为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 比特币基础> 正文

区块链的时间戳,区块链时间戳是什么原理

发布时间:2023-12-18-18:11:00 来源:网络 比特币基础 区块   时间

区块链的时间戳,区块链时间戳是什么原理

区块链时间戳是将区块链上的信息按照特定的时间格式编码,以记录信息产生的时间,以及信息在区块链上的存储位置。它是一种技术,可以记录任何数字数据的时间,以及它们的位置,确保数据的安全性和不可篡改性。本文将探讨区块链时间戳的相关技术,包括:数字签名、哈希函数和共识机制。

数字签名是一种密码技术,它可以用来证明一个消息的发送者的身份,以及消息本身的完整性。它是一种非常有效的方式,可以确保消息的发送者是可信任的,而且消息本身没有被篡改。在区块链时间戳中,数字签名用来确保时间戳的准确性和可信任性。

哈希函数是一种数字摘要技术,可以将任意长度的信息映射为固定长度的字符串,称为消息摘要或散列值。它可以用来确保消息的完整性,同时也可以用来验证消息的完整性。在区块链时间戳中,哈希函数用来确保时间戳中的信息是不可篡改的。

共识机制是一种分布式系统中用于确认消息的机制。它可以确保网络中的所有节点都能够达成一致,从而确保消息的安全性和可靠性。在区块链时间戳中,共识机制用来确保时间戳的准确性,以及时间戳的可靠性和安全性。

以上就是区块链时间戳的相关技术:数字签名、哈希函数和共识机制。它们可以确保时间戳的准确性和可靠性,保证时间戳的安全性和不可篡改性,为区块链技术提供了可靠的保障。


请查看相关英文文档

Ⅰ The understanding of “blockchain” and the application of “blockchain”

The understanding of “blockchain” and the application of “blockchain”
"Blockchain" can be said to be the hottest keyword right now. Whether it is online information or daily chat, you can hear about it everywhere. Although there is a lot of discussion, most people are still relatively ignorant about "blockchain". Therefore, we often hear many people ask "What is blockchain technology?" "What is the relationship between digital currency and blockchain?" "How can we identify a good blockchain project?" and other related questions.

As for what exactly is blockchain?
Blockchain technology refers to a way for all people to participate in accounting. There is a database behind all systems. You can think of the database as a big ledger. Currently, each system keeps its own account.
But now in the blockchain system, everyone can keep accounts. The system will automatically select the person with the best and fastest accounting, write the contents of his accounting into the ledger, and record the information in the ledger. The content is distributed to everyone in the system for backup.
So what are the benefits of such universal accounting?
First of all, the biggest benefit is security. With this central ledger, others cannot change or destroy it, because it is not a computer Computer control can not only greatly reduce costs, but also improve efficiency. And since everyone has the same ledger, it can ensure that the ledger recording process is open and transparent.
Secondly, the most important thing about blockchain technology is that it can solve the problem of intermediary credit. In the past, it was difficult for two people who did not trust each other to cooperate and had to rely on a third party, just like transfers must go through a bank, but through Blockchain technology, Bitcoin, without the participation of any intermediary agency, has for the first time achieved a transfer behavior in which both parties can trust each other;
Because the blockchain does not require the participation of an intermediary, the process is efficient and transparent, and the cost is very low, Data is highly secure, so any industry or field that has needs in any of these three aspects will have the opportunity to use blockchain technology.

If you still say that "blockchain" can only be used for currency speculation, then you are too behind:
With the improvement of living standards and the upgrade of the consumption era, many people like to buy when traveling abroad Buy, buy, even people who don’t go abroad also like to buy some imported goods online. As a result, cross-border online shopping has risen rapidly in recent years. However, many processes and links of cross-border online shopping occur abroad. As a cross-border online shopping user, how can you ensure that the goods you buy are not A-grade or counterfeit goods?
In order to solve the problem of allowing consumers to buy their favorite goods At the same time, it is genuine and licensed. Now we have a reliable and convenient solution, which is blockchain technology. It has the following characteristics:
1. Use block chain data structure to verify and store data.
2. Use distributed node consensus algorithm to generate and update data
3. Use cryptography methodsto ensure the security of data transmission and access
4. Use smart contracts composed of automated script codes to program and operate data
Nowadays, many e-commerce companies have taken a fancy to these advantages of blockchain technology and use it to Used for overseas purchasing business, such as JD.com. It is understood that JD.com has now reached cooperation with brands such as Kelaisi Mask, Cheonggwanjang Korean Ginseng and Red Ginseng, Amore Cosmetics, Oberton Apricot Dried Raisin Fruit Oatmeal and other brands. With the help of blockchain technology, the products of these brands Information on the raw material process, production process, circulation process, and marketing process is integrated and written into the blockchain to achieve full-process authenticity traceability down to one item and one code.
Thus, each piece of information has its own unique blockchain ID "identity card", and each piece of information is accompanied by the digital signature and timestamp of each subject for consumers to query and verify. The data signature and encryption technology of blockchain enables full-link information to achieve tamper-proof, unified standards and efficient exchange.
Now that we have reliable technology like blockchain, and reliable cross-border traceability and cross-border logistics, we no longer need to go abroad to buy in person, nor do we need to worry about what we are doing on e-commerce platforms. The product purchased is not genuine. As long as we sit at home and move the mouse, our favorite overseas big-name products will arrive as scheduled. I believe that in the near future, blockchain technology will also be applied to other e-commerce companies.

Ⅱ 108 knowledge points for getting started with blockchain

108 essential knowledge points for getting started with blockchain

(Welcome to communicate with fellow fans)

1. What is a blockchain

The information of multiple transactions and the information indicating the block are packaged together. The verified package is the block.

Each block stores the hash value of the previous block, creating a relationship between blocks, that is to say, a chain. Together they are called blockchain.

2. What is Bitcoin

The concept of Bitcoin was proposed by Satoshi Nakamoto in 2009, with a total number of 21 million. The Bitcoin chain generates a block approximately every 10 minutes, and this block is mined by miners for 10 minutes. As a reward to miners, a certain number of Bitcoins will be issued to miners, but this certain number is halved every four years. Now it's 12.5. If this continues, all Bitcoins will be available in 2040.

3. What is Ethereum

The biggest difference between Ethereum and Bitcoin is the smart contract. This allows developers to develop and run various applications on it.

4. Distributed ledger

It is a database that is shared, replicated and synchronized among network members. To put it bluntly, all users on the blockchain have accounting functions and the content is consistent, which ensures that the data cannot be tampered with.

5. What is quasi-anonymity

I believe everyone has a wallet, and the wallet address (a string of characters) used to send transactions is quasi-anonymity.

6. What is open transparency/traceability

The blockchain stores all data from history to the present, anyone can view it, and can also view any data in history.

7. What is tamper-proof

Historical data and current transaction data cannot be tampered with. The data is stored in the block on the chain and has a hash value. If the block information is modified, its hash value will also change, and the hash values ​​of all blocks following it must also be modified to form a new chain. At the same time, the main chain is still conducting transactions to generate blocks. The modified chain must always generate blocks synchronously with the main chain to ensure that the length of the chain is the same. The cost is too high, just to modify a piece of data.

8. What is anti-DDoS attack

DDoS: Hackers control many people’s computers or mobile phones and allow them to access a website at the same time. Since the bandwidth of the server is limited, a large amount of traffic The influx of data may cause the website to fail to function properly, resulting in losses. However, the blockchain is distributed and there is no central server. If one node fails, other nodes will not be affected. Theoretically, if more than 51% of the nodes are attacked, problems will occur.

