Position: Home page » Bitcoin » Network security bitcoin

Network security bitcoin

Publish: 2021-04-10 14:13:53
1. The concept of bitcoin was first proposed by Nakamoto on November 1, 2008, and was officially born on January 3, 2009. According to the idea of Nakamoto, the open source software is designed and released, and the P2P network on it is constructed. Bitcoin is a virtual encrypted digital currency in the form of P2P. Point to point transmission means a decentralized payment system

unlike all currencies, bitcoin does not rely on specific currency institutions. It is generated by a large number of calculations based on specific algorithms. Bitcoin economy uses a distributed database composed of many nodes in the whole P2P network to confirm and record all transactions, and uses cryptography design to ensure the security of all aspects of currency circulation. The decentralized nature and algorithm of P2P can ensure that it is impossible to artificially manipulate the value of bitcoin through mass proction. The design based on cryptography can make bitcoin only be transferred or paid by the real owner. This also ensures the anonymity of money ownership and circulation transactions. The biggest difference between bitcoin and other virtual currencies is that the total amount of bitcoin is very limited and it has a strong scarcity

warm tips:
① the above information is for reference only and does not constitute any investment suggestions
② there are risks in entering the market, so investment should be cautious
response time: February 5, 2021. Please refer to the official website of Ping An Bank for the latest business changes
[Ping An Bank I know] want to know more? Come and see "Ping An Bank I know" ~
https://b.pingan.com.cn/paim/iknow/index.html
2.

at present, the vast majority of digital currency transactions are concted in exchanges. Among the numerous exchanges, bitfinex, binance, okex and so on are well-known

However, bitcoin and other digital currencies, as decentralized assets, have to be traded in a centralized exchange, which seems to have hidden contradictions and dangers

1. Problems and challenges of stock exchanges=“ https://iknow-pic.cdn.bcebos.com/fd039245d688d43fdf16c83b761ed21b0ff43bbf ">

in February 2014, Mt. GOx, the world's largest bitcoin exchange at that time, was stolen 850000 bitcoins, and the price of bitcoin suffered a" cliff "crash on that day. Later, it was revealed that Mt. GOx was in fact a thief, and only 7000 bitcoins were actually stolen

in August 2016, bitfinex, the largest U.S. dollar bitcoin trading platform, suffered a security vulnerability, resulting in the theft of 120000 bitcoins, which was worth $65 million at that time. If converted into the price in December 2017, it would be worth nearly $2 billion

on December 19, 2017, South Korea's youbit exchange was attacked by hackers and lost 4000 bitcoins, and the exchange declared bankruptcy

on December 21, 2017, the Ukrainian liqui exchange was stolen 60000 bitcoins, and the unit price of bitcoin plummeted by US $2000

in 2018, such a drama will only continue

in addition to the threat of hackers, traditional exchanges also have some inherent shortcomings, such as lack of supervision and inefficiency. The security of the exchange for investors can only rely on its own credit, and the cost of running is very low. The stock exchange is regulated at the national level, but there is no such sword of Damocles on the top of the digital currency exchange. Moreover, in an exchange, the same order can only be submitted to one exchange. After the user places an order, the funds used for the transaction will be frozen and can only wait for the completion or cancellation of the transaction. These are undoubtedly inefficient

All in all, the problems of exchanges are the problems of centralization

2. Decentralization of exchanges=“ https://iknow-pic.cdn.bcebos.com/86d6277f9e2f070889a173c9e224b899a801f257 ">

(1) the progress of the exchange itself

the upgrade of security means is various. At present, the best use is cold wallet, that is, to keep the digital currency in the offline U disk. At the end of 2017, when the YouTube exchange was attacked, 75% of its assets were withdrawn into the cold purse in time to avoid greater losses. However, it seems to be a helpless way to protect the online assets by offline means. Of course, there should be many other methods, which will not be repeated here

(2) the representative of cross ledger transaction is ripple network, and the operating company is ripple labs, which is a semi centralized system. Ripple is a decentralized clearing agreement. In order to solve the high cost and delay of inter-bank clearing, its base currency is XRP. Ripple network can connect all kinds of assets, such as US dollar, RMB, Japanese yen, bitcoin, etc. to its own network. In this system, U.S. dollars or bitcoin can be converted into reborn currency, and then reborn currency can circulate freely in the network, just as a highway is built between various assets. Due to the support of major banking institutions, the reborn currency achieved nearly 300 times growth in 2017

