How to send money to btcwallet
public key system: corresponds to a public key and a private key, keeps the private key in the application and publishes the public key. When Party A transmits information to Party B, it can use Party A's private key to encrypt the information, and Party B can use Party A's public key to decrypt the information, so as to ensure that the third party cannot impersonate Party A to send the information; At the same time, when Party A transmits information to Party B, it is encrypted with Party B's public key and sent to Party B, and then Party B decrypts it with his own private key, so as to ensure that the third party cannot eavesdrop on the communication between the two people. RSA is the most common public key system, but the lliptic curve digital signature algorithm is used in bitcoin protocol. What's the difference between cash and bank account? Bitcoin is an electronic currency in BTC. In this article, it is also used to refer to the whole bitcoin system. Like opening an account in a bank, the corresponding concept in bitcoin is address. Everyone can have one or more bitcoin addresses, which are used to pay and collect money. Each address is a string that starts with 1. For example, I have two bitcoin accounts, and. A bitcoin account is uniquely determined by a pair of public key and private key. To save the account, you only need to save the private key file. Unlike bank accounts, banks keep all transaction records and maintain the book balance of each account, while bitcoin's transaction records are jointly maintained by the whole P2P network through a pre agreed protocol. How much money is in my account address? Although the current account balance can be seen by bitcoin software, unlike banks, there is no place to maintain the book balance of each address. It can only calculate the account balance in real time through all historical transactions. How do I pay? When I pay from address a to address B of the other party, the payment amount is e. at this time, both parties will announce the transaction information to each network node, telling address a to pay to address B, and the payment amount is e. In order to prevent the third party from forging the transaction information, the transaction information will be encrypted with the private key of address A. at this time, the network node receiving the transaction information can use the public key of address a to verify that the transaction information is indeed sent by address a. Of course, trading software will help us do these things, we just need to input the relevant parameters in the software. What will the network node do after receiving the transaction information? This is the most important part of the bitcoin system, which needs to be elaborated. For the sake of simplicity, only bitcoin protocol has been implemented. In the current version, each network node will save all transaction information synchronously. There are two kinds of transaction information in history, one is & quot; Verified & quot; The transaction information, that is, the verified transaction information, is stored in a series of "blocks". Each & quot; block" Is the previous & quot; bock" The ID of each block is the hash code of the hash code of the block and the new transaction information (see an actual block). The other category refers to those who also & quot; Unverified & quot; The transaction information just paid above belongs to this category. When a network node receives new unverified transaction information (possibly more than one), it can calculate the book balance of each address at that time because the node keeps all the transaction information in history, so it can calculate whether the transaction information is valid, that is, whether there is enough balance in the payment account. After eliminating the invalid transaction information, it first takes out the last & quot; block" Then, the unverified transaction information is combined with the ID, and a verification code is added to form a new "block". It needs a lot of calculation to build a new block, because it needs to calculate the verification code, so that the above combination becomes a block, that is, the first several bits of the hash code of the block are 1. At present, the first 13 bits need to be 1 (generally, the specific method is uncertain), which means that if the block is generated by enumeration method, the average number of enumerations is 16 ^ 13. Using CPU resources to generate a block is called "gold mining", because the proction of the block will get a certain reward, and the reward information has been included in the block. When a network node generates a new block, it will broadcast to other network nodes. However, this network block may not be accepted by the network, because it is possible that other network nodes have proced the block earlier. Only the earliest block or the block with the largest number of subsequent blocks is valid, and the remaining blocks are no longer used as the initial blocks of the next block. How does the other party confirm that the payment is successful? When the payment information is distributed to the network node, the network node begins to calculate whether the transaction is valid (that is, whether the account balance is enough to pay), and attempts to generate blocks containing the transaction information. When six blocks (one direct block and five subsequent blocks) contain the transaction information, the transaction information is considered "verified", so that the transaction is formally confirmed, and the other party can confirm the successful payment. A possible problem is that I will pay the balance of address a to address B, and at the same time pay to address C. If I only verify that the single comparison transaction is valid. At this point, my way of cheating is to generate six blocks including B to B and six blocks including C to C before the truth is revealed. Because I need a very long CPU time to generate a block, compared with the whole network, the