Position: Home page » Blockchain » Can the data of blockchain be modified
Can the data of blockchain be modified
Publish: 2021-05-07 21:40:49
1. The core advantage of blockchain is decentralization. Through the use of encryption algorithm, tree structure and consensus mechanism, trust relationship is established in decentralized distributed network, data distributed multi node encrypted storage is realized, and an open, transparent, tamperable, verifiable and traceable technology system is created, so that each node can store certificates synchronously and supervise together, It can effectively solve the problems of poor reliability and low security in the centralized mode
the blockchain will generate a unique fixed length string based on the hash algorithm, and store it in the network distributed ledger maintained by all of us, so as to achieve tamperable ownership records and statements. Here's an explanation: blockchain is mainly the underlying technology, and right is the concept of application layer. For the application layer of right in blockchain, it is not only to confirm rights, but also to protect rights (infringement detection / forensics, etc.) and solidify electronic evidence after discovering infringement, which is equivalent to electronic storage based on blockchain technology.
the blockchain will generate a unique fixed length string based on the hash algorithm, and store it in the network distributed ledger maintained by all of us, so as to achieve tamperable ownership records and statements. Here's an explanation: blockchain is mainly the underlying technology, and right is the concept of application layer. For the application layer of right in blockchain, it is not only to confirm rights, but also to protect rights (infringement detection / forensics, etc.) and solidify electronic evidence after discovering infringement, which is equivalent to electronic storage based on blockchain technology.
2. Once the information is verified and added to the blockchain, it will be stored permanently. Unless more than 51% of the nodes in the system can be controlled at the same time, the modification of the database on a single node is invalid. Therefore, the data stability and reliability of the blockchain are extremely high.
3. The distributed architecture and tamper proof features of blockchain technology help to solve the problems of bill authenticity and information opacity. When participants need to check whether the bill has been tampered or transferred, blockchain can provide indisputable proof of consistency
digital currency also makes use of this feature of blockchain. Puyin is a kind of tea standard digital currency developed based on blockchain technology.
digital currency also makes use of this feature of blockchain. Puyin is a kind of tea standard digital currency developed based on blockchain technology.
4. [puzzle] gold miner Chinese version
new gold digger's Chinese version...
game props: press the key to start pulling gold. The red bomb means to pull something you don't want. Press the "↑" key ~ to blow up the thing you pull yourself. The yellow bottle with three forks is strong water. It's a little faster when recycling the rope, It only takes effect in one round. The book "rocks" on it means that if you collect stones, you can sell them at a higher price than usual! 11 pieces of small stones can sell 33 pieces, which is also effective in the same game. The thing in the yellow bottle is brick oil, which will make bricks appreciate. 600 pieces of bricks will sell to 900! It's also the lucky grass that takes effect in the first round. If you use it, you can increase your lucky degree and pull it to "?" If you buy a small bag, you may become very strong, or you may get some of the above items, and sometimes even the price of stones will rise!
new gold digger's Chinese version...
game props: press the key to start pulling gold. The red bomb means to pull something you don't want. Press the "↑" key ~ to blow up the thing you pull yourself. The yellow bottle with three forks is strong water. It's a little faster when recycling the rope, It only takes effect in one round. The book "rocks" on it means that if you collect stones, you can sell them at a higher price than usual! 11 pieces of small stones can sell 33 pieces, which is also effective in the same game. The thing in the yellow bottle is brick oil, which will make bricks appreciate. 600 pieces of bricks will sell to 900! It's also the lucky grass that takes effect in the first round. If you use it, you can increase your lucky degree and pull it to "?" If you buy a small bag, you may become very strong, or you may get some of the above items, and sometimes even the price of stones will rise!
5. Player 1: s key to put the hook, W key to throw explosives
player 2: key to put the hook, W key to throw explosives.
player 2: key to put the hook, W key to throw explosives.
6. If it is the proof of workload, it can be modified, but it needs to invest a lot of money. For example, if you want to change the block data of bitcoin (such as transferring all bitcoin to your wallet, etc.), it needs to account for 51% of the total network computing power. But with so many miners digging, it is basically impossible to account for 51% of the total network computing power.
7. Jinwowo analyzes the security of data when using blockchain Technology: blockchain technology is a kind of technology that supports decentralization in a trustless network environment
it can ensure the security of the communication network of the application system running on the chain by means of digital signature, and use hash chain technology to ensure that the written data can not be changed.
it can ensure the security of the communication network of the application system running on the chain by means of digital signature, and use hash chain technology to ensure that the written data can not be changed.
8. No, because the data on the Los chain can only be added and cannot be modified, it determines the transparency and non tampering of the business.
9. Yes, it is characterized by distributed data management, which can effectively rece the probability of data tampering by others, and also realize the security management of personal information. This is what the six degree chain has been pushing.
Hot content