Ethereum public key length
Ethernet mining tutorial
1. Create a new folder on the hard disk, which is better than C: eth. Then all the mining software is stored here
2. Download the following software
1) geth -- select geth win download and unzip
2) ethernet -- download and unzip to the same folder and rename it as "miner"
3) Ethereum wallet -- Download the win Ethereum wallet and unzip it and rename it as "wallet"
install all the software
3 Open the command prompt (click win and R at the same time, or click Start menu and enter CMD). The command prompt is a command line parser that allows you to execute command input software in the operating system
After
, you will have Ethereum wallet. But there is no balance, so next you need to build an ethminer. It's time to minimize your wallet
Mining
BTC bitcoin
bitcoin is the first distributed digital asset platform created. Since its launch in 2009, it has proven to be not only the most popular, but also the largest market capital value. In addition, it is also the most expensive, with a value of $10710 per coin on February 17, 2018. Bitcoin introces the first blockchain distributed ledger dedicated to recording all transactions, and gets rid of the function that users need a central authority to process or verify transactions
its goal is to provide a platform for users to conct cross-border transactions without any intermediary, which is what we call decentralization. The platform's largest money (BTC) supply is about 21 million. Of this figure, about 16.5 million have been mined and are now in circulation. It is mined all the time around the world to ensure the circulation of coins
Advantages:1. Its distributed system provides users with great freedom
2. High portability
This is a secure networkdisadvantages:
1
2. The user may lose the key
eth Ethereum
Ethereum is also a distributed platform, which was created by Network Programmer vitalik buterin in July 2015. Ethereum aims to enable users to create and deploy smart contracts. One of the main functions of smart contracts is to allow the creation of encrypted assets or tokens running on Ethereum networks. Ethereum token is used to purchase various functions such as cloud storage space. These tokens are stored in a digital wallet compatible with Ethereum blockchain
Ethereum's digital currency ether serves as the medium for executing smart contracts. At present, about 98 million ether coins have been mined and circulated, and the circulation supply increases by about 18 million every year. Ethernet coin is created to run on the Ethereum network. It can be used to compensate the participant nodes or transfer from one user to another
advantages:
1
2
The safety was very highdisadvantages: large circulation
< H2 > extended data:generation principle:
starting from the essence of bitcoin, the essence of bitcoin is actually a special solution generated by a bunch of complex algorithms. A special solution is one of the finite solutions of a system of equations. Every particular solution can solve the equation and is unique
in the metaphor of banknotes, bitcoin is the number of the top word of a banknote. The number of the top word on a banknote owns the banknote. The process of mining is to constantly seek the special solution of the equation system through huge amount of calculation. The equation system is designed to have only 21 million special solutions, so the upper limit of bitcoin is 21 million
to mine bitcoin, you can download the special bitcoin computing tools, register various cooperation websites, fill the registered user name and password into the computing program, and then click the operation to officially start
after completing the installation of bitcoin client, you can directly obtain a bitcoin address. When others pay, you only need to post the address to others, and you can pay through the same client
after installing the bitcoin client, it will assign a private key and a public key. You need to back up the wallet data containing your private key to ensure that your property is not lost. Unfortunately, if the hard disk is completely formatted, personal bitcoin will be completely lost
in terms of cloth storage and mining, I recommend Heshu hardware wallet and jiajiabao intelligent home miner. The core advantage of the proct is safety
take sum hardware wallet as an example. The advantages of sum hardware wallet are as follows:
1. The private key seed is encrypted layer by layer, physically isolated and never touched the Internet.
firstly, when creating the wallet, the seed password is generated and stored in the local encryption chip, and the 10 bit payment password is required
then, the transaction is made in the wallet. At this time, the user needs to enter the payment password to obtain the private key to digitally sign the transaction, and the transaction is completed. In addition, the private key seed is permanently stored in the chip, which is physically isolated and never touches the Internet. There is no need to worry about my password being stolen by hackers
Second, the bank system verifies the financial level motherboard and encryption chipuses the bank system to verify the financial level motherboard, and the private key seed is stored in the chip. If the proct is stolen or lost, and destroyed by malicious violence, the chip will trigger a self destruct circuit, and immediately permanently and irrecoverably delete all the information in the area
Third, it supports the withdrawal of global bitcoin ATM, which is convenient and fastthe reason why digital assets attract the attention of many fields in the world is that it is creating a global fast circulation, and the larger the circulation field is, the wider the scope is, and the higher its use value is. The core of digital assets is the medium it acts on among currencies. The Heshu wallet has built-in many mainstream exchanges in the world. It can trade digital assets anytime and anywhere. With one machine in hand, it can walk around the world without worry, and no longer have to worry about exchanging foreign currency
Different from conventional digital wallets, multi signature wallets need the authorization of multiple key holders to transfer digital currency, so the security of multi signature wallets is higher. Ordinary Wallet: a wants to transfer a bitcoin to X. A only needs his signature (using the private key) to complete the transaction. Sum Wallet: if a wants to transfer a bitcoin to x, a multi signature verification is set (at least two signatures of Abc3 indivials are required to transfer the money), then a needs B or C to complete the signature (using the private key) when a wants to transfer the money to X. I hope I can help you. Thank youThe digital currency wallet is the hardware wallet, which means that the private key of digital assets is stored in a single chip, isolated from the Internet, plug and play. Hardware wallet can't guarantee 100% security. For example, if a geek gets your hardware wallet and doesn't know your private key, it may be cracked by violence. It's just one of the safest storage methods compared to other storage methods
many block chain entrepreneurs at home and abroad are optimistic about the development of this field, so they begin to build more hardware wallets. In the case of the exchange being stolen a lot of money and the software wallet being stolen from time to time, many investors regard the hardware wallet as the last moat
extended information:
whether the hardware wallet is safe
the hardware wallet can not guarantee 100% security. For example, if a geek obtains your hardware wallet, it may be cracked violently even if it doesn't know your hardware wallet immediately. It's just one of the safest storage methods compared to other storage methods
of course, there are exceptions, such as you have unlimited brain power and never forget. It's better to save it anywhere than in your own mind
first, you need to create a "Genesis" JSON configuration file, which describes some parameters of the genesis block. The following is the content of the file:
{
& quot; coinbase": & quot;& quot;,< br />" config": {< br />" homesteadBlock": 5
},
" difficulty": & quot; 0x20000",< br />" extraData": & quot; 0x",< br />" gasLimit": & quot; 0x2FEFD8",< br />" mixhash": & quot;& quot;,< br />" nonce": & quot; 0x0",< br />" parentHash": & quot; 000000000000000000000000",< br />" timestamp": & quot; 0x00",< br />" alloc": {< br />"& quot;:< br />{
" balance":& quot;& quot;
}
}
} 1234567891011213141516171819
the above code into a text file and name it genesis.json
Genesis!:
in order not to conflict with the data of the main chain, it is recommended to establish your own private chain data folder. On my computer, I built an ethdbspace as the Ethereum experimental work area on disk e, and created a privchain folder as the data storage folder of my first private chain
here, in order to facilitate management, I put genesis.json under the ethdbspace folder
open the windows command line
type the following command
geth -- dataDir & quot; E:\ EthDBSpace\ PrivChain" init " E:\ EthDBSpace\ genesis.json" 1
– the dataDir option is used to specify the data directory of our private chain. On my computer, it's E: &; EthDBSpace\ Privchain
init is the genesis command, followed by our Genesis configuration file path
after clicking enter, the execution result is as follows
at this time, genesis is complete
create an account:
in order to do experiments on the private chain, we also need to create our own account on the private chain
windows command line, type
geth -- dataDir & quot; E:\ EthDBSpace\ PrivChain" Console1
we have successfully created the world, so when we enter the client for the second time, we do not need to specify the genesis.json file path again, but directly – dataDir to indicate the private link data path
the console command is used to open the command line of geth
after clicking enter, the client will be initialized for a while. After the command prompt appears, it means that you have entered the geth console
type
personal. Newaccount (& #) in the geth command line; Your Password') 1
the personal.newaccount function is used to create an account, in which the parameter is the account password.
after clicking enter, the account creation address will be listed in green below the command, that is, the public key of the account.
