Bitcoin encryption algorithm vulnerability
anyone can run software on specialized hardware and become a bitcoin miner. mining software monitors transaction broadcast through P2P network and performs appropriate tasks to process and confirm these transactions. Bitcoin miners can earn transaction fees paid by users to speed up transaction processing and additional bitcoin issued according to fixed formula
new transactions need to be included in a block with mathematical workload proof before they can be confirmed. This kind of proof is hard to generate because it can only be generated by trying billions of calculations per second. Miners need to run these calculations before their blocks are accepted and rewarded. As more people start mining, the difficulty of finding effective blocks will be automatically increased by the network to ensure that the average time to find a block remains at 10 minutes. Therefore, the competition for mining is very fierce, and no indivial miner can control the content contained in the block chain
workload proof is also designed to rely on previous blocks, which forces the time sequence of block chain. This design makes it extremely difficult to cancel previous transactions, because the workload proof of all subsequent blocks needs to be recalculated. When two blocks are found at the same time, the miner will process the first block received, and once the next block is found, it will be transferred to the longest block chain. This ensures that the mining process maintains a global consistency based on processing capacity
bitcoin miners can neither increase their rewards by cheating, nor deal with the fraulent transactions that destroy the bitcoin network, because all bitcoin nodes will reject the blocks containing invalid data that violate the bitcoin protocol rules. Therefore, even if not all bitcoin miners can be trusted, the bitcoin network is still secure
sha256 is an encryption algorithm.
there are basically two kinds of attacks, one is dictionary attack, the other is brute force attack
dictionary attack is to use common passwords and their simple variants as keys one by one. As long as your pass phrase is not hard enough, the possibility of successful attack is very high. So if you want to use this, you need to popularize the knowledge of cryptography first, and don't think it's very safe to add a long password
if you don't use the wallet generated by pass phrase, you can only crack it violently, which is equivalent to enumerating all the possible keys. At present, this is impossible, even if the electronic computer is becoming more and more powerful. However, quantum computer can do it theoretically, but don't worry too much. If such a powerful quantum computer comes out, it will not only endanger bitcoin
at the same time, bitcoin has a second layer of protection: if an address only accepts bitcoin but does not output it, its public key is confidential, that is to say, no one else can see the box, only the box number. At present, the process of decing the box from the box number can't even be done by quantum computer. In other words, if there is a quantum computer, bitcoin has a last line of Defense: it's temporarily safe to transfer your money to a new address
finally, some time ago, the wallet generated by the Android client was attacked because of a bug in the underlying random number generator. In fact, this function is not random securerandom, which Google quickly admitted and fixed. It's hard to say whether this kind of thing will happen again, but I don't think we need to worry too much.
there are about three kinds of currency in currency speculation. one is the base currency, which is similar to the representative of money. CNY and usdt Basic goods with value). One is the mainstream token, BTC, ETH (because of the national restrictions, the exchange can only trade in token, that is, take one kind of virtual currency to buy another kind of virtual currency, I don't know why.) The other is a variety of virtual currencies (commodities)
the purchase process is to first go to the exchange platform to find a personal seller with RMB to exchange for usdt, In the process of using usdt to exchange for the mainstream token BTC or eth used in purchasing various virtual coins, and finally using eth to purchase various virtual coins
A. base currency: CNY, usdt (exchangeable, need to be exchanged in good faith transactions with indivial buyers) B. mainstream token: BTC, ethc, virtual currency: all kinds of money, such as profit, need to be exchanged into usdt again, and then sold into CNY. Learn more about the coin circle
< blockquote >sharing area network ~ learn more about the coin circle
< / blockquote >experience: 1. Buy mainstream currency if you can't buy it. 2. If the new currency is not fried in January, it may become a banker to harvest leeks. 3. Just learned an experience, chasing up and killing down, meaning up do not buy, buy must be cut leeks If you have strength and value, you can hold it and wait for salted fish to turn over. 5. If the company is strong, the team is strong, and the executives are strong, you can pay more attention to it. Note: I don't understand the K line at all, and I don't understand the professional words, so I can only make a tentative decision on these purchase principles based on logical thinking
legal representative: Liu Yongqiang
time of establishment: October 18, 2010
registered capital: RMB 5.18 million
Instrial and commercial registration number: 410183000011904
enterprise type: limited liability company (invested or controlled by natural person)
address: sanlizhuang, xingmi Road, Xingyang City
elliptic curve digital signature algorithm is mainly used in the generation process of bitcoin public key and private key, which is the cornerstone of bitcoin system. SHA-256 hash algorithm is mainly used in the workload proof mechanism of bitcoin
the principle of bitcoin generation is the special solution generated by complex operation, and mining is the process of finding the special solution. However, the total number of bitcoin is only 21 million, and with the continuous mining of bitcoin, the more difficult it will be to proce bitcoin, and the cost of acquiring bitcoin may be higher than the price of bitcoin itself
the bitcoin block consists of a block header and the transaction list contained in the block. The size of the block header is 80 bytes, which is composed of 4-byte version number, 32 byte hash value of the previous block, 32 byte Merkle root hash, 4-byte timestamp (current time), 4-byte current difficulty value and 4-byte random number. A block header with a fixed length of 80 bytes is the input string used to prove the workload of bitcoin. Constantly change the random number in the block header, that is, the value of nonce, and do double sha256 operation on the block header after each change, and compare the result value with the target value of the current network. If it is less than the target value, the problem is solved successfully, and the workload is proved to be complete
the essence of bitcoin is actually the unique solution of a set of equations generated by a bunch of complex algorithms. Bitcoin is the first distributed virtual currency in the world, which has no specific distribution center. The network of bitcoin is composed of all users, because there is no center to ensure the security of data.
for people, the best way is to prevent the source of infection, do not open or run the unknown installation package, install a safe prevention attachment - bitcoin house
the best way to remove is to re install a system.
on the evening of October 23, Beijing time, the 150th anniversary edition of Nature magazine published a paper claiming that Google has successfully achieved "quantum hegemony" this event named "Hello world" in the quantum field immediately occupied the front page of the mainstream media, and the description of "quantum computing in 200 seconds = 10000 years of the most powerful supercomputer on earth" in the paper has become a hot topic of the whole Internet
at present, many cryptography and quantum cryptography experts are advocating the establishment of financial security system as soon as possible, except that the encryption currency projects such as TaiFang and quantum chain focus on quantum resistance. According to William tooton, a reporter from Bloomberg technology, on twitter last month, the National Security Bureau has been committed to the research of related technologies. Therefore, unless the threat of quantum computing suddenly erupts, bitcoin still has time to deal with its arrival“ Bitcoin is alive, consensus is there, currency is there, if not upgraded, it will not disappear because of algorithms or vulnerabilities. But the problem of quantum resistance has not been solved. With the continuous development of quantum computers and the arrival of more qubit chips, this will still be the sword of Damocles hanging on the head of cryptocurrency. "< br />
firstly, silicon steel must contain silicon, 0.8% - 0.48%, generally about 3%. Secondly, phosphorus, aluminum and copper are the main impurity elements. Tin and antimony are surface active elements, which can rece the iron loss and increase the magnetic inction strength of silicon steel ring final annealing.
