Position: Home page » Blockchain » How to avoid the disadvantages of blockchain
How to avoid the disadvantages of blockchain
Publish: 2021-05-20 18:13:48
1. However, after the emergence of the computer and Internet, the status of paper is no longer unshakable
ten years ago, my article was written on a black notebook. Now, all the words in my mind are entered into notebook, becoming 0 and 1, which is the change
from the present point of view, the disadvantages of paper are too obvious:
not environmentally friendly
not easy to save
for paper, long-distance transmission is very troublesome (such as information transmission)
the cost is high
easy to modify and forge
when there is a better choice in front of me, if I don't use it, isn't it a loss for me
have you ever thought that one day we won't need paper for our money
you may say:
"yes, I use Alipay and online banking every day, and no paper is used. Is this not achieved?"
indeed, Alipay's payment system is to digitize paper currency and store it in a huge database, but after all, it still needs paper money. The central bank does not print banknotes. The figures in the bank database are not too outrageous. Do you say yes or no?
can we say that the amount of money in the bank account book is the amount of cash? Of course not, because of the existence of bank loans, credit cards and other procts, the number in the bank database will only be much larger than the amount of cash, and this account book is not open, and the specific data deviation is only known to a few people
is there any payment system that does not rely on paper money, has high transparency, and no one can tamper with it
not to mention, it's really possible. Why is it possible? It's just a relatively mature experiment (with a market value of US $5 billion). In 2007, Satoshi Nakamoto, an anonymous big God or organization, began to conceive a magic project. After more than a year of careful elaboration, Nakamoto completed the white paper of the project (bitcoin: a peer-to-peer electronic cash system, Chinese Name: bitcoin: a peer-to-peer electronic cash system), In early 2009, the project was successfully launched
for the explanation of the principle of the system, I don't want to be a teacher here. For those who are interested, please refer to the information of the college channel or library. It's a very good place for you to understand these things
we just need to know that this e-cash system has nothing to do with paper. It is very transparent. Everyone can access and query this payment account book, and everyone can really control their own bookkeeping rights, that is, bitcoin token. As long as the Internet exists, someone is maintaining this account book (using mining machine operation), Then this kind of payment system can exist forever
well, you say it so well, this kind of system should be very popular, right? Of course not, because it is still in the experimental stage, there are still many defects in this kind of account book. For example, its token value fluctuates greatly, which is not suitable for pricing goods for the time being. For example, it has the problem of scalability. Maybe 100000 people use this system every day, and 10 million people use it to block and collapse. For example, it needs a lot of learning costs, People who don't have relevant knowledge are easy to lose money and so on. In short, there are a lot of problems
can we solve so many problems? Theoretically, it's very possible, because it's open source. Open source means that everyone can review and participate in improvement
of course, it's not to deceive you into buying bitcoin. This is not the purpose of my writing. Talking about bitcoin is just to introce a kind of technology, or an idea. What is it? In other words, blockchain (Chinese name is blockchain) is too popular now. Maybe you don't feel much about it at home. In foreign financial circles, it's no exaggeration to say that this word is the same as Dabao's advertising words
nowadays, foreign companies talk about "blockchain has the potential to subvert xxoo", which is like a common occurrence. Every once in a while, some giant set up a blockchain laboratory, and even the chief economist of the Bank of England raised the possibility of issuing national digital currency based on blockchain
we can't help asking, what is the basis of blockchain? What magic is driving or "deceiving" these institutions to lose their position for such a rising concept
blockchain originated from bitcoin. At present, the most successful blockchain is also bitcoin's blockchain. The reason why blockchain makes people reverie is that it has the characteristics of high transparency, unchangeable and no middleman
suppose I brainstorm and apply these features of blockchain to various applications in other instries, will it proce disruptive effects? Well, it's like now you have a new drug, which can cure all kinds of diseases in theory. Does that mean it's really suitable for treatment? You have to try, because you don't know the side effects! Now the blockchain is in such a stage. It seems to be able to cure all kinds of instries, but in fact it is only in the theoretical stage
when it comes to theory, I have to talk about it
first of all, what is the biggest difference between paper ledger and blockchain ledger
the former accounts by people, while the latter accounts by computer. Because people are too "smart", so bookkeeping is easy to be unexpected, and the efficiency is also very low, but computers are different, computers are "stupid", it is to act according to instructions, and the efficiency will be very high, there is also scalability. Ordinary database is a proct between paper account book and blockchain account book. It can save the system's partial dependence on human beings, but there are also problems in ordinary database. For example, it has access rights, such as the pension you pay. Can you know where they are going
therefore, companies, institutions or indivials with some ideas have gone to study blockchain technology.
