they will end up with a different protocol and with different data than the newer version. This can lead to significant confusion and possible error.
With bitcoin, a hard fork would be necessary to change defining parameters such as the block size, the difficulty of the cryptographic puzzle that needs to be solved, limits to additional information that can be added, etc. A change to any of these rules would cause blocks to be accepted by the new protocol but rejected by older versions and could lead to serious problems – possibly even a loss of funds.
For instance, if the block size limit were to be increased from 1MB to 4MB, a 2MB block would be accepted by nodes running the new version, but rejected by nodes running the older version.
Let’s say that this 2MB block is validated by an updated node and added on to the blockchain. What if the next block is validated by a node running an older version of the protocol? It will try to add its block to the blockchain, but it will detect that the latest block is not valid. So, it will ignore that block and attach its new validation to the previous one. Suddenly you have two blockchains, one with both older and newer version blocks, and another with only older version blocks. Which chain grows faster will depend on which nodes get the next blocks validated, and there could end up being additional splits. It is feasible that the two (or more) chains could grow in parallel indefinitely.
This is a hard fork, and it’s potentially messy. It’s also risky, as it’s possible that bitcoins spent in a new block could then be spent again on an old block (since merchants, wallets and users running the previous code would not detect the spending on the new code, which they deem invalid).
The only solution is for one branch to be abandoned in favor of the other, which involves some miners losing out (the transactions themselves would not be lost, they’d just be re-allocated). Or, all nodes would need to switch to the newer version at the same time, which is difficult to achieve in a decentralized, widely spread system.
Or, bitcoin splits, which has happened (hello, bitcoin cash).
Soft fork
A soft fork can still work with older versions.
If, for example, a protocol is changed in a way that tightens the rules, that implements a cosmetic change or that adds a function that does not affect the structure in any way, then new version blocks will be accepted by old version nodes. Not the other way around, though: the newer, “tighter” version would reject old version blocks.
In bitcoin, ideally old-version miners would realize that their blocks were rejected, and would upgrade. As more miners upgrade, the chain with predominantly new blocks becomes the longest, which would further orphan old version blocks, which would lead to more miners upgrading, and the system self-corrects. Since new version blocks are accepted by both old and upgraded nodes, the new version blocks eventually win.
For instance, say the community decided to reduce the block size to 0.5MB from the current limit of 1MB. New version nodes would reject 1MB blocks, and would build on the previous block (if it was mined with an updated version of the code), which would cause a temporary fork.
This is a soft fork, and it’s already happened several times. Initially, Bitcoin didn’t have a block size limit. Introducing the limit of 1MB was done through a soft fork, since the new rule was “stricter” than the old one. The pay-to-script-hash function, which enhances the code without changing the structure, was also successfully added through a soft fork. This type of amendment generally requires only the majority of miners to upgrade, which makes it more feasible and less disruptive.
Soft forks do not carry the double-spend risk that plagues hard forks, since merchants and users running old nodes will read both new and old version blocks.
For examples of changes that would require a soft fork, see the “softfork wishlist”.
ethereum логотип бонусы bitcoin ethereum usd ssl bitcoin куплю ethereum
bitcoin changer
ethereum online
bitcoin вектор bitcoin exchanges
bitcoin проверить ethereum википедия delphi bitcoin
bitcoin neteller kong bitcoin In the early 1990s, most people were still struggling to understand the internet. However, there were some very clever folks who had already realized what a powerful tool it is.bitcoin gadget сборщик bitcoin daily bitcoin bitcoin config the ethereum tether mining исходники bitcoin
trezor bitcoin abc bitcoin skrill bitcoin bitcoin xl card bitcoin bitcoin preev
сбор bitcoin bitcoin etf
проекта ethereum магазины bitcoin bitcoin dance bitcoin mmgp вывести bitcoin p2pool monero bitcoin завести
gif bitcoin bitcoin instant курс ethereum bitcoin check ethereum rotator lamborghini bitcoin bitcoin space bitcoin обозначение бесплатные bitcoin bitcoin аналитика download bitcoin global bitcoin bitcoin курс bitcoin проблемы bitcoin charts bitcoin стратегия bitcoin обозреватель
ethereum supernova bitcoin adress ethereum упал chaindata ethereum tether 4pda ethereum график bitcoin ммвб coingecko ethereum
кран ethereum bitcoin forums настройка bitcoin monero hardware ethereum ann
ethereum crane прогноз ethereum coinmarketcap bitcoin
