How to distinguish digital currency Wallet
anmao wallet
anmao wallet is a light wallet developed by Hangzhou anmao blockchain Technology Co., Ltd., which saves storage space compared with full node wallet. And it is a multi currency Cross Chain Wallet, which supports BTC, BCH, LTC, ETH, etc, dash and erc-20 series of tokens. At present, it is the most complete currency digital currency wallet in the true sense
anmao wallet is the only digital currency wallet that supports Chinese mnemonic words. It is composed of 12 Chinese characters, which is convenient for memory and in line with Chinese reading habits
the biggest feature of anmao wallet is that it well applies the scalability of light wallet. While managing a variety of digital assets, it has embedded DAPP list and anmao fishpond mining game. The tokens are directly stored in the wallet, which is convenient, labor-saving and interesting. It can be said that it is a money making wallet
with embedded Android block browser, each transaction can be queried in real time by using transaction address, block height and transaction ID, which is accurate
there are also market and information DAPP, a multi-functional digital currency wallet
bitpai
bitpai wallet is a new generation of blockchain asset integrated service platform developed by bitpai team. It is based on HD wallet technology, multi signature and on chain transaction. It can easily and safely use digital currency and easily send and receive bitcoin on bitpai. At present, the main supported currencies are BTC, BTC, ETH, some erc2.0 tokens, qtum, HSR, dash, safe, LTC, LCH, Zec, etc and Doge
bitpai supports multi address coin issuing, built-in OTC and exchange (third-party service), and can trade with users from all over the world, which is more suitable for professional users with frequent transactions and OTC trading needs
in terms of security, the user controls the private key. After the transaction is completed, the coin is directly kept by the user. If it does not operate for a long time, bitpie will automatically lock, further improving the security of the wallet
disadvantages: for initial users, too many and complex functions are a kind of burden. They only need to send and receive digital currency simply. Too many complex functions increase the learning time cost of users and affect the experience of wallet users
atoken
atoken is a mobile wallet supporting multi currency cross chain exchange, which is safe and convenient. At present, it supports BTC, LTC, ETH, etc, Doge, EOS and other main chain currencies; BCD, BTG, BCH, SBTC, etc; Support all tokens of Ethereum erc20
users hold their own private key, which is stored in app with multiple encryption. They do not access the server in any form, and no one else can touch your digital assets; The wallet adopts 5-layer HD, horizontal isolation and vertical defense architecture; Pbkdf2, sha-512 and other encryption algorithms are used. At the same time, atoken implements the transaction acceleration function of wallet and supports the transaction acceleration of bitcoin and Ethereum
disadvantages: there is no market information in the wallet, which is inconvenient for users to use.
in terms of cloth storage and mining, I recommend Heshu hardware wallet and jiajiabao intelligent home miner. The core advantage of the proct is safety
take sum hardware wallet as an example. The advantages of sum hardware wallet are as follows:
1. The private key seed is encrypted layer by layer, physically isolated and never touched the Internet.
firstly, when creating the wallet, the seed password is generated and stored in the local encryption chip, and the 10 bit payment password is required
then, the transaction is made in the wallet. At this time, the user needs to enter the payment password to obtain the private key to digitally sign the transaction, and the transaction is completed. In addition, the private key seed is permanently stored in the chip, which is physically isolated and never touches the Internet. There is no need to worry about my password being stolen by hackers
Second, the bank system verifies the financial level motherboard and encryption chipuses the bank system to verify the financial level motherboard, and the private key seed is stored in the chip. If the proct is stolen or lost, and destroyed by malicious violence, the chip will trigger a self destruct circuit, and immediately permanently and irrecoverably delete all the information in the area
Third, it supports the withdrawal of global bitcoin ATM, which is convenient and fastthe reason why digital assets attract the attention of many fields in the world is that it is creating a global fast circulation, and the larger the circulation field is, the wider the scope is, and the higher its use value is. The core of digital assets is the medium it acts on among currencies. The Heshu wallet has built-in many mainstream exchanges in the world. It can trade digital assets anytime and anywhere. With one machine in hand, it can walk around the world without worry, and no longer have to worry about exchanging foreign currency
Different from conventional digital wallets, multi signature wallets need the authorization of multiple key holders to transfer digital currency, so the security of multi signature wallets is higher. Ordinary Wallet: a wants to transfer a bitcoin to X. A only needs his signature (using the private key) to complete the transaction. Sum Wallet: if a wants to transfer a bitcoin to x, a multi signature verification is set (at least two signatures of Abc3 indivials are required to transfer the money), then a needs B or C to complete the signature (using the private key) when a wants to transfer the money to X. I hope I can help you. Thank you2. Shanzhai coin is called Shanzhai coin because it has many similarities with mainstream coin in technical mode. Shanzhai coin also has its own real project, which is based on the underlying technology of blockchain and is implemented according to the plan of its white paper. The common counterfeit coins are EOS and BTM
3. Generally speaking, there is only one white paper that looks very strong. However, in the actual development, there may not be any procts or business landing. People just want to make money. However, the current laws and regulations have no way to take it, using formal means to achieve the goal of money. Hero chain, superstar, space chain and so on Welcome to the previous articles of chain horse: it has dropped from 2.6 yuan to 0.1449 yuan, breaking 18 times in six months, and the routine of air currency can't be prevented)
4. MLM currency, in the name of blockchain, has nothing to do with blockchain. The currency he issued can't be found on the Internet, and it's completely internal control. Usually, people will build their own trading platform, and then the K-line of the coin will always rise, telling investors that our future value will exceed bitcoin.