ten years ago, my article was written on a black notebook. Now, all the words in my mind are entered into notebook, becoming 0 and 1, which is the change
from the present point of view, the disadvantages of paper are too obvious:
not environmentally friendly
not easy to save
for paper, long-distance transmission is very troublesome (such as information transmission)
the cost is high
easy to modify and forge
when there is a better choice in front of me, if I don't use it, isn't it a loss for me
have you ever thought that one day we won't need paper for our money
you may say:
"yes, I use Alipay and online banking every day, and no paper is used. Is this not achieved?"
indeed, Alipay's payment system is to digitize paper currency and store it in a huge database, but after all, it still needs paper money. The central bank does not print banknotes. The figures in the bank database are not too outrageous. Do you say yes or no?
can we say that the amount of money in the bank account book is the amount of cash? Of course not, because of the existence of bank loans, credit cards and other procts, the number in the bank database will only be much larger than the amount of cash, and this account book is not open, and the specific data deviation is only known to a few people
is there any payment system that does not rely on paper money, has high transparency, and no one can tamper with it
not to mention, it's really possible. Why is it possible? It's just a relatively mature experiment (with a market value of US $5 billion). In 2007, Satoshi Nakamoto, an anonymous big God or organization, began to conceive a magic project. After more than a year of careful elaboration, Nakamoto completed the white paper of the project (bitcoin: a peer-to-peer electronic cash system, Chinese Name: bitcoin: a peer-to-peer electronic cash system), In early 2009, the project was successfully launched
for the explanation of the principle of the system, I don't want to be a teacher here. For those who are interested, please refer to the information of the college channel or library. It's a very good place for you to understand these things
we just need to know that this e-cash system has nothing to do with paper. It is very transparent. Everyone can access and query this payment account book, and everyone can really control their own bookkeeping rights, that is, bitcoin token. As long as the Internet exists, someone is maintaining this account book (using mining machine operation), Then this kind of payment system can exist forever
well, you say it so well, this kind of system should be very popular, right? Of course not, because it is still in the experimental stage, there are still many defects in this kind of account book. For example, its token value fluctuates greatly, which is not suitable for pricing goods for the time being. For example, it has the problem of scalability. Maybe 100000 people use this system every day, and 10 million people use it to block and collapse. For example, it needs a lot of learning costs, People who don't have relevant knowledge are easy to lose money and so on. In short, there are a lot of problems
can we solve so many problems? Theoretically, it's very possible, because it's open source. Open source means that everyone can review and participate in improvement
of course, it's not to deceive you into buying bitcoin. This is not the purpose of my writing. Talking about bitcoin is just to introce a kind of technology, or an idea. What is it? In other words, blockchain (Chinese name is blockchain) is too popular now. Maybe you don't feel much about it at home. In foreign financial circles, it's no exaggeration to say that this word is the same as Dabao's advertising words
nowadays, foreign companies talk about "blockchain has the potential to subvert xxoo", which is like a common occurrence. Every once in a while, some giant set up a blockchain laboratory, and even the chief economist of the Bank of England raised the possibility of issuing national digital currency based on blockchain
we can't help asking, what is the basis of blockchain? What magic is driving or "deceiving" these institutions to lose their position for such a rising concept
blockchain originated from bitcoin. At present, the most successful blockchain is also bitcoin's blockchain. The reason why blockchain makes people reverie is that it has the characteristics of high transparency, unchangeable and no middleman
suppose I brainstorm and apply these features of blockchain to various applications in other instries, will it proce disruptive effects? Well, it's like now you have a new drug, which can cure all kinds of diseases in theory. Does that mean it's really suitable for treatment? You have to try, because you don't know the side effects! Now the blockchain is in such a stage. It seems to be able to cure all kinds of instries, but in fact it is only in the theoretical stage
when it comes to theory, I have to talk about it
first of all, what is the biggest difference between paper ledger and blockchain ledger
the former accounts by people, while the latter accounts by computer. Because people are too "smart", so bookkeeping is easy to be unexpected, and the efficiency is also very low, but computers are different, computers are "stupid", it is to act according to instructions, and the efficiency will be very high, there is also scalability. Ordinary database is a proct between paper account book and blockchain account book. It can save the system's partial dependence on human beings, but there are also problems in ordinary database. For example, it has access rights, such as the pension you pay. Can you know where they are going
therefore, companies, institutions or indivials with some ideas have gone to study blockchain technology.
