Ethereum key file export public key
in terms of cloth storage and mining, I recommend Heshu hardware wallet and jiajiabao intelligent home miner. The core advantage of the proct is safety
take sum hardware wallet as an example. The advantages of sum hardware wallet are as follows:
1. The private key seed is encrypted layer by layer, physically isolated and never touched the Internet.
firstly, when creating the wallet, the seed password is generated and stored in the local encryption chip, and the 10 bit payment password is required
then, the transaction is made in the wallet. At this time, the user needs to enter the payment password to obtain the private key to digitally sign the transaction, and the transaction is completed. In addition, the private key seed is permanently stored in the chip, which is physically isolated and never touches the Internet. There is no need to worry about my password being stolen by hackers
Second, the bank system verifies the financial level motherboard and encryption chipuses the bank system to verify the financial level motherboard, and the private key seed is stored in the chip. If the proct is stolen or lost, and destroyed by malicious violence, the chip will trigger a self destruct circuit, and immediately permanently and irrecoverably delete all the information in the area
Third, it supports the withdrawal of global bitcoin ATM, which is convenient and fastthe reason why digital assets attract the attention of many fields in the world is that it is creating a global fast circulation, and the larger the circulation field is, the wider the scope is, and the higher its use value is. The core of digital assets is the medium it acts on among currencies. The Heshu wallet has built-in many mainstream exchanges in the world. It can trade digital assets anytime and anywhere. With one machine in hand, it can walk around the world without worry, and no longer have to worry about exchanging foreign currency
Different from conventional digital wallets, multi signature wallets need the authorization of multiple key holders to transfer digital currency, so the security of multi signature wallets is higher. Ordinary Wallet: a wants to transfer a bitcoin to X. A only needs his signature (using the private key) to complete the transaction. Sum Wallet: if a wants to transfer a bitcoin to x, a multi signature verification is set (at least two signatures of Abc3 indivials are required to transfer the money), then a needs B or C to complete the signature (using the private key) when a wants to transfer the money to X. I hope I can help you. Thank youThe digital currency wallet is the hardware wallet, which means that the private key of digital assets is stored in a single chip, isolated from the Internet, plug and play. Hardware wallet can't guarantee 100% security. For example, if a geek gets your hardware wallet and doesn't know your private key, it may be cracked by violence. It's just one of the safest storage methods compared to other storage methods
many block chain entrepreneurs at home and abroad are optimistic about the development of this field, so they begin to build more hardware wallets. In the case of the exchange being stolen a lot of money and the software wallet being stolen from time to time, many investors regard the hardware wallet as the last moat
extended information:
whether the hardware wallet is safe
the hardware wallet can not guarantee 100% security. For example, if a geek obtains your hardware wallet, it may be cracked violently even if it doesn't know your hardware wallet immediately. It's just one of the safest storage methods compared to other storage methods
of course, there are exceptions, such as you have unlimited brain power and never forget. It's better to save it anywhere than in your own mind
coinbase transaction is a special transaction that generates bitcoin "out of thin air". Only miners can write this kind of transaction, and the number of generated bitcoin is limited by rules (new currency reced by half for every 210000 blocks + transaction fee for this block)
however, the rules do not stipulate that the miner must take away all the rewards that can be taken, and can choose not to take them
therefore, a mine pool connected with the RSK side chain has made a bug before, forgetting to take away the reward and occupying a pit in a block for nothing, which is equivalent to destroying the corresponding amount of bitcoin, making the total amount of bitcoin decrease a little bit permanently
in addition, to spend a bitcoin, you only need to specify the transaction ID and output serial number
as like as two peas in multiple blocks repeatedly write identical coinbase transactions, the transaction ID is also repeated.
