Blockchain SSL
because the essence of filecoin mining is storage, from the perspective of data security, most mining machinery manufacturers currently use 8t enterprise class SATA mechanical hard disk, with a price of about 1300-1500 yuan. A few mining machinery manufacturers choose 10t or 12t, and they basically choose several mainstream brands, such as Seagate, western data or Toshiba, A 12 bit blade server with 8t hard disk can have 96T storage space
SSD is generally not considered, because the cost performance is low, and if the data is lost, it is difficult to recover. If the data is lost ring the mining of filecoin, there is a penalty
generally, the CPU of mining machinery will choose inter or AMD platforms. Some mining machinery manufacturers only list inter E5 level, but do not specify that it is E5 with several cores. We must pay attention to the official requirement of minimum 8 cores
only a few single machine mining will use Inter's E5, E7 or AMD 3970x. The more mainstream mining association will choose to use the affordable amd platform with high cost performance for cluster mining. Few people choose the inter platform. Moreover, single machine mining requires high memory and low cost performance
AMD epyc7302 and 7282 series CPUs are the mainstream choice of cluster mining. They have been out of stock recently, and it may take half a month or even a month to adjust the goods. Moreover, the price of related accessories suitable for building filecoin mining machine is rising recently. For example, in 2019, the price of h11ssl-i ultra micro server main board is about 3000 yuan, At this stage, 5500 yuan can only take the futures after a week, so it is difficult for people who have no relevant channels to assemble their own accessories. Whether it's accessories or finished mining machines, it's almost one price a day
considering that each person's specific cost of taking goods is different from the cost of assembly and configuration, we can calculate the cost of a mainstream 96tb miner. If we have accessory related channels and have the strength to assemble, the cost is about 50000 yuan. If we buy finished procts directly, it is about 80000 yuan
if you want to buy the most affordable IPFs filecoin miner, you can pay attention to my company's medium Name: Laochen Shuo coin
IPFs (interplanetary file system) interstellar file system was set up by Juan Bennet in May 2014. It settled in Y combinator (successfully hatched airbnb, dorpbox, etc.) and got huge investment from YC. In 2015, Juan Bennett established protocol labs and released IPFs. At present, protocol labs have five independent projects: IPFs, filecoin, libp2p, ipld and multiformats. Most of its team members are from international famous universities, and Stanford University is the majority
usage scenarios of IPFs:
as a mounted global file system, mounted under IPFs and IPNs
as a mounted personal synchronization folder, version management and publishing are automatically performed, As an encrypted file or data sharing system, as the version package manager of all software, as the root file system of virtual machine, as the boot file system of VM (under the management program), as a database, applications can directly write data to Merkle DAG data model to obtain all versions, Buffer, as well as the allocation provided by IPFs
as a linked (and encrypted) communication platform
as a CDN for integrity checking of large files (without SSL)
as an encrypted CDN
on Web pages, As a web CDN
as a link, there will always be a new and eternal web
to learn more about IPFs, please pay attention to the IPFs force area of our website
Taking the third-party E-contract platform for example, the security measures adopted are as follows:
1. Network security
1) the trusted signature system uses the standard of HTTPS to provide API services to the outside world, and the SSL protocol is used to reinforce the network links, and the aes256 symmetric encryption algorithm is used to achieve security encryption, even if the attacker intercepts the network transmission packets, It also can't get the plaintext content, so as to realize the security of network transmission
The system can scan and filter the transmitted data packets, set the access rules according to the user, IP address, access type and other ways, and detect and prevent the common intrusion behavior
3) the trusted signature system has a perfect intrusion detection function, which can respond immediately to the detection of illegal behavior. The response methods include: the network system supports regular inspection of security vulnerabilities, and corrects network security vulnerabilities and misconfiguration in the system according to the inspection results
4) the firewall has been set for the connection between the electronic seal management mole and the external system, and the point-to-point response is realized through the IP white list to prevent abnormal IP requests for API services P>
two, data security
assured sign electronic contract system provides the same level of data encryption services as Alipay, uses sectioned file storage, dynamic password and other security protection mechanisms to ensure the safety of contract data, so as to prevent attackers from getting the finished data content. p> Segmented file storage: a data security storage scheme, which logically divides the original file into multiple data blocks, generates dynamic salt password through specific information, and stores it on different servers after encryption. Through segmented storage, the encrypted files are stored on different servers to prevent all files from being decrypted at one time by attackers
Dynamic password: a password generated according to specific information, such as the MD5 value of account name, and used to encrypt the file. Even if the file encrypted by salt password is obtained by website attackers, because there are no encryption rules, the cost of decryption is increased3) blockchain certificate deposit
