Position: Home page » Blockchain » Blockchain that can't be provoked

Blockchain that can't be provoked

Publish: 2021-05-07 22:26:53
1. "blockchain" is an important concept in the new era. In essence, it is a centralized database, and also an underlying technology such as digital currency. According to our popular explanation, "blockchain" can be regarded as an account book. Every bill is every block, but this account book is centralized, and it can be said that no enterprise or team has jurisdiction over it“ "Blockchain" technology is a unique information technology, such as centralization, information can not be changed in series. Now this technology has been applied to a series of applications such as electronic invoice, payment code and so on
in today's life, many people use this pretext to cheat, such as direct selling, capital, technology, etc. There is no right or wrong in technology, but in people
with the progress of the times and society, the beginning of the application of any technology will be questioned positively and negatively. However, with the relative application and maturity of technology and the improvement of technology, the various applications around people will continue to improve. I believe that in the near future, these doubts will graally dissipate
the following is a summary of some blockchain scams around us
trap 1: block chain is the coin trap
trap two: virtual currency transactions, promise low investment, high return
trap three: centralization can solve all problems
trap four: block chain extension procts can be laid down with a mining machine to earn money
trap five: WeChat, Alipay trading transactions virtual currency
2.

Blockchain is not deceiving, but deceiving people under the guise of blockchain. In fact, blockchain scam is to make use of people's ignorance of the technology, and then fraudsters rely on various and fancy means to set up scams. Many people only look at the surface when making investments, and finally fall into the trap of high profits

in the current society, more and more people are willing to take this risk to make investment in order to get rich returns, but not all of them can make profits. After all, where there are interests, there are many people waiting, and they will set traps for people to take the t

extended data:

precautions

blockchain is a technology. In short, this technology is a new way of data management based on cryptography. Blockchain technology has broad application prospects because it has the advantages of decentralization, non tampering, tracing and so on. And issuing currency is a kind of behavior derived from blockchain technology. At present, the vast majority of blockchain applications which mainly focus on currency issuance and speculation are suspected of illegal fund-raising

blockchain technology is still in early development, and it is difficult to apply it. If you only rely on a white paper to claim that there is an application, it is a deception in itself

3. Give him some money, find he has a lot of money, ask him to go again tonight, he also agreed. Hindley is ridiculous
4.

A few days ago, the person in charge of ant financial services said that we should be alert to all kinds of deceptions in the name of blockchain, and let this technology that should have proced greater value become a victim. He said that the next year's block chain is likely to usher in the collapse of the bubble, but this also means that the real value of the block chain is beginning to emerge. p> The four challenges are security, information protection, transaction performance and incentive mechanism. For example, in the aspect of information protection, effective technical solutions need to be found between the information protection demands of sensitive information and trade secrets (not let others know) and the consensus of multi-party participation (let more people know), etc

experts said that we should be alert to all kinds of deceptions in the name of blockchain, and let the technology itself, which should have proced greater value, become victims. In the coming year, the block chain will probably usher in the burst of bubbles and the emergence of real value, and will also usher in scale applications in the commercial field within 2-3 years. p>

Article source: bit110 network

5.

Let's suppose villagers Lao Wang and Xiao Li. Lao Wang borrowed some money from Xiao Li, who wrote it in an IOU signed by both parties. A few days later, Lao Wang denied the existence of borrowing money and claimed that Xiao Li forged the paper. Xiao Li can't argue because he finds it difficult to prove that Lao Wang actually owes him money

in this example, Lao Wang and Xiao Li are two nodes

now assuming the same scenario, there are many pairs of people trading with each other in the village. The only evidence for each pair is the IOU. If one party fails, it will be difficult to do so. Seeing this scene, the village head came up with a solution. He suggested using a common notebook for the whole village to record all the transactions. Due to the high prestige of the village head, the villagers unanimously decided to let the village head keep this important transaction book. Each transaction, the villagers go to the village head's home, let the village head witness and record, each transaction is written into a notebook, and then safely saved. That notebook can be called a database

because this notebook is very important, the village head locked it in the safe. However, there are always some problems. Sometimes, the village head will accidentally sprinkle ink on the paper, making some transaction records illegible. This is called a single point of failure. The thief knows that there is an important notebook in the safe of the village head's house. He tries his best to steal it. This is called hacking

until one day, the village head's son owed others a lot of money, so the village head secretly deleted his son's debt entry. In this way, the village head's son "does not owe money."

when the villagers knew this, they began to question the fairness and authority of the village head. So some people put forward a new idea:

abolish the power of the village head, which is called decentralization. Let all villagers keep a notebook, and the transaction records are copied and distributed, which is called distributed database. Therefore, if there are n people in the village, there are n notebooks, that is, n nodes. Every time there is a trade between any two people, all the people in the village get together and record it in their notebooks. And no one can cover the sky. This is called decentralization

they also decided that they would never delete the mentioned transactions from their notebooks, which is irreversible. For example, Lao Wang borrowed a sum of money from Xiao Li before, but in the twinkling of an eye, he wants to return the money. Then the transaction book will not delete the previous borrowing record, but write a new repayment record, so there are two records

next, let's try to break this rule. What if we bribe Lao Wang to change his notebook? It's not feasible, because the next time the villagers meet, they find that Lao Wang's notebook is different from everyone else's, so the villagers notice that Lao Wang may be engaged in an indescribable transaction, and decide to abolish Lao Wang's transaction record and kick Lao Wang out of the organization

What if you try to bribe all the villagers? It's too expensive

the characteristic of this model is that greedy people need to pay a lot to attack the rules. He will find it more profitable to follow the rules

a smart child in the village suggested that each transaction data be called "block" and linked into a "chain" in chronological order, which is called blockchain

6. At present, the state has not yet recognized
some time ago, the state specially cracked down on this virtual currency
so we should be cautious in investing in virtual currency
7. First of all, because the opponent's immortality is the beginning of spider flow, the first response is the swordsman. After clearing a group of wild monsters, the swordsman should always harass the opponent's MF (enough red and blue medicine on his body), and when he has about three big G's, he will engage in a small-scale battle with the opponent to rece the number of the opponent's spiders and delay the opponent's technological speed. After Tauren comes out, it will quickly move to level 3. At this time, there should be at least 5 big G's and 3 wolf's riders who have already risen their nets. They can seek a decisive battle with one attack and one defense. Tauren should be equipped with acceleration, invincible, blue bottle and shoes. They are mainly used to kill each other's spiders. If they can limit the number of spiders, harass each other's MF level and ensure their hero level and army number from beginning to end, It shouldn't be hard to win
it is recommended to refer to fly's RP.
8. Blockchain network exposed the fraud of WUC, and blockchain network is a professional anti-counterfeiting.
9. It should belong to Chuang Ge. Now there are too many kinds of blockchain projects. It's hard to identify the real blockchain projects. Super energy EES is a good project.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750