Position: Home page » Currency » LP digital currency

LP digital currency

Publish: 2021-03-26 20:06:49
1. Introction to seven core technologies of blockchain operation on January 15, 2018
1. Blockchain links
as the name suggests, blockchain is a chain composed of blocks. Each block is divided into block head and block body (including transaction data). The block head includes the prevhash value (also known as hash value) of the previous block used to realize the block link and the random number (nonce) used to calculate the mining difficulty. The hash value of the previous block is actually the hash value of the head of the previous block, and the random number calculation rule determines which miner can obtain the right to record the block
2. Consensus mechanism
blockchain is accompanied by the birth of bitcoin, which is the basic technology architecture of bitcoin. Blockchain can be understood as an Internet-based decentralized accounting system. A decentralized digital currency system like bitcoin requires the consistency of accounting of honest nodes without a central node, which needs blockchain to complete. Therefore, the core of blockchain technology is a consensus mechanism to reach a consensus on the legitimacy of transactions between indivials without mutual trust without central control
there are four main types of consensus mechanisms in blockchain: pow, POS, dpos and distributed consistency algorithm
3. Unlocking script
script is an important technology to realize automatic verification and contract execution on blockchain. Every output of every transaction does not point to an address in the strict sense, but to a script. A script is like a set of rules that constrain how the receiver can spend the asset locked on the output
the validation of transactions also depends on scripts. At present, it depends on two kinds of scripts: Lock script and unlock script. Locking script is a condition added to the output transaction, which is realized by a script language and located in the output of the transaction. The unlocking script corresponds to the locking script. Only when the conditions required by the locking script are met can the assets corresponding to the script be spent, which is located in the input of the transaction. Many flexible conditions can be expressed by script language. Interpretation script is similar to the "virtual machine" in our programming field, which runs in every node of the blockchain network in a distributed way
4. Transaction rules
blockchain transaction is not only the basic unit of a block, but also the actual effective content recorded by the blockchain. A blockchain transaction can be a transfer, or the deployment of smart contracts and other transactions
as far as bitcoin is concerned, a transaction refers to a single payment transfer. The transaction rules are as follows:
1) the input and output of the transaction cannot be empty
2) for each input of a transaction, if its corresponding utxo output can be found in the current transaction pool, the transaction will be rejected. Because the current transaction pool is the transaction not recorded in the blockchain, and each input of the transaction should come from the confirmed utxo. If it is found in the current trading pool, it is Shuanghua trading
3) for each input in a transaction, the corresponding output must be utxo
4) each input unlocking script must verify the compliance of the transaction together with the corresponding output locking script
5. Transaction priority
the priority of blockchain transaction is determined by the blockchain protocol rules. For bitcoin, the priority of a transaction to be included in a block is determined by the time when the transaction is broadcast to the network and the amount of the transaction. With the increase of transaction broadcast time on the network and the increase of transaction chain age, the priority of transaction will be improved and eventually be included by the block. For Ethereum, the priority of the transaction is also related to the transaction fee that the publisher is willing to pay. The higher the transaction fee that the publisher is willing to pay, the higher the priority that the transaction is included in the block
6. Merkle proof
the original application of Merkle proof is bitcoin, which was described and created by Satoshi Nakamoto in 2009. Bitcoin blockchain uses Merkle proof to store transactions in each block. So that the transaction can not be tampered with, but also easy to verify whether the transaction is included in a specific block
7. RLP
RLP (recursive length prefix) is one of the main encoding methods of object serialization in Ethereum. Its purpose is to encode the sequence of arbitrary nested binary data.
2. 1、 Decentralization:
blockchain technology does not rely on additional third-party management institutions or hardware facilities, and there is no central control. In addition to the self-contained blockchain itself, each node realizes information self verification, transmission and management through distributed accounting and storage. Decentralization is the most prominent and essential feature of blockchain< Second, openness:
the foundation of blockchain technology is open source. In addition to the private information of all parties to the transaction is encrypted, the data of blockchain is open to all. Anyone can query blockchain data and develop related applications through the open interface, so the information of the whole system is highly transparent< Third, independence:
based on consensus specifications and Protocols (similar to various mathematical algorithms such as hash algorithm used by bitcoin), the whole blockchain system does not rely on other third parties, and all nodes can automatically and safely verify and exchange data in the system without any human intervention< Fourth, security:
as long as 51% of all data nodes cannot be controlled, the network data cannot be arbitrarily controlled and modified, which makes the blockchain itself relatively safe and avoids subjective and artificial data changes
5. Anonymity:
unless there are legal requirements, technically speaking, the identity information of each block node does not need to be disclosed or verified, and information transmission can be carried out anonymously
Digital China is the first major development strategy explicitly put forward in the report of the 19th National Congress of the Communist Party of China. The application of digital technology represented by cloud computing, big data and mobile Internet is no longer limited to the economic field, but widely penetrated into all aspects of public services, social development and people's life, which requires macro coordination, overall control and integrated development
with the deepening of a new round of scientific and technological revolution and instrial change, the tide of digital economy in the world is unstoppable. The development of digital economy has become a global consensus, known as the key to the fourth instrial revolution
adhering to the connotation of the University of nice's world inclusive humanistic spirit, always embracing change, standing up to the tide, conforming to the development trend of the digital economy era, and integrating the essence of Chinese and Western cultural thinking, the University of nice's doctor of blockchain and digital economy management (DDE) came into being
based on this, we can enable the managers of digital economy instry to have global vision and global integration thinking, integrate knowledge, operate digital economy intelligently, promote the sustainable development of the instry, and contribute to the community of human destiny. Therefore, DDE project will cooperate with colleagues in the field of digital economy
if you have MBA related questions, you are welcome to contact me personally&# 180;&# 65381;&# 7447;&# 65381;` ) Bixin~~~~
3. Love needs to respond. If a person loves you very much and you don't respond to her, she will be disappointed graally. If she is disappointed, she will die

