Construction transaction of bitcoin blockchain Wallet
Hello, there are several key points in your question that need special attention. I will elaborate them as follows:
-
in your description & quot; Download a bitcoin wallet software & quot;: This step should be cautious. First of all, your goal is to make bitcoin paper wallets offline. What you want to download is actually [bitcoin offline paper wallets making tool], and these tools are intermingled, and some are even very risky. So what kind of [paper wallets making tool] do you want to choose? It must be an open source (that is, the source code is completely open) proction tool that has been recognized by all of us for many years. After many years, it has experienced the test of time. You can search the Internet for a comparative understanding of this point. It is suggested to search the "secure bitcoin offline paper wallet" to learn more about the comparison and be willing to spend more time
-
to make bitcoin offline paper wallet, it is right to "unplug the network cable". At this time, it is true that the computer you make the paper wallet is completely isolated from the whole Internet, which is the meaning of offline. At this time, you need not worry, because the address and private key of bitcoin wallet are just a certificate, Bitcoin doesn't really need to be put into this wallet (it's totally different from the real wallet, but the network can understand it). The address of bitcoin's wallet is just a record of several public books on the bitcoin blockchain network. Therefore, you can safely use the bitcoin offline paper wallet, The key point is that you actually the private key address of the bitcoin offline paper wallet onto the paper, and ensure that there is no mistake. Save the public key to receive other people's bitcoin transfer. Then, the bitcoin offline paper wallet you generate will be fully recognized by the bitcoin network
-
it is mentioned in your problem description that "I write down the public key and private key with paper, then smash the computer to pieces, and then burn down the host screen with fire" - this is not necessary at all. As long as you unplug the network cable in the process of offline making bitcoin offline paper wallet, no one can peek at your screen, So as long as you choose the secure bitcoin offline paper wallet tool, the wallet you get will be secure. Of course, the most important thing is that you should store the note with the private key of the bitcoin offline paper wallet in a fireproof and waterproof safe. As for the computer you use to generate the bitcoin offline paper wallet, you don't need to break it. At most, you can destroy the hard disk. In the safe bitcoin offline paper wallet tutorial searched above, there are detailed instructions on how to do the subsequent processing
-
finally, you mentioned the operation of transferring money to your offline generated bitcoin paper wallet, which is no different from transferring money to any other bitcoin address. The synchronization process is carried out in the whole bitcoin blockchain network and needs to wait, but this is the confirmation process of the whole network
< / OL >
I hope my answer can help you. It is recommended that you fully study before you operate< br />
does each node have complete blockchain data? You mean a user node? A user node needs to keep the of the block head of the longest workload proof chain, so it knows the data of all the block heads. It can move forward to know all the data on the block chain, but not all of them are saved. A block header is very small, only 80 bytes, which can be saved completely, because the generation of nodes is very slow. Even with the passage of time, the amount is not too large now.
at the same time, it can provide mutual trust for transactions by using trusted self-executive code, so as to rece uncertainty and promote digital transfer and asset transactions
bitcoin is the most well-known blockchain as an encryption currency that uses blockchain technology to realize alternative payment. Bitcoin is a kind of unlicensed blockchain, also known as public blockchain, which does not restrict the identity of users who consume bitcoin or participate in verifying the authenticity of transfer blocks in the blockchain (an energy intensive process, also known as "mining"). These miners get token, or bitcoin, in return, and given that everyone can view the block (though anonymously), the blockchain itself is somewhat transparent
bitcoin is controversial and banned by many countries e to user anonymity to a large extent. However, it is worth noting that the anonymity and energy use of bitcoin are its own characteristics, not the characteristics of the whole blockchain technology.
in bitcoin blockchain, when a transaction is generated through a node or wallet, it needs to be transmitted to other nodes for verification. The method is to encrypt the transaction data by digital signature and obtain a unique hash value representing the transaction by hash algorithm, and then broadcast the hash value to other participating nodes in bitcoin blockchain network for verification. Hash algorithm is to map any length of binary value to a fixed length of smaller binary value, then the smaller binary value is called hash value. Hash value is a unique and compact numerical representation of a piece of data. If you hash a piece of plaintext and change only one letter of that piece, the subsequent hashes will proce different values. It is computationally impossible to find two different inputs hashed to the same value
when a new transaction is generated, it will be broadcast to other participating nodes in the blockchain network first. Each node will put several new transactions into the block, and each node will collect several unverified transaction hash values into the block. Each block can contain hundreds or thousands of transactions
each node calculates the workload proof to decide who can verify the transaction, and the node with the fastest result will verify the transaction, which is a consensus approach. The node that obtains the verification right will broadcast the block to all nodes, and the node that completes the pow the fastest will broadcast its block to other nodes. Each node verifies and connects the new block. Other nodes will confirm whether the transaction contained in this block is valid. After confirming that it has not been repeatedly spent and has a valid digital signature, they will accept the block. At this time, the block will be formally connected to the blockchain and the data cannot be modified. Once all nodes accept the block, the block that did not finish the pow calculation will be invalid, and each node will rebuild a block to continue the next POW calculation
it can be seen that the principle of blockchain is not complicated, and its wide application is natural. Many companies have achieved fruitful results in the process of applying blockchain principles to reality. Like bitcoin, although the ID of the participant is anonymous, the data on the blockchain is public by default. The advantages brought by this openness are unprecedented, such as the ability to resist attacks, the ability to resist the autocratic system of capital control. It is open and transparent while ensuring security, and the account balance of all participants and all transaction records can be seen by people. Until now, we are still surprised by this, because this security method is so novel. However, in the seven-year history of bitcoin, no one has broken this security practically.