Bitcoin BTC light Wallet
Publish: 2021-04-19 14:08:57
1. After the ZF policy, the domestic bitcoin exchanges were basically closed on October 31. Therefore, if bitcoin wants to be realized, it can only be traded on the OTC exchanges of bitcoin abroad. Many of these closed platforms have opened OTC exchanges abroad, but I don't use much. I only use the coinbee platform and sell a few coins. This is how his OTC trades, The basic routines are the same. First you have to register your account, then get your wallet address from the coinbee platform, then recharge the bitcoin into it, choose to publish advertisements, choose the quantity, price, acceptable transfer method, such as Alipay or bank transfer, if someone wants to buy your currency, he will Send a transaction request to you. Then you trust bitcoin, wait for him to call you, and click on the platform to complete the payment. After you confirm that you have received the payment, you can click release bitcoin on the platform to complete the transaction. This is my actual operation. There will be risks. Be careful. This is my personal practice, and I hope it will be useful to the subject.
2. Basically, it's OK to choose a few top ranked wallets. You can take a look at the celletf platform.
3. Common wallets are bitcoin QT, mutibit and coin bag. At present, the security and speed of the coin packet are very good.
4. Uthor market, highly recommended, safe and fast
5.
I use my wallet, of course
this is the wallet interface
6. If it's only a small amount, it's recommended to put it directly in a safe and well-known wallet. You can withdraw the currency when you use it. For example, I have been using the coin bag, the bitcoin wallet, to confirm the withdrawal of coins in seconds. Transaction fees are also low.
7. Bitcoin was born in a paper in 2008
a person signed by Nakamoto Tsui has put forward a revolutionary idea: let's create a currency that is not controlled by the government or anyone else! This idea is crazy: there is no asset support behind a string of figures, and no one is responsible for it. How can anyone accept it when you pay it to the other party as money
Merkle tree
looks like a binary tree, but this is the lower two nodes. Take the hash value to get the upper node. Just remember the root node to detect whether the whole tree has been tampered
the root hash value is stored in the block header, and the transaction process is stored in the block body. All nodes include block header and block body, but light nodes (such as bitcoin wallets on mobile phones) only include block header. This tree can prove that a transaction has been written into the blockchain
3. Consensus agreement
two issues should be paid attention to in decentralized currency:
1. Who can issue digital currency: mining
2. How to verify the legitimacy of transactions: blockchain
double spending attack
double spending attack is a major challenge of digital currency
all transactions in bitcoin have input and output. Where does bitcoin come from and where does it go
under normal circumstances, there may be two bifurcations, because two nodes obtain the bookkeeping right at the same time, and the two nodes package the block and calculate the random number at the same time. At this time, the two bifurcations will coexist temporarily until one of the blocks finds the next block first, which becomes the longest legal chain, and the other one is discarded<
Sybil attack
a malicious node keeps generating accounts. If the total number of accounts exceeds half of the total accounts, it obtains the control of the blockchain
consensus protocol in bitcoin
some nodes are malicious, and most nodes are good
idea 1: pack some transactions into blocks as candidate blocks, let each block vote, and write them into the blockchain if they pass
No, because some malicious nodes have been publishing blocks containing malicious transactions, and they have been voting and occupying resources. And some nodes don't vote<
idea 2: vote not by the number of accounts, but by computing power. Each node can generate legal transactions and put them into the block. These nodes start to try random numbers until H (block header) ≤ target is found, then this node has the right to account
the only way to generate bitcoin
coinbase transaction. There is no need to point out the source of the currency. If you have the bookkeeping right, you will get a reward< br />
50BTC-> 25BTC-> 12.5btc, the reward will be halved for every 210000 bitcoins
the process of bitcoin competing for bookkeeping rights is called mining. The node competing for bookkeeping right is called miner.
a person signed by Nakamoto Tsui has put forward a revolutionary idea: let's create a currency that is not controlled by the government or anyone else! This idea is crazy: there is no asset support behind a string of figures, and no one is responsible for it. How can anyone accept it when you pay it to the other party as money
Merkle tree
looks like a binary tree, but this is the lower two nodes. Take the hash value to get the upper node. Just remember the root node to detect whether the whole tree has been tampered
the root hash value is stored in the block header, and the transaction process is stored in the block body. All nodes include block header and block body, but light nodes (such as bitcoin wallets on mobile phones) only include block header. This tree can prove that a transaction has been written into the blockchain
3. Consensus agreement
two issues should be paid attention to in decentralized currency:
1. Who can issue digital currency: mining
2. How to verify the legitimacy of transactions: blockchain
double spending attack
double spending attack is a major challenge of digital currency
all transactions in bitcoin have input and output. Where does bitcoin come from and where does it go
under normal circumstances, there may be two bifurcations, because two nodes obtain the bookkeeping right at the same time, and the two nodes package the block and calculate the random number at the same time. At this time, the two bifurcations will coexist temporarily until one of the blocks finds the next block first, which becomes the longest legal chain, and the other one is discarded<
Sybil attack
a malicious node keeps generating accounts. If the total number of accounts exceeds half of the total accounts, it obtains the control of the blockchain
consensus protocol in bitcoin
some nodes are malicious, and most nodes are good
idea 1: pack some transactions into blocks as candidate blocks, let each block vote, and write them into the blockchain if they pass
No, because some malicious nodes have been publishing blocks containing malicious transactions, and they have been voting and occupying resources. And some nodes don't vote<
idea 2: vote not by the number of accounts, but by computing power. Each node can generate legal transactions and put them into the block. These nodes start to try random numbers until H (block header) ≤ target is found, then this node has the right to account
the only way to generate bitcoin
coinbase transaction. There is no need to point out the source of the currency. If you have the bookkeeping right, you will get a reward< br />
50BTC-> 25BTC-> 12.5btc, the reward will be halved for every 210000 bitcoins
the process of bitcoin competing for bookkeeping rights is called mining. The node competing for bookkeeping right is called miner.
8. There are many bitcoin wallets. The operation of bitcoin wallets is relatively simple, the data is secure, and they can arrive at the account quickly. No matter how much you say, you still need to feel deeply. You can just register and try.
9. It refers to offline wallet. Users usually send and receive bitcoin by using offline bitcoin wallet address, and then confirm signature by using wallet private key offline. Therefore, hackers are unable to steal the private key of cold wallet. Because there is a link to confirm the signature offline, bitcoin cold wallet is not as convenient as hot wallet.
Hot content
