Position: Home page » Bitcoin » BTC double flower

BTC double flower

Publish: 2021-03-23 14:43:52
1. After six confirmations, the probability of double flower is almost zero
2. As for the impact of various events on the price of bitcoin, there are four types of such events
political events: most of these events involve the government's attitude towards bitcoin, such as the Federal Reserve's recognition of bitcoin as a financial instrument, Germany's recognition of bitcoin as a currency, China's prohibition of financial institutions from participating in bitcoin trading, and Russia's prohibition of using bitcoin and participating in bitcoin mining. Although bitcoin itself is a neutral technology, it is not affected by politics, but the price of bitcoin will fluctuate dramatically because of such events. So far, this is the biggest factor affecting the price of bitcoin
exchange events: Although bitcoin is a decentralized currency, bitcoin transactions mainly take place in centralized exchanges. Since the birth of bitcoin, many exchanges have been stolen. For example, mtgox, the largest Japanese exchange, lost 700000 bitcoins. Recently, bitfinex, the Hong Kong exchange, lost 120000 bitcoins. Bitstamp, the Slovenian exchange, was attacked and lost 19000 bitcoins. Whenever such an event occurs, the risk of bitcoin trading increases sharply, and bitcoin will often usher in a larger decline
financial events: such events often come from the instability of the real financial world, such as the default of the Central Bank of Cyprus, which leads to zero savings of more than 100000 euros of the country's depositors, serious devaluation of Ukraine's currency under the pressure of war, and brexit of the UK, which weakens the stability of the euro area. Bitcoin, as a safe haven asset, is gaining more and more market recognition. At present, the trading volume of bitcoin in the world has exceeded that of gold ETF, and the instability of fiat money has caused the continuous rise of bitcoin
Technical events: as a decentralized open source network protocol, bitcoin's code is far from perfect. There have been several crises in bitcoin's protocol. For example, a certain upgrade of bitcoin protocol has not been unanimously recognized by the whole network. In the end, there is a double flower problem. The scalability of bitcoin's transaction makes it easy for hackers to attack and steal, At one time, it forced several bitcoin exchanges to suspend trading. Recently, there has been a heated debate about expansion in the bitcoin community, and no effective solution has been available, which has cast a shadow on the future of bitcoin. Whether the bitcoin protocol can continue to evolve is a long-term impact on the price of bitcoin.
3. Analyzing the advantages of LBTC from the perspective of code mechanism
dpos mechanism
in recent years, e to the resource waste of pow, unstable block output, and the existence of computing power attack, although POW is recognized as the most widely used and secure consensus mechanism, there is still a great risk of being attacked for the block chain with insufficient computing power in the whole network. More and more consensus mechanisms are proposed to be used in blockchain projects for trial and experiment. Dpos is one of the mainstream consensus mechanisms, and LBTC has adopted this mechanism. Dpos ensures that the voting right is in the hands of the coin holder, so the coin holder will be able to choose whether to pass the motion by voting, so as to determine the development direction of the project. At the same time, it also means that the development direction of the project depends on the hands of the people who care about the project itself, and the power of wisdom will promote the better development of the project. At the same time, the advantages of dpos mechanism are that there is no computing power attack, strictly abide by the time block and save resources
dpos advantages of LBTC
the dpos mechanism of LBTC also has its own characteristics: the number of nodes of LBTC is 101, compared with 21 or 51 nodes, the coin holder can vote for 51 nodes at most once in the wallet of LBTC, which further reces the risk of centralization; LBTC can output blocks stably in 3 seconds, and the block size of 2m ensures that LBTC is 400 times more efficient than bitcoin, and the transaction speed can reach more than 2000 transactions per second; The most important difference between LBTC and other projects is that LBTC's dpos mechanism has the rule of irreversible block. When the number of block agents reaches 90% or more in one round, or when the number of block agents exceeds 70%, the first block in the previous round can be considered as irreversible, so as to prevent bifurcation
LBTC's defense measures
in addition to dpos consensus mechanism, LBTC's technical level has other highlights
first of all, LBTC can prevent [replay attack]. What is a replay attack? Each bitcoin account will have a corresponding number of lbtcs based on its bitcoin balance. If the address, private key, algorithm, etc. on each chain are the same, and the transaction format is the same, the transaction initiated on one blockchain can be put on another blockchain for rebroadcasting, and may also be confirmed. This is the "replay attack.". In short, when a user transfers LBTC, BTC may also be transferred at the same time. LBTC modifies the hash algorithm in transaction signature. In the hash algorithm, "LBTC" field is added to LBTC. The hash generated by LBTC and BTC will be different. LBTC and bitcoin do not recognize each other's transactions, so as to prevent replay attacks