2. Blockchain itself solves the problem of large-scale cooperation between strangers, that is, strangers can cooperate with each other without mutual trust. So how to ensure the trust between strangers to achieve mutual consensus mechanism? The centralized system uses trusted third-party endorsements, such as banks. In the eyes of the common people, banks are reliable and trustworthy institutions. The common people can trust banks to solve real disputes. But how does a decentralized blockchain guarantee trust
in fact, blockchain uses the basic principles of modern cryptography to ensure its security mechanism. The knowledge system involved in the field of cryptography and security is very complicated. Here, I only introce the basic knowledge of cryptography related to blockchain, including hash algorithm, encryption algorithm, information digest and digital signature, zero knowledge proof, quantum cryptography, etc. Through this lesson, you can learn how to ensure the confidentiality, integrity, authentication and non repudiation of the blockchain using cryptography technology
basic course lesson 7 basic knowledge of blockchain security
1. Hash algorithm (hash algorithm)
hash function (hash), also known as hash function. Hash function: hash (original information) = summary information. Hash function can map any length of binary plaintext string to a shorter (generally fixed length) binary string (hash value)
a good hash algorithm has the following four characteristics:
1. One to one correspondence: the same plaintext input and hash algorithm can always get the same summary information output
2. Input sensitivity: even if the plaintext input changes slightly, the newly generated summary information will change greatly, which is greatly different from the original output
3. Easy to verify: plaintext input and hash algorithm are public, anyone can calculate by themselves, and whether the output hash value is correct
4. Irreversibility: if there is only the output hash value, the hash algorithm can never dece the plaintext
5. Conflict avoidance: it is difficult to find two plaintexts with different contents, but their hash values are the same (collision)
for example:
hash (Zhang San lent Li Si 100000 yuan for 6 months) = 123456789012
such a record as 123456789012 is recorded in the account book
it can be seen that hash function has four functions:
simplify information
it is easy to understand, and the information after hashing becomes shorter
identification information
you can use 123456789012 to identify the original information, and summary information is also called the ID of the original information
hidden information
the account book is a record like 123456789012, and the original information is hidden
verification information
if Li Si cheated that Zhang San only lent Li Si 50000 when repaying, both parties can verify the original information with the hash value of 123456789012 recorded before
hash (Zhang San lent Li Si 50000 for 6 months) = 987654321098
987654321098 is completely different from 123456789012, which proves that Li Si lied, Then the information can't be tampered
common hash algorithms include MD4, MD5 and Sha series algorithms, and Sha series algorithms are basically used in mainstream fields. Sha (secure hash algorithm) is not an algorithm, but a group of hash algorithms. At first, it was SHA-1 series, and now the mainstream applications are sha-224, SHA-256, sha-384 and sha-512 algorithms (commonly known as SHA-2). Recently, Sha-3 related algorithms have been proposed, such as keccak-256 used by Ethereum
MD5 is a very classic hash algorithm, but unfortunately, both it and SHA-1 algorithm have been cracked. It is considered by the instry that its security is not enough to be used in business scenarios. Generally, sha2-256 or more secure algorithm is recommended
hash algorithm is widely used in blockchain. For example, in blocks, the latter block will contain the hash value of the previous block, and the content of the later block + the hash value of the previous block will jointly calculate the hash value of the later block, which ensures the continuity and non tamperability of the chain< Encryption and decryption algorithm is the core technology of cryptography, which can be divided into two basic types: symmetric encryption algorithm and asymmetric encryption algorithm. According to whether the key used in the encryption and decryption process is the same or not, the two modes are suitable for different needs, just forming a complementary relationship, and sometimes can be combined to form a hybrid encryption mechanism
symmetric cryptography (also known as common key cryptography) has the advantages of high computational efficiency and high encryption strength; Its disadvantage is that it needs to share the key in advance, which is easy to leak and lose the key. The common algorithms are des, 3DES, AES and so on
asymmetric cryptography (also known as public key cryptography) is different from the encryption and decryption key, and its advantage is that it does not need to share the key in advance; Its disadvantage is that it has low computational efficiency and can only encrypt short content. Common algorithms include RSA, SM2, ElGamal and elliptic curve series. Symmetric encryption algorithm is suitable for the encryption and decryption process of a large number of data; It can't be used in signature scenario: and it often needs to distribute the key in advance. Asymmetric encryption algorithm is generally suitable for signature scenario or key agreement, but it is not suitable for large amount of data encryption and decryption< Third, information digest and digital signature
