Distributed accounting of bitcoin to prevent hackers
The concept of bitcoin was first proposed by Nakamoto on November 1, 2008, and was officially born on January 3, 2009. According to the idea of Nakamoto, the open source software is designed and released, and the P2P network on it is constructed. Bitcoin is a virtual encrypted digital currency in the form of P2P. Point to point transmission means a decentralized payment system
unlike all currencies, bitcoin does not rely on specific currency institutions. It is generated by a large number of calculations based on specific algorithms. Bitcoin economy uses the distributed database composed of many nodes in the whole P2P network to confirm and record all transactions, and uses the design of cryptography to ensure the security of all aspects of currency circulation
extended data:
bitcoin network generates new bitcoin through "mining". In essence, the so-called "mining" is to use computers to solve a complex mathematical problem to ensure the consistency of bitcoin network distributed accounting system
to mine bitcoin, you can download the special bitcoin computing tools, register various cooperation websites, fill the registered user name and password into the computing program, and then click the operation to officially start
the bitcoin network is robust, but the bitcoin trading platform is fragile. Trading platform is usually a website, which will be attacked by hackers or shut down by competent authorities
Security of bitcoin wallet
< UL >anti-theft
to prevent private key leakage
As a friendly format of wallet private key, mnemonics are very convenient for you to backup and import. Because of its plaintext, we do not recommend that it be saved electronically, but copied and kept on physical media. As a al backup, mnemonics and keystore complement each otherand keystores can be stored online, such as cloud disk, or in their own U disk (hardware wallet takes advantage of this), which is relatively safer than online storage. Even if hackers steal your keystores, they can't steal the assets without the password of the keystores, so the password of the keystores is particularly important at this time
loss prevention
the main loss prevention strategy is multiple backup, multiple backup. For example, when backing up a wallet, not only the keystore, but also the mnemonic words and private key should be backed up. This is a multiple backup
at present, the vast majority of digital currency transactions are concted in exchanges. Among the numerous exchanges, bitfinex, binance, okex and so on are well-known
However, bitcoin and other digital currencies, as decentralized assets, have to be traded in a centralized exchange, which seems to have hidden contradictions and dangers1. Problems and challenges of stock exchanges=“ //www.yuanxue365.com/en/img_fd039245d688d43fdf16c83b761ed21b0ff43bbf ">
in February 2014, Mt. GOx, the world's largest bitcoin exchange at that time, was stolen 850000 bitcoins, and the price of bitcoin suffered a" cliff "crash on that day. Later, it was revealed that Mt. GOx was in fact a thief, and only 7000 bitcoins were actually stolen
in August 2016, bitfinex, the largest U.S. dollar bitcoin trading platform, suffered a security vulnerability, resulting in the theft of 120000 bitcoins, which was worth $65 million at that time. If converted into the price in December 2017, it would be worth nearly $2 billion
on December 19, 2017, South Korea's youbit exchange was attacked by hackers and lost 4000 bitcoins, and the exchange declared bankruptcy
on December 21, 2017, the Ukrainian liqui exchange was stolen 60000 bitcoins, and the unit price of bitcoin plummeted by US $2000
in 2018, such a drama will only continue
in addition to the threat of hackers, traditional exchanges also have some inherent shortcomings, such as lack of supervision and inefficiency. The security of the exchange for investors can only rely on its own credit, and the cost of running is very low. The stock exchange is regulated at the national level, but there is no such sword of Damocles on the top of the digital currency exchange. Moreover, in an exchange, the same order can only be submitted to one exchange. After the user places an order, the funds used for the transaction will be frozen and can only wait for the completion or cancellation of the transaction. These are undoubtedly inefficient
All in all, the problems of exchanges are the problems of centralization2. Decentralization of exchanges=“ //www.yuanxue365.com/en/img_86d6277f9e2f070889a173c9e224b899a801f257 ">
(1) the progress of the exchange itself
the upgrade of security means is various. At present, the best use is cold wallet, that is, to keep the digital currency in the offline U disk. At the end of 2017, when the YouTube exchange was attacked, 75% of its assets were withdrawn into the cold purse in time to avoid greater losses. However, it seems to be a helpless way to protect the online assets by offline means. Of course, there should be many other methods, which will not be repeated here
(2) the representative of cross ledger transaction is ripple network, and the operating company is ripple labs, which is a semi centralized system. Ripple is a decentralized clearing agreement. In order to solve the high cost and delay of inter-bank clearing, its base currency is XRP. Ripple network can connect all kinds of assets, such as US dollar, RMB, Japanese yen, bitcoin, etc. to its own network. In this system, U.S. dollars or bitcoin can be converted into reborn currency, and then reborn currency can circulate freely in the network, just as a highway is built between various assets. Due to the support of major banking institutions, the reborn currency achieved nearly 300 times growth in 2017
(3) decentralized exchange
