Position: Home page » Ethereum » Ethereum key file export public key

Ethereum key file export public key

Publish: 2021-04-24 21:41:40
1. At the top of Ethereum is DAPP. It exchanges with the smart contract layer through Web3. JS. All smart contracts run on EVM (Ethereum virtual machine) and use RPC calls. Below EVM and RPC are the four core contents of Ethereum, including: blockchain, consensus algorithm, mining and network layer. Except DAPP, all other parts are in the Ethereum client. The most popular Ethereum client is geth (go Ethereum)
2.

in terms of cloth storage and mining, I recommend Heshu hardware wallet and jiajiabao intelligent home miner. The core advantage of the proct is safety

take sum hardware wallet as an example. The advantages of sum hardware wallet are as follows:

1. The private key seed is encrypted layer by layer, physically isolated and never touched the Internet.

firstly, when creating the wallet, the seed password is generated and stored in the local encryption chip, and the 10 bit payment password is required

then, the transaction is made in the wallet. At this time, the user needs to enter the payment password to obtain the private key to digitally sign the transaction, and the transaction is completed. In addition, the private key seed is permanently stored in the chip, which is physically isolated and never touches the Internet. There is no need to worry about my password being stolen by hackers

Second, the bank system verifies the financial level motherboard and encryption chip

uses the bank system to verify the financial level motherboard, and the private key seed is stored in the chip. If the proct is stolen or lost, and destroyed by malicious violence, the chip will trigger a self destruct circuit, and immediately permanently and irrecoverably delete all the information in the area

Third, it supports the withdrawal of global bitcoin ATM, which is convenient and fast

the reason why digital assets attract the attention of many fields in the world is that it is creating a global fast circulation, and the larger the circulation field is, the wider the scope is, and the higher its use value is. The core of digital assets is the medium it acts on among currencies. The Heshu wallet has built-in many mainstream exchanges in the world. It can trade digital assets anytime and anywhere. With one machine in hand, it can walk around the world without worry, and no longer have to worry about exchanging foreign currency

Different from conventional digital wallets, multi signature wallets need the authorization of multiple key holders to transfer digital currency, so the security of multi signature wallets is higher. Ordinary Wallet: a wants to transfer a bitcoin to X. A only needs his signature (using the private key) to complete the transaction. Sum Wallet: if a wants to transfer a bitcoin to x, a multi signature verification is set (at least two signatures of Abc3 indivials are required to transfer the money), then a needs B or C to complete the signature (using the private key) when a wants to transfer the money to X. I hope I can help you. Thank you

3.

The digital currency wallet is the hardware wallet, which means that the private key of digital assets is stored in a single chip, isolated from the Internet, plug and play. Hardware wallet can't guarantee 100% security. For example, if a geek gets your hardware wallet and doesn't know your private key, it may be cracked by violence. It's just one of the safest storage methods compared to other storage methods

many block chain entrepreneurs at home and abroad are optimistic about the development of this field, so they begin to build more hardware wallets. In the case of the exchange being stolen a lot of money and the software wallet being stolen from time to time, many investors regard the hardware wallet as the last moat

extended information:

whether the hardware wallet is safe

the hardware wallet can not guarantee 100% security. For example, if a geek obtains your hardware wallet, it may be cracked violently even if it doesn't know your hardware wallet immediately. It's just one of the safest storage methods compared to other storage methods

of course, there are exceptions, such as you have unlimited brain power and never forget. It's better to save it anywhere than in your own mind

4. If it's lost, it's better to post the lost advertisement
5. The issue of bitcoin is determined by the block height, that is, the distance from the No. 0 block of Genesis. Now when the number is reached, the total amount of bitcoin should be limited. After this village, there will be no store. If the miners dig a block but don't receive the reward of the block, the bitcoin will be destroyed forever

coinbase transaction is a special transaction that generates bitcoin "out of thin air". Only miners can write this kind of transaction, and the number of generated bitcoin is limited by rules (new currency reced by half for every 210000 blocks + transaction fee for this block)

however, the rules do not stipulate that the miner must take away all the rewards that can be taken, and can choose not to take them

therefore, a mine pool connected with the RSK side chain has made a bug before, forgetting to take away the reward and occupying a pit in a block for nothing, which is equivalent to destroying the corresponding amount of bitcoin, making the total amount of bitcoin decrease a little bit permanently

in addition, to spend a bitcoin, you only need to specify the transaction ID and output serial number

as like as two peas in multiple blocks repeatedly write identical coinbase transactions, the transaction ID is also repeated.

