Position: Home page » Bitcoin » Bitcoin server site settings picture

Bitcoin server site settings picture

Publish: 2021-05-09 23:46:47
1.

If you want to know about the bitcoin mine, you should first understand the related matters of bitcoin mining:

1. Bitcoin mining

is to use the computer that earns bitcoin, download the special bitcoin computing tools, communicate with the remote server (then, register various cooperation websites, and fill the registered user name and password into the calculation program, Then click the operation to start the operation) to get the corresponding bitcoin

this kind of computer generally has professional mining chips, and works in the way of burning graphics card, which consumes a lot of power

Second, to be a miner is to proce bitcoin with your own computer

in the early client, there was the option of mining, but it has been cancelled. The reason is very simple. With more and more people participating in mining, it may take a few years to dig for 50 coins, so the mining speed is too slow and the cost is high

Third, bitcoin mine with the increase of miners and mining costs, miners generally organize into miners' guild to dig together

so there are professional miners, organized into a professional mining team; They use professional mining machine (computer), professional maintenance personnel, special site, to carry out mining

usually, the mining team composed of special site, professional equipment and professional personnel is called "mine"

bitcoin mine , to put it simply, it is actually equivalent to a server room < br />

2.
  1. all public cloud manufacturers explicitly require that they are not allowed to use the cloud server for mining, otherwise they will be banned

  2. GPU is mainly used in mining. At present, GPU servers provided by public cloud manufacturers are more expensive, which is not cost-effective, so it is better to use special chips

  3. < / OL >

    of course, some hackers intrude into the server through vulnerabilities, implant mining programs and scripts on it, and carry out mining operations, but this is illegal in itself

3. Building a mine pool is not so simple, enough servers, enough computing power
4.

By using secure encryption technology to store digital currency, you only need to have a contract address to transfer the currency. The function of this wallet allows you to put the currency in your wallet when you don't use it, which is higher than the security factor in the exchange

wallet is actually used as an address protocol, because all transactions on the blockchain are recorded in the whole network. Every bitcoin transaction to an address is recorded in the whole network and cannot be tampered with. When bitcoin arrives in your wallet, everyone can see the record to prove it

unlike most traditional currencies, bitcoin is a digital currency. Therefore, the method of this kind of currency is completely different, especially when it is obtained and stored. Because bitcoin doesn't have any physical shape or form, it can't be stored anywhere technically. Instead, it is the private key used to access your public bitcoin address and sign transactions that need to be stored securely. The combination of the recipient's public key and private key makes bitcoin transaction possible

there are several different forms of bitcoin wallets, which can meet different needs, and are different in security, convenience, accessibility and so on

paper wallet

a paper wallet is essentially a document that contains a public address and a private key that can be used to receive bitcoin, allowing you to spend or transfer bitcoin stored at that address. These are usually printed in the form of QR codes so that you can quickly scan them and add the key to your software wallet for transactions

paper wallets can be generated using services such as bitaddress or bitcoinpaperwallet, allowing users to create completely random bitcoin addresses and private keys. The generated document can then be printed, some of which offer tamper proof design, and even can choose to order holographic tags and use them

the main advantage of banknote wallet is that the key will not be stored in any place in digital form, which makes it completely free from hacker attacks. It can record the malware users hit and basically any form of digital theft. However, some precautions still need to be taken when creating wallets

obviously, before generating a paper wallet, you need to make sure that no one is watching you. To eliminate the risk of any spyware monitoring activity, it is recommended to use a clean operating system running from a USB flash drive or DVD, such as Ubuntu

in addition, once the paper wallet is set up, the website code should be able to run offline, which allows you to disconnect from the Internet before actually generating the key. Finally, use a printer that is not connected to the network


in addition, it is very important to know that you are printing valuable personal information on a piece of paper. Therefore, you need to take some measures to protect that piece of paper. For example, it is suggested to put it in a sealed plastic bag to prevent water stop, moisture and general wear. Some people like to laminate it and store it in a safe, storage box or entrust a lawyer to handle it

physical bitcoin

physical bitcoin usually preloads a fixed number of BTCs, and the intention is that as long as the private key remains hidden, it cannot cost its value. This is usually achieved by implementing tamper proof seals

bitbill's first proct was like a credit card, but most of its subsequent substitutes were shaped into a round medal. Mike Cadwell, a cryptocurrency enthusiast nicknamed "casascius", created the first popular casascius physical bitcoin in 2011

the private key is hidden under the strippable hologram, and when it is removed, it leaves the tamper proof mode. In exchange, the coin lost its numerical value. Since then, there have been several new coin makers

physical bitcoin is a very convenient way to store your funds more safely, which is very useful in offline transactions. Most importantly, they have recently become a valuable collection. However, the main drawback is serious security issues

