Position: Home page » Bitcoin » One minute on bitcoin

One minute on bitcoin

Publish: 2021-04-16 21:37:52
1.

The earliest is a kind of network virtual currency. It is characterized by decentralization, anonymity, and can only be used in the digital world. It does not belong to any country or financial institution, and is not subject to geographical restrictions. It can be exchanged anywhere in the world. Therefore, it is used as a money laundering tool by some criminals. In 2013, the U.S. government recognized the legal status of bitcoin, making the price of bitcoin soar

< H2 > extended information:

bitcoin is e-cash similar to e-mail. Both parties need "bitcoin wallet" similar to e-mail and "bitcoin address" similar to e-mail address. Just like sending and receiving e-mail, the remitter pays bitcoin directly to the other party through a computer or smart phone according to the recipient's address

starting from the essence of bitcoin, the essence of bitcoin is actually a special solution generated by a bunch of complex algorithms. A special solution is one of the infinite (in fact, bitcoin is finite) solutions that can be obtained from the equations. Every particular solution can solve the equation and is unique

many websites for technology players have begun to accept bitcoin transactions. Websites such as mtgox and btcchina, as well as some Taobao stores, can even accept services such as bitcoin exchange for us dollars and euro. There is no doubt that bitcoin has become a real currency in circulation, rather than a virtual currency like Tencent Q coin

2. It's said that it's about guessing whether the price of bitcoin will rise or fall. For example, it's predicted that the price of bitcoin will rise compared with the current price in two minutes. If the price is higher than the current price in two minutes, you can make money. It's very interesting and I'm looking forward to it.
3. 1. Virtual, can transfer, can pay to buy (a few people have realized this function), collection ~
2. Decentralized, no credit endorsement ~ who gets it is who
4. Go to bitcoin news network to see more bitcoin news, as well as market and technology
the birth of bitcoin
the birth of bitcoin should be on November 1, 2008. A man with the pseudonym of "Nakamoto Tsung" published a paper on the Internet. In this paper, he described in detail a new monetary system, which he named "bitcoin"

then, on January 3 of the next year, the first bitcoin program was born in the hands of Nakamoto Tsung, along with the first 50 bitcoins from mining. After that, he began to fade out until he disappeared completely

so far, people have not found out the real identity of this person, even if today's operators, Internet giants and the government have firmly grasped people's behavior on the Internet

he often switches between American and British English when he speaks. He goes online at different times of the day at random to hide his nationality and time zone; He hides his IP address, encrypts his email, and deliberately forges some writing and speaking styles to confuse the public; Besides, he is also an expert in cryptography. By the way, the place where he published his paper is called & quot; Cryptography mailing list & quot

so bitcoin was born with a hacker spirit: against the censorship imposed by any force

of course, we can also see that if a hacker who invented the anonymous currency system can't be anonymous, the whole thing will become a joke< But fortunately, Nakamoto didn't let us down

1. What is currency
I find that I can't run this section in any case to clarify what is bitcoin. I am not an expert in the field of economics. I can only talk about this issue in a very superficial and intuitive sense However, as far as the theme expressed in the title is concerned, it seems to be enough)

it has been mentioned in senior high school textbooks (remember?), Money is the medium to store value. If a thing wants to become money, it must meet the following requirements:

1) scarcity

that's why gold can be used and sand can't be used as money. Scarcity can be understood as the difficulty of obtaining it. The more scarce it is, the more difficult it is to obtain it. An intuitive understanding is as follows: assuming that your monthly salary is 5000 yuan, it means that the scarcity of RMB is just such a degree, that is, you have to pay a month's labor to get 5000 yuan. You won't agree to pay your salary with 5000 grains of sand, because instead of working for a month to get it, you can easily get it by walking around the beach

how does the current financial system guarantee the scarcity of money? Control distribution. The issue of money is firmly in the hands of the central bank, so that the amount of money can be controlled (so you now know that it is illegal to print money without permission). Back to the example just now, you agree to pay you a month's salary with 5000 yuan because the circulation of RMB has just reached this level. If the circulation of RMB doubles and the scarcity decreases, you should ask for 10000 yuan to pay your salary (but the response of the market is often not so fast. During this period, your wealth is actually deprived - your labor should have received 10000 yuan, but only 5000 yuan in return)

