Position: Home page » Blockchain » How blockchain helps data security

How blockchain helps data security

Publish: 2021-05-12 05:58:43
1. Private key~
2.

One of the characteristics of blockchain projects (especially public chains) is open source. Through open source code, to improve the credibility of the project, so that more people can participate. But the open source code also makes it easier for attackers to attack blockchain system. In the past two years, there have been a number of hacker attacks. Recently, the anonymous currency verge (xvg) was attacked again. The attacker locked a vulnerability in the xvg code, which allowed malicious miners to add false timestamps on the block, and then quickly dig out new blocks. In a few hours, the attacker obtained nearly $1.75 million worth of digital currency. Although the subsequent attack was successfully stopped, no one can guarantee whether the attacker will attack again in the future

of course, blockchain developers can also take some measures

one is to use professional code audit services,

the other is to understand the security coding specifications and take preventive measures

the security of cryptographic algorithm

with the development of quantum computer, it will bring a major security threat to the current cryptosystem. Blockchain mainly relies on elliptic curve public key encryption algorithm to generate digital signature for secure transactions. Currently, the most commonly used ECDSA, RSA, DSA, etc. can not withstand quantum attacks in theory, and there will be greater risks. More and more researchers begin to pay attention to cryptographic algorithms that can resist quantum attacks

of course, in addition to changing the algorithm, there is another way to improve the security:

refer to bitcoin's treatment of public key address to rece the potential risk of public key disclosure. As users, especially bitcoin users, the balance after each transaction is stored in a new address to ensure that the public key of the address where bitcoin funds are stored is not leaked

security of consensus mechanism

the current consensus mechanisms include proof of work (POW), proof of stake (POS), delegated proof of stake (dpos), practical Byzantine fault tolerance (pbft), etc

POW faces 51% attack. Because POW depends on computing power, when the attacker has the advantage of computing power, the probability of finding a new block will be greater than that of other nodes. At this time, the attacker has the ability to cancel the existing transaction. It should be noted that even in this case, the attacker can only modify his own transaction, but not the transaction of other users (the attacker does not have the private key of other users)

in POS, attackers can attack successfully only when they hold more than 51% token, which is more difficult than 51% computing power in pow

in pbft, when the malicious nodes are less than 1 / 3 of the total nodes, the system is secure. Generally speaking, any consensus mechanism has its own conditions. As an attacker, we also need to consider that once the attack is successful, the value of the system will return to zero. At this time, the attacker does not get any other valuable return except destruction

for the designers of blockchain projects, they should understand the advantages and disadvantages of each consensus mechanism, so as to select an appropriate consensus mechanism or design a new consensus mechanism according to the needs of the scene

security of smart contract

smart contract has the advantages of low operation cost and low risk of human intervention, but if there are problems in the design of smart contract, it may bring greater losses. In June 2016, the Dao, the most popular funding project of Ethereum, was attacked. The hacker obtained more than 3.5 million Ethereum coins, which later led to the bifurcation of Ethereum into Eth and etc

there are two aspects of the proposed measures:

one is to audit the security of smart contract, and the other is to follow the principle of smart contract security development

the security development principles of smart contract are: to be prepared for possible errors, to ensure that the code can correctly handle the bugs and vulnerabilities; Release smart contracts carefully, do well in function test and security test, and fully consider the boundary; Keep smart contracts simple; Pay attention to the threat intelligence of blockchain and check and update in time; Be clear about the characteristics of blockchain, such as calling external contracts carefully

security of digital wallet

there are three main security risks in digital wallet: first, design defects. At the end of 2014, a user lost hundreds of digital assets e to a serious random number problem (repeated r value). Second, the digital wallet contains malicious code. Third, the loss of assets caused by the loss or damage of computers and mobile phones

there are four main countermeasures:

one is to ensure the randomness of the private key

The second is to check the hash value before installing the software to ensure that the digital wallet software has not been tampered with

