1. blockchain is not deceiving, but deceiving people under the guise of blockchain. In fact, blockchain scam is to make use of people's ignorance of the technology, and then fraudsters rely on various and fancy means to set up scams. Many people only look at the surface when making investments, and finally fall into the trap of high profits
in the current society, more and more people are willing to take this risk to make investment in order to get rich returns, but not all of them can make profits. After all, where there are interests, there are many people waiting, and they will set traps for people to take the t
extended data:
precautions
blockchain is a technology. In short, this technology is a new way of data management based on cryptography. Blockchain technology has broad application prospects because it has the advantages of decentralization, non tampering, tracing and so on. And issuing currency is a kind of behavior derived from blockchain technology. At present, the vast majority of blockchain applications which mainly focus on currency issuance and speculation are suspected of illegal fund-raising
blockchain technology is still in early development, and it is difficult to apply it. If you only rely on a white paper to claim that there is an application, it is a deception in itself
2. Both indivials and enterprises can purchase alicloud servers and develop an app. However, real name authentication is required. Personal real name certification and enterprise real name certification, after passing the certification, you can easily choose cloud computing procts. Leave a message or see the content of the blog, Lao Wei has written many detailed articles, which can help you get started.
3. In a simple explanation, 51% attack is also called majority attack. It means that malicious miners control more than 50% of the hash rate of the blockchain network, and then attack the network and take over the blockchain network, so that criminals can reverse transactions, stop payment or prevent new transactions from being confirmed
for more information about 51% attacks, you can learn about them on the password finance network,
4. How to protect my
bitcoin after bifurcation
if bitcoin really forks, as an ordinary user, the biggest risk is replay attack
what is replay attack? If bitcoin is split into one or more bitcoins, such as btc1 / btc2 / btc3, each bitcoin account will have a corresponding number of all bifurcated coins according to its bitcoin balance
because the address, private key, algorithm, etc. on each chain are the same, and the transaction format is also the same, the transaction initiated on one blockchain can be broadcast on another blockchain and may be confirmed. This is the "replay attack."
in short, when you transfer btc1, your btc2 / btc3 may also be transferred at the same time
however, at present, many forked coins have done two-way anti replay attack processing to avoid the risk of replay attack after forking.
5. Heteromorphic attack, also known as address pool pollution, refers to the intrusion and pollution of nodes between similar blockchain systems. This is an attack that most public chains are likely to face. The opportunity of this attack is that many public chains have handshake protocols with similar chains, and then the system can not identify whether the node belongs to its own chain. The attacker can use this point to collect the address of the public chain and make a malicious handshake, contaminate the address pool through the node handshake, so that the nodes of different chains shake hands with each other and push the known nodes in their respective address pools to each other, causing more nodes to contaminate each other and eventually spread to the whole network. The communication performance of the node under heteromorphic attack will decline, and the node will be blocked, which will eventually lead to the abnormality of the main network. The security of blockchain system is not only provided by technology itself, but also provided by developers. The more careful the program logic designed by developers, the lower the possibility of being broken. Therefore, if you need to develop a system, you must find a reliable development company. Xuanling technology is a reliable blockchain development company. Their strength and experience in blockchain development are trustworthy. If you have any intention, you can consult their company.
6. The result of these two attacks is that the other party's system is out of service or crashed e to information overload. But DoS attack is a single server attack, while DDoS attack is distributed multiple servers attack, the success of the attack is higher. The application of blockchain technology should be more and more, so it is necessary to understand the knowledge of blockchain. It is recommended that you go to the official website of Xuanling technology. This website has many popular science and application posts of blockchain technology, which should be of great help to blockchain learning.
7. The focus of the dispute over blockchain is that some people want to myth blockchain and regard blockchain as a good medicine to solve all problems
blockchain is, by far, the best solution to decentralized trust. Based on this, blockchain has a broad application prospect. Chainnova is a blockchain company. I feel it's not bad
however, don't use blockchain as a panacea to solve all the current problems, such as relying on blockchain to solve ecation problems and medical problems. Those are bullshit. The core of ecation and medical problems is the lack of high-quality resources, which has nothing to do with trust.