区块链匿名性如何实现,区块链匿名吗
随着区块链技术的发展,区块链匿名性也受到了越来越多的关注。区块链匿名性是指在区块链网络中,用户可以实现安全和隐私保护的能力。它可以确保用户的隐私,以及保护用户的资产安全。
区块链匿名性主要可以通过区块链的公开性和链上的数据加密来实现。首先,区块链的公开性意味着,不管是矿工还是用户,他们都可以使用区块链网络,而不必担心自己的隐私被泄露。
其次,区块链上的数据加密可以有效的保护用户的隐私。比如,在发送交易时,用户可以使用加密算法,将自己的资产信息进行加密,以防止他人查看和窃取。
此外,区块链的去中心化特性也可以有效的保护用户的隐私。由于没有中心机构,所有的交易都是由网络中的矿工进行验证,而不需要用户提供任何个人信息,这就可以有效的保护用户的隐私。
总的来说,区块链的公开性、数据加密和去中心化特性可以有效的实现区块链匿名性。它可以保护用户的隐私,以及保护用户的资产安全。因此,区块链匿名性是保护用户隐私的重要手段,也是区块链技术发展的重要方面。
请查看相关英文文档
『一』 What exactly does the transparent transaction anonymity feature of the blockchain mean?
1. Decentralization.
Blockchain technology does not rely on additional third-party management agencies or hardware facilities, and there is no central control. In addition to the self-contained blockchain itself, through distributed accounting and storage, each node realizes self-verification and transmission of information. and management.
2. Openness.
The foundation of blockchain technology is open source. In addition to the private information of the parties to the transaction being encrypted, the blockchain data is open to everyone. Anyone can query blockchain data and development related information through the public interface. application, so the entire system information is highly transparent.
3. Independence.
Based on consensus specifications and protocols (similar to various mathematical algorithms such as the hash algorithm used by Bitcoin), the entire blockchain system does not rely on other third parties, and all nodes can automatically and securely verify and exchange within the system Data without any human intervention.
4. Security.
As long as you cannot control 51% of all data nodes, you cannot manipulate and modify network data at will. This makes the blockchain itself relatively safe and avoids subjective and artificial data changes.
5. Anonymity.
Unless there are legal requirements, technically speaking, the identity information of each block node does not need to be disclosed or verified, and information transfer can be done anonymously.
Extended information:
1. What is blockchain? One sentence summary.
Answer: Blockchain is an encrypted database chain, that is, transaction data in multiple timestamps/events are encrypted and associated together. The data cannot be tampered with and can be shared.
2. Performance and logic:
a. External operation manifestations: bank deposits, withdrawals, remittances, entries and exits, shopping, etc.
b. Internal logic processing (software program): After manual operation, the data will be encrypted and then stored in the database. The data will be divided into areas through the program, such as classifying and putting together the data that occurred within the event and timestamp. is the data for a region. The association of data occurring within multiple events and timestamps is the blockchain. The encrypted data can be shared but cannot be tampered with.
c. Sharing manifestations: querying personal information, checking accounts, etc. Query permissions/sharing permissions: Different permissions query different data. For example, a bank can check everyone's information, but an individual can only check personal information.
3. Most of the examples given are different, but the logical processing ideas are the same, but the implementation methods and operations are different.
4. Blockchain: It has the characteristics of encrypted data, non-tamperable data and shared data.
5. Blockchain technology: a technology that uses editing programs to encrypt, partition, and share data.
Open, consensus, anyone can participate in the blockchain network, each device can be used as a node, each node is allowed to obtain a complete copy of the database, and the nodes are based on A set of consensus machinessystem and jointly maintain the entire blockchain through competitive calculations.
Decentralized and trustless mechanism, the blockchain consists of many nodes forming a point-to-point network. There is no centralized equipment and management organization. Data interaction between nodes is verified through digital signature technology, without To trust, you only need to follow the set rules. There is no problem of deception or distrust between nodes.
Transactions are transparent and both parties are anonymous. The operating rules of the blockchain are open and transparent. All data information is also public. Each transaction is publicly visible to all nodes. Since there is no trust between nodes, Nodes do not need to disclose their identities, and each participating node is anonymous.
It cannot be tampered with and is traceable. Modifications to the database by a single node or even multiple nodes cannot affect the databases of other nodes. Every transaction in the blockchain is cryptographically linked to two adjacent areas. Blocks are concatenated so that all records of each transaction can be traced.
