Monroe High Yield Mine
there are two kinds of mining in the new era, the first is bitcoin mining. After each transaction occurs, it is not complete. The transaction data must be written into the database before it is established, and the other party can really receive the money. First of all, all the transaction data will be sent to the miners, who are responsible for writing these transactions into the blockchain to complete the mining and obtain profits
the second is to dig Shanzhai. Zero coin, Monroe coin, ether coin, Wright coin, bitstock and other "Shanzhai coins". After a miner is assembled, it is connected to the designated mine pool. According to the specific algorithm, it starts full load operation and completes a calculation cycle to obtain "one" virtual currency. Then put the "this" currency on the online trading platform to cash out
How can blockchain mine
at the beginning, bitcoin could be g up with the computer CPU. The founder of bitcoin, Nakamoto Tsung, g up the world's first creation block with his computer CPU. However, the era of CPU mining has long passed, and now bitcoin mining is the era of ASIC mining and large-scale cluster mining
if you want to be a miner, it's actually relatively simple. You can start mining by purchasing a special mining equipment. You don't need to do it yourself. In fact, the computer is performing specific calculations. For miners, you only need to ensure the power supply and network connection of the mining machine.
POW: full name of proof of work
pos: proof of stake
both of them are the consensus mechanism of blockchain and the bookkeeping method of digital currency
the difference is:
1. POW mechanism: workload proof mechanism, that is, the proof of workload, is the requirement that must be met when generating a new transaction information (that is, a new block) to be added to the blockchain. In the blockchain network based on workload proof mechanism, the ability of nodes to obtain the correct numerical solution to generate blocks by calculating the numerical solution of random hash hash is the specific performance of node computing power
POS mechanism: the proof of rights and interests requires the certifier to provide a certain amount of ownership of cryptocurrency. The operation mode of the proof of rights and interests mechanism is that when creating a new block, the miners need to create a "currency right" transaction, and the transaction will send some coins to the miners themselves according to the preset proportion. According to the proportion and time of token owned by each node, the equity proof mechanism reces the mining difficulty of nodes proportionally according to the algorithm, so as to speed up the speed of searching for random numbersextended materials:
the concept of bitcoin was first proposed by Nakamoto in 2009. According to Nakamoto's ideas, the open source software and the P2P network on it were designed and released. Bitcoin is a kind of P2P digital currency. Point to point transmission means a decentralized payment system
unlike most currencies, bitcoin does not rely on specific currency institutions. It is generated by a large number of calculations based on specific algorithms. Bitcoin economy uses the distributed database composed of many nodes in the whole P2P network to confirm and record all transactions, and uses the design of cryptography to ensure the security of all aspects of currency circulation. The decentralized nature and algorithm of P2P can ensure that it is impossible to artificially manipulate the value of bitcoin through mass proction
because those who come in after mobile phone mining will be cut leeks
precautions:
1. In the past two years, various myths about blockchain "overnight wealth" have been constantly staged, and "mining" cryptocurrency has become a new trend of wealth, and mobile phone mining is becoming more and more popular
2. There will be special mining machines for real mining. After all, every mining machine is not cheap now. Mobile phone automatic mining can be obtained at a very low price. What you dig is not bitcoin. Basically, the counterfeit coin you send is not worth money. At that time, you will still be cut leeks
Graphics card digging Monroe is really better than other currencies, the income will be higher! Of course, digging eth is also a good choice
this is my own video card miner. The mining software uses ha Yu miner , (the reason why I choose this software is that ha Yu does not pump water ) there are about 12 pieces per day
mobile phone mining is to attract traffic by speculating the value of the virtual currency. After obtaining the traffic, it can be realized by advertising or colluding with script authors. It can stabilize the morale of the army and a group of people by purchasing virtual currency or other means. It can also attract others to join the gang through high invitation and reward, The next batch of leeks came happily
at present, e to the rise of digital currency mining, it is generally necessary to connect to the mine pool. For example, if you want to dig Monroe coins, you need to connect to the Monroe coin mine pool. The other is that some companies develop their own software, and then let others hang up their mobile phones to mine. This is almost deceptive. It is to use the concept of blockchain to hype some worthless coins issued by itself, such as token. Some of them are even directly similar to the points of traditional websites, that is, a number stored in the database, which has nothing to do with blockchain technology. This is purely to trap people for money
precautions:
1. In the past two years, various myths about blockchain "overnight wealth" have been constantly staged, and "mining" cryptocurrency has become a new trend of wealth, and mobile phone mining is becoming more and more popular
2. There will be special mining machines for real mining. After all, every mining machine is not cheap now. Mobile phone automatic mining can be obtained at a very low price. What you dig is not bitcoin. Basically, the counterfeit coin you send is not worth money. At that time, you will still be cut leeks.
