Position: Home page » Ethereum » Ethereum grabs hash

Ethereum grabs hash

Publish: 2021-05-14 10:38:36
1. When it comes to money, mining is indispensable. In ethereum network, if you want to get Ethereum, you also need to mine it. When it comes to mining, there must be a consensus mechanism
do you remember what the consensus mechanism of bitcoin is? The consensus mechanism of bitcoin is pow. To put it simply, the more work you do, the higher the amount of computation you pay, the more likely you will be the first to find the correct hash value, and the more likely you will be rewarded with bitcoin
however, there are some defects in the pow of bitcoin, that is, it is too slow to process transactions, and miners need to constantly collide hash values through calculation, which is costly and inefficient. Friends who are interested in blockchain knowledge should see such a saying:
in order to make up for the deficiency of bitcoin, Ethereum has proposed a new consensus mechanism, called POS (this is the abbreviation of English, which means "proof of equity", also translated into "proof of equity")
POS simply means the same as its literal meaning: equity, equity. The more currency you hold, the more equity you have, the higher your equity
Ethereum's POS means that the more money you hold, the longer you hold it, the less difficult it will be to calculate and the easier it will be to mine
in the initial setting of Ethereum, Ethereum hopes to build a relatively stable system by using POW in the early stage, then graally adopt POW + POS, and finally completely transition to POS. So, it's true that the consensus mechanism of Ethereum is POS, but POS is only a plan or goal at the beginning of Ethereum's release. At present, Ethereum has not yet transitioned to POS, and the consensus mechanism adopted by Ethereum is still pow, that is, the pow of bitcoin, but it is slightly different from the pow of bitcoin
the amount of information here is a bit large,
the first information point is that the consensus mechanism currently adopted by Ethereum is also pow, but it is slightly different from the pow of bitcoin. So, what's the difference between the pow of Ethereum and bitcoin: in short, the mining difficulty of Ethereum can be adjusted, but the mining difficulty of bitcoin can't be adjusted. Just like our college entrance examination, because the teaching situation and the number of students in different provinces are not the same, so the college entrance examination is divided into national papers and provincial independent proposition
Ethereum said that I am in favor of the topic by region. Bitcoin said: No, it must be the same volume in the whole country. The difficulty is the same for everyone
the popular explanation is that bitcoin uses computer computing power to do a lot of hash collisions, enumerate various possibilities to find a correct hash value. The Ethereum system has a special formula to calculate the difficulty of each block. If a block is verified faster than the previous block, Ethereum protocol will increase the difficulty of the block. By adjusting the block difficulty, the time needed to verify the block can be adjusted
according to the Ethereum protocol, the dynamic adjustment method of difficulty is to make the time interval of creating new blocks in the whole network 15 seconds, and the network uses 15 seconds to create blockchain. In this way, because the time is too fast, the synchronization of the system is greatly improved, and it is difficult for malicious participants to launch 51% (that is, more than half) of the computing power to modify historical data in such a short time
the second information point is: in the initial setting of Ethereum, we hope to achieve the transition from POW to
POS through phased upgrade
dating back to 2014, at the beginning of Ethereum's launch, the team announced that the launch of the project would be divided into four stages, namely, Froniter, homestead, metropolis and serenity. In the first three stages, the consensus mechanism adopts pow (workload proof mechanism), and in the fourth stage, it switches to POS (equity proof mechanism)
on July 30, 2015, the first phase "frontier" of Ethereum was officially released. This phase is only suitable for developers. Developers can write smart contracts and decentralized application DAPP on Ethereum network, and miners begin to enter Ethereum network to maintain network security and get Ethereum coins. The leading-edge version is similar to the beta version, proving whether the Ethereum network is reliable or not
on March 14, 2016, Ethereum entered the second stage of "homeland". In this stage, Ethereum provides the wallet function, so that ordinary users can easily experience and use Ethereum. There is no obvious technology improvement in other aspects, but it shows that Ethereum network can run smoothly
in September 2017, Ethereum has reached the third stage of "metropolis"“ "Metropolis" is composed of Byzantine and Constantinople. The goal of this stage is to introce the hybrid chain mode of POW and POS, so as to prepare for the smooth transition from POW to POS. This is the latest popular "Ethereum Constantinople upgrade". In the Constantinople upgrade, Ethereum will make some changes to the underlying protocols and algorithms to lay a good foundation for the implementation of POW and
POS
how much reward will Ethereum get for mining? Miners who win the block creation competition will get the following income:
1. Static reward, 5 ethereums
2. The fuel cost in the block, i.e. gas, we talked about in the last issue
3. As a part of the block, it includes the extra reward of "Uncle block". Uncle is uncle of uncle, and each uncle block can get 1 / 32 of the mining reward as a reward, that is, 5 times 1 / 32, which is equal to 0.15625 ethereums. Here, let's briefly explain the concept of "TERT block". The concept of "TERT block" was proposed by Ethereum. Why should we introce the concept of TERT block? This also starts with bitcoin. In the bitcoin protocol, the longest chain is considered absolutely correct. If a block is not part of the longest chain, it is called a "orphan block". An isolated block is a block, which is also legal, but it may be found later, or the network transmission is slower, and it does not become part of the longest chain. In bitcoin, the solitude is meaningless and will be discarded later, and the miners who find the solitude will not receive mining related rewards
however, Ethereum does not think that isolated blocks are worthless, and Ethereum system will give rewards to miners who find isolated blocks. In Ethereum, isolated blocks are called "Uncle blocks", which can contribute to the security of the main chain. Ethereum's ten second block interval is too fast, which will rece the security. By encouraging the use of tertiary blocks, the main chain can obtain more security guarantees (because the isolated block itself is legal). Moreover, paying the tertiary block can also stimulate the miners to actively mine and actively use tertiary blocks. Therefore, Ethereum thinks that it is valuable.
2.