2) transactional

of course, the purpose of currency is to trade. As many people tell you, money is spent, not brought into the coffin. So in addition to meeting scarcity, the more convenient it is for a thing to trade, the more it meets the standard of ideal currency. Therefore, in the history of currency, silver dollar has replaced shells, paper money has replaced silver dollar, and digital currency is graally replacing paper money

the "transaction" here refers to the transfer of property from one party to the other, that is, the decrease of one party's property and the corresponding increase of the other party. For physical currency, it happens very naturally. A wants to give 100 yuan to B. when the 100 yuan note is transferred from a's hand to B's hand, the transaction is completed. A's property is reced by 100 yuan and B's property is increased by 100 yuan. There is no third party involved in this process, which is completely a private act between a and B; However, when the transaction takes place at the level of digital currency, it is not so simple. Party A has to give 100 yuan to Party B. how can we ensure that the transaction is completed? Suppose that a and B record their wealth on their respective computers, how can we ensure that when B adds 100 yuan to them, a actually subtracts 100 yuan from them? Now we have to bring in a third party - the guy we call the bank. When a wants to transfer 100 yuan to B, he doesn't directly give it to B, but to the bank, "please transfer my 100 yuan to B", so the bank dected 100 yuan from a's account and added 100 yuan to B's account Let's assume that it generously does not charge any transaction fee)

the above is a rough model of modern monetary system. The biggest disadvantage of this model is that people have to trust a central system

the transaction of digital currency must rely on the bank, and a person's bank account number may be censored, restricted or even deprived. When one party wants to transfer his wealth to the other party, the bank can charge a high fee or refuse directly (for example, you try to remit a sum of money to a relative in the United States)

the issuance of money must rely on the central bank. Well, it's a well-known secret: the currency has been devaluing, or over issuing (think of the $100 20 years ago and the $100 now). I quote two paragraphs, one of which is Keynes's saying, "through a continuous process of inflation, the government can confiscate a part of citizens' wealth secretly and unknowingly. In this way, we can deprive the people of their wealth at will, while making the majority poor, we can make the minority rich, Another paragraph, from Hayek, "the government can not restrain the impulse to issue money indiscriminately."

is it possible to design a monetary system in which we do not need a central institution and are not forced to trust any third party, so as to make the issuance of currency transparent and controllable, and the transaction of currency private and secure

guess what

2. What is bitcoin
so we can now answer that bitcoin is an e-money system with decentralized distribution and transaction. In this system, the circulation of money is transparent and predictable, and the transaction of money uses the cooperation of the whole network to ensure the security of the transaction

next, I will graally dismantle the principle of bitcoin. It should be noted that bitcoin, as a proct already in use, has a lot of details. The purpose of this article is to explain the basic principles of bitcoin to readers without technical background, so these details will not be covered. For example, the address of the wallet is not the public key, but the second hash value of the public key; The difficulty requirement of blockchain is not to hash all the contents of blockchain once; wait. But for the sake of brevity, without affecting the explanation of the basic principles, these are simplified. I hope you can understand them

2.0. Bitcoin network is composed of many nodes running bitcoin programs
bitcoin is a network composed of many equal nodes

a node is a bitcoin program. Any machine that can connect to the Internet and have certain computing power can run this program - so your home computer can also be used as a node in the bitcoin network:)

nodes can communicate with each other. At the same time, bitcoin has a set of mechanism that allows a node to send messages to all other nodes, This behavior is called "broadcasting."

2.1. Blockchain - a public account book
let's go back to the example of banks. The most basic function of a bank is to maintain an account book, which only needs to record every transaction truthfully. For example, Wang Xiaoming transferred 30 yuan to Zhang Damao on X, year X; On y, y, y, y, Zhang Da Mao transferred 12 yuan to Li Xiao Dou, and so on. According to this account book, we can find all the transaction records of a person, so we can calculate the current account balance of the person. For example, since Li Xiaodou started to build a bank account, the total amount of transactions transferred in is 500 yuan, and the total amount of transactions transferred out is 300 yuan. Then it can be calculated that the balance of Li Xiaodou's account must be 200 yuan at this time

maintain this account book, and as the only maintainer (only the bank has the right to view and modify), the bank's responsibility as a trading center is completed

bitcoin also has an account book, but unlike banks, this account book is open and anyone can view and review it

this account book is called & quot; Blockchain & quot;. You can think of blockchain as a pamphlet. Every page of the pamphlet is full of transaction information, and new pages are constantly added<

