为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 比特币基础> 正文

区块链革命野日悠纪雄PDF

发布时间:2023-12-12-04:40:00 来源:网络 比特币基础 区块   PDF   纪雄

区块链革命野日悠纪雄PDF

区块链技术已经在当今的社会中发挥着重要的作用,它的革命性可以说是无与伦比的。本文将探讨三个与区块链革命相关的关键词,分别是去中心化,交易安全和智能合约。

去中心化是区块链技术的基本特征。它是一种分布式记账技术,可以让多个节点共同维护数据的完整性,而不需要中央服务器的参与。这种技术的优势在于,它可以抵抗攻击,因为攻击者需要同时攻击多个节点,以破坏数据的完整性,这是非常困难的。另外,去中心化还可以更有效地处理数据,因为它可以分散处理,而不需要一个中央服务器来处理所有的数据。

交易安全是区块链技术的另一个重要特征。由于区块链技术的去中心化特性,它可以提供更高的交易安全性。由于数据的分散性,任何一个节点的数据都不能被篡改,这样就可以确保交易的安全性。此外,区块链技术还可以提供可追溯性,即可以追溯每一笔交易的完整历史记录,从而提高交易的安全性。

智能合约是区块链技术的另一个重要特征。智能合约是一种可以在区块链上执行的自动执行程序,它可以根据定义的条件自动执行合约,无需任何人工干预。智能合约可以大大简化交易流程,减少交易成本,提高交易效率。此外,智能合约还可以提供更高的安全性,因为它可以根据定义的条件自动执行,而不需要任何人工干预。

以上就是有关区块链革命的三个关键词的介绍,即去中心化,交易安全和智能合约。这些技术的出现为社会带来了许多变革,可以让人们更安全、更有效地完成交易。


请查看相关英文文档

1. Blockchain principle

Blockchain is a technology, but it is not a single technology, but the result of the integration of multiple technologies, including Cryptography, mathematics, economics, network science, etc. You can think of it as a distributed shared accounting technology, or as a database, but this database is jointly maintained by all nodes on the chain, and each node has a ledger, because all nodes The ledgers are consistent, different nodes can trust each other, and there is no doubt about the data, so everyone says that the blockchain has technically achieved trust. For detailed professional technology, you can consult some professional technology companies. For example: Jinbo Technology, which focuses on developing blockchain-related products, has a professional R&D team and complete after-sales service. You can call for consultation.

2. What signals does the Blockchain 3.0 era give us?

2017 is the first year of the outbreak of blockchain, and 2018 will be the first year of the implementation of blockchain.

What kind of changes has the blockchain brought to the world from the 1.0 era to the 3.0 era?

The development of blockchain can be divided into three stages: peer-to-peer transactions, smart contracts and pan-blockchain application ecology (Token economy)

Blockchain 1.0 Era: Digital currency return rate is king

The 1.0 era now mostly refers to the digital currency era centered on Bitcoin. Digital currency transactions are the most important form for people to participate in the blockchain. At this stage, few people really pay attention to the application value of digital currency, let alone the practical value of the blockchain technology behind it. People focus on the rate of return of digital currency, which is equivalent to buying a stock on a different market, but this "stock" is relatively Active, the rate of return is astonishing, and of course it is also full of disasters.

Blockchain 2.0 era: smart contracts provide infrastructure support for upper-layer application development

The "smart contract" era is the real Programmable blockchain, usually represented by "Ethereum", supports Turing-complete scripting language at this stage, providing the necessary infrastructure for developers to develop any application on the "operating system" they set, realizing The actual application of virtual world has been implemented. The biggest contribution of Blockchain 2.0 is to completely subvert the concepts of traditional currency and payment through smart contracts. In the era of Blockchain 2.0, the blockchain has formed a trust foundation based on its traceability and non-tampering characteristics, providing a basis for smart contracts. A trustworthy execution environment makes it possible for contracts to be automated and intelligent. The biggest difference between smart contracts and traditional contracts is that they are not restricted by real social laws. For the contract subject to automatically execute the agreement after triggering the contract terms, the arbitration platform no longer determines the execution results in the smart contract but assumes responsibility. Responsibility for execution

Blockchain 3.0: The disruption to business lies in its transformation of production relations

We are now in the 2.0 era andAt the junction of the 3.0 era, the 3.0 era can be called people's ideal vision for the future virtual digital currency economy. In blockchain 3.0, people can truly realize assets on the chain and build them within a large underlying framework. A variety of applications create a platform with no trust costs, super transaction capabilities, and extremely low risks, which can be used to realize the increasingly automated distribution of physical resources and human assets around the world, and promote the fields of science, health, education, etc. large-scale collaboration.

Blockchain 2.0 builds infrastructure such as digital identity and smart contracts. On this basis, the complexity of the underlying technology is hidden, and application developers can focus more on application logic and business logic level. That is to say, we have entered the blockchain 3.0 era, and the symbol is the emergence of Token. Token is a value transmission carrier on the blockchain network, and can also be understood as a pass or token.

Token’s greatest impact on human society is its transformation of production relations. Joint-stock companies will be replaced, and every actual participant becomes the owner of productive capital. This new type of production relations encourages every participant to continuously contribute their own productivity, which is a great liberation of productivity. If this business activity is mapped to inflation in real society, as long as the former outperforms the latter, every Token holder will make a profit over time.

It is too early to talk about Blockchain 3.0. Although Blockchain has moved out of the conceptual stage, the current status of Blockchain technology development is that the underlying technology is still It is not mature enough and its applicable scenarios are relatively limited. On the one hand, there is still room for optimization and improvement in core blockchain technologies such as consensus algorithms; on the other hand, the processing efficiency of blockchain is still difficult to meet the requirements of some high-frequency application environments in reality. Moreover, the current mainstream blockchain technology platforms all originated from abroad. Domestic blockchain technology service providers must patiently start from the bottom development, achieve independent and controllable technology, and strive to lead the development of global blockchain technology. time period.

