Position: Home page » Blockchain » Isolation network self built blockchain
Isolation network self built blockchain
Publish: 2021-05-05 14:39:41
1. There are many kinds of wallets in the market, which can be divided into desktop wallets, mobile wallets, online wallets, hardware wallets and paper wallets according to the platform; According to whether it is connected to the network, it can be divided into cold wallet and hot wallet; According to the degree of autonomy and the way of interaction with the network, it can be divided into full node wallet, SPV light wallet and third-party wallet
for blockchain wallets, you can see the evaluation of wallets in password finance if you go to the tutorial.
for blockchain wallets, you can see the evaluation of wallets in password finance if you go to the tutorial.
2. The most popular is bitcoin. Bitcoin has been popular for a long time. It can be cashed and converted into the currency of most countries. Users can use bitcoin to buy some virtual items, such as clothes, hats and equipment in online games. As long as someone accepts it, they can also use bitcoin to buy real-life items
in China, the other one I know is the network mutual aid blockchain, which represents the platform of concentric mutual aid. Blockchain technology is used to solve the shortcomings of the network mutual aid instry. At present, blockchain is also very popular in the network mutual aid instry.
in China, the other one I know is the network mutual aid blockchain, which represents the platform of concentric mutual aid. Blockchain technology is used to solve the shortcomings of the network mutual aid instry. At present, blockchain is also very popular in the network mutual aid instry.
3. In view of the security characteristics and shortcomings of the existing blockchain technology, we need to build a security system around the physical, data, application system, encryption, risk control and other aspects to improve the security performance of the blockchain system as a whole
1. Physical security
the network and host running the blockchain system should be in a protected environment. According to the regulatory requirements of specific business, the protection measures can be used to protect the physical network and host by means of VPN, firewall, physical isolation, etc
2. Data security
in principle, the data exchange between nodes of the blockchain should not be transmitted in clear text. For example, asymmetric encryption can be used to negotiate key, and symmetric encryption algorithm can be used to encrypt and decrypt data. The data provider should also strictly evaluate the sensitivity and security level of the data, decide whether to send the data to the blockchain, whether to desensitize the data, and adopt strict access control measures
3. Application system security
application system security needs to start from the aspects of identity authentication, authority system, transaction rules, anti fraud strategy, etc.
relevant personnel, transaction nodes and transaction data involved in application operation should be controlled in advance and auditable afterwards. Taking financial blockchain as an example, consensus algorithm with stronger fault tolerance, anti fraud and higher performance can be adopted to avoid joint fraud of some nodes
4. Key security
to encrypt the communication data between the blockchain nodes and the key to encrypt the data stored on the blockchain nodes, the plaintext should not exist on the same node, and the private key should be properly saved by the encryption machine. When the key is lost or leaked, the system can identify the relevant records of the original key, such as account control, communication encryption, data storage encryption, etc., and implement response measures to make the original key invalid. The key should also be managed strictly in the life cycle, and should not be permanently valid. It needs to be replaced after reaching a certain time cycle
5. Risk control mechanism
there should be careful detection measures for the network layer, host operation, data access of application system, transaction frequency and other dimensions of the system. For any suspicious operation, alarm, record and verification should be carried out. If illegal operation is found, loss assessment should be carried out, remedial measures should be taken at the technical and business levels, and security measures should be strengthened, And trace the source of illegal operation to prevent further attacks
Article source: white paper on blockchain technology and application development in China
1. Physical security
the network and host running the blockchain system should be in a protected environment. According to the regulatory requirements of specific business, the protection measures can be used to protect the physical network and host by means of VPN, firewall, physical isolation, etc
2. Data security
in principle, the data exchange between nodes of the blockchain should not be transmitted in clear text. For example, asymmetric encryption can be used to negotiate key, and symmetric encryption algorithm can be used to encrypt and decrypt data. The data provider should also strictly evaluate the sensitivity and security level of the data, decide whether to send the data to the blockchain, whether to desensitize the data, and adopt strict access control measures
3. Application system security
application system security needs to start from the aspects of identity authentication, authority system, transaction rules, anti fraud strategy, etc.