at this time, don't ask why, don't say that she loves me so much, how can she leave me? Love is limited, when her love is not cherished, when her love can not be responded, she naturally gave up

don't say "she will love me all her life." when she loves you, she really wants to love her all her life, but how do you completely ignore her? How can she love her

at the beginning, she will quarrel with you and quarrel with you. I hope you can pay attention to her and give her the love she wants. But slowly, she will no longer quarrel with you and discuss these things with you. It's just that she doesn't want to love any more and wants to give up this relationship

if you really love her, don't let her down, and don't let her feel cold. If your heart is cold, you can't cover it. If you are disappointed, you can't come back

you need to understand that the real death of a woman is not noise, but inner peace

it's very calm to really give up a person. She no longer has any emotion in her heart. She just wants to leave you. Leaving this relationship will only bring her pain

in fact, the more people quarrel and say they want to leave, the more they will not take the initiative to leave. Her quarrel with you is just to tell you that if you don't keep me, you will lose me

but if she really gives up, she will never want to stay, she will never want to entangle with you, just want to leave you calmly and say goodbye to this relationship

if one day she will leave you, it must be that she has accumulated enough disappointments before she chooses to give up you. Therefore, if you love her, don't let her down easily

when love leaves, it is silent. When she is no longer noisy, it is not compromise, but death

she doesn't have no pain, but chooses a person to bear it in silence. She is also telling you that she no longer expects you to stay, and she no longer has illusions about this relationship

in this process, she must have experienced a lot of disappointments, she must have struggled and hesitated, and in the end, she was silent and calm

at this time, she doesn't want to give you a chance any more. Noisy is because she cares about it. Noisy is because she still wants to continue. The real death is silent and endless

when she really leaves, she will not come to inform you. She will leave in silence, will not say hello to you, and will not cry and cry for you to stay, but will face her calmly

if you love her, don't hurt her. If you love her, don't let her give up on this relationship. Treat her well and cherish this relationship!
4. Open pit miner I cannot use crystals. The mining amount is moderate, and the ore can be mined without difference
open pit miner II can use crystals, and the initial mining amount is small. After equipping with corresponding crystals, the mining amount will be increased by at least 60%

crystal (ordinary crystal, oblique length, burning, dry coke, hydroborax). And so on)
using the corresponding crystal needs to learn the corresponding ore processing technology
when the ore gun changes the crystal, it needs to be in the non mining state, and it needs 1 second to replace
if you concentrate on mining, you should use crystals. After all, you need to dig more and change targets frequently
for leisure mining, it's better to use T1 miner. There is no difference between what is locked and what is g.
5. Anorthosite Income + 5% blue plagioclase, + 10% rich plagioclase)
6. Lpv9 itself is not MLM, it is a pseudo concept, read the following article of Guangming net, you will know what is going on. Nowadays, pyramid schemes, Ponzi schemes, and money collecting funds like to use the concepts of IPv9, the Internet of things, blockchain, digital currency, original stocks (rights), and smart city to package the big and big, so as to confuse the victims more
wake up, don't be fooled by IPv9 Source: guangming.com)

