Position: Home page » Blockchain » Blockchain tracking product security

Blockchain tracking product security

Publish: 2021-04-22 14:45:02
1. Private key~
2.

One of the characteristics of blockchain projects (especially public chains) is open source. Through open source code, to improve the credibility of the project, so that more people can participate. But the open source code also makes it easier for attackers to attack blockchain system. In the past two years, there have been a number of hacker attacks. Recently, the anonymous currency verge (xvg) was attacked again. The attacker locked a vulnerability in the xvg code, which allowed malicious miners to add false timestamps on the block, and then quickly dig out new blocks. In a few hours, the attacker obtained nearly $1.75 million worth of digital currency. Although the subsequent attack was successfully stopped, no one can guarantee whether the attacker will attack again in the future

of course, blockchain developers can also take some measures

one is to use professional code audit services,

the other is to understand the security coding specifications and take preventive measures

the security of cryptographic algorithm

with the development of quantum computer, it will bring a major security threat to the current cryptosystem. Blockchain mainly relies on elliptic curve public key encryption algorithm to generate digital signature for secure transactions. Currently, the most commonly used ECDSA, RSA, DSA, etc. can not withstand quantum attacks in theory, and there will be greater risks. More and more researchers begin to pay attention to cryptographic algorithms that can resist quantum attacks

of course, in addition to changing the algorithm, there is another way to improve the security:

refer to bitcoin's treatment of public key address to rece the potential risk of public key disclosure. As users, especially bitcoin users, the balance after each transaction is stored in a new address to ensure that the public key of the address where bitcoin funds are stored is not leaked

security of consensus mechanism

the current consensus mechanisms include proof of work (POW), proof of stake (POS), delegated proof of stake (dpos), practical Byzantine fault tolerance (pbft), etc

POW faces 51% attack. Because POW depends on computing power, when the attacker has the advantage of computing power, the probability of finding a new block will be greater than that of other nodes. At this time, the attacker has the ability to cancel the existing transaction. It should be noted that even in this case, the attacker can only modify his own transaction, but not the transaction of other users (the attacker does not have the private key of other users)

in POS, attackers can attack successfully only when they hold more than 51% token, which is more difficult than 51% computing power in pow

in pbft, when the malicious nodes are less than 1 / 3 of the total nodes, the system is secure. Generally speaking, any consensus mechanism has its own conditions. As an attacker, we also need to consider that once the attack is successful, the value of the system will return to zero. At this time, the attacker does not get any other valuable return except destruction

for the designers of blockchain projects, they should understand the advantages and disadvantages of each consensus mechanism, so as to select an appropriate consensus mechanism or design a new consensus mechanism according to the needs of the scene

security of smart contract

smart contract has the advantages of low operation cost and low risk of human intervention, but if there are problems in the design of smart contract, it may bring greater losses. In June 2016, the Dao, the most popular funding project of Ethereum, was attacked. The hacker obtained more than 3.5 million Ethereum coins, which later led to the bifurcation of Ethereum into Eth and etc

there are two aspects of the proposed measures:

one is to audit the security of smart contract, and the other is to follow the principle of smart contract security development

the security development principles of smart contract are: to be prepared for possible errors, to ensure that the code can correctly handle the bugs and vulnerabilities; Release smart contracts carefully, do well in function test and security test, and fully consider the boundary; Keep smart contracts simple; Pay attention to the threat intelligence of blockchain and check and update in time; Be clear about the characteristics of blockchain, such as calling external contracts carefully

security of digital wallet

there are three main security risks in digital wallet: first, design defects. At the end of 2014, a user lost hundreds of digital assets e to a serious random number problem (repeated r value). Second, the digital wallet contains malicious code. Third, the loss of assets caused by the loss or damage of computers and mobile phones

there are four main countermeasures:

one is to ensure the randomness of the private key

The second is to check the hash value before installing the software to ensure that the digital wallet software has not been tampered with

The third is to use cold wallet

The fourth is to back up the private key

3. Because each block contains its own hash value and the hash value of the previous block, changing a hash value will invalidate the rest of the blockchain
if you have problems with blockchain, you are welcome to chat in private~~~~~
4. The analysis of Chongqing jinwowo network is as follows:
each node on the blockchain can verify the integrity and authenticity of the account book to ensure that all transaction information is not tampered with, true and effective
every node on the blockchain keeps copies of all transaction information. When the number of data and participants on the blockchain is very large, the cost of modifying information will be very high. At least 51% of the computing power of the whole network is needed to modify information, and the modification cost may far exceed the expected revenue
when the information of some nodes is maliciously tampered with, other nodes on the blockchain will find the information that has not formed a "consensus" in a short time and maintain and update it.
5. Of course. One of the characteristics of blockchain is decentralization, traceability and non tampering of information. Now commodity traceability has always been a hot area for blockchain technology landing. As early as 2017, tmall global launched the global traceability plan to track the information of imported commodities by using blockchain technology
the traceability of blockchain technology is used to increase the traceability and security of commodities through the deep combination of logistics management, commodity anti-counterfeiting, commodity traceability, manufacturing management, instry collaboration and other fields. Password finance, focusing on blockchain information.
6. The zodiac has already run away. Those who have joined the zodiac for a long time have earned money. Now they play the new Zodiac. Now they play the new Zodiac. The zodiac has just opened on August 1. I'll play it again. I'm very stable now,
7. With the help of blockchain technology and alliance chain node, wangchain technology integrates and writes the information of commodity raw material circulation process, proction process, commodity circulation process and marketing process into the blockchain, and uses the tamper proof attribute of the blockchain to realize the whole process traceability of one thing one code
8. Dmtc mainly uses blockchain technology to integrate the resources of agricultural supply chain, combined with the support of soft and hard chain technology, so as to realize the whole process of agricultural organic food proction record, check, tamper proof and traceability, and thoroughly solve the practical problems of agricultural development. It includes data acquisition, data security and data sharing
in terms of data collection, through artificial intelligence and Internet of things technology, dmtc runs through the whole agricultural ecological chain. During agricultural proction, it automatically records the proction environment data, proction process data, transportation, sales and consumer behavior data of agricultural procts

in terms of data security, the existing traceability IT architecture is used to maintain the security of the system through network equipment and Agricultural Internet of things (IOA)
in terms of data sharing, the data collected in the whole process of dmtc can be conditionally shared with users in the whole supply chain of ecological agriculture, and the proction and transportation data can be shared with consumers, so as to trace the origin and development of procts, guide agricultural procers to adjust proction direction and improve proction efficiency.
9. The so-called proct life cycle tracking refers to the tracking of the whole life process from people's demand for procts to the elimination and scrapping of procts. Since the characteristics of blockchain can not be tampered with, this is the best way to trace. Proct lifecycle tracking can be different procts, so there will be different solutions. This is the case with Yingtang Zhongchuang's blockchain commodity life cycle tracking solution, which provides a multi proct tracking solution.
10. Enterprise integrity is the foundation of enterprise operation. The non tamperability of blockchain technology greatly ensures the authenticity of data sources. Especially in the field of e-commerce enterprises, jinwowo blockchain technology will form a detailed list of platform transactions, completely trace the source of all procts and transaction process, and build a protection wall for enterprise integrity management.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750