Is imtokenmax decentralized
2. I haven't heard of the second one. I guess it's a small wallet from somewhere. I might run away one day
3. Some exchanges provide channels for exchange. You call customer service, customer service will teach you. You can try ZB
- above. If you have any questions, please leave a message. DFG (Digital finance group) is committed to popularizing blockchain related knowledge, delivering the latest blockchain instry information and sharing interesting stories about blockchain.
Imtoken is an influential mobile light wallet
aims to provide safe, easy-to-use and powerful digital asset management tools for users in the blockchain field
imtoken wallet supports eth, BTC, EOS, cosmos and other multi chain assets. DAPP browser takes you to explore the unlimited possibilities of a decentralized world
one identity, Multi Chain Management
manages multiple blockchain wallets through one digital identity, saying goodbye to the chaotic management tools
the new architecture supports eth / BTC / EOS / cosmos and other multi chain assets
secure transaction, within reach
with the help of blockchain intelligent contract, currency exchange can be directly completed on the mobile terminal without trusting a third party
private key self-contained security management
the private key is encrypted and stored in the sandbox file system of the mobile phone to fully ensure the asset security
provide a variety of private key backup strategies to prevent loss and theft
wallet is identity protection data privacy
the wallet account based on public and private key cryptography can become your sovereign identity in the digital world
personal data is encrypted by private key of identity and stored in decentralized storage network
* * DAPP application authorization interaction * *
uses intelligent contract technology to build distributed application browser
with digital identity, you can authorize yourself to interact with the third party DAPP without creating an account repeatedly
Ethereum is not only a database, it also allows you to run programs in the trusted environment of the blockchain. Ethereum has built a virtual machine named EVM (Ethereum virtual machine) on the blockchain. EVM allows code to be verified and executed on the blockchain, providing guarantee for code to run in the same way on everyone's machine. These codes are included in the smart contract. In addition to tracking the account balance, Ethereum uses the same method to save the EVM status on the blockchain. All nodes process the smart contract to verify the integrity of the contract itself and its output.
Plustoken wallet is not reliable
on June 29, 2019, plustoken, the largest blockchain investment project, was reported by users that it was unable to withdraw money, and then six founding team members were arrested in Vanuatu for suspected Internet fraud. In the previous article "tracking the asset transfer of plustoken with pictures and texts", the preliminary tracking statistics showed that there were 1203 BTC inflows into the exchange
At the same time, peckshield found that another transfer address at the beginning of 1m1tfsvb in the monitoring transferred 5575 BTCs through multiple decentralized and small amount transfer out, and it is not sure whether it will flow into the exchange. However, ETH, EOS, XRP and other currency assets have no abnormal trendEthereum miner fee
1. In a public chain, anyone can read and write data. Reading data is free, but writing data to the public chain costs a certain amount of money, which helps to prevent junk content and protect its security through payment
Secondly, any node on the network (each connected device containing a of the account book is called a node) can participate in the mining method to protect the network. As mining requires computing power and electricity charges, miners need to be paid for their services, which is also the origin of miners' fees Third, the difference between Ethereum and bitcoin, Ethereum introces the concept of gas, the purpose of which is to limit the amount of work required to execute the transaction and pay for the execution. Gas is used to measure the resources (including computation, storage, bandwidth, etc.) consumed by your transaction (or contract code call)
extended data:
ten rights of miners:
1. The "ten rights" of coal mining enterprise workers in safe proction include: the shift leader does not go down the well, and the workers have the right not to go down the well; The workers have the right to leave the well early if the shift leader leaves the well early; Workers have the right not to work if potential safety hazards are not investigated; If the management personnel command against rules and regulations, the workers have the right not to carry out them
Without safety measures, workers have the right not to start work; Workers have the right not to go down the well if they don't organize safety study before class; If the "Trinity" (monitor, safety inspector and gas inspector) safety inspection is not carried out, workers have the right not to start work The workers have the right not to start the work if the detection and monitoring system is not installed in place and operates abnormally; Workers have the right not to go down the well if they are not equipped with fully qualified labor protection and protective equipment; The route to avoid disaster is not marked, and workers have the right not to go down the well. The coal mine shall not dect the wages and dismiss the workers for the above reasonsXTT (Xin time token), based on Ethereum erc20 platform, is a decentralized digital currency carrier based on blockchain as payment technology
