Sending time of bitcoin Wallet
The private key of bitcoin wallet cannot be viewed online. Bitcoin exists on the platform. To download core or classic is the real wallet, and then you can view it
[description of private key of bitcoin wallet]:
1. Wallet encryption refers to automatically encrypting and storing the wallet with private key. The official bitcoin client supports wallet encryption since version 0.4.0. The encrypted wallet will prompt you to enter your password every time you pay. If the password is wrong, the client will refuse to pay
2. If you replace it with the earliest backup wallet (wallet. DAT), you can still trade normally. Considering the principle of bitcoin, it can be concluded that as long as there is a private key (wallet), you can prove that you are the legitimate owner of the wallet. No matter whether you encrypt or delete the wallet (the core is the private key corresponding to an address), you can't deny it
3. When backing up the bitcoin wallet, you should also pay attention to the existence of bitcoin payment change mechanism (for example, if you send 50 BTC in a complete 100 BTC to an address, the system will send 50 BTC to the other party's address, and return 50 BTC to a new address of your client, which will not be directly displayed in your address list)
4. After sending bitcoin to other addresses 100 times or using 100 different addresses to receive bitcoin, please back up your wallet again, otherwise the returned and received bitcoin will be lost forever. In addition to encrypting wallets, users can also generate offline paper wallets and brain wallets
a person signed by Nakamoto Tsui has put forward a revolutionary idea: let's create a currency that is not controlled by the government or anyone else! This idea is crazy: there is no asset support behind a string of figures, and no one is responsible for it. How can anyone accept it when you pay it to the other party as money
Merkle tree
looks like a binary tree, but this is the lower two nodes. Take the hash value to get the upper node. Just remember the root node to detect whether the whole tree has been tampered
the root hash value is stored in the block header, and the transaction process is stored in the block body. All nodes include block header and block body, but light nodes (such as bitcoin wallets on mobile phones) only include block header. This tree can prove that a transaction has been written into the blockchain
3. Consensus agreement
two issues should be paid attention to in decentralized currency:
1. Who can issue digital currency: mining
2. How to verify the legitimacy of transactions: blockchain
double spending attack
double spending attack is a major challenge of digital currency
all transactions in bitcoin have input and output. Where does bitcoin come from and where does it go
under normal circumstances, there may be two bifurcations, because two nodes obtain the bookkeeping right at the same time, and the two nodes package the block and calculate the random number at the same time. At this time, the two bifurcations will coexist temporarily until one of the blocks finds the next block first, which becomes the longest legal chain, and the other one is discarded<
Sybil attack
a malicious node keeps generating accounts. If the total number of accounts exceeds half of the total accounts, it obtains the control of the blockchain
consensus protocol in bitcoin
some nodes are malicious, and most nodes are good
idea 1: pack some transactions into blocks as candidate blocks, let each block vote, and write them into the blockchain if they pass
No, because some malicious nodes have been publishing blocks containing malicious transactions, and they have been voting and occupying resources. And some nodes don't vote<
idea 2: vote not by the number of accounts, but by computing power. Each node can generate legal transactions and put them into the block. These nodes start to try random numbers until H (block header) ≤ target is found, then this node has the right to account
the only way to generate bitcoin
coinbase transaction. There is no need to point out the source of the currency. If you have the bookkeeping right, you will get a reward< br />
50BTC-> 25BTC-> 12.5btc, the reward will be halved for every 210000 bitcoins
the process of bitcoin competing for bookkeeping rights is called mining. The node competing for bookkeeping right is called miner.
What are the wallets in our lives? Put your money, cards, and mobile phone, money and bank cards are issued by the bank. Mobile phone Alipay WeChat payment is paid through the third party, which is completely decentralized, and how it will be stored and retained? Besides being placed in the exchange, it can also be placed in the wallet. What are the types of bitcoin wallets? How to achieve point-to-point decentralization? Blockchain wallet is not used to hold money?! Have you stepped on thunder
miaozhou blockchain issue 08 can teach you to identify the mistakes of blockchain wallet. More blockchain beginners are welcome to pay attention to Babbitt's miaozhou blockchain

through the information panel, the guardian can see the current image and detailed attribute values of the character
[attribute stone]
- the guardian will drop various types of [attribute stone] when fighting in the game. After using the [attribute stone] in the backpack, you can add the corresponding attributes
★ the guardian can view the attributes currently added through the attribute stone interface
★ the guardian has an upper limit on the attributes obtained through the attribute stone. After reaching the upper limit, he can't continue to improve the attributes by using the attribute stone; When a character raises the upper limit of an attribute, the attribute stone that was previously used after exceeding the upper limit can continue to raise the attribute
★ the upper limit of the attribute stone can be increased by increasing the level of the character and the advanced level of the character
[advanced]
★ level: there are six stages of character advancement, each stage can be upgraded by 5 levels (each level is added with attributes), and each level can also improve the basic attributes of character upgrading
★ function: after upgrading, the attribute promoted by each level will be higher (the growth value of the protagonist will be increased when upgrading)
progress: Advanced requires the consumption of corresponding levels of advanced essence and gold to enhance the progress. Only increase but not decrease), and the progress will return to 0 after advanced to the next level
★ critical hit: it is possible to generate critical hit ring enhancement, and you will get more progress ring critical hit.