『二』Bitcoin is not 100% anonymous, how to achieve reasonable anonymity
Bitcoin is often used as an anonymous currency, because Bitcoin You can send and receive Bitcoin without providing any personally identifiable information. However, Bitcoin itself is not 100% anonymous in most cases. Sending and receiving Bitcoin is like an author publishing under a pseudonym. If an author's pseudonym is tied to their identity, anything they ever write will be tied to them. For Bitcoin, your anonymity is the wallet from which you receive your Bitcoins. Every transaction involving this address will be permanently stored in this blockchain. If your address is linked to your real identity, then every transaction will be associated with you, but achieving reasonable anonymity is possible.
Buying Bitcoin Anonymously
The first thing you can do is buy Bitcoin anonymously.
The first option is to buy them with cash to avoid transacting entirely online. Most online transactions are similar, it requires you to upload your ID card. You can buy Bitcoin with cash from an ATM or meet the seller in person. There is more information on how to buy Bitcoin with cash in our Buy Bitcoin with Cash section.
The second best option is to buy them on the VirWox website. It’s not really completely anonymous, as you need to reveal some information, but it’s still better than most Bitcoin transactions that require you to provide a required bank account and personal documents.
You don’t need anything here, you just need a free account to trade virtually. Using this account it is possible to buy another currency - Second Life Linden Dollars (SLL). You have different options to buy Linden Dollars such as PayPalandSkrill. But a good option considering anonymityIt's paysafecard payment. With paysafecard you can buy Bitcoin in any store. With paysafecard you can cash out and your Virwox funds anonymously even without an ID, bank account or credit card. Then you can easily exchange your Second Life Linden Dollars for Bitcoin without verification.
Finally, you can also earn Bitcoin through anonymous Bitcoin loans.
In our experience, it is impossible to buy Bitcoin anonymously with a credit card.
virwox-anonymously-buy-bitcoin
Mixing your Bitcoins
Especially important if you already own your Bitcoins , Bitcoin users can mix each other's transactions with other users by using mixers, so Bitcoin mixers are also called Bitcoin "tumbling" or "laundry". It is the server that breaks the connection between you and your Bitcoin account. Mixers mask the flow of your Bitcoins from one address to the next, and while a Bitcoin mixer cannot guarantee 100% anonymity, it provides a very high level of anonymity.
We recommend that you use high-quality online coin mixing services, such as Bitcoin Mixer or Currency Mixer, which allow regular Bitcoin transactions for users who cannot link to the original. To further enhance the security of transactions, they provide the opportunity to use two or more forwarding addresses and an appropriate time delay to immediately delete all archive log related transactions. You can also use SharedCoin since it's free but a bit complicated. Alternatively, if using the anonymous Tor browser, you might try Bitcoininfog.
It is important to note that there are many fraudsters offering Bitcoin mixing services.
Bitcoins are usually stored in a software program called a Bitcoin wallet. If your wallet is identifiable with your personal information, then the above information will not help you. If you want to remain fairly anonymous when using Bitcoin, such as paying for adult websites, then you should at least register an anonymous account with a wallet and a disposable email address.
You can also use a different wallet for each transaction to avoid having multiple transactions traced to you. It's like maintaining multiple separate identities. An easy way to maintain multiple wallets is to use a simple and lightweight software wallet - MultBit, which allows multiple wallets to be managed on a single software program.
If you want to be more anonymous, we recommend you to make a Bitcoin wallet, tooPerhaps an easier way is to use the code at bitaddress.org.
The OpenBitcoinPrivacyProject has released their first complete report on the privacy levels of various Bitcoin wallets. The best and most private Bitcoin wallet is darkwallet, The next two wallets with good concealment are armory and mycelium.
Anonymous Bitcoin Debit Card
E-coin is a British company that has launched a virtual and physical VISA debit card that can store Bitcoin. There is currently a small fee to use this debit card.
You can order by designated credit or debit card in USD, EUR and GBP. All it requires is a valid email address and basic personal information to sign up, and once you request to sign up for a debit card, it will be sent to your email address. However, E-Coin currently does not provide Bitcoin debit card services to the United States.
You can use E-coin credit cards until you reach the limit. You can get a card without verification and use it up to $2,500. Once you reach the limit, you will have to verify your identity – a scan of your ID or passport and proof of address, or order a new card if you prefer debit cards from Mastercard, BitGold and Advancedcash That's ok too.
