Position: Home page » Ethereum » Ethereum Trojan horse

Ethereum Trojan horse

Publish: 2021-05-16 04:16:55
1. One of the characteristics of blockchain projects (especially public chains) is open source. Through open source code, to improve the credibility of the project, so that more people can participate. But the open source code also makes it easier for attackers to attack blockchain system. In the past two years, there have been a number of hacker attacks. Recently, the anonymous currency verge (xvg) was attacked again. The attacker locked a vulnerability in the xvg code, which allowed malicious miners to add false timestamps on the block, and then quickly dig out new blocks. In a few hours, the attacker obtained nearly $1.75 million worth of digital currency. Although the subsequent attack was successfully stopped, no one can guarantee whether the attacker will attack again in the future
of course, blockchain developers can also take some measures
one is to use professional code audit services,
the other is to understand the security coding specifications and take preventive measures
the security of cryptographic algorithm
with the development of quantum computer, it will bring great security threat to the current cryptosystem. Blockchain mainly relies on elliptic curve public key encryption algorithm to generate digital signature for secure transactions. Currently, the most commonly used ECDSA, RSA, DSA, etc. can not withstand quantum attacks in theory, and there will be greater risks. More and more researchers begin to pay attention to cryptographic algorithms that can resist quantum attacks
of course, in addition to changing the algorithm, there is another way to improve the security:
refer to bitcoin's treatment of public key address to rece the potential risk of public key disclosure. As users, especially bitcoin users, the balance after each transaction is stored in a new address to ensure that the public key of the address where bitcoin funds are stored is not leaked
security of consensus mechanism
the current consensus mechanisms include proof of work (POW), proof of stake (POS), delegated proof of stake (dpos), practical Byzantine fault tolerance (pbft), etc
POW faces 51% attack. Because POW depends on computing power, when the attacker has the advantage of computing power, the probability of finding a new block will be greater than that of other nodes. At this time, the attacker has the ability to cancel the existing transaction. It should be noted that even in this case, the attacker can only modify his own transaction, but not the transaction of other users (the attacker does not have the private key of other users)
in POS, attackers can only attack successfully when they hold more than 51% of the token, which is more difficult than 51% of the computing power in pow
in pbft, when the malicious nodes are less than 1 / 3 of the total nodes, the system is secure. Generally speaking, any consensus mechanism has its own conditions. As an attacker, we also need to consider that once the attack is successful, the value of the system will return to zero. At this time, the attacker does not get any other valuable return except destruction
for the designers of blockchain projects, they should understand the advantages and disadvantages of each consensus mechanism, so as to select an appropriate consensus mechanism or design a new consensus mechanism according to the needs of the scene
security of smart contract
smart contract has the advantages of low operation cost and low risk of human intervention, but if there are problems in the design of smart contract, it may bring great losses. In June 2016, the Dao, the most popular funding project of Ethereum, was attacked. The hacker obtained more than 3.5 million Ethereum coins, which later led to the bifurcation of Ethereum into Eth and etc
there are two aspects of the proposed measures:
one is to audit the security of smart contracts, and the other is to follow the principles of smart contract security development
the security development principles of smart contract are: be prepared for possible errors to ensure that the code can correctly handle the bugs and vulnerabilities; Release smart contracts carefully, do well in function test and security test, and fully consider the boundary; Keep smart contracts simple; Pay attention to the threat intelligence of blockchain and check and update in time; Be clear about the characteristics of blockchain, such as calling external contracts carefully
security of digital wallet
there are three main security risks in digital wallet: first, design defects. At the end of 2014, a user lost hundreds of digital assets e to a serious random number problem (repeated r value). Second, the digital wallet contains malicious code. Third, the loss of assets caused by the loss or damage of computers and mobile phones
there are four main countermeasures:
one is to ensure the randomness of the private key
the second is to verify the hash value before software installation to ensure that the digital wallet software has not been tampered with
the third is to use cold wallets
the fourth is to back up the private key.
2. I started with 618 before. I feel like I've made a lot of money. It's really cost-effective. In addition, to enjoy such a comfortable price, I really appreciate the mine disaster. At present, there are only 83.2 frames playing single wizard 3
and 79.8 frames playing Island fright 5. Recently, I want to play Monster Hunter world. I don't know how PC version is.
3. Hello, if you have never had a credit card or loan, then the people's Bank of China will not have your credit report, that is to say, your current credit report is blank. I hope it can help you. Please accept if you are satisfied
4. Purchase of credit reports are generally printed to the bank, you can go to the Bank of China.
5. Up to now, the personal credit information of the people's Bank of China can be inquired through two channels:
1. Bring your ID card or the client's ID card and power of attorney to the local credit information window of the people's Bank of China to provide ID card for printing personal credit records< Second, open the official website of the people's credit information center of China http://www.pbccrc.org.cn/ , mobile phone number, together with ID card registration account, submit personal credit record query application in the personal query column, and the mobile phone will receive the query code sent by the credit information center within 72 hours. Open the official website of the people's credit information center of China again, log in the registered account, input the query code of SMS in the personal query column, then you can access the personal credit information, and generate PDF document at the bottom of the page to download and save<

personal housing mortgage loan conditions:
1. Having permanent residence or valid residence status in cities and towns
2. Have a stable career and income, good credit, and the ability to repay the loan principal and interest on time
3. Self raised funds of more than 20% of the total price of the house purchased, and guarantee to be used to pay the down payment of the house purchased
4. The assets recognized by the bank are used as mortgage or pledge, or the unit or indivial with sufficient compensation ability is used as the guarantor to repay the loan principal and interest and bear joint liability
5. With the purchase contract or agreement, the price of the house purchased basically conforms to the appraisal value of the bank or the real estate appraisal agency entrusted by the bank
6. Other conditions stipulated by the bank.
6. If you are in Tianjin, credit reference, investment promotion, instrial and Commercial Bank of China and Bank of China can approve loans.
7. You're talking about personal credit. You can print your own credit report at the people's Bank of China with your ID card
personal credit reference refers to the activities of collecting and processing personal credit information, and providing personal credit information query and evaluation services according to the requirements of users. Personal credit report is a kind of personal credit history record that the credit agencies process and collate the information collected according to law, and finally provide the legal information inquirers according to law.
8.

You can go to the credit reference center of the people's Bank of China for self-service inquiry, the specific methods are as follows:

1. Use the Internet search, search back to the website of the credit reference center of the people's Bank of China, and click to enter

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750