Position: Home page » Blockchain » Blockchain privacy
Blockchain privacy
Publish: 2021-03-28 19:35:22
1. Because blockchain technology has natural advantages in realizing smart contracts
bitcoin, Ruitai coin, Laite coin, Ethereum and other digital cryptocurrencies all use blockchain technology
blockchain is an important concept of bitcoin, which is essentially a decentralized database and the underlying technology of bitcoin. Blockchain is a series of data blocks generated by cryptography. Each data block contains the information of a bitcoin network transaction, which is used to verify the validity of the information (anti-counterfeiting) and generate the next block.
bitcoin, Ruitai coin, Laite coin, Ethereum and other digital cryptocurrencies all use blockchain technology
blockchain is an important concept of bitcoin, which is essentially a decentralized database and the underlying technology of bitcoin. Blockchain is a series of data blocks generated by cryptography. Each data block contains the information of a bitcoin network transaction, which is used to verify the validity of the information (anti-counterfeiting) and generate the next block.
2. How to play the new reading team? Just kick the players out
3. Can solve, bit box is a good application proof
4. Jinwowo network believes that privacy protection is the advantage of blockchain. We use cryptography and distributed structure to protect privacy
jinwowo will use blockchain technology to promote the legalization of big data business. The encryption of blockchain technology can ensure that the privacy of data sources can be better protected while big data is called.
jinwowo will use blockchain technology to promote the legalization of big data business. The encryption of blockchain technology can ensure that the privacy of data sources can be better protected while big data is called.
5. In terms of data privacy protection, jinwowo blockchain technology will be greatly different from traditional big data. It will make use of the unique encryption method of blockchain to protect the privacy of platform users, and put an end to the "privacy leakage" incidents of some Internet famous enterprises. Let users experience good service and feel more at ease with their personal information.
6.
1. One ruble equals 100 Gobi
2. 1 Russian Ruble = 0.1238 RMB
then 1 Gobi = 0.001238 RMB
2 http://huilv.911cha.com/
above is the currency exchange rate query
7. The answer is of course not. What the blockchain system needs to preserve is also targeted
8. OSI
OSI is the abbreviation of open system interconnect, which means open system interconnection. The international organization for Standardization (ISO) has developed the OSI model. This model divides the work of network communication into seven layers: physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer. Layers 1 to 4 are considered to be lower layers, which are closely related to data movement. Layers 5 to 7 are high-level and contain application level data. Each layer is responsible for a specific task, and then transfers the data to the next layer
the first layer is the physical layer (that is, the first layer of OSI model), which is often ignored in the classroom. It seems very simple. However, some aspects of this layer sometimes need special attention. Physical layer is actually wiring, optical fiber, network card and other things used to connect two network communication devices together. Even a carrier pigeon can be considered a layer 1 device. Network troubleshooting often involves layer 1 problems. We can't forget the legend of connecting the whole floor with five kinds of wires. As the office chair is often pressed from the cable line, resulting in intermittent network connection. Unfortunately, this kind of fault is very common, and it takes a long time to remove it< The second layer is the data link layer. Remember, we're going to make it easier. The most important thing in layer 2 is that you should understand what a bridge is. A switch can be seen as a bridge, as people now call it. The bridge works in layer 2 and only focuses on the MAC address of Ethernet. If you're talking about MAC addresses, switches or network cards and drivers, you're in the category of layer 2. Hubs belong to the field of layer 1, because they are only electronic devices, without layer 2 knowledge. Layer 2 related issues have their own part in this webinar, so I will not discuss the details of this issue in detail now. Now we only need to know that layer 2 converts data frames into binary bits for layer 1 processing
the third layer is the network layer
