Is bitcoin OK as long as the private key is kept
users can use bitcoin to buy some virtual items, such as clothes, hats and equipment in online games. As long as someone accepts it, they can also use bitcoin to buy real-life items. In the metaphor of RMB, bitcoin is the serial number of RMB. If you know the serial number of a note, you have the note. During operation, bitcoin users enter a password similar to the bank pin code to log in to the network bitcoin account
through the ATM, users can withdraw the Canadian dollar cash corresponding to the ratio from the bitcoin account, or deposit the cash into the bitcoin account
bitcoin users only need a smart phone to use bitcoin, which is similar to online shopping. A bitcoin address is about 33 characters long, a string of letters and numbers, always starting with 1 or 3, such as & quot& quot; Bitcoin software can generate address automatically, and it does not need to exchange information online when generating address, so it can be offline [2]. More than 2 bitcoin addresses are available. Figuratively speaking, there are about two grains of sand in the world. If there is an earth in each grain of sand, then the total number of bitcoin addresses far exceeds the number of all the sand on all these "earths"
bitcoin address and private key appear in pairs, and their relationship is like bank card number and password. A bitcoin address is like a bank card number, which records how much bitcoin you have on it. You can generate bitcoin address at will to store bitcoin. When each bitcoin address is generated, a corresponding private key of the address will be generated. This private key proves that you have ownership of the bitcoin at that address. We can simply understand the bitcoin address as the bank card number, and the private key of the address as the password of the corresponding bank card number. Only when you know the bank password can you use the money on the bank card number. Therefore, please keep your address and private key when using bitcoin wallet.
the private key is like your bank card password
the address of bitcoin wallet is like your bank card
as long as you have the bank card and password, anyone can withdraw money from ATM
the address of bitcoin wallet is public, which means that everyone else has your bank card, so your bank card password (private key) becomes very important at this time
once your key is disclosed, others can transfer your bitcoin
Internet search: "sister coin teaches you bitcoin" or "sister coin" find me, share more exquisite content ~!
Hello, there are several key points in your question that need special attention. I will elaborate them as follows:
-
in your description & quot; Download a bitcoin wallet software & quot;: This step should be cautious. First of all, your goal is to make bitcoin paper wallets offline. What you want to download is actually [bitcoin offline paper wallets making tool], and these tools are intermingled, and some are even very risky. So what kind of [paper wallets making tool] do you want to choose? It must be an open source (that is, the source code is completely open) proction tool that has been recognized by all of us for many years. After many years, it has experienced the test of time. You can search the Internet for a comparative understanding of this point. It is suggested to search the "secure bitcoin offline paper wallet" to learn more about the comparison and be willing to spend more time
-
to make bitcoin offline paper wallet, it is right to "unplug the network cable". At this time, it is true that the computer you make the paper wallet is completely isolated from the whole Internet, which is the meaning of offline. At this time, you need not worry, because the address and private key of bitcoin wallet are just a certificate, Bitcoin doesn't really need to be put into this wallet (it's totally different from the real wallet, but the network can understand it). The address of bitcoin's wallet is just a record of several public books on the bitcoin blockchain network. Therefore, you can safely use the bitcoin offline paper wallet, The key point is that you actually the private key address of the bitcoin offline paper wallet onto the paper, and ensure that there is no mistake. Save the public key to receive other people's bitcoin transfer. Then, the bitcoin offline paper wallet you generate will be fully recognized by the bitcoin network
-
it is mentioned in your problem description that "I write down the public key and private key with paper, then smash the computer to pieces, and then burn down the host screen with fire" - this is not necessary at all. As long as you unplug the network cable in the process of offline making bitcoin offline paper wallet, no one can peek at your screen, So as long as you choose the secure bitcoin offline paper wallet tool, the wallet you get will be secure. Of course, the most important thing is that you should store the note with the private key of the bitcoin offline paper wallet in a fireproof and waterproof safe. As for the computer you use to generate the bitcoin offline paper wallet, you don't need to break it. At most, you can destroy the hard disk. In the safe bitcoin offline paper wallet tutorial searched above, there are detailed instructions on how to do the subsequent processing
-
finally, you mentioned the operation of transferring money to your offline generated bitcoin paper wallet, which is no different from transferring money to any other bitcoin address. The synchronization process is carried out in the whole bitcoin blockchain network and needs to wait, but this is the confirmation process of the whole network
< / OL >
I hope my answer can help you. It is recommended that you fully study before you operate< br />
Analysis of the role of adventure and mining skills, what are the roles of skills in adventure and mining mobile games, and what are the differences of different skills. Today, I'd like to introce the role of adventure and mining skills{ RRRRR}
< critical hit
