Anti tampering of blockchain data
Yibao block chain technology is based on bcos open source platform, which can calculate metadata through sha-512 hash algorithm, timestamp service and pbft consensus algorithm, and flexibly expand alliance chain institutions and nodes. The data stored in the blockchain through easy preservation will be stored on the blockchain in the form of hash value. With the characteristics of decentralized and distributed storage in the blockchain, the authenticity and objectivity of the data can be effectively guaranteed, and tampering can be effectively prevented

- yinlian answer:
blockchain can realize the traceability and non tampering of data, because it is based on the distributed database established by cryptographic links, thus forming non tamperable data sources. Therefore, in the whole process of procts from proction to circulation, complete information records can be achieved, and comprehensive data information can be provided for regulatory authorities, so that they can more efficiently complete proct quality inspection and data interconnection and sharing. In this process, blockchain can solve four problems:
first, information can not be tampered, consensus can be reached and trust can be built. In the network node composed of each participant, data records are formed in the business process, and the information of proct logistics, warehousing and proction, including raw material source, processing and assembly, is stored in the blockchain network to provide data information of each link for regulatory departments, cooperative enterprises or institutions
Second, the process is open and transparent. In the process of business process, the proct's anti-counterfeiting and circulation can be realized by implanting an identification chip into the proct and registering it on the blockchain, so that it can have a digital identity, and then record all the information of the digital identity, such as source and flow, through the account book maintained jointly, so as to achieve the verification effect Third, save cost and improve efficiency. Under the condition of confidentiality, the data records on the blockchain are stored, transmitted, verified and analyzed by the regulatory department, and transferred among different departments, so as to achieve unified voucher, whole process record and enterprise credit reference, which can effectively solve the problems of multi-party participation, information fragmentation and repeated audit in circulation Fourthly, information sharing. The circulation of enterprise proct certification depends on the interconnection of public data resources among departments and institutions such as commerce, customs, quality inspection, instry and commerce, banking, etc. under the review environment of blockchain construction, all departments can obtain information synchronously, establish credit evaluation mechanism based on supply chain, and organically connect various supply chain platforms, so as to improve the credit rating, credit record, risk warning, risk management, etc Information disclosure and sharing of illegal and dishonest behaviorthe disadvantages of traditional anti-counterfeiting traceability are very obvious, and anti-counterfeiting traceability has always been an important scenario in blockchain application, such as yinlian, which also starts from the anti-counterfeiting traceability scenario, hoping to build a commercial blockchain
compared with the traditional centralized anti-counterfeiting Traceability Technology, yinlian uses the underlying technology of blockchain, and the merchants proce their own anti-counterfeiting codes to remove the trust problem of cheating by the intermediate anti-counterfeiting merchants. The main process is as follows:

hash function in blockchain is the key to anti tampering, and hash algorithm is a one-way cryptographic mechanism to ensure that transaction information is not tampered in blockchain. After receiving a piece of plaintext, hash algorithm will transform it into a short and fixed hash data in an irreversible way. So block association has but is not limited to tamper proof
2. Quantum secure communication is divided into quantum cryptography communication, quantum teleportation and quantum dense coding. It can be divided into classical communication and quantum communication. The former mainly transmits quantum key, while the latter can be used for quantum teleportation and quantum entanglement distribution. When quantum communication is eavesdropped, although the eavesdropper can't get the information, the communication is interrupted, which affects the normal communication. His anti eavesdropping is at the cost of interrupting the communication, so it doesn't seem as good as the legend.. At present, there are still many unsolved problems in quantum communication, such as short transmission distance, relay difficulty and so on
3. In secure communication, technology competition and complementarity are mutual reference and common development. In secure communication, blockchain should belong to network layer, and quantum communication should belong to physical layer. Therefore, there should be no competition result of who will replace who.
the suggestion is to redo the system, and then find the guardian God to reinforce the system security for you, so as to completely plug the loopholes.
1. Take South extension of Metro Line 1 from Nanjing South Station, pass 8 stops, and reach Xinjiekou station
2. Take Metro Line 2, pass 12 stops, and reach Xianlin central station
3. Walk about 810 meters, After arriving at Xianlin School of Nanjing University of Posts and telecommunications, you can see the picture of the building This data comes from the network map, and the final result is subject to the latest data of the network map