2.2 Wallet - an account composed of a pair of public keys and private keys
the above section explains what a bitcoin account book is. This section will explain the ownership of funds in this account book, that is, the account system of bitcoin

there are essential differences between accounts in bitcoin and bank accounts

under a bank account, the bank records the identity information of the owner of the account (think back to the information you submitted when you went to the bank to open an account: photo, ID card, telephone number, home address...), so as long as you can prove your identity to the bank, you will get the ownership of the property under your name. In this model, the bank plays the role of an omniscient God: he knows the wealth information of real people. We have no choice but to pray to God not to let our information out or use it for evil

in the world of bitcoin, there is no such institution as bank, which will not force people to reveal their identities in exchange for the security of funds. Bitcoin's account is simply composed of two strings of numbers, which are called "public key" and "private key" respectively, and there is nothing else

the mathematical characteristics of these two numbers - a data encrypted by a private key can only be decrypted by a public key, so-called asymmetric encryption - enable them to perfectly implement the functions required by an account (called a wallet in the bitcoin world)

we take the public key as the account address - also known as the wallet address in the bitcoin world - which is similar to the account number in the banking system, that is, when you tell someone "please call 300 yuan for my account number", you need to tell them. For the bank, it is "China Merchants Bank 6214850200251100", compared with the special currency, it is "

the private key is the * only * certificate to prove the ownership of the wallet. You can hold it by proving that you are the private key of the wallet
5. 1. The concept of bitcoin was first proposed by Nakamoto on November 1, 2008, and was officially born on January 3, 2009. According to the idea of Nakamoto, the open source software is designed and released, and the P2P network on it is constructed. Bitcoin is a virtual encrypted digital currency in the form of P2P. Point to point transmission means a decentralized payment system< Different from all currencies, bitcoin does not rely on specific currency institutions. It is generated by a large number of calculations based on specific algorithms. Bitcoin economy uses a distributed database composed of many nodes in the whole P2P network to confirm and record all transactions, and uses the design of cryptography to ensure the security of all aspects of currency circulation. The decentralized nature and algorithm of P2P can ensure that it is impossible to artificially manipulate the value of bitcoin through mass proction. The design based on cryptography can make bitcoin only be transferred or paid by the real owner. This also ensures the anonymity of money ownership and circulation transactions. The biggest difference between bitcoin and other virtual currencies is that the total amount of bitcoin is very limited and it has a strong scarcity

warm tips: ① the above contents are for reference only, without any suggestions. The relevant procts are issued and managed by the corresponding platform or company, and our bank does not undertake the responsibilities of investment, cashing and risk management of the procts. ② There are risks in entering the market, so investment should be cautious. Before making any investment, you should make sure that you fully understand the nature of the investment and the risks involved in the proct. After a detailed understanding and careful evaluation of the proct, you can judge whether to participate in the transaction
response time: January 28, 2021. Please refer to the official website of Ping An Bank for the latest business changes
[Ping An Bank I know] want to know more? Come and see "Ping An Bank I know" ~
https://b.pingan.com.cn/paim/iknow/index.html
6.

As we approach the end of the year, when we plan to sprint for the goal of the end of the year, earn more bonus and prepare to release ourselves in the Spring Festival, don't forget that the fraudsters also have such a plan. At this time, the tide of shopping on double 12 and new year's day comes one after another, and people working outside are also busy booking tickets and air tickets for the Spring Festival, which provides opportunities for fraudsters. Here, liewang, the first online fraud information reporting platform linked by the police and the people in China, makes an inventory of the new trends of online fraud in 2017. Can you see through all these scams

trend 1: mobile payment has become the mainstream, beware of two-dimensional code trap

mobile payment has greatly facilitated people's life and made people travel easily. However, there are many criminals who use the way of scanning two-dimensional code to carry out fraud, which is impossible to prevent. For example, on bike sharing, a fake QR code is used to cover the regular QR code, and the avatar is set as the official icon of bike sharing to cheat users to pay or recharge; Next to the store's two-dimensional code, there are words full of temptation, such as "scan code to grab red packets", "scan code discount", etc., to lure users to scan the code, and then obtain user information or directly guide users to transfer money. There are even criminals who the illegal parking notice posted on the car by traffic police. The fake ticket is attached with a payment QR code to lure the car owner to scan the code to pay a "fine"

trend 2: fake businesses want to refund. Users should be careful of being" loaned online "

