Is bitcoin available for one person
public key system: corresponds to a public key and a private key, keeps the private key in the application and publishes the public key. When Party A transmits information to Party B, it can use Party A's private key to encrypt the information, and Party B can use Party A's public key to decrypt the information, so as to ensure that the third party cannot impersonate Party A to send the information; At the same time, when Party A transmits information to Party B, it is encrypted with Party B's public key and sent to Party B, and then Party B decrypts it with his own private key, so as to ensure that the third party cannot eavesdrop on the communication between the two people. RSA is the most common public key system, but the lliptic curve digital signature algorithm is used in bitcoin protocol. What's the difference between cash and bank account? Bitcoin is an electronic currency in BTC. In this article, it is also used to refer to the whole bitcoin system. Like opening an account in a bank, the corresponding concept in bitcoin is address. Everyone can have one or more bitcoin addresses, which are used to pay and collect money. Each address is a string that starts with 1. For example, I have two bitcoin accounts, and. A bitcoin account is uniquely determined by a pair of public key and private key. To save the account, you only need to save the private key file. Unlike bank accounts, banks keep all transaction records and maintain the book balance of each account, while bitcoin's transaction records are jointly maintained by the whole P2P network through a pre agreed protocol. How much money is in my account address? Although the current account balance can be seen by bitcoin software, unlike banks, there is no place to maintain the book balance of each address. It can only calculate the account balance in real time through all historical transactions. How do I pay? When I pay from address a to address B of the other party, the payment amount is e. at this time, both parties will announce the transaction information to each network node, telling address a to pay to address B, and the payment amount is e. In order to prevent the third party from forging the transaction information, the transaction information will be encrypted with the private key of address A. at this time, the network node receiving the transaction information can use the public key of address a to verify that the transaction information is indeed sent by address a. Of course, trading software will help us do these things, we just need to input the relevant parameters in the software. What will the network node do after receiving the transaction information? This is the most important part of the bitcoin system, which needs to be elaborated. For the sake of simplicity, only bitcoin protocol has been implemented. In the current version, each network node will save all transaction information synchronously. There are two kinds of transaction information in history, one is & quot; Verified & quot; The transaction information, that is, the verified transaction information, is stored in a series of "blocks". Each & quot; block" Is the previous & quot; bock" The ID of each block is the hash code of the hash code of the block and the new transaction information (see an actual block). The other category refers to those who also & quot; Unverified & quot; The transaction information just paid above belongs to this category. When a network node receives new unverified transaction information (possibly more than one), it can calculate the book balance of each address at that time because the node keeps all the transaction information in history, so it can calculate whether the transaction information is valid, that is, whether there is enough balance in the payment account. After eliminating the invalid transaction information, it first takes out the last & quot; block" Then, the unverified transaction information is combined with the ID, and a verification code is added to form a new "block". It needs a lot of calculation to build a new block, because it needs to calculate the verification code, so that the above combination becomes a block, that is, the first several bits of the hash code of the block are 1. At present, the first 13 bits need to be 1 (generally, the specific method is uncertain), which means that if the block is generated by enumeration method, the average number of enumerations is 16 ^ 13. Using CPU resources to generate a block is called "gold mining", because the proction of the block will get a certain reward, and the reward information has been included in the block. When a network node generates a new block, it will broadcast to other network nodes. However, this network block may not be accepted by the network, because it is possible that other network nodes have proced the block earlier. Only the earliest block or the block with the largest number of subsequent blocks is valid, and the remaining blocks are no longer used as the initial blocks of the next block. How does the other party confirm that the payment is successful? When the payment information is distributed to the network node, the network node begins to calculate whether the transaction is valid (that is, whether the account balance is enough to pay), and attempts to generate blocks containing the transaction information. When six blocks (one direct block and five subsequent blocks) contain the transaction information, the transaction information is considered "verified", so that the transaction is formally confirmed, and the other party can confirm the successful payment. A possible problem is that I will pay the balance of address a to address B, and at the same time pay to address C. If I only verify that the single comparison transaction is valid. At this point, my way of cheating is to generate six blocks including B to B and six blocks including C to C before the truth is revealed. Because I need a very long CPU time to generate a block, compared with the whole network, the probability of my cheating success is very small. What is the motivation of network nodes to proce blocks? As can be seen from the above description, in order to make the transaction information effective, the network node needs to generate 1 and 5 subsequent blocks to contain the transaction information, and such block generation is very CPU intensive. How to let other network nodes help to proce blocks as soon as possible? The answer is very simple. The agreement stipulates that BTC will be rewarded for the address where the block is proced, as well as the Commission promised by both parties. At present, the reward for procing a block is 50btc, which will be halved every four years in the future. For example, the reward will be 25btc from 2013 to 2016. Is the transaction anonymous? Yes, and No. All bitcoin transactions are visible. We can check all transaction records of each account, such as mine. But what's different from the banking monetary system is that everyone's account itself is anonymous, and everyone can open many accounts. In general, anonymity is not as good as it claims. But bitcoin has another advantage in doing black market trading: it can't be frozen. Even if the police trace a bitcoin address, there is nothing they can do unless they trace the computer used by the exchange based on the Internet address. How to ensure that bitcoin does not depreciate? Generally speaking, in the case of equivalent trading activities, the value of money is inversely proportional to the amount of money issued. Unlike the traditional money market, the central bank can determine the amount of money issued. Bitcoin does not have a central issuing institution. Only by procing blocks can we get a certain amount of BTC currency. Therefore, bitcoin's new amount of money depends on: 1. The speed of procing blocks: bitcoin's agreement stipulates that the difficulty of procing blocks is fixed at an average of 2016 every two weeks, about 10 minutes. Moore's law of doubling CPU speed every 18 months will not speed up the proction of block. 