therefore, this kind of situation also occupies the pit of a block in vain, and permanently destroys the corresponding amount of bitcoin

it seems to me that this is still a security vulnerability, so the new version of bitcoin software later banned the writing of repeated coinbase transactions. But until now, there has been no ban on miners not getting their e rewards

generally speaking, a coin is controlled by a private key. If a coin is transferred to an address where no one knows the private key, it will be destroyed

if the owner does a good job in security, and the private key is not disclosed and cannot be guessed, but he accidentally loses the private key, it is equivalent to destroying all the coins he owns

there are only some special circumstances that require intentional destruction of coins

one is irreversibly converted into another kind of currency, such as the contract currency XCP attached to bitcoin and wormhole cash WHC attached to BCH

the second is to save certificates and data on the chain, such as the time stamp: panbiao.com/2013/08 /

and the crowd funding of the original Ethereum founding team: zhuanlan.hu.com/p/29

the private key is essentially a big number. Whoever knows this number can control the currency on the corresponding address. So the private key must be generated with reliable random number, otherwise it may be guessed and stolen

compared with the token, the address is the hash of the public key. There is no way to judge whether an address has a corresponding public key and private key (even if the public key is known, the corresponding private key cannot be known). Therefore, even if it is explicitly the address of "burned" token, the system does not prohibit the transfer in

strictly speaking, what locks the currency is a small program (script). This program takes the input as the public key and digital signature. First, check whether the public key hash is consistent, and then check whether the digital signature is valid. If it is valid, it will be verified and transfer is allowed; Otherwise, it will be judged that the transaction is illegal and refuse to package into the chain

it is the whole node software that explains and executes this program. It can be said that the software code of the whole node specifically defines a coin

however, the current situation is very embarrassing. Most miners do not run the whole node, only a few mines are running. The vast majority of users do not run the whole node, even if they run the whole node, they can only perform verification, no computing power, no block
6. The issue of bitcoin is determined by the block height, that is, the distance from the No. 0 block of Genesis. Now when the number is reached, the total amount of bitcoin should be limited. After this village, there will be no store. If the miners dig a block but don't receive the reward of the block, the bitcoin will be destroyed forever

coinbase transaction is a special transaction that generates bitcoin "out of thin air". Only miners can write this kind of transaction, and the number of generated bitcoin is limited by rules (new currency reced by half for every 210000 blocks + transaction fee for this block)

however, the rules do not stipulate that the miner must take away all the rewards that can be taken, and can choose not to take them

therefore, a mine pool connected with the RSK side chain has made a bug before, forgetting to take away the reward and occupying a pit in a block for nothing, which is equivalent to destroying the corresponding amount of bitcoin, making the total amount of bitcoin decrease a little bit permanently

in addition, to spend a bitcoin, you only need to specify the transaction ID and output serial number

as like as two peas in multiple blocks repeatedly write identical coinbase transactions, the transaction ID is also repeated.

therefore, this kind of situation also occupies the pit of a block in vain, and permanently destroys the corresponding amount of bitcoin

it seems to me that this is still a security vulnerability, so the new version of bitcoin software later banned the writing of repeated coinbase transactions. But until now, there has been no ban on miners not getting their e rewards

generally speaking, a coin is controlled by a private key. If a coin is transferred to an address where no one knows the private key, it will be destroyed

if the owner does a good job in security, and the private key is not disclosed and cannot be guessed, but he accidentally loses the private key, it is equivalent to destroying all the coins he owns

there are only some special circumstances that require intentional destruction of coins

one is irreversibly converted into another kind of currency, such as the contract currency XCP attached to bitcoin and wormhole cash WHC attached to BCH

the second is to save certificates and data on the chain, such as the time stamp: panbiao.com/2013/08 /

and the crowd funding of the original Ethereum founding team: zhuanlan.hu.com/p/29

the private key is essentially a big number. Whoever knows this number can control the currency on the corresponding address. So the private key must be generated with reliable random number, otherwise it may be guessed and stolen

compared with the token, the address is the hash of the public key. There is no way to judge whether an address has a corresponding public key and private key (even if the public key is known, the corresponding private key cannot be known). Therefore, even if it is explicitly the address of "burned" token, the system does not prohibit the transfer in

strictly speaking, what locks the currency is a small program (script). This program takes the input as the public key and digital signature. First, check whether the public key hash is consistent, and then check whether the digital signature is valid. If it is valid, it will be verified and transfer is allowed; Otherwise, it will be judged that the transaction is illegal and refuse to package into the chain

it is the whole node software that explains and executes this program. It can be said that the software code of the whole node specifically defines a coin

however, the current situation is very embarrassing. Most miners do not run the whole node, only a few mines are running. The vast majority of users do not run the whole node, even if they run the whole node, they can only perform verification, no computing power, no block.
7.

