Position: Home page » Bitcoin » Bitcoin destruction

Bitcoin destruction

Publish: 2021-05-23 00:54:54
1.

If bitcoin accounts are decentralized, so are hackers. Bitcoin, which uses blockchain technology, is not more secure than bank accounts. On the contrary, it is vulnerable to hackers. So, in the world of virtual currency, how to protect the security of account funds

Secret your private key address

the bitcoin address is the only information needed to define the distribution and transmission end of bitcoin. These addresses are generated anonymously by the user's wallet. Once the address is used, all the transaction history related to it will destroy the confidentiality of the address. Anyone can view the balance and all transactions at any address. Because users usually need to disclose their identity in order to receive services or goods, the bitcoin address cannot be completely anonymous. For these reasons, it is better to use bitcoin address only once, and users must be careful not to disclose the address

When replacing the computer, try to destroy the hard disk of the original computer. Don't save or publish the private key of bitcoin to the cloud, mailbox or collection. If a network administrator writes a regular expression to retrieve the text, he can find all the information and crack the user's account

2. Stored in bitcoin wallet

many bitcoin exchanges have been attacked by hackers. If you use the wallet of bitcoin exchange, please use Google's "double authentication" to ensure security. During the development of virtual currency, there have been many cases of bitcoin exchange running away. The exchange owns the private key of the user's wallet, which is not a safe way to save bitcoin

bitcoin wallet has a wide range of customers, which is more secure than the wallet service of bitcoin exchange. No matter what kind of wallet you choose, you should choose a strong password. Don't use the same password as the registered email. At the same time, do not put eggs in the same basket, choose multiple storage ways to improve the security of assets

using the genuine system of bitcoin wallet, regularly updating security vulnerabilities and fixing bugs can improve security. Some studies have pointed out that IOS system is more secure than Android system, because the existing security vulnerabilities of Android system may be relatively easy to be attacked by hackers

3. The most common way to identify phishing sites is phishing sites. Hackers will create a domain name similar to bitcoin website, which may be sent to users through e-mail and other channels. Once users try to log on the website, hackers will record their login information

so be careful before clicking any link. Many browsers have the service of "phishing check". If you carefully identify the domain name of the website, you can identify the phishing website

4. Guard against Keylogger

in addition to phishing sites, the common attack method of hackers is Keylogger. Keyboarding is the easiest way to capture passwords. The deception of key recording software is very high, even the technical house may believe it. In short, a keyboard recorder is actually a script code. Once it is installed on the operating system of the target computer, it will record all the keystrokes on the keyboard and send them to hackers, mostly through FTP

the successful method of introcing Keylogger depends on many factors, including the operating system, the lifetime of keylogger and the anti infection level of target computer. Keyboard recorder is usually injected through web browser. The security vulnerability of the target machine depends on the type of browser it uses; Whether the operating system installed on the target machine is genuine, and whether the operating system is updated with the latest security vulnerabilities and bug fixes

5. Watch out for USB theft program

the software will retrieve your password and login credentials stored in the browser. Once FUD, some stealing programs can be very powerful. In most cases, a steal program is a. Bat file, which can be injected into the target machine online or driven by USB

6. Using proxy and VPN

proxy server and VPN can increase the security of your bitcoin wallet, although most people mistakenly believe that VPN makes them anonymous online. But in fact, VPN only improves the privacy of users. VPN can rece the possibility of hackers accessing the router to open the port, which also means that they are less likely to succeed

7. Encryption and backup wallet

wallet backup is essential to prevent losses caused by computer failure or human error. If a computer or mobile phone is lost, a backup wallet can help retrieve the bitcoin. At the same time to encrypt the online backup, any backup that can be accessed through the Internet should be encrypted

how to back up your wallet? First, close the bitcoin client, then select the backup wallet of the menu file in the main interface, and the wallet.dat file to other hard disk partition, mobile hard disk or U disk

it should be noted that the entire wallet should be backed up, not just the private key. Bitcoin wallet has many private keys for receiving transaction change. If only the private keys of visible bitcoin addresses are backed up, most of the funds may not be restored from the backup. Also, back up your wallet regularly to make sure that all recent bitcoin change addresses and newly created bitcoin addresses are included in the backup

Cold storage

offline wallet is called "cold storage", which is the safest way to save digital currency

cold storage is an offline wallet that is not connected to the network, that is, it will not be attacked by black horse and Trojan horse. However, because the operation is relatively complex and the price is relatively expensive, the price of offline wallet is more than 1000 yuan, which is suitable for users who have a lot of bitcoin and are ready to hold it for a long time

although the operation of cold storage is relatively complex, it is the safest storage method. At present, only cold storage has truly realized the inviolability of personal assets and is not subject to the supervision of others

if you want to know more about bitcoin information, please send me a private message and avoid detours

2.