secondly, to prevent [forged mining]. There are no concepts of voting and balance in bitcoin transaction. In order to maximize the stability of LBTC, a new output composed of OP return is added in coinbase transaction. Op-return data is composed of three fields: publickey, time and sign (time). Time represents the timeliness of transaction. Publickey verifies sign (time), which is the principle of asymmetric encryption algorithm to prevent forgery and mining. LBTC has 101 nodes. Assuming that the attacker has 30 nodes, if the remaining 71 nodes are forged, other nodes can mistakenly think that the attacker's chain is the longest and block out. This is a forgery mining attack
thirdly, prevent [double flower attack]. Double spending attack is a money spent twice, it can also be called double payment attack. For example, BTG, which has attracted wide attention before, recently suffered 51% attacks. A malicious miner obtained at least 51% of the computing power of the BTG network, temporarily controlled the BTG blockchain, quickly raised money after recharging the exchange, then reversed the block, and successfully implemented Shuanghua. Due to the irreversible block mentioned above, when the transaction of LBTC block is confirmed, it is impossible to roll back, so as to prevent the double flower attack
Fourth, multithreading. In LBTC's transaction consistency and legitimacy check, the data that can be merged and integrated are merged and executed by multi thread, which greatly improves the transaction efficiency and enhances the performance of LBTC
code logic of LBTC
in addition, in terms of code logic, LBTC is divided into protocol layer, consensus layer and application layer. When it is necessary to transfer value, the transaction is completed through the protocol layer link and consensus layer. This process can not only be used as the exchange of value, but also as the value intermediary in the tripartite connection. The application layer is mainly based on smart contract. In the future, LBTC will realize the function of gateway based on smart contract. The payment gateway implements asset issuance, asset transaction, currency exchange, chain interaction and so on
that's why LBTC can say that it wants to do global value internet protocol. Through the payment gateway, it can exchange any currency, not only between currencies, but also between legal currency and digital currency. Isn't that very convenient? One click conversion is to buy eth with vnd and transfer it to her British cousin in the distance. She dislikes it and immediately changes it to EOS. After one second, it is changed to pound sterling. There is no need for extra conversion steps. It's good to get it in one step? Such an analysis, in fact, from the technical code level analysis of LBTC is quite reliable. However, compared with those experts, Xiaobian won't deceive you. Whether LBTC can realize decentralized value Internet Protocol in the future, focusing on code will be a more intuitive way GitHub of LBTC: https://github.com/lbtcio/lbtc-core
how to use gateway
next, we talk about the specific implementation of the gateway's "conversion and circulation", which can be roughly divided into three kinds:
first, after the LBTC system has built the gateway technology, with the gateway as the bridge, user a can convert any currency into LBTC, and then send it to any user B who wants to send it, while user B can convert LBTC into any currency he needs, Does this sound like what you usually do on the exchange? I think this is one of the reasons why LBTC proposes to be a "decentralized exchange"
Second, user a can deposit the funds in the gateway trusted by user B and transfer them to user B through the gateway
thirdly, LBTC will provide the function of "any user can issue token" in the early stage of gateway construction. Therefore, in the LBTC system, if user a has a good reputation, is recognized by everyone, and issues its own a token (of course, it should include the asset chain realized by asset mortgage), a can use its own a token for user B's currency exchange. After that, user a can redeem the a token exchanged to B. A is the gateway role in the transaction process
in the process mentioned above, the functions of asset issuance, asset transaction, currency exchange and chain interaction are realized respectively
the gateway is similar to the function of a bank, which can mainly solve the problem of cross-border transfer. With the high TPS and low handling charge of LBTC, it will be very convenient to realize cross-border transfer. For example, if you need to remit money from China to the U.S., you need to remit RMB to China's LBTC gateway, and then the U.S. gateway will receive the LBTC from China's gateway, convert it into U.S. dollars, and forward it to the U.S. account. In the above gateway system, it can be concluded that both payment parties do not need to join the network, just need to trust the gateway
although the gateway solves the problems of slow speed and high handling charge of traditional transfer payment, it also faces new problems
then there is a problem
in addition to the standard institutions or project parties invited by LBTC can become gateways, ordinary users can buy and sell with each other (in fact, this kind of behavior is more inclined to loan, if it is only the business between acquaintances, it will form a small independent network), How to prove that gateway is a trustworthy organization or indivial
