Bitcoin server site settings picture
If you want to know about the bitcoin mine, you should first understand the related matters of bitcoin mining:
1. Bitcoin mining
is to use the computer that earns bitcoin, download the special bitcoin computing tools, communicate with the remote server (then, register various cooperation websites, and fill the registered user name and password into the calculation program, Then click the operation to start the operation) to get the corresponding bitcoin
this kind of computer generally has professional mining chips, and works in the way of burning graphics card, which consumes a lot of power
Second, to be a miner is to proce bitcoin with your own computerin the early client, there was the option of mining, but it has been cancelled. The reason is very simple. With more and more people participating in mining, it may take a few years to dig for 50 coins, so the mining speed is too slow and the cost is high
Third, bitcoin mine with the increase of miners and mining costs, miners generally organize into miners' guild to dig togetherso there are professional miners, organized into a professional mining team; They use professional mining machine (computer), professional maintenance personnel, special site, to carry out mining
usually, the mining team composed of special site, professional equipment and professional personnel is called "mine"
bitcoin mine , to put it simply, it is actually equivalent to a server room < br />
-
all public cloud manufacturers explicitly require that they are not allowed to use the cloud server for mining, otherwise they will be banned
-
GPU is mainly used in mining. At present, GPU servers provided by public cloud manufacturers are more expensive, which is not cost-effective, so it is better to use special chips
< / OL >
of course, some hackers intrude into the server through vulnerabilities, implant mining programs and scripts on it, and carry out mining operations, but this is illegal in itself
By using secure encryption technology to store digital currency, you only need to have a contract address to transfer the currency. The function of this wallet allows you to put the currency in your wallet when you don't use it, which is higher than the security factor in the exchange
wallet is actually used as an address protocol, because all transactions on the blockchain are recorded in the whole network. Every bitcoin transaction to an address is recorded in the whole network and cannot be tampered with. When bitcoin arrives in your wallet, everyone can see the record to prove it
unlike most traditional currencies, bitcoin is a digital currency. Therefore, the method of this kind of currency is completely different, especially when it is obtained and stored. Because bitcoin doesn't have any physical shape or form, it can't be stored anywhere technically. Instead, it is the private key used to access your public bitcoin address and sign transactions that need to be stored securely. The combination of the recipient's public key and private key makes bitcoin transaction possible
there are several different forms of bitcoin wallets, which can meet different needs, and are different in security, convenience, accessibility and so on
paper wallet
a paper wallet is essentially a document that contains a public address and a private key that can be used to receive bitcoin, allowing you to spend or transfer bitcoin stored at that address. These are usually printed in the form of QR codes so that you can quickly scan them and add the key to your software wallet for transactions
paper wallets can be generated using services such as bitaddress or bitcoinpaperwallet, allowing users to create completely random bitcoin addresses and private keys. The generated document can then be printed, some of which offer tamper proof design, and even can choose to order holographic tags and use them
the main advantage of banknote wallet is that the key will not be stored in any place in digital form, which makes it completely free from hacker attacks. It can record the malware users hit and basically any form of digital theft. However, some precautions still need to be taken when creating wallets
obviously, before generating a paper wallet, you need to make sure that no one is watching you. To eliminate the risk of any spyware monitoring activity, it is recommended to use a clean operating system running from a USB flash drive or DVD, such as Ubuntu
in addition, once the paper wallet is set up, the website code should be able to run offline, which allows you to disconnect from the Internet before actually generating the key. Finally, use a printer that is not connected to the network
in addition, it is very important to know that you are printing valuable personal information on a piece of paper. Therefore, you need to take some measures to protect that piece of paper. For example, it is suggested to put it in a sealed plastic bag to prevent water stop, moisture and general wear. Some people like to laminate it and store it in a safe, storage box or entrust a lawyer to handle it
physical bitcoin
physical bitcoin usually preloads a fixed number of BTCs, and the intention is that as long as the private key remains hidden, it cannot cost its value. This is usually achieved by implementing tamper proof seals
bitbill's first proct was like a credit card, but most of its subsequent substitutes were shaped into a round medal. Mike Cadwell, a cryptocurrency enthusiast nicknamed "casascius", created the first popular casascius physical bitcoin in 2011
the private key is hidden under the strippable hologram, and when it is removed, it leaves the tamper proof mode. In exchange, the coin lost its numerical value. Since then, there have been several new coin makers
physical bitcoin is a very convenient way to store your funds more safely, which is very useful in offline transactions. Most importantly, they have recently become a valuable collection. However, the main drawback is serious security issues
in November 2013, Mike Cadwell was asked to stop the operation of the financial crime enforcement network because his work was considered to be a money sender. The rules of the campaign were so overwhelming that he had to stop selling items containing digital bitcoin. Since BTC is still a legal gray area in many countries, these items may even be considered counterfeit by the authorities
mobile
BTC is an indispensable tool for those who actively use bitcoin every day to pay for goods or trade face-to-face in stores. It runs as a smartphone app, stores your private key and allows you to pay for things directly from your phone
in addition, some applications enable users to use their smartphone's near-field communication function, which means that they can simply click on their phone to oppose readers without having to provide any information at all
any complete bitcoin client needs to access the whole blockchain ledger, which is growing and needs several thousand megabytes of storage space. Therefore, mobile wallet uses simplified payment verification (SPV) technology. They only apply to a very small subset of the blockchain and rely on trusted nodes in the bitcoin network to ensure that they have the correct information
although bitcoin storage is a convenient mobile solution, mobile wallet is vulnerable to hackers. In addition, if someone just accesses your mobile device, you may lose control of the wallet. There are a variety of bitcoin wallet applications running on Android devices. Apple banned bitcoin wallets from the app store in February 2014, but withdrew its decision a few months later