Hello, there are several key points in your question that need special attention. I will elaborate them as follows:

  1. in your description & quot; Download a bitcoin wallet software & quot;: This step should be cautious. First of all, your goal is to make bitcoin paper wallets offline. What you want to download is actually [bitcoin offline paper wallets making tool], and these tools are intermingled, and some are even very risky. So what kind of [paper wallets making tool] do you want to choose? It must be an open source (that is, the source code is completely open) proction tool that has been recognized by all of us for many years. After many years, it has experienced the test of time. You can search the Internet for a comparative understanding of this point. It is suggested to search the "secure bitcoin offline paper wallet" to learn more about the comparison and be willing to spend more time

  2. to make bitcoin offline paper wallet, it is right to "unplug the network cable". At this time, it is true that the computer you make the paper wallet is completely isolated from the whole Internet, which is the meaning of offline. At this time, you need not worry, because the address and private key of bitcoin wallet are just a certificate, Bitcoin doesn't really need to be put into this wallet (it's totally different from the real wallet, but the network can understand it). The address of bitcoin's wallet is just a record of several public books on the bitcoin blockchain network. Therefore, you can safely use the bitcoin offline paper wallet, The key point is that you actually the private key address of the bitcoin offline paper wallet onto the paper, and ensure that there is no mistake. Save the public key to receive other people's bitcoin transfer. Then, the bitcoin offline paper wallet you generate will be fully recognized by the bitcoin network

  3. it is mentioned in your problem description that "I write down the public key and private key with paper, then smash the computer to pieces, and then burn down the host screen with fire" - this is not necessary at all. As long as you unplug the network cable in the process of offline making bitcoin offline paper wallet, no one can peek at your screen, So as long as you choose the secure bitcoin offline paper wallet tool, the wallet you get will be secure. Of course, the most important thing is that you should store the note with the private key of the bitcoin offline paper wallet in a fireproof and waterproof safe. As for the computer you use to generate the bitcoin offline paper wallet, you don't need to break it. At most, you can destroy the hard disk. In the safe bitcoin offline paper wallet tutorial searched above, there are detailed instructions on how to do the subsequent processing

  4. finally, you mentioned the operation of transferring money to your offline generated bitcoin paper wallet, which is no different from transferring money to any other bitcoin address. The synchronization process is carried out in the whole bitcoin blockchain network and needs to wait, but this is the confirmation process of the whole network

  5. < / OL >

    I hope my answer can help you. It is recommended that you fully study before you operate< br />

3. The issue of bitcoin is determined by the block height, that is, the distance from the No. 0 block of Genesis. Now when the number is reached, the total amount of bitcoin should be limited. After this village, there will be no store. If the miners dig a block but don't receive the reward of the block, the bitcoin will be destroyed forever

coinbase transaction is a special transaction that generates bitcoin "out of thin air". Only miners can write this kind of transaction, and the number of generated bitcoin is limited by rules (new currency reced by half for every 210000 blocks + transaction fee for this block)

however, the rules do not stipulate that the miner must take away all the rewards that can be taken, and can choose not to take them

therefore, a mine pool connected with the RSK side chain has made a bug before, forgetting to take away the reward and occupying a pit in a block for nothing, which is equivalent to destroying the corresponding amount of bitcoin, making the total amount of bitcoin decrease a little bit permanently

in addition, to spend a bitcoin, you only need to specify the transaction ID and output serial number

as like as two peas in multiple blocks repeatedly write identical coinbase transactions, the transaction ID is also repeated.

therefore, this kind of situation also occupies the pit of a block in vain, and permanently destroys the corresponding amount of bitcoin

it seems to me that this is still a security vulnerability, so the new version of bitcoin software later banned the writing of repeated coinbase transactions. But until now, there has been no ban on miners not getting their e rewards

generally speaking, a coin is controlled by a private key. If a coin is transferred to an address where no one knows the private key, it will be destroyed

if the owner does a good job in security, and the private key is not disclosed and cannot be guessed, but he accidentally loses the private key, it is equivalent to destroying all the coins he owns

there are only some special circumstances that require intentional destruction of coins

one is irreversibly converted into another kind of currency, such as the contract currency XCP attached to bitcoin and wormhole cash WHC attached to BCH

the second is to save certificates and data on the chain, such as the time stamp: panbiao.com/2013/08 /

and the crowd funding of the original Ethereum founding team: zhuanlan.hu.com/p/29

the private key is essentially a big number. Whoever knows this number can control the currency on the corresponding address. So the private key must be generated with reliable random number, otherwise it may be guessed and stolen

compared with the token, the address is the hash of the public key. There is no way to judge whether an address has a corresponding public key and private key (even if the public key is known, the corresponding private key cannot be known). Therefore, even if it is explicitly the address of "burned" token, the system does not prohibit the transfer in