class A certain probability causes 150% of the attack power & mdash; 400% of the damage. Some skills can't be dodged, some skills can only be triggered when the enemy's combat power or own combat power is lower than what percentage, and some skills can't be launched until a certain round
< percentage
class It has a certain probability to damage the enemy's current combat power percentage. Heroes with this skill are best placed in the front row. The earlier you trigger, the better. Armor can resist the damage of this ability
< recovery class
It has a certain probability to recover the combat power of your damage percentage or the combat power of the enemy. Hit damage will be resisted by armor, but recovered combat power will not count as armor. When you regain your combat power, you will ignore the enemy's armor
< four dimensional
class Increase your four dimensions, attack, defense, dodge and king
bitcoin is stored in a program or client and controlled by private key
2. Bitcoin GB or MB or KB
after the complete bitcoin client is synchronized, it has a volume of 23g at present. Because of its large size, there are currently online wallets or lightweight clients to choose from
3. Whether the size of each bitcoin is the same
Yes
you can check bitcoin's Chinese wiki
keep the private key with symmetric encryption. Symmetric key algorithm means that both encryption and decryption use one key. The encryption methods we usually use are symmetric encryption, such as WinRAR encryption, bitcoin QT encryption of the private key file is also using the symmetric encryption algorithm. The commonly used symmetric encryption algorithms are AES, DES, RC4, RC5 and so on. Symmetric encryption requires users to set relatively complex keys to prevent brute force cracking. Go to top method 1 uses bitcoin QT to encrypt the private key wallet. In the command mode, we can use the encryptwallet command to encrypt the wallet. For the usage of command mode, please refer to the basic teaching of bitcoin: how to use the private key of paper wallet. This is the most simple and effective method of private key encryption. However, when the walletpassphrase command is used to decrypt the wallet, the key will be read into the computer memory, so it is possible for the attacker to obtain the key. Encryption command: encrypt wallet yourpassword decrypt wallet command: walletpassword yourpasswordtimeout change password command: walletpassword exchange oldpasswordnewpasswordgo to top method 2, use AES encryption provided by blockchain. Blockchain provides users with private key file encryption service based on AES algorithm. Users can download the encrypted file and save it properly
go to top method 3 uses TrueCrypt, a third-party software, to encrypt the key file, which is also recommended by the editor. TrueCrypt is open source and free, with high software maturity, and supports two factor authentication and whole hard disk encryption. In addition, FBI personnel have suffered losses on TrueCrypt, so they have a good reputation. The FBI has admitted defeat in attempts to break the open source encryption used to secure hard drives seized by Brazilian police ring a 2008 investigation.
the bureau had been called in by the Brazilian authorities after the country's own National Institute of Criminology (Inc) had been unable to crack the passphrases used to secure the drives by suspect banker, Daniel Dantas.Brazilian reports state that two programs were used to encrypt the drives, one of which was the popular and widely-used free open source program TrueCrypt. Experts in both countries apparently spent months trying to discover the passphrases using a dictionary attack, A technique that involves trying out large numbers of possible character combinations until the correct sequence is found. Users who use it must keep the key in mind. If you forget the key, no one can recover your encrypted files
TrueCrypt, the official website of TrueCrypt, uses the asymmetric encryption method to keep the private key of the document. The asymmetric encryption method uses the form of public key and private key to encrypt the file. Users can encrypt files with public key and decrypt files with private key. Common asymmetric encryption algorithms include RSA, ElGamal, ECC and so on. The advantage of asymmetric encryption is that the complexity of the key is generally very high, which can effectively prevent violent cracking. The disadvantage is that there is a certain threshold, which is not suitable for ordinary users. Go to top method 1. Indivial users can consider using RSA for encryption. First, you can create a public key and a private key. Click here to generate the key. After keeping the public key and private key properly, you can encrypt and decrypt with the public key. Click here to encrypt and decrypt. RSA public key and private key generation process RSA public key and private key generation process randomly choose two large prime numbers P and Q, P is not equal to Q, calculate n = PQ. According to Euler function, R is obtained= φ( N) = φ( p) φ( q) = (p-1) (Q-1) select an integer E which is less than R and obtain the mole inverse element of e with respect to mole R, named D If and only if e and R are coprime, the records of P and Q are destroyed N. E) is the public key and (n, d) is the private key. Second, we can use PGP (pretty good privacy) tool to encrypt files. PGP encryption allows each public key to bind to all information of a user. Compared with RSA, the function of PGP is more perfect and reliable. However, with the upgrade of Pgp, new encrypted messages may not be decrypted by the old PGP system, so users should be familiar with PGP settings before using PGP. There are many PGP encryption tools on the Internet, so the editor will not list them
Introction to Pgp in Wiki PGP online encryption and decryption system PGP command FAQ advanced method to keep the private key. The above ways to keep the private key are very common. An experienced attacker may still get the user's private key file. For more advanced private key storage methods, please refer to the advanced teaching content of bitcoin in the future.