First of all, we need to understand what is MLM:

MLM refers to the illegal behavior of organizers and development personnel to obtain wealth by calculating and paying remuneration to the developed personnel based on the number or performance of the personnel directly or indirectly developed, or requiring the developed personnel to pay certain fees to obtain the qualification to join. The essence of MLM is "Ponzi scheme", that is to say, the money of later comers is distributed to the income of former comers

However, the new type of MLM does not restrict personal freedom, does not accept ID cards and mobile phones, and does not take classes collectively. Instead, it uses capital operation as a banner to pull people to cheat money, drives luxury cars, wears gold and silver, and uses money to attract your relatives and friends to join in, and finally makes you lose all your money

then judge whether the ether coin is a kind of MLM, whether you need membership fee, whether you need to ask your relatives and friends to join

extended materials:

Ethereum is an underlying technology platform on which developers can create distributed applications. With the application, there will be transactions. With a transaction, you need money to complete the transaction. In this way, money has value, and investors' investment has a return. If the transaction volume on the platform is larger and larger, the demand for money will be higher and higher, and the money will be more and more valuable

from the perspective of image, bitcoin creates a kind of digital gold, while Ethereum creates a country, and Ethereum is the credit currency of the country

after bitcoin, there are thousands of digital virtual currencies in the world, many of which are completely deceptive in the guise of "digital currency". Previously, Haikou Municipal Public Security cracked down on a pyramid selling organization called "Eurasian currency", which operated on the internet pyramid selling platform, making more than 40000 investors cheated, involving 4.06 billion yuan. The field of virtual currency has just started, so we need to be cautious

