What is the private key of the Leyte coin purse
the private key is like your bank card password
the address of bitcoin wallet is like your bank card
as long as you have the bank card and password, anyone can withdraw money from ATM
the address of bitcoin wallet is public, which means that everyone else has your bank card, so your bank card password (private key) becomes very important at this time
once your key is disclosed, others can transfer your bitcoin
Internet search: "sister coin teaches you bitcoin" or "sister coin" find me, share more exquisite content ~!
1. The mail cabinet is stolen (the database is stolen)
2. The key is stolen (the private key is stolen)
3. Knowing my home address (the public key is stolen), the lock of the mail cabinet is opened violently (the private key is cracked violently).
The private key of bitcoin wallet cannot be viewed online. Bitcoin exists on the platform. To download core or classic is the real wallet, and then you can view it
[description of private key of bitcoin wallet]:
1. Wallet encryption refers to automatically encrypting and storing the wallet with private key. The official bitcoin client supports wallet encryption since version 0.4.0. The encrypted wallet will prompt you to enter your password every time you pay. If the password is wrong, the client will refuse to pay
2. If you replace it with the earliest backup wallet (wallet. DAT), you can still trade normally. Considering the principle of bitcoin, it can be concluded that as long as there is a private key (wallet), you can prove that you are the legitimate owner of the wallet. No matter whether you encrypt or delete the wallet (the core is the private key corresponding to an address), you can't deny it
3. When backing up the bitcoin wallet, you should also pay attention to the existence of bitcoin payment change mechanism (for example, if you send 50 BTC in a complete 100 BTC to an address, the system will send 50 BTC to the other party's address, and return 50 BTC to a new address of your client, which will not be directly displayed in your address list)
4. After sending bitcoin to other addresses 100 times or using 100 different addresses to receive bitcoin, please back up your wallet again, otherwise the returned and received bitcoin will be lost forever. In addition to encrypting wallets, users can also generate offline paper wallets and brain wallets
back up your entire wallet
some bitcoin wallets use many hidden private keys inside. If you only back up the private key of the visible bitcoin address, most of the money may not be recovered from the backup
encrypt online backup
any online backup is easy to be stolen. Even a computer connected to the Internet is vulnerable to malware. Therefore, it is a good security habit to encrypt any backup exposed to the network
using multiple secure repositories
single point of failure is not concive to security. If your backup is not limited to only one place, it is less likely that something bad will happen and your wallet will not be restored. You can also consider using different storage media, such as USB flash disk, paper and CD-ROM.
keeping a backup of your wallet in a safe place can protect your wallet from computer failure and many human errors. If you encrypt your wallet, it can also be used to restore your wallet when your mobile phone or computer is stolen
back up your entire wallet
some bitcoin wallets use many hidden private keys inside. If you only back up the private key of the visible bitcoin address, most of the money may not be recovered from the backup
encrypt online backup
any online backup is easy to be stolen. Even a computer connected to the Internet is vulnerable to malware. Therefore, it is a good security habit to encrypt any backup exposed to the network
using multiple secure repositories
single point of failure is not concive to security. If your backup is not limited to only one place, it is less likely that something bad will happen and your wallet will not be restored. You can also consider using different storage media, such as USB flash disk, paper and CD-ROM
regular backup
the wallet needs to be backed up regularly to ensure that all the latest bitcoin change addresses and newly created bitcoin addresses are included in the backup. However, soon all applications will use wallets that only need to be backed up once.
digital currencies such as Ruitai, doggy and Wright all have private keys.
suppose I find two strings of numbers, one is 1 * and the other is 2 *. I like the number 2 * and I will keep it. I won't tell you (private key). Then I will tell you that 1 * is my public key
I have a file that I can't let others see, so I use 1 * to encrypt it. Someone else found this file, but he didn't know that 2 * was the private key for decryption, so he couldn't decrypt it. Only I could decrypt it with
string 2 *, which is my private key. So I can protect the data
my good friend x encrypts the character a with my public key 1 * and then it becomes B, which is put on the Internet. Other people steal this file, but they can't open it, because they don't know that 2 * is my private key,
only I can decrypt it and get a after decryption. In this way, we can transmit encrypted data<
Second, private key signature
If I encrypt a piece of data with the private key (of course, only I can encrypt with the private key, because only I know 2 * is my private key), as a result, all people will see my content, because they all know that
my public key is 1 *, then what is the use of this encryption
but my good friend x said that someone pretended to write to him. What shall I do? I encrypt the content of the letter I want to send with my private key 2 * and send it to X. then I tell him to decrypt it to see if it is C. He decrypted it with my public key 1 * and found that it was c
at this time, he will think that the data that can be decrypted with my public key must be encrypted with my private key. Only I know my private key, so he can confirm that it's really something I sent
in this way, we can confirm the identity of the sender. This process is called digital signature. Of course, the specific process is a little more complicated. The purpose of encrypting data with private key is digital signature
summary: public key and private key are paired, they decrypt each other
public key encryption and private key decryption
private key digital signature, public key verification.