Mining encryption algorithm recognition
anyone can run software on special hardware to become a bitcoin miner. Mining software monitors transaction broadcast through P2P network and performs appropriate tasks to process and confirm these transactions. Bitcoin miners can earn transaction fees paid by users to speed up transaction processing and additional bitcoin issued according to fixed formula
new transactions need to be included in a block with mathematical workload proof before they can be confirmed. This kind of proof is hard to generate because it can only be generated by trying billions of calculations per second. Miners need to run these calculations before their blocks are accepted and rewarded. As more people start mining, the difficulty of finding effective blocks will be automatically increased by the network to ensure that the average time to find a block remains at 10 minutes. Therefore, the competition for mining is very fierce, and no indivial miner can control the content contained in the block chain
workload proof is also designed to rely on previous blocks, which forces the time sequence of block chain. This design makes it extremely difficult to cancel previous transactions, because the workload proof of all subsequent blocks needs to be recalculated. When two blocks are found at the same time, the miner will process the first block received, and once the next block is found, it will be transferred to the longest block chain. This ensures that the mining process maintains a global consistency based on processing capacity
bitcoin miners can neither increase their rewards by cheating, nor deal with the fraulent transactions that destroy the bitcoin network, because all bitcoin nodes will reject the blocks containing invalid data that violate the bitcoin protocol rules. Therefore, even if not all bitcoin miners can be trusted, the bitcoin network is still secure.
there are about three kinds of currency in currency speculation. one is the base currency, which is similar to the representative of money. CNY and usdt Basic goods with value). One is the mainstream token, BTC, ETH (because of the national restrictions, the exchange can only trade in token, that is, take one kind of virtual currency to buy another kind of virtual currency, I don't know why.) The other is a variety of virtual currencies (commodities)
the purchase process is to first go to the exchange platform to find a personal seller with RMB to exchange for usdt, In the process of using usdt to exchange for the mainstream token BTC or eth used in purchasing various virtual coins, and finally using eth to purchase various virtual coins
A. base currency: CNY, usdt (exchangeable, need to be exchanged in good faith transactions with indivial buyers) B. mainstream token: BTC, ethc, virtual currency: all kinds of money, such as profit, need to be exchanged into usdt again, and then sold into CNY. Learn more about the coin circle
< blockquote >sharing area network ~ learn more about the coin circle
< / blockquote >experience: 1. Buy mainstream currency if you can't buy it. 2. If the new currency is not fried in January, it may become a banker to harvest leeks. 3. Just learned an experience, chasing up and killing down, meaning up do not buy, buy must be cut leeks If you have strength and value, you can hold it and wait for salted fish to turn over. 5. If the company is strong, the team is strong, and the executives are strong, you can pay more attention to it. Note: I don't understand the K line at all, and I don't understand the professional words, so I can only make a tentative decision on these purchase principles based on logical thinking
anyone can run software on special hardware to become a bitcoin miner. Mining software monitors transaction broadcast through P2P network and performs appropriate tasks to process and confirm these transactions. Bitcoin miners can earn transaction fees paid by users to speed up transaction processing and additional bitcoin issued according to fixed formula
new transactions need to be included in a block with mathematical workload proof before they can be confirmed. This kind of proof is hard to generate because it can only be generated by trying billions of calculations per second. Miners need to run these calculations before their blocks are accepted and rewarded. As more people start mining, the difficulty of finding effective blocks will be automatically increased by the network to ensure that the average time to find a block remains at 10 minutes. Therefore, the competition for mining is very fierce, and no indivial miner can control the content contained in the block chain
workload proof is also designed to rely on previous blocks, which forces the time sequence of block chain. This design makes it extremely difficult to cancel previous transactions, because the workload proof of all subsequent blocks needs to be recalculated. When two blocks are found at the same time, the miner will process the first block received, and once the next block is found, it will be transferred to the longest block chain. This ensures that the mining process maintains a global consistency based on processing capacity
bitcoin miners can neither increase their rewards by cheating, nor deal with the fraulent transactions that destroy the bitcoin network, because all bitcoin nodes will reject the blocks containing invalid data that violate the bitcoin protocol rules. Therefore, even if not all bitcoin miners can be trusted, the bitcoin network is still secure.
the influence of quantum computer on the mining of special currency
at present, we do not have such quantum algorithm, but what should we do if we find it in the future? As we all know, bitcoin aims to identify the speed of mining, and also increases the difficulty of mining. It means that the difficulty of finding the algorithm will become more complex
in fact, it is impossible to mine with ordinary computers, so miners use ASIC chips to dig bitcoin. At present, there are two kinds of cryptocurrency, RSA and elliptic curve cryptocurrency. In fact, these two cryptocurrency methods are vulnerable to quantum computer attacks. According to Anastasia, we only need 2500 cubits to interrupt algoant, interrupt EC, and about 4000 cubits to interrupt RSA
Hackers can identify bitcoin wallet addressesin the current situation, hard forking is impossible because many users have lost their wallet addresses and coins. Now, the worry is that quantum computers can easily help track lost wallets, and hackers can use them to decrypt and retrieve such lost coins
However, the main focus is the research of quantum computer. The entry of such computer system will make the cryptocurrency system face risks. The system could be the destroyer of bitcoinTicket price: 165; 3111 → 482
42 minutes | 3.7 km | walk 860 m
Guangzhou railway station
walk 830 m
Guangzhou Blood Center
Bus line: no.545, 6.9km in total length
1. Take no.545 from ezhangtan, 8 stops, Xiaobei station
2. Walk about 880m to Guangzhou blood center
bus line: Metro Line 5, 6.9km in total length
1. Walk about 2.0KM from ezhangtan to Xicun Station
2. Take Metro Line 5, 2 stops, Reach Xiaobei station
3, walk about 990 meters to Guangzhou blood center
in normal trading, price first, price at the same time first. When the price of the purchase order matches that of the sales order, time first, and then price and quantity first. That is to say, if the order is executed first, and then the order is executed at the same time, if the order price and quantity match, the order will be executed first. When buying, the commission price is the highest limit price, and when selling, the commission price is the lowest limit price.