What are bitcoin's decentralized wallets
Publish: 2021-03-27 19:52:18
1. For example, I borrow money from you in a village. Normally, if I am afraid that you will not repay the money, I can find an intermediary recognized by everyone, such as the village head as the guarantor, and sign an IOU. In this way, if you default at that time, I can find an intermediary to prove that you really owe me money, But there are two problems: 1. What if the village head finds out that his long lost son colludes with him to cheat you on money? 2. What if the middleman dies on the spot the next day! This is about trust and security. If the method of blockchain is to provide you with the certificate of the whole village (distributed), so that everyone knows about it and the other party can't default on it. Second, even if a small number of people or village heads deny (some nodes commit crimes) that they have lost the IOU or tampered with the content, there will still be others to make the basis
above, explain the two problems of building owners: 1. Decentralization, because the account book records are not centralized in the hands of each participant, and you will get paid if you save and keep accounts. 2. Since I can get rewards by saving and keeping accounts, can I just keep accounts instead of storing them? If you have a mining pool, you can keep accounts for it and store it for you. In this way, you can still get good rewards. There are only a few mining pools in the world, so they are centralized
above, explain the two problems of building owners: 1. Decentralization, because the account book records are not centralized in the hands of each participant, and you will get paid if you save and keep accounts. 2. Since I can get rewards by saving and keeping accounts, can I just keep accounts instead of storing them? If you have a mining pool, you can keep accounts for it and store it for you. In this way, you can still get good rewards. There are only a few mining pools in the world, so they are centralized
2. Centralized wallet, also known as off Chain Wallet, completely depends on the company and server running the wallet. bitcoin stored in the exchange is stored in the centralized wallet (off Chain Wallet). The private key is not owned by the user, but in the wallet project side of the centralized server hosting chain, the fund is usually entrusted to the server
private keys and assets are transferred to the wallet for centralized management. Users don't need to worry about the loss of the private key of this kind of wallet procts, resulting in the loss of funds; However, the capital risk will be more concentrated in the wallet project side and server side. When the centralized wallet is conquered by hackers, users will suffer unnecessary losses
decentralized wallets, commonly known as onchain wallets, have private keys maintained by users and assets stored in blockchains
decentralized wallets are often referred to as onchain wallets. The private key is handed over to the user. If the private key is lost, the wallet will not be able to help the user recover, and the funds will be lost forever. But the decentralized wallet is difficult to be attacked by hackers, and users don't have to worry about the self stealing of the wallet service provider
centralized wallets are where assets are stored, while decentralized wallets are where private keys are stored
except for the exchange, it is not recommended to use the centralized wallet, although losing the private key may help you find it. But there is always a risk that the company will run
a decentralized wallet is equivalent to a channel, a channel where you can master mnemonics to control your assets on the blockchain. For a decentralized wallet, the most important thing is to protect the security of the [private key]
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
private keys and assets are transferred to the wallet for centralized management. Users don't need to worry about the loss of the private key of this kind of wallet procts, resulting in the loss of funds; However, the capital risk will be more concentrated in the wallet project side and server side. When the centralized wallet is conquered by hackers, users will suffer unnecessary losses
decentralized wallets, commonly known as onchain wallets, have private keys maintained by users and assets stored in blockchains
decentralized wallets are often referred to as onchain wallets. The private key is handed over to the user. If the private key is lost, the wallet will not be able to help the user recover, and the funds will be lost forever. But the decentralized wallet is difficult to be attacked by hackers, and users don't have to worry about the self stealing of the wallet service provider
centralized wallets are where assets are stored, while decentralized wallets are where private keys are stored