apart from BCH and BSV, most of the other bifurcated currencies have declined. BTC, BCH and BSV represent the exploration of three different directions respectively. BTC is the most conservative and cautious, BSV is the most radical, and BCH is relatively mild and graal. At present, BTC enjoys the name of bitcoin in fact and has the largest market value< br />
< At the end of 2013, vitalik buterin (V God), a gifted programmer born in 1994, published a white paper on ethereum, proposing the idea of adding various smart contracts to cryptocurrency, which can be used in social networking, trading, games and other fields. The market value of Ethereum has soared all the way, and it will soon be second only to bitcoin, Ethereum with smart contracts is also known as blockchain 2.0
in 2016, Ethereum encountered a serious hacker coin theft incident (DAO), and God V decided to delete the coin theft record by using rollback method. However, some people who insisted that the blockchain should not be tampered with opposed rollback, so Ethereum also split. Unlike bitcoin, the original Ethereum chain has become a minority, known as the Ethereum classic (etc), and the new chain that has been rolled back has become a majority, the de facto Ethereum (ETH)
stable currency system
stable currency is generally anchored legal currency, which can be used to exchange legal currency 1:1 to the issuer. The currency value is relatively stable, but sometimes there will be a small amount of premium in transactions, which is widely used in cryptocurrency transactions. Now the most common stable currency is the usdt issued by tether company, 1 usdt = 1 dollar. Stable currency is generally issued on other cryptocurrency networks, such as bitcoin Omni protocol, Ethereum erc20 protocol, etc< br />
in anonymous currency
on bitcoin, every transaction is clear and searchable, although we don't know who the person behind the address is. Some people think that the privacy of bitcoin is not enough, so some anonymous coins, such as XmR, dash and zcash, which can cover up user information, have emerged. Monroe coin uses ring signature technology, dasey coin adopts mixed coin technology, and big zero coin uses zero knowledge proof, which can play an anonymous effect in different degrees
platform currency system
some digital currency trading platforms often release their own platform currency, and there are certain discounts for trading with platform currency, such as okb of okex, HT of fire currency, BNB of coin security, etc<
some other mainstream currencies
lightcoin (LTC) has copied the code of bitcoin, replaced the consensus algorithm, and shortened the block out time. When bitcoin wants to upgrade, it often does experiments on bitcoin first. Lightcoin is known as "bitcoin, lightsilver"
XRP is currently the third largest currency in market value. It is an Internet transaction protocol, allowing users to transfer money around the world quickly and cheaply
grapefruit coin (EOS), known as blockchain 3.0 and Ethereum upgrade, attempts to introce more functions and application expansion on it
Edit
& 65532
"bitkangaroo" is the first digital currency financial service platform in the world that allocates theoretical revenue from its own mines and machines without power failure. The platform is mainly based on cloud computing procts, and the theoretical revenue is allocated by "1tash" of Wanyou computing power's professional mine, a strategic partner, on a regular basis every day, integrating high-yield, security, liquidity, transparency and professionalism
High Yield: the platform aims at "increasing users' assets", and customers can choose a variety of derivatives to prevent systemic risks
Security: the team stores the standby digital assets in the cold multi signature wallet, and in case of any accident, the reserve fund will be used to distribute revenue to customers
Liquidity: the platform allocates income every day, and can withdraw as soon as it reaches the minimum currency withdrawal standard
transparency: mine data and mine logs are open and transparent, and users can monitor the actual computing power of the mine at any time through the data center monitoring system
Professional: the mine is operated and managed by professional personnel who have been engaged in deep mining for many years. Each unit is isolated by professional network interruption to prevent virus invasion. Multiple standby networks are used in the computer room to eliminate non systematic risks in an all-round way
Software introction
iminer intelligent mining is a one click mining optimization tool launched by bitvf. It can support digethereum, ethereal classic, zero coin, braised pork, Monroe coin and other currencies. It also supports DCR and SC, and supports NVIDIA and AMD graphics cards. Improve the N card and a card mining calculation power, support miner monitoring