Generally speaking, blockchain wallet is used to store digital currency. In fact, blockchain wallet does not store digital currency, but a tool to store key (private key and public key). With the key, you can have the right to control the digital currency in the corresponding address, and use the digital currency collection address generated in blockchain wallet, You can accept the digital currency transferred to you by others, and you can also transfer the digital currency you own to others.

classification of digital currency wallets:

can be roughly divided into two categories, hot wallet (online wallet) and cold wallet (offline wallet)

first, hot wallet

Hot wallet is also called online wallet, It includes light wallets and heavy wallets (all node wallets). The wallets that need to be connected to the Internet can be directly traded

1. Light Wallet:

does not store the complete blockchain, only stores the data related to itself. It is small in size and can run on mobile phones, computers, web pages, etc

advantages and disadvantages: it does not occupy memory, supports a variety of digital assets, has a good user experience, is fast for novices, but transaction verification is a little slow

2. HEAVY WALLET (full node wallet)

maintains all blockchain data, completely decentralizes and synchronizes all data. It has better privacy and can verify the validity of transaction data locally

advantages and disadvantages: it has better privacy and faster verification of information, but it needs to synchronize data before each use, takes up a lot of hard disk space, and does not support multiple digital currency transactions

Second, cold wallet

cold wallet is not connected to the Internet, also known as offline wallet; For example, professional hardware devices, or private keys (mnemonics) written on paper

1. Hardware wallet

Hardware wallet is to store digital currency with professional hardware, store the private key of digital assets in a chip, isolate it from the Internet, and plug and play

2. Paper wallet

the advantages and disadvantages of writing the private key on paper and then deleting

cold Wallet:

is relatively safe, but it is very troublesome to create a wallet and trade. It is difficult for novices to operate, and the price of wallets is relatively expensive, generally ranging from thousands to tens of thousands of yuan. If you don't have a large amount of digital assets, you don't need to consider

generally, it's recommended for novices to use light wallet. Light wallet is easy to operate and easy to use. Personal used geekwallet

simple and convenient light wallet supports bitcoin (BTC), lightcoin (LTC), Ethereum (ETH), EOS Storage and management of mainstream digital currency assets such as usdt

using bip44 mnemonics, local private key, off-line signature and other security mechanisms, as well as mobile phone and computer al backup strategy, completely solve the loss of digital currency assets caused by hacker attack, virus infection, mobile phone loss, forgetting mnemonics and other ways, and provide users with online Multi Chain digital assets one-stop management service. The platform also has tiaoshao market, which can carry out token trading of physical assets on the chain

8. They focus on blockchain related instries
and provide solutions such as mine machine hosting, mine operation, digital currency trading, and mine pool services.
9.

It refers to the data contained and attached in the electronic form in the data message, which is used to identify the identity of the signer and indicate that the signer recognizes the content

electronic signature is not a digital image of written signature. It is actually an electronic code, with which the recipient can easily verify the identity and signature of the sender on the Internet. It can also verify whether the original text of the file has changed ring transmission. If someone wants to send an important document to people in other places through the network, both the recipient and the sender need to apply for an electronic license from a Ca (Global sign). The encrypted certificate includes the applicant's public key on the Internet, namely & quot; Public computer password;, Used for file validation

the sender encrypts the file with the recipient's public key issued by Ca, and signs the file with his own key. After receiving the document, the recipient first resolves the signature with the sender's public key pair to prove that the document is actually sent by the sender. Then use your private key to decrypt the file and read it

From the definition of e-signature, we can see two basic functions of e-signature:

(1) identify the signer

(2) indicate the signer's approval of the content. In the definition of e-signature, technology neutrality is fully considered, and the provisions on e-signature are extracted according to the basic functions of signature, It is considered that all electronic technical means that meet the basic functions of signature can be regarded as electronic signature. From the definition of electronic signature and digital signature, we can see that they are different: electronic signature is put forward from the perspective of law, and it is technology neutral. Any electronic technical means that meets the basic functions of signature can be called electronic signature; Digital signature is proposed from the technical point of view, which requires the use of cryptographic technology. Its main purpose is to confirm the source of data unit and the integrity of data unit

electronic signature is a generalized concept, digital signature can be considered as a way to realize electronic signature, and digital signature provides higher functions than electronic signature

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750