Position: Home page » Equipment » Risk analysis of real name system in regional chain mining

Risk analysis of real name system in regional chain mining

Publish: 2021-05-03 13:11:20
1. One of the characteristics of blockchain projects (especially public chains) is open source. Through open source code, to improve the credibility of the project, so that more people can participate. But the open source code also makes it easier for attackers to attack blockchain system. In the past two years, there have been a number of hacker attacks. Recently, the anonymous currency verge (xvg) was attacked again. The attacker locked a vulnerability in the xvg code, which allowed malicious miners to add false timestamps on the block, and then quickly dig out new blocks. In a few hours, the attacker obtained nearly $1.75 million worth of digital currency. Although the subsequent attack was successfully stopped, no one can guarantee whether the attacker will attack again in the future
of course, blockchain developers can also take some measures
one is to use professional code audit services,
the other is to understand the security coding specifications and take preventive measures
the security of cryptographic algorithm
with the development of quantum computer, it will bring great security threat to the current cryptosystem. Blockchain mainly relies on elliptic curve public key encryption algorithm to generate digital signature for secure transactions. Currently, the most commonly used ECDSA, RSA, DSA, etc. can not withstand quantum attacks in theory, and there will be greater risks. More and more researchers begin to pay attention to cryptographic algorithms that can resist quantum attacks
of course, in addition to changing the algorithm, there is another way to improve the security:
refer to bitcoin's treatment of public key address to rece the potential risk of public key disclosure. As users, especially bitcoin users, the balance after each transaction is stored in a new address to ensure that the public key of the address where bitcoin funds are stored is not leaked
security of consensus mechanism
the current consensus mechanisms include proof of work (POW), proof of stake (POS), delegated proof of stake (dpos), practical Byzantine fault tolerance (pbft), etc
POW faces 51% attack. Because POW depends on computing power, when the attacker has the advantage of computing power, the probability of finding a new block will be greater than that of other nodes. At this time, the attacker has the ability to cancel the existing transaction. It should be noted that even in this case, the attacker can only modify his own transaction, but not the transaction of other users (the attacker does not have the private key of other users)
in POS, attackers can only attack successfully when they hold more than 51% of the token, which is more difficult than 51% of the computing power in pow
in pbft, when the malicious nodes are less than 1 / 3 of the total nodes, the system is secure. Generally speaking, any consensus mechanism has its own conditions. As an attacker, we also need to consider that once the attack is successful, the value of the system will return to zero. At this time, the attacker does not get any other valuable return except destruction
for the designers of blockchain projects, they should understand the advantages and disadvantages of each consensus mechanism, so as to select an appropriate consensus mechanism or design a new consensus mechanism according to the needs of the scene
security of smart contract
smart contract has the advantages of low operation cost and low risk of human intervention, but if there are problems in the design of smart contract, it may bring great losses. In June 2016, the Dao, the most popular funding project of Ethereum, was attacked. The hacker obtained more than 3.5 million Ethereum coins, which later led to the bifurcation of Ethereum into Eth and etc
there are two aspects of the proposed measures:
one is to audit the security of smart contracts, and the other is to follow the principles of smart contract security development
the security development principles of smart contract are: be prepared for possible errors to ensure that the code can correctly handle the bugs and vulnerabilities; Release smart contracts carefully, do well in function test and security test, and fully consider the boundary; Keep smart contracts simple; Pay attention to the threat intelligence of blockchain and check and update in time; Be clear about the characteristics of blockchain, such as calling external contracts carefully
security of digital wallet
there are three main security risks in digital wallet: first, design defects. At the end of 2014, a user lost hundreds of digital assets e to a serious random number problem (repeated r value). Second, the digital wallet contains malicious code. Third, the loss of assets caused by the loss or damage of computers and mobile phones
there are four main countermeasures:
one is to ensure the randomness of the private key
the second is to verify the hash value before software installation to ensure that the digital wallet software has not been tampered with
the third is to use cold wallets
the fourth is to back up the private key.
2.