fee bitcoin запросы bitcoin monero кошелек bitcoin гарант In the physical world, the most reliable stores of value become the currencies of choice in event of a crisis. In the late 1990s and early 2000s, Zimbabwe became synonymous with hyperinflation. When inflation reached 89.7 *****tillion percent (give or take a few points) and rendered the Zimbabwean dollar worthless, that wiped out the fortunes of many people unfortunate enough to have held liquid assets. People had no choice but to use something more stable – primarily the U.S. dollar and South African rand – for daily commerce. Litecoin’s inherent scarcity makes hyperinflation impossible, but there’s still the challenge of garnering general acceptance and getting more people to use the currency.анимация bitcoin bitcoin valet bitcoin flapper bitcoin phoenix
сделки bitcoin 22 bitcoin bitcoin china bitcoin сложность
bitcoin grant ethereum transactions bitcoin бесплатные monero pro bitcoin heist бесплатно ethereum
ads bitcoin bitcoin xl nicehash bitcoin купить ethereum total cryptocurrency bitcoin chain bitcoin бот explorer ethereum Crypto-anarchism relies heavily on plausible deniability to avoid censorship. Crypto-anarchists create this deniability by sending encrypted messages to interlinked proxies in computer networks. A payload of routing information is bundled with the message; the message is encrypted with each one of the proxies', and the receiver's, public keys. Each node can only decrypt its own part of the message, and only obtain the information intended for itself. That is, from which node it got the message, and to which node it should deliver the message. With only access to this information, it is thought to be very difficult for nodes in the network to know what information they are carrying or who is communicating with whom. Peers can protect their identities from each other's by using rendevouz onions or similar, digital signatures, etc. Who originally sent the information and who is the intended receiver is considered infeasible to detect, unless the peers themselves collaborate to reveal this information. See mix networks, onion routing and anonymous P2P for more information.bitcoin cost bitcoin expanse alpha bitcoin game bitcoin добыча bitcoin ethereum os stock bitcoin bitcoin hosting сайте bitcoin ethereum валюта alpari bitcoin приват24 bitcoin ethereum markets bitcoin explorer pay bitcoin 1070 ethereum game bitcoin decred cryptocurrency monero minergate кредит bitcoin monero core bitcoin reserve habrahabr bitcoin основатель ethereum mt5 bitcoin homestead ethereum cryptocurrency calendar ethereum os bitcoin minecraft alien bitcoin ad bitcoin capitalization cryptocurrency forum bitcoin monero dwarfpool сложность ethereum red bitcoin
bitcoin сбор
bitcoin stealer bitcoin прогноз ethereum перевод monero rur rpg bitcoin взломать bitcoin bitcoin nasdaq cryptocurrency trade bitcoin donate ethereum асик bitcoin plus500 bitcoin nvidia
bitcoin russia bitcoin daily bitcoin cudaminer bitcoin png Retail cryptocurrency investors tend to assume that miners join a network when it is profitable to mine, but there may be some evidence that the relationship between network hashrate and price may work in an opposite way. Vitalik Buterin of the Ethereum project has built a series of hashrate-price estimators that attempt to measure Bitcoin price endogenously.metal bitcoin bitcoin valet bitcoin knots проекта ethereum bitcoin 2048 exchanges bitcoin cryptocurrency wallet ethereum rotator краны ethereum monero прогноз теханализ bitcoin генераторы bitcoin bitcoin проверить bitcoin swiss
bitcoin symbol monero прогноз monero купить bitcoin bear bitcoin trinity withdraw bitcoin bitcoin hd The 'statement' proved by a ring signature is that the signer of a given message is a member of the group. The main distinction with the ordinary digital signature schemes is that the signer needs a single secret key, but a verifier cannot establish the exact identity of the signer.PBFT (Practical Byzantine Fault Tolerance)ethereum проблемы ethereum investing bitcoin pools форк bitcoin
bitcoin команды bitcoin passphrase monero nvidia bitcoin banks bitcoin bloomberg bitcoin yen direct bitcoin locals bitcoin сколько bitcoin bitcoin биржи ubuntu ethereum доходность ethereum ethereum charts 15 bitcoin майнер bitcoin bitcoin pay hashrate bitcoin bitcoin traffic
wallets cryptocurrency bitcoin auto monero 1070 cryptocurrency trading ethereum 4pda money bitcoin tether валюта future bitcoin air bitcoin 4. Miningудвоитель bitcoin bitcoin song Looking forwards, considering the amount of publicity bitcoin received as of April 2013, there can be no reasonable grounds for complaint for people who did not invest at that time, and then see the value (possibly) rising drastically higher.Bitcoin Cloud Services (BCS) Review: Appears to have been a $500,000 Ponzi scam fraud.Data protection/security is improved on a large scale.reward bitcoin coins bitcoin bitcoin trojan bitcoin dynamics monero кран Price and volatilitybitcoin swiss fpga ethereum 4pda bitcoin ethereum метрополис bitcoin обозреватель bitcoin today bitcoin knots bitcoin earnings bitcoin капитализация bitcoin alliance видеокарты ethereum monero ann carding bitcoin bitcoin скачать bitcoin fpga ethereum raiden bitcoin reserve ethereum vk mixer bitcoin Ethereum's shift to proof-of-stakebitcoin withdrawal Numerous people around the world try to figure out the right hash value to meet a pre-determined condition using computational algorithms. The transaction completes when the predetermined condition is met. To put it more plainly, Blockchain miners attempt to solve a mathematical puzzle, which is referred to as a proof of work problem. Whoever solves it first gets a reward.ethereum график bitcoin мерчант invest bitcoin ubuntu bitcoin convert bitcoin bitcoin banks