Competing among the heroes, the company that laughs last must be the company that really focuses on researching technology and developing practical applications! According to my observation, among the various applications based on Ethereum, the SEC social e-commerce chain has a very high chance of being implemented, and it is likely to become a killer application. There is a weekly report on the SECblock official account, which shows that the team is working hard.

3. One article to understand the Internet blockchain

One article to understand the Internet blockchain

One article to understand the Internet blockchain, you need to understand the blockchain , we have to study the brief history of blockchain technology development starting from the birth of the Internet, discover the motivations for the emergence of blockchain, and infer the future of blockchain. Let’s understand the Internet blockchain in one article.

Understand the Internet blockchain in one article 1

The originator of blockchain is hempWill, the earliest blockchain was invented by the Chinese! The blockchain is just like Mahjong, except that Mahjong has fewer blocks. Mahjong only has 136 blocks. The rules of Mahjong vary from place to place and can be regarded as a hard fork of Bitcoin.

As the oldest blockchain project, Mahjong has a team of four miners. The first one to dig out the 13 correct hash values ​​will get the accounting rights and rewards. It adopts the method of being willing to admit defeat and not cheating. Thousands of consensus mechanisms!

Mahjong is decentralized, everyone can be the banker, and it is completely peer-to-peer.

Mining pool = commission from the boss of the chess and card room.

It cannot be tampered with, because convincing the other three people requires too much computing power and physical strength.

A typical value Internet. The value in my pocket didn't last eight rounds before it went into their pockets.

The Chinese are basically good at playing mahjong. In terms of blockchain, they produce 70% to 80% of the world’s mining machines and have the most computing power in the world, accounting for about 77% of the computing power.

Mahjong is actually the earliest blockchain project:

1. A group of four miners. The miner who first collides with the correct hash value of 13 numbers can obtain the accounting rights. and get rewarded.

2. It cannot be tampered with. Because convincing the other three people requires too much computing power and physical strength.

3. Typical value Internet. The valuable digital currency www.gendan5.com/digitalcurrency/btc.html in my pocket ran into their pockets in less than eight rounds.

4. Decentralization, everyone can be a banker, it is completely peer-to-peer.

5. UTXO, unspent transaction expenses.

There is another blockchain method of credit, assuming that everyone has no cash

Let’s take a closer look. When everyone reaches a consensus, we see There is no intermediary or third party to judge C’s win, and the rewards given to C do not need to be transferred to C through a third party. They are all direct peer-to-peer transactions. This process is decentralized, and players (miners) record their own records. After recording the results of the first game, B Dahu drew thirteen pieces, and B drew Jia Dongfeng. After the record is completed, a complete block is generated, but remember, this is only the first game. In the entire blockchain , this is just one node. After the 8 rounds mentioned at the beginning, there are 8 nodes (blocks). The 8 blocks are connected together to form a complete ledger, which is the blockchain. Because everyone has one of this ledger, it is a distributed ledger. The purpose is to prevent someone from tampering with the record. At the end of the game, it is clear who wins and who loses.

Four men (A, B, C, and D) got together to play mahjong for money. None of them brought any cash, so they asked a beautiful woman (centralized) to keep a book and record who won how much money in each round. , Who lost how much? At the end of the day, everyone uses Alipay or WeChat payment to settle the general ledger., but if this beauty makes a mistake when accounting or is bribed by someone among the 4 people to make a mistake on purpose, there is no guarantee that the result of this game will be fair, fair and reasonable, don’t you think? then what should we do? If you "play mahjong", you can use "blockchain" as the game rules and adapt it as follows:

Four men (A, B, C and D) got together to play mahjong for money. No one brought any cash. B said Let the beauty she brought keep accounts. A said that none of us knew this beauty, so the four of them, A, B, C, and D, agreed that everyone would keep accounts at the same time (decentralized) on their mobile phones (blockchain nodes) for each game. ), after finally playing mahjong and paying with electronic money directly on the mobile phone, everyone checked the accounting results. The accounting results should have been the same.

Assume that the original result is the account recorded on A’s mobile phone: B owes A 10 yuan. However, the record on B's mobile phone shows that there is no debt, but the other two people (C and D) have the same accounting as A, so the settlement is still based on the majority rule. In addition, everyone has a bad impression of B's ​​integrity. Next The first time I play mahjong, I won’t take B to play with me.

Unless B bribes two people (C and D) in advance to deliberately cheat, but the cost of B bribes them is 100,000 yuan (10,000 times the default of 10 yuan), then in common sense, B only You can choose to give up because the cost of counterfeiting is too high.

Assume that even if B is secretly willing to pay a high price of 100,000 yuan to buy C and D to do this silly cat transaction with huge losses during the card game, the rules of the blockchain are to keep accounts based on timestamps. Yes, it turns out that B owed A 10 yuan when debiting the account at 1 p.m., that is, when C and D changed the account at 3 p.m., time is irreversible and they can only record 3 p.m., which does not comply with the rules of the game. .

In fact, in 2017 the blogger has developed a set of Mahjong coins

China’s earliest blockchain project: a group of four miners, first starting from 148 random numbers The miner who collides with the correct hash value of 14 numbers can obtain an accounting right incentive. Since distributed accounting requires the consensus of several other miners, each accounting transaction takes about ten minutes.

Understanding the Internet Blockchain in One Article 2

1. Before the birth of Bitcoin, 5 Internet technologies that will have a significant impact on the future of the blockchain

In 1969, the Internet was born in the United States. Since then, the Internet has expanded from four research institutions in the United States to the entire planet. In terms of application, it has expanded from the earliest military and scientific research to all aspects of human life. In the nearly 50 years since the birth of the Internet, five technologies have been of particularly great significance to the future development of blockchain.