except for the exchange, it is not recommended to use the centralized wallet, although losing the private key may help you find it. But there is always a risk that the company will run
a decentralized wallet is equivalent to a channel, a channel where you can master mnemonics to control your assets on the blockchain. For a decentralized wallet, the most important thing is to protect the security of the [private key]
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
3. Centralized wallet, also known as off Chain Wallet, completely depends on the company and server running the wallet. Bitcoin stored in the exchange is stored in the centralized wallet (off Chain Wallet). The private key is not owned by the user, but in the wallet project side of the centralized server hosting chain, the fund is usually entrusted to the server
private keys and assets are transferred to the wallet for centralized management. Users don't need to worry about the loss of the private key of this kind of wallet procts, resulting in the loss of funds; However, the capital risk will be more concentrated in the wallet project side and server side. When the centralized wallet is conquered by hackers, users will suffer unnecessary losses
decentralized wallets, commonly known as onchain wallets, have private keys maintained by users and assets stored in blockchains
decentralized wallets are often referred to as onchain wallets. The private key is handed over to the user. If the private key is lost, the wallet will not be able to help the user recover, and the funds will be lost forever. But the decentralized wallet is difficult to be attacked by hackers, and users don't have to worry about the self stealing of the wallet service provider
centralized wallets are where assets are stored, while decentralized wallets are where private keys are stored
except for the exchange, it is not recommended to use the centralized wallet, although losing the private key may help you find it. But there is always a risk that the company will run
a decentralized wallet is equivalent to a channel, a channel to control its own assets on the blockchain by mastering mnemonics. For a decentralized wallet, the most important thing is to protect the security of the [private key]
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
private keys and assets are transferred to the wallet for centralized management. Users don't need to worry about the loss of the private key of this kind of wallet procts, resulting in the loss of funds; However, the capital risk will be more concentrated in the wallet project side and server side. When the centralized wallet is conquered by hackers, users will suffer unnecessary losses
decentralized wallets, commonly known as onchain wallets, have private keys maintained by users and assets stored in blockchains
decentralized wallets are often referred to as onchain wallets. The private key is handed over to the user. If the private key is lost, the wallet will not be able to help the user recover, and the funds will be lost forever. But the decentralized wallet is difficult to be attacked by hackers, and users don't have to worry about the self stealing of the wallet service provider
centralized wallets are where assets are stored, while decentralized wallets are where private keys are stored
except for the exchange, it is not recommended to use the centralized wallet, although losing the private key may help you find it. But there is always a risk that the company will run
a decentralized wallet is equivalent to a channel, a channel to control its own assets on the blockchain by mastering mnemonics. For a decentralized wallet, the most important thing is to protect the security of the [private key]
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
4. The representative of all nodes is bitcoin core
core wallet, which needs to synchronize all blockchain data and takes up a lot of memory, but it can be completely decentralized. Light wallet relies on other all nodes in bitcoin network, only synchronizes data related to itself, which can basically achieve decentralization. Centralized wallet does not rely on bitcoin network, all data are obtained from its own centralized server, but the transaction efficiency is very high, and it can be received in real time. The account you register in the transaction platform is the centralized wallet.
core wallet, which needs to synchronize all blockchain data and takes up a lot of memory, but it can be completely decentralized. Light wallet relies on other all nodes in bitcoin network, only synchronizes data related to itself, which can basically achieve decentralization. Centralized wallet does not rely on bitcoin network, all data are obtained from its own centralized server, but the transaction efficiency is very high, and it can be received in real time. The account you register in the transaction platform is the centralized wallet.
