Nationwide chain computing power
Publish: 2021-04-27 19:05:19
1. const SHA256 = require(crypto-js/SHA256);< br />class Block{
constructor(index,timestamp,data,previousHash=' 39;)< br />{
this.index=index;< br />this.timestamp=timestamp;< br />this.data=data;< br />this.previousHash=previousHash;< br />$this.hash=this.calculateHash();< br />}
calculateHash(){
return SHA256(this,index+this.previousHash+this.timestamp+JSON.stringify(this.data)).tostring();< br />}
}
class blockchain{
constructor(){
this.chain=[this.createGenesisBlock()];<
}
/ / create a generated information block
creategenesis block() {
return new block (0, & quot; 01/01/2019",& quot; Genesis block", 0);
/ / the date is the user's data. In fact, it is the hash value obtained by adding several values together. Here, the information is encrypted and the picture is encrypted. Then the data is still stored in the database, but all the data are hash values. To get this data, you must know the hash value of the previous data block. Then, if the hacker needs to crack all the nodes, the hash value is decrypted, Then all the blocks from the first node to the last node can be decrypted to get the real data. So the security of data stored in the blockchain depends on whether the data is encrypted. If the plaintext is not encrypted, then it is not a blockchain
}
/ / get the last block
getlatesblock() {
return this.chain [this.chain. Length-1]
}
/ / create block
addblock (newblock) {
newblock. Previoushash = this. Getlatesblock(). Hash< br />newBlock.hash=newBlock.calculateHash();< br />this.chain.push(newBlock);< br />}
}
constructor(index,timestamp,data,previousHash=' 39;)< br />{
this.index=index;< br />this.timestamp=timestamp;< br />this.data=data;< br />this.previousHash=previousHash;< br />$this.hash=this.calculateHash();< br />}
calculateHash(){
return SHA256(this,index+this.previousHash+this.timestamp+JSON.stringify(this.data)).tostring();< br />}
}
class blockchain{
constructor(){
this.chain=[this.createGenesisBlock()];<
}
/ / create a generated information block
creategenesis block() {
return new block (0, & quot; 01/01/2019",& quot; Genesis block", 0);
/ / the date is the user's data. In fact, it is the hash value obtained by adding several values together. Here, the information is encrypted and the picture is encrypted. Then the data is still stored in the database, but all the data are hash values. To get this data, you must know the hash value of the previous data block. Then, if the hacker needs to crack all the nodes, the hash value is decrypted, Then all the blocks from the first node to the last node can be decrypted to get the real data. So the security of data stored in the blockchain depends on whether the data is encrypted. If the plaintext is not encrypted, then it is not a blockchain
}
/ / get the last block
getlatesblock() {
return this.chain [this.chain. Length-1]
}
/ / create block
addblock (newblock) {
newblock. Previoushash = this. Getlatesblock(). Hash< br />newBlock.hash=newBlock.calculateHash();< br />this.chain.push(newBlock);< br />}
}
2. Blockchain technology will not affect efficiency and waste computing power. The key is to see how to innovate in a mode and how to use blockchain technology efficiently to achieve the effect of the mode
blockchain is essentially an encryption algorithm, which is based on the principle of hash 256 bit algorithm to achieve information security; The application of modern information will become more and more global and universal. Besides the basic requirements of anti tampering, anti repudiation and trustworthiness, the protection of privacy needs to be strengthened. The blockchain technology is proced because of the development of modern cryptography. The cryptography used today is the result of cryptography 20 years ago, Therefore, in order to apply the blockchain technology to more participation scenarios, especially in the Internet economy, more verification is needed to verify whether the existing encryption technology can meet the demand, and more in-depth integration of cryptographic frontier technology and continuous innovation are needed
as long as we use blockchain to make innovations in accounting methods based on our own mode, it will not affect efficiency and waste computing power, but will shorten the time and improve efficiency.
blockchain is essentially an encryption algorithm, which is based on the principle of hash 256 bit algorithm to achieve information security; The application of modern information will become more and more global and universal. Besides the basic requirements of anti tampering, anti repudiation and trustworthiness, the protection of privacy needs to be strengthened. The blockchain technology is proced because of the development of modern cryptography. The cryptography used today is the result of cryptography 20 years ago, Therefore, in order to apply the blockchain technology to more participation scenarios, especially in the Internet economy, more verification is needed to verify whether the existing encryption technology can meet the demand, and more in-depth integration of cryptographic frontier technology and continuous innovation are needed
as long as we use blockchain to make innovations in accounting methods based on our own mode, it will not affect efficiency and waste computing power, but will shorten the time and improve efficiency.
3. I've also been cheated by 10000 yuan. It's been a week since the national fishing app was put on the white screen. Now my friend has invested 200000 yuan in it. Now my wife is divorced. Brother, which city, let's call the police together
4. First of all, your question is not very clear. If you are talking about the Shanzhai national chain before, it can tell you for sure that it is not reliable. In the world of blockchain, except bitcoin and a few mainstream currencies, everything else is rubbish
if you're talking about nationwide computing power in computing power leasing and mining machinery business, it's reliable. At least you're a member of the mining association. The outside world doesn't know much about this group. Our insiders still know this group of people. Although they are all mud legged (compared with bitcontinent), they are all old people in the mining circle. They are also early believers in bitcoin, and they are quite confident.
if you're talking about nationwide computing power in computing power leasing and mining machinery business, it's reliable. At least you're a member of the mining association. The outside world doesn't know much about this group. Our insiders still know this group of people. Although they are all mud legged (compared with bitcontinent), they are all old people in the mining circle. They are also early believers in bitcoin, and they are quite confident.
5. National link, I don't know what it means, but I'm playing national super God, I feel very good.
6.
The national data link is a multi community interactive blockchain social platform based on gos Guojin · China Public chain, which guarantees the data privacy security of users by encrypting and authorizing the personal data in the personal space, and realizes that the personal data belongs to the indivial and the data value belongs to the indivial; Through data link to achieve information transfer, trust transfer, value transfer, to build a more secure and free new social platform for users


10. It's OK, pro! Please use the latest version, there may be the owner set the permissions Oh! Welcome
Hot content
