Seven misunderstandings of blockchain
1-contains a distributed database
2-distributed database is the physical carrier of blockchain, blockchain is the logical carrier of transaction, all core nodes should contain full copies of the blockchain data
3-blockchain serializes blocks according to time, And blockchain is the only body of the whole network transaction data
4-blockchain is only effective for addition, but not for other operations
5-public and private key verification based on asymmetric encryption
6-accounting node requires that Byzantine general problem can be solved / avoided
7-consensus progress is evolutionarily stable, That is, in the face of a certain amount of contradictions between different nodes, the data will not collapse
8-consensus process can solve the problem of double spending
Although driven by the influx of capital and talents, the blockchain instry ushered in rapid development, but as an emerging instry, the frequent warning of its security vulnerabilities caused people to worry about the risk of blockchain
Yu Kequn, director of the national information technology security research center, pointed out that the emergence of blockchain has brought people a lot of expectations for privacy exposure, data leakage, information tampering, network fraud and other issues. However, there are still many challenges in the security of blockchain
Li Bin, assistant director of China Information Security Evaluation Center, analyzed that the current blockchain is divided into three types: public chain, private chain and alliance chain. No matter which type, it faces security challenges in algorithm, protocol, use, time limit and system. What is particularly critical is that the current blockchain is still facing 51% attack problem, that is, nodes can successfully tamper and forge blockchain data by mastering more than 51% of the network examples
it is worth noting that in addition to external malicious attack risk, blockchain also faces the threat of its endogenous risk. Yu Kequn reminded that how to build a complete security application system around the equipment, data, application, encryption, authentication and authority of the application system of the whole blockchain is an important problem that all parties must face
Wu Jia also analyzed that as an emerging instry, employees in the blockchain instry are lack of safety awareness, which leads to the low safety factor of the software and hardware related to the blockchain and a large number of security loopholes. In addition, there are many ecological links in the whole blockchain. In contrast, the strength of the relevant security employees is scattered and it is difficult to form a joint force to solve the problem. A systematic solution is needed to meet the above challenges
content source: zhongxin.com
1-decentralization
2-transparency
3 - openness
4-autonomy
5 - information cannot be tampered with
6 - anonymity.
in a village, a spent 3000 yuan to buy a cow of B, how to record this account
so a and B found a mutual trusted C to record the account, but later a and C colluded and did not admit that a had bought B's cattle, so the deal became rough and disputes continued
later, B had another cow. Of course, B didn't sell it to a this time, because a had no credit, so he gave it to d. This time, instead of looking for witnesses, they went to the whole village to roar after the transaction. B said Wang Erhua paid 3000 yuan to buy a cow from me, d also went to the whole village to shout that I paid 3000 yuan to buy a cow from B, so there were many people in the village to record the transaction. In this way, there will be no bad debts, which is called decentralized and distributed accounting
here comes the problem
when you yell, are the villagers willing to charge for you, just because you have a big face
therefore, the first person to record accurately will get some bitcoin rewards
someone asked, what if two people finish the first record at the same time
in order to avoid this problem, it is necessary to set rules, for example, to answer a question first, or to record with feet, and it must be written in block letters. If you set a series of rules, there will not be many firsts
in the network, there are a lot of transactions going on every day, and there are also many people recording, and finally they get the reward of bitcoin. This process is the legendary mining
Mining requires a lot of equipment. We call these computer equipment mining machines
in this way, all the processes are in one system. The system will encapsulate the data every 10 minutes to form a box full of data, which we call blocks
with the continuous generation of blocks, they are linked together to form a blockchain.
