Bitcoin destruction
If bitcoin accounts are decentralized, so are hackers. Bitcoin, which uses blockchain technology, is not more secure than bank accounts. On the contrary, it is vulnerable to hackers. So, in the world of virtual currency, how to protect the security of account funds
Secret your private key addressthe bitcoin address is the only information needed to define the distribution and transmission end of bitcoin. These addresses are generated anonymously by the user's wallet. Once the address is used, all the transaction history related to it will destroy the confidentiality of the address. Anyone can view the balance and all transactions at any address. Because users usually need to disclose their identity in order to receive services or goods, the bitcoin address cannot be completely anonymous. For these reasons, it is better to use bitcoin address only once, and users must be careful not to disclose the address
When replacing the computer, try to destroy the hard disk of the original computer. Don't save or publish the private key of bitcoin to the cloud, mailbox or collection. If a network administrator writes a regular expression to retrieve the text, he can find all the information and crack the user's account2. Stored in bitcoin wallet
many bitcoin exchanges have been attacked by hackers. If you use the wallet of bitcoin exchange, please use Google's "double authentication" to ensure security. During the development of virtual currency, there have been many cases of bitcoin exchange running away. The exchange owns the private key of the user's wallet, which is not a safe way to save bitcoin
bitcoin wallet has a wide range of customers, which is more secure than the wallet service of bitcoin exchange. No matter what kind of wallet you choose, you should choose a strong password. Don't use the same password as the registered email. At the same time, do not put eggs in the same basket, choose multiple storage ways to improve the security of assets
using the genuine system of bitcoin wallet, regularly updating security vulnerabilities and fixing bugs can improve security. Some studies have pointed out that IOS system is more secure than Android system, because the existing security vulnerabilities of Android system may be relatively easy to be attacked by hackers
3. The most common way to identify phishing sites is phishing sites. Hackers will create a domain name similar to bitcoin website, which may be sent to users through e-mail and other channels. Once users try to log on the website, hackers will record their login information
so be careful before clicking any link. Many browsers have the service of "phishing check". If you carefully identify the domain name of the website, you can identify the phishing website
4. Guard against Keylogger
in addition to phishing sites, the common attack method of hackers is Keylogger. Keyboarding is the easiest way to capture passwords. The deception of key recording software is very high, even the technical house may believe it. In short, a keyboard recorder is actually a script code. Once it is installed on the operating system of the target computer, it will record all the keystrokes on the keyboard and send them to hackers, mostly through FTP
the successful method of introcing Keylogger depends on many factors, including the operating system, the lifetime of keylogger and the anti infection level of target computer. Keyboard recorder is usually injected through web browser. The security vulnerability of the target machine depends on the type of browser it uses; Whether the operating system installed on the target machine is genuine, and whether the operating system is updated with the latest security vulnerabilities and bug fixes
5. Watch out for USB theft program
the software will retrieve your password and login credentials stored in the browser. Once FUD, some stealing programs can be very powerful. In most cases, a steal program is a. Bat file, which can be injected into the target machine online or driven by USB
6. Using proxy and VPN
proxy server and VPN can increase the security of your bitcoin wallet, although most people mistakenly believe that VPN makes them anonymous online. But in fact, VPN only improves the privacy of users. VPN can rece the possibility of hackers accessing the router to open the port, which also means that they are less likely to succeed
7. Encryption and backup wallet
wallet backup is essential to prevent losses caused by computer failure or human error. If a computer or mobile phone is lost, a backup wallet can help retrieve the bitcoin. At the same time to encrypt the online backup, any backup that can be accessed through the Internet should be encrypted
how to back up your wallet? First, close the bitcoin client, then select the backup wallet of the menu file in the main interface, and the wallet.dat file to other hard disk partition, mobile hard disk or U disk
it should be noted that the entire wallet should be backed up, not just the private key. Bitcoin wallet has many private keys for receiving transaction change. If only the private keys of visible bitcoin addresses are backed up, most of the funds may not be restored from the backup. Also, back up your wallet regularly to make sure that all recent bitcoin change addresses and newly created bitcoin addresses are included in the backup