9. Definition of main chain

Taking Bitcoin as an example, at a certain point in time, a block is mined by two miners at the same time, and then 6 blocks are generated first. The chain of blocks is the main chain

10. Single chain/multi-chain

Single chain refers to the data structure that handles everything on one chain. The core essence of the multi-chain structure is composed of public chain + N sub-chains. There is only one, but in theory there can be countless sub-chains, and each sub-chain can run one or more DAPP systems

11. Public chain/alliance chain/private chain

Public Chain: Everyone can participate in the blockchain

Alliance chain: Only alliance members are allowed to participate in accounting and query

Private chain: Writing and viewing permissions are only controlled by one person In the hands of the organization.

12. Consensus layer, data layer, etc.

There are six overall structures of the blockchain: data layer, network layer, consensus layer, incentive layer, contract layer, and application layer. Data layer: a layer that records data, belonging to the underlying technology; network layer: a structure for building a blockchain network, which determines how users are organized. Consensus layer: Provides a set of rules to allow everyone to reach agreement on the information received and stored. Incentive layer: Design incentive policies to encourage users to participate in the blockchain ecosystem; Contract layer: Generally refers to "smart contracts", which are a set of automatically executed, based onA contract system written according to your own needs. Application layer: Applications on the blockchain, similar to mobile apps. Former Distributed Storage R&D Center

13. Timestamp

The timestamp refers to the time from January 1, 1970 Day 0 hours 0 minutes 0 seconds 0... The total number of seconds from the current time to now, or the total number of nanoseconds and other very large numbers. Each block is generated with a timestamp indicating when the block was generated.

14. Block/block header/block body

Block is the basic unit of blockchain, and block header and block body are components of blockchain. The information contained in the block header includes the hash of the previous block, the hash of this block, timestamp, etc. The block body is the detailed data in the block.

15. Merkle tree

Merkle tree, also called binary tree, is a data structure for storing data. The bottom layer is the original data contained in all blocks, and the upper layer is each The hash value of a block, the hash of this layer is combined in pairs to generate a new hash value, forming a new layer, and then upwards layer by layer, until a hash value is generated. Such a structure can be used to quickly compare large amounts of data, and you can quickly find the bottom-level historical data you want without downloading all the data.

16. What is expansion?

The size of a Bitcoin block is about 1M and can save 4,000 transaction records. Expansion means making the block larger so that more data can be stored.

17. What is a chain?

Each block will save the hash of the previous block, creating a relationship between the blocks. This relationship is a chain. Data such as block transaction records and status changes are stored through this chain.

18. Block height

This is not the height mentioned in terms of distance. It refers to the total number of blocks between the block and the first block on the chain. This height indicates which block it is, and is just for identification purposes.

19. Fork

Two blocks were generated at the same time (the transaction information in the block is the same, but the hash value of the block is different), and then in Two chains are forked from these two blocks. Whoever generates 6 blocks from these two links first will be the main chain, and the other chain will be discarded.

20. Ghost Protocol

Mining pools with high computing power can easily generate blocks faster than mining machines with low computing power, resulting in most of the blocks on the blockchain being generated by these mining pools with high computing power. However, the blocks generated by mining machines with low computing power are not stored on the chain because they are slow, and these blocks will be invalid.

The ghost protocol allows blocks that should be invalidated to remain on the chain for a short time, and can also be used as blocks

Part of the proof of work. In this way, miners with small computing power will contribute more to the main chain, and large mining pools will not be able to monopolize the confirmation of new blocks.

21. Orphan blocks

As mentioned before, orphan blocks are blocks generated at the same time. One of them forms a chain, and the other does not form a chain. Then this block that does not form a chain is called an orphan block.

22. Uncle block

The orphan block mentioned above, through the ghost protocol, makes it part of the proof of work, then it will not be discarded and will be saved in the main chain superior. This block is next

23 replay attack

The hacker resends the message that has been sent to the server. Sometimes this can deceive the server into multiple responses.

24. Directed acyclic graph

Also called data set DAG (directed acyclic graph), DAG is an ideal multi-chain data structure. Most of the blockchains mentioned now are single chains, that is, one block is connected to another block, and DAG is multiple blocks connected. The advantage is that several blocks can be generated at the same time, so the network can process a large number of transactions at the same time, and the throughput will definitely increase. However, there are many shortcomings and it is currently in the research stage.

25. What is mining

The mining process is to perform a series of conversions, connections and hash operations on the above six fields, and continue to try them one by one. The random number you are looking for, and finally successfully find a random number that meets the conditions: the value after hashing is smaller than the hash value of the preset difficulty value, then the mining is successful, and the node can broadcast the area to neighboring nodes. block, neighboring nodes receive the block and perform the same operation on the above six fields to verify compliance, and then forward it to other nodes. Other nodes also use the same algorithm to verify. If there are 51% of nodes in the entire network If all verifications are successful, even if this block is truly "mined" successfully, each node will add this block to the end of the previous block, delete the list in the block that is the same as its own record, and resurrect again. the above process. Another thing to mention is that regardless of whether the mining is successful or not, each node will pre-record the reward of 50 Bitcoins and the handling fees of all transactions (total input-total output) in the first item of the transaction list (this is " The most fundamental purpose of "mining" is also the fundamental reason to ensure the long-term stable operation of the blockchain), the output address is the address of this node, but if the mining is unsuccessful, the transaction will be invalidated without any reward. Moreover, this transaction called "production transaction" does not participate in the "mining" calculation.

26. Mining machines/mining farms

Mining machines are computers with various configurations, and computing power is the biggest difference between them. A place where mining machines are concentrated in one place is a mining farm

27. Mining pool

That is, miners join together to form a team, and the computer group under this team is the mining pool. Mining rewards are distributed based on your own computing power contribution.

28. Mining difficulty and computing power

Mining difficulty is to ensure that the interval between generating blocks is stable within a certain short time, such as Bitcoin’s 10 minutes.

p>

Block 1. The computing power is the configuration of the mining machine.

29. Verification

When verification in the blockchain is a confirmation of the legality of the transaction, each node will verify the transaction once when the transaction message is propagated between nodes. Whether the transaction is legal. For example, verify whether the syntax of the transaction is correct, whether the transaction amount is greater than 0, whether the entered transaction amount is reasonable, etc. After passing the verification, it will be packaged and handed over to the miners for mining.

30. Transaction broadcast

The node sends information to other nodes through the network.

31. Mining fees

For the blockchain to work non-stop like a perpetual motion machine, miners need to maintain the system. Therefore, the miners must be given favorable fees to make it sustainable.

32. Transaction confirmation

When a transaction occurs, the block recording the transaction will be confirmed for the first time, and will be confirmed in every area on the chain after the block. Block is reconfirmed: When the number of confirmations reaches 6 or more, the transaction is generally considered safe and difficult to tamper with.

33. Double transaction

That is, I have 10 yuan, I use the 10 yuan to buy a pack of cigarettes, and then instantly use the 10 yuan that has not yet been paid. Bought another cup of coffee. So when verifying the transaction, you need to confirm whether the 10 yuan has been spent.

34. UTXO unspent transaction output

It is a data structure containing transaction data and execution code, which can be understood as digital currency that exists but has not yet been consumed.

35. Transactions per second TPS

That is throughput, tps refers to the number of transactions the system can process per second.

36. Wallet

Similar to Alipay, it is used to store digital currencies, and blockchain technology is more secure.

37. Cold wallet/hot wallet

A cold wallet is an offline wallet. The principle is to store it locally and use QR code communication to prevent the private key from touching the Internet. A hot wallet is an online wallet. The principle is to encrypt the private key and store it on the server. When it is needed, it is downloaded from the server and decrypted on the browser side.

38. Software Wallet/Hardware Wallet

A software wallet is a computer program. Generally speaking, software wallets are programs that interact with the blockchain and allow users to receive, store, and send data.A character currency that can store multiple keys. Hardware wallets are smart devices that specialize in handling digital currencies.

39. Airdrop

The project sends digital currency to each user’s wallet address.

