Position: Home page » Bitcoin » Chinese miners control bitcoin

Chinese miners control bitcoin

Publish: 2021-05-19 00:16:32
1. Erdos, 560 kilometers west of Beijing, is covered with hot waves and sandstorms. The gate is a dividing line, separating the two worlds. Outside the gate is a typical landscape of China's fourth tier Urban Development Zone, while inside the gate is a science fiction scene like the matrix. Eight large factories with blue roofs are juxtaposed. Tens of thousands of "mining machines" are flashing red and green light and roaring in the factory, making digital currency bitcoin for this "mine" day and night. This once the world's largest mine holds about 4% of the computing power (proction capacity) in the bitcoin world. During the peak period, it can dig out more than 100000 bitcoins a year, which is worth more than 3 billion RMB at the price of 30000 RMB in August 2017.
bitcoin was invented by "Zhongben cong" in 2009, Using the computing power of the chip, the boring and repetitive process of constantly "hash collision" in the blocks generated by the bitcoin system to win the bookkeeping right and thus obtain the system reward of bitcoin is vividly called "mining" in the bitcoin instry, and the professional staff engaged in this work are called "in the first few years of bitcoin operation, An ordinary laptop can play the role of "mining". However, the entry of Chinese miners has completely broken the balance of this situation. Relying on professional mining machines designed and made in China, they staged one after another bitcoin world computing power arms race, raising the threshold of "mining" tens of thousands of times
2.

You can't dig in a day. It takes 2000 years

the global unified computing difficulty of bitcoin is 2621404453 (expected to change in two days). It takes more than 2000 years for a 2.5GHz CPU to work out a bitcoin

in order to make the graphics card fully loaded for a long time, the power consumption will be quite high, and the electricity bill will be higher and higher. Many professional mines at home and abroad are operated in areas with extremely low electricity charges, such as hydropower stations, while more users can only mine at home or in ordinary mines, so the electricity charges are not cheap. Even in a certain residential area in Yunnan, there was a case of crazy mining, which led to a large area trip of the residential area, and the transformer was burned


extended data:

bitcoin network generates new bitcoin through "mining". In essence, the so-called "mining" is to use computers to solve a complex mathematical problem to ensure the consistency of bitcoin network distributed accounting system

bitcoin network will automatically adjust the difficulty of mathematical problems, so that the whole network can get a qualified answer about every 10 minutes. Then bitcoin network will generate a certain amount of bitcoin as block reward to reward the person who gets the answer

when bitcoin was born in 2009, block rewards were 50 bitcoins. Ten minutes after its birth, the first 50 bitcoins were generated, and the total amount of money at this time is 50. Then bitcoin grew at a rate of about 50 every 10 minutes. When the total amount reaches 10.5 million (50% of 21 million), the block reward will be halved to 25

when the total amount reaches 15.75 million (5.25 million new output, i.e. 50% of 1050), the block reward will be further halved to 12.5. The monetary system used to have no more than 10.5 million in four years, after which the total number will be permanently limited to about 21 million

3.

As of July 24, 2020, the state has not issued any laws to prove that bitcoin mining machine is illegal

bitcoin mining machine is one of the ways to obtain bitcoin. Bitcoin is a kind of network virtual currency proced by open source P2P software

it doesn't rely on the issuance of specific monetary institutions, and it is generated through a large number of calculations of specific algorithms. Bitcoin economy uses a distributed database composed of many nodes in the whole P2P network to confirm and record all transactions. The decentralized nature and algorithm of P2P can ensure that it is impossible to artificially manipulate the value of bitcoin through mass proction

extended data

the issue and transaction of bitcoin are realized by mining, and it is cast at a certain but slowing rate. Each new block is accompanied by a certain number of new bitcoin from scratch, which is used as a coinbase transaction to reward the miners who find the block

the reward for each block is not fixed. For every 210000 blocks mined, it takes about four years, and the currency issuance rate is reced by 50%. In the first four years of bitcoin's operation, each block created 50 new bitcoins. Each block creates 12.5 new bitcoins. In addition to the block award, the miner will receive a handling fee for all transactions within the block<

