Image for post
Image for post

Forks are a crucial, yet often misunderstood, aspect of modern-day blockchain technology. While forks come in many shapes and forms, they tend to follow similar patterns and can be divided into various categories. This article will explain how forks work and in which categories they can be divided.

The basics of forks

A blockchain fork represents a (often significant) change in the underlying rules or software of a blockchain. When one of these changes happens the blockchain splits into two new and unique blockchains. How these blockchains are connected to each other depends on the kind fork. …

Image for post
Image for post

Asymmetric cryptography, also known as public-key cryptography, is one of the key components of blockchain technology. This form of cryptography allows everyone to verify the integrity of transactions, protect funds from hackers and much more. But how does it work?

What is asymmetric cryptography?

To understand asymmetric cryptography it is important to first understand the meaning of cryptography.

Cryptography is a method of using advanced mathematical principles in storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Encryption is a key concept in cryptography — It is a process whereby a message is encoded in a format that cannot be read or understood by an eavesdropper. The technique is old and was first used by Caesar to encrypt his messages using Caesar cipher. A plain text from a user can be encrypted to a cipher text, then send through a communication channel and no eavesdropper can interfere with the plain text. When it reaches the receiver end, the cipher text is decrypted to the original plain text. …

Image for post
Image for post

In the first half of 2018 alone, $1.1B in cryptocurrency has been stolen. That means $4,243.83 in cryptocurrency was stolen every second in the first half of 2018. Could most of these thefts have been prevented with basic security measures in place?

Basic security measures

Online scams and hacks are as old the internet itself, but it seems like these malefactions and their practitioners have evolved very fast, whereas the average blockchain user often lacks basic understanding of online security. Various reports show that online fraud is on the rise and the arrival (and popularity) of cryptocurrencies has helped hackers and scammers immensely. …

Image for post
Image for post

It’s safe to say ICOs are very popular nowadays. In 2017 alone over $4 billion got invested through ICOs and they have proven to be capable of raising massive amounts of capital in ridiculously short times. But what are ICOs, what are the pros and cons, and aren’t there better alternatives available?

What are ICOs?

An Initial Coin Offering (often referred to as ICO) is a mechanism for new blockchain projects to raise funds by offering the tokens of their project to investors before the tokens are listed on any exchange. …

Image for post
Image for post

Most blockchains have a lot of things in common and function in similar ways, but one of the ways in which blockchains can be unique is the way consensus is reached. Which transactions are legitimate and which transactions are added to the blockchain? Blockchains do this using various consensus mechanisms, we will explain the most important ones and some others below.

What are consensus mechanisms?

In short, consensus mechanisms are protocols that make sure all nodes (device on the blockchain that maintains the blockchain and (sometimes) processes transactions) are synchronised with each other and agree on which transactions are legitimate and are added to the blockchain. …

Image for post
Image for post

“The blockchain is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value.”- Don & Alex Tapscott

Usually, whenever somebody asks “What is blockchain technology?”, they will get an answer along the lines of the above quote. But what does that actually mean? How do blockchains work. And what other promises does blockchain technology have?

The past

After the release of Bitcoin in 2009, blockchain technology has been receiving plenty of attention from all kinds of people and companies. …

Image for post
Image for post

Over the past few months many EOS block producers and EOS enthusiasts have created content to help everyone understand and use EOS, us included, but it might be easy to miss some of this content. That is why we have compiled all of these great guides, articles, wallets and toolkits to make the ultimate EOS guide.

We have divided the guides into the following categories, each with their own subcategories:

  • Basics of EOS
  • EOS Governance
  • Wallets, toolkits and block explorers
  • Guides for developers
  • Other valuable resources

-Basics of EOS-

EOS accounts

EOS Accounts: How They Work and How To Get One by Blockgenic
EOS Accounts and Permissions Visualized by Blockgenic
How to create an EOS account by EOS Asia

Image for post
Image for post

Nowadays, personal data is not as personal as it once used to be. Major companies are selling data for huge profits and leaks happen all too often. Still, people are entering their personal data everywhere, as it has plenty of uses. So why hasn’t EOS, or any other major cryptocurrency, properly implemented a self-sovereign identity system yet? After all, blockchains are borderless and limitless.

A digital identity

Traditionally, ones identity is kept within government issued documents, such as a passport or drivers license, or kept safely within heavily secured government systems. But technological advances have caused identification to be something much more abstract. Digital identities are the next step in personal identification, although they also bring a whole host of new problems with them. Which information defines a user? …

Image for post
Image for post

We have spent a lot of time making EOS understandable for everyone, and you may have already seen and read our previous articles on EOS accounts and EOS permissions. We have now created a new infographic, which shows you how EOS accounts and EOS permissions are connected with each other, and how they work.

A little explanation

Without a little explanation, some things might still be a bit unclear. The light blue lines between “EOS accounts” and the permissions, indicate that both CPU and net are needed to make use of any of the permissions. The red line between “EOS accounts” and “other tokens” indicates that other tokens take up RAM in your account (unless the creator of the tokens has already paid for the RAM). …

Image for post
Image for post

Can I stake my tokens? Can I vote? Will I receive airdrops? The answer to these questions is simply no if you hold your EOS in an exchange account. It might be convenient to hold your EOS in an exchange account, but you will not be able to use your EOS to its fullest potential. That is why we have created this guide, which will explain all the steps you need to take to gain control of your EOS.

How to get started

If you are reading this guide, you most likely have your EOS on an exchange and you don’t know how to start taking them off of the exchange. …



We are a firm focused on Enterprise adoption of blockchain technology. EOS Block Producer name: ‘blockgenicbp’.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store