Peer-to-peer in the context of "Bitcoin"

Play Trivia Questions online!

or

Skip to study material about Peer-to-peer in the context of "Bitcoin"

Ad spacer

⭐ Core Definition: Peer-to-peer

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network, forming a peer-to-peer network of nodes. In addition, a personal area network (PAN) is also in nature a type of decentralized peer-to-peer network typically between two devices.

Peers make a portion of their resources, such as processing power, disk storage, or network bandwidth, directly available to other network participants, without the need for central coordination by servers or stable hosts. Peers are both suppliers and consumers of resources, in contrast to the traditional client–server model in which the consumption and supply of resources are divided.

↓ Menu

>>>PUT SHARE BUTTONS HERE<<<

👉 Peer-to-peer in the context of Bitcoin

Bitcoin (abbreviation: BTC; sign: ) is the first decentralized cryptocurrency. Based on a free-market ideology, bitcoin was invented in 2008 when an unknown entity published a white paper under the pseudonym of Satoshi Nakamoto. Use of bitcoin as a currency began in 2009, with the release of its open-source implementation. From 2021 to 2025, El Salvador adopted it as legal tender currency before revoking it. As bitcoin is pseudonymous, its use by criminals has attracted the attention of regulators, leading to its ban by several countries.

Bitcoin works through the collaboration of computers, each of which acts as a node in the peer-to-peer bitcoin network. Each node maintains an independent copy of a public distributed ledger of transactions, called a blockchain, without central oversight. Transactions are validated through the use of cryptography, preventing one person from spending another person's bitcoin, as long as the owner of the bitcoin keeps certain sensitive data secret.

↓ Explore More Topics
In this Dossier

Peer-to-peer in the context of File sharing

File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include removable media, centralized servers on computer networks, Internet-based hyperlinked documents, and the use of distributed peer-to-peer networking.

File sharing technologies, such as BitTorrent, are integral to modern media piracy, as well as the sharing of scientific data and other free content.

↑ Return to Menu

Peer-to-peer in the context of Old media

Old media, also called traditional media or legacy media, are the mass media institutions that dominated prior to the internet, particularly print media, film studios, music studios, advertising agencies, radio broadcasting, and television. Old media institutions are centralized and communicate with one-way technologies to a generally anonymous mass audience.

Old media are often contrasted with new media, which are typically computer- or smartphone-based, and are to some extent interactive and comparatively decentralized. These new media enable people to telecommunicate with one another peer-to-peer or through social media platforms, with widespread use and availability through the internet.

↑ Return to Menu

Peer-to-peer in the context of Hacktivism

Hacktivism (or hactivism; a portmanteau of hack and activism) is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. A form of Internet activism with roots in hacker culture and hacker ethics, its ends are often related to free speech, human rights, or freedom of information movements.

Hacktivist activities span many political ideals and issues. Hyphanet, a peer-to-peer platform for censorship-resistant communication, is a prime example of translating political thought and freedom of speech into code. Hacking as a form of activism can be carried out by a singular activist or through a network of activists, such as Anonymous and WikiLeaks, working in collaboration toward common goals without an overarching authority figure. For context, according to a statement by the U.S. Justice Department, Julian Assange, the founder of WikiLeaks, plotted with hackers connected to the "Anonymous" and "LulzSec" groups, who have been linked to multiple cyberattacks worldwide. In 2012, Assange, who was being held in the United Kingdom on a request for extradition from the United States, gave the head of LulzSec a list of targets to hack and informed him that the most significant leaks of compromised material would come from the National Security Agency, the Central Intelligence Agency, or the New York Times.

↑ Return to Menu

Peer-to-peer in the context of User support

Technical support, commonly shortened as tech support, is a form of customer service provided to assist users in resolving problems with products such as consumer electronics and software. Technical support is typically delivered through call centers, online chat, and email services. In addition, many companies operate online forums or discussion boards where customers can provide peer-to-peer assistance, a practice shown to reduce the workload and costs of formal support channels.

↑ Return to Menu

Peer-to-peer in the context of Blockchain

A blockchain is a distributed ledger with growing lists of records (blocks) that are securely linked together via cryptographic hashes. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a Merkle tree, where data nodes are represented by leaves). Since each block contains information about the previous block, they effectively form a chain (compare linked list data structure), with each additional block linking to the ones before it. Consequently, blockchain transactions are resistant to alteration because, once recorded, the data in any given block cannot be changed retroactively without altering all subsequent blocks and obtaining network consensus to accept these changes.

Blockchains are typically managed by a peer-to-peer (P2P) computer network for use as a public distributed ledger, where nodes collectively adhere to a consensus algorithm protocol to add and validate new transaction blocks. Although blockchain records are not unalterable, since blockchain forks are possible, blockchains may be considered secure by design and exemplify a distributed computing system with high Byzantine fault tolerance.

↑ Return to Menu

Peer-to-peer in the context of Network service

In computer networking, a network service is an application running at the network layer and above, that provides data storage, manipulation, presentation, communication or other capability which is often implemented using a client–server or peer-to-peer architecture based on application layer network protocols.

Each service is usually provided by a server component running on one or more computers (often a dedicated server computer offering multiple services) and accessed via a network by client components running on other devices. However, the client and server components can both be run on the same machine.

↑ Return to Menu

Peer-to-peer in the context of Upload

Uploading refers to transmitting data from one computer system to another through means of a network. Common methods of uploading include: uploading via web browsers, FTP clients, and terminals (SCP/SFTP). Uploading can be used in the context of (potentially many) clients that send files to a central server. While uploading can also be defined in the context of sending files between distributed clients, such as with a peer-to-peer (P2P) file-sharing protocol like BitTorrent, the term file sharing is more often used in this case. Moving files within a computer system, as opposed to over a network, is called file copying.

Uploading directly contrasts with downloading, where data is received over a network. In the case of users uploading files over the internet, uploading is often slower than downloading as many internet service providers (ISPs) offer asymmetric connections, which offer more network bandwidth for downloading than uploading.

↑ Return to Menu