strictly speaking, what locks the currency is a small program (script). This program takes the input as the public key and digital signature. First, check whether the public key hash is consistent, and then check whether the digital signature is valid. If it is valid, it will be verified and transfer is allowed; Otherwise, it will be judged that the transaction is illegal and refuse to package into the chain

it is the whole node software that explains and executes this program. It can be said that the software code of the whole node specifically defines a coin

however, the current situation is very embarrassing. Most miners do not run the whole node, only a few mines are running. The vast majority of users do not run the whole node, even if they run the whole node, they can only perform verification, no computing power, no block
4. The issue of bitcoin is determined by the block height, that is, the distance from the No. 0 block of Genesis. Now when the number is reached, the total amount of bitcoin should be limited. After this village, there will be no store. If the miners dig a block but don't receive the reward of the block, the bitcoin will be destroyed forever

coinbase transaction is a special transaction that generates bitcoin "out of thin air". Only miners can write this kind of transaction, and the number of generated bitcoin is limited by rules (new currency reced by half for every 210000 blocks + transaction fee for this block)

however, the rules do not stipulate that the miner must take away all the rewards that can be taken, and can choose not to take them

therefore, a mine pool connected with the RSK side chain has made a bug before, forgetting to take away the reward and occupying a pit in a block for nothing, which is equivalent to destroying the corresponding amount of bitcoin, making the total amount of bitcoin decrease a little bit permanently

in addition, to spend a bitcoin, you only need to specify the transaction ID and output serial number

as like as two peas in multiple blocks repeatedly write identical coinbase transactions, the transaction ID is also repeated.

therefore, this kind of situation also occupies the pit of a block in vain, and permanently destroys the corresponding amount of bitcoin

it seems to me that this is still a security vulnerability, so the new version of bitcoin software later banned the writing of repeated coinbase transactions. But until now, there has been no ban on miners not getting their e rewards

generally speaking, a coin is controlled by a private key. If a coin is transferred to an address where no one knows the private key, it will be destroyed

if the owner does a good job in security, and the private key is not disclosed and cannot be guessed, but he accidentally loses the private key, it is equivalent to destroying all the coins he owns

there are only some special circumstances that require intentional destruction of coins

one is irreversibly converted into another kind of currency, such as the contract currency XCP attached to bitcoin and wormhole cash WHC attached to BCH

the second is to save certificates and data on the chain, such as the time stamp: panbiao.com/2013/08 /

and the crowd funding of the original Ethereum founding team: zhuanlan.hu.com/p/29

the private key is essentially a big number. Whoever knows this number can control the currency on the corresponding address. So the private key must be generated with reliable random number, otherwise it may be guessed and stolen

compared with the token, the address is the hash of the public key. There is no way to judge whether an address has a corresponding public key and private key (even if the public key is known, the corresponding private key cannot be known). Therefore, even if it is explicitly the address of "burned" token, the system does not prohibit the transfer in

strictly speaking, what locks the currency is a small program (script). This program takes the input as the public key and digital signature. First, check whether the public key hash is consistent, and then check whether the digital signature is valid. If it is valid, it will be verified and transfer is allowed; Otherwise, it will be judged that the transaction is illegal and refuse to package into the chain

it is the whole node software that explains and executes this program. It can be said that the software code of the whole node specifically defines a coin

however, the current situation is very embarrassing. Most miners do not run the whole node, only a few mines are running. The vast majority of users do not run the whole node, even if they run the whole node, they can only perform verification, no computing power, no block.
5. no MLM is selling the concept and earning a head fee. The digital currency can be used to trade, it has its own value. There are a lot of people investing in digital currency now, but it is suggested to go to big trading platforms, such as hot money pro, which only has reliable digital currency online, so the risk can be reced.
6. 👍
now we can also participate in providing storage space to help those customers who need to store content to keep content fragments, and they will get storage fees; Providing retrieval services, bandwidth, and quickly providing the content customers need will get retrieval fees; Packed blocks, each block confirmed, the network will give a reward. Statistically speaking, the return is higher than that of bitcoin mining.
7. Bitcoin halving is certainly good. Okb is just a zero cost air coin. Does its destruction have anything to do with the market? Honest, bitoffer is not good with stock?
8. In short, the computing power of quantum computer is too strong. It can even be said that in the future, there may be a quantum computer with more computing power than all ordinary computers in the world, and then such powerful computing power can realize tasks that could not be completed before, such as cracking the bitcoin wallet by exhaustive inverse operation, That is to say, the bitcoin you bought with a lot of money will be easily stolen. Do you think it will collapse?
9. There is a dcpro, which is very large, and many people agree with it
10. It is not clear that existence is value
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750