as the name suggests, information digest is to hash the information content to obtain a unique digest value to replace the original and complete information content. Information digest is the most important use of hash algorithm. Using the anti-collision feature of hash function, information digest can solve the problem that the content has not been tampered
digital signature is similar to signing on paper contract to confirm contract content and prove identity. Digital signature is based on asymmetric encryption, which can be used to prove the integrity of a digital content and confirm the source (or non repudiation)
we have two requirements for digital signature to make it consistent with our expectation for handwritten signature. First, only you can make your own signature, but anyone who sees it can verify its validity; Second, we want the signature to be only related to a specific file and not support other files. These can be achieved by our asymmetric encryption algorithm above
in practice, we usually sign the hash value of information instead of the information itself, which is determined by the efficiency of asymmetric encryption algorithm. Corresponding to the blockchain, it is to sign the hash pointer. In this way, the front is the whole structure, not just the hash pointer itself< Zero knowledge proof means that the verifier can make the verifier believe that a certain conclusion is correct without providing any additional information to the verifier
zero knowledge proof generally meets three conditions:
1. Completeness: authentic proof can make the verifier successfully verify
2. Soundness: false proof can not make the verifier pass the verification
3. Zero knowledge: if you get proof, you can't get any information other than the proof information from the proof process< With more and more attention paid to the research of quantum computing and quantum communication, quantum cryptography will have a huge impact on the information security of cryptography in the future
the core principle of quantum computing is that qubits can be in multiple coherent superposition states at the same time. Theoretically, a large amount of information can be expressed by a small number of qubits and processed at the same time, which greatly improves the computing speed
in this way, a large number of current encryption algorithms are theoretically unreliable and can be cracked, so the encryption algorithm has to be upgraded, otherwise it will be broken by quantum computing
as we all know, quantum computing is still in the theoretical stage, which is far from large-scale commercial use. However, the new generation of encryption algorithms should consider the possibility of this situation.
in fact, blockchain uses the basic principles of modern cryptography to ensure its security mechanism. The knowledge system involved in the field of cryptography and security is very complicated. Here, I only introce the basic knowledge of cryptography related to blockchain, including hash algorithm, encryption algorithm, information digest and digital signature, zero knowledge proof, quantum cryptography, etc. Through this lesson, you can learn how to ensure the confidentiality, integrity, authentication and non repudiation of the blockchain using cryptography technology
basic course lesson 7 basic knowledge of blockchain security
1. Hash algorithm (hash algorithm)
hash function (hash), also known as hash function. Hash function: hash (original information) = summary information. Hash function can map any length of binary plaintext string to a shorter (generally fixed length) binary string (hash value)
a good hash algorithm has the following four characteristics:
1. One to one correspondence: the same plaintext input and hash algorithm can always get the same summary information output
2. Input sensitivity: even if the plaintext input changes slightly, the newly generated summary information will change greatly, which is greatly different from the original output
3. Easy to verify: plaintext input and hash algorithm are public, anyone can calculate by themselves, and whether the output hash value is correct
4. Irreversibility: if there is only the output hash value, the hash algorithm can never dece the plaintext
5. Conflict avoidance: it is difficult to find two plaintexts with different contents, but their hash values are the same (collision)
for example:
hash (Zhang San lent Li Si 100000 yuan for 6 months) = 123456789012
such a record as 123456789012 is recorded in the account book
it can be seen that hash function has four functions:
simplify information
it is easy to understand, and the information after hashing becomes shorter
identification information
you can use 123456789012 to identify the original information, and summary information is also called the ID of the original information
hidden information
the account book is a record like 123456789012, and the original information is hidden
verification information
if Li Si cheated that Zhang San only lent Li Si 50000 when repaying, both parties can verify the original information with the hash value of 123456789012 recorded before
hash (Zhang San lent Li Si 50000 for 6 months) = 987654321098