generally, people think that their bank card balance is small, even if they encounter swindlers, it doesn't matter. However, according to the report cases received by liewang platform, In the common refund fraud in 2017, fraudsters use mobile phones to receive SMS verification code to lure victims into Internet micro loan business, and finally transfer the loan to the swindler's account. This kind of fraud often involves a high amount of money and brings serious property losses to users

trend 3: mobile phones also contain extortion virus, and the payment method is more" people-friendly "

mobile phone extortion software has become a common tool for criminals to seek benefits e to its low proction cost and fast cash flow. At present, there are different forms of blackmail software in the mobile application market. Different from the blackmail software in the computer, bitcoin is needed to pay for it. The payment form in the mobile blackmail software is more "people-friendly"

a batch of blackmail software captured in 2017 attached wechat two-dimensional code information to the blackmail interface, and prompted the winner to directly scan the two-dimensional code for payment by wechat, which will automatically unlock after successful payment, and the user will automatically enter the transfer interface after scanning the code. However, through technical analysis, this kind of blackmail software does not have any code related to wechat transfer. The so-called "scan payment, automatically unlock" is actually a fraud, even if the user transfers, it will not automatically unlock

trend 4: fake customer service requests to provide payment code and swipe only by numbers

because code scanning payment is simple and convenient, in 2016, many fraudsters took a screenshot of the two-dimensional code to swipe. But in 2017, as payment companies added anti fraud tips or confidentiality settings in the process of payment QR code screenshots, swindlers immediately thought of countermeasures and swindled the numbers under the payment code, forming a new instrial chain

criminals often disguise themselves as merchants customer service, requiring users to provide figures such as Alipay, WeChat and other payment bar codes, and then, on the grounds of digital failure, require users to refresh the numbers and send them several times to achieve the purpose of stealing. p>

trend 5: download the specified software, but the account password is shared by cloud disk

users' privacy information can be stolen without using phishing websites and Trojan horse software. This year, swindlers have come up with new tricks: as long as the victims' trust is obtained, they can download cloud disk, synchronization software and other procts, log in to the account designated by the swindler to upload files and synchronize, and then they can easily get information. What's more, if the user synchronizes the SMS verification code at any time, the swindler can easily steal the funds in the bank card

fraudsters often disguise themselves as e-commerce, suppliers and other customer services, requiring users to download some cloud disk synchronization software, and then provide the specified account password for users to log in. At this time, if the user logs in and synchronizes the personal account, password and other information on the software according to the swindler's instructions, the funds on the account will be transferred quietly

trend 6: new phishing websites on mobile terminals are more covert and easy to be recruited

as security manufacturers increase their efforts to crack down on phishing websites, phishing website makers also strengthen their covert means, spread links by using proct sharing functions such as short URL, cloud disk service, browser and social tools, and finally jump through the URL, Guide users to phishing sites to launch online fraud

trend 7: indemnity should be paid in intimate way. Be careful with this kind of fraud SMS

as early as 2013, 360 company discovered a high-risk fraud binding the victim's online banking account. In recent years, with the use of mobile payment becoming more and more popular, In 2017, there was a similar kind of fraud, which used a payment platform to bind accounts and swipe victims' accounts

in May 2017, Mr. Di received a flight delay text message sent in the name of the airline, with flight information and customer service phone number attached in the text message, and said that Mr. Di could get 300 yuan of delay compensation. Fake customer service in the phone to guide Mr. Di refund operation, and provide the enterprise account, but also ask Mr. Di to open intimate payment function. However, after Mr. Di opened, he found that he had two dections, and realized that Mr. Di was cheated and immediately called the police

trend 8: investment in the circle of friends? Do not gambler psychology

in everyone's wechat group or circle of friends, there are often many activities or proct recommendations under the banner of discount. Not long ago, Mr. Wang saw a WeChat official account named "double half price win" in WeChat group chat. Mr. Wang then identified the official account as having an enterprise certification and believed that the platform had high credibility. p>