recently, IPv9, which holds high the "network sovereignty", "self-control" and "security gate", has made a comeback again. Different from the previous focus on "national complex", this time, in addition to emphasizing autonomy and control, IPv9 also brings in concepts such as Internet of things, blockchain, digital currency and smart city, which seems to find a new development direction for itself
in fact, IPv9 originated from an "April Fool's Day joke" of ieft (International Internet standards organization) more than 20 years ago. After being packaged several times in China more than 10 years ago, it was called "Internet of independent innovation" and carried out continuous "promotion and marketing"
recently, the Expert Committee on promoting the scale deployment of IPv6 held a "seminar on the development of China's IPv6 instry" in Beijing. While discussing the deployment of IPv6, the experts at the seminar countered and criticized some erroneous statements about the development of the Internet, represented by IPv9, for special purposes in recent years, and called on science and technology to crack down on counterfeits and eliminate the false while reserving the true<
an April Fool's Day joke was taken for granted
the origin of IPv9 is IETF's RFC 1606 on April 1, 1994. The article of this RFC is called "historical view of using IP version 9", written by Julian onions. Different from most international standard texts, the writing style of this RFC is obviously "postmodernist". In this paper, the author first sentenced the death penalty of IPv9, and then "flashback" evaluates the "life cycle" of IPv9 from the perspective of layer 42 routing, address allocation, application and manufacturing
later, Julian onions, the author of RFC 1606, confirmed to the media that RFC 1606 was just a joke and an "April Fool's Day joke". He said that the motivation for writing this article in 1994 was that ring the discussion on IPv6 at that time, some proposals were short-sighted and there was a problem of address waste in the planning, so he made a "joke" with everyone
this kind of joking work has completely changed its flavor after being seen by people who want to do it. Around 2000, with RFC 1606 as the theoretical basis, after careful packaging, the designers of IPv9 launched "decimal network composed of IPv9 and digital domain name", referred to as "IPv9"
the core of IPv9 is that the web address exists as a string of absolute numbers, and users can enter a simple digital domain name, such as "123456", to replace similar ones“ www.abc.com ”Such a domain name. Around the work of IPv9, the designer established a working group - "decimal network standard working group". Its official website describes: "decimal network system is mainly composed of IPv6 address protocol, IPv6 header protocol, IPv6 transition period protocol, digital domain name specification and other protocols and standards."
in the recent promotion of IPv9, the "inventors" of IPv9 have always emphasized the core values of IPv9 as follows: first, IPv9 adopts decimal network, which is an independent innovation; Second, the new Internet concept, new mechanism, rules and protocols proposed by IPv9 can make our country get rid of the situation that the root domain name server is controlled by the United States; Third, IPv9 is designed in China and is not controlled by foreign Internet, so it is more secure and controllable. In the continuous publicity, IPv9 has achieved more obvious publicity effect, and even in some media, IPv9 has been crowned as "a new generation of safe and controllable information network"
from "no response" to "criticism in unison"
in fact, the attitude of instry experts towards IPv9 was very clear more than 10 years ago. In March 2006, in view of the extensive publicity of IPv9 at that time and the principle of taking every new technology seriously, the national information technology expert committee held a forum on IPv9. After listening to the introction of IPv9 by some members of the decimal network working group, the experts seriously studied and analyzed the core ideas of "decimal network" and IPv9, This paper objectively evaluates the characteristics of IPv9, which adopts a new "decimal" address format different from IPv4 and IPv6, but the consequence of adopting a different address format is that people set up barriers to connect with the Internet, which is not desirable on the national public network, can not be standardized, and can not pass the review of domestic experts Immaterial changes have no guiding significance for the development of the Internet, and innovation is impossible
among them, the key and core reason is that IPv9 is not the Internet, but a domain name design. If China adopts this method, it means isolation from the Internet. At that time, Qian Hualin, former chief scientist of the computer network information center of the Chinese Academy of Sciences, asked, "is it good for us if our telephone network and Internet are isolated from foreign telephone networks and Internet?"
instry experts agree that the scientific and objective summary of IPv9 has been made, and there is no need to discuss it too much
however, after a period of silence, the supporters of IPv9 "make a comeback". In addition to emphasizing autonomy and control, they also bring in fashion concepts such as Internet of things, blockchain, digital currency and smart city, which seems to find a new direction for their own hype