Bitcoin transaction records
Bitcoin transactions are never truly anonymous and can be queried through the blockchain (blockchain is a comprehensive system that records Bitcoin transaction records sex database).
Almost all transactions require you to verify your identity by sending scanned personal identification, and large transactions are also required to be reported to government authorities. When you use Bitcoin to pay for goods and services, you need to provide your name and address to the seller multiple times. This means that if someone is interested in tracking your trading activities, they can use your ID card information to track your future trading activities or study your previous trading activities. All in all, this has compromised your security and privacy.
『三』How is the security of blockchain and what are the risks of blockchain
The hottest topic at the beginning of the new year is blockchain, but there are also Many people are skeptical about its security and risks. So what is the security of blockchain? What are the risks of blockchain? Below we will give you the answers one by one. I hope it will be helpful to you after reading them.
How is the security of blockchain Anyuan?
First of all, blockchain is a distributed database technology. Distributed technology mainly refers to storage architecture. The points taken by blockchainThe distributed architecture not only stores ledger data on each node, but also each node must contain the data of the entire ledger. This completely distributed architecture brings extremely high security, and no one can destroy all nodes at the same time.
Secondly, blockchain technology can achieve tamper resistance through "blocks" and "chains". The unit of data storage in the blockchain is the block. When each block is generated, it must contain the unique "characteristic value" of the previous block (which can be regarded as the ID card of the block). Each block is generated strictly according to the The order of time is lined up to form a "chain".
Security is a major feature of blockchain technology. However, from the perspective of privacy protection, the block chain emphasizes openness and transparency, and any node has the right to operate according to the consensus algorithm, so it is not suitable for scenarios where data privacy needs to be protected.
What are the risks of blockchain?
1. Technical risk: For example, the launch of Ethereum was once popular, but because it is a digital currency with smart contracts, it brings the risk of hacker attacks due to possible loopholes in smart contracts. THEDAO, the largest crowdfunding project in Ethereum, was hacked and lost more than $60 million.
2. Legal risks: The legality issues of digital currency issuance, notarization and confirmation of rights, and legality issues of evidence, including legality issues of smart contracts, digital bills, accounting and liquidation, and equity crowdfunding, are currently in my country and The rest of the world is still legally blank.
3. Crime risks: Using digital currencies to abscond with the money, using digital currencies to launder money and illegal gambling, using smart contracts and digital bills designed to defraud profits, using blockchain technology to commit anonymous crimes, etc. Due to the current regulatory gap, there may be huge criminal risks.
The above is what the editor brings to you. How about the security of blockchain? What are the risks of blockchain? of the entire content.
『四』Aren’t blockchain transactions anonymous? Why do exchanges need identity authentication?
Identity authentication comes from the KYC system. First, let’s talk about what KYC is. KYC (know-your-customer) is a basic system in the financial industry. Traditional financial institutions will require customers to provide identification, location, employment certificate, income and other information, mainly to comply with anti-money laundering and the Anti-Terrorist Financing Rules (AML-CFT), while the requirements for cryptocurrency exchanges are relatively low, generally only requiring real-name authentication.
Ordinary users conduct cryptocurrency transactions through exchanges. Centralized exchanges basically require KYC. Although there are already decentralized exchanges that do not require KYC, they have few users, poor liquidity, and Compared with centralized exchanges, they are still non-mainstream (although Binance DEX is a decentralized exchange, it also requires KYC). This has also resulted in KYC becoming a step that users must go through to enter the crypto market.
Many people have doubts about this. Does KYC violate the decentralized spirit of cryptocurrency? Will their KYC information be abused?The author believes that these two points are not contradictory. Although cryptocurrency is decentralized, the exchange itself is not. In today's chaotic currency circle, KYC is still necessary.
The purpose of KYC by exchanges is to ensure that only qualified people can use a service and to prevent minors, illegal elements or users from countries that do not provide services from using it.
At the beginning, many exchanges did not require KYC. At that time, the encryption market was still very weak and did not attract the attention of regulatory authorities. However, as the size and influence of the encryption market grows, the government can no longer continue to ignore it. Regulators in various countries have introduced policies to incorporate the cryptocurrency industry into the traditional financial supervision field. The price of cryptocurrency compliance is having to adhere to strict KYC/AML-CFT regulations.
The anonymity and transnational circulation of cryptocurrency make it very suitable for use in various illegal activities. This is also a very powerful excuse for anti-crypto people to attack Bitcoin. During the Libra hearing, both Trump and the U.S. Treasury Secretary focused on this issue. The AML-CFT rules are a system designed to prevent criminals from being used by criminals involved in illegal activities such as terrorist financing and money laundering.
