Position: Home page » Blockchain » WiFi network uses blockchain Technology

WiFi network uses blockchain Technology

Publish: 2021-03-23 14:42:06
1. Right click the wireless network you are connected to, select properties, and then select security item. You will see the security encryption key. Click the tick before the character is displayed.
2. To put it bluntly, it's wireless Internet. I advise you not to be limited to the current router, but to spread out. Every node is a router, which is interesting. The effect is that you can go out and connect with anyone. Everyone's mobile phone is a router, which can share with others point-to-point, multi-point and multi-point. Of course, you can also accept others' sharing, which makes it more multi hop and not easy to get stuck.
3.

blockchain (English: blockchain or block chain) is a kind of distributed database . You may have heard about bitcoin, which is the core technology. Blockchain is a series of data blocks generated by cryptography. Each data block contains the information of a network transaction, which is used to verify the validity of the information and generate the next block. In a popular concept, blockchain is an account that everyone can keep. In a company or organization, most people only have the right to keep accounts, while only a few people with professional training have the right to keep accounts. Of course, blockchain is not an account book in the traditional sense. It has the following three key points in technical principle: first, decentralization. In a network practicing blockchain technology, each computer covered by it can read and add records. From the perspective of account book, they are the people who keep accounts together, and there is no authoritative person to guide and correct them. Second, asymmetric encryption. Although everyone can remember this account, they will not be able to read it unless they are in the Bureau. Because, in the accounting process, everyone follows the unified encryption rules, but when reading, they must use their own unique decryption method. Therefore, although everyone keeps this constantly updated account, the part they can read is only the one they can decrypt, that is, the part related to themselves. Third, time stamp. That is, time stamp (English: timestamp), refers to the string or coded information used to identify the recorded time and date. Each block on the blockchain is arranged in sequence according to the time it is generated, and is confirmed by collective authentication. Moreover, previous records cannot be modified. Just like in an account, we can index and verify the previous content through the records after a point in time. Once these contents are confirmed, it will be more difficult to tamper with them

blockchain technology is to maintain a growing distributed database of data records. These data are associated with all the data written before through cryptography technology, which makes it difficult for the third party or even the owner of the node to tamper with. Block contains the data that need to be saved in the database, and these data are written into the database through block organization. Chain usually refers to the use of Merkle tree and other methods to check whether all the current blocks have been modified. This is familiar to code farmers who have used git for a long time. Recall how to modify git's history

blockchain technology is mainly divided into three categories, which are open, collaborative and private

public blockchain

example: bitcoin, Ethereum frontier. The data on the public blockchain can be accessed by all people, and all people can issue transactions waiting to be written into the blockchain. Participants in the consensus process (corresponding to the miners in bitcoin) maintain the security of the database through cryptography technology and built-in economic incentives. Open blockchain is completely distributed

highlights and pain points: the open blockchain is completely distributed and has all the characteristics of bitcoin. However, it needs sufficient cost to maintain the system operation and relies on built-in incentives. At present, only bitcoin in the public blockchain is safe enough. If the algorithm is the same as bitcoin, it will be safe; There are no built-in rewards, but they are not; It's easy to concentrate on the attack of computing power (for example, as long as the raid sweeps goods and a large number of graphics cards), and take jujube pills. The more valuable the data on the open blockchain is, the more important it is to examine its security, transaction cost and system scalability

federated blockchain

example: audit system tried by hyperledger and Deloitte. The nodes participating in the blockchain are selected in advance, and there is likely to be a good network connection between the nodes. Other consensus algorithms without workload proof can be used on such a blockchain. For example, a blockchain has been established among 100 financial institutions, and more than 67 institutions must agree to reach a consensus. The data on such a blockchain can be public or internal to these node participants. Distributed in a partial sense

highlights and pain points: collaborative blockchain can achieve a good connection between nodes, only need a little cost to maintain operation, provide rapid transaction processing and low transaction costs, has good scalability (but the scalability will decline with the increase of nodes), and data can have certain privacy. Developers have the ability to change the protocol under the consensus. There is no problem with bitcoin hard fork, but it also means that everyone can tamper with the data together under the consensus. Collaborative blockchain also means that the application scope of this blockchain will not be too wide, lacking the network propagation effect of bitcoin

private blockchain

example: Eris instries. The participating nodes are only users themselves, and the access and use of data have strict authority management. Most of the blockchain technologies recently announced by some financial institutions for internal use are vague, but they are probably all within this scope

highlights and pain points: private blockchain is actually a confusing term. Such a system is nothing more than a shared database in the traditional sense. Merkle tree and other methods are used to try to show that the data in it is verifiable. There are already mature solutions for such databases, and Merkle tree is only one of many mature solutions. It's easy for these projects to be "like eggs". Because the user has the final say, the data inside can not be changed, and there is not much protection for the third party. Therefore, many private blockchains exist by attaching to bitcoin, such as recording system snapshots to bitcoin regularly

4. Improving network security
blockchain is a decentralized and distributed electronic classified accounting method based on the model of providing absolute security and trust. Using encryption technology, transactions are recorded chronologically and publicly, and each block has a timestamp and a link to the previous block. Importantly, these digital "blocks" can only be updated through the consensus of all participants, and data interception, modification and deletion are almost impossible.
5. A protocol is a set of rules for managing a network. Blockchain protocol usually includes rules of consensus, transaction verification and network participation. Agreements often rely on economic incentives - which means they depend on an asset
generally, protocol level assets can also be used as local procts of the protocol (no platform required!) Bitcoin is a good example. Bitcoin (capital B) refers to the agreement. The agreement depends on the local asset: bitcoin (small b). This local asset is also used as the end proct: it's the user's means of payment, the store of value, and (to be honest) a degree of hype. Please note that bitcoin does not really provide a platform. It's not very friendly for developers trying to build new procts on it< On the other hand, Ethereum has three levels. It's an agreement that provides the basic rules. This is a platform that enables developers to build new procts on the system. Moreover, because its agreement contains a local asset, it also gets a built-in proct (in the form of ether)
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
6. Newifi "gold mine", the world's first intelligent routing project equipped with blockchain technology, was officially launched. It is the first blockchain project in the instry to make breakthroughs and innovations in router category. It aims to combine the current cutting-edge and decentralized blockchain technology to drive every ordinary person to become a sharer of network sharing ability, Explore the upward development of traditional routing hardware, and promote the application and popularization of idle bandwidth with environmental protection and sustainable benefits.
7. Blockchain service network is an Internet like blockchain infrastructure. It is the world's first blockchain service network based on blockchain technology and reflecting the second generation of intelligent Internet. It is also the largest alliance chain in the world. It provides high-level technical solutions for the development of smart city and digital economy in China Credible service carrier and infrastructure of modern social governance system
at present, the overall planning and top-level design of the blockchain service network have been completed, and the construction of more than 40 public city nodes in 31 provinces and autonomous regions has been completed. The blockchain service network will be tested internally for half a year. In the future, China UnionPay, together with the state information center, China Mobile and other partners, will actively promote security and function testing, technical architecture optimization, business operation scheme formulation, basic service capacity building, innovative application promotion and other work, and finally realize the commercial operation of the whole system
interested developers can view it on the official website of the blockchain service network.
8. Xiaomi WiFi chain is the second blockchain application after Xiaomi encryption rabbit. According to the description of the official website, Xiaomi WiFi chain aims to establish a wide range of WiFi chains, provide users with network value, measure the contribution of each chain node with blockchain technology, and provide "rice grain" returns.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750