5. Bitcoin was born in a paper in 2008
a person signed by Nakamoto Tsui has put forward a revolutionary idea: let's create a currency that is not controlled by the government or anyone else! This idea is crazy: there is no asset support behind a string of figures, and no one is responsible for it. How can anyone accept it when you pay it to the other party as money
Merkle tree
looks like a binary tree, but this is the lower two nodes. Take the hash value to get the upper node. Just remember the root node to detect whether the whole tree has been tampered
the root hash value is stored in the block header, and the transaction process is stored in the block body. All nodes include block header and block body, but light nodes (such as bitcoin wallets on mobile phones) only include block header. This tree can prove that a transaction has been written into the blockchain
3. Consensus agreement
two issues should be paid attention to in decentralized currency:
1. Who can issue digital currency: mining
2. How to verify the legitimacy of transactions: blockchain
double spending attack
double spending attack is a major challenge of digital currency
all transactions in bitcoin have input and output. Where does bitcoin come from and where does it go
under normal circumstances, there may be two bifurcations, because two nodes obtain the bookkeeping right at the same time, and the two nodes package the block and calculate the random number at the same time. At this time, the two bifurcations will coexist temporarily until one of the blocks finds the next block first, which becomes the longest legal chain, and the other one is discarded<
Sybil attack
a malicious node keeps generating accounts. If the total number of accounts exceeds half of the total accounts, it obtains the control of the blockchain
consensus protocol in bitcoin
some nodes are malicious, and most nodes are good
idea 1: pack some transactions into blocks as candidate blocks, let each block vote, and write them into the blockchain if they pass
No, because some malicious nodes have been publishing blocks containing malicious transactions, and they have been voting and occupying resources. And some nodes don't vote<
idea 2: vote not by the number of accounts, but by computing power. Each node can generate legal transactions and put them into the block. These nodes start to try random numbers until H (block header) ≤ target is found, then this node has the right to account
the only way to generate bitcoin
coinbase transaction. There is no need to point out the source of the currency. If you have the bookkeeping right, you will get a reward< br />
50BTC-> 25BTC-> 12.5btc, the reward will be halved for every 210000 bitcoins
the process of bitcoin competing for bookkeeping rights is called mining. The node competing for bookkeeping right is called miner.
a person signed by Nakamoto Tsui has put forward a revolutionary idea: let's create a currency that is not controlled by the government or anyone else! This idea is crazy: there is no asset support behind a string of figures, and no one is responsible for it. How can anyone accept it when you pay it to the other party as money
Merkle tree
looks like a binary tree, but this is the lower two nodes. Take the hash value to get the upper node. Just remember the root node to detect whether the whole tree has been tampered
the root hash value is stored in the block header, and the transaction process is stored in the block body. All nodes include block header and block body, but light nodes (such as bitcoin wallets on mobile phones) only include block header. This tree can prove that a transaction has been written into the blockchain
3. Consensus agreement
two issues should be paid attention to in decentralized currency:
1. Who can issue digital currency: mining
2. How to verify the legitimacy of transactions: blockchain
double spending attack
double spending attack is a major challenge of digital currency
all transactions in bitcoin have input and output. Where does bitcoin come from and where does it go
under normal circumstances, there may be two bifurcations, because two nodes obtain the bookkeeping right at the same time, and the two nodes package the block and calculate the random number at the same time. At this time, the two bifurcations will coexist temporarily until one of the blocks finds the next block first, which becomes the longest legal chain, and the other one is discarded<
Sybil attack
a malicious node keeps generating accounts. If the total number of accounts exceeds half of the total accounts, it obtains the control of the blockchain
consensus protocol in bitcoin
some nodes are malicious, and most nodes are good
idea 1: pack some transactions into blocks as candidate blocks, let each block vote, and write them into the blockchain if they pass
No, because some malicious nodes have been publishing blocks containing malicious transactions, and they have been voting and occupying resources. And some nodes don't vote<
idea 2: vote not by the number of accounts, but by computing power. Each node can generate legal transactions and put them into the block. These nodes start to try random numbers until H (block header) ≤ target is found, then this node has the right to account
the only way to generate bitcoin
coinbase transaction. There is no need to point out the source of the currency. If you have the bookkeeping right, you will get a reward< br />
50BTC-> 25BTC-> 12.5btc, the reward will be halved for every 210000 bitcoins
the process of bitcoin competing for bookkeeping rights is called mining. The node competing for bookkeeping right is called miner.
6.