ethereum faucet doge bitcoin
bitcoin chart casper ethereum casino bitcoin
перевод bitcoin bitcoin казино bitcoin uk bitcoin обменники bitcoin flapper neo cryptocurrency bitcoin widget These types of transactions can be tampered with very quickly. People who are familiar with this truth are often wary of using these types of transactions, hence the evolution of third-party payment applications in recent years. But this vulnerability is essentially why Blockchain technology was created.цена ethereum bitcoin login ethereum картинки bitcoin зарабатывать проблемы bitcoin bitcoin global bitcoin brokers bitcoin config аккаунт bitcoin ethereum видеокарты bitcoin перевод bitcoin best капитализация ethereum bitcoin exchanges оборот bitcoin технология bitcoin бот bitcoin спекуляция bitcoin bonus ethereum wild bitcoin
bitcoin анимация cryptocurrency wikipedia bitcoin видеокарта bitcoin red bitcoin халява биржи monero ethereum падение обновление ethereum
faucet bitcoin bitcoin 100 bitcoin коды
monero продать trezor bitcoin ethereum russia хайпы bitcoin bitcoin crane in bitcoin майнинг ethereum bitcoin darkcoin bitcoin world bitcointalk ethereum bitcoin cny avatrade bitcoin withdraw bitcoin bitcoin зарабатывать bitcoin github multisig bitcoin ethereum проблемы avto bitcoin киа bitcoin bitcoin заработать bitcoin spend
bitcoin сбербанк bitcoin уязвимости etherium bitcoin bitcoin gadget bitcoin weekend
bitcoin 100 bitcoin king bitcoin linux обменник tether ethereum algorithm bitcoin lurk bitcoin зарабатывать ethereum dark bitcoin sphere
bitcoin fee bitcoin торговля ethereum вики ico monero bitcoin арбитраж эмиссия ethereum bitcoin 2048 coinbase ethereum bitcoin double мониторинг bitcoin bitcoin king bitcoin rub часы bitcoin инструкция bitcoin keyhunter bitcoin future bitcoin
takara bitcoin bitcoin иконка bitcoin rpg
Bitcoin is often perceived as an anonymous payment network. But in reality, Bitcoin is probably the most transparent payment network in the world. At the same time, Bitcoin can provide acceptable levels of privacy when used correctly. Always remember that it is your responsibility to adopt good practices in order to protect your privacy.'Layer 2' systemsubuntu bitcoin bitcoin авито bitfenix bitcoin bitcoin machine bitcoin trading nanopool ethereum bitcoin php bitcoin dance bitcoin перевод
bitcoin видео bitcoin обзор bitcoin количество часы bitcoin coinmarketcap bitcoin bitcoin краны life bitcoin лотереи bitcoin blogspot bitcoin символ bitcoin bitcoin экспресс explorer ethereum ethereum decred casinos bitcoin
bitcoin chains биржа bitcoin bitcoin blog
monero курс monero address qtminer ethereum bitcoin hacker instant bitcoin bitcoin лопнет project ethereum 6000 bitcoin bitcoin миллионеры
кошелька bitcoin будущее bitcoin bitcoin metatrader перспективы ethereum miner monero cryptocurrency calculator bitcoin uk mail bitcoin
bitcoin cudaminer bitcoin бесплатные bitcoin greenaddress bitcoin traffic bitcoin euro geth ethereum bitcoin вложить bitcoin habr ethereum pool конвертер ethereum видеокарты ethereum ethereum btc cfd bitcoin bitcoin ads обменники bitcoin mercado bitcoin index bitcoin electrum bitcoin boom bitcoin bitcoin 3 bitcoin вложить bitcoin вложить bitcoin портал bitcoin drip The system as a whole owes far more dollars than exist, creating an environment where on net there is a very high present demand for dollars. If consumers did not pay debt, their homes would be foreclosed upon, or their cars would be repossessed. If a corporation did not pay debt, company assets would be forfeited to creditors via a bankruptcy process, and equity could be entirely wiped out. If a government did not pay debt, basic government functions would be shut down due to lack of funding. In most cases, the consequence of not securing the future dollars necessary to repay debt means losing the shirt on your back. Debt creates the ultimate incentive to demand dollars. So long as dollars are scarce relative to the amount of outstanding debt, the dollar remains relatively stable. This is how the Fed’s economy works, incentivize credit creation and you create the source of future demand for the underlying currency. In a sense, it’s kind of like a drug dealer. Get an addict hooked on your drug and he will keep coming back for more. In this case, the drug is debt, and it forces everyone, on net, to stay on the dollar hamster wheel.Despite the inconvenience of setting up a node, running one provides a user with boosted security and privacy. If Ethereum scales without significant upgrades to boost efficiency, it would further limit the number of people who can verify transactions. In addition, some argue it’s good for the broader Ethereum network. The more nodes Ethereum has, the more decentralized it is, making it harder for one powerful entity to capture control of the network.The problem with this solution is that the fate of the entire money system depends on theworld of Internet businesses built on top of these protocols looks like a warzone. By contrast, with cryptocurrencies we have the luxury of being able to