Position: Home page » Blockchain » Is the private key of blockchain easy to be stolen

Is the private key of blockchain easy to be stolen

Publish: 2021-04-12 16:29:56
1. This is the order of importance: BTC private key, wallet security password, BTC address
the private key is everything and must not be told to anyone
as long as there is a private key, you can re import the wallet and reset the wallet security password
a BTC account can have many addresses, so the least important one is the address. No matter how unimportant, you can't just tell others.
2. When it comes to the nature of blockchain, several key words are familiar. For example, decentralization, distrust, consensus mechanism, asymmetric encryption, distributed accounting, tamper proof, absolute transparency, openness and so on. At the same time, some teaching posts also list the structure of blockchain, such as data layer, network layer, consensus layer, incentive layer, contract layer and application layer
however, it's easy for people with an eye to see why there is no security layer? In fact, several key features of blockchain have already solved the security problem. First, the blockchain uses asymmetric encryption technology. In fact, encryption and decryption are different keys, namely public key and private key. In short, the public key is open to the public, while the private key is absolutely confidential
secondly, distributed bookkeeping is a way for blockchain to store data. It can also be understood as distributed storage, which is consistent with the concept of decentralization. In the form of ledger, there is no central ledger in the network, and the ledger is stored in each node. Each node is not only independent, but also can act as the central node. Therefore, the central node will not be attacked, leading to the loss of core books or data, and the whole network will not be paralyzed
moreover, tamper proof is the basic feature of blockchain. As long as the chain can not be modified, and can not be deleted. If it needs to be changed, based on the principle of transparency and openness, the whole network and all nodes need to be informed. Therefore, under the democratic mechanism, the possibility of tampering with data at will is very low. Therefore, blockchain technology is applied in various instries, such as finance, payment, traceability, games, etc., such as the network "universe", Tencent's "come together to catch the demon", and Zhongan Huanyu blockchain "Dr dragon hunt" are the safe and high-quality procts under the blockchain technology.
3. Today, I'd like to show you what you don't know about social workers...
in the embryonic stage
before 2006, social work in our province had not been included in the scope of work of Party committees and governments at all levels
with the increasingly frequent exchanges in the field of social services between Guangdong, Hong Kong and Macao, some social service institutions in Guangzhou began to explore social work practice since the 1990s. For example, Fengyuan street in Liwan District of Guangzhou cooperated with neighborhood counseling association to provide social work services to meet the needs of residents for community services; Guangzhou old people's home cooperated with Hong Kong Sheng Kung Hui to introce professional social workers to implement social work services for the elderly in homes; Some social organizations such as Guangzhou YMCA also try to introce social workers to accumulate practical experience< On the other hand, social work ecation started. Since 1999, South China Agricultural University, Guangdong Business University, Sun Yat sen University, Guangzhou University, Guangdong University of technology and other universities have set up social work programs
the social work service practice explored by social forces and the development of social work professional ecation have laid a certain foundation for the start of social work in our province< In 2006, after the Ministry of Civil Affairs held the national civil affairs system social work talent team construction promotion meeting in our province, our province quickly launched the pilot exploration, graally built social work demonstration areas in all parts of the province, strengthened the decision-making and coordination on major issues of social work, and steadily promoted the pilot work. Comprehensive promotion stage (2011 to present)
in 2011, the ninth meeting of the 10th CPC Guangdong Provincial Committee focused on strengthening social construction. The general office of the CPC Guangdong Provincial Committee and the general office of the provincial government issued the implementation opinions on strengthening the construction of social work talent team, and included "the number of social workers with certificates per 10000 people" into the evaluation index system of "happy Guangdong", The social work of our province has entered the stage of comprehensive promotion
the practice of social work has been graally deepened, and the service field has graally expanded from social welfare and social assistance to disability rehabilitation, drug control and ecation, community correction, employment assistance, employee assistance, dispute mediation, emergency response and other fields. The service area has expanded from urban areas to rural areas, and the service object has extended from children and adolescents, the elderly, the disabled to the floating population, the elderly and the disabled Disaster victims, women with special needs and other groups
social work professionals and social work service institutions are the main bodies that directly provide social work services. All parts of our province take the cultivation and expansion of social work talents and social work service institutions as the core of the development of social work, promote social work talents to take root in the front line to do service, and social work service institutions to build brand based on the long-term
judging from the government's emphasis on social work, Xiaobian thinks that social workers will graally appear as a profession, which is not only to distinguish them from the enthusiastic aunts of the neighborhood committee, but also to distinguish a mode of helping others and solve the existing problems in depth
social workers may be needed by more people in the future. If you have a social worker card at this time, it will be even better.
4. Indeed, there are blockchain wallets using this technology, such as IDC
wallet. In fact, mnemonics are another form of expression of the private key, which has the same function as the private key, mainly to protect your blockchain money
5. People who play digital currency know that everyone's wallet account has a private key. If you lose the private key, all the property in the wallet will no longer exist, so losing the private key is a terrible thing for friends who play currency. In addition, the person in charge of an encrypted digital currency exchange in a foreign country said: "it is the iron law of the blockchain world to recognize only the private key but not the person. With the current computing power and technology, it is absolutely impossible to dece the private key from the address. If it is feasible, all the addresses on the whole blockchain will lose security, and the assets on the blockchain will lose their meaning. "
6. Although

has completed payment in the early days of mobile payment, it has been through the input of payment password or fingerprint. But now Ma Yun's Alipay has opened a quicker and more convenient way, that is, brush face payment. P>

Alipay has already done the payment method of face recognition through camera. We have to wonder that the progress of high technology brings people convenience and quick, which is really very attractive, so that people do not need to take out the mobile phone operation.


there is no need to worry about this. In fact, it's just like using a mobile phone to brush your face and open your mobile phone. You can't and can't unlock your mobile phone just by using people's photos. Of course, people who are curious about this will take photos to do experiments, but this photo is not their own

someone took out a picture of Ma Yun's face and scanned it. They thought that he would brush his face successfully or that some of Ma Yun's eggs would happen. However, no matter how many times he did it, it didn't work. It just showed that he failed to brush his face. In fact, the payment wire has been very stable, and the payment security we are worried about has been taken into consideration by the technical personnel and is now in use, so we can use it safely

7. It can be said that it is very unsafe. The technology related to blockchain wallet has lost its original technical meaning in China. Now it has been reced to a means of money. Therefore, we must be very vigilant in this aspect. Anyway, I personally don't believe it.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750