What are the wallets in our lives? Put your money, cards, and mobile phone, money and bank cards are issued by the bank. Mobile phone Alipay WeChat payment is paid through the third party, which is completely decentralized, and how it will be stored and retained? Besides being placed in the exchange, it can also be placed in the wallet. What are the types of bitcoin wallets? How to achieve point-to-point decentralization? Blockchain wallet is not used to hold money?! Have you stepped on thunder
miaozhou blockchain issue 08 can teach you to identify the mistakes of blockchain wallet. More blockchain beginners are welcome to pay attention to Babbitt's miaozhou blockchain
7. What are the categories of wallets
previously, we learned the various forms of wallets, and we also learned that wallets are actually "management tools for private key, address and blockchain data". According to the maintenance mode of blockchain data and the degree of decentralization of wallets, we can divide wallets into full node wallets, light wallets and centralized wallets
the representative of all nodes is bitcoin core wallet, which needs to synchronize all blockchain data and takes up a lot of memory, but it can be completely decentralized. Light wallet relies on other all nodes in bitcoin network, only synchronizes data related to itself, which can basically achieve decentralization
centralized wallet does not rely on bitcoin network. All data are obtained from its own centralized server, but the transaction efficiency is very high, and it can be received in real time. The account you register in the transaction platform is the centralized wallet.
previously, we learned the various forms of wallets, and we also learned that wallets are actually "management tools for private key, address and blockchain data". According to the maintenance mode of blockchain data and the degree of decentralization of wallets, we can divide wallets into full node wallets, light wallets and centralized wallets
the representative of all nodes is bitcoin core wallet, which needs to synchronize all blockchain data and takes up a lot of memory, but it can be completely decentralized. Light wallet relies on other all nodes in bitcoin network, only synchronizes data related to itself, which can basically achieve decentralization
centralized wallet does not rely on bitcoin network. All data are obtained from its own centralized server, but the transaction efficiency is very high, and it can be received in real time. The account you register in the transaction platform is the centralized wallet.
8. There are many kinds of digital asset wallets. I'll try to make it as simple as possible
according to whether to run the whole node, it can be divided into full node wallet and light wallet. The full node wallet refers to the wallet that synchronizes all the blockchain data, while the light wallet only retains part of the data related to itself. We usually use the light wallet
according to whether the wallet is connected to the Internet, it can be divided into hot wallet and cold wallet. Hot wallets are wallets that stay online, also known as online wallets. A cold wallet is a wallet that is not connected to the Internet, also known as an offline wallet. It is usually a computer, hard disk or paper with a private key written on it that is not connected to the Internet. Generally speaking, a cold wallet is more secure than a hot one because it is not connected to the Internet and the private key can hardly be stolen
according to the different ways of private key storage, wallet can be divided into decentralized wallet and centralized wallet. Decentralized wallet means that the private key is not stored and managed by a third party, but generated and managed by users themselves. If the private key is lost, it will not be retrieved. The storage of the private key of the centralized wallet is managed by the platform. Users log in with their accounts, and the exchange wallet belongs to this category
at present, the well-known wallets on the market include Bitian, imtoken, Galaxy wallet, Cobo wallet, etc.
according to whether to run the whole node, it can be divided into full node wallet and light wallet. The full node wallet refers to the wallet that synchronizes all the blockchain data, while the light wallet only retains part of the data related to itself. We usually use the light wallet
according to whether the wallet is connected to the Internet, it can be divided into hot wallet and cold wallet. Hot wallets are wallets that stay online, also known as online wallets. A cold wallet is a wallet that is not connected to the Internet, also known as an offline wallet. It is usually a computer, hard disk or paper with a private key written on it that is not connected to the Internet. Generally speaking, a cold wallet is more secure than a hot one because it is not connected to the Internet and the private key can hardly be stolen
according to the different ways of private key storage, wallet can be divided into decentralized wallet and centralized wallet. Decentralized wallet means that the private key is not stored and managed by a third party, but generated and managed by users themselves. If the private key is lost, it will not be retrieved. The storage of the private key of the centralized wallet is managed by the platform. Users log in with their accounts, and the exchange wallet belongs to this category
at present, the well-known wallets on the market include Bitian, imtoken, Galaxy wallet, Cobo wallet, etc.
9. Cold wallet is equivalent to your private key and network isolation, now cold wallet can also be put in the card, more secure, I use the cool treasure cold wallet
Hot content