Of course, the implementation of KYC by exchanges is not entirely due to policy reasons. Security factors are also a major motivation. If an exchange allows anyone to trade without verifying their identity, it will easily attract criminals and become a breeding ground for money laundering and fraud. After KYC, the exchange can grasp the true identity of the users and find them if there is a problem, which is conducive to combating crime and protecting the security of user assets.
KYC also plays a role in suppressing fraudsters and fake accounts. In order to attract new and active users, many exchanges have various activities such as airdrops, invitation rebates, and trading competitions. Without KYC, the wool party can register a large number of accounts at almost zero cost through the code receiving platform, but KYC has raised the threshold a lot, which is also the way many platforms now combat the army of account swiping.
The method that takes into account both privacy and KYC does not yet exist. In order to ensure the interests of exchanges and customers, it is foreseeable that the current KYC model will continue to exist for a long time.
As users, we can only improve our security awareness. In order to ensure the security of KYC information as much as possible, we must choose a large and guaranteed trading platform. The KYC systems of these exchanges are more complete and are relatively safer. In addition, information such as watermarks and timestamps can be added to the image before submitting KYC information, so that the harm of leakage is very limited.
『五』What is blockchain
When everyone talks about blockchain and digital currency, they all turn pale and avoid them in fear
What is blockchain?
What is digital currency?
Let the public understand this more intuitively and clearlyIt’s blockchain.
What is blockchain? Many people are still not very clear about blockchain. Let’s give you a simple explanation. Let’s take a look.
1. Blockchain concept
Professional terminology: Blockchain is a distributed data storage, point-to-point transmission,
consensus mechanism, encryption algorithm and other new application models of computer technology.
Popular handout: Quoting the explanation in the video, the blockchain replaces all these opaque cups with transparent cups, so that you can always know where your money is, and it will always belong to you. Will be stolen by others.
2. Blockchain
Basic characteristics
1. Decentralization
In traditional centralized network systems In a decentralized blockchain network, hackers can destroy the network by attacking a central node. However, in a decentralized blockchain network, there is no central node to attack
Moreover, the decentralized transaction method is convenient and convenient. There is no third party intervention, and point-to-point direct interaction makes large-scale information interaction a reality
It not only ensures that the information is not leaked, but also ensures that the key is in your hand, and transactions can be fast and convenient.
2. Openness
The system is open. In addition to the private information of the transaction parties being encrypted, the blockchain data is open to everyone and anyone can Query blockchain data and develop related applications through public interfaces, so the entire system information is like a transparent cup, and everyone can see the contents inside.
3. Information cannot be tampered
When a block is verified and added to the blockchain, it will be stored permanently and cannot be changed unless the system is controlled at the same time. More than 51% of the nodes, otherwise the modification of the database on a single node will be invalid, so the data stability and reliability of the blockchain are extremely high.
4. Anonymity
Since the data exchange between nodes in the blockchain follows a fixed and predictable algorithm, the blockchain network does not require trust and can be based on addresses. Non-personally identifiable data is exchanged. The anonymity of the blockchain is a double-edged sword. It not only protects the confidentiality of information and the security of transactions, but it also causes rampant illegal transactions. It has caused difficulties for law enforcement agencies and created a sense of distrust among users.
The above is a partial introduction to the basics of blockchain. I believe that as the public learns more and more about blockchain, thisThis technology will be recognized and used by more people.
『Lu』 How Monero achieves anonymity
Monero provides anonymity through ring signatures. What does ring signature mean? In the Monero blockchain network, the network first mixes the signer's public key with another public key, and then signs the message, making it impossible for the outside world to distinguish which public key in the set corresponds to the real signer. Much like when a joint letter was signed in ancient China, in order not to reveal which one was the initiator, it was usually signed by everyone to form a ring, with no order, so that no one knew who was the initiator. The anonymity of Monero can even prevent the person who sends the coins from knowing which address the coins are sent to, and the person who receives the coins does not know who sent the coins just by opening the wallet.
『撒』 How to set private privacy in Jack Ma’s blockchain
As a decentralized database technology, the private privacy setting of blockchain is a very important part. Jack Ma may set up the following aspects of privacy protection on his own blockchain:
1. Identity verification: On Jack Ma’s blockchain, individual users can protect their privacy through identity verification. This means that only authenticated users can access specific information.
