Position: Home page » Bitcoin » What about bitcoin's decentralized wallet

What about bitcoin's decentralized wallet

Publish: 2021-05-24 19:33:23
1. Nakamoto is the first person to discover bitcoin. Bitcoin is not issued by any institution, and the total amount is only 21 million yuan. The transaction of bitcoin needs the consent of 6 people!
2. Because bitcoin does not exist in the issuing institutions (bitcoin is extracted from the network), nor does it exist in banks, but directly through a personal to personal transfer.
3. This is not necessarily true. After all, it is a digital cryptocurrency, each of which is separate and not stored on the website.
4. For example, I borrow money from you in a village. Normally, if I am afraid that you will not repay the money, I can find an intermediary recognized by everyone, such as the village head as the guarantor, and sign an IOU. In this way, if you default at that time, I can find an intermediary to prove that you really owe me money, But there are two problems: 1. What if the village head finds out that his long lost son colludes with him to cheat you on money? 2. What if the middleman dies on the spot the next day! This is about trust and security. If the method of blockchain is to provide you with the certificate of the whole village (distributed), so that everyone knows about it and the other party can't default on it. Second, even if a small number of people or village heads deny (some nodes commit crimes) that they have lost the IOU or tampered with the content, there will still be others to make the basis

above, explain the two problems of building owners: 1. Decentralization, because the account book records are not centralized in the hands of each participant, and you will get paid if you save and keep accounts. 2. Since I can get rewards by saving and keeping accounts, can I just keep accounts instead of storing them? If you have a mining pool, you can keep accounts for it and store it for you. In this way, you can still get good rewards. There are only a few mining pools in the world, so they are centralized
5.

Fire coin is a bitcoin trading platform. As of the end of 2016, the accumulated turnover of fire coin reached 200 billion yuan

bitcoin is a virtual encrypted digital currency in the form of P2P

Bitcoin is different from all currencies. Bitcoin does not rely on a specific currency institution. It is generated by a large number of calculations based on a specific algorithm. Bitcoin economy uses a distributed database composed of many nodes in the whole P2P network to confirm and record all transactions, and uses the design of cryptography to ensure the security of all aspects of currency circulation. The decentralized nature and algorithm of P2P can ensure that it is impossible to artificially manipulate the value of bitcoin through mass proction

extended information:

fire coin business

1. Fire coin global station, headquartered in Singapore, provides digital asset trading and investment services

2. The digital asset trading platform based on Korean won provides digital asset trading services

3, China, has become a platform for information and research in vertical chain of block chain, providing regional chain technology research and application information for Chinese mainland users, and integrates services such as instry consultation, research and ecation training. p> The company is headquartered in Beijing, China, providing digital asset management services and user experience

6. Centralized wallet, also known as off Chain Wallet, completely depends on the company and server running the wallet. Bitcoin stored in the exchange is stored in the centralized wallet (off Chain Wallet). The private key is not owned by the user, but in the wallet project side of the centralized server hosting chain, the fund is usually entrusted to the server
private keys and assets are transferred to the wallet for centralized management. Users don't need to worry about the loss of the private key of this kind of wallet procts, resulting in the loss of funds; However, the capital risk will be more concentrated in the wallet project side and server side. When the centralized wallet is conquered by hackers, users will suffer unnecessary losses
decentralized wallets, commonly known as onchain wallets, have private keys maintained by users and assets stored in blockchains
decentralized wallets are often referred to as onchain wallets. The private key is handed over to the user. If the private key is lost, the wallet will not be able to help the user recover, and the funds will be lost forever. But the decentralized wallet is difficult to be attacked by hackers, and users don't have to worry about the self stealing of the wallet service provider
centralized wallets are where assets are stored, while decentralized wallets are where private keys are stored
except for the exchange, it is not recommended to use the centralized wallet, although losing the private key may help you find it. But there is always a risk that the company will run
a decentralized wallet is equivalent to a channel, a channel where you can master mnemonics to control your assets on the blockchain. For a decentralized wallet, the most important thing is to protect the security of the [private key]
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
7. Centralized wallet, also known as off Chain Wallet, completely depends on the company and server running the wallet. Bitcoin stored in the exchange is stored in the centralized wallet (off Chain Wallet). The private key is not owned by the user, but in the wallet project side of the centralized server hosting chain, the fund is usually entrusted to the server
private keys and assets are transferred to the wallet for centralized management. Users don't need to worry about the loss of the private key of this kind of wallet procts, resulting in the loss of funds; However, the capital risk will be more concentrated in the wallet project side and server side. When the centralized wallet is conquered by hackers, users will suffer unnecessary losses
decentralized wallets, commonly known as onchain wallets, have private keys maintained by users and assets stored in blockchains
decentralized wallets are often referred to as onchain wallets. The private key is handed over to the user. If the private key is lost, the wallet will not be able to help the user recover, and the funds will be lost forever. But the decentralized wallet is difficult to be attacked by hackers, and users don't have to worry about the self stealing of the wallet service provider
centralized wallets are where assets are stored, while decentralized wallets are where private keys are stored
except for the exchange, it is not recommended to use the centralized wallet, although losing the private key may help you find it. But there is always a risk that the company will run