40. Mapping

Mapping is related to the issuance of blockchain currency and is a mapping between chains. For example, there are some blockchain companies that have not completed the development of the chain in the early stage. They rely on Ethereum to issue their own currency. The issuance and transactions of the early currency are all operated on Ethereum. With the development of the company, the company's own chain development has been completed. The company wants to map all the previous information on Ethereum to its own chain. This process is mapping.

41. Position

Refers to the ratio of the investor’s actual investment to the actual investment funds

42. Full position

Buy with all funds Enter Bitcoin

43. Reduce the position

Sell some of the Bitcoins, but not all of them

44. Heavy positions

Compared with Bitcoin, Bitcoin accounts for a larger share of funds

45. Short position

Compared with Bitcoin, the share of funds is larger

46. Short position

Sell all the Bitcoins you hold and convert them all into funds.

47. Stop loss

After obtaining a certain profit, sell the Bitcoin held to keep the profit

48. Stop loss

After losses reach a certain level, sell the Bitcoins you hold to prevent further losses

49. Bull market

Prices continue to rise and the outlook is optimistic

50. Bear market

Prices continue to fall, and the outlook is bleak

51. Long (long)

The buyer believes that the currency price will rise in the future, buys the currency, and waits for the currency price After rising, sell at a high price to take profits

52. Short position (short selling)

The seller believes that the currency price will fall in the future, and sells the currency he holds (or borrows it from the trading platform) (coin) sell, wait for the price of the currency to fall, buy at a low price to take profits

53. Open a position

Buy virtual currencies such as Bitcoin

54 . Cover the position

Buy Bitcoin and other virtual currencies in batches, for example: buy 1 BTC first, and then buy 1 BTC later

55. Full position

All funds are purchased at one time to buy a certain virtual currency

56. Rebound

When the currency price falls, the price drops too fast due toAdjustment for rebound

57. Consolidation (sideways)

The price fluctuation is small and the currency price is stable

58. Falling

The currency price fell slowly

59. Diving (waterfall)

The currency price fell rapidly, with a large amplitude

60. Cutting meat

Buy After investing in Bitcoin, the price of the currency fell, and in order to avoid further losses, he sold Bitcoin at a loss. Or after borrowing the currency to go short, the currency price rises, and you buy Bitcoin at a loss

61. Hold on

Expect the currency price to rise, but unexpectedly the currency price falls after buying; or expect the currency price fell, but unexpectedly, after selling, the currency price rose

62. Unwinding

After buying Bitcoin, the currency price fell, causing a temporary book loss, but then the currency price rebounded and the loss was reversed To make a profit

63. Going short

After selling Bitcoin because of the bearish market outlook, the price of the currency continued to rise, and I was unable to buy it in time, so I failed to make a profit

64. Overbought

The currency price continues to rise to a certain height, the buyer's power is basically exhausted, and the currency price is about to fall

65. Oversold

The currency price continues to fall to a certain low, the seller's power has basically been exhausted, and the currency price is about to rise

66. Lure bulls

The currency price has been consolidating for a long time, and it is more likely to fall. Most of the short sellers have sold Bitcoin, and suddenly the short sellers pulled up the price of the currency, inducing the long parties to think that the price of the currency will rise and buy one after another. As a result, the short sellers suppressed the price of the currency, causing the long parties to get stuck

67. Lure shorts

After buying Bitcoin, bulls deliberately suppress the price of the currency, making short sellers think that the price of the currency will fall and sell them one after another. As a result, they fall into the trap of bulls


68. What is NFT

The full name of NFT is "Non-Fungible Tokens", which is a non-fungible token. Simply put, it is an indivisible token on the blockchain. Copyright certificate is mainly used to confirm and transfer the rights of digital assets. The difference from digital currency is that it is unique and indivisible. In essence, it is a unique digital asset.

69. What is the Metaverse

The Metaverse is a collection of virtual time and space, consisting of a series of augmented reality (AR), virtual reality (VR) and the Internet (Internet) Composed of digital currency, which carries the function of value transfer in this world.

70. What is DeFi

DeFi, the full name is Decentralized Finance, which is "decentralized finance" or "distributed finance"". "Decentralized finance", as opposed to traditional centralized finance, refers to various financial field applications established in open decentralized networks. The goal is to establish a multi-level financial system based on blockchain technology and Re-create and improve the existing financial system based on cryptocurrency

71. Who is Satoshi Nakamoto?

Satoshi Nakamoto is the developer and founder of Bitcoin. 2008 Satoshi Nakamoto published the Bitcoin white paper on November 1, 2009, and mined Bitcoin for the first time on January 3, 2009. Whoever can use the Bitcoin in the genesis block is Satoshi Nakamoto himself, so who is What about Satoshi Nakamoto? There have been many "Satoshi Nakamotos" in history: In 2013, someone revealed that Mochizuki Shinichi, who had made outstanding contributions in the field of mathematics, was Satoshi Nakamoto, but no direct evidence was provided. In 2014, hackers hacked Entered the mailbox used by Satoshi Nakamoto and found the owner of the mail, Dorian Nakamoto. Later, Dorian said that he only obtained the mailbox address and password by chance and was not Satoshi Nakamoto. In 2016, Craig Wright said that he was Satoshi Nakamoto and could provide Satoshi Nakamoto's private key. But later, Wright withdrew his statement because he could not face everyone's doubts.

72. Bitcoin and Q Coin are different

Bitcoin is a decentralized digital asset with no issuing entity. Q Coin is an electronic currency issued by Tencent, which is similar to electronic points. In fact, It is not a currency. Q Coin requires a centralized issuing institution. Q Coin can only be recognized and used because of the credit endorsement of Tencent. The scope of use is also limited to Tencent’s games and services. The value of Q Coin is entirely based on people’s trust in Tencent. trust.

Bitcoin is not issued through a centralized institution, but it is widely recognized around the world because Bitcoin can self-certify its trust. The issuance and circulation of Bitcoin are jointly recorded by miners across the entire network. It does not require a central organization to ensure that no one can tamper with the ledger.

73. What is a mining machine?

Taking Bitcoin as an example, the Bitcoin mining machine runs Professional equipment that performs a large number of calculations to compete for accounting rights and obtain new Bitcoin rewards. It is generally composed of mining chips, heat sinks and fans. It only executes a single calculation program and consumes a large amount of power. Mining is actually a competition between miners. Miners with more computing power have a greater probability of mining Bitcoin. As the computing power of the entire network increases, it becomes more and more difficult to mine Bitcoins with traditional equipment (CPU, GPU). People have developed specialized Chip for mining. The chip is the core part of the mining machine. The operation of the chip will generate a lot of heat. In order to dissipate heat, Bitcoin mining machines are generally equipped with heat sinks and fans. Users download Bitcoin mining on their computers Software, use this software to allocate the tasks of each mining machine, and then you can start mining. The algorithm of each currency is different, and the mining machines required are also different.same.

74. What is quantitative trading?

Quantitative trading, sometimes also called automated trading, refers to the use of advanced mathematical models to replace human subjective judgments, which greatly reduces the impact of investor sentiment fluctuations and avoids extreme fanaticism or pessimism in the market. make irrational investment decisions. There are many types of quantitative trading, including cross-platform trading, trend trading, hedging, etc. Cross-platform trading means that when the price difference between different target platforms reaches a certain amount, sell on the platform with a higher price and buy on the platform with a lower price.

75. Blockchain asset over-the-counter trading

Over-the-counter trading is also called OTC trading. Users need to find their own counterparties and do not need to match the transaction. The transaction price is determined by negotiation between the two parties. The two parties can fully communicate through face-to-face negotiation or telephone communication.

76. What is a timestamp?

The blockchain ensures that each block is connected sequentially through timestamps. Timestamps enable every piece of data on the blockchain to have a time stamp. Simply put, timestamps prove when something happened on the blockchain and cannot be tampered with by anyone.