therefore, this kind of situation also occupies the pit of a block in vain, and permanently destroys the corresponding amount of bitcoin
it seems to me that this is still a security vulnerability, so the new version of bitcoin software later banned the writing of repeated coinbase transactions. But until now, there has been no ban on miners not getting their e rewards
generally speaking, a coin is controlled by a private key. If a coin is transferred to an address where no one knows the private key, it will be destroyed
if the owner does a good job in security, and the private key is not disclosed and cannot be guessed, but he accidentally loses the private key, it is equivalent to destroying all the coins he owns
there are only some special circumstances that require intentional destruction of coins
one is irreversibly converted into another kind of currency, such as the contract currency XCP attached to bitcoin and wormhole cash WHC attached to BCH
the second is to save certificates and data on the chain, such as the time stamp: panbiao.com/2013/08 /
and the crowd funding of the original Ethereum founding team: zhuanlan.hu.com/p/29
the private key is essentially a big number. Whoever knows this number can control the currency on the corresponding address. So the private key must be generated with reliable random number, otherwise it may be guessed and stolen
compared with the token, the address is the hash of the public key. There is no way to judge whether an address has a corresponding public key and private key (even if the public key is known, the corresponding private key cannot be known). Therefore, even if it is explicitly the address of "burned" token, the system does not prohibit the transfer in
strictly speaking, what locks the currency is a small program (script). This program takes the input as the public key and digital signature. First, check whether the public key hash is consistent, and then check whether the digital signature is valid. If it is valid, it will be verified and transfer is allowed; Otherwise, it will be judged that the transaction is illegal and refuse to package into the chain
it is the whole node software that explains and executes this program. It can be said that the software code of the whole node specifically defines a coin
however, the current situation is very embarrassing. Most miners do not run the whole node, only a few mines are running. The vast majority of users do not run the whole node, even if they run the whole node, they can only perform verification, no computing power, no block
coinbase transaction is a special transaction that generates bitcoin "out of thin air". Only miners can write this kind of transaction, and the number of generated bitcoin is limited by rules (new currency reced by half for every 210000 blocks + transaction fee for this block)
however, the rules do not stipulate that the miner must take away all the rewards that can be taken, and can choose not to take them
therefore, a mine pool connected with the RSK side chain has made a bug before, forgetting to take away the reward and occupying a pit in a block for nothing, which is equivalent to destroying the corresponding amount of bitcoin, making the total amount of bitcoin decrease a little bit permanently
in addition, to spend a bitcoin, you only need to specify the transaction ID and output serial number
as like as two peas in multiple blocks repeatedly write identical coinbase transactions, the transaction ID is also repeated.
therefore, this kind of situation also occupies the pit of a block in vain, and permanently destroys the corresponding amount of bitcoin
it seems to me that this is still a security vulnerability, so the new version of bitcoin software later banned the writing of repeated coinbase transactions. But until now, there has been no ban on miners not getting their e rewards
generally speaking, a coin is controlled by a private key. If a coin is transferred to an address where no one knows the private key, it will be destroyed
if the owner does a good job in security, and the private key is not disclosed and cannot be guessed, but he accidentally loses the private key, it is equivalent to destroying all the coins he owns
there are only some special circumstances that require intentional destruction of coins
one is irreversibly converted into another kind of currency, such as the contract currency XCP attached to bitcoin and wormhole cash WHC attached to BCH
the second is to save certificates and data on the chain, such as the time stamp: panbiao.com/2013/08 /
and the crowd funding of the original Ethereum founding team: zhuanlan.hu.com/p/29
the private key is essentially a big number. Whoever knows this number can control the currency on the corresponding address. So the private key must be generated with reliable random number, otherwise it may be guessed and stolen
compared with the token, the address is the hash of the public key. There is no way to judge whether an address has a corresponding public key and private key (even if the public key is known, the corresponding private key cannot be known). Therefore, even if it is explicitly the address of "burned" token, the system does not prohibit the transfer in
strictly speaking, what locks the currency is a small program (script). This program takes the input as the public key and digital signature. First, check whether the public key hash is consistent, and then check whether the digital signature is valid. If it is valid, it will be verified and transfer is allowed; Otherwise, it will be judged that the transaction is illegal and refuse to package into the chain
it is the whole node software that explains and executes this program. It can be said that the software code of the whole node specifically defines a coin
however, the current situation is very embarrassing. Most miners do not run the whole node, only a few mines are running. The vast majority of users do not run the whole node, even if they run the whole node, they can only perform verification, no computing power, no block.