probability of my cheating success is very small. What is the motivation of network nodes to proce blocks? As can be seen from the above description, in order to make the transaction information effective, the network node needs to generate 1 and 5 subsequent blocks to contain the transaction information, and such block generation is very CPU intensive. How to let other network nodes help to proce blocks as soon as possible? The answer is very simple. The agreement stipulates that BTC will be rewarded for the address where the block is proced, as well as the Commission promised by both parties. At present, the reward for procing a block is 50btc, which will be halved every four years in the future. For example, the reward will be 25btc from 2013 to 2016. Is the transaction anonymous? Yes, and No. All bitcoin transactions are visible. We can check all transaction records of each account, such as mine. But what's different from the banking monetary system is that everyone's account itself is anonymous, and everyone can open many accounts. In general, anonymity is not as good as it claims. But bitcoin has another advantage in doing black market trading: it can't be frozen. Even if the police trace a bitcoin address, there is nothing they can do unless they trace the computer used by the exchange based on the Internet address. How to ensure that bitcoin does not depreciate? Generally speaking, in the case of equivalent trading activities, the value of money is inversely proportional to the amount of money issued. Unlike the traditional money market, the central bank can determine the amount of money issued. Bitcoin does not have a central issuing institution. Only by procing blocks can we get a certain amount of BTC currency. Therefore, bitcoin's new amount of money depends on: 1. The speed of procing blocks: bitcoin's agreement stipulates that the difficulty of procing blocks is fixed at an average of 2016 every two weeks, about 10 minutes. Moore's law of doubling CPU speed every 18 months will not speed up the proction of block. 2. The number of rewards for block proction: at present, 50 BTC is awarded for each block proced, which is halved every four years. In 2013, 25 BTC is awarded, and in 2017, 12.5 BTC is awarded. Considering the above two factors, bitcoin's currency issuing speed is not controlled by any single node in the network. Its protocol makes the currency stock known in advance, and the maximum stock is only 21 million BTC
The private key of bitcoin wallet cannot be viewed online. Bitcoin exists on the platform. To download core or classic is the real wallet, and then you can view it
[description of private key of bitcoin wallet]:
1. Wallet encryption refers to automatically encrypting and storing the wallet with private key. The official bitcoin client supports wallet encryption since version 0.4.0. The encrypted wallet will prompt you to enter your password every time you pay. If the password is wrong, the client will refuse to pay
2. If you replace it with the earliest backup wallet (wallet. DAT), you can still trade normally. Considering the principle of bitcoin, it can be concluded that as long as there is a private key (wallet), you can prove that you are the legitimate owner of the wallet. No matter whether you encrypt or delete the wallet (the core is the private key corresponding to an address), you can't deny it
3. When backing up the bitcoin wallet, you should also pay attention to the existence of bitcoin payment change mechanism (for example, if you send 50 BTC in a complete 100 BTC to an address, the system will send 50 BTC to the other party's address, and return 50 BTC to a new address of your client, which will not be directly displayed in your address list)
4. After sending bitcoin to other addresses 100 times or using 100 different addresses to receive bitcoin, please back up your wallet again, otherwise the returned and received bitcoin will be lost forever. In addition to encrypting wallets, users can also generate offline paper wallets and brain wallets
By using secure encryption technology to store digital currency, you only need to have a contract address to transfer the currency. The function of this wallet allows you to put the currency in your wallet when you don't use it, which is higher than the security factor in the exchange
wallet is actually used as an address protocol, because all transactions on the blockchain are recorded in the whole network. Every bitcoin transaction to an address is recorded in the whole network and cannot be tampered with. When bitcoin arrives in your wallet, everyone can see the record to prove it
unlike most traditional currencies, bitcoin is a digital currency. Therefore, the method of this kind of currency is completely different, especially when it is obtained and stored. Because bitcoin doesn't have any physical shape or form, it can't be stored anywhere technically. Instead, it is the private key used to access your public bitcoin address and sign transactions that need to be stored securely. The combination of the recipient's public key and private key makes bitcoin transaction possible
there are several different forms of bitcoin wallets, which can meet different needs, and are different in security, convenience, accessibility and so on
paper wallet
a paper wallet is essentially a document that contains a public address and a private key that can be used to receive bitcoin, allowing you to spend or transfer bitcoin stored at that address. These are usually printed in the form of QR codes so that you can quickly scan them and add the key to your software wallet for transactions
paper wallets can be generated using services such as bitaddress or bitcoinpaperwallet, allowing users to create completely random bitcoin addresses and private keys. The generated document can then be printed, some of which offer tamper proof design, and even can choose to order holographic tags and use them