source: Internet - bitcoin mining machine

4. It's not illegal, but it can't be found basically
5. It depends on what kind of entity you are. Many blockchain combined with entity instry can apply several characteristics of blockchain. Decentralization, traceability, openness, fairness, permanence, irreversibility and security can be used by instry. Blockchain + entity application development (e-micro) 138
6. Nodes are the places where the blocks are connected, and the blocks need to be chained to be useful
core analysis:
1. Transparency, 2. Openness, 3. Information can not be tampered with, 4. Decentralization,
5. Detailed analysis
blockchain is a new application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies. The so-called consensus mechanism is a mathematical algorithm to establish trust and obtain interests between different nodes in the blockchain system
1. In a narrow sense, blockchain is a chained data structure composed of data blocks connected in sequence according to the time sequence, which is a distributed account book that can not be tampered with and forged by cryptography
2. Broadly speaking, blockchain technology uses blockchain data structure to verify and store data, uses distributed node consensus algorithm to generate and update data, and uses cryptography to ensure the security of data transmission and access It is a new distributed infrastructure and computing method to program and operate data by using intelligent contract composed of automated script code.
7. The computer is not good, too few, can't dig
8. Basic functions of firewall:
1. Packet filtering
is firewall with packet filtering? Yes, that's right! According to the definition of firewall, any way that can effectively prevent illegal network connection is considered as firewall. Early firewalls usually use the set conditions to monitor the characteristics of packets to decide whether to release or block. Packet filtering is a very important feature. Although there are many new ideas of firewall technology, packet filtering is still a very important part, just as the primary function of layer 4 switch is to have the basic function of packet forwarding. Through packet filtering, firewall can block attacks, prohibit external / internal access to some sites, and limit the traffic and connection number of each IP
2. Transparent forwarding of packets
in fact, firewalls are usually set up in front of servers providing certain services. If it is represented by a schematic diagram, it is server firewall guest. Users' requests for access to the server and the information that the server feeds back to users need to be forwarded through the firewall. Therefore, many firewalls have the ability of gateway
3. Block external attacks
if the information sent by the user is not allowed by the firewall settings, the firewall will block it immediately to prevent it from entering the server behind the firewall
4. Log attacks
if necessary, in fact, the firewall can log all attacks. However, for the sake of efficiency, IDS is generally responsible for recording attacks, which will be mentioned later
the above are the basic characteristics of all firewalls. Although it is very simple, firewall technology is graally developed on this basis
the specific function of firewall:
1. First of all, it is natural to support the umbrella of the network. Firewalls will make their own rules. Those that comply with the rules will be released, and those that do not comply with the rules will be prohibited. Of course, these rules can be made by the network administrator himself, but some firewalls may only use built-in rules
2. The next step is to strengthen the network security strategy. Originally, the network security problem is handled by each security software independently, and the firewall can effectively configure all security software on the firewall, and call it uniformly with the firewall as the center. The centralized security management of firewall is more economical and secure
3. The firewall can also effectively record the activities on the Internet. If the access passes through the firewall, it can record all of them and form a log for users to view. When a suspicious situation occurs, the firewall will automatically issue appropriate alerts, and provide detailed information for users to query. Through this information, we can effectively grasp whether the current network is safe or not, and whether further configuration is needed to ensure safety
4. Firewalls can limit the exposure of user points. Firewall can separate the network into a network segment, and each network segment is independent of each other. When a network segment has a problem, it will not affect other network segments, which can effectively prevent the whole network security from being affected by a network segment problem
5. Another important function of the firewall is to prevent information leakage. Privacy should be the most concerned issue of every Internet user. Now is the sensitive period of privacy leakage, so it is more concerned by users. The firewall can block DNS information in the internal network, so that the domain name and IP address of the local computer will not be known by the outside world, Can effectively prevent information leakage
6. Of course, the role of firewall is not only in the scope of security, it also supports the enterprise internal network technology system (virtual private network) with internet service characteristics. Many firewalls have functions.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750