2. Encrypted data: Jack Ma can use blockchain technology to encrypt personal data to prevent unauthorized access. This encryption technology protects user privacy by ensuring that only authorized users can access data.
3. Anonymous transactions: An anonymous transaction function can be set up on Jack Ma’s blockchain, allowing users to conduct transactions without exposing their identities. This approach can protect user privacy to the greatest extent.
4. Restrict access rights: Jack Ma can set access limits on the blockchain to only allow specific users or organizations to access specific information. This approach protects user privacy by ensuring that only authorized people have access to sensitive information.
In short, Jack Ma can protect his blockchain privacy through various means such as identity or verification, encrypted data, anonymous transactions and restricted access rights. These measures ensure that users’ data and privacy are protected to the greatest extent possible.
『Eight』 Three minutes to understand the blockchain BSC dark horse anonymous currency DCS
Easy to understand the DCS anonymous currency.
Preface: Privacy issues currently faced by the blockchain
People who have read the Bitcoin white paper should know that the blockchain is not anonymous and is too open and transparent. As a result, there is no privacy for individuals. Each transaction has a hash value. The browser hash value can be traced back to the address’s transaction record, amount, time, initial purchase route, and even the flow of funds. Finally, the address holder and assets can be traced. All information is made public and transparent, which results in no privacy for everyone.
1. What is a privacy coin?
To put it simply, it makes assets traceable and solves the problem of blockchain transfers being too transparent. Ordinary transfers can be traced and recorded through hash values. Through the DCS concealment system, each transfer is concealed, protecting asset privacy!
2. What is the technical principle of DCS anonymous currency?
When you have a crypto asset that you want to transfer to B, you need to first transfer the funds to the contract address through the DCS tracking system. At this time, the DCS tracking system will give you a string of withdrawals. Voucher. Only with this voucher can you withdraw the money. The withdrawal voucher can be withdrawn by anyone. However, if the withdrawal voucher is lost, the funds will be permanently stored in the hard-coded contract address. The funds you withdraw are not yours. You are only qualified to withdraw such a sum of funds from the system. Countless people come and go to deposit and withdraw money every day. You don’t know whose funds were taken away. This is the concept of currency mixing, thus achieving the effect of anonymity!
3. What makes DCS superior to other anonymous coins?
There have been many anonymous coins on the market, including Zcoin, Monero, Dash, etc., which are relatively good, but they only support their own currencies for anonymity. Users If you want to remain anonymous, you must purchase their coins to remain anonymous. The DCS anonymous currency system supports multiple currency anonymity, such as DCS, USDT, BTC, ETH, and many more. It has greater development potential than previous anonymous coins. Other anonymous coins Currently, the currency is basically over 200 knives, and the DCS is currently only about 1.3 knives!
4. What is the DCS economic model?
The total amount of DCS issued is 60 million, and the final number is destroyed to 21 million. 3 million are circulated in the early stage, and the output is halved every six months. The remaining coins are mined on the chain and produced in each block. The fixed output is divided into three aspects: liquidity staking, node mining, and certificate opening. The above three output methods are weighted equally. The more participants, the less points you get!
5. How does DCS earn revenue?
1. Open a certificate for mining: Every time you use the DCS concealment system, the system will deduct a handling fee of RMB 2,000, and at the same time give you a certain amount of equity, which can allocate the coins produced in this block.
2. Liquidity staking mining: Purchase and stake DCS to mine DCS. Each block has a fixed amount of output, which is weighted equally across the entire network. The more pledged across the entire network, the less points will be generated, and the output coins will be There are so many people with fixed points!
3-node mining: When the amount of DCS pledged by your network reaches a certain amount, it becomes a different node. Each node also produces fixed coins according to the block. The more nodes there are, the fewer coins will be produced. The less naturally!
4. Handling fee dividend: Users use DCS for anonymity, and 40% of the handling fee collected is weighted and evenly distributed to users who pledge DCS across the entire network!
The price of existing anonymous coins on the market is basically around 200 dollars, while DCS is only around 1.3 dollars. Moreover, it has a huge demand market and a perfect economic model + deflation destruction mechanism, which will eventually stimulate DCS to reach higher levels. At present, it has been in a settling period. As supervision is strengthened, the demand for it will surge in the later period, including some institutions, enterprises, and even users. The awareness of privacy protection will become stronger. Embrace the late trend of the privacy coin sector, ambush in advance, and join hands to welcome this blue ocean market worth hundreds of billions in the future!