The difference of mining algorithm between lightcoin and ether c
2. Bitcoin can be copied, and lightcoin, Ruitai coin and vitality coin are all experimental objects
3. No, the source codes of different currencies are theoretically different
4. You can create counterfeit money without limit
5. It is possible in theory, but it may not work in practice.
was released on October 7, 2011. It is currently the highest market value counterfeit coin, about 1% of BTC's market value, or US $1000W. Compared with BTC, LTC is faster, with an average of 2.5 minutes and 6 confirmations per block in 15 minutes. In addition, the number of LTCs is four times that of BTCs, with a total of 8400w. At present, LTC uses scrypt algorithm, which needs a lot of memory support. The professional mining machine on the market can not be used for LTC mining, only the graphics card
what is the difference between lightcoin and bitcoin
1. Transaction: easier to use, larger volume and greater appreciation potential. The block confirmation time is shorter, which is four times faster than bitcoin. For example, pizza owners are more willing to accept LTC payment to save transaction time< Mining:
special algorithm creates the unique charm of LTC, which is also the key to stand out from Shanzhai coins. Scrypt algorithm uses sha256 as its subroutine, and scrypt itself needs a lot of memory, each hash is used as the input seed, and then needs a lot of memory to store another seed pseudo-random sequence, Generate pseudo-random points of sequence and output hash value. The key is that scrypt algorithm needs a lot of memory while sha256 algorithm does not. So in this era when BTC mining of graphics card is coming to an end, LTC mining is about to usher in a golden period of development. Because of the high cost of memory, any ASIC or FPGA has no advantage over graphics card mining. LTC has advantages, at least in the foreseeable future
3. The biggest threat of bitcoin is 51% attack:
some shanzhais are killed by 51% attack. To be honest, LTC is a worry for the development of LTC and BTC, of course. However, the specific problems they face are different: BTC can avoid 51% attack through technology upgrading (such as end block reconstruction, careful node upgrading, and calculation difficulty), However, there is no way to evade LTC technology. However, e to the scattered computing power of graphics card mining and the increasing difficulty, this problem needs to be paid attention to, but don't worry too much. With the use of ASIC in BTC, the risk of 51% attack is increasing. I hope BTC development team can solve this problem as soon as possible.
in addition, there are Ruibo coin, Ruitai coin, vitality coin, dog coin and other excellent counterfeit coins.
1. Transaction:
it's easier to use, larger in volume and greater in appreciation potential. The block confirmation time is shorter, which is four times faster than bitcoin. For example, pizza owners are more willing to accept LTC payment to save transaction time< Mining:
special algorithm creates the unique charm of LTC, which is also the key to stand out from Shanzhai coins. Scrypt algorithm uses sha256 as its subroutine, and scrypt itself needs a lot of memory, each hash is used as the input seed, and then needs a lot of memory to store another seed pseudo-random sequence, Generate pseudo-random points of sequence and output hash value. The key is that scrypt algorithm needs a lot of memory while sha256 algorithm does not. So in this era when BTC mining of graphics card is coming to an end, LTC mining is about to usher in a golden period of development. Because of the high cost of memory, any ASIC or FPGA has no advantage over graphics card mining. LTC has advantages, at least in the foreseeable future
3. The biggest threat of bitcoin is 51% attack:
some shanzhais are killed by 51% attack. To be honest, LTC is a worry for the development of LTC and BTC, of course. However, the specific problems they face are different: BTC can avoid 51% attack through technology upgrading (such as end block reconstruction, careful node upgrading, and calculation difficulty), However, there is no way to evade LTC technology. However, e to the scattered computing power of graphics card mining and the increasing difficulty, this problem needs to be paid attention to, but don't worry too much. With the use of ASIC in BTC, the risk of 51% attack is increasing. I hope BTC development team can solve this problem as soon as possible.
each litecain is divided into 100000000 smaller units, defined by eight decimal places. Lightcoin needs to be generated by "miner mining". Mining is done by hashing through computer graphics card. If the value of "mine explosion" is calculated, the system will reward 50 lightcoin at one time. At present, the computing power of Leyte coin is growing rapidly. The miners can't find the mine through several computers, so they need to join the mine pool. The mine pool gathers all the computing power of everyone, so the probability of finding the mine is greater
e to the popularity of bitcoin and lightcoin, many units, institutions or indivials proce money by imitating their principles in an endless stream. In order to regulate the operation of digital currencies such as lightcoin, the relevant departments of the state specially authorize and support the development of a series of training courses on digital assets and business value-added points, so that students can analyze objectively and invest rationally.
Bitcoin uses SHA-256 encryption algorithm. When mining, it competes with computing power. In order to improve computing power, bitcoin has gone through four stages: CPU mining, GPU mining, FPGA mining and now ASIC mining machine mining, and the degree of specialization is getting higher and higher
Ethereum uses the ethash encryption algorithm. In the process of mining, it needs to read the memory and store the DAG file. Because the bandwidth of each read memory is limited, and the existing computer technology is difficult to have a qualitative breakthrough in this problem, so no matter how to improve the computing efficiency of the computer, the memory read efficiency will not be greatly improved. Therefore, in a sense, Ethereum's ethash encryption algorithm is ASIC resistant.
different encryption algorithms lead to great differences in mining equipment and computing power between bitcoin and Ethereum
at present, bitcoin mining equipment is mainly ASIC mining machine with a very high degree of specialization. The maximum computing power of a single mining machine is 110t / s, and the scale of computing power of the whole network is more than 120eh / s
the main mining equipment of Ethereum is video card miner, and there are very few specialized ASIC miner. On the one hand, the "ASIC resistance" of Ethereum mining algorithm improves the threshold of developing ASIC miner. On the other hand, after Ethereum is upgraded to 2.0, the consensus mechanism will be transformed into POS, and the miner can not continue mining
compared with the ASIC miner, the graphics card miner has two orders of magnitude difference in computing power. At present, the computing power of mainstream graphics card miner (8 cards) is about 420mh / s, and that of Ethereum is about 230th / s.
from the time dimension of the past two years, bitcoin's computing power of the whole network is growing rapidly, while Ethereum's computing power of the whole network is growing relatively slowly
The ASIC mining machine of
bitcoin is monopolized by several major mining machine manufacturers, and miners can only buy it from the market; Although the graphics card miner of Ethereum is also manufactured by a special miner, the miner can buy accessories from the market and assemble them according to his own demand
mahjong is the earliest application of blockchain in China:
the idea that a wants to play mahjong is equivalent to creating a block:
a calls to inform B, C and D, which means "decentralization & quot; Point to point transmission of
ABCD has formed a consensus that the touch action is "mining", and four people are "miners"
mahjong is a hash value. The Hu card is to hit the correct hash value and get the corresponding chip reward, which is called bitcoin
each of the four recorded the first round of the game. In the whole blockchain, this is only one node. If 20 mahjong games were played that day, that is, 20 nodes (blocks), and 20 blocks were connected together to form a complete ledger, that is blockchain< According to historical records, China is the world's earliest application group in blockchain, so you can be proud to say that China is more than 1000 years ahead of the world in blockchain application
it's powerful. Our country is [strong] [strong] [strong]