Cold storageoffline wallet is called "cold storage", which is the safest way to save digital currency
cold storage is an offline wallet that is not connected to the network, that is, it will not be attacked by black horse and Trojan horse. However, because the operation is relatively complex and the price is relatively expensive, the price of offline wallet is more than 1000 yuan, which is suitable for users who have a lot of bitcoin and are ready to hold it for a long time
although the operation of cold storage is relatively complex, it is the safest storage method. At present, only cold storage has truly realized the inviolability of personal assets and is not subject to the supervision of others
if you want to know more about bitcoin information, please send me a private message and avoid detours
Hello, there are several key points in your question that need special attention. I will elaborate them as follows:
-
in your description & quot; Download a bitcoin wallet software & quot;: This step should be cautious. First of all, your goal is to make bitcoin paper wallets offline. What you want to download is actually [bitcoin offline paper wallets making tool], and these tools are intermingled, and some are even very risky. So what kind of [paper wallets making tool] do you want to choose? It must be an open source (that is, the source code is completely open) proction tool that has been recognized by all of us for many years. After many years, it has experienced the test of time. You can search the Internet for a comparative understanding of this point. It is suggested to search the "secure bitcoin offline paper wallet" to learn more about the comparison and be willing to spend more time
-
to make bitcoin offline paper wallet, it is right to "unplug the network cable". At this time, it is true that the computer you make the paper wallet is completely isolated from the whole Internet, which is the meaning of offline. At this time, you need not worry, because the address and private key of bitcoin wallet are just a certificate, Bitcoin doesn't really need to be put into this wallet (it's totally different from the real wallet, but the network can understand it). The address of bitcoin's wallet is just a record of several public books on the bitcoin blockchain network. Therefore, you can safely use the bitcoin offline paper wallet, The key point is that you actually the private key address of the bitcoin offline paper wallet onto the paper, and ensure that there is no mistake. Save the public key to receive other people's bitcoin transfer. Then, the bitcoin offline paper wallet you generate will be fully recognized by the bitcoin network
-
it is mentioned in your problem description that "I write down the public key and private key with paper, then smash the computer to pieces, and then burn down the host screen with fire" - this is not necessary at all. As long as you unplug the network cable in the process of offline making bitcoin offline paper wallet, no one can peek at your screen, So as long as you choose the secure bitcoin offline paper wallet tool, the wallet you get will be secure. Of course, the most important thing is that you should store the note with the private key of the bitcoin offline paper wallet in a fireproof and waterproof safe. As for the computer you use to generate the bitcoin offline paper wallet, you don't need to break it. At most, you can destroy the hard disk. In the safe bitcoin offline paper wallet tutorial searched above, there are detailed instructions on how to do the subsequent processing
-
finally, you mentioned the operation of transferring money to your offline generated bitcoin paper wallet, which is no different from transferring money to any other bitcoin address. The synchronization process is carried out in the whole bitcoin blockchain network and needs to wait, but this is the confirmation process of the whole network
< / OL >
I hope my answer can help you. It is recommended that you fully study before you operate< br />
coinbase transaction is a special transaction that generates bitcoin "out of thin air". Only miners can write this kind of transaction, and the number of generated bitcoin is limited by rules (new currency reced by half for every 210000 blocks + transaction fee for this block)
however, the rules do not stipulate that the miner must take away all the rewards that can be taken, and can choose not to take them
therefore, a mine pool connected with the RSK side chain has made a bug before, forgetting to take away the reward and occupying a pit in a block for nothing, which is equivalent to destroying the corresponding amount of bitcoin, making the total amount of bitcoin decrease a little bit permanently
in addition, to spend a bitcoin, you only need to specify the transaction ID and output serial number
as like as two peas in multiple blocks repeatedly write identical coinbase transactions, the transaction ID is also repeated.