the main advantage of banknote wallet is that the key will not be stored in any place in digital form, which makes it completely free from hacker attacks. It can record the malware users hit and basically any form of digital theft. However, some precautions still need to be taken when creating wallets
obviously, before generating a paper wallet, you need to make sure that no one is watching you. To eliminate the risk of any spyware monitoring activity, it is recommended to use a clean operating system running from a USB flash drive or DVD, such as Ubuntu
in addition, once the paper wallet is set up, the website code should be able to run offline, which allows you to disconnect from the Internet before actually generating the key. Finally, use a printer that is not connected to the network
in addition, it is very important to know that you are printing valuable personal information on a piece of paper. Therefore, you need to take some measures to protect that piece of paper. For example, it is suggested to put it in a sealed plastic bag to prevent water stop, moisture and general wear. Some people like to laminate it and store it in a safe, storage box or entrust a lawyer to handle it
physical bitcoin
physical bitcoin usually preloads a fixed number of BTCs, and the intention is that as long as the private key remains hidden, it cannot cost its value. This is usually achieved by implementing tamper proof seals
bitbill's first proct was like a credit card, but most of its subsequent substitutes were shaped into a round medal. Mike Cadwell, a cryptocurrency enthusiast nicknamed "casascius", created the first popular casascius physical bitcoin in 2011
the private key is hidden under the strippable hologram, and when it is removed, it leaves the tamper proof mode. In exchange, the coin lost its numerical value. Since then, there have been several new coin makers
physical bitcoin is a very convenient way to store your funds more safely, which is very useful in offline transactions. Most importantly, they have recently become a valuable collection. However, the main drawback is serious security issues
in November 2013, Mike Cadwell was asked to stop the operation of the financial crime enforcement network because his work was considered to be a money sender. The rules of the campaign were so overwhelming that he had to stop selling items containing digital bitcoin. Since BTC is still a legal gray area in many countries, these items may even be considered counterfeit by the authorities
mobile
BTC is an indispensable tool for those who actively use bitcoin every day to pay for goods or trade face-to-face in stores. It runs as a smartphone app, stores your private key and allows you to pay for things directly from your phone
in addition, some applications enable users to use their smartphone's near-field communication function, which means that they can simply click on their phone to oppose readers without having to provide any information at all
any complete bitcoin client needs to access the whole blockchain ledger, which is growing and needs several thousand megabytes of storage space. Therefore, mobile wallet uses simplified payment verification (SPV) technology. They only apply to a very small subset of the blockchain and rely on trusted nodes in the bitcoin network to ensure that they have the correct information
although bitcoin storage is a convenient mobile solution, mobile wallet is vulnerable to hackers. In addition, if someone just accesses your mobile device, you may lose control of the wallet. There are a variety of bitcoin wallet applications running on Android devices. Apple banned bitcoin wallets from the app store in February 2014, but withdrew its decision a few months later
Web wallet
Web wallet stores your private key on the server of the company providing such service. The server is always online and controlled by someone else. Different services provide different functions, some of which connect to mobile and desktop wallets to your address on the device you own
very similar to mobile wallet, e-wallet enables users to access their funds anytime, anywhere through any device connected to the Internet. But unless implemented properly, the organization that runs the site may access your private key and take full control of your money. In addition, some e-wallets operate on the basis of exchanges, and some exchanges close down and escape users' funds
Desktop wallet
Desktop wallet has been downloaded and installed on your computer, and your private key is stored on the hard disk. By definition, they are more secure than online and mobile wallets because they do not rely on third parties for data and are more difficult to steal. They are still connected to the Internet, which makes them inherently insecure. But desktop wallets are a great solution for those who trade a small amount of bitcoin from their computers
Desktop wallet has many different choices to meet different needs. Some focus on security, some focus on anonymity, etc
Hardware
Hardware wallet is a unique bitcoin wallet, which can store the user's private key in a secure hardware device. This is the safest way to store any amount of bitcoin, and there is no verifiable event that money is stolen from the hardware wallet
unlike paper wallets, paper wallets must import software at some time, and hardware wallets can be used safely and interactively. In addition, they are not affected by computer viruses, and the stored funds cannot be transmitted to output devices in clear text. In most cases, their software is open source
some hardware wallets even have screens, which adds another layer of security because they can be used to verify and display important wallet details. For example, the screen can be used to generate recovery phrases and confirm the amount and address of the payment you want to make. Therefore, as long as you invest in a real equipment with good reputation made by a reliable and competent manufacturer, your funds will be safe and reliable
bitcoin wallet and security
possible problems:
capture malware. Malware can scan your disk and find your private key. In a few seconds, all your bitcoins will disappear. Trojan can encrypt all the files on the hard disk. After that, it may find all the links to your wallet, realize how much money you have and ask for the exact amount of bitcoin to decrypt your hard drive
virtual exchange can use your money to escape. You can lose the laptop or mobile phone on which the wallet is installed
suggestions:
< UL >avoid using any wallet that needs Internet connection; Please use the refrigerated option instead
check everything carefully. For example, you can receive an email from blockwallet, but it's actually from blockcwallet, and if you authorize, your bitcoin will disappear immediately
Call the police. If you receive a similar e-mail, you can directly pull the sender into the blacklist, and report the e-mail, so that you will not receive such e-mail. In addition, if the e-mail box can, you can set a receiving rule, set sensitive words, and then do not accept such e-mail, which can help to avoid such e-mail. Do not click any link above to avoid being stolen
if the threat of extortion is violence, the perpetrator claims that it will be carried out in the future; The threat of kidnapping violence was implemented at that time and on the spot. The perpetrator of the crime of extortion does not abct the victim to hide and control, while the crime of kidnapping should abct the victim to hide and control
extended information:
the constituent elements of the crime of extortion:
1. Subjective elements
this crime shows direct intention in subjective aspect, and must have the purpose of illegally extorting other people's property. If the actor does not have this purpose, or the purpose of obtaining property is not illegal, for example, the creditor uses threatening language to urge the debtor to speed up the repayment in order to repay the long overe debt, it does not constitute the crime of extortion
The object of this crime is a complex object, which not only infringes the ownership of public and private property, but also endangers the personal rights or other rights and interests of others. This is one of the distinctive characteristics of this crime which is different from larceny and fraud. The object of this crime is public and private property1. Prepare the bitcoin you want to send. The client is responsible for collecting the balance of bitcoin in your wallet (bitcoin QT) to prepare for payment, because every bitcoin you receive is stored in your wallet until you spend it. If you receive two payments from 3btc and 2btc, their records in the wallet are independent of each other, that is, a 3btc and a 2btc, rather than merging them into 5btc (the wallet only records transaction details and does not merge the balance, but you can see the total balance on the interface of the wallet). As time goes on, many bitcoins of different amounts will accumulate in your wallet, So when you send bitcoin, the wallet has to decide which bitcoin is the most suitable for this sending. The bitcoin you get in a transaction is called "inputs" and the bitcoin you spend is called "outputs". There are multiple inputs and outputs in your wallet
2. If your outputs are less than 0.01btc (including the fund changes inside your wallet), you have to pay a handling charge of 0.0001, even if you transfer it to yourself. The wallet has an established rule when preparing your payment amount, that is, when preparing the payment amount in many inputs, try to avoid the amount change less than 0.01btc (for example, if you want to pay 5.005btc, the wallet should choose 3 + 2.005 or 1 + 1 + 3.005 instead of 5 + 0.005)
3. The larger the amount, the higher the age, and the higher the priority. If the amount you send is too small or your bitcoin has just been mined, then your transfer is no longer free. Each transaction will be assigned a priority, which is determined by the degree of currency, the number of bytes and the number of transactions. Specifically, for each input, the client will first multiply the number of bitcoins by the time they exist in the block (currency age, age), and then divide all the procts by the size of the transaction (in bytes). The calculation formula is: priority = sum (input)_ value_ in_ base_ units * input_ age)/size_ in_ If the calculation result is less than 0.576, then the transaction must pay the handling fee. If you do have a large amount of small input and want to transfer it out for free, you can add a large amount of bitcoin with a large age, which will increase the average priority, so that you can transfer out bitcoin for free
4. Charge per kilobyte. At the end of the transfer, the client will detect the size of the transfer (in bytes). The size generally depends on the amount of input and output. The calculation formula is as follows: 148 * input amount + 34 * output amount + 10. If the size of the transfer exceeds 10000 bytes, but the priority meets the free standard, you can still enjoy the free transfer, Otherwise, there will be a handling charge. The cost of 1000 bytes is 0.0001btc by default, but you can also add it in the client. Open the tab "settings & gt; Options & gt; The main purpose is to adjust the handling charge. If the service charge you are setting is less than 0.0001, BTC is calculated as 0.0001.
it's good for you to directly exist in a large website. Each website now has several verifications. SMS verifies Google token. Why don't you just click BTC to withdraw cash when you want to use it? I think it's easier to lose it if I keep it myself. You're not worried about website failure, are you? If the large websites can be gone, it means that BTC has completely collapsed, and it's useless for you to ask for it
and why do you want to use the online wallet? I'll go to see if you can use the multibit wallet. This wallet doesn't need to be updated. The data is very fast
at the beginning, study the technical principle and market platform first. Don't worry about wallet. Now it's not convenient to pay for BTC when you go out, and your whole online wallet is meaningless.