1. The TCP/IP protocol born in 1974: determines the position of blockchain in the Internet technology ecosystem

In 1974, the most critical step in the development of the Internet was taken by The TCP/IP protocol, the core communication technology of the Internet jointly developed by American scientists Vinton Cerf and Robert Kahn, was officially launched.

This protocol enables the transmission of information between different computers and even different types of networks. All computers connected to the network can communicate and interact as long as they comply with this protocol.

In layman's terms, Internet data can travel tens of thousands of kilometers to reach the computer users who need it. This is mainly because the Internet world has formed a unified information dissemination mechanism. That is to say, Internet devices follow a unified law-TCP/IP protocol when disseminating information.

Understanding the TCP/IP protocol is of great significance to mastering the Internet and blockchain. After the invention of TCP/IP in 1974, the entire Internet was between the underlying hardware devices, the intermediate network protocols and the network Addresses have always been relatively stable, but an endless stream of innovative applications are emerging at the top application layer, including news, e-commerce, social networks, QQ, WeChat, and blockchain technology.

In other words, in the technical ecology of the Internet, blockchain is a new technology at the top layer of the Internet - the application layer. Its emergence, operation and development have not affected the underlying infrastructure and communication protocols of the Internet. , is still one of the many software technologies that operates according to the TCP/IP protocol.

2. Cisco router technology born in 1984: an imitation of blockchain technology

In December 1984, Cisco was established in the United States. The founder was a professor from Stanford University. A couple, Leonard Posak, director of the computer center, and Sandy Lerner, director of the business school's computer center, designed a networking device called a "multiprotocol router" that was placed on the Internet's communication lines to help data Get from one end of the Internet to the other thousands of kilometers away accurately and quickly.

In the entire Internet hardware layer, tens of millions of routers are busy working, directing the transmission of Internet information. An important function of Cisco routers is that each router saves a complete Internet device address table. Once something happens Changes will be synchronized to tens of millions of other routers (theoretically), ensuring that each router can calculate the shortest and fastest path.

When you see the operation process of the router, you will feel very familiar. That is the important feature of the blockchain later. The significance of understanding the router lies in the important features of the blockchain. It has been implemented on the router in 1984. For the router, even if the node device is damaged or attacked by hackers, it will not affect the transmission of the entire Internet information.

3. The B/S (C/S) architecture that was born with the World Wide Web: the opponent of the blockchain and the target of attempted subversion

The World Wide Web is referred to as the Web and is divided into Web clients and server. All updated information is only modified on the Web server. Thousands, tens of thousands, or even tens of millions of other client computers do not retain the information and only obtain the information data when accessing the server. This structure is also often referred to as the Internet B/S architecture, that is, centralized architecture. This architecture is also the most important architecture of the current Internet. Internet giants such as Google, Facebook, Tencent, Alibaba, and Amazon have all adopted this architecture.

Understanding the B/S architecture will be of great significance to the subsequent understanding of blockchain technology. The B/S architecture is that data is only stored in the central server, and all other computers obtain information from the server. Blockchain technology has tens of millions of computers without a center, and all data will be synchronized to all computers. This is the core of blockchain technology.

4. Peer-to-Peer Network (P2P): Blockchain The father of the chain and its technical basis

Peer-to-peer network P2P is another Internet infrastructure corresponding to C/S (B/S). Its characteristic is that multiple computers connected to each other are connected to each other. In a peer-to-peer position, there is no distinction between master and slave. A computer can be used as a server, setting shared resources for use by other computers in the network, and as a workstation.

Napster is one of the earliest P2P systems, mainly used for music resource sharing. Napster cannot be regarded as a true peer-to-peer network system. On March 14, 2000, a message was posted on the Slashdot mailing list of the underground hacker site in the United States, saying that AOL's Nullsoft department had released Gnutella, an open source Napster clone software.

In the Gnutella distributed peer-to-peer network model, each networked computer is functionally peer, serving as both a client and a server, so Gnutella is called the first true peer-to-peer network model. Network Architecture.

In the past 20 years, some Internet technology giants such as Microsoft and IBM, as well as liberals, hackers, and even criminals who infringe intellectual property rights, have continued to promote the development of peer-to-peer networks. Of course, those on the Internet want to strengthen information sharing. The idealists also put a lot of enthusiasm into peer-to-peer networks. Blockchain is a software application based on a peer-to-peer network architecture. It is a benchmark application for peer-to-peer networks trying to break out from the silence of the past.

5. Hash algorithm: the key to generating Bitcoin and tokens (tokens)

The hash algorithm converts numbers of any length into fixed-length values ​​using a hash function. Algorithms, famous hash functions such as: MD4, MD5, SHS, etc. It is a member of the family of cryptographic functions defined by the American National Institute of Standards and Technology.

This family of algorithms is crucial to the functioning of the entire world. From Internet application stores, emails, anti-virus software, to browsers, etc., all of them are using secure hashing algorithms. It can determine whether Internet users have downloaded what they want, and it can also determine whether Internet users are involved in man-in-the-middle attacks or network attacks. Victim of a phishing attack.

The process of blockchain and its application to generate new coins from Bitcoin or other virtual currencies is to use the function of the hash algorithm to calculate and obtain the format that meets the requirements.number, and then the blockchain program gives a reward of Bitcoins.

Mining, including Bitcoin and tokens, is actually a small mathematical game built with a hash algorithm. However, because of the fierce competition, people all over the world used powerful servers to perform calculations in order to get the rewards first. As a result, many computers on the Internet participated in this little mathematical game, which even consumed more than 40% of the electricity in some countries.

2. The birth and technical core of blockchain

The birth of blockchain should be the most unusual and mysterious invention and technology in the history of human science, because apart from blockchain, So far, there is no major invention in the history of modern science whose inventor cannot be found.