how to extend the gateway of LBTC to cooperate with large organizations is obviously a problem for the team. Ripple has developed more mature. At present, it has cooperated with MUFG in Japan, Westpac in Australia and Standard Chartered Bank in the UK. With ripple, star currency and other payment digital currencies in front, LBTC needs to have more characteristics if it wants to go out of its own route. This can be expected in the later intelligent contract route planning
however, ripple is also accused of being too centralized because of its distribution mode. LBTC has 101 nodes because of its dpos mechanism, and because it is a bifurcated coin, it will be distributed to bitcoin holders 1:1 when it is issued. This can be said to be the inherent advantage of LBTC - it has wide dispersion. If it can be supported and recognized by the public in the future, it can reach a consensus, Then it will form a congenital advantage of wide distribution
in addition, how can we prove that assets really exist in reality and can be used as collateral in the process of asset chain? In addition to large-scale institutions such as banks, small-scale network also has its inevitability. The proof of assets on the asset chain is a very important part. If it is not regulated and certified, it is very likely that the gateway will run away or false gateway will occur. Although the gateway is exemplified as "Taobao" platform, in theory, the platform can not manage the business content, but the platform has supervision on the quality of goods, otherwise it will cause confusion
decentralized exchanges
let's go back to the first point and talk about my ideas on decentralized exchanges. At present, mines and centralized exchanges are the protagonists in the early development of blockchain. With the rise of more and more exchanges, centralized exchanges fall into manipulation scandals and so on, which bring room for the growth of decentralized exchanges. Decentralized transaction is very likely to bring value to the field of blockchain and become the real protagonist in the era of blockchain. With gateway technology, LBTC can realize decentralized exchange. In the decentralized exchange of LBTC, the user's own currency will be kept by himself, which prevents the possibility of losing the currency in the centralized exchange. At the same time, it can also prevent the opaque system transactions, operational and technical risks. According to the previous gateway interview, LBTC will also work with reliable project parties to put on the stock exchange for the benefit of all community members. Generally speaking, LBTC's development route is relatively clear, and its goal in the field of payment is also very clear. Hold on, partners, the future is promising!
4. Bitcoin was born in a paper in 2008
a person signed by Nakamoto Tsui has put forward a revolutionary idea: let's create a currency that is not controlled by the government or anyone else! This idea is crazy: there is no asset support behind a string of figures, and no one is responsible for it. How can anyone accept it when you pay it to the other party as money
Merkle tree
looks like a binary tree, but this is the lower two nodes. Take the hash value to get the upper node. Just remember the root node to detect whether the whole tree has been tampered
the root hash value is stored in the block header, and the transaction process is stored in the block body. All nodes include block header and block body, but light nodes (such as bitcoin wallets on mobile phones) only include block header. This tree can prove that a transaction has been written into the blockchain
3. Consensus agreement
two issues should be paid attention to in decentralized currency:
1. Who can issue digital currency: mining
2. How to verify the legitimacy of transactions: blockchain
double spending attack
double spending attack is a major challenge of digital currency
all transactions in bitcoin have input and output. Where does bitcoin come from and where does it go
under normal circumstances, there may be two bifurcations, because two nodes obtain the bookkeeping right at the same time, and the two nodes package the block and calculate the random number at the same time. At this time, the two bifurcations will coexist temporarily until one of the blocks finds the next block first, which becomes the longest legal chain, and the other one is discarded<

Sybil attack
a malicious node keeps generating accounts. If the total number of accounts exceeds half of the total accounts, it obtains the control of the blockchain

consensus protocol in bitcoin
some nodes are malicious, and most nodes are good

idea 1: pack some transactions into blocks as candidate blocks, let each block vote, and write them into the blockchain if they pass

No, because some malicious nodes have been publishing blocks containing malicious transactions, and they have been voting and occupying resources. And some nodes don't vote<

idea 2: vote not by the number of accounts, but by computing power. Each node can generate legal transactions and put them into the block. These nodes start to try random numbers until H (block header) ≤ target is found, then this node has the right to account

the only way to generate bitcoin
coinbase transaction. There is no need to point out the source of the currency. If you have the bookkeeping right, you will get a reward< br />
50BTC-> 25BTC-> 12.5btc, the reward will be halved for every 210000 bitcoins

the process of bitcoin competing for bookkeeping rights is called mining. The node competing for bookkeeping right is called miner.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750