Position: Home page » Currency » What is the use of a digital currency key

What is the use of a digital currency key

Publish: 2021-05-14 03:39:44
1.


{rrrrrrr}

bitcoin (BTC) is a digital currency with a total amount of 21 million. It has the characteristics of decentralization, globalization and anonymity, just like the Internet. It means that transferring bitcoin to the other end of the earth is as simple as sending e-mail, low-cost and unlimited. Bitcoin is also used in cross-border trade, payment, remittance and other fields

the liquidity and limitation of bitcoin determine that bitcoin can act as a monetary function equivalent to general equivalent, or as a measure of money, but this measure is not a physical measure like gold, but a digital proct

related concepts:

1. Address

the address of bitcoin world looks like this. The address itself is just a string of codes, just like your bank account number 321 million 3288372, which is used to mark an account. Everyone can have countless addresses. The address is public

2. The bank records how much money there is in the bank account
the amount of money in the bitcoin address is recorded by the whole bitcoin network. Each complete bitcoin data will record how many bitcoins are stored in this address
each node participating in the bitcoin network can save a complete of bitcoin data, and everyone has a backup on hand to prevent counterfeiting

3. The key (private key)

the key is another string of characters you only know. The key is used to operate the money in the bitcoin address. Key and address are the relationship between a key and a lock. Each address has only one password, and each password also operates a bitcoin address

with the key, you can control the money in the bitcoin address and pay to anyone. The key should be absolutely safe. The lost or deleted key can never be found, and the money in the corresponding bitcoin address can never be used

the key needs to be kept absolutely secret. Anyone who knows the key can steal all your bitcoin

4. Wallet

the transaction process of bitcoin will involve a lot of complex calculations. In order to simplify the operation, we have made wallets. The wallet has client software on the computer, and also has an online web version. The function of the wallet is to pay with a little touch, and the complicated calculation behind it is left to the wallet to complete

5. Security

if you use the computer client software, you can recommend multibit or bitcoin QT. Both are official software recommendations for the bitcoin community. The installation of these two softwares must be downloaded directly from the official website, and the check code must be checked before and after downloading. This is to prevent someone from tampering with wallet software and stealing keys

6. Mining

about every 10 minutes, some new bitcoin will appear in the bitcoin network, which can be imagined as throwing money in the sky. Whose pocket these scattered money fall into mainly depends on whose computer calculates fast. The faster you calculate, the more likely you are to find the money. Mining is to use the computer to calculate, to pick up the money< br />

2.

The digital currency wallet is the hardware wallet, which means that the private key of digital assets is stored in a single chip, isolated from the Internet, plug and play. Hardware wallet can't guarantee 100% security. For example, if a geek gets your hardware wallet and doesn't know your private key, it may be cracked by violence. It's just one of the safest storage methods compared to other storage methods

many block chain entrepreneurs at home and abroad are optimistic about the development of this field, so they begin to build more hardware wallets. In the case of the exchange being stolen a lot of money and the software wallet being stolen from time to time, many investors regard the hardware wallet as the last moat

extended information:

whether the hardware wallet is safe

the hardware wallet can not guarantee 100% security. For example, if a geek obtains your hardware wallet, it may be cracked violently even if it doesn't know your hardware wallet immediately. It's just one of the safest storage methods compared to other storage methods

of course, there are exceptions, such as you have unlimited brain power and never forget. It's better to save it anywhere than in your own mind

3.

Many small white just admission, was the private key, public key, address, and other relations confused. Some of them even lost their private key. They had money on the address, but they just couldn't get it out. Today, Xiao will try to figure out the relationship between the private key, the public key and the address

The relationship among < H2 > private key, public key and address is as follows:

the private key is converted into (generated) public key, and then converted into address. If there is bitcoin or integrity coin on an address, the private key converted into the address can be used to spend the above integrity coin. The generation of public key and address depends on private key, so private key is the most important

mobile wallet is the same, but the file management method of mobile phone is not as convenient as computer. Therefore, the general mobile wallet will provide a function called or similar to "export private key". Through this function, the private key can be exported in various forms

for example, bitcoin mobile wallet can be exported as a two-dimensional code, which can be printed or scanned on paper. When replacing a mobile phone, install a bitcoin wallet and scan the QR code to migrate bitcoin. Bitcoin mobile wallet and trustcoin mobile wallet can be exported as a clear text string and printed on paper - this is paper wallet

paper wallet allows users to spend your bitcoin or trustcoin at any terminal with bitcoin or trustcoin wallet

because the wallet is lost or damaged, the private key will be lost, and the transfer right of the digital currency will be lost completely. To prevent such tragedies, you should always back up the data in your wallet. In addition to the address, all the private keys are saved ring the backup

< H2 > summary
  1. the private key should be protected to prevent loss and forgetting. When the mobile phone clears the information, it is best to it by hand, but do not disclose it

  2. you should prevent your wallet from being lost or damaged, resulting in the loss of your private key and the loss of the transfer right of digital currency. Otherwise, you will not be able to withdraw more money, which is not useless