relevant personnel, transaction nodes and transaction data involved in application operation should be controlled in advance and auditable afterwards. Taking financial blockchain as an example, consensus algorithm with stronger fault tolerance, anti fraud and higher performance can be adopted to avoid joint fraud of some nodes
4. Key security
to encrypt the communication data between the blockchain nodes and the key to encrypt the data stored on the blockchain nodes, the plaintext should not exist on the same node, and the private key should be properly saved by the encryption machine. When the key is lost or leaked, the system can identify the relevant records of the original key, such as account control, communication encryption, data storage encryption, etc., and implement response measures to make the original key invalid. The key should also be managed strictly in the life cycle, and should not be permanently valid. It needs to be replaced after reaching a certain time cycle
5. Risk control mechanism
there should be careful detection measures for the network layer, host operation, data access of application system, transaction frequency and other dimensions of the system. For any suspicious operation, alarm, record and verification should be carried out. If illegal operation is found, loss assessment should be carried out, remedial measures should be taken at the technical and business levels, and security measures should be strengthened, And trace the source of illegal operation to prevent further attacks
Article source: white paper on blockchain technology and application development in China
4. How to operate the isolation witness? In fact, it's not so simple ~
isolation witness is a method of blockchain expansion, which has been successfully implemented on lightcoin and bitcoin
at present, each block in the blockchain not only records the specific information of each transfer transaction, that is, at which time point the account receives or transfers out how many bitcoins, but also contains the digital signature of each transaction, which is used to verify the legitimacy of the transaction. The miner needs to verify each transaction one by one with digital signature when packing the block. After confirming that there is no problem, the transaction will be recorded in the block
however, for ordinary users, they only care about the number of assets in each account, and do not need to verify each transaction one by one. Isolation witness is to take out the digital signature information in the block, so that each block can carry more transactions, so as to achieve the purpose of expansion.
isolation witness is a method of blockchain expansion, which has been successfully implemented on lightcoin and bitcoin
at present, each block in the blockchain not only records the specific information of each transfer transaction, that is, at which time point the account receives or transfers out how many bitcoins, but also contains the digital signature of each transaction, which is used to verify the legitimacy of the transaction. The miner needs to verify each transaction one by one with digital signature when packing the block. After confirming that there is no problem, the transaction will be recorded in the block
however, for ordinary users, they only care about the number of assets in each account, and do not need to verify each transaction one by one. Isolation witness is to take out the digital signature information in the block, so that each block can carry more transactions, so as to achieve the purpose of expansion.
5. The application innovation of blockchain shows a rapid development trend, and shows great application value potential. However, the bottleneck of blockchain technology, the bottleneck of market heat, the bottleneck of narrow application field and the bottleneck of instrial ecology constitute the four bottlenecks of application innovation in blockchain field. Therefore, as an infrastructure area chain project aelf, a decentralized cloud computing blockchain network can solve the above problems, and has three characteristics: high performance, resource isolation, token holder's proxy voting governance structure. Among them, high performance is reflected in the,? All nodes of LF can run on the server cluster; Resource isolation is reflected in that each smart contract has its own blockchain. Refer to the telgram account of the aelf project team.
6. I am also a victim of this platform
fortunately, I have solved the problem of letting back the principal. How dangerous! I've been cheated by more than 100000 people, and my problem has been solved.
fortunately, I have solved the problem of letting back the principal. How dangerous! I've been cheated by more than 100000 people, and my problem has been solved.
7. Volatility, if limited funds, do not recommend, equivalent to gambling, if sufficient funds, you can try to earn more, lost learning!
8. This Canon laser printer icmf426dw features many functions, such as: multiple function, high-speed double-sided printing function, deformation correction function, etc. I know so much, I hope I can help you!
9. The platform is not big, and the daily trading volume is only more than 1 billion. Generally, if the daily trading volume is less than 5 billion, don't consider it.
moreover, this shell has only spot and OTC, and there is no contract
moreover, this shell has only spot and OTC, and there is no contract
10.
1. First of all, we can enter the self-service teller machine of ICBC to find a deposit machine or an all-in-one machine for deposit and withdrawal
Hot content