2. The number of rewards for block proction: at present, 50 BTC is awarded for each block proced, which is halved every four years. In 2013, 25 BTC is awarded, and in 2017, 12.5 BTC is awarded. Considering the above two factors, bitcoin's currency issuing speed is not controlled by any single node in the network. Its protocol makes the currency stock known in advance, and the maximum stock is only 21 million BTC
anyone can become a bitcoin miner by running software on specialized hardware. Mining software monitors transaction broadcast through P2P network and performs appropriate tasks to process and confirm these transactions. Bitcoin miners can earn transaction fees paid by users to speed up transaction processing and additional bitcoin issued according to fixed formula
new transactions need to be included in a block with mathematical workload proof before they can be confirmed. This kind of proof is hard to generate because it can only be generated by trying billions of calculations per second. Miners need to run these calculations before their blocks are accepted and rewarded. As more people start mining, the difficulty of finding effective blocks will be automatically increased by the network to ensure that the average time to find a block remains at 10 minutes. Therefore, the competition for mining is very fierce, and no indivial miner can control the content contained in the block chain
workload proof is also designed to rely on previous blocks, which forces the time sequence of block chain. This design makes it extremely difficult to cancel previous transactions, because the workload proof of all subsequent blocks needs to be recalculated. When two blocks are found at the same time, the miner will process the first block received, and once the next block is found, it will be transferred to the longest block chain. This ensures that the mining process maintains a global consistency based on processing capacity
bitcoin miners can neither increase their rewards by cheating, nor deal with the fraulent transactions that destroy the bitcoin network, because all bitcoin nodes will reject the blocks containing invalid data that violate the bitcoin protocol rules. Therefore, even if not all bitcoin miners can be trusted, the bitcoin network is still secure
if you still don't understand, go to bitcoin home to see the deeper understanding of netizens.
Transaction mode of bitcoin
bitcoin is e-cash similar to e-mail, and both parties need "bitcoin wallet" similar to e-mail and "bitcoin address" similar to e-mail address. Just like sending and receiving e-mail, the remitter pays bitcoin directly to the other party through a computer or smart phone according to the recipient's address. The following table lists some websites that download bitcoin wallets and addresses for free
a bitcoin address is a string of about 33 characters long, consisting of letters and numbers, always starting with 1 or 3, such as & quot& quot; Bitcoin software can generate address automatically, and it doesn't need to exchange information online, so it can be offline. More than 2 bitcoin addresses are available. Figuratively speaking, there are about two grains of sand in the world. If there is an earth in each grain of sand, then the total number of bitcoin addresses far exceeds the number of all the sand on all these "earths"
the bitcoin address and private key appear in pairs, and their relationship is just like the bank card number and password. A bitcoin address is like a bank card number, which records how much bitcoin you have on it. You can generate bitcoin address at will to store bitcoin. When each bitcoin address is generated, a corresponding private key of the address will be generated. This private key proves that you have ownership of the bitcoin at that address. We can simply understand the bitcoin address as the bank card number, and the private key of the address as the password of the corresponding bank card number. Only when you know the bank password can you use the money on the bank card number. Therefore, please keep your address and private key when using bitcoin wallet
after the transaction data of bitcoin is packaged into a "data block" or "block", the transaction is initially confirmed. When a block is linked to a previous block, the transaction is further confirmed. After six block confirmations in a row, the transaction was irreversibly confirmed. Bitcoin P2P stores all transaction history in a "blockchain.". The blockchain continues to extend, and once new blocks are added to the blockchain, they will not be removed. Blockchain is actually a distributed database composed of a group of scattered client nodes and all participants, which is a record of all bitcoin transaction history. Nakamoto predicts that when the amount of data increases, users hope that not all the data will be stored in their own nodes. In order to achieve this goal, he uses the hash function mechanism. In this way, the client will be able to automatically eliminate those parts that it will never use, such as some very early bitcoin transactions
In the office of the first person in China to invest in the ICO (initial token issue) project, he witnessed history. The central bank issued a document saying that "ICO is illegal public financing" and ordered all platforms to stop immediately
at 3:00 p.m. on September 4, the people's Bank of China (central bank) and other seven departments jointly issued the announcement on preventing the financing risk of token issuance (hereinafter referred to as the announcement) The announcement pointed out that token issuance financing refers to the illegal sale and circulation of tokens by the financing subject to raise the so-called "virtual currency" such as bitcoin and ether coin from investors. In essence, it is an unauthorized illegal public financing behavior, suspected of illegal sale of token bills, illegal issuance of securities, illegal fund-raising, financial fraud, pyramid schemes and other illegal criminal activities“ All kinds of token issuance and financing activities shall be stopped immediately. " The announcement is extremely harsh on the wording of ICO regulation
"what can't be stopped is the enthusiasm of private investment," said Chu xiahu before reading the full text of the announcement. But not long after surging news sent him the full text of the announcement, he decided to go downstairs to appease his team, "I'll go and stabilize the morale of the army."