On October 31, 2008, Bitcoin founder Satoshi Nakamoto (pseudonym) published a paper on the cryptography mailing group - "Bitcoin: A Peer-to-Peer Electronic Cash System". In this paper, the author claims to have invented a new electronic currency system that is not controlled by governments or institutions. Blockchain technology is the basis for supporting the operation of Bitcoin.

The preprint address of the paper is at http://www.bitcoin.org/bitcoin.pdf. From an academic point of view, this paper is far from a qualified paper. The main body of the article is composed of 8 flow charts. It is composed of corresponding explanatory text, no nouns and terms are defined, and the format of the paper is also very irregular.

In January 2009, Satoshi Nakamoto released an application case of blockchain on the SourceForge website - the open source software of the Bitcoin system. After the release of the open source software, it is said that Satoshi Nakamoto mined approximately 1 million bits. Coin. A week later, Satoshi Nakamoto sent 10 Bitcoins to cryptography expert Hal Finney, which became the first transaction in Bitcoin history. With the booming development of Bitcoin, research on blockchain technology has also begun to show explosive growth.

It is indeed difficult to explain the blockchain to the public completely and clearly. We use Bitcoin as the object to introduce the technical characteristics of the blockchain as simply as possible but in depth.

1. Blockchain is a peer-to-peer network (P2P) software application

As we mentioned before, at the beginning of the 21st century, the Internet formed two major types of applications. Architecture, centralized B/S architecture and non-centered peer-to-peer (P2P) architecture. Many Internet giants such as Alibaba, Sina, Amazon, etc. all have centralized B/S architecture. Simply put, it is data Put it in a giant server, and our ordinary users can access the servers of Alibaba, Sina and other websites through mobile phones and personal computers.

Since the beginning of the 21st century, there have been many software applications for freely sharing music, videos, and paper materials. Most of them use a peer-to-peer network (P2P) architecture, that is, there is no central server, everyone's personal computer They are all servers and clients, with equal status. However, this type of application has not been popularIn practice, the main reasons are large resource consumption, intellectual copyright issues, etc. Blockchain is a software application in this field.

2. Blockchain is a peer-to-peer network (P2P) software application that synchronizes information across the entire network

Peer-to-peer networks also have many application methods. In many cases, everyone is not required to Each computer keeps the same information. Everyone only stores the information they need, and downloads it to other computers when needed.

However, in order to support Bitcoin financial transactions, the blockchain requires that every transaction that occurs must be written into historical transaction records and change information be sent to all computers with Bitcoin programs installed. Every computer with Bitcoin software installed maintains the latest and complete Bitcoin historical transaction information.

The characteristics of blockchain's network-wide synchronization and network-wide backup are often referred to as blockchain information security, and the source cannot be changed. Although it is still not absolutely safe in practice, when the number of users is very large, it does have certain security advantages in preventing information tampering.

3. Blockchain is a peer-to-peer (P2P) software application that uses a hash algorithm to generate "tokens" to synchronize information across the entire network

Area The first application of blockchain is the famous Bitcoin. When discussing Bitcoin, a term that is often mentioned is "mining". So what exactly is mining?

The metaphor is that the blockchain program gives the miners (players) 256 coins, numbered 1, 2, 3...256. Every time a Hash operation is performed, it is like tossing a coin. 256 coins are thrown at the same time. After landing, if all the coins with the first 70 numbers happen to be heads. The miner can tell the blockchain program this number, and the blockchain will reward the miner with 50 Bitcoins.

From the perspective of software programs, Bitcoin mining is a mathematical game built using the hash SHA256 function. The blockchain first stipulates a winning mode in this small game: a 256-bit hash number is given, but the last 70 bits of the hash number are all 0, and then the player (miner) continuously enters various numbers. Give the hash SHA256 function and see if you can use this function to get a number with 70 zeros. If you find one, the blockchain program will reward the player with 50 Bitcoins. Actual mining and rewards are more complex, but the above example expresses the core process of mining and obtaining Bitcoin.

When Bitcoin was born in 2009, each bounty was 50 Bitcoins. Ten minutes after its birth, the first batch of 50 Bitcoins was generated, and the total currency amount at this time was 50. Subsequently, Bitcoin increased at a rate of about 50 every 10 minutes. When the total amount reaches 10.5 million (50% of 21 million), the bounty is halved to 25. When the total amount reaches 15.75 million (new output is 5.25 million, which is 50% of 1050), the bounty is further halved to 12.5. According to the design of the Bitcoin program, BitcoinThe total is 21 million.

From the above introduction, Bitcoin can be seen as a guessing game based on a peer-to-peer network architecture. The Bitcoin information rewarded for each correct guess will be transmitted to all players and recorded. into each player's history database.

4. Smart contracts, tokens, ICOs and blockchain basic platforms generated by blockchain technology due to the rise of Bitcoin

From the above introduction, Bitcoin technology It is not a new technology falling from the sky, but a clever combination of various original Internet technologies, such as peer-to-peer network architecture, network-wide synchronization of routing, and network security encryption technology. It can be regarded as a combination of innovative algorithm games. .

Because Bitcoin can be exchanged for legal currency, purchased in kind, and made huge profits through appreciation, the whole world is not calm. With the attitude that if you can do it, I can do it, many people have created their own imitation Bitcoin software applications. At the same time, taking advantage of the difficulty for the government to regulate peer-to-peer networks, various altcoins exploded together with Bitcoin. There have been many incidents of fraud and absconding, which have gradually attracted the attention of governments around the world.

Blockchain basic platform: It is still quite technically difficult to create currency using the blockchain technology framework. At this time, basic technology platforms such as Ethereum, the blockchain basic platform, have emerged, making it convenient for ordinary people. Create a "Bitcoin"-like software program, each showing its magical powers, inviting people to join the game to mine coins, speculate on coins, and gain profits from it.