Generally speaking, blockchain wallet is used to store digital currency. In fact, blockchain wallet does not store digital currency, but a tool to store key (private key and public key). With the key, you can have the right to control the digital currency in the corresponding address, and use the digital currency collection address generated in blockchain wallet, You can accept the digital currency transferred to you by others, and you can also transfer the digital currency you own to others.
classification of digital currency wallets:
can be roughly divided into two categories, hot wallet (online wallet) and cold wallet (offline wallet)
first, hot wallet
Hot wallet is also called online wallet, It includes light wallets and heavy wallets (all node wallets). The wallets that need to be connected to the Internet can be directly traded
1. Light Wallet:
does not store the complete blockchain, only stores the data related to itself. It is small in size and can run on mobile phones, computers, web pages, etc
advantages and disadvantages: it does not occupy memory, supports a variety of digital assets, has a good user experience, is fast for novices, but transaction verification is a little slow
2. HEAVY WALLET (full node wallet)
maintains all blockchain data, completely decentralizes and synchronizes all data. It has better privacy and can verify the validity of transaction data locally
advantages and disadvantages: it has better privacy and faster verification of information, but it needs to synchronize data before each use, takes up a lot of hard disk space, and does not support multiple digital currency transactions
Second, cold wallet
cold wallet is not connected to the Internet, also known as offline wallet; For example, professional hardware devices, or private keys (mnemonics) written on paper
1. Hardware wallet
Hardware wallet is to store digital currency with professional hardware, store the private key of digital assets in a chip, isolate it from the Internet, and plug and play
2. Paper wallet
the advantages and disadvantages of writing the private key on paper and then deleting
cold Wallet:
is relatively safe, but it is very troublesome to create a wallet and trade. It is difficult for novices to operate, and the price of wallets is relatively expensive, generally ranging from thousands to tens of thousands of yuan. If you don't have a large amount of digital assets, you don't need to consider
generally, it's recommended for novices to use light wallet. Light wallet is easy to operate and easy to use. Personal used geekwallet
simple and convenient light wallet supports bitcoin (BTC), lightcoin (LTC), Ethereum (ETH), EOS Storage and management of mainstream digital currency assets such as usdt
using bip44 mnemonics, local private key, off-line signature and other security mechanisms, as well as mobile phone and computer al backup strategy, completely solve the loss of digital currency assets caused by hacker attack, virus infection, mobile phone loss, forgetting mnemonics and other ways, and provide users with online Multi Chain digital assets one-stop management service. The platform also has tiaoshao market, which can carry out token trading of physical assets on the chain
and provide solutions such as mine machine hosting, mine operation, digital currency trading, and mine pool services.
It refers to the data contained and attached in the electronic form in the data message, which is used to identify the identity of the signer and indicate that the signer recognizes the content
electronic signature is not a digital image of written signature. It is actually an electronic code, with which the recipient can easily verify the identity and signature of the sender on the Internet. It can also verify whether the original text of the file has changed ring transmission. If someone wants to send an important document to people in other places through the network, both the recipient and the sender need to apply for an electronic license from a Ca (Global sign). The encrypted certificate includes the applicant's public key on the Internet, namely & quot; Public computer password;, Used for file validation
the sender encrypts the file with the recipient's public key issued by Ca, and signs the file with his own key. After receiving the document, the recipient first resolves the signature with the sender's public key pair to prove that the document is actually sent by the sender. Then use your private key to decrypt the file and read it
From the definition of e-signature, we can see two basic functions of e-signature:(1) identify the signer
(2) indicate the signer's approval of the content. In the definition of e-signature, technology neutrality is fully considered, and the provisions on e-signature are extracted according to the basic functions of signature, It is considered that all electronic technical means that meet the basic functions of signature can be regarded as electronic signature. From the definition of electronic signature and digital signature, we can see that they are different: electronic signature is put forward from the perspective of law, and it is technology neutral. Any electronic technical means that meets the basic functions of signature can be called electronic signature; Digital signature is proposed from the technical point of view, which requires the use of cryptographic technology. Its main purpose is to confirm the source of data unit and the integrity of data unit
electronic signature is a generalized concept, digital signature can be considered as a way to realize electronic signature, and digital signature provides higher functions than electronic signature