Ethereum is an open source public blockchain platform with smart contract function, which provides decentralized Ethernet virtual machine to process point-to-point contract through its special cryptocurrency ether (ETH)
the concept of Ethereum was first proposed by vitalik buterin, a programmer, from 2013 to 2014, inspired by bitcoin, to the effect of "next generation cryptocurrency and decentralized application platform", and began to develop through ICO crowdfunding in 2014
extended data:
background
bitcoin has created the first decentralized cryptocurrency, and has fully tested the feasibility and security of blockchain technology in more than five years
the blockchain of bitcoin is actually a set of distributed database. If a symbol bitcoin is added into it and a set of protocol is specified, the symbol can be transferred safely on the database without trusting a third party. The combination of these features perfectly constructs a currency transmission system bitcoin network
however, bitcoin is not perfect, and the scalability of the protocol is a deficiency. For example, there is only one symbol in the bitcoin Network - bitcoin, and users can't customize other symbols. These symbols can represent the company's stocks or debt certificates, which will lose some functions
In addition, a stack based scripting language is used in bitcoin protocol. Although this language has some flexibility to realize functions such as multi signature, it is not enough to build more advanced applications, such as decentralized exchanges. Ethereum is designed to solve the problem of insufficient scalability of bitcoinreference source: network Ethereum
thank you
First of all, remember whether the mnemonic words are at risk of loss. If it is possible to be known by others, please create a new token wallet at the first time and transfer the original wallet assets
if the wallet account in the cornerstone stage cannot be transferred, please contact the project party in time and ask the other party to assist in the transfer of token assets. If you are sure that it belongs to your own deletion or damage and is not known by others, you can choose to note the private key and log in with the private key
mnemonics is another form of plaintext private key, which was first proposed by bip39 proposal. Its purpose is to help users remember complex private key (64 bit hash value)
mnemonic words are generally composed of 12, 15, 18, 21 words, which are all taken from a fixed vocabulary, and their generation order is also based on a certain algorithm, so users don't have to worry about randomly entering 12 words to generate an address
although both mnemonic words and keysore can be used as another form of private key, different from keysore, mnemonic words are unencrypted private keys. Anyone who gets your mnemonic words can easily take control of your assets
So after users backup mnemonics, they must pay attention to three points:1. Try to use physical media backup as much as possible, such as writing on paper with pen, and try not to take screen shots or photos and put them in networked devices to prevent being stolen by hackers
If one or two words are copied wrong, it will bring great difficulties to retrieve the correct mnemonics3. Keep the backup mnemonics properly and take anti-theft measures
users can use the backup mnemonics to re import imtoken and generate a new keysore with a new password to modify the wallet password
extended data:
the essence of using imtoken to create wallets is to generate a set of mnemonics randomly. Due to the characteristics of decentralization, imtoken does not keep the privacy information of users' wallets. So after generating mnemonics, users must keep them by themselves. This group of mnemonics can dece the private key, the public key and the address of the wallet
according to the above instructions, if we want to find the mnemonic words, we need to know the generation process of mnemonic words: first, we make a 128 bit random number, and then we check the random number by 4 bits to get a 132 bit number, and then we divide it by 11 bits, so that we have 12 binary numbers, and then we use each number to look up the word list defined by bip39, So you get 12 mnemonics
calculate the number of mnemonics that can be generated, bip39 mnemonics thesaurus contains a total of 2048 words, 12 words in each group. For example, by analogy, the amount of sand on earth is about 1, followed by 18 zeros. If we can generate one million mnemonics per second, we can generate 3.1536 e + 13 mnemonics per year, which takes about 1.6715937e + 26 years to traverse all mnemonics. Therefore, brute force cracking is impossible
if all mnemonics and private keys are lost, they can't be recovered by brute force cracking, because imtoken's decentralization can't be recovered from us. However, if the mnemonic words are lost and the private key is still kept, the use of the wallet will not be affected
source: Official Website of imtoken - why is there no way to retrieve the missing mnemonics