some teams try to use blockchain technology to build a decentralized exchange. This kind of decentralized exchange, to some extent, is an extension of cross ledger trading
bitshares is the most representative of early rising projects. It builds a blockchain development platform with servers scattered all over the world. Even if some of them are attacked, the system will not collapse. Anyone can transfer money and borrow money freely on this platform, and can also quickly build a centralized exchange based on this platform. In order to ensure stable value, bitstocks also require three times of digital assets as collateral. At present, bitstocks are running fairly well
later, with the development of Ethereum and smart contract, the x x protocol came into being. This is an open protocol running in the Ethereum blockchain and a decentralized exchange in the Ethereum ecosystem. The agreement has attracted many investors. At present, it has completed financing and started to build open source software tools and infrastructure. Of course, there are many competitors. Ether Delta, IDEX and oasis DEX are trying to provide similar functions. Moreover, it is a smart contract system based on Ethereum, which only supports erc20 token. If other smart contract public chains start to rise, the demand will be reced
in addition, there are some teams that are entering, such as the domestic road seal agreement, looping (LRC) in English. They adopted a design similar to the X protocol, and also introced a fast payment function similar to the lightning network. It is characterized by trying to match multiple exchanges, the user's order can be broadcast to multiple exchanges, and completed by different exchanges. Moreover, the user can still use the account funds after placing an order, and the user's behavior of transferring part or all of the funds is equivalent to partial or total cancellation. To some extent, it improves the breadth and timeliness of the transaction. However, this system seems to have damaged the "power" of the existing exchanges. Whether we can persuade everyone to play together will be a difficult problem
At present, there is still a long way to go for the construction of decentralized exchange. In 3-5 years, traditional exchange will still be the main battlefield of digital currency However, in the future, it is worth looking forward to let the decentralized digital currency get rid of the shackles of centralization1. A stolen bitcoin can't be retrieved, and if it's lost, it's lost.
2. Bitcoin has transaction records, but the address is hidden, and you can't find an indivial.
3. Every bitcoin has a key, and only if you have this key can you be admitted to own bitcoin. However, if bitcoin is stolen or lost, your bitcoin will disappear completely
therefore, the theft of bitcoin does not belong to cracking, it may be e to internal personnel.
This is a data center switch, which supports virtualization, that is VSU. Configuration reference
core switch 1:
Switch1 # configuration terminal
enter configuration commands, one per line. End with cntl / Z.
Switch1 (config) # switch virtual domain 1
Switch1 (config vs domain) # switch 1
Switch1 (config vs domain) # switch 1 priority 200 -- & gt; The default priority is 100, which is configured as a higher priority. After the VSU is successfully established, it will become the management host
Switch1(config-vs-domain)# exit
Switch1(config)# vsl-aggregateport 1 ------> At least two VSL links are needed, and the reliability of one link is low. When link oscillation occurs, VSU will be very unstable
Switch1(config-vsl-ap-1)# port-member interface TenGigabitEthernet 1/1 ------> Configure VSL link, heartbeat link and traffic channel between VSU active and standby cores
Switch1 (config-vsl-ap-1) ﹥ port member interface tengigabit Ethernet 1 / 2
Switch1 (config-vsl-ap-1) ﹥ exit
core switch 2:
switch2 ﹥ configuration terminal
enter configuration commands, one per line. End with CNTL/Z.
Switch2(config)# switch virtual domain 1 ------> Domain ID must be consistent with the first one
switch2 (config vs domain) # switch 2 ----- & gt; The second device must change its ID to 2
switch2 (config vs domain) { switch 2 priority 150
switch2 (config vs domain) { exit
switch2 (config) { VSL aggregateport 1 ----- & gt; At least two VSL links are needed, and the reliability of one link is low. When link oscillation occurs, VSU will be very unstable
Switch2(config-vsl-ap-1)# port-member interface TenGigabitEtherne 1/1 ------> Configure VSL link, heartbeat link and traffic channel between VSU active and standby cores
switch2 (config-vsl-ap-1) # port member interface tengigabit Ethernet 1 / 2
switch2 (config-vsl-ap-1) # exit
because the connected computers are controlled by the policy settings of the router
the most important thing is to allocate your bandwidth reasonably. In theory, if you download resources from a computer in your network segment, if your router does not allocate bandwidth, it may cause the computers in the whole network segment to get stuck on the Internet
if the distribution is reasonable and the router is powerful, then 200 computers can be easily handled.
it is generated by a large number of calculations through a computer, rather than issued by an institution, so bitcoin as a virtual currency has universality, and its price is not affected by an institution or company. The process of procing bitcoin is the computer's incessant calculation. The process of procing bitcoin has an image called "mining", which is like a physical object. Therefore, its value has been growing, and it is favored by hackers (not only hackers, but also investors). In addition, the transaction of bitcoin is anonymous. If the hacker chooses a bank account, there is a risk of being traced, so the hacker will choose bitcoin for blackmail.