resources : Ethernet money network

3. At present, the most popular way of bitcoin trading is contract trading. According to the rise and fall of the price, it is far better to obtain income than the traditional mining and direct trading. After all, there is no need to really hold virtual currency, just need to judge whether the price is up or down, which is very suitable for the existing investors, simple and convenient
4. Blockchain itself solves the problem of large-scale cooperation between strangers, that is, strangers can cooperate with each other without mutual trust. So how to ensure the trust between strangers to achieve mutual consensus mechanism? The centralized system uses trusted third-party endorsements, such as banks. In the eyes of the common people, banks are reliable and trustworthy institutions. The common people can trust banks to solve real disputes. But how does a decentralized blockchain guarantee trust
in fact, blockchain uses the basic principles of modern cryptography to ensure its security mechanism. The knowledge system involved in the field of cryptography and security is very complicated. Here, I only introce the basic knowledge of cryptography related to blockchain, including hash algorithm, encryption algorithm, information digest and digital signature, zero knowledge proof, quantum cryptography, etc. Through this lesson, you can learn how to ensure the confidentiality, integrity, authentication and non repudiation of the blockchain using cryptography technology
basic course lesson 7 basic knowledge of blockchain security
1. Hash algorithm (hash algorithm)
hash function (hash), also known as hash function. Hash function: hash (original information) = summary information. Hash function can map any length of binary plaintext string to a shorter (generally fixed length) binary string (hash value)
a good hash algorithm has the following four characteristics:
1. One to one correspondence: the same plaintext input and hash algorithm can always get the same summary information output
2. Input sensitivity: even if the plaintext input changes slightly, the newly generated summary information will change greatly, which is greatly different from the original output
3. Easy to verify: plaintext input and hash algorithm are public, anyone can calculate by themselves, and whether the output hash value is correct
4. Irreversibility: if there is only the output hash value, the hash algorithm can never dece the plaintext
5. Conflict avoidance: it is difficult to find two plaintexts with different contents, but their hash values are the same (collision)
for example:
hash (Zhang San lent Li Si 100000 yuan for 6 months) = 123456789012
such a record as 123456789012 is recorded in the account book
it can be seen that hash function has four functions:
simplify information
it is easy to understand, and the information after hashing becomes shorter
identification information
you can use 123456789012 to identify the original information, and summary information is also called the ID of the original information
hidden information
the account book is a record like 123456789012, and the original information is hidden
verification information
if Li Si cheated that Zhang San only lent Li Si 50000 when repaying, both parties can verify the original information with the hash value of 123456789012 recorded before
hash (Zhang San lent Li Si 50000 for 6 months) = 987654321098
987654321098 is completely different from 123456789012, which proves that Li Si lied, Then the information can't be tampered
common hash algorithms include MD4, MD5 and Sha series algorithms, and Sha series algorithms are basically used in mainstream fields. Sha (secure hash algorithm) is not an algorithm, but a group of hash algorithms. At first, it was SHA-1 series, and now the mainstream applications are sha-224, SHA-256, sha-384 and sha-512 algorithms (commonly known as SHA-2). Recently, Sha-3 related algorithms have been proposed, such as keccak-256 used by Ethereum
MD5 is a very classic hash algorithm, but unfortunately, both it and SHA-1 algorithm have been cracked. It is considered by the instry that its security is not enough to be used in business scenarios. Generally, sha2-256 or more secure algorithm is recommended
hash algorithm is widely used in blockchain. For example, in blocks, the latter block will contain the hash value of the previous block, and the content of the later block + the hash value of the previous block will jointly calculate the hash value of the later block, which ensures the continuity and non tamperability of the chain< Encryption and decryption algorithm is the core technology of cryptography, which can be divided into two basic types: symmetric encryption algorithm and asymmetric encryption algorithm. According to whether the key used in the encryption and decryption process is the same or not, the two modes are suitable for different needs, just forming a complementary relationship, and sometimes can be combined to form a hybrid encryption mechanism
symmetric cryptography (also known as common key cryptography) has the advantages of high computational efficiency and high encryption strength; Its disadvantage is that it needs to share the key in advance, which is easy to leak and lose the key. The common algorithms are des, 3DES, AES and so on
asymmetric cryptography (also known as public key cryptography) is different from the encryption and decryption key, and its advantage is that it does not need to share the key in advance; Its disadvantage is that it has low computational efficiency and can only encrypt short content. Common algorithms include RSA, SM2, ElGamal and elliptic curve series. Symmetric encryption algorithm is suitable for the encryption and decryption process of a large number of data; It can't be used in signature scenario: and it often needs to distribute the key in advance. Asymmetric encryption algorithm is generally suitable for signature scenario or key agreement, but it is not suitable for large amount of data encryption and decryption< Third, information digest and digital signature
as the name suggests, information digest is to hash the information content to obtain a unique digest value to replace the original and complete information content. Information digest is the most important use of hash algorithm. Using the anti-collision feature of hash function, information digest can solve the problem that the content has not been tampered
digital signature is similar to signing on paper contract to confirm contract content and prove identity. Digital signature is based on asymmetric encryption, which can be used to prove the integrity of a digital content and confirm the source (or non repudiation)
we have two requirements for digital signature to make it consistent with our expectation for handwritten signature. First, only you can make your own signature, but anyone who sees it can verify its validity; Second, we want the signature to be only related to a specific file and not support other files. These can be achieved by our asymmetric encryption algorithm above
in practice, we usually sign the hash value of information instead of the information itself, which is determined by the efficiency of asymmetric encryption algorithm. Corresponding to the blockchain, it is to sign the hash pointer. In this way, the front is the whole structure, not just the hash pointer itself< Zero knowledge proof means that the verifier can make the verifier believe that a certain conclusion is correct without providing any additional information to the verifier
zero knowledge proof generally meets three conditions:
1. Completeness: authentic proof can make the verifier successfully verify
2. Soundness: false proof can not make the verifier pass the verification
3. Zero knowledge: if you get proof, you can't get any information other than the proof information from the proof process< With more and more attention paid to the research of quantum computing and quantum communication, quantum cryptography will have a huge impact on the information security of cryptography in the future
the core principle of quantum computing is that qubits can be in multiple coherent superposition states at the same time. Theoretically, a large amount of information can be expressed by a small number of qubits and processed at the same time, which greatly improves the computing speed
in this way, a large number of current encryption algorithms are theoretically unreliable and can be cracked, so the encryption algorithm has to be upgraded, otherwise it will be broken by quantum computing
as we all know, quantum computing is still in the theoretical stage, which is far from large-scale commercial use. However, the new generation of encryption algorithms should consider the possibility of this situation.
5. With the upgrading of Ethereum to version 2.0 this year, the consensus mechanism will be converted to POS, which will have a huge impact on miners. There are two choices for miners. One is to sell mining equipment and buy eth to adapt to the stacking mechanism of POS; The second is to switch the miner to other networks supporting GPU miner. Nick foster, a representative of kabombacks, a US mining equipment distributor, said most eth miners would choose the latter