assured signature will store electronic contracts in assured signature by using blockchain technology, and jointly promote the application of certificate deposit based on blockchain through cooperation with suppliers. Users can store the electronic contract, signer, file hash value and other information in the blockchain through assured signature. Once stored, no party can tamper with it to ensure the effectiveness and security of users' electronic evidence
For the service request put forward by the owner, we will set different response levels and take corresponding solutions according to the specific fault and risk degree. The specific response levels and response strategies are as follows: (1) for the local soft fault that does not endanger the normal operation of the whole system, Trust sign to guide the on-site users through telephone or e-mail
(2) for soft faults that do not endanger the operation of the system and cannot be solved by users, we can diagnose and solve the problems through remote access service with the consent of users; Or send the problem equipment to our company for troubleshooting
(3) for the hardware failure that endangers the system operation, system crash or other failure that can not be solved by the above means, the engineering and technical personnel will arrive at the user's site with spare parts within the promised time and resume the system operation within the promised time; Or send the standby machine to the user's designated place in the fastest way to replace the problematic equipment
Electronic contract signing means signing a contract online, that is, completing the process of signing a contract online. Generally speaking, it means moving the contents of a paper contract online to form an electronic contract, which is signed online through a computer / mobile phone
Let's talk about the following issues you may be concerned about:1. The legal basis for electronic signing can be found in both the contract law and the electronic signature law. These regulations not only make it clear that electronic contract signing has the same legal effect as traditional offline contract signing, but also establish the legal status of electronic contract signing from the legislative level
2. Only the electronic contract with "reliable electronic signature" can have the same legal effect as the offline contract The law of the people's Republic of China on electronic signature has established the reliable legal effect of electronic signature, and also laid a good foundation for the legal effect of electronic signature
3. At present, the best way to sign a contract is a reliable third-party e-signing platform. Taking our platform as an example, in addition to providing reliable e-signature to ensure the legal effect of E-contract, we can provide one-stop e-signing services: Online contract signing, online contract management, online contract editing, and online certification in case of contract disputes, Applying for legal services such as online arbitration is the best choice to rece costs and improve efficiency
4. Except for some cases that are not applicable to electronic signature stipulated in the electronic signature law, electronic signature (enterprise electronic official seal) can be used for electronic signature in most cases. Moreover, the law is constantly relaxed, and the paperless era has graally come
5. For the problem of how to sign an electronic contract, take our platform as an example, real name authentication - online signing - sending contract - signing by the other party - contract management. The user can digitally sign and send the document when initiating the contract signing. After receiving the contract, the receiver will automatically verify the digital signature, confirm that the identity of the document signer is reliable, and the document has not been illegally tampered in the transmission process, and then sign the document. Is it convenient and fast to complete the electronic signing P>
in short, electronic contract can improve the efficiency of contract signing, contract management more convenient, simultaneous interpreting and storage, and saving enterprise costs. Compared with the paper contract, electronic contract has shown great advantages in the convenience, efficiency, security and cost of contract signing. The introction of electronic contract has become very necessary for the healthy development of enterprises
The use of digital signature can ensure that the sender can not deny and forge information, which is a security measure
in public key cryptography, a key is a key pair composed of a public key and a private key. Digital signature is to encrypt with private key and decrypt with public key. Because the public key can not calculate the private key, the public key will not damage the security of the private key. The public key can be propagated publicly without confidentiality, while the private key must be kept secret
Therefore, when someone encrypts information with his private key and can decrypt it correctly with TA's public key, it can be sure that the message is signed by someone, because other people's public key can't decrypt the encrypted information correctly, and other people can't have that person's private key to proce the encrypted informationin essence, digital signature is a kind of security measure that the receiver can prove the authenticity of the received message and the sending source to the third party, and its use can ensure that the sender can not deny and forge the information
the main way of digital signature is: the sender of the message generates a hash value (or message digest) from the message text, and the sender encrypts the hash value with its own private key to form the sender's digital signature, and then the digital signature will be sent to the receiver as an attachment of the message, The receiver first calculates the hash value (or message digest) from the received original message, and then decrypts the digital signature attached to the message with the sender's public key. If the two hash values are the same, the receiver can confirm that the digital signature belongs to the sender