What about bitcoin's decentralized wallet
above, explain the two problems of building owners: 1. Decentralization, because the account book records are not centralized in the hands of each participant, and you will get paid if you save and keep accounts. 2. Since I can get rewards by saving and keeping accounts, can I just keep accounts instead of storing them? If you have a mining pool, you can keep accounts for it and store it for you. In this way, you can still get good rewards. There are only a few mining pools in the world, so they are centralized
Fire coin is a bitcoin trading platform. As of the end of 2016, the accumulated turnover of fire coin reached 200 billion yuan
bitcoin is a virtual encrypted digital currency in the form of P2P
Bitcoin is different from all currencies. Bitcoin does not rely on a specific currency institution. It is generated by a large number of calculations based on a specific algorithm. Bitcoin economy uses a distributed database composed of many nodes in the whole P2P network to confirm and record all transactions, and uses the design of cryptography to ensure the security of all aspects of currency circulation. The decentralized nature and algorithm of P2P can ensure that it is impossible to artificially manipulate the value of bitcoin through mass proction
extended information:
fire coin business
1. Fire coin global station, headquartered in Singapore, provides digital asset trading and investment services
2. The digital asset trading platform based on Korean won provides digital asset trading services P>
3, China, has become a platform for information and research in vertical chain of block chain, providing regional chain technology research and application information for Chinese mainland users, and integrates services such as instry consultation, research and ecation training. p> The company is headquartered in Beijing, China, providing digital asset management services and user experience
private keys and assets are transferred to the wallet for centralized management. Users don't need to worry about the loss of the private key of this kind of wallet procts, resulting in the loss of funds; However, the capital risk will be more concentrated in the wallet project side and server side. When the centralized wallet is conquered by hackers, users will suffer unnecessary losses
decentralized wallets, commonly known as onchain wallets, have private keys maintained by users and assets stored in blockchains
decentralized wallets are often referred to as onchain wallets. The private key is handed over to the user. If the private key is lost, the wallet will not be able to help the user recover, and the funds will be lost forever. But the decentralized wallet is difficult to be attacked by hackers, and users don't have to worry about the self stealing of the wallet service provider
centralized wallets are where assets are stored, while decentralized wallets are where private keys are stored
except for the exchange, it is not recommended to use the centralized wallet, although losing the private key may help you find it. But there is always a risk that the company will run
a decentralized wallet is equivalent to a channel, a channel where you can master mnemonics to control your assets on the blockchain. For a decentralized wallet, the most important thing is to protect the security of the [private key]
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
private keys and assets are transferred to the wallet for centralized management. Users don't need to worry about the loss of the private key of this kind of wallet procts, resulting in the loss of funds; However, the capital risk will be more concentrated in the wallet project side and server side. When the centralized wallet is conquered by hackers, users will suffer unnecessary losses
decentralized wallets, commonly known as onchain wallets, have private keys maintained by users and assets stored in blockchains
decentralized wallets are often referred to as onchain wallets. The private key is handed over to the user. If the private key is lost, the wallet will not be able to help the user recover, and the funds will be lost forever. But the decentralized wallet is difficult to be attacked by hackers, and users don't have to worry about the self stealing of the wallet service provider
centralized wallets are where assets are stored, while decentralized wallets are where private keys are stored
except for the exchange, it is not recommended to use the centralized wallet, although losing the private key may help you find it. But there is always a risk that the company will run
a decentralized wallet is equivalent to a channel, a channel to control its own assets on the blockchain by mastering mnemonics. For a decentralized wallet, the most important thing is to protect the security of the [private key]
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
a person signed by Nakamoto Tsui has put forward a revolutionary idea: let's create a currency that is not controlled by the government or anyone else! This idea is crazy: there is no asset support behind a string of figures, and no one is responsible for it. How can anyone accept it when you pay it to the other party as money
Merkle tree
looks like a binary tree, but this is the lower two nodes. Take the hash value to get the upper node. Just remember the root node to detect whether the whole tree has been tampered
the root hash value is stored in the block header, and the transaction process is stored in the block body. All nodes include block header and block body, but light nodes (such as bitcoin wallets on mobile phones) only include block header. This tree can prove that a transaction has been written into the blockchain
3. Consensus agreement
two issues should be paid attention to in decentralized currency:
1. Who can issue digital currency: mining
2. How to verify the legitimacy of transactions: blockchain
double spending attack
double spending attack is a major challenge of digital currency
all transactions in bitcoin have input and output. Where does bitcoin come from and where does it go
under normal circumstances, there may be two bifurcations, because two nodes obtain the bookkeeping right at the same time, and the two nodes package the block and calculate the random number at the same time. At this time, the two bifurcations will coexist temporarily until one of the blocks finds the next block first, which becomes the longest legal chain, and the other one is discarded<
Sybil attack
a malicious node keeps generating accounts. If the total number of accounts exceeds half of the total accounts, it obtains the control of the blockchain
consensus protocol in bitcoin
some nodes are malicious, and most nodes are good
idea 1: pack some transactions into blocks as candidate blocks, let each block vote, and write them into the blockchain if they pass
No, because some malicious nodes have been publishing blocks containing malicious transactions, and they have been voting and occupying resources. And some nodes don't vote<
idea 2: vote not by the number of accounts, but by computing power. Each node can generate legal transactions and put them into the block. These nodes start to try random numbers until H (block header) ≤ target is found, then this node has the right to account
the only way to generate bitcoin
coinbase transaction. There is no need to point out the source of the currency. If you have the bookkeeping right, you will get a reward< br />
50BTC-> 25BTC-> 12.5btc, the reward will be halved for every 210000 bitcoins
the process of bitcoin competing for bookkeeping rights is called mining. The node competing for bookkeeping right is called miner.
In bitcoin white paper "bitcoin: a peer-to-peer e-cash system", Nakamoto explained in detail how he designed the system. Among them, he established the main design principles of all blockchain systems since then
a real peer-to-peer e-cash should allow direct online payment from the originator to the other party without the need to go through a third-party financial institution
although the existing digital signature technology provides some solutions, if a trusted third party organization is needed to prevent "double payment", the main benefits (Brought by e-cash) will be lost
aiming at the problem of "double payment" in e-cash, we provide a solution with peer-to-peer network technology
in this network, transaction records are time stamped, hashed and merged into a growing chain, which is composed of hash based proof of work. If the proof of work is not redone, the resulting records cannot be changed
the longest chain is not only a proof of the observed sequence of events, but also a proof that it is generated by the largest pool of CPU processing power. As long as the computer nodes that control most CPU processing power do not join forces to attack the network itself, they will generate the longest chain and leave the attacker behind
the network itself only needs the simplest structure. Try your best to broadcast the information on the whole network. A node can leave and rejoin the network at any time. It only needs (when rejoining) to take the longest workload proof chain as the proof of the transaction occurred ring the node's offline period
the Xueshuo innovation blockchain Technology Workstation of Lianqiao ecation online is the only approved "blockchain Technology Specialty" pilot workstation of "smart learning workshop 2020 Xueshuo innovation workstation" launched by the school planning, construction and development center of the Ministry of ecation of China. Based on providing diversified growth paths for students, the professional station promotes the reform of the training mode of the combination of professional degree research, proction, learning and research, and constructs the applied and compound talent training system