(3) decentralized exchange

some teams try to use blockchain technology to build a decentralized exchange. This kind of decentralized exchange, to some extent, is an extension of cross ledger trading

bitshares is the most representative of early rising projects. It builds a blockchain development platform with servers scattered all over the world. Even if some of them are attacked, the system will not collapse. Anyone can transfer money and borrow money freely on this platform, and can also quickly build a centralized exchange based on this platform. In order to ensure stable value, bitstocks also require three times of digital assets as collateral. At present, bitstocks are running fairly well

later, with the development of Ethereum and smart contract, the x x protocol came into being. This is an open protocol running in the Ethereum blockchain and a decentralized exchange in the Ethereum ecosystem. The agreement has attracted many investors. At present, it has completed financing and started to build open source software tools and infrastructure. Of course, there are many competitors. Ether Delta, IDEX and oasis DEX are trying to provide similar functions. Moreover, it is a smart contract system based on Ethereum, which only supports erc20 token. If other smart contract public chains start to rise, the demand will be reced

in addition, there are some teams that are entering, such as the domestic road seal agreement, looping (LRC) in English. They adopted a design similar to the X protocol, and also introced a fast payment function similar to the lightning network. It is characterized by trying to match multiple exchanges, the user's order can be broadcast to multiple exchanges, and completed by different exchanges. Moreover, the user can still use the account funds after placing an order, and the user's behavior of transferring part or all of the funds is equivalent to partial or total cancellation. To some extent, it improves the breadth and timeliness of the transaction. However, this system seems to have damaged the "power" of the existing exchanges. Whether we can persuade everyone to play together will be a difficult problem

At present, there is still a long way to go for the construction of decentralized exchange. In 3-5 years, traditional exchange will still be the main battlefield of digital currency

However, in the future, it is worth looking forward to let the decentralized digital currency get rid of the shackles of centralization

3. It depends on the unit or the indivial. There are about 20 or 30 units in the unit and about 10 units in the indivial family. Of course, there are also games to watch.
4. The public key and the private key are one-to-one corresponding, and the corresponding public key may not be found even if the private key is obtained. Even if the corresponding public key is found, do you think it can decipher the algorithm structure
5. It's not true. Why is there such a saying. I am curious.
6.

Hello, we are doing network information security ecation, called 15pb information security ecation. Let me tell you how the network security personnel should improve themselves in view of this incident:

  1. analyze the principle and infection mechanism of the virus, and make targeted protective measures to ensure that similar incidents do not happen again

  2. do more work on software vulnerability mining, check and repair defects, and improve the system as much as possible. Try not to give hackers a chance to attack

  3. involves the knowledge of the bottom layer. If you know how to assemble and disassemble, you will master the principles of these viruses. Can better do the maintenance of information security. If you want to improve your technology, go down and understand the basic principles

  4. there are two forms of enterprise security work: bottom security and web security. Web is basically the user of security tools and scripts, and the bottom security personnel make these tools and scripts. You can see for yourself how to choose

  5. < / OL >
7. After investigation and confirmation by professional network security companies, gatecoin, a bitcoin platform, publicly declared that its system had been hacked and 15% of its digital asset deposits had been stolen

another platform closed down e to hacker intrusion. Is bitcoin still in spring< Bitcoin (BTC): originally proposed by Nakamoto, it belongs to a kind of digital currency. It is based on a specific algorithm and generated through a large number of calculations. Therefore, the issuance of bitcoin is not manipulated by any government, bank, organization or indivial. The total number of bitcoins is very limited. In the past four years, there were only less than 10.5 million, and in the future, the total number of bitcoins will always be limited to 21 million

Hot Wallet: it can be connected to the Internet, has strong circulation, can be used for daily consumption, and is vulnerable to hackers

cold Wallet: it won't connect to the Internet and has poor circulation, but it is not easy to be attacked by hackers

gatecain explained in an official article that the server intrusion occurred between May 9 and May 12. On the night of May 9, the service was interrupted e to the restart of a server. Associated with the time node, I strongly feel that the hacker intrusion event has an indispensable relationship with this service interruption

on the evening of May 13, gatecoin detected some suspicious transactions, so it immediately suspended the service for investigation to prevent more unauthorized access to Eth and BTC hot wallets<

loss

the hacking incident caused huge losses to gatecoin, with 185000 Ethernet coins and 250 bitcoins, with a total value of US $2 million, accounting for 15% of gatecoin's total digital assets

the security company investigated and found the hackers' Ethernet and bitcoin addresses, and gatecoin is raising funds to make up for the losses

Wright coin, Ruitai coin, doggy coin, Ethereum, bitstock and other digital currencies are also excellent.
8. Unsafe, unsafe. If you buy bitcoin in China now, no network is safe, because China does not support it
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750