in November 2013, Mike Cadwell was asked to stop the operation of the financial crime enforcement network because his work was considered to be a money sender. The rules of the campaign were so overwhelming that he had to stop selling items containing digital bitcoin. Since BTC is still a legal gray area in many countries, these items may even be considered counterfeit by the authorities

mobile

BTC is an indispensable tool for those who actively use bitcoin every day to pay for goods or trade face-to-face in stores. It runs as a smartphone app, stores your private key and allows you to pay for things directly from your phone

in addition, some applications enable users to use their smartphone's near-field communication function, which means that they can simply click on their phone to oppose readers without having to provide any information at all

any complete bitcoin client needs to access the whole blockchain ledger, which is growing and needs several thousand megabytes of storage space. Therefore, mobile wallet uses simplified payment verification (SPV) technology. They only apply to a very small subset of the blockchain and rely on trusted nodes in the bitcoin network to ensure that they have the correct information


although bitcoin storage is a convenient mobile solution, mobile wallet is vulnerable to hackers. In addition, if someone just accesses your mobile device, you may lose control of the wallet. There are a variety of bitcoin wallet applications running on Android devices. Apple banned bitcoin wallets from the app store in February 2014, but withdrew its decision a few months later

Web wallet

Web wallet stores your private key on the server of the company providing such service. The server is always online and controlled by someone else. Different services provide different functions, some of which connect to mobile and desktop wallets to your address on the device you own

very similar to mobile wallet, e-wallet enables users to access their funds anytime, anywhere through any device connected to the Internet. But unless implemented properly, the organization that runs the site may access your private key and take full control of your money. In addition, some e-wallets operate on the basis of exchanges, and some exchanges close down and escape users' funds

Desktop wallet

Desktop wallet has been downloaded and installed on your computer, and your private key is stored on the hard disk. By definition, they are more secure than online and mobile wallets because they do not rely on third parties for data and are more difficult to steal. They are still connected to the Internet, which makes them inherently insecure. But desktop wallets are a great solution for those who trade a small amount of bitcoin from their computers

Desktop wallet has many different choices to meet different needs. Some focus on security, some focus on anonymity, etc

Hardware

Hardware wallet is a unique bitcoin wallet, which can store the user's private key in a secure hardware device. This is the safest way to store any amount of bitcoin, and there is no verifiable event that money is stolen from the hardware wallet

unlike paper wallets, paper wallets must import software at some time, and hardware wallets can be used safely and interactively. In addition, they are not affected by computer viruses, and the stored funds cannot be transmitted to output devices in clear text. In most cases, their software is open source

some hardware wallets even have screens, which adds another layer of security because they can be used to verify and display important wallet details. For example, the screen can be used to generate recovery phrases and confirm the amount and address of the payment you want to make. Therefore, as long as you invest in a real equipment with good reputation made by a reliable and competent manufacturer, your funds will be safe and reliable

bitcoin wallet and security

possible problems:

capture malware. Malware can scan your disk and find your private key. In a few seconds, all your bitcoins will disappear. Trojan can encrypt all the files on the hard disk. After that, it may find all the links to your wallet, realize how much money you have and ask for the exact amount of bitcoin to decrypt your hard drive

virtual exchange can use your money to escape. You can lose the laptop or mobile phone on which the wallet is installed

suggestions:

< UL >
  • avoid using any wallet that needs Internet connection; Please use the refrigerated option instead

  • check everything carefully. For example, you can receive an email from blockwallet, but it's actually from blockcwallet, and if you authorize, your bitcoin will disappear immediately








