Stanford CS251: Lecture 2

Lecture 2: Creating a digital currency Desirable properties of a good digital ledger No deletion Temporal ordering Global consensus Semantic correctness Live - writable, no DOS, no censorship Attempts to create a digital currency in the increasing order of sophistication. A signing key based approach can confirm the authenticity of the transaction but cannot prevent double-spend. Append-only ledger with signing keys ensures a temporal ordering and global consensus, thus, prevents double-spending. Sign “new transaction + hash of the previous transaction”. But if there is a single trusted signing authority, it can still give different signing blocks to the different parties and engage in double-spend. Or it can append invalid transactions to the ledger. To reduce the risk, we can have n signers and require k <= n signers required for a transaction to be a valid part of the ledger. Further safety can be ensured by rotating the trusted signers. The signers will build on (one of the) longest valid chain. The signer will reject any chain with a bad block in it. If the majority of the signers is honest, this works. Otherwise, it does not. A malicious actor can perform a Sybil attack on the system by generating tons of signers who are participating in the system and hence, a majority of signers might end up representing a single entity. Bitcoin (Nakamoto consensus) treats everyone as a trusted signer. The signer in round n is the first signer to solve a proof-of-work (PoW) puzzle. There are no signing keys anymore. The random nonce of the block which leads to H(block) <2256 - d suffices as the valid proof of signing. Two signers can end up signing simultaneously, but eventually, one of the chains will become longest and wins. Each block ~ 1MB and each transaction ~512 bytes. After your transaction ends up in a block, wait for up to 6 blocks to ensure that a different chain won’t become the longest one. Majority of the mining power should be honest though, 51% attack is possible on Bitcoin.

Stanford CS251: Lecture 1

Lecture 1: Introduction Bitcoin is a cryptocurrency with distributed trust. The blockchain is a public append-only ledger. The append-only property is sufficient for having a currency. Hash functions: H: M -> T where |M| » |T| that is space of messages is larger than space of the hash. If H(m0) =H(m1) => collision. Hash function H is collision-resistant if it is hard to find the collision of H. For example, SHA-256 maps long strings to 256-bit hashes. ...

Iao Valley State Park

Four days in Maui, Hawaii

Maui is a small but beautiful island of Hawai’i. Here is a recommended 4-day itinerary for Maui. This itinerary is a slightly modified version of what I was able to do. The public transport on the island is poor. For solo travel outside the rainy season, I would recommend renting a moped to go around. Otherwise, rent a car. The island has a much more developed western part consisting of Kaanapali and Lahaina, which have major resorts. ...

Closeum - closed-source in disguise

Earlier, the Software world was rigidly divided between closed and open-source software. Microsoft Windows is closed-source, GNU/Linux is open-source. Microsoft Office and Lotus Notes are closed-source, LibreOffice is open-source. Turbo C++ is closed-source, and GCC is open-source. But now, a new class of software products has emerged whose core is open-source, but still, the open-source software is of limited use. One model is to offer some critical and useful functionality in a closed-source layer via a managed service in AWS/GCP/Azure, for example, Redis is open-source, but useful modules on top of it are not . Another model is to use licensing gimmickry, for example, MongoDB is licensed under SSPL which requires that if anyone offers MongoDB as a service, then the source code of the full service must be published under this license. The third approach is to make the core software open-source but make it dependent on closed-source cloud services. For example, the node package manager (npm) is open-source, but a closed source company owns the default npm registry. Android is open-source, but most day-to-day application ranging from Google Maps to Google Music are closed-source . Now onwards, rather than calling such software open-source, we should call them closeum. ...

Android: Fragment related pitfalls and how to avoid them

Don’t use platform fragments (android.app.Fragment), they have been deprecated and can trigger version-specific bugs. Use the support library fragments ( android.support.v4.app.Fragment) instead. A Fragment is created explicitly via your code or recreated implicitly by the FragmentManager. The FragmentManager can only recreate a Fragment if it’s a public non-anonymous class. To test for this, rotate your screen while the Fragment is visible. FragmentTransaction#commit can fail if the activity has been destroyed. “java.lang.IllegalStateException: Activity has been destroyed” Why - This can happen in the wild where say right before FragmentTransaction#commit() executes, the user gets a phone call and your activity is backgrounded and destroyed. How to trigger manually - The easy way to manually test this is to add a call to Activity#finish() right before FragmentTransaction#commit. Fix - Before doing FragmentTransaction#commit(), check that the activity has not been destroyed - Activity#isDestroyed() should return false. ...

Bora Bora as seen from Motu Tapu

Cruising in French Polynesia

We sailed on the Windstar cruise in French Polynesia. On a 7-day cruise, we stopped on six different islands, including two days in Bora Bora. The cruise ship has a crew of 99 and 74 staterooms for~150 passengers. This ratio ensures exceptionally personalized service, and you get to know pretty much everyone else on the ship. The crew members learn everyone’s name pretty quickly, and, especially, in our case, we got custom orders for vegetarian food of our choice regularly. ...

Water Bungalows in Bora Bora

French Polynesia - the basics

Getting to French Polynesia Getting from the US to French Polynesia used to be hard and expensive, with Air Tahiti Nui being the only option from the Los Angeles airport (LAX). In 2018, French Bee and United Airlines started direct flights from San Francisco (SFO) to Papeete (PPT). Papeete, the main island, is relatively dull, and there is nothing much to do at it. The two best islands are Moorea and Bora Bora. Alternatively, one can take a 10+ day-long cruise from New Zealand or Australia. ...

Android: Handling JPEG images with Exif orientation flags

A JPEG file can have Exif metadata which can provide the rotation/translation field information for a raw JPEG image. So, a landscape raw JPEG image could actually be a portrait because it’s EXIF orientation could be set to ORIENTATION_ROTATE_90 , the best way to handle such scenarios is to either use a library like Picasso or Glide or at least learn from them. Here is a piece of code from Picasso which loads a JPEG as an in-memory bitmap and performs the right translation/rotation. ...

Sipapu Bridge

Hiking Natural Bridges National Monument

Natural Bridges National Monument in Utah is a National Park consisting of three natural bridges. One can spend ~1-3 hours hiking nearby each of the bridges. The hikes are short and require ascent/descent. Even without the hike, one can drive around to see the views. While one can hike to the bottom of Sipapu Bridge, the Kachina bridge can only be seen from a distance. And that too after a hike. If you are short on time, skip this one. ...

Why Nations Fail

Book summary: Why Nations Fail

The book is a good read on why some nations are rich today while others are poor.