Position: Home page » Blockchain » Wonderful proof and blockchain

Wonderful proof and blockchain

Publish: 2021-04-27 00:07:18
1. Basically, the principle is the same. Take baopin.com as an example, baopin.com's video blockchain authentication is actually DAPP. First, it takes a screenshot of the video's key frames per minute, then transcodes it into a string of unique numbers, and then uploads and records it into the Ethereum blockchain.
2. No, Tongzheng economy is developed based on block technology. Tongzheng is actually a kind of right, or proof of rights and interests. With the popularity of the concept of blockchain, people need to have an in-depth understanding of blockchain if they want to fully understand it. If they want to learn, they can pay attention to the courses of huocoin University. At present, they have carried out online live classes, which is very convenient for learning.
3.

Let's suppose villagers Lao Wang and Xiao Li. Lao Wang borrowed some money from Xiao Li, who wrote it in an IOU signed by both parties. A few days later, Lao Wang denied the existence of borrowing money and claimed that Xiao Li forged the paper. Xiao Li can't argue because he finds it difficult to prove that Lao Wang actually owes him money

in this example, Lao Wang and Xiao Li are two nodes

now assuming the same scenario, there are many pairs of people trading with each other in the village. The only evidence for each pair is the IOU. If one party fails, it will be difficult to do so. Seeing this scene, the village head came up with a solution. He suggested using a common notebook for the whole village to record all the transactions. Due to the high prestige of the village head, the villagers unanimously decided to let the village head keep this important transaction book. Each transaction, the villagers go to the village head's home, let the village head witness and record, each transaction is written into a notebook, and then safely saved. That notebook can be called a database

because this notebook is very important, the village head locked it in the safe. However, there are always some problems. Sometimes, the village head will accidentally sprinkle ink on the paper, making some transaction records illegible. This is called a single point of failure. The thief knows that there is an important notebook in the safe of the village head's house. He tries his best to steal it. This is called hacking

until one day, the village head's son owed others a lot of money, so the village head secretly deleted his son's debt entry. In this way, the village head's son "does not owe money."

when the villagers knew this, they began to question the fairness and authority of the village head. So some people put forward a new idea:

abolish the power of the village head, which is called decentralization. Let all villagers keep a notebook, and the transaction records are copied and distributed, which is called distributed database. Therefore, if there are n people in the village, there are n notebooks, that is, n nodes. Every time there is a trade between any two people, all the people in the village get together and record it in their notebooks. And no one can cover the sky. This is called decentralization

they also decided that they would never delete the mentioned transactions from their notebooks, which is irreversible. For example, Lao Wang borrowed a sum of money from Xiao Li before, but in the twinkling of an eye, he wants to return the money. Then the transaction book will not delete the previous borrowing record, but write a new repayment record, so there are two records

next, let's try to break this rule. What if we bribe Lao Wang to change his notebook? It's not feasible, because the next time the villagers meet, they find that Lao Wang's notebook is different from everyone else's, so the villagers notice that Lao Wang may be engaged in an indescribable transaction, and decide to abolish Lao Wang's transaction record and kick Lao Wang out of the organization

What if you try to bribe all the villagers? It's too expensive

the characteristic of this model is that greedy people need to pay a lot to attack the rules. He will find it more profitable to follow the rules

a smart child in the village suggested that each transaction data be called "block" and linked into a "chain" in chronological order, which is called blockchain

4. The common point between AI and blockchain
blockchain focuses on keeping accurate records, authentication and execution, while AI helps to make decisions, evaluate and understand certain patterns and data sets, and ultimately proces autonomous interaction. AI and blockchain share several characteristics, which can ensure seamless interaction in the near future. Three main features are listed below
1. AI and blockchain need data sharing
distributed database emphasizes the importance of data sharing among multiple clients on a specific network. Similarly, AI relies on big data, especially data sharing. The more open data available for analysis, the more accurate the prediction and evaluation of the machine, and the more reliable the generated algorithm
2. Security
when dealing with high-value transactions on the blockchain network, there are great requirements for the security of the network. This can be implemented through existing agreements. For artificial intelligence, the autonomy of the machine also needs high security, in order to rece the possibility of catastrophic events
3. Trust is a necessary condition
for any widely accepted technological progress, there is no greater threat than the lack of trust, and artificial intelligence and blockchain cannot be ruled out. In order to make the communication between machines more convenient, we need to have an expected trust level. In order to execute certain transactions on the blockchain network, trust is a necessary condition
the impact of blockchain and artificial intelligence on ordinary people
in short, blockchain is a community-based technology, which can make value exchange more secure. Blockchain is just like its name. Each block contains an encrypted transaction record. The blocks are arranged in chronological order, and the security is guaranteed by a cryptographic system. Blockchain is a technology that can change rules, and its emergence is a revolutionary innovation
there are many functions of blockchain, and the specific application is also very wide. For example: if blockchain is used in the food instry, people will no longer worry about eating harmful food. If blockchain is used for diamond proction, consumers will no longer have to worry about buying fake diamonds. If the blockchain is used in the ecation instry, intellectual property protection can be strengthened. If the blockchain is used in the insurance instry, it can alleviate the information asymmetry of the insurance business and help to improve the security of the insurance business
the impact of blockchain and artificial intelligence on ordinary people is enormous. Just imagine, if blockchain and artificial intelligence are combined, will their role expand? Yes, the combination of the two can really have more impact to change the lives of ordinary people
blockchain and artificial intelligence are two extremely important roles in the field of technology, which bring convenience to our proction and life. If we find an intelligent way to make them work together, the impact of their interaction is unimaginable. This is also the core of OMT. After the combination of these two technologies, the future application scenarios are revolutionary and exciting. In the new ecological construction, data storage, sharing mechanism, platform problems, security problems, etc. can be overcome by using each other's technologies. OMT will create maximum value for global users and enterprises and bring more convenience to ordinary people through blockchain + artificial intelligence technology
the answer is over, hope to adopt, thank you!
5.