Pass or token: If each "Bitcoin" or "Altcoin" uses a hash algorithm to create a guessing game and generates its own "currency", this "currency" is collectively referred to as " "Certificate" or "Token".

ICO: Since Bitcoin and Ethereum have been exchanged with the legal currencies of various countries, when other new virtual currencies are issued, only Bitcoin and Ethereum are allowed to purchase the new issued coins. This process of issuing coins It’s called ICO. The emergence of ICO has amplified the transaction volume of Bitcoin and Ethereum. At the same time, many ICO projects are completely based on nihilistic projects, resulting in a large number of frequent fraud cases. This further deepens society’s negative understanding of virtual currencies generated by blockchain.

Smart contract: It can be seen as a software function on the blockchain. It is a program that assists various virtual currency transactions on the blockchain. The specific function is like the fund custody of Alipay on Taobao. When a user receives goods and confirms them on Alipay, the funds are automatically paid to the buyer and owner. Smart contracts also assume this intermediary payment function in blockchain applications such as Bitcoin.

3. The historical status and future prospects of blockchain technology in the Internet

1. Where does blockchain stand in Internet technology? It is a new software and architecture at the top level.

We mentioned in the previous introduction to TCP/IP that blockchain, like browsers, QQ, WeChat, online game software, mobile APPs, etc., is a software form of the top layer of the Internet - the application layer. . itsOperation still relies on the TCP/IP architecture to transmit data. But unlike most application layer software, it does not adopt the central software architecture of C/S (B/S). Instead, an unusual peer-to-peer network architecture is adopted. From this point of view, blockchain cannot subvert the Internet infrastructure.

2. Who does blockchain want to subvert? Want to subvert the B/S (C/S) structure of the World Wide Web.

It attempts to subvert the B/S, C/S structure of the World Wide Web, which was born in 1989. Said before. Since 1989, European physicist Tim Berners-Lee invented the World Wide Web and gave up applying for a patent. In the past nearly 30 years, companies including Google, Amazon, Facebook, Alibaba, Internet, Tencent and other companies have used the B/S (C/S) structure of the World Wide Web to grow into Internet giants.

In their headquarters, a powerful central server cluster was established to store massive amounts of data. Hundreds of millions of users obtained the data they needed from the giant servers. This also led to the emergence of cloud computing, and then the Internet giants Open up your unused central server resources to further absorb data from enterprises, governments, and individuals. Centralized Internet giants have an increasing influence on the world, countries, and Internet users.

The goal of blockchain is to try to reduce the influence of Internet giants by distributing data to each Internet user’s computer. It can be seen that the real opponent of blockchain and what it wants to subvert is the 1990 The B/S (C/S) structure born in 2007. But whether it can be subverted depends on its technical advantages and bottlenecks.

3. Technical flaws of blockchain: dilemmas caused by the pursuit of complete equality and freedom

The technical flaws of blockchain first come from its peer-to-peer network architecture. For example For example, Taobao currently has a B/S structure, and massive data is stored in the Taobao server cluster computer room. Hundreds of millions of consumers access the Taobao server website through their browsers to obtain the latest information and historical information.

If blockchain technology is used, hundreds of millions of people will retain a complete Taobao database on their personal computers or mobile phones. Every time a transaction occurs, it will be synchronized to hundreds of millions of other users. This is completely unachievable in reality. The amount of data transferred and stored is too large. It is equivalent to setting up and running hundreds of millions of Taobao websites at the same time.

Therefore, blockchain cannot be applied to projects with large amounts of data, and even smaller website projects will have difficulty using blockchain. By 2018, Bitcoin had been running for nearly 10 years, and the accumulated transaction data had brought the entire system to collapse.

So the blockchain has adopted many alternative methods, such as establishing relay nodes and lightning nodes. These two concepts can also make people confused. In layman’s terms, the blockchain will ask it for The subversive object B/S structure has been studied, and a data server center has been established to become the relay node of the blockchain, which can also be accessed with a browser-like terminal. This is the lightning node of the blockchain.

This change canAlleviates the technical shortcomings of blockchain, but does make blockchain what it opposes, centralization. It can be seen that pure blockchain technology has major flaws due to its technical characteristics and cannot be widely used like the World Wide Web. If the technology is upgraded and some parts adopt a B/S (C/S) structure, the blockchain will become centralized. The information node no longer maintains the dream when it was born.

4. Looking at the future prospects of blockchain from the Internet brain model

We know that the Internet generally refers to the Internet that connects computer networks around the world. On this basis The development of a global Internet network covering the whole world is called the Internet, which is a network structure that is interconnected.

Since the birth of the Internet in 1969, humans have innovated in the Internet field from different directions, and there is no unified plan to build the Internet into a structure. When the wheel of time reaches 2017, with the advent of artificial intelligence, With the vigorous development of science and technology such as the Internet of Things, big data, cloud computing, robots, virtual reality, and the industrial Internet, when humans look up to see the giant systems they have created, the model and architecture of the Internet brain have become increasingly clear.

Through nearly 20 years of development, relying on the B/S and C/S structures of the World Wide Web, Tencent QQ, WeChat, Facebook, Weibo, and Twitter Amazon have developed structures similar to neuron networks. Internet devices, especially personal computers and mobile phones, map personal data and functional space on the giant's central server through the software on the device, allowing them to add friends, communicate and transfer information. Internet giants continue to optimize the software versions of hundreds of millions of terminals through software upgrades in central server clusters. In the neurological system, this is a standard central nervous system structure.

The birth of the blockchain provides another neuron model. Instead of uniformly managing neurons in the centralized services of giants, each terminal, including personal computers and personal mobile phones, becomes an independent neuron node. , retaining an independent data space and synchronizing mutual information. In the neurological system, this is a distributed neural structure with no center and multiple neural nodes.