two computers communicating in the computer network may pass through many data links, and may also pass through many communication subnets. The task of the network layer is to select the appropriate network routing and switching nodes to ensure the timely transmission of data. In the network layer, the frames provided by the data link layer are composed of data packets. The packet is encapsulated with the network layer packet header, which contains the logical address information -- the network address of the source site and the destination site address
if you are talking about an IP address, then you are dealing with the problem of layer 3, which is the "packet" problem, not the "frame" problem of layer 2. IP is part of the layer 3 problem, in addition to some routing protocols and address resolution protocols (ARP). Everything about routing is handled at layer 3. Address resolution and routing are important purposes of layer 3
the fourth layer is the transport layer for processing information. Layer 4 data units are also called packets. However, when you talk about specific protocols such as TCP, there is a special name. The data unit of TCP is called segments, while the data unit of UDP is called datagrams. This layer is responsible for obtaining all the information. Therefore, it must track the fragmentation of data units, packets arriving out of order and other possible dangers in the process of transmission. Another way to understand layer 4 is to provide end-to-end communication management. Some protocols such as TCP are very good at ensuring the reliability of communication. Some protocols don't care whether some packets are lost or not. UDP protocol is a main example
the fifth layer is the session layer
this layer can also be called the meeting layer or the dialogue layer. In the session layer and above, the data transmission units are no longer named separately, and are collectively referred to as messages. The session layer does not participate in the specific transmission. It provides a mechanism to establish and maintain communication between applications, including access verification and session management. If the server verifies the user login, it is done by the session layer
the sixth layer is the presentation layer, which mainly solves the problem of syntax representation of advocacy information. It transforms the data to be exchanged from the abstract syntax suitable for a user to the transmission syntax suitable for the internal use of OSI system. That is to provide formatted data representation and transformation services. Data compression and decompression, encryption and decryption are all in the charge of the presentation layer
Level 7 is "everything.". Layer 7, also known as the "application layer," is dedicated to applications. The application layer determines the nature of communication between processes to meet the needs of users and provides interface services between the network and user application software. If your program needs a specific format of data, you can invent some formats that you want to be able to send data to the destination, and create a layer 7 protocol. SMTP, DNS and FTP are all 7-layer protocols
the most important thing in learning the OSI model is what it actually means
suppose you are an operating system on the network. The network cards working in layer 1 and layer 2 will inform you when data will arrive. The driver handles the exit of the layer 2 frame, through which you can get a shiny and flashing layer 3 packet (hopefully). As an operating system, you will call some commonly used applications to process layer 3 data. If the data is sent from below, you know it's a packet sent to you, or it's a broadcast packet (unless you're also a router, but don't worry about it for the time being). If you decide to keep the packet, you will open it and take out the layer 4 packet. If it is a TCP protocol, the TCP subsystem will be called to open the packet, and then send the layer 7 data to the application waiting on the target port. That's the end of the process
when responding to other computers on the network, everything happens in reverse order. Layer 7 application will send data to the executor of TCP protocol. Then, the TCP protocol adds extra headers to the data. In this direction, the volume of data should be larger every step forward. TCP protocol adds a legal TCP field to IP protocol. The IP protocol then passes the packet to the Ethernet. The Ethernet sends the data to the driver as an Ethernet frame. Then the data goes through the network. The router on this line will partially decompose the packet to get the layer 3 header to determine where the packet should be sent. If the destination of the packet is the local Ethernet subnet, the operating system will replace the router to resolve the address of the computer and send the data directly to the host.
