Position: Home page » Computing » How to treat the centralization and decentralization of banks

How to treat the centralization and decentralization of banks

Publish: 2021-04-30 03:56:34
1. In a system with many nodes, each node has a high degree of autonomy. Nodes can connect freely to each other to form a new connection unit. Any node may become the stage center, but it does not have the mandatory central control function. The influence between nodes will form nonlinear causality through the network. This open, flat and equal system phenomenon or structure is called decentralization[ 2]
with the deepening of the interaction between subject and object, the continuous balance of cognitive function and the continuous improvement of cognitive structure, the indivial can be released from the egocentric state, which is called decentralization.
2. Sharing from regional TV network: in a system with many nodes, each node has a high degree of autonomy. Nodes can connect freely to each other to form a new connection unit. Any node may become the stage center, but it does not have the mandatory central control function. The influence between nodes will form nonlinear causality through the network. This open, flat and equal system phenomenon or structure is called & quot; Decentralization & quot;.
3. Centralized wallet, also known as off Chain Wallet, completely depends on the company and server running the wallet. bitcoin stored in the exchange is stored in the centralized wallet (off Chain Wallet). The private key is not owned by the user, but in the wallet project side of the centralized server hosting chain, the fund is usually entrusted to the server
private keys and assets are transferred to the wallet for centralized management. Users don't need to worry about the loss of the private key of this kind of wallet procts, resulting in the loss of funds; However, the capital risk will be more concentrated in the wallet project side and server side. When the centralized wallet is conquered by hackers, users will suffer unnecessary losses
decentralized wallets, commonly known as onchain wallets, have private keys maintained by users and assets stored in blockchains
decentralized wallets are often referred to as onchain wallets. The private key is handed over to the user. If the private key is lost, the wallet will not be able to help the user recover, and the funds will be lost forever. But the decentralized wallet is difficult to be attacked by hackers, and users don't have to worry about the self stealing of the wallet service provider
centralized wallets are where assets are stored, while decentralized wallets are where private keys are stored
except for the exchange, it is not recommended to use the centralized wallet, although losing the private key may help you find it. But there is always a risk that the company will run
a decentralized wallet is equivalent to a channel, a channel where you can master mnemonics to control your assets on the blockchain. For a decentralized wallet, the most important thing is to protect the security of the [private key]
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
4. Coin an, like bat and faamg, is highly subversive and pioneering. If we say that building a public chain and a decentralized exchange is a self revolution, Yuan'an is already at the head of a centralized exchange, and has invested a lot of energy in building a decentralized exchange and launching an open platform, many people may not understand. In fact, coin safety has been in the process of decentralization and never stopped. Complete decentralization is the ultimate form of coin safety.
5. Excerpt: yishop e-commerce system
at present, the best e-commerce in China is "centralized" mode. The so-called centralized mode means that an e-commerce platform concentrates all businesses and eyeballs / traffic and becomes the first entrance for consumers to shop. Consumers find goods through this entrance, and the platform allocates benefits through this entrance<

the concept of decentralization has been boiling in the past two years, and the climax appeared in December last year. Zhang Xiaolong elaborated the eight views of wechat public platform in detail, one of which is that "wechat wants to build a real decentralized system, it will not provide a centralized traffic entrance to all public platform parties and third parties".
6. It can be transferred by the will of the people around, not by the central opinion. Constantly make changes to achieve longer-term goals.
7.

1. Efficiency is different: the efficiency of decentralized network is higher than that of centralized network, but conversely, the security of centralized network is higher. On the whole, centralized network is suitable for high security applications

2. Different characteristics: centralized network means that each time two client computers communicate with each other through the server. The decentralized network is the initial need to go through the server, later communication does not need the server

3. Different costs: the characteristics of collective maintenance of blockchain can rece a lot of costs. The centralized network involves the maintenance, confidentiality, operation and so on of many systems, which must require a lot of human, financial and material resources. These things do not exist for the decentralization of blockchain, so they can save a lot of costs

extended materials:

precautions:

in the aspect of blockchain governance, an interesting trend recently is the re emergence of online virtual currency holder voting as a multi-purpose decision-making mechanism. Sometimes the vote of the coin holder is used to decide who runs the super node of the network (e.g. dpos in EOS, Neo, lisk and other systems), sometimes the protocol parameters are voted (e.g. the upper limit of Ethereum fuel supply), and sometimes the vote and direct application of approval (e.g. tezos) protocol upgrade are also concted

in all these cases, voting is automatic, and the protocol itself contains all the logic needed to change the verifier set or update its own rules, and automatically responds to the voting results

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750