77. What is a blockchain fork?

Upgrading software in a centralized system is very simple, just click "Upgrade" in the app store. However, in decentralized systems such as blockchain, "upgrading" is not that simple, and a disagreement may even cause a blockchain fork. Simply put, a fork refers to a disagreement when the blockchain is "upgraded", resulting in a fork in the blockchain. Because there is no centralized organization, every code upgrade of digital assets such as Bitcoin needs to be unanimously recognized by the Bitcoin community. If the Bitcoin community cannot reach an agreement, the blockchain is likely to form a fork.

78. Soft fork and hard fork

Hard fork means that when the Bitcoin code changes, the old nodes refuse to accept the blocks created by the new nodes. Blocks that do not comply with the original rules will be ignored, and miners will follow the original rules and create new blocks after the last block they verified. A soft fork means that old nodes are not aware of the changes to the Bitcoin code and continue to accept blocks created by new nodes. Miners may work on blocks they have no understanding of, or validation of. Both soft forks and hard forks are "backwards compatible" to ensure that new nodes can verify the blockchain from scratch. Backward compatibility means that new software accepts data or code generated by old software. For example, Windows 10 can run Windows XP applications. Soft forks can also be "forward compatible".

79. Classification and application of blockchain projects

Judging from the current mainstream blockchain projects, blockchain projects mainly fall into four categories: Category 1: Currency; The second category: platform category; the third category: application category; the fourth category: asset tokenization.

80. USDT against the U.S. dollar

USDT is Tether USD, a token launched by Tether that is against the U.S. dollar (USD). 1USDT=1 US dollar, users can use USDT and USD for 1:1 exchange at any time. Tether implements a 1:1 reserve guarantee system, that is, each USDT token will have a reserve guarantee of 1 US dollar, which supports the stability of the USDT price. The unit price of a certain digital asset is USDT, which is equivalent to its unit price in US dollars (USD).

81. Altcoins and alternative coins

Altcoins refer to blockchain assets that use the Bitcoin code as a template and make some modifications to its underlying technology blockchain, among which Those with technological innovations or improvements are also called alternative coins. Because the Bitcoin code is open source, the cost of plagiarism in Bitcoin is very low. You can even generate a brand new blockchain by simply copying the Bitcoin code and modifying some parameters.

82. Three major exchanges

Binance

Okex

Huobi

83. Market software

Mytoken

Non-small account

84. Information website

Babbitt

Golden Finance

Coin World News

85. Blockchain Browser

BTC

ETH

BCH

< p> LTC

ETC

86. Wallet

Imtoken

Bitpie

MetaMask (Little Fox)

87. Decentralized exchange

uniswap


88. NFT exchange

< p> Opensea

Super Rare

89. Ladder

Bring your own, buy a reliable ladder

90. Platform currency

Digital currency issued by the platform, used to deduct handling fees, transactions, etc.

91. Bull market, bear market

Bull market: rising market

Bear market : Falling market

92. Blockchain 1.0

A currency trading system based on distributed ledgers, represented by Bitcoin

93. Blockchain 2.0 < /p>

The contract blockchain technology represented by Ethereum (smart contract) is 2.0

94. Blockchain 3.0

In the era of intelligent Internet of Things, it goes beyond the financial field and provides various A variety of industries provide decentralized solutions

95. Smart Contract

Smart Contract is a computer protocol designed to disseminate, verify or execute contracts in an information-based manner , to put it simply, the electronic contract is set in advance, and once both parties confirm it, the contract will be automatically executed.

96. What is a token?

The token economy is an economic system with Token as the only reference standard, which is equivalent to a pass. If you own Token, you have rights and interests, and you have the right to speak.

97. The difference between big data and blockchain

Big data is the means of production, AI is the new productivity, and the blockchain is the new production relationship. Big data refers to a collection of data that cannot be captured, managed and processed within a certain time range using conventional software tools. It is a massive, high-growth and high-volume data set that requires new processing models to have stronger decision-making power, insight discovery and process optimization capabilities. Diverse information assets. Simply understood, big data is massive data accumulated over a long period of time and cannot be obtained in the short term. Blockchain can be used as a way to obtain big data, but it cannot replace big data. Big data is only used as a medium running in the blockchain and has no absolute technical performance, so the two cannot be confused. (A simple understanding of production relations is labor exchange and consumption relations. The core lies in productivity, and the core of productivity lies in production tools)

98. What is ICO?

ICO, Initial Coin Offering, is the initial public offering of tokens, which is crowdfunding in the blockchain digital currency industry. It is the most popular topic and investment trend in 2017, and the country launched a regulatory plan on September 4. Speaking of ICO, people will think of IPO, and the two are fundamentally different.

99. Five characteristics of digital currency

The first characteristic: decentralization

The second characteristic: having open source code

The third feature: independent electronic wallet

The fourth feature: constant issuance

The fifth feature: global circulation

100. What is decentralization?

It has no issuer, does not belong to any institution or country, and is a publicly issued currency designed, developed and stored on the Internet by Internet network experts.

100. What is measurement (scarcity)?

Once the total amount of issuance is set, it is permanently fixed, cannot be changed, cannot be over-issued at will, and is subject to global Internet supervision. due to excavation andAlthough the mining difficulty changes over time, the longer the time, the more difficult it is to mine, and the fewer coins will be mined, so it is scarce.

101. What is open source code?

The alphanumeric code is stored on the Internet. Anyone can find out the source code of its design, everyone can participate, can mine it, and it is open to the world.

102. What is anonymous transaction? Private wallet private?

Everyone can register and download the wallet online without real-name authentication. It is completely composed of encrypted digital codes. It can be sent and traded globally in real-time point-to-point without resorting to banks or any institutions. It cannot be traced by anyone without my authorization. ,Inquire.

103. What is a contract transaction?

A contract transaction refers to an agreement between a buyer and seller to receive a certain amount of an asset at a specified price at a certain time in the future. The objects of contract trading are standardized contracts formulated by the exchange. The exchange stipulates standardized information such as commodity type, transaction time, quantity, etc. A contract represents the rights and obligations of the buyer and seller.


104. Digital Currency Industry Chain

Chip manufacturers, mining machine manufacturers, and mining machine agents mine and export to exchanges for retail investors to speculate in coins< /p>

105. Who is Bei Feng?

Beifeng: Digital currency value investor

Investment style: Steady

106. Build a community?

Beidou Community (high-quality price investment community)


Combining long and short, focusing on price investment, no contracts, no short-term play< /p>

Reasonable layout, scientific operation, prudent and conservative, earning periodic money


Welcome currency friends and seek common development.

Ⅲ What is the timestamp in the blockchain?

In order to prevent the double-spending problem, the system will automatically add a timestamp to the transaction information of each block and give it a Time imprint, how much money you spent during this time is what you spent. It has been recorded and cannot be used to buy anything else.
How is it recorded specifically? In fact, through calculation, the timestamp and other transaction information on the block are calculated through complex calculations to obtain an encrypted value. This encrypted value is called a "hash value". Each new block contains the information of the previous block. Hash value, thus forming a blockchain.
So we say: The Bitcoin system is actually a nested, never-ending, very powerful timestamp system. It uses timestamps to ensure that each block follows the Chronologically linked into a "chain" (i.e. a blockchain).
From here we go like thisUnderstand that timestamp literally means to put a time stamp on the block. Its actual function is to provide an important parameter for the subsequent calculation of the hash value. It is an essential and very important information in the calculation and verification process.
Finally, we summarize the content of this section. This section mainly introduces two terms: UTXO and timestamp. These two concepts are important means to solve the "double spend problem" and can ensure that Bitcoin can not be used multiple times without a third-party institution. .

Ⅳ One article to understand the Internet blockchain

One article to understand the Internet blockchain

One article to understand the Internet blockchain. To understand the blockchain, We have to study the brief history of blockchain technology development starting from the birth of the Internet, discover the motivations for blockchain, and infer the future of blockchain. Let’s understand the Internet blockchain in one article.