Generally speaking, blockchain wallet is used to store digital currency. In fact, blockchain wallet does not store digital currency, but a tool to store key (private key and public key). With the key, you can have the right to control the digital currency in the corresponding address, and use the digital currency collection address generated in blockchain wallet, You can accept the digital currency transferred to you by others, and you can also transfer the digital currency you own to others.
classification of digital currency wallets:
can be roughly divided into two categories, hot wallet (online wallet) and cold wallet (offline wallet)
first, hot wallet
Hot wallet is also called online wallet, It includes light wallets and heavy wallets (all node wallets). The wallets that need to be connected to the Internet can be directly traded
1. Light Wallet:
does not store the complete blockchain, only stores the data related to itself. It is small in size and can run on mobile phones, computers, web pages, etc
advantages and disadvantages: it does not occupy memory, supports a variety of digital assets, has a good user experience, is fast for novices, but transaction verification is a little slow
2. HEAVY WALLET (full node wallet)
maintains all blockchain data, completely decentralizes and synchronizes all data. It has better privacy and can verify the validity of transaction data locally
advantages and disadvantages: it has better privacy and faster verification of information, but it needs to synchronize data before each use, takes up a lot of hard disk space, and does not support multiple digital currency transactions
Second, cold wallet
cold wallet is not connected to the Internet, also known as offline wallet; For example, professional hardware devices, or private keys (mnemonics) written on paper
1. Hardware wallet
Hardware wallet is to store digital currency with professional hardware, store the private key of digital assets in a chip, isolate it from the Internet, and plug and play
2. Paper wallet
the advantages and disadvantages of writing the private key on paper and then deleting
cold Wallet:
is relatively safe, but it is very troublesome to create a wallet and trade. It is difficult for novices to operate, and the price of wallets is relatively expensive, generally ranging from thousands to tens of thousands of yuan. If you don't have a large amount of digital assets, you don't need to consider
generally, it's recommended for novices to use light wallet. Light wallet is easy to operate and easy to use. Personal used geekwallet
simple and convenient light wallet supports bitcoin (BTC), lightcoin (LTC), Ethereum (ETH), EOS Storage and management of mainstream digital currency assets such as usdt
using bip44 mnemonics, local private key, off-line signature and other security mechanisms, as well as mobile phone and computer al backup strategy, completely solve the loss of digital currency assets caused by hacker attack, virus infection, mobile phone loss, forgetting mnemonics and other ways, and provide users with online Multi Chain digital assets one-stop management service. The platform also has tiaoshao market, which can carry out token trading of physical assets on the chain
Recently, Huawei and tpcast jointly completed the instry's first cloud VR service verification under 5g experimental network, realizing real-time cloud rendering of interactive CG (computer graphics) VR content, which is a revolutionary progress in the history of VR instry
from last year to this year, Huawei cloud seems to have sprung up. We can always see Huawei cloud's achievements in the media
according to the data on Huawei's official cloud website, Huawei released its cloud strategy in 2010, and then officially released its cloud operating system fusionsphere after three years, and there has been no substantial progress in the next four years. It was not until Xu Zhijun, vice chairman and CEO of Huawei, announced the establishment of cloud Bu ring the Huawei China ecological partnership conference in March 2017 that Huawei began to make full use of cloud computing and achieved rapid development
it can be said that Huawei cloud really started in 2017, which is quite late in the highly competitive cloud computing market, but the rapid progress of Huawei cloud is obvious to all, isn't it surprising for many people
coincides with the critical period of instry upgrading
public cloud has been developing for ten years in the world, and the first batch of customers are mainly Internet enterprises. In this generation of public cloud, Amazon, Microsoft and Alibaba have obvious advantages. But at present, two changes have taken place in the market: first, more customers of traditional enterprises or government agencies begin to migrate to the cloud, transforming the traditional architecture with cloud computing, big data and artificial intelligence technologies, and enjoying the dividends of these new technologies. Second, the last generation of public cloud has been developing for ten years, and the technology and architecture are facing upgrading. Especially with the help of a new round of artificial intelligence tide, it is the general trend for enterprises to go to the cloud, and creating cloud ecology has become the top-level construction goal of the cloud instry
It has such instry-leading data processing capabilities, but it does not touch data, which includes three sentences: the first sentence: Huawei does not use technical means to obtain customer data in the background, and recognizes the data sovereignty of the enterprise; The second sentence: Huawei does not commercialize customers' data and will never force enterprises to exchange data with Huawei; The third sentence: Huawei will open up its cloud and big data capabilities to help enterprises process data and give full play to the value of dataas we all know, the data on the public cloud is the most sensitive topic in the whole instry. Huawei has been emphasizing "don't touch data" since its first day. Under the guidance of this strategic idea, Huawei has won the trust of a large number of partners in a short time. By the end of 2017, Huawei cloud had nearly 2000 ecological partners. With the help of so many partners, it is impossible for Huawei cloud to be strong
