Decentralized key
we all know that one of the biggest characteristics of digital currency is decentralization. However, 90% of the exchanges in the market are under centralized management. Users need to transfer funds to the large account of the exchange, verify their identity information, and do not link currency transactions. Moreover, all information needs to be stored in the offline database of the exchange, All these seem to violate the decentralized spirit and centralized mode of blockchain, which makes users in a weak position, passively accept the "management" of the exchange, and also bear the risk of privacy leakage, hacker attack, exchange bankruptcy or running away
therefore, the emergence of decentralized exchanges has become an inevitable trend. Decentralized exchanges are also called DEX
currently, whaleex, newdex and gatechain DEX are the most representative decentralized transactions. In fact, it is a mode of wallet and wallet trading. Compared with the centralized exchange, it has obvious advantages. For example, all operations are carried out on the chain. It is publicly accessible and does not need to be registered. Anonymous trading and privacy are guaranteed. Users' assets are stored in a distributed way. They have 100% of the management rights of assets and have high security
however, although decentralized exchanges have obvious advantages, they are still not widely available in the market. Decentralized exchange is not a very mature mode, and there are still some problems, such as slow trading speed, poor liquidity, key loss, forgotten password and unable to retrieve account assets. Therefore, it needs to be further improved. However, it is undeniable that decentralized trading must be the mainstream mode of exchanges in the future.
private keys and assets are transferred to the wallet for centralized management. Users don't need to worry about the loss of the private key of this kind of wallet procts, resulting in the loss of funds; However, the capital risk will be more concentrated in the wallet project side and server side. When the centralized wallet is conquered by hackers, users will suffer unnecessary losses
decentralized wallets, commonly known as onchain wallets, have private keys maintained by users and assets stored in blockchains
decentralized wallets are often referred to as onchain wallets. The private key is handed over to the user. If the private key is lost, the wallet will not be able to help the user recover, and the funds will be lost forever. But the decentralized wallet is difficult to be attacked by hackers, and users don't have to worry about the self stealing of the wallet service provider
centralized wallets are where assets are stored, while decentralized wallets are where private keys are stored
except for the exchange, it is not recommended to use the centralized wallet, although losing the private key may help you find it. But there is always a risk that the company will run
a decentralized wallet is equivalent to a channel, a channel where you can master mnemonics to control your assets on the blockchain. For a decentralized wallet, the most important thing is to protect the security of the [private key]
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
private keys and assets are transferred to the wallet for centralized management. Users don't need to worry about the loss of the private key of this kind of wallet procts, resulting in the loss of funds; However, the capital risk will be more concentrated in the wallet project side and server side. When the centralized wallet is conquered by hackers, users will suffer unnecessary losses
decentralized wallets, commonly known as onchain wallets, have private keys maintained by users and assets stored in blockchains
decentralized wallets are often referred to as onchain wallets. The private key is handed over to the user. If the private key is lost, the wallet will not be able to help the user recover, and the funds will be lost forever. But the decentralized wallet is difficult to be attacked by hackers, and users don't have to worry about the self stealing of the wallet service provider
centralized wallets are where assets are stored, while decentralized wallets are where private keys are stored
except for the exchange, it is not recommended to use the centralized wallet, although losing the private key may help you find it. But there is always a risk that the company will run
a decentralized wallet is equivalent to a channel, a channel to control its own assets on the blockchain by mastering mnemonics. For a decentralized wallet, the most important thing is to protect the security of the [private key]
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
since 2013, many decentralized trading platforms have emerged. Different from the centralized trading platform, the decentralized trading platform does not need to register an account, and can participate in the transaction by using the personal digital asset account
secondly, every transaction of the decentralized trading platform is carried out through the blockchain, and it needs to wait for the confirmation of the blockchain before the transaction is successful. At the same time, the decentralized trading platform is not responsible for keeping users' assets and private key information. On the one hand, it avoids the moral hazard of the trading platform, on the other hand, it requires you to keep your private key well
e to the low liquidity and slow transaction processing of decentralized trading platforms, the total transaction volume only accounts for 0.03% of the global total transaction volume of digital assets. At present, the tokens of airswap, kyber, 0x and omisego can be traded on huobi.pro.
Imtoken is an influential mobile light wallet
aims to provide safe, easy-to-use and powerful digital asset management tools for users in the blockchain field
imtoken wallet supports eth, BTC, EOS, cosmos and other multi chain assets. DAPP browser takes you to explore the unlimited possibilities of a decentralized world
one identity, Multi Chain Management
manages multiple blockchain wallets through one digital identity, saying goodbye to the chaotic management tools
the new architecture supports eth / BTC / EOS / cosmos and other multi chain assets
secure transaction, within reach
with the help of blockchain intelligent contract, currency exchange can be directly completed on the mobile terminal without trusting a third party
private key self-contained security management
the private key is encrypted and stored in the sandbox file system of the mobile phone to fully ensure the asset security
provide a variety of private key backup strategies to prevent loss and theft
wallet is identity protection data privacy
the wallet account based on public and private key cryptography can become your sovereign identity in the digital world
personal data is encrypted by private key of identity and stored in decentralized storage network
* * DAPP application authorization interaction * *
uses intelligent contract technology to build distributed application browser
with digital identity, you can authorize yourself to interact with the third party DAPP without creating an account repeatedly
1. Delete the wallet by mistake
this is the same operation as I do. What should I do in case of this kind of thing? In fact, as long as you remember the private key, download a wallet again, import the private key and reset the password of the wallet
2. The mobile phone is missing or broken
if your mobile phone is stolen or broken, as long as the private key or mnemonic word is still there, you can download a wallet again, import the private key (or mnemonic word) and recreate the wallet
3. The private key is forgotten, but the mnemonic (or JSON file) is still there
if your private key is lost, but the mnemonic (or JSON file) is still there, don't worry, mnemonic can help you retrieve the private key,
4. The private key is forgotten
the wallet hasn't been deleted. If your private key is forgotten, but the wallet is still on your mobile phone, it's very easy to do, You just log in with your password, enter your wallet, and back up your private key
5. The private key, password and mnemonic words have been lost
sorry, no one can help you
6. Forgotten password or wrong input
this is the same as some other apps that we usually log in. If we forget password or input error several times, click forget password to retrieve it. Back to the decentralized wallet, we need to use the private key or mnemonic words to import the wallet to reset the password
7. Forget the mnemonic words
import the wallet with the private key and back it up again
8. Keystore forgotten
if your wallet is not deleted, this is the same way as if your private key is forgotten but your wallet is not deleted, that is, log in with your wallet password and make a new backup; But if your wallet is deleted, that is, it is unloaded, you need to import the wallet with mnemonic words or private key to backup the keystore again!
asymmetric encryption algorithm is a function that converts the original plaintext file or data into a series of unreadable ciphertext codes by using an encryption key. The encryption process is irreversible. Only holding the corresponding decryption key can the encrypted information be decrypted into readable plaintext. Encryption enables private data to be transmitted through the public network under the condition of low risk, and protects the data from being stolen and read by the third party
the core advantage of blockchain technology is decentralization, which can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the high cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