The third is to use cold wallet

The fourth is to back up the private key

3. Jinwowo, Chongqing: artificial intelligence has the ability to analyze massive data at high speed. As the basis of artificial intelligence, data must be accurate and safe, and there must be no forged data
if the blockchain technology is used, the authenticity and security of data can be guaranteed
by combining the two, consciousness chain forms a data pool, creates an efficient data exchange center, and finally constructs a three-dimensional and multi-functional artificial intelligence ecosystem.
4. It's better not to use the automatic one, which can be automatically captured and labeled
mining by yourself
5. The draft of the "fourteenth five year plan" points out that seven key instries of digital economy, such as instrial Internet, blockchain, artificial intelligence and so on, as well as digital application scenarios such as intelligent transportation and intelligent energy, should be further defined, and "accelerating digital development and building digital China" should be regarded as an independent chapter, from creating new advantages of digital economy to speeding up the construction of digital society, From improving the level of digital government construction to creating a good digital ecology, this paper outlines the new prospect of Digital China Construction in the next five years. In 2025, the added value of core instries of digital economy will account for 10% of GDP
through consensus algorithm, the user data can be updated synchronously among judicial nodes such as notary office, Arbitration Commission, Internet court, judicial identification Institute and right institution on the security chain, so that each node on the security chain can realize real-time exchange of data and information, and effectively improve the judicial credibility of the blockchain data
based on the mode of "blockchain + judicature + application", e-security deeply arranges e-signing, and helps enterprises transfer traditional offline paper contracts to online signing by means of professional underlying data storage capability, full evidence chain technology and post signing judicial services, providing real name authentication, E-contract, signature management and other services
, the use of blockchain technology for the original works of online right confirmation, infringement detection and infringement forensics, as well as online right registration and other intellectual property protection services. It provides online arbitration filing application, agent execution, direct evidence to arbitration commission and other services for enterprises and indivial users. At the same time, it can also provide the notary office with the construction of Internet notary system, notary intelligent terminal and corresponding customized services, and help the notary office to comprehensively transform and upgrade its business. At present, it has successfully provided judicial services such as Internet notarization system construction for many notary offices. And other application scenarios, lead the blockchain to different instries and fields, provide full supporting solutions, and accelerate the rapid implementation of blockchain in the whole instry. As the cornerstone of digital economy, blockchain technology plays an important role. Through "blockchain +" to quickly complete the transformation and upgrading, release new momentum for the development of digital economy.
6. In data analysis, how to effectively protect personal privacy and prevent core data leakage has become the primary consideration.
7. For example, many countries have now recognized the legalization of virtual currency, and the public has increasingly recognized virtual currency. It can be said that the future is "bright". Some people think that there are risks, including the market is not stable enough, and some fish and dragons are mixed with pearls. Therefore, professionals also advise to enhance the awareness of prevention and avoid losses. Again, making money is risky, so investment should be cautious.
8. That's how I can afford to wait. Driving school is black. I have too much appetite. I'd rather give the money to the vehicle management office to make an appointment directly
9. The specific operation process of the self appointment terminal for subject 3 is as follows:
Step 1: the trainee swipes his / her ID card to the computer
Step 2: the system sends verification SMS
Step 3: input the mobile phone verification code to query the examination plan
Step 4: make an appointment for the exam
Step 5: driving management department audit
Step 6: inform the students of the test time through SMS one day later
the relevant person in charge of Changsha driving test center reminds the students:
first, the applicable object must be the students who have completed subject 2 and need to take subject 3
Second, the trainees should go to the self appointment terminal of the above places at least 3 days in advance to operate with their ID cards. The deadline for appointment is 20 days. The driving management division of Changsha traffic police detachment will arrange the staff to guide and help the operation on site
thirdly, after successful self appointment, trainees should contact their driving school in time. The driving school is requested to arrange the training before the test, and help the students to go through the payment and filing proceres. The driving management department has also informed the driving schools, asking them to fully cooperate with the relevant work< br />‍
10. Hacker attacks, data leakage, malicious software and network snooping on the Internet emerge in endlessly, which has caused trouble to people. If everyone connects information to the Internet of things, then privacy will not be guaranteed, and the development of the Internet of things will slow down. The characteristics of blockchain can just solve the core difficulties of the Internet of things and build a new era of Internet of things. In the future, jinwowo will continue to tap the value of blockchain technology in the commercial field and give full play to the advantages of big data services,
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750