therefore, this kind of situation also occupies the pit of a block in vain, and permanently destroys the corresponding amount of bitcoin
it seems to me that this is still a security vulnerability, so the new version of bitcoin software later banned the writing of repeated coinbase transactions. But until now, there has been no ban on miners not getting their e rewards
generally speaking, a coin is controlled by a private key. If a coin is transferred to an address where no one knows the private key, it will be destroyed
if the owner does a good job in security, and the private key is not disclosed and cannot be guessed, but he accidentally loses the private key, it is equivalent to destroying all the coins he owns
there are only some special circumstances that require intentional destruction of coins
one is irreversibly converted into another kind of currency, such as the contract currency XCP attached to bitcoin and wormhole cash WHC attached to BCH
the second is to save certificates and data on the chain, such as the time stamp: panbiao.com/2013/08 /
and the crowd funding of the original Ethereum founding team: zhuanlan.hu.com/p/29
the private key is essentially a big number. Whoever knows this number can control the currency on the corresponding address. So the private key must be generated with reliable random number, otherwise it may be guessed and stolen
compared with the token, the address is the hash of the public key. There is no way to judge whether an address has a corresponding public key and private key (even if the public key is known, the corresponding private key cannot be known). Therefore, even if it is explicitly the address of "burned" token, the system does not prohibit the transfer in
strictly speaking, what locks the currency is a small program (script). This program takes the input as the public key and digital signature. First, check whether the public key hash is consistent, and then check whether the digital signature is valid. If it is valid, it will be verified and transfer is allowed; Otherwise, it will be judged that the transaction is illegal and refuse to package into the chain
it is the whole node software that explains and executes this program. It can be said that the software code of the whole node specifically defines a coin
however, the current situation is very embarrassing. Most miners do not run the whole node, only a few mines are running. The vast majority of users do not run the whole node, even if they run the whole node, they can only perform verification, no computing power, no block
coinbase transaction is a special transaction that generates bitcoin "out of thin air". Only miners can write this kind of transaction, and the number of generated bitcoin is limited by rules (new currency reced by half for every 210000 blocks + transaction fee for this block)
however, the rules do not stipulate that the miner must take away all the rewards that can be taken, and can choose not to take them
therefore, a mine pool connected with the RSK side chain has made a bug before, forgetting to take away the reward and occupying a pit in a block for nothing, which is equivalent to destroying the corresponding amount of bitcoin, making the total amount of bitcoin decrease a little bit permanently
in addition, to spend a bitcoin, you only need to specify the transaction ID and output serial number
as like as two peas in multiple blocks repeatedly write identical coinbase transactions, the transaction ID is also repeated.
therefore, this kind of situation also occupies the pit of a block in vain, and permanently destroys the corresponding amount of bitcoin
it seems to me that this is still a security vulnerability, so the new version of bitcoin software later banned the writing of repeated coinbase transactions. But until now, there has been no ban on miners not getting their e rewards
generally speaking, a coin is controlled by a private key. If a coin is transferred to an address where no one knows the private key, it will be destroyed
if the owner does a good job in security, and the private key is not disclosed and cannot be guessed, but he accidentally loses the private key, it is equivalent to destroying all the coins he owns
there are only some special circumstances that require intentional destruction of coins
one is irreversibly converted into another kind of currency, such as the contract currency XCP attached to bitcoin and wormhole cash WHC attached to BCH
the second is to save certificates and data on the chain, such as the time stamp: panbiao.com/2013/08 /
and the crowd funding of the original Ethereum founding team: zhuanlan.hu.com/p/29
the private key is essentially a big number. Whoever knows this number can control the currency on the corresponding address. So the private key must be generated with reliable random number, otherwise it may be guessed and stolen
compared with the token, the address is the hash of the public key. There is no way to judge whether an address has a corresponding public key and private key (even if the public key is known, the corresponding private key cannot be known). Therefore, even if it is explicitly the address of "burned" token, the system does not prohibit the transfer in
strictly speaking, what locks the currency is a small program (script). This program takes the input as the public key and digital signature. First, check whether the public key hash is consistent, and then check whether the digital signature is valid. If it is valid, it will be verified and transfer is allowed; Otherwise, it will be judged that the transaction is illegal and refuse to package into the chain
it is the whole node software that explains and executes this program. It can be said that the software code of the whole node specifically defines a coin
however, the current situation is very embarrassing. Most miners do not run the whole node, only a few mines are running. The vast majority of users do not run the whole node, even if they run the whole node, they can only perform verification, no computing power, no block.
now we can also participate in providing storage space to help those customers who need to store content to keep content fragments, and they will get storage fees; Providing retrieval services, bandwidth, and quickly providing the content customers need will get retrieval fees; Packed blocks, each block confirmed, the network will give a reward. Statistically speaking, the return is higher than that of bitcoin mining.