after Ethereum is upgraded to version 2.0 POS mechanism, miners may switch mining machines to other networks
as Ethereum is finally ready to start its Ethereum 2.0 upgrade later this year, thus eliminating the long-term delay, the network will start to move towards the proof of rights model

therefore, the network will give up the workload proof consensus algorithm, so that eth miners have little choice. As their equipment will become obsolete, they will be forced to start mining counterfeit coins or re qualify as eth mortgagors. So, what is the current situation of Ethereum mining? With the coming transition, what will happen to the whole instry< At present, Ethereum consensus is based on POW system, which is similar to bitcoin (BTC). As a result, Ethereum's mining process is almost the same, as miners use their computing resources to earn rewards for each block they try to complete< However, there are still major differences between these processes. Although bitcoin mining has relied almost entirely on ASIC (large, loud machines designed specifically for cryptocurrency mining, most of which are concentrated in areas with low electricity prices), Ethereum's pow hash algorithm ethash is designed to support global chip manufacturers (such as NVIDIA and AMD). As Thomas Heller, global business director of cryptocurrency mining pool f2pool, explained in a conversation with cointegraph, GPU is much cheaper and easier to access than ASIC

"as ASIC is a very professional machine, when a new generation of procts is released, it is usually a huge technological leap. As a result, they have a much higher hash rate and are more energy efficient than the previous generation. This means that those manufacturers have spent a lot of money to research and develop it. Their machines are usually very expensive, and GPUs are much cheaper. "