OSI is the abbreviation of open system interconnect, which means open system interconnection. The international organization for Standardization (ISO) has developed the OSI model. This model divides the work of network communication into seven layers: physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer. Layers 1 to 4 are considered to be lower layers, which are closely related to data movement. Layers 5 to 7 are high-level and contain application level data. Each layer is responsible for a specific task, and then transfers the data to the next layer
the first layer is the physical layer (that is, the first layer of OSI model), which is often ignored in the classroom. It seems very simple. However, some aspects of this layer sometimes need special attention. Physical layer is actually wiring, optical fiber, network card and other things used to connect two network communication devices together. Even a carrier pigeon can be considered a layer 1 device. Network troubleshooting often involves layer 1 problems. We can't forget the legend of connecting the whole floor with five kinds of wires. As the office chair is often pressed from the cable line, resulting in intermittent network connection. Unfortunately, this kind of fault is very common, and it takes a long time to remove it< The second layer is the data link layer. Remember, we're going to make it easier. The most important thing in layer 2 is that you should understand what a bridge is. A switch can be seen as a bridge, as people now call it. The bridge works in layer 2 and only focuses on the MAC address of Ethernet. If you're talking about MAC addresses, switches or network cards and drivers, you're in the category of layer 2. Hubs belong to the field of layer 1, because they are only electronic devices, without layer 2 knowledge. Layer 2 related issues have their own part in this webinar, so I will not discuss the details of this issue in detail now. Now we only need to know that layer 2 converts data frames into binary bits for layer 1 processing
the third layer is the network layer
two computers communicating in the computer network may pass through many data links, and may also pass through many communication subnets. The task of the network layer is to select the appropriate network routing and switching nodes to ensure the timely transmission of data. In the network layer, the frames provided by the data link layer are composed of data packets. The packet is encapsulated with the network layer packet header, which contains the logical address information -- the network address of the source site and the destination site address
if you are talking about an IP address, then you are dealing with the problem of layer 3, which is the "packet" problem, not the "frame" problem of layer 2. IP is part of the layer 3 problem, in addition to some routing protocols and address resolution protocols (ARP). Everything about routing is handled at layer 3. Address resolution and routing are important purposes of layer 3
the fourth layer is the transport layer for processing information. Layer 4 data units are also called packets. However, when you talk about specific protocols such as TCP, there is a special name. The data unit of TCP is called segments, while the data unit of UDP is called datagrams. This layer is responsible for obtaining all the information. Therefore, it must track the fragmentation of data units, packets arriving out of order and other possible dangers in the process of transmission. Another way to understand layer 4 is to provide end-to-end communication management. Some protocols such as TCP are very good at ensuring the reliability of communication. Some protocols don't care whether some packets are lost or not. UDP protocol is a main example
the fifth layer is the session layer
this layer can also be called the meeting layer or the dialogue layer. In the session layer and above, the data transmission units are no longer named separately, and are collectively referred to as messages. The session layer does not participate in the specific transmission. It provides a mechanism to establish and maintain communication between applications, including access verification and session management. If the server verifies the user login, it is done by the session layer
the sixth layer is the presentation layer, which mainly solves the problem of syntax representation of advocacy information. It transforms the data to be exchanged from the abstract syntax suitable for a user to the transmission syntax suitable for the internal use of OSI system. That is to provide formatted data representation and transformation services. Data compression and decompression, encryption and decryption are all in the charge of the presentation layer
Level 7 is "everything.". Layer 7, also known as the "application layer," is dedicated to applications. The application layer determines the nature of communication between processes to meet the needs of users and provides interface services between the network and user application software. If your program needs a specific format of data, you can invent some formats that you want to be able to send data to the destination, and create a layer 7 protocol. SMTP, DNS and FTP are all 7-layer protocols
the most important thing in learning the OSI model is what it actually means
suppose you are an operating system on the network. The network cards working in layer 1 and layer 2 will inform you when data will arrive. The driver handles the exit of the layer 2 frame, through which you can get a shiny and flashing layer 3 packet (hopefully). As an operating system, you will call some commonly used applications to process layer 3 data. If the data is sent from below, you know it's a packet sent to you, or it's a broadcast packet (unless you're also a router, but don't worry about it for the time being). If you decide to keep the packet, you will open it and take out the layer 4 packet. If it is a TCP protocol, the TCP subsystem will be called to open the packet, and then send the layer 7 data to the application waiting on the target port. That's the end of the process
when responding to other computers on the network, everything happens in reverse order. Layer 7 application will send data to the executor of TCP protocol. Then, the TCP protocol adds extra headers to the data. In this direction, the volume of data should be larger every step forward. TCP protocol adds a legal TCP field to IP protocol. The IP protocol then passes the packet to the Ethernet. The Ethernet sends the data to the driver as an Ethernet frame. Then the data goes through the network. The router on this line will partially decompose the packet to get the layer 3 header to determine where the packet should be sent. If the destination of the packet is the local Ethernet subnet, the operating system will replace the router to resolve the address of the computer and send the data directly to the host.
9. 1. Currency exchange
1 Russian Ruble = 0.1238 RMB
1 RMB = 8.0749 russian rubles
2, 50 russian rubles = 6.19 RMB
1 Russian Ruble = 0.1238 RMB
1 RMB = 8.0749 russian rubles
2, 50 russian rubles = 6.19 RMB
Hot content