987654321098 is completely different from 123456789012, which proves that Li Si lied, Then the information can't be tampered
common hash algorithms include MD4, MD5 and Sha series algorithms, and Sha series algorithms are basically used in mainstream fields. Sha (secure hash algorithm) is not an algorithm, but a group of hash algorithms. At first, it was SHA-1 series, and now the mainstream applications are sha-224, SHA-256, sha-384 and sha-512 algorithms (commonly known as SHA-2). Recently, Sha-3 related algorithms have been proposed, such as keccak-256 used by Ethereum
MD5 is a very classic hash algorithm, but unfortunately, both it and SHA-1 algorithm have been cracked. It is considered by the instry that its security is not enough to be used in business scenarios. Generally, sha2-256 or more secure algorithm is recommended
hash algorithm is widely used in blockchain. For example, in blocks, the latter block will contain the hash value of the previous block, and the content of the later block + the hash value of the previous block will jointly calculate the hash value of the later block, which ensures the continuity and non tamperability of the chain< Encryption and decryption algorithm is the core technology of cryptography, which can be divided into two basic types: symmetric encryption algorithm and asymmetric encryption algorithm. According to whether the key used in the encryption and decryption process is the same or not, the two modes are suitable for different needs, just forming a complementary relationship, and sometimes can be combined to form a hybrid encryption mechanism
symmetric cryptography (also known as common key cryptography) has the advantages of high computational efficiency and high encryption strength; Its disadvantage is that it needs to share the key in advance, which is easy to leak and lose the key. The common algorithms are des, 3DES, AES and so on
asymmetric cryptography (also known as public key cryptography) is different from the encryption and decryption key, and its advantage is that it does not need to share the key in advance; Its disadvantage is that it has low computational efficiency and can only encrypt short content. Common algorithms include RSA, SM2, ElGamal and elliptic curve series. Symmetric encryption algorithm is suitable for the encryption and decryption process of a large number of data; It can't be used in signature scenario: and it often needs to distribute the key in advance. Asymmetric encryption algorithm is generally suitable for signature scenario or key agreement, but it is not suitable for large amount of data encryption and decryption< Third, information digest and digital signature
as the name suggests, information digest is to hash the information content to obtain a unique digest value to replace the original and complete information content. Information digest is the most important use of hash algorithm. Using the anti-collision feature of hash function, information digest can solve the problem that the content has not been tampered
digital signature is similar to signing on paper contract to confirm contract content and prove identity. Digital signature is based on asymmetric encryption, which can be used to prove the integrity of a digital content and confirm the source (or non repudiation)
we have two requirements for digital signature to make it consistent with our expectation for handwritten signature. First, only you can make your own signature, but anyone who sees it can verify its validity; Second, we want the signature to be only related to a specific file and not support other files. These can be achieved by our asymmetric encryption algorithm above
in practice, we usually sign the hash value of information instead of the information itself, which is determined by the efficiency of asymmetric encryption algorithm. Corresponding to the blockchain, it is to sign the hash pointer. In this way, the front is the whole structure, not just the hash pointer itself< Zero knowledge proof means that the verifier can make the verifier believe that a certain conclusion is correct without providing any additional information to the verifier
zero knowledge proof generally meets three conditions:
1. Completeness: authentic proof can make the verifier successfully verify
2. Soundness: false proof can not make the verifier pass the verification
3. Zero knowledge: if you get proof, you can't get any information other than the proof information from the proof process< With more and more attention paid to the research of quantum computing and quantum communication, quantum cryptography will have a huge impact on the information security of cryptography in the future
the core principle of quantum computing is that qubits can be in multiple coherent superposition states at the same time. Theoretically, a large amount of information can be expressed by a small number of qubits and processed at the same time, which greatly improves the computing speed
in this way, a large number of current encryption algorithms are theoretically unreliable and can be cracked, so the encryption algorithm has to be upgraded, otherwise it will be broken by quantum computing
as we all know, quantum computing is still in the theoretical stage, which is far from large-scale commercial use. However, the new generation of encryption algorithms should consider the possibility of this situation.