Interestingly, these two different types of neural structures appear in the development of the nervous system. In lower organisms, blockchain-like neural structures have appeared. There are multiple ganglia with the same functions, all of which can command body activities and reactions. However, as organisms evolve, these ganglia gradually merge. When they evolve into higher In biology, the central nervous system appeared, which contains a large number of neurons that interact with each other.

4. Judgment on the future status of blockchain in the Internet

1. Understanding of Bitcoin: a guessing game based on peer-to-peer network architecture (P2P), Through clever financial and public opinion operations, it has become a "world currency" that is not subject to government supervision.

2. Understanding of the blockchain: a peer-to-peer network-wide information synchronization that uses a hash algorithm to generate "tokens"Network (P2P) software applications.

3. Blockchain has specific uses, such as large-scale election voting, large-scale gambling, financial transactions that circumvent government financial supervision, etc. It still has irreplaceable uses.

4. In more cases, blockchain technology will rely on the B/S and C/S structures of the Internet to achieve functional expansion, but overall it is still a supplement to the existing technology of the Internet. Most of the application scenarios currently envisaged by blockchain can be implemented using B/S and C/S structures, with higher efficiency and more mature technology.

5. Whether from the perspective of information transmission efficiency and resource consumption, or from the evolution of the nervous system, blockchain cannot become the mainstream architecture of the Internet, let alone a subversive and revolutionary leader of the future Internet.

6. Of course, Internet giants developed with B/S and C/S structures also have their problems, but these can be gradually solved through commercial and political methods in the future.

4. "The Post-Google Era: The Decline of Big Data and the Rise of the Blockchain Economy" pdf download and read online, please ask for Baidu Netdisk cloud resources

"The Post-Google Era: The Decline of Big Data and the Rise of the Blockchain Economy" The Decline of Data and the Rise of the Blockchain Economy" (George Gilder) E-book network disk download for free online reading

Link: https://pan..com/s/1h1eg5QQrnS7suTCfWBS9FQ

< /p> Password: kswx

Book title: The Post-Google Era: The Decline of Big Data and the Rise of the Blockchain Economy

Author: George Gilder

Douban score: 6.4

Publisher: Modern Publishing House

Publishing year: 2018-9-5

Number of pages: 304

Content introduction:

The Google era (information Internet era) based on big data and machine intelligence is an awe-inspiring era. But it's coming to an end.

George Gilder, the author of "The Post-Google Era", is a visionary and wise man. He has unparalleled vision and insights in technology and culture. He describes to readers the crisis of trust and security facing Google, and bravely predicts the coming post-Google era.

Google has captivated the world with its amazing “search and sort” capabilities. The powerful search engine and seemingly free small applications, such as videos, maps, email, etc., make many users unable to stop. But a system without price competition will stifle entrepreneurship and eventually turn the Internet into an advertising wasteland.

The lack of trust and security is Google's fatal weakness, and the current computer and network system cannot solve this crisis. If value and security are not part of the information technology architecture, then the architecture must be replaced.

A free economy based on advertising revenue and the safe use of citizens’ privacy willGive way to systems based on privacy and security. “Cryptozoological systems”—the new architecture of blockchain and its derivatives—are the future of mankind. Blockchain architectures such as Bitcoin, Ethereum, and Block Heap will create a safe and valuable new Internet.

The Internet, which has long been controlled by a few giants, is facing a "big dismantling". This will decentralize the power of computers and commerce, and ultimately reshape the entire economy and the Internet.

About the author:

George Gilder is a visionary and wise man with unparalleled vision and insights in the fields of technology and culture. In the 1980s, he was a representative figure of supply-side economics. His book "Wealth and Poverty", which advocates "reducing taxes and increasing fiscal revenue," sold 1 million copies. Known as the "Reagan Reform Bible", it also had a great impact on China.

In the 1990s, he became an advocate of the Internet and the new economy. In "Communication Revolution", he elaborated on the idea of ​​​​from the "microcosm" of each personal computer to the "remote universe" woven by the interconnection of countless personal computers, which not only gave birth to today's Google, the Internet, Facebook, etc. The large central Internet giant has also completed the overall system construction of Gilder as a futurist.

In his new work "The Post-Google Era", he clearly points out that today's centralized Internet will be iterated by the decentralized Internet represented by blockchain. The world of the future will be different from what you imagined.

5. I need "Bubble Economics" (Yukio Noguchi). But this book is no longer available on the Internet. Where can I buy it?

Bubble Economics - Translation Series of Japanese Classics on Economics
Title of Series: Translation Series of Japanese Classics on Economics> Recommend to friends
Author: (Japanese) Yuki Noguchi, translated and edited by Jin Hongyun, translated by Zeng Yinchu
Publisher: Life. Reading. New Knowledge Sanlian Bookstore
Publishing time: 2005-3-1 Number of words: 160000 Edition: 1 Number of pages: 205 Printing time: 2005-3-1 Format: Number of prints: Paper: Offset paper I S B N: 9787108022486 Packaging: Paperback Category: Books >> Economics >> Economic Theory >> Other Economics Learning theory
Pricing: ¥14.50 Dangdang price: ¥10.88 Discount: 25% off Savings: ¥3.62

There are 0 customer reviews View summary of reviews

Introduction< br />This book consists of the following nine chapters.
Chapter 1 is the introduction and an overview of the whole book. In Chapter 2, we elaborate on the economic theory of asset prices and bubbles, explain the concept of bubbles, and analyze why bubbles are a problem. existIn Chapter 3, we review several bubble events in history and our thoughts on the history of bubbles. Chapters 2 and 3 are general discussions of bubble issues.
In the following chapters, we focus on the Japanese economy after the late 1980s. Chapter 4 analyzes the expansion process of bubbles. Chapter 5 analyzes the changes in capital circulation, land transactions and macroeconomic policies behind the surge in asset prices. In Chapter 6, we outline and evaluate Japan’s bubble response policies, especially its land policy. In Chapter 7, we analyze the collapse process of the bubble and its impact on the financial system. In Chapter 8, we discuss the impact of asset price changes on the real economy. In Chapter 9, we look forward to the Japanese economy after the bubble, discuss the countermeasures we must take to prevent the recurrence of bubbles, and reveal the long-term issues facing Japan's economic development.

