Position: Home page » Blockchain » The difference between blockchain and full return

The difference between blockchain and full return

Publish: 2021-05-25 17:44:04
1. In essence, blockchain is a decentralized ledger system, which has the characteristics of decentralization, openness, non tampering information and programmability. It can be used as the underlying storage and transmission protocol of value Internet. Blockchain is expected to lead us from personal trust and institutional trust to the era of machine trust. Consensus mechanism is the core of regional chain construction. digital currency is just the beginning. Blockchain can change more, reshape the world's trust system, and solve many problems of high trust cost in the past
there is a core difference between blockchain and Internet: the value of underlying protocols and upper applications of blockchain and Internet are completely reversed. It mainly comes from the two core features of blockchain:

the first feature is that zero knowledge proof changes the ownership of data. In other words, the user's personal data on the blockchain belongs to the user and does not need to be provided to the application and stored on the central server. Then the core support "data" behind the market value of Internet application layer services, such as bat, will lose its original value in the field of blockchain
another feature is the economic incentive model brought by token, which gives high value to the underlying protocol. In the Internet era, no one pays for HTTP protocol, no one pays for sending and receiving email, and no one pays for Google's search service.
2. The difference between code chain and blockchain:
blockchain originates from the underlying technology of bitcoin and is the blockchain technology of Internet. IP is connected by blockchain technology to form distributed accounting. It is not easy to tamper with and decentralize
code chain technology is the code chain technology of the Internet of things, which superimposes the Internet of things IDS one by one in a two-dimensional way to form personal records. The application of "code chain" technology will bring more efficient link forms of "people to people", "people to things" and "things to things"
Introction to code chain:
"code chain" refers to a "two-dimensional code chain" formed by using a smart phone to aim at the "two-dimensional code" and "scan", that is, to "generate a new two-dimensional code containing the scanner's DNA" and access to the "service". The whole process can be traced, supervised and managed
"code chain technology" is the most widely used two-dimensional code "scan" payment technology
code chain technology can realize more efficient link form of people to people, people to things and things to things
Introction to blockchain:
blockchain is an important concept of bitcoin. Blockchain is a series of data blocks generated by cryptography. Each data block contains the information of a bitcoin network transaction, which is used to verify the validity of the information (anti-counterfeiting) and generate the next block
in a narrow sense, blockchain is a kind of chain data structure that combines data blocks in chronological order in a sequential way, and it can not be tampered with and forged by cryptography
broadly speaking, blockchain technology is a new distributed infrastructure and computing paradigm, which uses blockchain data structure to verify and store data, uses distributed node consensus algorithm to generate and update data, uses cryptography to ensure the security of data transmission and access, and uses intelligent contract composed of automated script code to program and operate data
the difference between code chain digital currency and blockchain digital currency:
the difference between "code chain digital currency" based on code chain technology and the existing blockchain digital currency is that "code chain digital currency" is based on the control of property rights, and uses "intelligent two-dimensional code" as the medium to transform the contracts of various instry chains into divisible, tradable, transferable, exchangeable Traceable "smart contract" and real right exchange within the code chain alliance. In the code chain monetary system, "intelligent two-dimensional code" means "SGR". That is to say, each commodity corresponds to a "smart QR code", and this "QR code" represents the "special reference property" of the commodity. Through special reference to the exchange of property rights, the exchange of goods (barter) can be realized. This two-dimensional code, which represents "special mention of property rights", can be used as the carrier and payment means of digital currency at the same time, and payment can be completed through "two-dimensional code scanning".
3. To be exact, blockchain and traditional server cannot be compared together, because blockchain is a technical model, while server is a kind of hardware resource
but if we have to compare them, we can first see the differences or connections between the two characteristics
the traditional server is centralized
take a look at the figure below, it is a typical centralized network, the most central is the server, the others are clients, the server is responsible for providing services to all clients, and the client obtains services from the server, such as downloading files.
4. Blockchain is a concept. Blockchain technology is not only the technology to realize the concept of blockchain, but also the code. Bitcoin is based on the concept of blockchain and developed with blockchain technology.
5. Supply chain is an application of blockchain
core analysis:
1. Transparency, 2. Openness, 3. Information can not be tampered with, 4. Decentralization,
5. Detailed analysis
blockchain is a new application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies. The so-called consensus mechanism is a mathematical algorithm to establish trust and obtain interests between different nodes in the blockchain system
1. In a narrow sense, blockchain is a kind of chained data structure composed of data blocks connected in sequence according to the time sequence, and it can not be tampered with and forged by cryptography
2. Broadly speaking, blockchain technology uses blockchain data structure to verify and store data, uses distributed node consensus algorithm to generate and update data, and uses cryptography to ensure the security of data transmission and access It is a new distributed infrastructure and computing method to program and operate data by using intelligent contract composed of automated script code.
6. Blockchain
is not a single indivial, but many
blocky structures
are connected together to form a chain structure. Then the connection of each block will also form a specific whole or area. So there is no difference between blockchain and regional chain. For more details, please note the official account of
public number
"SMIC block chain service platform" for real-time understanding.
7.

