Blockchain tamper proof
bitcoin, Ruitai coin, Laite coin, Ethereum and other digital cryptocurrencies all use blockchain technology
blockchain is an important concept of bitcoin, which is essentially a decentralized database and the underlying technology of bitcoin. Blockchain is a series of data blocks generated by cryptography. Each data block contains the information of a bitcoin network transaction, which is used to verify the validity of the information (anti-counterfeiting) and generate the next block.
Yibao block chain technology is based on bcos open source platform, which can calculate metadata through sha-512 hash algorithm, timestamp service and pbft consensus algorithm, and flexibly expand alliance chain institutions and nodes. The data stored in the blockchain through easy preservation will be stored on the blockchain in the form of hash value. With the characteristics of decentralized and distributed storage in the blockchain, the authenticity and objectivity of the data can be effectively guaranteed, and tampering can be effectively prevented
- yinlian answer:
blockchain can realize the traceability and non tampering of data, because it is based on the distributed database established by cryptographic links, thus forming non tamperable data sources. Therefore, in the whole process of procts from proction to circulation, complete information records can be achieved, and comprehensive data information can be provided for regulatory authorities, so that they can more efficiently complete proct quality inspection and data interconnection and sharing. In this process, blockchain can solve four problems:
first, information can not be tampered, consensus can be reached and trust can be built. In the network node composed of each participant, data records are formed in the business process, and the information of proct logistics, warehousing and proction, including raw material source, processing and assembly, is stored in the blockchain network to provide data information of each link for regulatory departments, cooperative enterprises or institutions
Second, the process is open and transparent. In the process of business process, the proct's anti-counterfeiting and circulation can be realized by implanting an identification chip into the proct and registering it on the blockchain, so that it can have a digital identity, and then record all the information of the digital identity, such as source and flow, through the account book maintained jointly, so as to achieve the verification effect Third, save cost and improve efficiency. Under the condition of confidentiality, the data records on the blockchain are stored, transmitted, verified and analyzed by the regulatory department, and transferred among different departments, so as to achieve unified voucher, whole process record and enterprise credit reference, which can effectively solve the problems of multi-party participation, information fragmentation and repeated audit in circulation Fourthly, information sharing. The circulation of enterprise proct certification depends on the interconnection of public data resources among departments and institutions such as commerce, customs, quality inspection, instry and commerce, banking, etc. under the review environment of blockchain construction, all departments can obtain information synchronously, establish credit evaluation mechanism based on supply chain, and organically connect various supply chain platforms, so as to improve the credit rating, credit record, risk warning, risk management, etc Information disclosure and sharing of illegal and dishonest behaviorthe disadvantages of traditional anti-counterfeiting traceability are very obvious, and anti-counterfeiting traceability has always been an important scenario in blockchain application, such as yinlian, which also starts from the anti-counterfeiting traceability scenario, hoping to build a commercial blockchain
compared with the traditional centralized anti-counterfeiting Traceability Technology, yinlian uses the underlying technology of blockchain, and the merchants proce their own anti-counterfeiting codes to remove the trust problem of cheating by the intermediate anti-counterfeiting merchants. The main process is as follows:
hash function in blockchain is the key to anti tampering, and hash algorithm is a one-way cryptographic mechanism to ensure that transaction information is not tampered in blockchain. After receiving a piece of plaintext, hash algorithm will transform it into a short and fixed hash data in an irreversible way. So block association has but is not limited to tamper proof
2. Quantum secure communication is divided into quantum cryptography communication, quantum teleportation and quantum dense coding. It can be divided into classical communication and quantum communication. The former mainly transmits quantum key, while the latter can be used for quantum teleportation and quantum entanglement distribution. When quantum communication is eavesdropped, although the eavesdropper can't get the information, the communication is interrupted, which affects the normal communication. His anti eavesdropping is at the cost of interrupting the communication, so it doesn't seem as good as the legend.. At present, there are still many unsolved problems in quantum communication, such as short transmission distance, relay difficulty and so on
3. In secure communication, technology competition and complementarity are mutual reference and common development. In secure communication, blockchain should belong to network layer, and quantum communication should belong to physical layer. Therefore, there should be no competition result of who will replace who.