The attachment of the complete works of online games is uploaded to the online disk and can be downloaded free of charge by clicking:
< file FSID = "1095422794" link = / share / link? Shareid = 3233324308 & UK = 2686728383 "name =" health = "0" / >

content preview:
online games are in dream
Author: the little prince of the earth
request
update time: 2012-4-27 19:21:51 words: 9
request for recommendation, Please click
description
update time: 2012-4-28 11:49:22 words: 76
I don't know what's going on. I've been banned forever. I asked the customer service and said there's no way to lift the ban! So, I'm sorry, I have something to say through this, and I have no way to return visit, but I have a collection, click to recommend, thank you
cover
update time 2012-5-2 15:21:35 words: 22
in the afternoon, I had nothing to do a cover, the first time to do it, very simple
nonsense
update time: 2012-6-3 12:08:48 words: 326
I don't know how many people are still reading my novel. First of all, thank the readers who are still reading it. Thank you! It's been more than a month since the novel was uploaded, and the result is not good, but it's much better than my last one, although most of the recommended votes are my own (here I despise myself first). I don't know how long I can hold on to this novel, but I will keep on writing it
for the latest update, because of the coming of graation season, the thesis and graation defense are very troublesome. And unfortunately, I was selected to participate in the hospital level defense, so now I have no defense, it will take a few days
and because I have been forbidden to speak forever, I can't speak in the book review area. Xinghan Yixuan is another name for me. I can only speak in this way. The book review area has been very quiet, for several days no one said the last sentence, which makes me very depressed, because no one is reading my novel? Even if you scold a few words is also good
apology
update time: June 12, 2012 20:39:08 words: 20
it's estimated that it's too late to update today

3. Usdt is a worthless virtual currency issued by swindlers, and fire coin network is opened by another group of swindlers, so you can't withdraw money to fire coin network.
4. The difference between DAG blockchain and traditional blockchain is that the latter requires miners to complete proof of work (POW) to execute each transaction, and DAG blockchain can get rid of the restriction of blockchain to complete such operation. On the contrary, in the DAG blockchain, one transaction is followed by another, which means that one transaction can provide proof for the next transaction, thus ranking all the time. The connection between these transactions is DAG, just like blocks provide their names to the whole blockchain through hash value

in the traditional blockchain, each transaction takes a lot of time, while for DAG blockchain, the transaction time will become negligible
5. Shell chain business to real name system, but also a real face, the risk is relatively large, face recognition or best not.
6.

The risk of real name authentication certainly exists. On the one hand, it is possible to disclose one's personal information. On the other hand, it is possible to steal one's property by illegal means in case of a black heart platform

however, in today's society, whether it is the Internet or outside the network, real name authentication has become a necessary requirement for travel business, whether it is travel ticket purchase, driving or staying in a hotel, it may also be handling any certificate, buying a house and so on, which are inseparable from personal real name information, and the society is graally developing into the direction of honest life and honest work

real name authentication is a double-edged sword, which has both advantages and disadvantages. Therefore, in the face of numerous online transactions, we should maintain our vigilance, and ensure that we fully understand the reputation of the platform before engaging in any platform transactions, so as to ensure the privacy and security of our identity information as far as possible

extended data

real name authentication helps to determine identity, let businesses and customers understand and communicate with each other, is concive to the development of online shopping mall, and avoids some criminals cheating consumers on the network

in the era of developed network marketing, real name authentication also brings hidden danger of information exposure, which leads to continuous marketing calls. For example, many instry communication websites require real name authentication, and there is demand when there is supply. Many marketing advertisers take advantage of the situation and use real name authentication member information for business activities, so we must be careful when choosing real name authentication

7. Hou Yaozhong, the eldest son of Hou Baolin, is a half brother of Hou Yaohua and Hou Yaowen. Before the cultural revolution, Hou Yao took part in amateur crosstalk performances in Beijing. Later, he worked as a literature and art soldier in Guangzhou Military Region. During the cultural revolution, he returned to Beijing and worked as a worker in a wireless power plant. After retiring, he returned to the performing arts circle, and his works include the TV series "city beauty" and so on
Chinese Name: Hou Yaozhong
Nationality: China
representative works: City beauty tour
father: Hou Baolin
brother: Hou Yaohua, Hou Yaowen
gender: male

see the Internet: http://ke..com/link?url=_ I7t6JJidkwsRcgCoXwf_ cMP4XO51ton8ffnrLFFv0SjpLa
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750