How to encrypt Ethereum private key
One of the characteristics of blockchain projects (especially public chains) is open source. Through open source code, to improve the credibility of the project, so that more people can participate. But the open source code also makes it easier for attackers to attack blockchain system. In the past two years, there have been a number of hacker attacks. Recently, the anonymous currency verge (xvg) was attacked again. The attacker locked a vulnerability in the xvg code, which allowed malicious miners to add false timestamps on the block, and then quickly dig out new blocks. In a few hours, the attacker obtained nearly $1.75 million worth of digital currency. Although the subsequent attack was successfully stopped, no one can guarantee whether the attacker will attack again in the future
of course, blockchain developers can also take some measures
one is to use professional code audit services,
the other is to understand the security coding specifications and take preventive measures
the security of cryptographic algorithm
with the development of quantum computer, it will bring a major security threat to the current cryptosystem. Blockchain mainly relies on elliptic curve public key encryption algorithm to generate digital signature for secure transactions. Currently, the most commonly used ECDSA, RSA, DSA, etc. can not withstand quantum attacks in theory, and there will be greater risks. More and more researchers begin to pay attention to cryptographic algorithms that can resist quantum attacks
of course, in addition to changing the algorithm, there is another way to improve the security:
refer to bitcoin's treatment of public key address to rece the potential risk of public key disclosure. As users, especially bitcoin users, the balance after each transaction is stored in a new address to ensure that the public key of the address where bitcoin funds are stored is not leaked
security of consensus mechanism
the current consensus mechanisms include proof of work (POW), proof of stake (POS), delegated proof of stake (dpos), practical Byzantine fault tolerance (pbft), etc
POW faces 51% attack. Because POW depends on computing power, when the attacker has the advantage of computing power, the probability of finding a new block will be greater than that of other nodes. At this time, the attacker has the ability to cancel the existing transaction. It should be noted that even in this case, the attacker can only modify his own transaction, but not the transaction of other users (the attacker does not have the private key of other users)
in POS, attackers can attack successfully only when they hold more than 51% token, which is more difficult than 51% computing power in pow
in pbft, when the malicious nodes are less than 1 / 3 of the total nodes, the system is secure. Generally speaking, any consensus mechanism has its own conditions. As an attacker, we also need to consider that once the attack is successful, the value of the system will return to zero. At this time, the attacker does not get any other valuable return except destruction
for the designers of blockchain projects, they should understand the advantages and disadvantages of each consensus mechanism, so as to select an appropriate consensus mechanism or design a new consensus mechanism according to the needs of the scene
security of smart contract
smart contract has the advantages of low operation cost and low risk of human intervention, but if there are problems in the design of smart contract, it may bring greater losses. In June 2016, the Dao, the most popular funding project of Ethereum, was attacked. The hacker obtained more than 3.5 million Ethereum coins, which later led to the bifurcation of Ethereum into Eth and etc
there are two aspects of the proposed measures:
one is to audit the security of smart contract, and the other is to follow the principle of smart contract security development
the security development principles of smart contract are: to be prepared for possible errors, to ensure that the code can correctly handle the bugs and vulnerabilities; Release smart contracts carefully, do well in function test and security test, and fully consider the boundary; Keep smart contracts simple; Pay attention to the threat intelligence of blockchain and check and update in time; Be clear about the characteristics of blockchain, such as calling external contracts carefully
security of digital wallet
there are three main security risks in digital wallet: first, design defects. At the end of 2014, a user lost hundreds of digital assets e to a serious random number problem (repeated r value). Second, the digital wallet contains malicious code. Third, the loss of assets caused by the loss or damage of computers and mobile phones
there are four main countermeasures:
one is to ensure the randomness of the private key
The second is to check the hash value before installing the software to ensure that the digital wallet software has not been tampered with The third is to use cold wallet The fourth is to back up the private keyThis question is very strange. I recommend you to see the introction of professional media
on cryptokitties, you can buy virtual cats. By 17:00 Beijing time on December 6, 2017, the cheapest kitten had reached 0.037eth. Equivalent to 110 yuan per piece
then the kittens have some opinions about the generation. For example, Gen 12 indicates that it is the 12th generation, while Gen 20 indicates that it is the 20th generation. Generally speaking, the smaller the algebra, the more valuable it is. And you can make your kittens slap each other. For example, a Gen 1 kitten and a Gen 1 kitten will give birth to a Gen 2 kitten
you can sell your kittens and their offspring for money
but what if you don't have two kittens? If you only buy one kitten, you can use your kitten to have fun with other people's high-quality kittens. The fee also depends on the kittens (to be honest, this mechanism is very evil, similar to... Borrowing chickens to have children?) The quality of the proct. If your kitten is of high quality, you can also use your kitten to mate other people's kittens, and then you get Ethereum income
but kittens also have special fertility rates
every time a kitten gives birth to one generation, it will have a certain cooling time, and it can't regenerate kittens within the cooling time,
the cooling time is divided into several grades
fast: 1 minute
swift: 2 – 5 minutes
snappy: 10 – 30 minutes
brisk: 1 – 2 minutes
plodding: 4 – 8 minutes
slow: 16 – 24 minutes
sluggi Sh (lazy kitten): 2 – 4 days
catatonic (nervous kitten): 1 week
so the price of your cat also depends on its birth time
and generally speaking, the larger the algebra is, the higher the gen value is, and the slower their growth rate is
but I want to make complaints about it because CryptoKitties is too hot! Ethereum network has a little bit of a crash, the official recommended that every time you buy a cat, the minimum handling charge is 21000. 400000 fuel = 0.01eth. However, it is irritating that I raised the procere to 1.6 million fuel, which is 0.04, and Ethereum still failed. 0.04 Ethereum. That's more than 120 yuan. It's too dark.
the private key must be well protected and should not be known to anyone except yourself
wallet is very important. If you want to use it, you should fully understand the choice.
bitcoin, Ruitai coin, Laite coin, Ethereum and other digital cryptocurrencies all use blockchain technology
blockchain is an important concept of bitcoin, which is essentially a decentralized database. At the same time, as the underlying technology of bitcoin, it is used to verify the validity of its information (anti-counterfeiting) and generate the next block. Blockchain is a series of data blocks generated by cryptography, each of which contains the information of a bitcoin network transaction