Mr. Wang invested a small amount in the early stage, and found that there was a certain income every day, so he subsequently invested in batches, but graally began to lose money“ He wants to invest more in order to earn back the capital. As a result, when contacting customer service again, he found that the other party had blackmailed him. Only then did he realize that he had been cheated and that the money he had invested had gone to nothing

trend 9: identity impersonation has a new pattern, be careful that "friends" are high imitations

in the past, online fraud of identity impersonation often occurred on QQ, wechat and other social platforms, but this year, swindlers shifted their focus to microblog. The swindler specially studies the social habits of the victims, such as the relationship between microblog staff and chat content, and then changes their avatars and nicknames to create high imitation numbers. Because most of the fake users are abroad, it is difficult for their microblog friends to distinguish the true from the false in time

trend 10: the combination of various means makes it impossible to prevent the" ghost "fraud.

in March 2017, 360 assisted the Shenzhen police in successfully cracking down the" midnight ghost "Telecom fraud Gang, which the police identified as an illegal trade instry chain relying on personal information, It is a high-tech, high intelligence, cross platform, remote-control new type of telecom network fraud crime that combines mobile cloud service, operator's deputy number service and Internet financial service. And this kind of stealing brush mainly uses different services of various platform service providers. A single service does not have the security risk of stealing brush, but it is combined to form stealing brush. In order to make it difficult for the victims to detect, the criminals choose to commit crimes late at night. The whole process does not need to have any contact with the victims, and the victims do not need to reply to any SMS, so prevention is very difficult

from the above ten cases, the current situation of network fraud is still not optimistic. The anti fraud experts of liewang platform hereby remind the netizens that the new year is approaching, the fraudsters are highly active, and all kinds of fraud means emerge in endlessly. At this time, we need to improve the anti fraud awareness, so that the fraudsters have no chance to take advantage of it

net hunting platform is jointly launched by Beijing Public Security Bureau and 360. It is an innovative platform to crack down on Internet fraud through Internet platform and Internet technology. Up to now, liewang platform has established contact with public security organs in more than 300 regions of the country, helped to detect more than 100 major Internet fraud cases, involving 170 million yuan, and knocked down more than 10 large-scale fraud gangs with strict organization and clear division of labor. Internet users can report malicious programs, malicious web addresses, fraulent phone calls, etc. to 360 Internet security center through the platform. Every piece of information reported by Internet users will be included in the big data of liewang platform, providing effective clues for the police to solve cases

7.

Bitcoin is a kind of electronic cryptocurrency based on blockchain, which is decentralized, global, and does not need third-party institutions or indivials. Bitcoin was invented and founded by Nakamoto (pseudonym) on January 3, 2009, based on the peer-to-peer network without borders, using consensus initiative open source software. It is the ancestor of cryptocurrency and blockchain, and is also the cryptocurrency with the highest popularity and market value at present

generally speaking, bitcoin is a digital currency with a total amount of 21 million, which has the characteristics of decentralization, globalization, anonymity and so on, just like the Internet. Transferring bitcoin to the other side of the earth is as simple, low-cost and unlimited as sending e-mail. Bitcoin is therefore used in cross-border trade, payment, remittance and other fields


{rrrrrrr}


extended materials:

the global financial crisis broke out in 2008. On November 1, 2008, a person who called himself Nakamoto published bitcoin white paper "bitcoin: a peer-to-peer e-cash system" on the P2P foundation website, stating his new idea of e-currency bitcoin. On January 3, 2009, bitcoin Genesis block was born

compared with fiat money, bitcoin does not have a centralized issuer, but is generated by the calculation of network nodes. Anyone can participate in the manufacture of bitcoin, and it can circulate all over the world. It can be bought and sold on any computer connected to the Internet. No matter where they are, anyone can dig, buy, sell or collect bitcoin, And in the transaction process, foreigners can not identify the user's identity information

as a standardized, globalized, highly volatile, 24-hour and never-ending trading target, bitcoin is more volatile than stocks, foreign exchange, precious metals and other electronic disk targets; In terms of standardized trading, soaring history and future prospects, it is better than the physical speculation targets such as stamps and coins, garlic, Pu'er tea and Huangli wood, so it has attracted a lot of hot money to participate in the speculation

at present, the funds attracted by bitcoin as the target of speculation far exceed the funds attracted by the payment system. At least half of the price of each yuan is the value of the target of speculation

reference: network bitcoin

8. The computer configuration is relatively high, and the price of hardware is about 10000 yuan. This can be regarded as your cost 1, and then the electricity charge, because the energy consumption of the computer will be much higher than that of ordinary electrical appliances. The electricity consumption of a day will be the electricity consumption of your household appliances for one month or two months. Then calculate the electricity charge, and you can refer to your cycle of digging money to see if you can make money
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750