Understand the Internet blockchain in one article 1

The originator of blockchain is mahjong, and the earliest blockchain was invented by the Chinese! The blockchain is just like Mahjong, except that Mahjong has fewer blocks. Mahjong only has 136 blocks. The rules of Mahjong vary from place to place and can be regarded as a hard fork of Bitcoin.

As the oldest blockchain project, Mahjong has a group of four miners. The first one to dig out the 13 correct hash values ​​will get the accounting rights and rewards. It adopts the method of being willing to admit defeat and not cheating. Thousands of consensus mechanisms!

Mahjong is decentralized, everyone can be the banker, and it is completely peer-to-peer.

Mining pool = commission from the boss of the chess and card room.

It cannot be tampered with, because convincing the other three people requires too much computing power and physical strength.

A typical value Internet. The value in my pocket didn't last eight rounds before it went into their pockets.

The Chinese are basically good at playing mahjong. In terms of blockchain, they produce 70% to 80% of the world’s mining machines and have the most computing power in the world, accounting for about 77% of the computing power.

Mahjong is actually the earliest blockchain project:

1. A group of four miners. The miner who first collides with the correct hash value of 13 numbers can obtain the accounting rights. and get rewarded.

2. It cannot be tampered with. Because convincing the other three people requires too much computing power and physical strength.

3. Typical value Internet. The valuable digital currency www.gendan5.com/digitalcurrency/btc.html in my pocket ran into their pockets after eight rounds.

4. Decentralization, everyone can be a banker, it is completely peer-to-peer.

5. UTXO, unspent transaction expenses.

There is another blockchain game on credit. Assume that everyone has no cash.

Let’s take a closer look. After everyone reaches a consensus,At this time, we can’t see any intermediary or third party coming out to judge C’s win, and the rewards given to C don’t need to be transferred to C through a third party. They are all direct peer-to-peer transactions. This process is decentralization. Players (The miners) each recorded the results of the first game. B and Dahu touched thirteen pieces, and B went to Jia Dongfeng. After the recording was completed, a complete block was generated, but remember, this was only the first game. In the entire blockchain, this is just one node. After the 8 games mentioned at the beginning, there are 8 nodes (blocks). The 8 blocks are connected together to form a complete ledger, which is the block. chain. Because everyone has one of this ledger, it is a distributed ledger. The purpose is to prevent someone from tampering with the record. At the end of the game, it is clear who wins and who loses.

Four men (A, B, C and D) got together to play mahjong for money. None of them brought any cash, so they asked a beautiful woman (centralized) to use a book to keep records and record who won and how much money they won in each round. , Who lost how much? At the end of the day, everyone uses Alipay or WeChat to pay and settle the ledger. However, if this beauty made a mistake in accounting or was bribed by one of the four people in advance to make a mistake on purpose, there is no guarantee that the outcome of this game will be fair, just, and reasonable. ,dont you agree? then what should we do? If you "play mahjong", you can use "blockchain" as the game rules and adapt it as follows:

Four men (A, B, C and D) got together to play mahjong for money. No one brought any cash. B said Let the beauty she brought keep accounts. A said that none of us knew this beauty, so the four of them, A, B, C, and D, agreed that everyone would keep accounts at the same time (decentralized) on their mobile phones (blockchain nodes) for each game. ), after finally playing mahjong and paying with electronic money directly on the mobile phone, everyone checked the accounting results. The accounting results should have been the same.

Assume that the original result is the account recorded on A’s mobile phone: B owes A 10 yuan. However, the record on B's mobile phone shows that there is no debt, but the other two people (C and D) have the same accounting as A, so the settlement is still based on the majority rule. In addition, everyone has a bad impression of B's ​​integrity. Next The first time I play mahjong, I won’t take B to play with me.

Unless B bribes two people (C and D) in advance to deliberately cheat, but the cost of B bribes them is 100,000 yuan (10,000 times the default of 10 yuan), then in common sense, B only You can choose to give up because the cost of counterfeiting is too high.

Assume that even if B is secretly willing to pay a high price of 100,000 yuan to buy C and D to do this silly cat transaction with huge losses during the card game, the rules of the blockchain are to keep accounts based on timestamps. Yes, it turns out that B owed A 10 yuan when debiting the account at 1 p.m., that is, when C and D changed the account at 3 p.m., time is irreversible and they can only record 3 p.m., which does not comply with the rules of the game. .

In fact, in 2017 the blogger has developed a set of Mahjong coins

China’s earliest blockchain project: a group of four miners, first starting from 148 random numbers The miner who collided with the correct hash value of 14 numbers,You can get one accounting right incentive. Since distributed accounting requires the consensus of several other miners, each accounting transaction takes about ten minutes.

Understanding the Internet Blockchain in One Article 2

1. Before the birth of Bitcoin, 5 Internet technologies that will have a significant impact on the future of the blockchain

In 1969, the Internet was born in the United States. Since then, the Internet has expanded from four research institutions in the United States to the entire planet. In terms of application, it has expanded from the earliest military and scientific research to all aspects of human life. In the nearly 50 years since the birth of the Internet, five technologies have been of particularly great significance to the future development of blockchain.

1. The TCP/IP protocol born in 1974: determines the position of blockchain in the Internet technology ecosystem

In 1974, the most critical step in the development of the Internet was taken by The TCP/IP protocol, the core communication technology of the Internet jointly developed by American scientists Vinton Cerf and Robert Kahn, was officially launched.

This protocol enables the transmission of information between different computers and even different types of networks. All computers connected to the network can communicate and interact as long as they comply with this protocol.

In layman's terms, Internet data can travel tens of thousands of kilometers to reach the computer users who need it. This is mainly because the Internet world has formed a unified information dissemination mechanism. That is to say, Internet devices follow a unified law-TCP/IP protocol when disseminating information.

Understanding the TCP/IP protocol is of great significance to mastering the Internet and blockchain. After the invention of TCP/IP in 1974, the entire Internet was between the underlying hardware devices, the intermediate network protocols and the network Addresses have always been relatively stable, but an endless stream of innovative applications are emerging at the top application layer, including news, e-commerce, social networks, QQ, WeChat, and blockchain technology.

In other words, in the technical ecology of the Internet, blockchain is a new technology on the top layer of the Internet - the application layer. Its emergence, operation and development have not affected the underlying infrastructure and communication protocols of the Internet. , is still one of the many software technologies that operates according to the TCP/IP protocol.

2. Cisco router technology born in 1984: an imitation of blockchain technology

In December 1984, Cisco was established in the United States. The founder was a professor from Stanford University. A couple, Leonard Posak, director of the computer center, and Sandy Lerner, director of the business school's computer center, designed a networking device called a "multiprotocol router" that was placed on the Internet's communication lines to help data Get from one end of the Internet to the other thousands of kilometers away accurately and quickly.

In the entire Internet hardware layer, tens of millions of routers are busy working, directing the transmission of Internet information. An important function of Cisco routers is that each router saves a completed Internet device address table.Once a change occurs, it will be synchronized to tens of millions of other routers (theoretically), ensuring that each router can calculate the shortest and fastest path.

When you see the operation process of the router, you will feel very familiar. That is the important feature of the blockchain later. The significance of understanding the router lies in the important features of the blockchain. It has been implemented on the router in 1984. For the router, even if the node device is damaged or attacked by hackers, it will not affect the transmission of the entire Internet information.

3. The B/S (C/S) architecture that was born with the World Wide Web: the opponent of the blockchain and the target of attempted subversion

The World Wide Web is referred to as the Web and is divided into Web clients and server. All updated information is only modified on the Web server. Thousands, tens of thousands, or even tens of millions of other client computers do not retain the information and only obtain the information data when accessing the server. This structure is often called the Internet B/S architecture is a centralized architecture. This architecture is also the most important architecture of the current Internet. Internet giants such as Google, Facebook, Tencent, Alibaba, and Amazon have all adopted this architecture.

