Biotech2k Profile picture
Dec 1 21 tweets 6 min read
🧵Private/Public key pairs.

My first ever thread on #crypto with #Private and #Public keys and how they work.
1/ I am going to do a general overview skipping all the complex math so that its easy to understand. A private and public key pair control access to a wallet. This can be a custodial wallet on an exchange, a hot wallet or even a cold wallet.
2/ The major difference is that a private and public key pair created on an exchange is controlled by that exchange. You have no control over that Custodial Wallet other than what that exchange allows you. A software or hardware wallet gives you control over your keys.
3/ The cryptocurrency itself never leaves the blockchain. Its always alive on the blockchain. All you control is moving that crypto into a public crypto address for which you control the private keys that control access to the public address. Image
4/ The private key is a random 256 bit number. Depending on the blockchain, it can be 256 binary or hexadecimal number. Its just a number. When you create a wallet, you get a seed phrase that is 12 or 24 words.
5/ Those words use a system called BIP39 to translate that 256 bit number into a mnemonic of 12 or 24 words. These come form and represent the private key. This means you can take your private seed phase and use it in any wallet that supports BIP39 protocol. Image
6/ You can take the seed phrase from Trust Wallet and use it in Exodus wallet or Metamask and vice versa. As long as those wallets use the same BIP39 protocol. That private key is like a password for access to that public address on the blockchain which holds all that crypto.
7/ Another easy way to think of the relationship of the private key and public key is to used email. You have a public email address that you can give out to anyone and get email.
8/ Only you have the password to get into that email to account. The public key is like the email address and the private key is like your email password.
9/ The public address is generated from the 256 bit private key. Its just another 256 bit number generated from a special algorithm called an Elliptical Curve Algorithm. This uses some random generated numbers to extrapolate the public key number. Image
10/ The public key is used to generate a public address after it gets hashed. This varies by blockchain for the creation of the public address from the public key. Bitcoin uses SHA256 to hash it then takes that and hashes it with another algorithm to get a public address. Image
11/ Then it adds the bc1 on the beginning for the full address. The Ethereum blockchain uses Keccak256 to has the public key and takes the first 40 bytes and adds the 0x to the beginning. Image
12/ When you create a wallet, you make the private key and public key pair. The private key is your 12 or 24 word seed phase. The public key is used to generate the public address for that wallet. Then you can send crypto to that public address.
13/ One benefit is that a private key can be used with the algorithm to come up with many public keys. This is used often today to generate a new public key for each transaction. This help provide privacy as you are not always using the same public address over and over.
14/ The crypto doesn't go into your wallet. It goes into that public address that lives on the blockchain and you have a private key seed phase to control that public address.
15/ This is an important concept because if a wallet is ever destroyed like a hardware wallet or you break your phone with your software wallet on it, you can go get a new one and use your seed phase to recover access to that public address where your crypto is stored.
16/ This is also important because, if you lose your seed phrase, you lose control of your crypto. Anyone who gets that seed phrase can take control of that public address and move your crypto anywhere they wish.
17/ When you create a transaction, you sign it with your private key. This is done through a digital signature algorithm. No one ever sees your private key but you.
18/ Anyone who has your public key and use it to verify that signature, but can't see your private key from that public key. Image
19/ When you create a message, it is signed with your private key and then encrypted with the receivers public key so only they can access that transaction or message. Only the receiver can decrypt that message using their private key as it was encrypted with their public key. Image
20/ This is the basics of Private Key and Public keys in cryptocurrencies. Its also how you control the access to your crypto my controlling you private key seed phrase. It also shows how those keys are used to create and receive transactions.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Biotech2k

Biotech2k Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @Biotech2k1

Dec 3
🧵Types of CRISPR

Here we will look at the discovery of CAS9 and the many types of CAS enzymes.
1/ The CRISPR system was discovered in 2012 by two scientists by the names of Jennifer Doudna and Emmanuelle Charpentier. While studying the CRISPR immune systems of the bacteria Streptococcus Pyogenes, they discovered a system that could be adapted for human genome editing. Image
2/ CRISPR stands for Clustered Regularly InterSpaced Palindromic Repeats. It turned out this system was the immune system for the bacteria. We covered this system in our previous thread. Image
Read 17 tweets
Dec 3
🧵Intro to CRISPR

Here we will look at the discovery of CRISPR.
1/ What does CRISPR stand for? It stands for Clustered Regularly Interspaced Short Palindromic Repeats. This was discovered by scientists studying bacteria. Bacteria get infected by viruses called Bacteriophages. They attach to the bacteria and inject their viral DNA. Image
2/ Scientists noticed that the bacteria genome had a sequence of repeats. It showed a small sequence of DNA then a repeat followed by another small sequence and another repeat. They named this area of the bacteria genome the CRISPR region. This is the bacteria's immune system. Image
Read 13 tweets
Dec 2
Meiosis

This will look at the process of Meiosis and Gamete formation.
1/ Meiosis is a 2 stage process for the formation of gametes which are used to pass on the genetic information for reproduction. The first cell cycle is called Meiosis I and it is the duplication of the chromosomes into homologous chromatids. Image
2/ During Meiosis I the process of all 46 chromosomes getting copied by DNA synthesis is the same as in mitosis. You end up with 46 homologous chromatids. What happens when the cells actually split, is very different.
Read 12 tweets
Dec 2
If you are looking for cheap biotech ideas, I suggest looking to these key themes. I call them my technology of the future themes. I will even throw in some names. Just be sure to do your own DD as this is spec biotech which is risky.
#TechBio
$RLAY
$RXRX
$EXAI
$ABCL
$SDGR
#CRISPR
$BEAM
$NTLA
$CRSP
$CRBU
Read 6 tweets
Dec 2
Pedigree

Using a pedigree to track a genetic trait.
1/ The pedigree is a diagram that is used to track a trait across a family tree. It might be cool to track the trait of red hair in your family, the pedigree is critical for tracking a genetic disease through a family to determine the risk of inheritance. Image
2/ There are some basics to drawing a pedigree. The lines connect lineages with the males being the squares and the females being the circles. The roman numerals on the left mark each generation.
Read 10 tweets
Dec 1
Linked Genes

Here we will look at gene linkages.
1/ The rules of Mendelian Genetics treats every gene as if it were on a separate chromosome. Every gene has a 50% chance of making it into any gamete. Image
2/ If you have a gene for eye color with the alleles Blue Eyes and Green eyes, each gamete has an equal 50% chance of getting the blue eyes or green eyes allele.
Read 13 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(