How long does it take to crack bitcoin
bitcoin is a kind of network virtual currency. Bitcoin network generates new bitcoin through "mining". In essence, the so-called "mining" is to use computers to solve a complex mathematical problem to ensure the consistency of bitcoin network distributed accounting system. Assuming that the mining computing power is 100 mhash / s and the total computing power is 4000 ghash / s per day, 3600 bitcoins can be g out every 24 hours
China's computing power has accounted for more than 75% of the world, that is to say, 75% of bitcoin in the world is made in China. How long does it take to dig a bitcoin
bitcoin used to be very good at "digging", which can be done by ordinary computer CPU, and it can automatically "solve problems" by downloading software. But with the rise of currency price, more and more people want to "solve the problem", and the difficulty of mining is also increasing. Now, the amount of computation needed to dig a bitcoin is beyond the reach of ordinary people. Ordinary computers can't afford it
instry insiders said that in 2014, 100 bitcoins were generated from 500000 yuan of electricity charge per day, and the cost of electricity charge alone was 5000 yuan per coin. But now, the same cost has more than doubled, and the electricity cost of each bitcoin is as high as 10000 yuan
in the generation mechanism of bitcoin, mining reward is decreasing. At the beginning of the birth of bitcoin, the miners could get 50 bitcoins for each page of the ledger, and then 25 bitcoins for each page of the ledger, decreasing in turn. It's like digging gold. At first, it's more and less. The time point at which each new reward is reced by half is called half bitcoin proction
assuming that the mining computing power is 100 mhash / s, the total computing power is 4000 ghash / s per day in 2014, and 3600 bitcoins are g out every 24 hours
now, we can understand the difficulty of bitcoin digging in this way, which is equivalent to 100 million dice throwing numbers less than 100 million and 50 million. Whoever throws them first will get the bookkeeping right. At this point, 1050 million is a hash value. The process of throwing dice is called hash collision. The unit of mining power is the number of hash collisions per second
at present, the computing power of bitcoin in the whole network has reached 2.36 billion hash collisions per second, which is equivalent to the number of water droplets in more than 200000 50 meter long standard swimming pools. But even with such a large amount of computing power, it will take about 10 minutes to hit a hash value that meets the requirements
in 2012, bitcoin's output was halved for the first time, and in July 2016, bitcoin's output was halved for the second time. At present, 12.5 bitcoins are awarded for recording one page of account book. The next halving will take place around 2020, and the total number of bitcoins will not increase by 2040, with a total of 21 million
Related videos: how long does it take to dig a bitcoin
there are basically two kinds of attacks, one is dictionary attack, the other is brute force attack
dictionary attack is to use common passwords and their simple variants as keys one by one. As long as your pass phrase is not hard enough, the possibility of successful attack is very high. So if you want to use this, you need to popularize the knowledge of cryptography first, and don't think it's very safe to add a long password
if you don't use the wallet generated by pass phrase, you can only crack it violently, which is equivalent to enumerating all the possible keys. At present, this is impossible, even if the electronic computer is becoming more and more powerful. However, quantum computer can do it theoretically, but don't worry too much. If such a powerful quantum computer comes out, it will not only endanger bitcoin
at the same time, bitcoin has a second layer of protection: if an address only accepts bitcoin but does not output it, its public key is confidential, that is to say, no one else can see the box, only the box number. At present, the process of decing the box from the box number can't even be done by quantum computer. In other words, if there is a quantum computer, bitcoin has a last line of Defense: it's temporarily safe to transfer your money to a new address
finally, some time ago, the wallet generated by the Android client was attacked because of a bug in the underlying random number generator. In fact, this function is not random securerandom, which Google quickly admitted and fixed. It's hard to say whether this kind of thing will happen again, but I don't think we need to worry too much.
warm tips: 1. The above contents are for reference only, without any suggestions. The relevant procts are issued and managed by the corresponding platform or company, and our bank does not undertake the responsibilities of investment, cashing and risk management of the procts. 2. There are risks in entering the market, so investment should be cautious. Before making any investment, you should make sure that you fully understand the nature of the investment and the risks involved in the proct. After a detailed understanding and careful evaluation of the proct, you can judge whether to participate in the transaction
response time: February 5, 2021. Please refer to the official website of Ping An Bank for the latest business changes
[Ping An Bank I know] want to know more? Come and see "Ping An Bank I know" ~
https://b.pingan.com.cn/paim/iknow/index.html
1. Install the latest security patch for the computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible at the website of https://technet.microsoft.com/zh-cn/library/security/ms17-010; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immune tool" to detect whether there are loopholes in the system, and close the ports affected by the loopholes, so as to avoid being infringed by blackmail software and other viruses. Download address: http://dl.360safe.com/nsa/nsatool.exe
2. Close ports 445, 135, 137, 138 and 139, and close network sharing
3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
5. It is recommended that users who are still using Windows XP or windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.