Specifically, users can share the idle storage space and bandwidth resources of cat disk, and these resources will be output to companies such as content, video, game, blockchain, etc. cat disk company will convert the legal currency and various digital currencies paid by the latter into bitcoin, and users will get the corresponding bitcoin income. This is also the unique mining mode of cat disk
why reward bitcoin
because similar procts on the market reward users with points, diamonds and other rights and interests issued by relevant companies, and most of these rights and interests are of low or no value. In addition, those projects that once seemed to be hot are now almost withered, and the early players may benefit, while the late players will lose all their money
as we know, bitcoin is the anchor currency in the digital currency world. Cat disk directly uses bitcoin to motivate users, and users can pick up the coin to their wallet at any time, and their income can be guaranteed. Moreover, the risk of bitcoin breaking is almost zero, and the user's income will be more lasting and stable
how is the mining income distributed
when it comes to distribution, we should first introce the concept of "storage power", which is directly linked to the income of cat disk users. Storage power is an index based on users' shared storage space, bandwidth and online time. The larger the storage space, the faster the bandwidth speed and the longer the online time, the larger the storage power, and vice versa
the cat disk gains revenue by sharing storage bandwidth resources, and users can check the revenue through app every day, that is, how much bitcoin they earn. The profit distribution of maopan mining is not random, but through a series of calculations. In short, users' daily income depends on their personal storage capacity, all users' storage capacity and the amount of money issued each day. The calculation formula is as follows:
single user's daily income = single user's daily storage capacity / all users' daily storage capacity * Daily currency amount
it can be seen that users' daily income is positively correlated with the daily storage capacity index and the daily currency amount, and negatively correlated with all users' daily storage capacity index
what is the amount of money issued every day
the cat disk integrates the storage and bandwidth resources shared by users, provides storage and bandwidth services to the demander, and converts various digital currencies paid by the other party into bitcoin for distribution to users. How much bitcoin is issued every day depends on the actual business situation, so there is no way to give specific figures for the time being. What we can make clear is that, unlike other mining procts, cat disk does not issue its own currency or restrict the mining of a specific kind or several kinds of currency. Instead, it earns various digital currencies paid by others. These currencies are all market currency. Cat disk converts these currencies into bitcoin and distributes them to users
note that all the currencies are negotiable, and the more storage nodes, the more business, the higher the overall mining revenue; For other mining procts, the amount of money that can be mined is limited or issued by the owner. With the passage of time, there will be more and more mining machines, and the mining income will be less and less
the suggestion is to redo the system, and then find the guardian God to reinforce the system security for you, so as to completely plug the loopholes.
it is suggested to find a guild to mine in zhurongshan regularly, but don't forget to leave some physical strength value to reset the .
I. micro right blockchain technology
the micro right blockchain is built on the bcos open source platform. It can calculate metadata through sha-512 hash algorithm, time stamp service and pbft consensus algorithm, and flexibly expand alliance chain institutions and nodes. The data of Network Forensics through micro right will be stored on the blockchain in the form of hash value . Through the characteristics of decentralized blockchain and distributed storage, it can effectively guarantee the authenticity and objectivity of data and effectively prevent tampering
Second, micro right blockchain deposit
through blockchain technology, micro right is a security chain open platform initiated by notary office, judicial authentication center, Arbitration Commission, Internet court, right protection center, CA organization and open to the outside world. The electronic data can be synchronized to each node of the security chain open platform from generation, storage and final use, so as to do synchronous supervision and notarization, and issue relevant certificates , and block chain query , so as to effectively guarantee the legal effect of data