we can check the account balance first, In the geth command line, type:
My = eth. Accounts [0]
eth. Getbalance (my) 12
My = eth. Accounts [0]. The purpose of this sentence is to assign the account address we just created to my variable. This can simplify the subsequent account address input. Among them, eth.accounts records the addresses of all accounts on this machine. Since we created an account for the first time, there is only one account on the computer at present. So here we use eth. Accounts [0] to extract the first account address. The eth.getbalance function is used to obtain the account balance, and the parameters are filled in the account address. The my variable here records the address of the first account
I hope my answer can help you
coinbase transaction is a special transaction that generates bitcoin "out of thin air". Only miners can write this kind of transaction, and the number of generated bitcoin is limited by rules (new currency reced by half for every 210000 blocks + transaction fee for this block)
however, the rules do not stipulate that the miner must take away all the rewards that can be taken, and can choose not to take them
therefore, a mine pool connected with the RSK side chain has made a bug before, forgetting to take away the reward and occupying a pit in a block for nothing, which is equivalent to destroying the corresponding amount of bitcoin, making the total amount of bitcoin decrease a little bit permanently
in addition, to spend a bitcoin, you only need to specify the transaction ID and output serial number
as like as two peas in multiple blocks repeatedly write identical coinbase transactions, the transaction ID is also repeated.
therefore, this kind of situation also occupies the pit of a block in vain, and permanently destroys the corresponding amount of bitcoin
it seems to me that this is still a security vulnerability, so the new version of bitcoin software later banned the writing of repeated coinbase transactions. But until now, there has been no ban on miners not getting their e rewards
generally speaking, a coin is controlled by a private key. If a coin is transferred to an address where no one knows the private key, it will be destroyed
if the owner does a good job in security, and the private key is not disclosed and cannot be guessed, but he accidentally loses the private key, it is equivalent to destroying all the coins he owns
there are only some special circumstances that require intentional destruction of coins
one is irreversibly converted into another kind of currency, such as the contract currency XCP attached to bitcoin and wormhole cash WHC attached to BCH
the second is to save certificates and data on the chain, such as the time stamp: panbiao.com/2013/08 /
and the crowd funding of the original Ethereum founding team: zhuanlan.hu.com/p/29
the private key is essentially a big number. Whoever knows this number can control the currency on the corresponding address. So the private key must be generated with reliable random number, otherwise it may be guessed and stolen
compared with the token, the address is the hash of the public key. There is no way to judge whether an address has a corresponding public key and private key (even if the public key is known, the corresponding private key cannot be known). Therefore, even if it is explicitly the address of "burned" token, the system does not prohibit the transfer in
strictly speaking, what locks the currency is a small program (script). This program takes the input as the public key and digital signature. First, check whether the public key hash is consistent, and then check whether the digital signature is valid. If it is valid, it will be verified and transfer is allowed; Otherwise, it will be judged that the transaction is illegal and refuse to package into the chain
it is the whole node software that explains and executes this program. It can be said that the software code of the whole node specifically defines a coin
however, the current situation is very embarrassing. Most miners do not run the whole node, only a few mines are running. The vast majority of users do not run the whole node, even if they run the whole node, they can only perform verification, no computing power, no block.
at the same time, Kushen users can set seed password and payment password to strengthen the multiple protection of Kushen wallet
the layered certainty of Kushen digital currency wallet allows users to manage multiple bitcoin addresses with a single seed password
Kushen digital currency wallet is easy to use. Kushen users can set service charges and multiple target bitcoin address book on the wallet to facilitate the management of multi account digital assets
Kushen digital currency wallet has only one screen as a single output device and only one camera as a single input device. He communicates with Kushen Internet app through two-dimensional code communication.
blockchain wallet is a container containing public key (address) and private key, which is used to keep our digital assets safely. The public key (address) is the authority to view the wallet, which is equivalent to the address of the bank card, while the private key is the authority to operate the wallet, which is equivalent to the password of the bank card. Similar to the private key, there are mnemonic words and wallet file + password. As long as you master one of the three, you will have the ownership of the wallet
the most important feature of blockchain wallet is that it can't be tampered with and anonymous, so we must keep the private key well, otherwise the security of assets can't be guaranteed I the private key in several small paper books and store them separately to prevent loss.)
public key is used to receive or transfer out digital currency, which can tell others. It is equivalent to email address
tokenpocket wallets have various wallets based on ten bottom layers, including EOS, Iost, Ethereum, Tron, binance, BOS, cosmos, Moke, Jingtong, and en. Next, bitcoin wallets will be opened
haha, Xiao has a look at so many unfamiliar words - the ability to support so many people at the bottom is e to the powerful technology.