Understanding the B/S architecture will be of great significance to the subsequent understanding of blockchain technology. The B/S architecture is that data is only stored in the central server, and all other computers obtain information from the server. Blockchain technology has tens of millions of computers without a center, and all data will be synchronized to all computers. This is the core of blockchain technology.

4. Peer-to-Peer Network (P2P): Blockchain The father of the chain and its technical basis

Peer-to-peer network P2P is another Internet infrastructure corresponding to C/S (B/S). Its characteristic is that multiple computers connected to each other are connected to each other. In a peer-to-peer position, there is no distinction between master and slave. A computer can be used as a server, setting shared resources for use by other computers in the network, and as a workstation.

Napster is one of the earliest P2P systems, mainly used for music resource sharing. Napster cannot be regarded as a true peer-to-peer network system. On March 14, 2000, a message was posted on the mailing list of the underground hacker site Slashdot in the United States, saying that AOL's Nullsoft department had released Gnutella, an open source Napster clone software.

In the Gnutella distributed peer-to-peer network model, each networked computer is functionally peer, serving as both a client and a server, so Gnutella is called the first true peer-to-peer network model. Network Architecture.

In the past 20 years, some Internet technology giants such as Microsoft and IBM, as well as liberals, hackers, and even criminals who infringe intellectual property rights, have continued to promote the development of peer-to-peer networks. Of course, those on the Internet want to strengthen information sharing. idealists also invested a lot ofBig enthusiasm for peer-to-peer networks. Blockchain is a software application based on a peer-to-peer network architecture. It is a benchmark application for peer-to-peer networks trying to break out from the silence of the past.

5. Hash algorithm: the key to generating Bitcoin and tokens (tokens)

The hash algorithm converts numbers of any length into fixed-length values ​​using a hash function. Algorithms, famous hash functions such as: MD4, MD5, SHS, etc. It is a member of the family of cryptographic functions defined by the American National Institute of Standards and Technology.

This family of algorithms is crucial to the functioning of the entire world. From Internet application stores, emails, anti-virus software, to browsers, etc., all of them are using secure hashing algorithms. It can determine whether Internet users have downloaded what they want, and it can also determine whether Internet users are involved in man-in-the-middle attacks or network attacks. Victim of a phishing attack.

The process of blockchain and its application to generate new coins from Bitcoin or other virtual currencies is to use the function of the hash algorithm to perform operations to obtain numbers that meet the format requirements, and then the blockchain program gives Bitcoin rewards.

Mining, including Bitcoin and tokens, is actually a small mathematical game built with a hash algorithm. However, because of the fierce competition, people all over the world used powerful servers to perform calculations in order to get the rewards first. As a result, many computers on the Internet participated in this little mathematical game, which even consumed more than 40% of the electricity in some countries.

2. The birth and technical core of blockchain

The birth of blockchain should be the most unusual and mysterious invention and technology in the history of human science, because in addition to blockchain, to So far, there is no major invention in the history of modern science whose inventor cannot be found.

On October 31, 2008, Bitcoin founder Satoshi Nakamoto (pseudonym) published a paper on the cryptography mailing group - "Bitcoin: A Peer-to-Peer Electronic Cash System". In this paper, the author claims to have invented a new electronic currency system that is not controlled by governments or institutions. Blockchain technology is the basis for supporting the operation of Bitcoin.

The preprint address of the paper is at http://www.bitcoin.org/bitcoin.pdf. From an academic point of view, this paper is far from a qualified paper. The main body of the article is composed of 8 flow charts. It is composed of corresponding explanatory text, no nouns and terms are defined, and the format of the paper is also very irregular.

In January 2009, Satoshi Nakamoto released an application case of blockchain on the SourceForge website - the open source software of the Bitcoin system. After the release of the open source software, it is said that Satoshi Nakamoto mined approximately 1 million bits. Coin. A week later, Satoshi Nakamoto sent 10 Bitcoins to cryptography expert Hal Finney, which became the first transaction in Bitcoin history. With the booming development of Bitcoin, research on blockchain technology has also begun to show explosive growth.

TowardIt is indeed difficult for the public to explain blockchain completely and clearly. We use Bitcoin as the object to introduce the technical characteristics of blockchain as simply as possible but in depth.

1. Blockchain is a peer-to-peer network (P2P) software application

As we mentioned before, at the beginning of the 21st century, the Internet formed two major types of applications. Architecture, centralized B/S architecture and non-centered peer-to-peer (P2P) architecture. Many Internet giants such as Alibaba, Sina, Amazon, etc. all have centralized B/S architecture. Simply put, it is data Put it in a giant server, and our ordinary users can access the servers of Alibaba, Sina and other websites through mobile phones and personal computers.

Since the beginning of the 21st century, there have been many software applications for freely sharing music, videos, and paper materials. Most of them use a peer-to-peer network (P2P) architecture, that is, there is no central server, everyone's personal computer They are all servers and clients, with equal status. However, this type of application has never become popular. The main reasons are large resource consumption and intellectual copyright issues. Blockchain is a software application in this field.

2. Blockchain is a peer-to-peer network (P2P) software application that synchronizes information across the entire network

Peer-to-peer networks also have many application methods. In many cases, everyone is not required to Each computer keeps the same information. Everyone only stores the information they need, and downloads it to other computers when needed.

However, in order to support Bitcoin financial transactions, the blockchain requires that every transaction that occurs must be written into historical transaction records and change information be sent to all computers with Bitcoin programs installed. Every computer with Bitcoin software installed maintains the latest and complete Bitcoin historical transaction information.

The characteristics of blockchain's network-wide synchronization and network-wide backup are often referred to as blockchain information security, and the source cannot be changed. Although it is still not absolutely safe in practice, when the number of users is very large, it does have certain security advantages in preventing information tampering.

3. Blockchain is a peer-to-peer network (P2P) software application that uses a hash algorithm to generate "tokens" to synchronize information across the entire network

Area The first application of the blockchain was the famous Bitcoin. When discussing Bitcoin, a term that is often mentioned is "mining". So what exactly is mining?

The metaphor is that the blockchain program gives the miners (players) 256 coins, numbered 1, 2, 3...256. Every time a Hash operation is performed, it is like tossing a coin. 256 coins are thrown at the same time. After landing, if all the coins with the first 70 numbers happen to be heads. The miner can tell the blockchain program this number, and the blockchain will reward the miner with 50 Bitcoins.

From the perspective of software programs, Bitcoin mining is a mathematical game built using the hash SHA256 function.. The blockchain first stipulates a winning mode in this small game: a 256-bit hash number is given, but the last 70 bits of the hash number are all 0, and then the player (miner) continuously enters various numbers. Give the hash SHA256 function and see if you can use this function to get a number with 70 zeros. If you find one, the blockchain program will reward the player with 50 Bitcoins. Actual mining and rewards are more complex, but the above example expresses the core process of mining and obtaining Bitcoin.

When Bitcoin was born in 2009, each bounty was 50 Bitcoins. Ten minutes after its birth, the first batch of 50 Bitcoins was generated, and the total currency amount at this time was 50. Subsequently, Bitcoin increased at a rate of about 50 every 10 minutes. When the total amount reaches 10.5 million (50% of 21 million), the bounty is halved to 25. When the total amount reaches 15.75 million (new output is 5.25 million, which is 50% of 1050), the bounty is further halved to 12.5. According to the design of the Bitcoin program, the total number of Bitcoins is 21 million.

From the above introduction, Bitcoin can be seen as a guessing game based on a peer-to-peer network architecture. The Bitcoin information rewarded for each correct guess will be transmitted to all players and recorded. into each player's history database.