e to the use of Distributed Accounting and storage, there is no centralized hardware or management organization, the rights and obligations of any node are equal, and the data blocks in the system are jointly maintained by the nodes with maintenance function in the whole system
openness
the system is open, in addition to the private information of all parties to the transaction is encrypted, the data of the blockchain is open to all, and anyone can query the blockchain data and develop related applications through the open interface, so the information of the whole system is highly transparent
autonomy
blockchain adopts consensus based specifications and Protocols (such as a set of open and transparent algorithms) to enable all nodes in the whole system to exchange data freely and safely in a de trusted environment, so that the trust in "people" is changed into the trust in machines, and any human intervention does not work
information cannot be tampered with
once the information is verified and added to the blockchain, it will be stored permanently. Unless more than 51% of the nodes in the system can be controlled at the same time, the modification of the database on a single node is invalid, so the data stability and reliability of the blockchain are extremely high<
anonymity
since the exchange between nodes follows a fixed algorithm, their data interaction does not need to be trusted (the program rules in the blockchain will judge whether the activity is effective by themselves), so the counterparties do not need to trust themselves by disclosing their identities, which is very helpful for credit accumulation
1. Regularly clean the st in the computer, turn off the computer, open the chassis, use a hair dryer and blow with cold air< At ordinary times, 360 guard, Jinshan guard and other tools should be used to clean up the system garbage and temporary files generated by the Internet, and check and kill malicious
Italian software
3. The computer configuration is poor, so try to set the virtual memory as large as possible, and install anti-virus software with less resources, such as NOD32, or only one
auxiliary anti-virus software
4. Try to set the IP to static IP, which can rece the startup time of the computer
5. Don't put too many files and icons on the computer desktop, which will slow down the reaction of the computer. Try not to install the software on disk C
6. Regularly defragment the disk. Open the drive of my computer to defragment - properties - tools
select the disk to be defragmented. Open the "disk defragmenter" window - Analysis - defragmentation - the system will start to defragment
.
blockchain based systems have broad prospects in the future, but we need to be very clear about what blockchain can do. Imagine the blockchain technology in the next 20 years, its impact may be as big as the Internet
however, it is shocking that we mainly see today that the project seems to be based on decentralized design, but in fact there are some misconceptions about blockchain
if we want technology to continue to move in the right direction, we need to turn this craze into proctive and realistic expectations, so as to rece the possibility of the supply chain falling to the bottom. Once it falls to the bottom, it may be abandoned in the corner with meaningless proof of concept
let's take a look at the seven misconceptions of unrealistic expectations for blockchain:
misconception 1: highly scalable
compared with traditional (server based) trading methods, blockchain deployment does not have real scalability, and the current trading time depends on the slow party. They are only scalable for certain types of transactions, such as transactions with small payloads and transactions close to certain limits. You can't just pile up information on the blockchain
Myth 2: it is absolutely secure
although the blockchain is based on encryption standards, the method to ensure privacy is completely outside any blockchain standards and implementation. Only encryption experts can really understand and verify blockchain integration. However, each implementer has the responsibility to ensure security, so this approach is largely the same as the management of financial transactions in the old era
mistake 3: trustworthy
the blockchain ensures the integrity of transactions and information, otherwise anything stored in the blockchain cannot be trusted. You need to make sure that the parties that store the facts in the blockchain are trustworthy and that the facts are true to determine that they are truly trustworthy. This governance model allows multiple parties to be jointly and severally liable for the infrastructure, and requires secure access to store facts in the blockchain
myth 4: you can put anything in the blockchain
blockchain is a protocol represented by code, which is not defined according to any standard. There is no standard body to provide rules or guidance for the implementation of sanctions
generally, you can only handle small payloads, and you still need to reach an agreed standard among all participants so that anyone can understand what is stored
myth 5: you can express anything in a smart contract
although this is technically feasible, in practice, blockchain is limited to simple and easy to understand use cases. Smart contracts are very complex in nature. By design, once released, you cannot modify or repair them. They contain very complex interactions and irreversible results
myth 6: if you don't like public chain, please choose private chain
private chain is not a channel to obtain privacy or access restricted information. In fact, you can even think that private chain should not be an open option. Nevertheless, enterprise blockchains may not be able to realize any inherent advantages of blockchain technology, and privately developed blockchains may lack the community and academic review necessary to ensure their attributes
myth 7: the size of the community doesn't matter
the blockchain procts promoted by the community are being forked by private players in all aspects, and they strengthen their role in various ways. However, a large community composed of users, users, scholars and implementers is the only force to ensure the validity of password attributes. Only the open source blockchain with the largest community and installation base will last. The rest can be regarded as experiments in the laboratory, of which 99.9% will die
a smart technician will move forward based on use cases and a set of first principles in his mind. First, there may never be a blockchain to manage all of them. Two different use cases require different blockchains. Some participants are many, some are few, some need strong privacy around facts, and some are fully transparent
considering all the above, what we can do together now is to innovate, tackle real business problems, and initiate and promote proof of concept to better understand the power of blockchain.