Blockchain is a kind of computer technology, which does not have the nature of pyramid selling

blockchain is a new application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies

in a narrow sense, blockchain is a kind of chain data structure that combines data blocks in a sequential way according to the time sequence, and it can not be tampered with and forged by cryptography

broadly speaking, blockchain technology is a new distributed infrastructure and computing method, which uses blockchain data structure to verify and store data, uses distributed node consensus algorithm to generate and update data, uses cryptography to ensure the security of data transmission and access, and uses intelligent contracts composed of automated script code to program and operate data

To identify MLM, we need to see three characteristics:

1, entry fee

whether we need to subscribe for goods or pay fees to obtain the qualification to join or develop others' qualification to join, and seek illegal interests

2. Whether it is necessary to develop others to become their own downline, and pay the developed personnel according to the number of their direct or indirect rolling development, so as to seek illegal interests

3. Whether the remuneration is calculated based on the sales performance of the direct or indirect development personnel to seek illegal interests

if it meets the above characteristics, it may be suspected of pyramid selling

extended information:

Article 7 of the regulations on the prohibition of pyramid selling stipulates that the following acts are pyramid selling acts:

1. The organizers or operators, through the development personnel, require the development personnel to develop other personnel to join, To calculate and pay remuneration (including material rewards and other economic benefits, the same below) to the developing personnel based on the number of the personnel they have directly or indirectly developed in a rolling way, so as to seek illegal benefits

(2) the organizer or business operator, through the developer, requires the developed person to pay the fee or pay the fee in disguised form by way of subscribing for commodities, so as to obtain the qualification of joining or developing other persons to join and seek illegal interests

3. The organizer or operator, through the development personnel, requires other personnel developed by the development personnel to join in, forming the relationship between the upper and lower line, and calculates and pays the online remuneration based on the sales performance of the lower line, so as to seek illegal interests

8. 1、 Similarity

distributed
git ensures that each code warehouse maintains a complete project library locally, not just the branch in which it works and its own submission history. At the same time, it also keeps all the snapshot and index information after the latest pull

on the blockchain, each node keeps a complete database locally, not just its own transaction information

traceability
in Git commit chain, each commit object contains a parent object (the object of the last commit, except the first commit), which can trace all the previous records

on the blockchain, each block contains the index of the previous block (except the genesis block), which can trace all valid transactions before<

tamper proof
in Git's commit chain, each object itself calculates a checksum before storing, and then references it with a checksum. Once modified, the checksums will not be correct, which means that it is impossible to change the contents of any file or directory without git's knowledge< The mechanism used by git to calculate the checksums is called SHA-1 hash. This is a string composed of 40 hexadecimal characters (0-9 and A-F), which is calculated based on the content or directory structure of the file in GIT. SHA-1 hash looks like this:



in the blockchain, each block contains the last block ID, and this block ID has two SHA-256 hashes, which are calculated based on the block content. Once the content is modified, the hash will change, which is inconsistent with the chain of other nodes and cannot be added to the longest chain, so the content cannot be tampered with< 2. Difference

collective consensus and central node will: 1 - blockchain merges based on collective consensus (POW / POS) to form the longest chain, which is the main chain

2 - in Git system, when multi node cooperation is carried out through the warehouse hosting platform, it is the manager of the platform project who controls the power of merge, which reflects the will of the central node<

cryptography
1 - in bitcoin blockchain, cryptography mainly uses the following methods

in the whole system of bitcoin blockchain, a large number of public encryption algorithms are used, such as Merkle tree hash number algorithm, elliptic curve algorithm, hash algorithm, symmetric encryption algorithm and some coding algorithms. The functions of various algorithms in bitcoin blockchain are as follows:

A) hash algorithm

the two hash functions used in bitcoin system are: 1. SHA-256, which is mainly used to complete pow (proof of workload) calculation; 2. Ripemd160, mainly used to generate bitcoin address

b) Merkle hash tree

binary tree or multi tree based on hash value. In the computer field, Merkle tree is mostly used for integrity verification. In the distributed environment, integrity verification can greatly rece the complexity of data transmission and calculation<

C) elliptic curve algorithm

in bitcoin, the public key cryptography algorithm based on secp256k1 elliptic curve mathematics is used for signature and verification. On the one hand, it can ensure that the user's account is not replaced by an impostor, on the other hand, it can ensure that the user can not deny the signed transaction. The private key is used to sign the transaction information, and the user's public key is used to verify the signature. If the verification is passed, the transaction information will be recorded and the transaction will be completed

d) symmetric encryption algorithm

the official bitcoin client uses AES (symmetric block cipher algorithm) to encrypt the wallet file. After the user sets the password, the private key of the wallet is encrypted by the user set password through AES to ensure the security of the private key of the client

e) base58 encoding

base58 is a unique encoding method used in bitcoin. It is mainly used to generate the wallet address of bitcoin, which is similar to the permutation algorithm mechanism in classical cryptography. Its purpose is to increase the readability of bitcoin and change the binary hash value into the address we see

2 - git: SSH key is mainly used for remote login verification, SHA-1 is used for code content checking sum<

SSH is the abbreviation of secure shell, developed by IETF's network working group. It is a protocol designed to provide security for remote login sessions and other network services. SSH protocol can effectively prevent information leakage in the process of remote management< The process of SSH transmission is as follows: (1) the remote host receives the user's login request and sends its public key to the user 2) The user uses the public key to encrypt the login password and send it back 3) The remote host uses its own private key to decrypt the login password. If the password is correct, the user is allowed to log in.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750