About the author
Yukio Noguchi graduated from Tokyo San University School of Applied Physics in 1963 and later worked in the Ministry of Finance of Japan. He went to the United States to study in 1968, received a master's degree in economics from the University of California, Los Angeles, in 1969, and a doctorate in economics from Yale University in 1972. After returning to Japan, he successively served as associate professor and professor at the Department of Economics of Hashimoto University, professor at the University of Tokyo, director of the Economic Engineering Research Center of the University of Tokyo, and professor at the Department of International Management at Aoyama Gakuin University. He is currently the director of the Noguchi Economic Research Institute in Japan and a visiting professor at Stanford University in the United States. His main research fields are public economics and Japanese economic theory. His publications include: "The Structure of Fiscal Crisis", "Public Economics", "Long-term Strategy of Japanese Finance", "Conception of Tax Reform", "Land Economics" and other academic publications. book. He has won book awards such as the Nikkei Economic Book and Culture Award, the Mainichi Shimbun Economist Award, and the Chuo Koron Yoshino Sakuzo Award. Beginning with the publication of "Super" Sorting Methods" in 1993, the "Super" series of works published one after another became a best-seller in Japan, making him a famous best-selling author outside the academic field.

The Dangdang website address of this book: http://proct.dangdang.com/proct.aspx?proct_id=8979733

6. The main works of Yukio Noguchi

"Information Economic Theory" (Toyo Keizai Shinpo Co., Ltd., 1974, Nikkei Book Culture Award), "The Structure of Fiscal Crisis" (Toyo Keizai Shinpo Co., Ltd., 1980, Suntory Academic Award), "Land Economy" "Study" (Nihon Keizai Shimbun, 1989, Real Estate Society Award), "Bubble Economics" (Nihon Keizai Shimbun, 1992, Yoshino Sakuzo Award), "Postwar Japanese Economic History" (Shinchosha, 2008), etc.

7. "Hangzhou Blockchain Industry Report 2018" pdf download to read the full text online, seek Baidu network disk cloud resources

"Hangzhou 2018 City Blockchain Industry Report》NetworkNetdisk pdf latest full set download:
Link: https://pan..com/s/10pDxblhmqUhQ4y3JNBDeSw?pwd=rzy8 Extraction code: rzy8
Introduction: To understand the technological innovation of the blockchain industry in Hangzhou and application implementation status to promote the development of the blockchain industry in Hangzhou. Under the guidance of the leadership of the Finance Office, the Hangzhou Blockchain Technology and Application Federation organized the Shuqin Technology Blockchain Research Institute to jointly launch the "2018 Hangzhou Blockchain The writing work of Chain Industry Report.

In order to fully understand the situation, Hangzhou Blockchain Technology and Application Federation formed a special research team on May 28, 2018. After spending three months conducting research on nearly 30 blockchain companies in Hangzhou (nearly 20 of which were field surveys), the team mastered a large amount of first-hand information. After more than two months of writing and repeated revisions, the report was finally completed in early November.

8. The collective surge in blockchain concept stocks is a pie or a trap

The IT industry has been constantly hyping the concept! It’s actually not that magical! Of course, those who can swindle money in China are good comrades.

9. "In-depth exploration of blockchain: Hyperledger technology and applications" pdf download and online reading, please ask for Baidu network disk cloud resources

"In-depth exploration of blockchain: Hyperledger technology and applications" 》(Zhang Zengjun) E-book network disk download for free online reading

Resource link:

Link:

Extraction code: swv1

Book Name: Deep Exploration of Blockchain: Hyperledger Technology and Application

Author: Zhang Zengjun

Douban Rating: 6.0

Publisher: Machinery Industry Press

Publication year: 2018-2-1

Number of pages: 308

Content introduction:

This book is led by Brian Behlendorf, executive director of Hyperledger Recommended, written by the blockchain first-line implementation practice team and the Hyperleger member smart chain backbone team. In-depth explanation of the architecture, execution logic, core function implementation, and zero-deployment of Hyperledger Fabric 1.0. Taking ticket cases as examples to explain specific development practices, interspersed with best practices required for development and solutions to problems encountered.

This book is divided into three parts, with a total of 12 chapters.

The preparation chapter (Chapter 1~2), a highly condensed and informative Chapter 1, reveals the value, core concepts, evolution, mainstream platforms, and commercial scenarios of blockchain. Chapter 2 enters the practical phase, covering installation, deployment and debugging, allowing readers to initially intuitively experience the blockchain and cultivate their interest in learning and practice.

Core chapter (Chapter 3~9), starting with the Fabric1.0 architectureThe explanation makes it easier for readers to understand the overall structure and operation logic, and read with questions and outlines to get twice the result with half the effort. Chapters 4 to 9 explain the internal implementation mechanism. This article does not stop there, but goes deep into the underlying implementation principles, allowing readers to thoroughly understand the design and implementation details of Fabric. This article is the key to understanding the design and implementation of blockchain. It is also the basis for future application development. If you have problems, you can solve them yourself.

Covering the following aspects:

Overview of blockchain architecture, component relationships and operating mechanisms;

Gossip protocol and P2P data distribution mechanism;

Storage technology related to distributed ledger data;

Consensus mechanism and its pluggable architecture design;

How to achieve multi-chain and multi-channel data isolation;< /p>

Implementation and use of member management services based on digital certificates;

Smart contract implementation, interaction, and finite state machines.