Heller added that those who use GPU miners "have more flexibility to mine." For example, the popular NVIDIA geforce GTX 1080 Ti card can mine more than 15 different currencies, while ASIC units usually support only one currency

nevertheless, Ethereum is not completely immune to ASIC miners - at least in its current state. In April 2018, bitcontinent released antminer E3, an ASIC specially proced for mining Ethereum. Although widely praised for its hash rate of 180 megahashes per second and power consumption of 800 watts, it has received different responses from the Ethereum community. After the ASIC is inserted, a considerable number of GPU rig owners seem to suffer from loss of profits, and some are even forced to switch to other networks

"in the white paper, ETH must have ASIC resistance. I would like to say that the white paper stands for something "is one of the highest comments on the AR / ethermining topic about the topic discussed when antminer E3 was announced. Another reddit user argued that "the $800 only applies to 180mh."“ Split or die of a nation. "

some Ethereum users continue to suggest that bitmain's mining devices can lead to greater concentration, thus increasing the possibility of attack by 51%. Soon, a group of developers put forward "programmed workload proof" or progpow, which is an extension of the current Ethereum algorithm ethash, aiming to make GPU more competitive and promote decentralization

according to a paper published in March by Kristy Leigh Minehan, co-founder of progpow, about 40% of the hash rate of Ethereum is generated by bitmain ASIC. Alejandro de la Torre, the vice president of poolin, is the sixth largest pool of eth. He confirmed to cointegration that "GPU mining is still dominant" in Ethereum network, and added:

"at present, the profit of eth mining is not high, and the management threshold and cost of GPU equipment are higher than ASIC equipment. Compared with ASIC devices, GPU devices are more flexible, and you can use other algorithms to switch to other coins. "

progpow has not been integrated into Ethereum, and it is not clear when it will be finally implemented - in March, Ethereum core developers were debating whether progpow will really benefit the network in nearly two hours, and failed to reach a consensus. It is worth noting that a bitmain representative has previously told cointegraph that the mining hardware giant does not intend to extend the service life of antminer E3 to start operation after October 2020: "as far as we know, mining will end in October or some time after that."

a safe but uncertain future

indeed, Ethereum will stay away from mining in the future. Ethereum 2.0, which is planned to be launched later in 2020, is a major network upgrade on the blockchain, aiming to transfer its current POW consensus algorithm to a virtual POS (known as "block verifier")

more specifically, users are randomly selected considering their wealth in the network or their "interests". In other words, the more coins a POS verifier chooses to put in, the more coins accumulated as a reward

according to vitalik buterin, the co-founder of Ethereum, e to the transition, the network will be more secure and the attack cost will be higher than the network of bitcoin, although the debate about the better consensus algorithm in the encryption community has lasted for many years. However, it is not clear when to start Ethereum 2.0, as many errors and management issues are reported to be delaying the process

another hypothetical benefit of POS system is that it has higher energy efficiency than pow blockchain. According to digiconomist, the cryptocurrency's total annual footprint is 59.31 terawatts per hour, which is comparable to the electricity consumption of Greece as a whole. However, since a report in July 2019 estimated that 74% of the exploitation of bitcoin was done using renewable energy, the environmental impact of bitcoin does not seem to be so serious

what will happen to the actual Ethereum miner? According to the documentation of Casper upgrade as part of Ethereum 2.0 roadmap, the network will initially support a hybrid model including both POW and POS, thus providing some space for block verifiers and GPU / ASIC miners. Jack O & 39, CEO of skale network; "There will definitely be a transition period when two networks are running at the same time," Holleran told cointegration The CEO of scale network (based on Ethereum's blockchain platform) gave a detailed description of this process:

"the transition from eth1 to eth2 takes time of course - it may be years rather than months. The good news about this slow transition is that dapps and defi platforms will be able to roam around based on survivability, security and real-world evidence of adoption. This is a positive impact on the Ethereum ecosystem. "

dig or not

once Ethereum is fully in the POS orbit, miners will have two options. One is to sell the equipment and use the money to accumulate more Eth and start mortgage. The other is the choice for GPU miners, which is simply switching to other ethash networks and mining counterfeit money. Nick foster, a representative of kabombacks, a US mining equipment dealer, told cointegration that most eth miners would choose the latter:

"what I want to say is that most of the miners have not really entered Ethereum or the mining of specific tokens. Yes, there is a certain amount of mineral deposits and holds, but I oppose the view that a large number of Shanzhai coin miners hold their coins at any time. "<

foster then described how he used 3gb GPU units to mine ethash's point-to-point blockchain asset ravencoin (RVN). Once it was unable to mine eth, he said, "this is the reason for mining crows. I immediately sold stability to BTC, and then sold it to US dollars to pay for my rights. I would say that a lot of people are adopting this strategy. "

as foster concludes, he wants eth miners to jump out of the network, and new players - those who don't invest in power infrastructure or drilling rigs - will take a stake in eth. He described the following:

"I can't imagine if I found a five-year lease with $0.04 of electricity and I was mining eth, I decided to sell everything and then continue to pay the rent so that I could hold eth as a share. Substitute. "

Marc fresa, founder of asic.to, a mining firmware company, agreed in a conversation with cointegraph: "if you invest in mining, you won't bet because you have enough room to grow."

one of the main counterfeit coins that may benefit from POW miners leaving Ethereum is Ethereum classic (etc), which is a more conservative version of the blockchain. It is reported that there is no POS related plan. As it also runs on the ethash algorithm, the startup of Ethereum 2.0 may lead to the migration of miners, so its hash rate may have a significant peak

eth's larger pools have similar options. When asked about the company's plans for Ethereum after pow, Heller told cointegraph that after the announcement of Ethereum's POS upgrade, f2pool launched a sister company called story.fish in early 2018. Story.fish has started to provide mortgage services for other POS and delegated POS projects, such as tezos (xtz), Cosmos (atom) and Cardano (ADA), e to numerous handover delays. For prin, e to the transition to POS, it "may temporarily give up supporting eth mining," de la Torre told cointegraph

other top eth pools, namely nanopool, ethermine, pool center, sparkpool and spiderpool, did not respond to requests for comment from cointegraph.
6.

Yes, refer to the interaction between contracts. Digital currency exchange platform for example, I am trying to sign a smart contract from another factory contract and then redeploy the address of the new smart contract. However, the address it returns is the transaction hash, not the contract address. I believe this is because when the address is returned, the contract has not been exploited. When I deploy the smart contract with Web3, it seems that it will not output the contract address until the smart contract is deployed

7.

Hashtoken alliance

The full name of

GHP is global hash power. It is a global computing alliance formed by global bitcoin miners and established the Computing Alliance Foundation. Based on Ethereum erc2.0, it has a total circulation of 10 billion tokens, of which 5 billion are locked up for a long time and 50 million are in circulation

GHP provides bitcoin computing power by miners. Around the bitcoin computing power instry chain, it builds mines, mining, mining machine proction, computing power mall, computing power wallet, mine pool, computing power game, etc., and realizes computing power asset securitization

{rrrrrrr}

< H2 > extended information:

global hash power hash pass and ZT exchange have reached a strategic cooperative relationship. Global hash power hash pass (GHP) is scheled to launch zt.com digital currency exchange in the near future, and open GHP / eth, GHP / CNT trading pairs. At that time, ZT exchange will simultaneously open the currency charging function of global hash power hash pass (GHP)

relying on stable, professional and reliable technical support, ZT exchange has built a trading platform for blockchain digital currency, which is the most convenient to buy money and has the most convenient proceres, so as to truly meet the needs of global users. The operation performance of the exchange is also very stable, with real-time comparison of trading information, elastic flow protection and efficient order matching engine

8. Use this to dig... 30 on average, normal range. Vega 56, which is cheaper than Vega 56, has an average of 40... The lowest default is 34
9. the stone back. Now the big
10.


to tell you the truth, there is no big adaptation. The main reason is that the capacity of video memory is doubled, and the main frequency is increased a little.

non public 390 suggests choosing XFX, lanbao

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750