1. League of heroes

League of heroes, also known as lol, China's LPL has won the championship of the world finals for two consecutive years, which makes the players who love League of heroes start a new journey again, which makes the popularity of lol in China set off a wave of upsurge. Although lol has been 10 years, the popularity is not as good as before, but it is not comparable to the popularity of other networks

2, ngeons and warriors

the game of ngeons and warriors is called DNF for short. DNF has been tested for 11 years since 2008. The unique abyss mode in the game is not found in other online games. It is also a time when the public players are excited to brush the abyss, but now DNF graates have many activities and awards, So many players have abandoned DNF one by one, but there are still a lot of civilian players, the heat is also leverage drop

3, fortress night

fortress night is a third person shooting game, which has landed on the host platform, PC platform, mobile game platform and NS platform. So the platform has this game, the heat is incomparable to other design games. Chicken eating mode in the game is also very popular

4, crossing the line of fire

crossing the line of fire is also known as cf. in 2007, the game was tested internally in China, but the popularity was very hot when it was just launched. At that time, no game known as 300 million mouse could catch up with CF, but CF has experienced more than ten years. Since the introction of heroic weapons, the popularity has slowly started to decline, It takes 888 yuan to get a hero weapon, which makes many civilian players stop. Moreover, the performance difference between civilian weapons and hero weapons is too big, which makes many players retreat

5. World of Warcraft (including nostalgic clothes)

world of Warcraft is the oldest game. Warcraft also launched the nostalgic clothes in August of 19. The popularity of the nostalgic clothes just launched in this game has exceeded its own popularity several times. All servers of the nostalgic clothes need to queue up to enter the game on weekends, That is to say, how many new players and old players come back to experience the past

6, survival of the Jedi

survival of the Jedi game was only tested in March of 17. Survival of the Jedi game has experienced steam's weekly sales champion, the champion of 55 consecutive weeks. You know, there are 52 consecutive weeks in a year, that is to say, survival of the Jedi has been the champion of sales for one consecutive year, and no game of steam's weekly sales champion can be more than four consecutive weeks, And the Jedi survival game has this amazing history

7, ff14

Final Fantasy 14 this game was officially tested in China in 2014. This game has experienced the best new MMO Game Award, the most popular MMORPG award, the best picture award, the best sound effect award and the must play game award. Can be said to be a very powerful online game

8. Anti terrorism Elite: Global offensive

a first person shooting game jointly developed by valve and hidden path entertainment was officially launched in Europe and the United States on August 21, 2012, and the national service press conference was held in Beijing on April 11, 2017. The game is the fourth work of the anti terrorist Elite Series (excluding Neo, online and other derivative works)

9, legend of hearthstone

Legend of hearthstone is a set exchange card game. The game background is set to 9 different hero classes in Blizzard's Warcraft series. What the players need to do is to form a strong card group to defeat the opponent's card group

10, watch vanguard

watch vanguard is a first person shooting game developed by blizzard. Every hero in the game is his own weapon and skill, and the innovative shooting game has attracted many Blizzard players, especially the painting style in the game

6. The solutions are as follows:
1. Regularly clean the st in the computer, turn off the computer, open the chassis, use a hair dryer and blow with cold air< At ordinary times, 360 guard, Jinshan guard and other tools should be used to clean up the system garbage and temporary files generated by the Internet, and check and kill malicious

Italian software
3. The computer configuration is poor, so try to set the virtual memory as large as possible, and install anti-virus software with less resources, such as NOD32, or only one

auxiliary anti-virus software
4. Try to set the IP to static IP, which can rece the startup time of the computer
5. Don't put too many files and icons on the computer desktop, which will slow down the reaction of the computer. Try not to install the software on disk C
6. Regularly defragment the disk. Open the drive of my computer to defragment - properties - tools

select the disk to be defragmented. Open the "disk defragmenter" window - Analysis - defragmentation - the system will start to defragment