4. Smart contracts, tokens, ICOs and blockchain basic platforms generated by blockchain technology due to the rise of Bitcoin

From the above introduction, Bitcoin technology It is not a new technology falling from the sky, but a clever combination of various original Internet technologies, such as peer-to-peer network architecture, network-wide synchronization of routing, and network security encryption technology. It can be regarded as a combination of innovative algorithm games. .

Because Bitcoin can be exchanged for legal currency, purchased in kind, and made huge profits through appreciation, the whole world is not calm. With the attitude that if you can do it, I can do it, many people have created their own imitation Bitcoin software applications. At the same time, taking advantage of the difficulty for the government to regulate peer-to-peer networks, various altcoins exploded together with Bitcoin. There have been many incidents of fraud and absconding, which have gradually attracted the attention of governments around the world.

Blockchain basic platform: It is still quite technically difficult to create currency using the blockchain technology framework. At this time, basic technology platforms such as Ethereum, the blockchain basic platform, have emerged, making it convenient for ordinary people. Create a "Bitcoin"-like software program, each showing its magical powers, inviting people to join the game to mine coins, speculate on coins, and gain profits from it.

Pass or token: If each "Bitcoin" or "Altcoin" uses a hash algorithm to create a guessing game and generates its own "currency", this "currency" is collectively referred to as " "Certificate" or "Token".

ICO: Since Bitcoin and Ethereum have been exchanged with the legal currencies of various countries, when other new virtual currencies are issued, only Bitcoin and Ethereum are allowed to purchase the new issued coins. This process of issuing coins It’s called ICO. The emergence of ICO has amplified the transactions of Bitcoin and Ethereum.quantity. At the same time, many ICO projects are completely based on nihilistic projects, resulting in a large number of frequent fraud cases. This further deepens society’s negative understanding of virtual currencies generated by blockchain.

Smart contract: It can be seen as a software function on the blockchain. It is a program that assists various virtual currency transactions on the blockchain. The specific function is like the fund custody of Alipay on Taobao. When a user receives goods and confirms them on Alipay, the funds are automatically paid to the buyer and owner. Smart contracts also assume this intermediary payment function in blockchain applications such as Bitcoin.

3. The historical status and future prospects of blockchain technology in the Internet

1. Where does blockchain stand in Internet technology? It is a new software and architecture at the top level.

We mentioned in the previous introduction to TCP/IP that blockchain, like browsers, QQ, WeChat, online game software, mobile APPs, etc., is a software form of the top layer of the Internet - the application layer. . Its operation still relies on the TCP/IP architecture system to transmit data. But unlike most application layer software, it does not adopt the central software architecture of C/S (B/S). Instead, an unusual peer-to-peer network architecture is adopted. From this point of view, blockchain cannot subvert the Internet infrastructure.

2. Who does blockchain want to subvert? Want to subvert the B/S (C/S) structure of the World Wide Web.

It attempts to subvert the B/S, C/S structure of the World Wide Web, which was born in 1989. Said before. Since 1989, European physicist Tim Berners-Lee invented the World Wide Web and gave up applying for a patent. In the past nearly 30 years, companies including Google, Amazon, Facebook, Alibaba, Internet, Tencent and other companies have used the B/S (C/S) structure of the World Wide Web to grow into Internet giants.

In their headquarters, a powerful central server cluster was established to store massive amounts of data. Hundreds of millions of users obtained the data they needed from the giant servers. This also led to the emergence of cloud computing, and then the Internet giants Open up your unused central server resources to further absorb data from enterprises, governments, and individuals. Centralized Internet giants have an increasing influence on the world, countries, and Internet users.

The goal of blockchain is to try to reduce the influence of Internet giants by distributing data to each Internet user’s computer. It can be seen that the real opponent of blockchain and what it wants to subvert is the 1990 The B/S (C/S) structure born in 2007. But whether it can be subverted depends on its technical advantages and bottlenecks.

3. Technical flaws of blockchain: dilemmas caused by the pursuit of complete equality and freedom

The technical flaws of blockchain first come from its peer-to-peer network architecture. For example For example, Taobao currently has a B/S structure, and massive data is stored in the Taobao server cluster computer room. Hundreds of millions of consumers go to the Taobao server website through their browsers to obtain the latest information.New and historical information.

If blockchain technology is used, hundreds of millions of people will retain a complete Taobao database on their personal computers or mobile phones. Every time a transaction occurs, it will be synchronized to hundreds of millions of other users. This is completely unachievable in reality. The amount of data transferred and stored is too large. It is equivalent to setting up and running hundreds of millions of Taobao websites at the same time.

Therefore, blockchain cannot be applied to projects with large amounts of data, and even smaller website projects will have difficulty using blockchain. By 2018, Bitcoin had been running for nearly 10 years, and the accumulated transaction data had brought the entire system to collapse.

So the blockchain has adopted many alternative methods, such as establishing relay nodes and lightning nodes. These two concepts can also make people confused. In layman’s terms, the blockchain will ask it for The subversive object B/S structure has been studied, and a data server center has been established to become the relay node of the blockchain, which can also be accessed with a browser-like terminal. This is the lightning node of the blockchain.

This change can alleviate the technical shortcomings of the blockchain, but it does make the blockchain what it opposes, centralization. It can be seen that pure blockchain technology has major flaws due to its technical characteristics and cannot be widely used like the World Wide Web. If the technology is upgraded and some parts adopt a B/S (C/S) structure, the blockchain will become centralized. The information node no longer maintains the dream when it was born.

4. Looking at the future prospects of blockchain from the Internet brain model

We know that the Internet generally refers to the Internet that connects computer networks around the world. On this basis The development of a global Internet network covering the whole world is called the Internet, which is a network structure that is interconnected.

Since the birth of the Internet in 1969, humans have innovated in the Internet field from different directions, and there is no unified plan to build the Internet into a structure. When the wheel of time reaches 2017, with the advent of artificial intelligence, With the vigorous development of science and technology such as the Internet of Things, big data, cloud computing, robots, virtual reality, and the industrial Internet, when humans look up to see the giant systems they have created, the model and architecture of the Internet brain have become increasingly clear.

Through nearly 20 years of development, relying on the B/S and C/S structures of the World Wide Web, Tencent QQ, WeChat, Facebook, Weibo, and Twitter Amazon have developed structures similar to neuron networks. Internet devices, especially personal computers and mobile phones, map personal data and functional space on the giant's central server through the software on the device, allowing them to add friends, communicate and transfer information. Internet giants continue to optimize the software versions of hundreds of millions of terminals through software upgrades in central server clusters. In the neurological system, this is a standard central nervous system structure.

The birth of the blockchain provides another neuron model. Neurons are not managed uniformly in the centralized services of giants, but each terminal, including personal computers and personal mobile phones, becomes an independent neuron model.Independent neuron nodes retain independent data spaces and synchronize information with each other. In the neurological system, this is a distributed neural structure with no center and multiple neural nodes.

Interestingly, these two different types of neural structures appear in the development of the nervous system. In lower organisms, blockchain-like neural structures have appeared. There are multiple ganglia with the same functions, all of which can command body activities and reactions. However, as organisms evolve, these ganglia gradually merge. When they evolve into higher In biology, the central nervous system appeared, which contains a large number of neurons that interact with each other.

4. Judgment on the future status of blockchain in the Internet

1. Understanding of Bitcoin: a guessing game based on peer-to-peer network architecture (P2P), Through clever financial and public opinion operations, it has become a "world currency" that is not subject to government supervision.

2. Understanding of blockchain: a peer-to-peer (P2P) software application that uses a hash algorithm to generate "tokens" to synchronize information across the entire network.

3. Blockchain has specific uses, such as large-scale election voting, large-scale gambling, financial transactions that circumvent government financial supervision, etc. It still has irreplaceable uses.