the academic circles realize that this technology speculation in the name of "patriotism" can do much more than they think, but every opportunity such technology speculation obtains through marketing may have a serious impact on the future strategic decision-making of the country. Only in this way did the experts and academicians in the instry refute in unison at the "China IPv6 instry development seminar"
experts believe that IPv9 has not been recognized by international academia and instry, and its international impact is negative“ It deviates from the concept of open and innovative Internet development and tries to isolate China's Internet from the global Internet by establishing a "narrow gauge railway". This closed Internet has lost its real significance as an Internet. "
is it technological innovation or technological speculation
what is IPv9? Is it technological innovation or technological speculation“ It's ridiculous to spend time on IPv9. They're not the Internet at all, not even academic fraud; According to them, it is impossible to build a network. After so many years, where is their network? " Wu Jianping, academician of the Chinese Academy of engineering and director of the Department of computer science at Tsinghua University, said this in an exclusive interview
several core innovations are often mentioned in the publicity of IPv9:
first, it adopts decimal system and has more addresses than IPv6. In this regard, Wu Jianping said that more addresses are meaningless. IPv6 addresses already have 128 addresses to the power of 2, and every square meter has 26 addresses to the power of 10. Some people figuratively say that "if the earth is covered with a layer of sand, then every sand can have an IP address.". In other words, it is meaningless to use enough addresses, and it will bring more algorithmic pressure to the Internet, which can not be solved at all. Now the biggest problem faced by IPv6 network is the routing calculation pressure brought by large enough addresses. If it's innovation, isn't it easy to build an IPv6 10 or 8? Second, IPv9 says that the design of the domain name system is a major innovation of IPv9. They believe that if IPv4 or IPv6 is adopted, the United States holds the 13 root domain name servers of the Internet. Once the United States disconnects from providing domain name services to China, China's Internet will not work, and there is no such hidden danger in using IPv9
"this is not the case at all. Internet DNS (domain name system) root server is not the core button of the Internet. " Wu Jianping pointed out that Internet domain name service is an important application service of the Internet, but it is not a basic function of the Internet“ Take the mobile phone address book as an analogy. Now you can make a call directly through the address book, but you can make a call without the address book. You only need to record each phone number; Similarly, without the domain name server, the Internet can still work normally. For example, the dark network has no domain name service at all, but it is still running actively. The most basic way to access the Internet is to access by IP address, resolve the domain name, and finally resolve to a certain IP address. "
in addition, although there are only 13 official root servers in the world, there are hundreds of shadow root servers. Most of the daily access is not to these 13 root servers, but to shadow root servers, which can also assume the functions of global root servers. It is impossible for the global Internet root server operators to shut down all root servers, including shadow servers, at the same time
thirdly, in its publicity, IPv9 said that the Internet was designed by the United States, and the United States owns the ownership of the Internet. If it is very easy for the United States to disconnect China's Internet, can the United States disconnect China's Internet at any time? Wu Jianping said that there is no possibility that the Internet is different from traditional telecommunications. It has no global center, nor is it a hierarchical management model. It is a global network system with equal connectivity, and the networks of all countries are equal. The network structure is completely distributed outside the domain name system, so the Chinese Internet is an important part of the global Internet, not a part of the US internet. The global Internet is a public network in which "you connect me, I connect you" are interconnected and there is no center
fourthly, the publicity of IPv9 can solve the network security problems that perplex the world. In this regard, Wu Jianping said that no design can be perfect. No matter what kind of network architecture, there will be security problems. Before its real large-scale use, all security problems will not be exposed. Compared with IPv4, at the beginning of design, IPv6's security has been an important improvement goal; Many new functions have been added to IPv6, such as automatic encryption. In 2003, when China launched the next generation Internet demonstration project CNGI, experts and academicians analyzed this and drew the basic conclusion: IPv6 will never be more insecure than IPv4. Now, the conclusion should be that IPv6 is definitely more secure than IPv4. For example, the source address authentication technology is to solve the security problem from the Internet architecture level. It is to fundamentally solve the security problem, not to mend. In addition, although IPv6 has solved many security problems, it can not rule out new security problems, but it is sure to be better than IPv4“ It is unscientific and absurd to draw the conclusion that the network will be more secure without even carrying out the test network Wu Jianping said
What reflections can we get from the phenomenon of IPv9