4. A secure and reliable digital wallet should be designed from at least five dimensions:
1. Security risk of running environment
the core file of encrypted digital currency Wallet - private key / mnemonics is stored on the terminal device, whether it is PC or mobile terminal, if the terminal device appears unsafe phenomenon, There is a very high security risk for the private key / mnemonic
at the beginning of design, a secure digital wallet can avoid the possibility of private key / mnemonics being stolen e to the running environment. The security problems of the running environment on the terminal mainly include virus software, operating system vulnerabilities and hardware vulnerabilities
2. The security risk of network transmission
the security of network transmission is more reflected in the ability to resist man in the middle attack. Man in the middle attack means that the attacker creates independent contact with both ends of the communication and exchanges the data they receive, so that both ends of the communication think that they are talking directly with each other through a private connection, but in fact the whole conversation is completely controlled by the attacker
although most digital wallet applications use the HTTPS protocol to communicate with the server, the man in the middle attack method is to get the content of the HTTPS protocol by installing a digital certificate in the user terminal
a secure digital wallet needs to be able to scan the legality of all the digital certificates in the terminal, check the proxy settings in the network transmission process, and ensure the security of the basic network communication environment
in the development of digital wallet, whether to use two-way verification for communication verification at the network transmission level is also an important criterion to measure the security of a digital wallet application
3. The security risk of file storage mode
for the private key / mnemonics of digital wallet, the storage mode of terminal device also needs to be paid attention to in the security design. The access right of private key / mnemonic file directory, the form of private key / mnemonic file storage and the design of encryption algorithm all need to be strictly designed
when we analyze the security of several mainstream digital wallets, we find that even the well-known digital wallets are random in the storage of private key / mnemonic words. There are both plaintext storage and encrypted storage, but the decryption key is fixed in the code, which can not play any role in security defense
4. The security risk of the application itself
the security risk of the application itself mainly focuses on the security defense of the application installation package itself
whether the application installation package has the ability of anti tampering is a very core technical ability. In addition, memory security, anti debugging ability, life cycle management of private key / mnemonics, security of debugging log and security of development process also need to be enhanced
5. Security risk of data backup
if the mobile application can be backed up, it can use the machine with more powerful computing performance to brutally crack the private key / mnemonics. For example, if android:allowBackup Property is set to allow backup, then the backup mechanism of the system can be used to back up the application data files, and the private key / mnemonics of the encrypted digital currency will be backed up to the external media, which breaks the security boundary design of the operating system from another direction
for the majority of users, the security of digital wallet also means the security of wealth, so we must be careful when choosing digital wallet
I have used several wallets such as coin letter socoin and coinplus
in terms of personal experience, socoin and coinplus are very simple and easy to use. They are not only decentralized multi-functional cross chain digital currency wallets with social functions, but also integrate Multi Chain multi currency wallets, payment and settlement platform, currency trading platform, social groups, information market and other functions, which can meet almost all your needs for digital currency in one stop.
5.

The role of digital currency:

1. First of all, the central bank's digital currency can provide a huge data base for monetary policy and macro Prudential policy, so that the regulatory authorities can collect real-time trading books of different frequency and different institutions according to their needs, and it is complete and real. This information advantage can help the central bank use policy tools more accurately and flexibly

Secondly, the central bank's digital currency technology can track the flow of funds and help the regulatory authorities to comprehensively monitor and assess financial risks. Finally, the central bank's digital money technology is concive to the transmission of interest rate of monetary policy. Digital currency technology supports "point-to-point" payment and settlement, which can improve the liquidity of market participants. Only the digital currency of the central bank, which is generally accepted by the whole society, can radiate this advantage to the participants of different financial markets, so as to improve the liquidity of financial markets. This will make the term structure of interest rate smoother and the transmission mechanism of interest rate smoother

extended data:

digital currency can be considered as a virtual currency based on node network and digital encryption algorithm. The core characteristics of digital currency are mainly reflected in three aspects: because it comes from some open algorithms, digital currency has no issuing subject, so no one or institution can control its issuing; Because the number of algorithm solutions is fixed, the total amount of digital currency is fixed, which fundamentally eliminates the possibility of inflation caused by the overuse of virtual currency; Because the transaction process needs the approval of each node in the network, the transaction process of digital currency is safe enough

6. A decentralized digital currency storage scheme is provided for users. The wallet key and the address and private key information of all kinds of currencies are stored in the user's local system. At the same time, the wallet provides a convenient key backup scheme - users only need to backup once and save it in a safe place. Even if the types of digital currency are added subsequently, all types of digital currency assets can be recovered with backup. In addition to allowing users to fully control the key of the wallet, the wallet also provides multi signature technical support and two-step authorization verification for digital asset management of different scales. Users can choose mobile phone verification code, fingerprint, living body and other verification methods ring transfer transactions to ensure the security of digital currency assets in an all-round way.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750