Position: Home page » Ethereum » Lock Ethereum

Lock Ethereum

Publish: 2021-04-21 04:40:46
1.

POW: full name of proof of work

pos: proof of stake

both of them are the consensus mechanism of blockchain and the bookkeeping method of digital currency

the difference is:

1. POW mechanism: workload proof mechanism, that is, the proof of workload, is the requirement that must be met when generating a new transaction information (that is, a new block) to be added to the blockchain. In the blockchain network based on workload proof mechanism, the ability of nodes to obtain the correct numerical solution to generate blocks by calculating the numerical solution of random hash hash is the specific performance of node computing power

POS mechanism: the proof of rights and interests requires the certifier to provide a certain amount of ownership of cryptocurrency. The operation mode of the proof of rights and interests mechanism is that when creating a new block, the miners need to create a "currency right" transaction, and the transaction will send some coins to the miners themselves according to the preset proportion. According to the proportion and time of token owned by each node, the equity proof mechanism reces the mining difficulty of nodes proportionally according to the algorithm, so as to speed up the speed of searching for random numbers

extended materials:

the concept of bitcoin was first proposed by Nakamoto in 2009. According to Nakamoto's ideas, the open source software and the P2P network on it were designed and released. Bitcoin is a kind of P2P digital currency. Point to point transmission means a decentralized payment system

unlike most currencies, bitcoin does not rely on specific currency institutions. It is generated by a large number of calculations based on specific algorithms. Bitcoin economy uses the distributed database composed of many nodes in the whole P2P network to confirm and record all transactions, and uses the design of cryptography to ensure the security of all aspects of currency circulation. The decentralized nature and algorithm of P2P can ensure that it is impossible to artificially manipulate the value of bitcoin through mass proction

2. Etc fans, ethereal classics and their communities are good ways
3. When the mobile phone is lost, it can prevent others from using or swiping the lock screen password. The system allows users to remotely lock on the website. After locking, the security of the mobile phone is greatly improved, and it enters the lost mode to automatically take photos! Remote location and so on! But now the technology of online unlocking is also very strong, often tens of dollars in half an hour!
4. When using ifconfig eth0 up in Linux to display insufficient permissions, the following methods can be adopted:
before executing the command, switch to root user and then execute the command. The method of switching to root:
whether logging in to Ubuntu in graphical mode or command line mode, We will find that the default user is user
but when we need to perform some operations with root permissions (such as repairing system files), we often need to use sudo authorization
at this time, we can switch to the root user and simply execute sudo Su
note: for security reasons, the root user of Ubuntu does not have a fixed password by default, Its password is randomly generated and dynamically changed
and seems to change every five minutes, so Su (switch user) is not allowed, because we don't know the password of root
the default root user has no fixed password and is locked, If you want to set a password for root
just execute the command sudo passwd root and follow the prompts step by step
in this way, you can switch to the root user by entering the root password as mentioned in (1)
note: after setting the password for root, you can still switch to the root user by sudo Su
attachment: in the graphic mode, the system - & gt; System management - & gt; Users and groups can also set a password for root
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750