required tools: Click to download: Aiminer
Aiminer optimizes the mining algorithm for the underlying GPU graphics card, counts the computing power of each currency g by the hardware system, BIOS setting of a card, overclocking of GPU graphics card and other data, and makes an intelligent optimization mining setting. By default, the software provides mainstream mine pool and income query in various currencies
function introction
1. Support al mining currency
2. Support N card and a card
3. Support mining machine monitoring
4. Support Windows
5. Improve mining calculation power
6. One click mining
each cloud node in the interstellar meeting mine pool is an independent operating identity. We have 20000 nodes around the world, distributed in Tokyo, New York, Seoul and other international metropolises, as well as Beijing, Shanghai and other first tier cities. The whole layout is that interstellar will arrange, manage and operate the mine in a unified way, and supervise and disclose the operation of the mine openly and transparently. The configuration of each node is 4-core CPU, 4G memory, 4T hard disk, and 10-50 megabytes of dedicated broadband
if you own a part of the mine pool and some nodes, the whole income of the mine pool will be divided in proportion to the number of nodes you own. For example, you buy a cloud server on Alibaba cloud, and then you use the cloud server to mine. In fact, you don't need to buy a machine and a broadband. You only need to buy a one-year service of Alibaba cloud server. If you use this service to run mining, the profits will belong to you. Buying nodes to participate in the mine pool is the same as buying Alibaba cloud services
that is to say, IPFs interstellar cloud nodes are charged annually. If you buy a cloud node, you can enjoy the profit of one year's harvest of filecion. IPFs will charge a 10% to 15% commission. The IPFs interstellar super cloud node is the cost of 10 ordinary cloud nodes, and naturally enjoys 10 times the income of ordinary cloud nodes. In addition, super cloud nodes will enjoy more discounts.
because the network wide computing power required by this kind of token is not high, the probability of hash collision of the computing power of personal computer can find out the answer in a short time, so as to obtain block rewards. However, this kind of token generally has little value or high risk, so it is not of great significance< br />
extended data:
mining risk:
1. Electricity charge problem:
if the graphics card "mining" needs to be fully loaded for a long time, the power consumption will be quite high, and the electricity charge will be higher and higher. Many professional mines at home and abroad are operated in areas with extremely low electricity charges, such as hydropower stations, while more users can only mine at home or in ordinary mines, so the electricity charges are not cheap. Even in a certain residential area in Yunnan, there was a case of crazy mining, which led to a large area trip of the residential area, and the transformer was burned
2. Hardware expenditure:
mining is actually a competition of performance and equipment. Some mining machines are composed of more such graphics card arrays. With dozens or even hundreds of graphics cards, the cost of hardware and other costs is very high, and there is a considerable expenditure in mining
in addition to the display card burning machines, some ASIC (application specific integrated circuit) professional mining machines are also on the battlefield. ASIC is specially designed for hash operation, and the computing power is also quite strong. Moreover, because their power consumption is far lower than that of the display card, they are easier to form scale, and the electricity cost is also lower. It is very difficult to compete with these mining machines, This kind of machine costs more
3. Currency security:
the withdrawal of bitcoin requires hundreds of keys, and most people will record this long string of numbers on the computer, but the frequent problems such as hard disk damage will make the key permanently lost, which also leads to the loss of bitcoin
4. System risk:
system risk is very common in bitcoin, and the most common one is bifurcation. Bifurcation will lead to a drop in currency price and a sharp drop in mining income
however, many cases show that the forking will benefit the miners, and the forked competitive currency also needs the miners' computing power to complete the minting and trading process. In order to win more miners, the competitive currency will provide more block rewards and handling charges to attract miners. Risk makes miners.