in the United States, the birthplace of the Internet, people have no discussion about IPv9. VINT Cerf, the founder of the Internet, said that the "noise" in the development of the Internet is because its proponents have not yet understood how the Internet works. He also mentioned: "RFC 1606 has long been recognized as a joke on April Fool's day. IPv9 is completely out of the author's imagination. As an Internet architecture, IETF has never recognized IPv9, which violates the rules of the domain name system."
Why are foreign countries not "fooled" by technologies like IPv6? Wu Jianping believes that this is related to the Internet at home and abroad
7. Take a look at which clan you belong to. Each clan digs different mines in Gao'an. However, mining in Gao'an can not meet the demand of monthly cards. Therefore, it is suggested that LZ join the 00 Legion as soon as possible to have safe and efficient mining sites as well as mining bonus.
8. Introction to seven core technologies of blockchain operation
2018-01-15
1. Blockchain link
as the name suggests, blockchain is a chain composed of blocks. Each block is divided into block head and block body (including transaction data). The block head includes the prevhash value (also known as hash value) of the previous block used to realize the block link and the random number (nonce) used to calculate the mining difficulty. The hash value of the previous block is actually the hash value of the head of the previous block, and the random number calculation rule determines which miner can obtain the right to record the block
2. Consensus mechanism
blockchain is accompanied by the birth of bitcoin, which is the basic technology architecture of bitcoin. Blockchain can be understood as an Internet-based decentralized accounting system. A decentralized digital currency system like bitcoin requires the consistency of accounting of honest nodes without a central node, which needs blockchain to complete. Therefore, the core of blockchain technology is a consensus mechanism to reach a consensus on the legitimacy of transactions between indivials without mutual trust without central control
there are four main types of consensus mechanisms in blockchain: pow, POS, dpos and distributed consistency algorithm
3. Unlocking script
script is an important technology to realize automatic verification and contract execution on blockchain. Every output of every transaction does not point to an address in the strict sense, but to a script. A script is like a set of rules that constrain how the receiver can spend the asset locked on the output
the validation of transactions also depends on scripts. At present, it depends on two kinds of scripts: Lock script and unlock script. Locking script is a condition added to the output transaction, which is realized by a script language and located in the output of the transaction. The unlocking script corresponds to the locking script. Only when the conditions required by the locking script are met can the assets corresponding to the script be spent, which is located in the input of the transaction. Many flexible conditions can be expressed by script language. Interpretation script is similar to the "virtual machine" in our programming field, which runs in every node of the blockchain network in a distributed way
4. Transaction rules
blockchain transaction is not only the basic unit of a block, but also the actual effective content recorded by the blockchain. A blockchain transaction can be a transfer, or the deployment of smart contracts and other transactions
as far as bitcoin is concerned, a transaction refers to a single payment transfer. The transaction rules are as follows:
1) the input and output of the transaction cannot be empty
2) for each input of a transaction, if its corresponding utxo output can be found in the current transaction pool, the transaction will be rejected. Because the current transaction pool is the transaction not recorded in the blockchain, and each input of the transaction should come from the confirmed utxo. If it is found in the current trading pool, it is Shuanghua trading
3) for each input in a transaction, the corresponding output must be utxo
4) each input unlocking script (unlocking
) must verify the compliance of the transaction together with the corresponding output locking script (locking
)
5. Transaction priority
the priority of blockchain transaction is determined by the blockchain protocol rules. For bitcoin, the priority of a transaction to be included in a block is determined by the time when the transaction is broadcast to the network and the amount of the transaction. With the increase of transaction broadcast time on the network and the increase of transaction chain age, the priority of transaction will be improved and eventually be included by the block. For Ethereum, the priority of the transaction is also related to the transaction fee that the publisher is willing to pay. The higher the transaction fee that the publisher is willing to pay, the higher the priority that the transaction is included in the block
6. Merkle proof
the original application of Merkle proof is bitcoin, which was described and created by Satoshi Nakamoto in 2009. Bitcoin blockchain uses Merkle proof to store transactions in each block. So that the transaction can not be tampered with, but also easy to verify whether the transaction is included in a specific block
7. RLP
RLP (recursive
length
prefix) is a main encoding method of object serialization in Ethereum. Its purpose is to encode the sequence of arbitrary nested binary data.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750