3. At present, there are still many problems in the practical application of blockchain technology, such as low performance, less transaction frequency per unit time, lack of technology application ecological environment, lack of relevant application cases and fraud in the name of blockchain.
4. At present, there are four main types of consensus mechanisms: pow, POS, dpos, pool
1. POW workload proof, which is familiar with mining, calculates a random number that meets the rules through and or operation, that is, obtains the bookkeeping right, sends out the data that needs to be recorded in this round, and stores it together with other nodes in the whole network after verification
advantages: complete decentralization, free access of nodes
disadvantages: bitcoin has attracted most of the computing power in the world, and other blockchain applications using POW consensus mechanism are difficult to obtain the same computing power to ensure their own security; Mining causes a lot of waste of resources; The period of reaching consensus is long, which is not suitable for commercial application.
2. Proof of rights and interests of POS, a mechanism of upgrading consensus of pow; According to the token proportion and time of each node; It can rece the difficulty of mining in equal proportion, so as to speed up the speed of finding random numbers< Advantages: to a certain extent, it shortens the time to reach a consensus
disadvantages: mining is still needed, which does not solve the pain point of commercial application in essence
3. Dpos share authorization certification mechanism is similar to the voting of the board of directors, in which the coin holders cast a certain number of nodes to verify and account on their behalf
advantages: greatly rece the number of participating verification and accounting nodes, which can achieve second level consensus verification
disadvantages: the whole consensus mechanism still depends on token, and many commercial applications do not need token to exist
4. Pool verification pool, which is based on traditional distributed consistency technology and data verification mechanism; It is a consensus mechanism widely used in the instry chain at present.
advantages: it can work without token, and realizes second level consensus verification on the basis of mature distributed consistency algorithms (pasox and raft)
disadvantages: the degree of decentralization is not as good as that of bictin; The multi center business model is more suitable for multi-party participation
it has great advantages in using consensus mechanism to ensure data consistency (the consensus mechanism is first proposed by ripple, and the network transaction synchronization mechanism with data correctness priority. In the consensus network, no matter how the software code changes, if you can't reach a consensus, you can't enter the network, let alone fork)
- - - - - - - -
PS: a little black, although the consensus mechanism can absolutely ensure that there will be no hard bifurcation at any time. However, the disadvantage of this mechanism is obvious, that is, it is much longer than the current bitcoin network to reach a consensus with other nodes. In extreme cases, the consequences of disconnection in ripple consensus mechanism network are also very terrible
it is possible that one day after the power failure in your home, the whole system will no longer be able to reach a consensus with other rippled nodes (in fact, the consensus mechanism requires more than 80% of the nodes to acknowledge your data before your submission will be accepted by other nodes, otherwise it will be rejected by exclusive nodes), Even you can only empty all your 500 GB data and resynchronize to connect to other ripple nodes
so at present, the existing rippled end is not suitable for civil use (if it is commercial, the impact is relatively small. For example, RL's own rippled node is hosted in Amazon cloud data center. If it has no response for a long time, it can make high claims, and there is almost no break in that place except for large disasters). This is one of the aspects RL has always wanted to improve.
1. POW workload proof, which is familiar with mining, calculates a random number that meets the rules through and or operation, that is, obtains the bookkeeping right, sends out the data that needs to be recorded in this round, and stores it together with other nodes in the whole network after verification
advantages: complete decentralization, free access of nodes
disadvantages: bitcoin has attracted most of the computing power in the world, and other blockchain applications using POW consensus mechanism are difficult to obtain the same computing power to ensure their own security; Mining causes a lot of waste of resources; The period of reaching consensus is long, which is not suitable for commercial application.