  • 5. Well, it depends on the model. In fact, it has nothing to do with the graphics card and the brand. But the computing power is stable. It's better to choose the brand machine. After all, the connection of the machine is better than that of the general assembly machine
    6. Abstract: a person named Satoshi Nakamoto posted a post on the P2P foundation website, saying that he has developed an open-source P2P (peer-to-peer) e-cash system called bitcoin, which is completely decentralized. There is no central server or trustee, and everything is based on participants. Bitcoin Bitcoin is a kind of virtual currency in the form of P2P. Point to point transmission means a decentralized payment system. Bitcoin does not rely on specific currency institutions to issue, it is generated through a large number of calculations of specific algorithms. Bitcoin economy uses a distributed database composed of many nodes in the whole P2P network to confirm and record all transactions. The decentralized nature and algorithm of P2P can ensure that it is impossible to artificially manipulate the value of bitcoin through mass proction. The design based on cryptography can make bitcoin only be transferred or paid by the real owner. This also ensures the anonymity of money ownership and circulation transactions. Bitcoin is a kind of network virtual currency, similar to Tencent's q-coin. You can use bitcoin to buy some virtual items, such as clothes, hats, equipment, etc. in online games. As long as someone accepts it, you can also use bitcoin to buy real-life items. The biggest difference between bitcoin and other virtual currencies is that the total amount of bitcoin is very limited and it has a strong scarcity. The monetary system has no more than 10.5 million in the first four years, and the total number after that will be permanently limited to 21 million. Another point is that you can use computers to make bitcoin. Bitcoin is an electronic currency proced by open source P2P software. Bitcoin has also been paraphrased as "bitgold". The concept of virtual currency bitcoin was first proposed by Satoshi Nakamoto in 2009. Now bitcoin is also used to refer to bitcoin's open source software designed and released according to the ideas of Satoshi Nakamoto and the P2P network built on it. Unlike most currencies, bitcoin does not rely on a specific central issuing institution, but uses a distributed database throughout the P2P network nodes to record currency transactions, and uses cryptography design to ensure the security of all aspects of currency circulation. For example, bitcoin can only be used by its real owner, and only once, after the payment is completed, the original owner loses the ownership of the bitcoin. Feature bitcoin is designed to allow anonymous ownership and use rights. Bitcoin can be stored in personal computer in the form of computer file (wallet) or in a third-party hosting service. No matter how it is saved, bitcoin can be sent to anyone on the Internet through its address. The distributed characteristics of P2P and the design of no central management mechanism ensure that no organization can manipulate the value of bitcoin or create inflation.
    7. 1. First of all, you need to know the concepts of public key and private key (you don't need to read this part already)
    public key and private key are terms in asymmetric encryption of modern cryptography. They usually encrypt information with public key and decrypt information with private key. Why? Because when you watch TV dramas, telegrams are encrypted symmetrically. The disadvantages of this encryption method are obvious. If someone knows the key and encryption method, they can decrypt the telegrams according to the encryption method. Until asymmetric encryption, the situation has changed. Public key is the key that can be made public all over the world. For example, when you communicate with Google, you encrypt with the 1024 bit public key given by Google and send it to Google. Only he has the corresponding private key, and only he can decrypt it, so the communication security is ensured
    2. Bitcoin mainly uses ECDSA, which is the elliptic curve signature algorithm, This algorithm has two characteristics. Note that these two points are very important to the following
    A. as long as you know the private key, you can calculate the corresponding public key
    B. If you have signed something with the private key, you can use the public key to calculate whether you signed it or not
    3. After knowledge preparation, let's start with the transaction of bitcoin. In fact, bitcoin has no wallet, only transaction bills, and the whole bitcoin is a lot of transaction bills

    for example:
    bill 1 transfers from a to B to XXX bitcoin
    Bill 2 transfers from B to C and D to XXX bitcoin
    bill 3 transfers from C to e to XXX bitcoin
    .... Anyone who downloads the client can receive all the bills from the day when bitcoin was established, so as long as all the bills are downloaded, they will naturally know how much money should be left on each account (think carefully here)

    4. The account of bitcoin is the public key mentioned just now

    5, Here is the core part!!! Each bill is a piece of data. After you sign it, it will be sent to the whole network, and the data structure will be reversed into easy to understand Chinese. The explanation is as follows:

    from (who sent it, including two parts)
    previous TX: the ID of the bill for which you want to spend the money, that is to say, any money you spend should have been transferred to you, You need to show the ID of the bill
    scriptsig: your signature for this transaction is to hash the bill with your private key, only you can do this hash

    to (who accepts, including two parts)
    value: how much to send
    scriptpubkey: the public key of the other party, and the bitcoin account is a public key
    6, How to send it? Bitcoin communication is not so complicated. You can compare it to IRC channel, but different from ordinary "IRC", any client is an "IRC" server. When you start the client, you will receive the client address with public IP around, that is, the "server" list. This list is constantly refreshed, and it is all other bitcoin users, So when you shout a word in this "IRC", people around you will hear it and spread it all over the world

    7. After sending the signature to the whole world, all the clients who receive this list will verify whether your signature is correct, whether you sent it, and whether you have so much money (according to the historical transaction, you can calculate how much money you have to spend)
    if you have calculated this transaction, it's OK, Basically, the transfer is successful

    8. In fact, the other party has accepted bitcoin, but in order to spend it, he must have the private key corresponding to the address (public key). So he can fill in the from header of a form. Previous TX is the serial number of the transaction just now. Scriptsig fills in the hash signed with his private key...
    8. Bitcoin is a distributed account book. There is no core server. As long as there are records in six blocks, the transaction records and accounts are legal
    uniqueness is that your account is unique. Each user has only a portion of all user account records
    those less than 1 bitcoin can also be traded. There is a bitcoin exchange and you can exchange them with any existing currency
    the account is anonymous, just a string of codes
    the essence of money is a credit certificate. You can understand it as an IOU. Bitcoin itself is not money, but because of its concealment and decentralization, it can act as a credit certificate for cross-border settlement, avoid the supervision of various rights, and facilitate money laundering. Therefore, bitcoin becomes money.
    Hot content
    Inn digger Publish: 2021-05-29 20:04:36 Views: 341
    Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
    Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
    Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
    Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
    Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
    Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
    Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
    Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
    Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750