.
7. Can't make money. RMB is issued by the state and can be circulated and used normally. What's the use of digital currency? They repeatedly stressed how much money they could earn in a year and what the rate of return was, but they never mentioned how the profit returns came from? Therefore, digital currency is just a prop used to harvest leeks with the help of blockchain gimmicks. I advise you not to think of making a fortune overnight and be confused by the so-called digital currency, otherwise we will lose all our capital.
8. 1、 Similarity

distributed
git ensures that each code warehouse maintains a complete project library locally, not just the branch in which it works and its own submission history. At the same time, it also keeps all the snapshot and index information after the latest pull

on the blockchain, each node keeps a complete database locally, not just its own transaction information

traceability
in Git commit chain, each commit object contains a parent object (the object of the last commit, except the first commit), which can trace all the previous records

on the blockchain, each block contains the index of the previous block (except the genesis block), which can trace all valid transactions before<

tamper proof
in Git's commit chain, each object itself calculates a checksum before storing, and then references it with a checksum. Once modified, the checksums will not be correct, which means that it is impossible to change the contents of any file or directory without git's knowledge< The mechanism used by git to calculate the checksums is called SHA-1 hash. This is a string composed of 40 hexadecimal characters (0-9 and A-F), which is calculated based on the content or directory structure of the file in GIT. SHA-1 hash looks like this:



in the blockchain, each block contains the last block ID, and this block ID has two SHA-256 hashes, which are calculated based on the block content. Once the content is modified, the hash will change, which is inconsistent with the chain of other nodes and cannot be added to the longest chain, so the content cannot be tampered with< 2. Difference

collective consensus and central node will: 1 - blockchain merges based on collective consensus (POW / POS) to form the longest chain, which is the main chain

2 - in Git system, when multi node cooperation is carried out through the warehouse hosting platform, it is the manager of the platform project who controls the power of merge, which reflects the will of the central node<

cryptography
1 - in bitcoin blockchain, cryptography mainly uses the following methods

in the whole system of bitcoin blockchain, a large number of public encryption algorithms are used, such as Merkle tree hash number algorithm, elliptic curve algorithm, hash algorithm, symmetric encryption algorithm and some coding algorithms. The functions of various algorithms in bitcoin blockchain are as follows:

A) hash algorithm

the two hash functions used in bitcoin system are: 1. SHA-256, which is mainly used to complete pow (proof of workload) calculation; 2. Ripemd160, mainly used to generate bitcoin address

b) Merkle hash tree

binary tree or multi tree based on hash value. In the computer field, Merkle tree is mostly used for integrity verification. In the distributed environment, integrity verification can greatly rece the complexity of data transmission and calculation<

C) elliptic curve algorithm

in bitcoin, the public key cryptography algorithm based on secp256k1 elliptic curve mathematics is used for signature and verification. On the one hand, it can ensure that the user's account is not replaced by an impostor, on the other hand, it can ensure that the user can not deny the signed transaction. The private key is used to sign the transaction information, and the user's public key is used to verify the signature. If the verification is passed, the transaction information will be recorded and the transaction will be completed

d) symmetric encryption algorithm

the official bitcoin client uses AES (symmetric block cipher algorithm) to encrypt the wallet file. After the user sets the password, the private key of the wallet is encrypted by the user set password through AES to ensure the security of the private key of the client

e) base58 encoding

base58 is a unique encoding method used in bitcoin. It is mainly used to generate the wallet address of bitcoin, which is similar to the permutation algorithm mechanism in classical cryptography. Its purpose is to increase the readability of bitcoin and change the binary hash value into the address we see

2 - git: SSH key is mainly used for remote login verification, SHA-1 is used for code content checking sum<

SSH is the abbreviation of secure shell, developed by IETF's network working group. It is a protocol designed to provide security for remote login sessions and other network services. SSH protocol can effectively prevent information leakage in the process of remote management< The process of SSH transmission is as follows: (1) the remote host receives the user's login request and sends its public key to the user 2) The user uses the public key to encrypt the login password and send it back 3) The remote host uses its own private key to decrypt the login password. If the password is correct, the user is allowed to log in.
9. Blockchain is a distributed shared ledger, one of its characteristics is that information encryption can not be tampered with, that is to say, every block will be encrypted, and has a time mark, which can not be tampered with. Each block is a general ledger formed by linking in chronological order. If you try to tamper with one, you also need to change the huge data chain behind it, which is basically impossible to complete; So you will have information records in this account book, and your mother also has records in the account book, and the information recorded is different, and others can't tamper with it, which distinguishes you from your mother
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750