2. Proof of rights and interests of POS, a mechanism of upgrading consensus of pow; According to the token proportion and time of each node; It can rece the difficulty of mining in equal proportion, so as to speed up the speed of finding random numbers< Advantages: to a certain extent, it shortens the time to reach a consensus
disadvantages: mining is still needed, which does not solve the pain point of commercial application in essence
3. Dpos share authorization certification mechanism is similar to the voting of the board of directors, in which the coin holders cast a certain number of nodes to verify and account on their behalf
advantages: greatly rece the number of participating verification and accounting nodes, which can achieve second level consensus verification
disadvantages: the whole consensus mechanism still depends on token, and many commercial applications do not need token to exist
4. Pool verification pool, which is based on traditional distributed consistency technology and data verification mechanism; It is a consensus mechanism widely used in the instry chain at present.
advantages: it can work without token, and realizes second level consensus verification on the basis of mature distributed consistency algorithms (pasox and raft)
disadvantages: the degree of decentralization is not as good as that of bictin; The multi center business model is more suitable for multi-party participation
it has great advantages in using consensus mechanism to ensure data consistency (the consensus mechanism is first proposed by ripple, and the network transaction synchronization mechanism with data correctness priority. In the consensus network, no matter how the software code changes, if you can't reach a consensus, you can't enter the network, let alone fork)
- - - - - - - -
PS: a little black, although the consensus mechanism can absolutely ensure that there will be no hard bifurcation at any time. However, the disadvantage of this mechanism is obvious, that is, it is much longer than the current bitcoin network to reach a consensus with other nodes. In extreme cases, the consequences of disconnection in ripple consensus mechanism network are also very terrible
it is possible that one day after the power failure in your home, the whole system will no longer be able to reach a consensus with other rippled nodes (in fact, the consensus mechanism requires more than 80% of the nodes to acknowledge your data before your submission will be accepted by other nodes, otherwise it will be rejected by exclusive nodes), Even you can only empty all your 500 GB data and resynchronize to connect to other ripple nodes
so at present, the existing rippled end is not suitable for civil use (if it is commercial, the impact is relatively small. For example, RL's own rippled node is hosted in Amazon cloud data center. If it has no response for a long time, it can make high claims, and there is almost no break in that place except for large disasters). This is one of the aspects RL has always wanted to improve.
5. 1、 Decentralization:
blockchain technology does not rely on additional third-party management institutions or hardware facilities, and there is no central control. In addition to the self-contained blockchain itself, each node realizes information self verification, transmission and management through distributed accounting and storage. Decentralization is the most prominent and essential feature of blockchain< Second, openness:
the foundation of blockchain technology is open source. In addition to the private information of all parties to the transaction is encrypted, the data of blockchain is open to all. Anyone can query blockchain data and develop related applications through the open interface, so the information of the whole system is highly transparent< Third, independence:
based on consensus specifications and Protocols (similar to various mathematical algorithms such as hash algorithm used by bitcoin), the whole blockchain system does not rely on other third parties, and all nodes can automatically and safely verify and exchange data in the system without any human intervention< Fourth, security:
as long as 51% of all data nodes cannot be controlled, the network data cannot be arbitrarily controlled and modified, which makes the blockchain itself relatively safe and avoids subjective and artificial data changes
5. Anonymity:
unless there are legal requirements, technically speaking, the identity information of each block node does not need to be disclosed or verified, and information transmission can be carried out anonymously
Digital China is the first major development strategy explicitly put forward in the report of the 19th National Congress of the Communist Party of China. The application of digital technology represented by cloud computing, big data and mobile Internet is no longer limited to the economic field, but widely penetrated into all aspects of public services, social development and people's life, which requires macro coordination, overall control and integrated development
with the deepening of a new round of scientific and technological revolution and instrial change, the tide of digital economy in the world is unstoppable. The development of digital economy has become a global consensus, known as the key to the fourth instrial revolution
adhering to the connotation of the University of nice's world inclusive humanistic spirit, always embracing change, standing up to the tide, conforming to the development trend of the digital economy era, and integrating the essence of Chinese and Western cultural thinking, the University of nice's doctor of blockchain and digital economy management (DDE) came into being
based on this, we can enable the managers of digital economy instry to have global vision and global integration thinking, integrate knowledge, operate digital economy intelligently, promote the sustainable development of the instry, and contribute to the community of human destiny. Therefore, DDE project will cooperate with colleagues in the field of digital economy