4. In more cases, blockchain technology will rely on the B/S and C/S structures of the Internet to achieve functional expansion, but overall it is still a supplement to the existing technology of the Internet. Most of the application scenarios currently envisaged by blockchain can be implemented using B/S and C/S structures, with higher efficiency and more mature technology.

5. Whether from the perspective of information transmission efficiency and resource consumption, or from the evolution of the nervous system, blockchain cannot become the mainstream architecture of the Internet, let alone a subversive and revolutionary leader of the future Internet.

6. Of course, Internet giants developed with B/S and C/S structures also have their problems, but these can be gradually solved through commercial and political methods in the future.

IV How does Jinwowo Group correctly understand the timestamp in the blockchain?

The timestamp in the blockchain exists in the block from the moment the block is generated. Among them, it corresponds to the authentication of each word of information, proving the authenticity of the information record.
Jinwowo Group understands the timestamp in the blockchain as follows:
The timestamp is written directly in the blockchain, and the blocks that have been generated in the blockchain cannot be tampered with. Because once tampered with, the generated hash value will change and become invalid data;
Each timestamp will include the previous timestamp into its random hash value, and this process continues Repeat, connect in turn, and finally a complete chain will be generated.

VI What are the main technical characteristics of blockchain?

“Blockchain is a shared distributed database technology, and its advantages are mainly reflected in distributed decentralization. , trustless system and immutableand encryption security. ”
1. The meaning of blockchain technology
Blockchain technology is a technology that uses a decentralized consensus mechanism to maintain a complete, distributed, and non-tamperable ledger database. , which allows participants in the blockchain to implement a unified ledger system without establishing a trust relationship. The block is a public ledger and is maintained at multiple points; the chain is stamped with timestamps (Timestamps) and cannot be forged. Blockchain is essentially a technology that focuses on security and credibility over efficiency.
All current systems have a database behind them, which is a big ledger. So who will keep this ledger becomes a question. It's very important. Now it's whoever owns the system who keeps the accounts. Each bank's account book is kept by each bank, and Alipay's account book is kept by Alibaba. But now in the blockchain system, everyone in the system can have the opportunity to participate in record keeping. Accounting. If there are new transaction data changes within a certain period of time, everyone in the system can do accounting. The system will judge the person who has the fastest and best accounting during this period and write the recorded content to the ledger. , and send the contents of the ledger during this period to all other people in the system for backup. In this way, everyone in the system has a complete ledger.
Therefore, these data will become very safe. Tampering It is necessary to modify more than half of the system node data at the same time to truly tamper with the data. The cost of such tampering is extremely high, making it almost impossible. For example, Bitcoin has been running for more than 7 years, and countless hackers around the world have tried to attack Bitcoin, but so far There have been no transaction errors, and it can be considered that the Bitcoin blockchain has been proven to be a safe and reliable system. Therefore, it can be considered that blockchain technology is a way for all people to participate in accounting, and it will bring about innovation in accounting methods. .

VII What are the characteristics of blockchain

Blockchain has the following characteristics:
Decentralization. Blockchain technology does not rely on additional third parties There is no central control for management agencies or hardware facilities. In addition to the self-contained blockchain itself, each node realizes information self-verification, transmission and management through distributed accounting and storage. Decentralization is the most prominent and essential part of the blockchain Characteristics.

Openness. The foundation of blockchain technology is open source. In addition to the private information of the parties to the transaction being encrypted, the data of the blockchain is open to everyone and anyone can use it publicly. The interface queries blockchain data and develops related applications, so the entire system information is highly transparent.

Independence. Based on consensus specifications and protocols (similar to the hash algorithm used by Bitcoin and other mathematical algorithm), the entire blockchain system does not rely on other third parties. All nodes can automatically and securely verify and exchange data within the system without any human intervention

Ⅷ The time stamp in the blockchain has What does it do

Blockchain can ensure that each block is connected in sequence through timestamps: IfThe timestamp signature is recorded on the blockchain, which can prove when something happened on the blockchain, and this information will be stored permanently without worrying about being tampered with.
On the other hand, timestamps can also be said to be a transaction proof mechanism of the blockchain. All transactions and document signings that occur on the blockchain will be recorded through timestamps.
It probably looks like this. These technical problems are mainly learned from friends at Xuanling Network Company. I hope it will be helpful.

Ⅸ The History of the Birth of Blockchain

Many people will be instinctively daunted by the word "blockchain" when they hear it, thinking that it is unpredictable content or A technology has nothing to do with me.

2018 is the first year of blockchain technology. In the past Spring Festival, blockchain has become really popular. The "three o'clock sleepless zone" of the first blockchain community "Blockchain", articles from major media "How to introduce blockchain to seven aunts and eight aunts", novices from all walks of life are ready to enter the currency circle and try their best, etc.

We know that the Internet has connected the world over the course of decades. People don’t talk about whether the world is flat, because as long as you have a computer or a mobile phone, you are closely connected to the entire world. Elites are accustomed to calling the past Internet era the information Internet era.

With the advent of blockchain technology in 2008, humans were caught off guard and drawn into the world of bits. In the future, no matter whether you understand whether you know what blockchain technology is? Do you understand how digital virtual currency is implemented? They have all been coerced into the second era of the Internet: the era of value Internet. What you don’t know is how blockchain technology was born?

David Chaum, the "bishop" figure of cypherpunk in the 1980s and 1990s, invented the cryptographic anonymous cash system Ecash in 1990. Chaum believes that a distributed, truly digital cash system should encrypt people’s privacy.

British cryptographer Adam Baker invented Hashcash in 1997, which used the Proof of Work system. The proof-of-work system is one of the core concepts of Bitcoin.

In 1997, Harper and Stonitta proposed a protocol that uses timestamps to ensure the security of digital files. This protocol has also become one of the prototypes of the Bitcoin blockchain protocol. The biggest feature of timestamps is that when a virtual currency is traded, it is timestamped and it cannot be changed.

Cryptozoology expert Dai Wei invented B-money in 1998. B-money emphasizes point-to-point transactions and immutable transaction records, and every trader in the network keeps track of transactions.

In 2004, Hal Finney, a top developer at PGP Crypto Company, launched the electronic currency "Crypto Cash", which used a reusable proof-of-work mechanism (RPOW).

But their single invention and idea are still not enough to become a world-class virtual currency. Ecash declared bankruptcy in 1998; the proof-of-work system cannot guarantee whether digital currencies have been traded many times; the technical protocol of timestamps is only used on a small scale by the government; in the B.money system, David did not solve the problem of ledger synchronization; finally Halfini's idea is still not enough to become a world-class virtual currency.

In 2008, when all technical conditions were mature and time conditions were mature, a god-level figure was still needed to answer a question: why did the previous virtual currency pioneers fail? The name of the person who answered this question is Satoshi Nakamoto.

He believes that the most important reason for the failure of previous virtual currencies is that they all have a centralized structure, and all transaction data will be aggregated into the company's data center, which is no different from currency issued by the government. Once the company that backs the virtual currency goes bankrupt, or the central server of the general ledger is compromised by hackers, the virtual currency will face the risk of collapse. Satoshi Nakamoto optimized David Chaum's Ecash, integrating timestamps, proof-of-work mechanisms, asymmetric encryption technology, and the structure of UTSO, and ultimately he invented Bitcoin.

It can be seen that blockchain is not a single technology, it is a collection of a series of above-mentioned technologies. Bitcoin is just a typical example of the first large-scale application of blockchain technology. In the future, blockchain technology can be applied to many fields such as financial services and social life.

X What is a timestamp in blockchain technology

Simply put, a timestamp proves what happened on the blockchain at what time and cannot be tampered with by anyone. The blockchain ensures that each block is connected sequentially through timestamps. Timestamp enables
Every data on the blockchain has a time stamp

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 39254 文章总数
  • 3637417访问次数
  • 3090建站天数