Web wallet
Web wallet stores your private key on the server of the company providing such service. The server is always online and controlled by someone else. Different services provide different functions, some of which connect to mobile and desktop wallets to your address on the device you own
very similar to mobile wallet, e-wallet enables users to access their funds anytime, anywhere through any device connected to the Internet. But unless implemented properly, the organization that runs the site may access your private key and take full control of your money. In addition, some e-wallets operate on the basis of exchanges, and some exchanges close down and escape users' funds
Desktop wallet
Desktop wallet has been downloaded and installed on your computer, and your private key is stored on the hard disk. By definition, they are more secure than online and mobile wallets because they do not rely on third parties for data and are more difficult to steal. They are still connected to the Internet, which makes them inherently insecure. But desktop wallets are a great solution for those who trade a small amount of bitcoin from their computers
Desktop wallet has many different choices to meet different needs. Some focus on security, some focus on anonymity, etc
Hardware
Hardware wallet is a unique bitcoin wallet, which can store the user's private key in a secure hardware device. This is the safest way to store any amount of bitcoin, and there is no verifiable event that money is stolen from the hardware wallet
unlike paper wallets, paper wallets must import software at some time, and hardware wallets can be used safely and interactively. In addition, they are not affected by computer viruses, and the stored funds cannot be transmitted to output devices in clear text. In most cases, their software is open source
some hardware wallets even have screens, which adds another layer of security because they can be used to verify and display important wallet details. For example, the screen can be used to generate recovery phrases and confirm the amount and address of the payment you want to make. Therefore, as long as you invest in a real equipment with good reputation made by a reliable and competent manufacturer, your funds will be safe and reliable
bitcoin wallet and security
possible problems:
capture malware. Malware can scan your disk and find your private key. In a few seconds, all your bitcoins will disappear. Trojan can encrypt all the files on the hard disk. After that, it may find all the links to your wallet, realize how much money you have and ask for the exact amount of bitcoin to decrypt your hard drive
virtual exchange can use your money to escape. You can lose the laptop or mobile phone on which the wallet is installed
suggestions:
< UL >avoid using any wallet that needs Internet connection; Please use the refrigerated option instead
check everything carefully. For example, you can receive an email from blockwallet, but it's actually from blockcwallet, and if you authorize, your bitcoin will disappear immediately
public key and private key are terms in asymmetric encryption of modern cryptography. They usually encrypt information with public key and decrypt information with private key. Why? Because when you watch TV dramas, telegrams are encrypted symmetrically. The disadvantages of this encryption method are obvious. If someone knows the key and encryption method, they can decrypt the telegrams according to the encryption method. Until asymmetric encryption, the situation has changed. Public key is the key that can be made public all over the world. For example, when you communicate with Google, you encrypt with the 1024 bit public key given by Google and send it to Google. Only he has the corresponding private key, and only he can decrypt it, so the communication security is ensured
2. Bitcoin mainly uses ECDSA, which is the elliptic curve signature algorithm, This algorithm has two characteristics. Note that these two points are very important to the following
A. as long as you know the private key, you can calculate the corresponding public key
B. If you have signed something with the private key, you can use the public key to calculate whether you signed it or not
3. After knowledge preparation, let's start with the transaction of bitcoin. In fact, bitcoin has no wallet, only transaction bills, and the whole bitcoin is a lot of transaction bills
for example:
bill 1 transfers from a to B to XXX bitcoin
Bill 2 transfers from B to C and D to XXX bitcoin
bill 3 transfers from C to e to XXX bitcoin
.... Anyone who downloads the client can receive all the bills from the day when bitcoin was established, so as long as all the bills are downloaded, they will naturally know how much money should be left on each account (think carefully here)
4. The account of bitcoin is the public key mentioned just now
5, Here is the core part!!! Each bill is a piece of data. After you sign it, it will be sent to the whole network, and the data structure will be reversed into easy to understand Chinese. The explanation is as follows:
from (who sent it, including two parts)
previous TX: the ID of the bill for which you want to spend the money, that is to say, any money you spend should have been transferred to you, You need to show the ID of the bill
scriptsig: your signature for this transaction is to hash the bill with your private key, only you can do this hash
to (who accepts, including two parts)
value: how much to send
scriptpubkey: the public key of the other party, and the bitcoin account is a public key
6, How to send it? Bitcoin communication is not so complicated. You can compare it to IRC channel, but different from ordinary "IRC", any client is an "IRC" server. When you start the client, you will receive the client address with public IP around, that is, the "server" list. This list is constantly refreshed, and it is all other bitcoin users, So when you shout a word in this "IRC", people around you will hear it and spread it all over the world
7. After sending the signature to the whole world, all the clients who receive this list will verify whether your signature is correct, whether you sent it, and whether you have so much money (according to the historical transaction, you can calculate how much money you have to spend)
if you have calculated this transaction, it's OK, Basically, the transfer is successful
8. In fact, the other party has accepted bitcoin, but in order to spend it, he must have the private key corresponding to the address (public key). So he can fill in the from header of a form. Previous TX is the serial number of the transaction just now. Scriptsig fills in the hash signed with his private key...
uniqueness is that your account is unique. Each user has only a portion of all user account records
those less than 1 bitcoin can also be traded. There is a bitcoin exchange and you can exchange them with any existing currency
the account is anonymous, just a string of codes
the essence of money is a credit certificate. You can understand it as an IOU. Bitcoin itself is not money, but because of its concealment and decentralization, it can act as a credit certificate for cross-border settlement, avoid the supervision of various rights, and facilitate money laundering. Therefore, bitcoin becomes money.