Book Image

Learn Ethereum - Second Edition

By : Xun (Brian) Wu, Zhihong Zou, Dongying Song
Book Image

Learn Ethereum - Second Edition

By: Xun (Brian) Wu, Zhihong Zou, Dongying Song

Overview of this book

Ethereum is a blockchain-based, decentralized computing platform that allows you to run smart contracts. With this book, you’ll discover the latest Ethereum tools, frameworks, wallets, and layer 2, along with setting up and running decentralized applications for the complete, end-to-end development experience. Learn Ethereum, 2nd Edition is a comprehensive overview of the Ethereum ecosystem, exploring its concepts, mechanisms, and decentralized application development process. You’ll delve into Ethereum's internals, technologies, and tools, including Ethereum 2.0 and the Ethereum Virtual Machine (EVM), gas, and its account systems. You’ll also explore Ethereum's transition to proof of stake, L1/L2 scaling solutions, DeFi protocols, and the current marketplace. Additionally, you’ll learn about EVM-compatible blockchains, connectivity techniques, and advanced topics such as sharding, off-chain scaling, DAOs, Metaverse, and NFTs. By the end of this book, you’ll be well-equipped to write smart contracts and develop, test, and deploy DApps using various tools, wallets, and frameworks.
Table of Contents (24 chapters)
1
Part 1: Blockchain and Ethereum Basics
7
Part 2:Ethereum Development Fundamentals
11
Part 3: Ethereum Development Fundamentals
15
Part 4:Production and Deployment
20
Part 5:Conclusion

Stealth addresses

A stealth address is a feature of cryptocurrency. It can be used to increase the security and privacy of transactions on a blockchain. This feature allows a sender to create a unique, one-time address for each transaction, instead of sending funds to an address that is publicly visible and can be linked to an individual or organization. Stealth addresses can be thought of as burning addresses because the address is only used once.

When a transaction is made to a stealth address, the funds are actually sent to a randomly generated, single-use address that is created specifically for that transaction. The recipient can then use their private key to access the funds, but the transaction and the underlying address remain private and cannot be traced back to the sender or the recipient.

Stealth addresses can be particularly useful for those who are concerned about privacy and security, as they can help prevent potential issues such as transaction tracking and address...