Application (Chapter 10~12), from the perspective of installation and deployment, development model and application development, a case of bill endorsement is used to explain how to develop blockchain applications based on Hyperledger Fabric 1.0 to fully grasp Blockchain application development, hands-on practical projects.

About the author:

Zhang Zengjun is the technical director and architect of ChainNova. With more than ten years of experience in software development and project management, he has designed and implemented multiple blockchain projects, and led the team to win the only non-financial best case award at the "2017 Trusted Blockchain Summit". A member of the Trusted Blockchain Expert Committee of the China Academy of Information and Communications Technology, he participated in discussions and promoted the formulation of trusted blockchain testing standards. He has been invited to universities and enterprises many times to share and promote the implementation of blockchain. Formerly the PDT manager of NSFOCUS Technology, he led the team to develop the Remote Security Assessment System (RSAS), which has ranked first in China for many years and is widely used in many key fields. Currently focusing on areas such as blockchain, network security, big data, cloud computing and artificial intelligence.

Dong Ning is the CEO of ChainNova Technology Company and the director of the Financial Technology Research Center of the New Generation Information Technology Research Institute of Peking University (Tianjin Binhai). He once served as the head of IT Economics for IBM Greater China, participated in the design and construction of core systems for several commercial banks and financial institutions, and has many years of business insights in the financial industry. Graduated from the Department of Intelligent Science, School of Information Science and Technology, Peking University.

Zhu Xuantong holds a master's degree from Tsinghua University and is a doctoral candidate at the Institute of Quantitative Economics and Technical Economics, Chinese Academy of Social Sciences, focusing on technical economic research. Has extensive working experience in government and international organizations.

Chen Jianxiong is the chief scientist of ChainNova, former VP of Kingsoft Cloud Technology, and holds a master's degree from the School of Computing and Communication Engineering, Chinese Academy of Sciences. Many years of experience in large-scale cluster system research and development, and participated in the design and application of multiple blockchain core systems.

10. What is blockchain technology blockchainWhat exactly is a blockchain?

In a narrow sense, a blockchain is a chain data structure that combines data blocks in a sequential manner in chronological order, and uses a password to An untamperable and unforgeable distributed ledger guaranteed by learning methods.

Broadly speaking, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, and uses cryptography to ensure data transmission and access. It is a new distributed infrastructure and computing method that uses smart contracts composed of automated script codes to program and operate data securely.

[Infrastructure]

Generally speaking, the blockchain system consists of data layer, network layer, consensus layer, incentive layer, contract layer and application layer composition. Among them, the data layer encapsulates the underlying data blocks and related basic data and algorithms such as data encryption and timestamps; the network layer includes distributed networking mechanisms, data dissemination mechanisms and data verification mechanisms; the consensus layer mainly encapsulates network nodes Various consensus algorithms; the incentive layer integrates economic factors into the blockchain technology system, mainly including the issuance mechanism and distribution mechanism of economic incentives; the contract layer mainly encapsulates various scripts, algorithms and smart contracts, and is the core of the blockchain The basis of programmable features; the application layer encapsulates various application scenarios and cases of the blockchain. In this model, the chain block structure based on timestamps, the consensus mechanism of distributed nodes, economic incentives based on consensus computing power, and flexible programmable smart contracts are the most representative innovations of blockchain technology.

Extended information:

[Blockchain core technology]

Blockchain mainly solves the trust and security issues of transactions, so it addresses this issue Four technological innovations:

1. Distributed ledger means that transaction accounting is completed by multiple nodes distributed in different places, and each node records a complete account, so they all Can participate in supervising the legality of transactions and can also jointly testify for them.

The uniqueness of blockchain's distributed storage is mainly reflected in two aspects: First, each node of the blockchain stores complete data according to the block chain structure. Traditional distributed storage generally stores The data is divided into multiple parts for storage according to certain rules. Second, the storage of each node in the blockchain is independent and has equal status, relying on the consensus mechanism to ensure storage consistency, while traditional distributed storage generally synchronizes data to other backup nodes through the central node.

No node can record ledger data independently, thus avoiding the possibility of a single bookkeeper being controlled or bribed to record false accounts. Also because there are enough accounting nodes, theoretically speaking, the accounts will not be lost unless all nodes are destroyed, thereby ensuring the security of the accounting data.

2. Asymmetric encryption and authorization technology. The transaction information stored on the blockchain is public, but the account identity information is highly encrypted and can only be used if authorized by the data owner.It can only be accessed under certain circumstances, thereby ensuring data security and personal privacy.

3. The consensus mechanism is how all accounting nodes reach a consensus to determine the validity of a record. This is both a means of identification and a means of preventing tampering. Blockchain proposes four different consensus mechanisms, which are suitable for different application scenarios and strike a balance between efficiency and security.

The consensus mechanism of the blockchain has the characteristics of "the minority obeys the majority" and "everyone is equal". "The minority obeys the majority" does not entirely refer to the number of nodes, but can also be the computing power and the number of shares. Or other characteristic quantities that the computer can compare. "Everyone is equal" means that when a node meets the conditions, all nodes have the right to give priority to the consensus result, which will be directly recognized by other nodes and may eventually become the final consensus result.

4. Smart contracts. Smart contracts are based on these trustworthy and non-tamperable data and can automatically execute some predefined rules and terms. Take insurance as an example. If everyone's information (including medical information and risk occurrence information) is true and trustworthy, it will be easy to automate claims settlement in some standardized insurance products.

In the daily business of insurance companies, although transactions are not as frequent as those in the banking and securities industries, the reliance on trusted data continues unabated. Therefore, the author believes that using blockchain technology from the perspective of data management can effectively help insurance companies improve their risk management capabilities. Specifically speaking, it is mainly divided into risk management of policyholders and risk supervision of insurance companies.

Blockchain-Network

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 38154 文章总数
  • 3637387访问次数
  • 3084建站天数