Comparison of decentralization and centralization
with the deepening of the interaction between subject and object, the continuous balance of cognitive function and the continuous improvement of cognitive structure, the indivial can be released from the egocentric state, which is called decentralization.
the first step is to register (open an account) and set the password. The second step is user authentication (KYC). The third step is to recharge. Here comes the key. The third step is the most important. Because you need to charge money to your address in the exchange before you can trade money in the exchange. The address of the exchange is actually a wallet address, but the ownership of the wallet is not the user, but the exchange, that is to say, the private key of the address, you don't have it!!! Do you understand the meaning
well, after recharging, the transaction is finished. The user submits the instruction (hanging order) to the server, and then the exchange will be responsible for matching the transaction, which is exactly the same as the stock. The last is cash withdrawal (withdrawal of currency). Users can send instructions to transfer the currency from the exchange address to their wallet address. The above is the trading mechanism of the centralized exchange. In these steps, all actions will have costs. No matter you recharge, trade or withdraw money, gas and handling charges can't escape
then let's look at the decentralized exchange. The trading mechanism is different from the centralized exchange. The first step is to register (open an account) and set the password. It doesn't make any difference. But then it's a little different. KYC is not used. But because there is a private key, the ownership of this address is completely controlled by the user. The second step is recharging. This is not very different from the centralized exchange. You still have to make your own gas
after recharging, we can also trade in the decentralized exchange. Users can also register orders, and exchanges will also be responsible for matching transactions, but the matching is done by smart contracts. Finally, cash withdrawal (withdrawal of currency) is initiated. After withdrawing currency, users can directly transfer the currency from the address of the exchange to their wallet address. This step is the same as that of the centralized exchange
the above is the trading mechanism of centralized and decentralized exchanges, and the difference between them is also obvious. Because all currencies in the central exchange are under its control, the trading efficiency is very high, and it is similar to the stock trading process, convenient and suitable for most users. Conversely, the risk lies in this. If the exchange itself loses its integrity or is attacked by hackers, the user's capital (currency) is not guaranteed
all the transaction processes of decentralized exchanges are completed by smart contracts, so the transaction efficiency is relatively low (TPS of blockchain technology has always been a soft rib), but relatively, the capital (currency) is completely in the hands of users, so the security is relatively high. In addition, there are also KYC, where KYC is needed for centralization, but not for decentralization, and the security of personal information is relatively high. Compared with the decentralized exchange, the advantages of the centralized exchange lie in the trading depth and the number of users, which are unmatched by the decentralized exchange
therefore, centralization and decentralization have their own advantages and disadvantages. It depends on the user's own choice. They like convenient, centralized, secure and decentralized.
private keys and assets are transferred to the wallet for centralized management. Users don't need to worry about the loss of the private key of this kind of wallet procts, resulting in the loss of funds; However, the capital risk will be more concentrated in the wallet project side and server side. When the centralized wallet is conquered by hackers, users will suffer unnecessary losses
decentralized wallets, commonly known as onchain wallets, have private keys maintained by users and assets stored in blockchains
decentralized wallets are often referred to as onchain wallets. The private key is handed over to the user. If the private key is lost, the wallet will not be able to help the user recover, and the funds will be lost forever. But the decentralized wallet is difficult to be attacked by hackers, and users don't have to worry about the self stealing of the wallet service provider
centralized wallets are where assets are stored, while decentralized wallets are where private keys are stored
except for the exchange, it is not recommended to use the centralized wallet, although losing the private key may help you find it. But there is always a risk that the company will run
a decentralized wallet is equivalent to a channel, a channel where you can master mnemonics to control your assets on the blockchain. For a decentralized wallet, the most important thing is to protect the security of the [private key]
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
centralization: to apply for a domain name, you need a server, you need a central account, you need an operator, the fund pool is not open, you can close the network at any time, you have no contract on the chain, you need to register your mobile phone number, you need to apply for cash withdrawal, and hackers can attack.
at present, the best e-commerce in China is "centralized" mode. The so-called centralized mode means that an e-commerce platform concentrates all businesses and eyeballs / traffic and becomes the first entrance for consumers to shop. Consumers find goods through this entrance, and the platform allocates benefits through this entrance<
the concept of decentralization has been boiling in the past two years, and the climax appeared in December last year. Zhang Xiaolong elaborated the eight views of wechat public platform in detail, one of which is that "wechat wants to build a real decentralized system, it will not provide a centralized traffic entrance to all public platform parties and third parties".
if the number of cases is really low, it can be made up.
if the workers refuse to make up, they can complain or report to the local labor supervision brigade or apply to the labor dispute Arbitration Committee for labor arbitration< br />
1. Efficiency is different: the efficiency of decentralized network is higher than that of centralized network, but conversely, the security of centralized network is higher. On the whole, centralized network is suitable for high security applications
2. Different characteristics: centralized network means that each time two client computers communicate with each other through the server. The decentralized network is the initial need to go through the server, later communication does not need the server
3. Different costs: the characteristics of collective maintenance of blockchain can rece a lot of costs. The centralized network involves the maintenance, confidentiality, operation and so on of many systems, which must require a lot of human, financial and material resources. These things do not exist for the decentralization of blockchain, so they can save a lot of costs
extended materials:
precautions:
in the aspect of blockchain governance, an interesting trend recently is the re emergence of online virtual currency holder voting as a multi-purpose decision-making mechanism. Sometimes the vote of the coin holder is used to decide who runs the super node of the network (e.g. dpos in EOS, Neo, lisk and other systems), sometimes the protocol parameters are voted (e.g. the upper limit of Ethereum fuel supply), and sometimes the vote and direct application of approval (e.g. tezos) protocol upgrade are also concted
in all these cases, voting is automatic, and the protocol itself contains all the logic needed to change the verifier set or update its own rules, and automatically responds to the voting results