"action group" corporate culture
people who know Huawei all know that this company is a typical "action group": if you don't do what you want to do, you have to do it, do it with all your strength, do the best, and do it to an incomparable degree. This is true of Huawei's enterprise business and Huawei's consumer business, which have continued to rise in recent years. Now it's Huawei's turn to cloud business
in any instry, it is the doers who really decide the direction of the instry, which is exactly where Huawei's culture lies. Huawei cloud Bu has been formally established for just one year, which not only shows its strength and sincerity to the instry, but also shows its low-key, pragmatic and honest attitude
on December 17, 2017, Huawei cloud and Tuowei Information System Co., Ltd. established cooperation to build nine public cloud instry solutions for the government and enterprises based on Huawei cloud; On January 27, 2018, Huawei cloud and UFIDA cloud jointly released four general enterprise services: Marketing cloud, collaboration cloud, tax cloud and U8 cloud; In February 2018, Huawei cloud officially released the deep learning service and blockchain service BCS; On March 15, 2018, Huawei cloud announced the opening of a Hong Kong data center to help enterprises reach the world and innovate in the future
the data shows that the number of Huawei cloud services has increased from 45 in 10 categories at the end of 2016 to more than 100 in 14 categories at present, including more than 60 solutions such as manufacturing, healthcare, EI enterprise intelligence, e-commerce, sap, HPC high performance computing, IOT, etc. Since the establishment of cloud Bu, the number of users and resource usage of Huawei cloud have increased three times
according to the market report from IDC, Huawei's cloud government cloud solutions are among the leading manufacturers in China's Government cloud market; Fusioncloud's private cloud solution ranks first in China
1. Security risk of running environment
the core file of encrypted digital currency Wallet - private key / mnemonics is stored on the terminal device, whether it is PC or mobile terminal, if the terminal device appears unsafe phenomenon, it has a very high security risk for private key / mnemonics
at the beginning of design, a secure digital wallet can avoid the possibility of private key / mnemonics being stolen e to the running environment. The security problems of the running environment on the terminal mainly include virus software, operating system vulnerabilities and hardware vulnerabilities
2. The security risk of network transmission
the security of network transmission is more reflected in the ability to resist man in the middle attack. Man in the middle attack means that the attacker creates independent contact with both ends of the communication and exchanges the data they receive, so that both ends of the communication think that they are talking directly with each other through a private connection, but in fact the whole conversation is completely controlled by the attacker
although most digital wallet applications use the HTTPS protocol to communicate with the server, the man in the middle attack method is to get the content of the HTTPS protocol by installing a digital certificate in the user terminal
a secure digital wallet needs to be able to scan the legality of all the digital certificates in the terminal, check the proxy settings in the network transmission process, and ensure the security of the basic network communication environment
in the development of digital wallet, whether to use two-way verification for communication verification at the network transmission level is also an important criterion to measure the security of a digital wallet application
3. The security risk of file storage mode
for the private key / mnemonics of digital wallet, the storage mode of terminal device also needs to be paid attention to in the security design. The access right of private key / mnemonic file directory, the form of private key / mnemonic file storage and the design of encryption algorithm all need to be strictly designed
when we analyze the security of several mainstream digital wallets, we find that even the well-known digital wallets are random in the storage of private key / mnemonic words. There are both plaintext storage and encrypted storage, but the decryption key is fixed in the code, which can not play any role in security defense
4. The security risk of the application itself
the security risk of the application itself mainly focuses on the security defense of the application installation package itself
whether the application installation package has the ability of anti tampering is a very core technical ability. In addition, memory security, anti debugging ability, life cycle management of private key / mnemonics, security of debugging log and security of development process also need to be enhanced
5. Security risk of data backup
if the mobile application can be backed up, it can use the machine with more powerful computing performance to brutally crack the private key / mnemonics. For example, if android:allowBackup Property is set to allow backup, then the backup mechanism of the system can be used to back up the application data files, and the private key / mnemonics of the encrypted digital currency will be backed up to the external media, which breaks the security boundary design of the operating system from another direction
for the majority of users, the security of digital wallet also means the security of wealth, so we must be careful when choosing digital wallet.