if you have MBA related questions, you are welcome to contact me personally 180; 65381; 7447; 65381;` ) Bixin~~~~
blockchain technology does not rely on additional third-party management institutions or hardware facilities, and there is no central control. In addition to the self-contained blockchain itself, each node realizes information self verification, transmission and management through distributed accounting and storage. Decentralization is the most prominent and essential feature of blockchain< Second, openness:
the foundation of blockchain technology is open source. In addition to the private information of all parties to the transaction is encrypted, the data of blockchain is open to all. Anyone can query blockchain data and develop related applications through the open interface, so the information of the whole system is highly transparent< Third, independence:
based on consensus specifications and Protocols (similar to various mathematical algorithms such as hash algorithm used by bitcoin), the whole blockchain system does not rely on other third parties, and all nodes can automatically and safely verify and exchange data in the system without any human intervention< Fourth, security:
as long as 51% of all data nodes cannot be controlled, the network data cannot be arbitrarily controlled and modified, which makes the blockchain itself relatively safe and avoids subjective and artificial data changes
5. Anonymity:
unless there are legal requirements, technically speaking, the identity information of each block node does not need to be disclosed or verified, and information transmission can be carried out anonymously
Digital China is the first major development strategy explicitly put forward in the report of the 19th National Congress of the Communist Party of China. The application of digital technology represented by cloud computing, big data and mobile Internet is no longer limited to the economic field, but widely penetrated into all aspects of public services, social development and people's life, which requires macro coordination, overall control and integrated development
with the deepening of a new round of scientific and technological revolution and instrial change, the tide of digital economy in the world is unstoppable. The development of digital economy has become a global consensus, known as the key to the fourth instrial revolution
adhering to the connotation of the University of nice's world inclusive humanistic spirit, always embracing change, standing up to the tide, conforming to the development trend of the digital economy era, and integrating the essence of Chinese and Western cultural thinking, the University of nice's doctor of blockchain and digital economy management (DDE) came into being
based on this, we can enable the managers of digital economy instry to have global vision and global integration thinking, integrate knowledge, operate digital economy intelligently, promote the sustainable development of the instry, and contribute to the community of human destiny. Therefore, DDE project will cooperate with colleagues in the field of digital economy
if you have MBA related questions, you are welcome to contact me personally 180; 65381; 7447; 65381;` ) Bixin~~~~
6. QQ currency is a virtual currency issued by Tencent. The official issue price of Tencent is: 1q currency = 1 yuan. However, if the amount of recharge is large, there will be different discounts in different recharge platforms
if you want to exchange Q currency for RMB, it's a bit complicated. Because Tencent does not support q-coin exchange at present, it is now doing q-coin recovery and exchange on some third-party platforms. Therefore, there will be a certain discount. Therefore, in the recovery of Q currency, 1q currency can not be converted into 1 yuan RMB.
if you want to exchange Q currency for RMB, it's a bit complicated. Because Tencent does not support q-coin exchange at present, it is now doing q-coin recovery and exchange on some third-party platforms. Therefore, there will be a certain discount. Therefore, in the recovery of Q currency, 1q currency can not be converted into 1 yuan RMB.
7. The distributed architecture and tamper proof features of blockchain technology help to solve the problems of bill authenticity and information opacity. When participants need to check whether the bill has been tampered or transferred, blockchain can provide indisputable proof of consistency
digital currency also makes use of this feature of blockchain. Puyin is a kind of tea standard digital currency developed based on blockchain technology.
digital currency also makes use of this feature of blockchain. Puyin is a kind of tea standard digital currency developed based on blockchain technology.
8. Computing power is a measure of the total computing power of generating new fast units under certain network consumption. If the computing power of the blockchain is insufficient, it is suggested to take a look at the tenth power computing power platform, which provides computing power leasing services.
9. There are two main problems
the first is that blockchain generally establishes a decentralized security maintenance mechanism through incentive system, but there is a disadvantage that the general incentive system will issue money, which is not supported in China
the second is the technical bottleneck, and the TPS of blockchain is generally not high, which can not support the landing of a large number of applications
the first is that blockchain generally establishes a decentralized security maintenance mechanism through incentive system, but there is a disadvantage that the general incentive system will issue money, which is not supported in China
the second is the technical bottleneck, and the TPS of blockchain is generally not high, which can not support the landing of a large number of applications
Hot content