a decentralized wallet is equivalent to a channel, a channel to control its own assets on the blockchain by mastering mnemonics. For a decentralized wallet, the most important thing is to protect the security of the [private key]

the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
8. Put it in the pusl token wallet, and it's the safest way to centralize. There's additional revenue or it's placed on a larger trading platform. Don't believe anything else. I've had the same problem for a long time
9. Bitcoin was born in a paper in 2008
a person signed by Nakamoto Tsui has put forward a revolutionary idea: let's create a currency that is not controlled by the government or anyone else! This idea is crazy: there is no asset support behind a string of figures, and no one is responsible for it. How can anyone accept it when you pay it to the other party as money
Merkle tree
looks like a binary tree, but this is the lower two nodes. Take the hash value to get the upper node. Just remember the root node to detect whether the whole tree has been tampered
the root hash value is stored in the block header, and the transaction process is stored in the block body. All nodes include block header and block body, but light nodes (such as bitcoin wallets on mobile phones) only include block header. This tree can prove that a transaction has been written into the blockchain
3. Consensus agreement
two issues should be paid attention to in decentralized currency:
1. Who can issue digital currency: mining
2. How to verify the legitimacy of transactions: blockchain
double spending attack
double spending attack is a major challenge of digital currency
all transactions in bitcoin have input and output. Where does bitcoin come from and where does it go
under normal circumstances, there may be two bifurcations, because two nodes obtain the bookkeeping right at the same time, and the two nodes package the block and calculate the random number at the same time. At this time, the two bifurcations will coexist temporarily until one of the blocks finds the next block first, which becomes the longest legal chain, and the other one is discarded<

Sybil attack
a malicious node keeps generating accounts. If the total number of accounts exceeds half of the total accounts, it obtains the control of the blockchain

consensus protocol in bitcoin
some nodes are malicious, and most nodes are good

idea 1: pack some transactions into blocks as candidate blocks, let each block vote, and write them into the blockchain if they pass

No, because some malicious nodes have been publishing blocks containing malicious transactions, and they have been voting and occupying resources. And some nodes don't vote<

idea 2: vote not by the number of accounts, but by computing power. Each node can generate legal transactions and put them into the block. These nodes start to try random numbers until H (block header) ≤ target is found, then this node has the right to account

the only way to generate bitcoin
coinbase transaction. There is no need to point out the source of the currency. If you have the bookkeeping right, you will get a reward< br />
50BTC-> 25BTC-> 12.5btc, the reward will be halved for every 210000 bitcoins

the process of bitcoin competing for bookkeeping rights is called mining. The node competing for bookkeeping right is called miner.
10.

In bitcoin white paper "bitcoin: a peer-to-peer e-cash system", Nakamoto explained in detail how he designed the system. Among them, he established the main design principles of all blockchain systems since then

a real peer-to-peer e-cash should allow direct online payment from the originator to the other party without the need to go through a third-party financial institution

although the existing digital signature technology provides some solutions, if a trusted third party organization is needed to prevent "double payment", the main benefits (Brought by e-cash) will be lost

aiming at the problem of "double payment" in e-cash, we provide a solution with peer-to-peer network technology

in this network, transaction records are time stamped, hashed and merged into a growing chain, which is composed of hash based proof of work. If the proof of work is not redone, the resulting records cannot be changed

the longest chain is not only a proof of the observed sequence of events, but also a proof that it is generated by the largest pool of CPU processing power. As long as the computer nodes that control most CPU processing power do not join forces to attack the network itself, they will generate the longest chain and leave the attacker behind

the network itself only needs the simplest structure. Try your best to broadcast the information on the whole network. A node can leave and rejoin the network at any time. It only needs (when rejoining) to take the longest workload proof chain as the proof of the transaction occurred ring the node's offline period

the Xueshuo innovation blockchain Technology Workstation of Lianqiao ecation online is the only approved "blockchain Technology Specialty" pilot workstation of "smart learning workshop 2020 Xueshuo innovation workstation" launched by the school planning, construction and development center of the Ministry of ecation of China. Based on providing diversified growth paths for students, the professional station promotes the reform of the training mode of the combination of professional degree research, proction, learning and research, and constructs the applied and compound talent training system

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750