After half an hour, he returned to the office, but he didn't look sad“ Let's wait for regulatory requirements. If it really needs to be removed, we will remove it. " Early summer tiger said, "if not, we will go to sea. We have got the license of digital currency exchange in Japan."otherwise, it's a good thing. unshakable.
The Greenwood gang has no range damage, while the dark prince has range damage. The combination of the two is a bit like the combination of giant and dark prince. The combination of Greenwood gang and black king has both flesh and high damage. The dark prince can still bear the fat man when he rushes up. Xiaobian thinks that after the official launch of the Greenwood Gang, there should be a wave of double king Greenwood Gang sets (look at the current double king giant sets)
2, attack well, Jiyou mortar
Greenwood gang has a good defensive role, with dirty crossbow, dirty gun effect is very good. When our side releases the mortar, the other side will issue the card to attack our mortar, and then release the Greenwood Gang: Greenwood brother can absorb damage, Greenwood sister can output madly (provided the other side has no rolling wood ~)
3, attack the skeleton balloon of good friends
because the Greenwood gang and the skeleton balloon are afraid of rolling wood, they will play the two cards together. The other party may put rolling wood in front of the princess tower when the Greenwood younger sister attacks. At this time, the Greenwood younger brother + skeleton balloon can attack near the tower; Or when the skeleton balloon falls to the ground, put the rolling wood. At this time, the little sister of Greenwood can hit the princess tower a few times first. Pay attention to the skull balloon placed behind Greenwood, so as to increase the difficulty of the opponent under the rolling wood
4, attack the three musketeers of good Jiyou
brother Greenwood is a fat man. When he uses three guns, he can keep up with the Greenwood gang. The other way is with a low-cost Iceman. Pay attention to Greenwood Gang 5 fees, it is best to double the holy water when such a card
5, good attack base friend balloon soldiers
Greenwood gang with balloon soldiers is also very good. Brother Greenwood is fighting blood in front. Sister Greenwood can protect the balloon and destroy the other air force. As shown in the picture, the Greenwood girl will kill the flies in the air
6, attack good base friend digger
when the Greenwood Gang is released, you can attack with the miners, so there will be two flesh shield Greenwood brothers and digger to fight blood. Note that when Greenwood brother pulls the princess tower to hate, it's best for the miner to land again
7, attack the good base friends and the wild woodcutter
after the green forest Gang officially launched, there should be more people with rolling wood. If the other party annihilates Greenwood younger sister, how to maximize Greenwood younger brother's output? The wild woodcutter should be a good choice, meat + fast running, fast output of the wild woodcutter
8, how to place the Greenwood Gang
let's talk about how to place the Greenwood gang in defense. Put our buildings and Greenwood gangs separately (on the right side of the figure below), so as to avoid being hit at the same time when the other party drops the fireball. Other cards such as Musketeers and archers should be placed separately from our buildings
9, if the other side releases the rolling wood, we might as well follow a goblin gang.
if the other side releases the rolling wood to roll our Greenwood younger sister, we might as well follow a goblin gang. The combination of goblin gang and Greenwood younger brother will also have good output (unless the other side takes ten thousand arrows at once + rolling wood / mirror image + rolling wood double spell)
10, be careful to go down the Greenwood Gang + goblin flying bucket at the same time
Greenwood girl and goblin flying bucket are afraid of rolling wood. If the other party has rolling wood, they should not go down at the same time
11, the Greenwood gang can defend two of the three guns
5-fee Greenwood gang can defend 6-fee double gun
12, shunting
