为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

朋友做区块链要自己手机验证码怎么办,朋友做区块链要自己手机验证码吗

发布时间:2023-12-06-05:19:00 来源:网络 区块链知识 区块   验证码   朋友

朋友做区块链要自己手机验证码怎么办,朋友做区块链要自己手机验证码吗


请查看相关英文文档

⑴ I just met a friend who asked me to do blockchain. He has a link and QR code to do blockchain software. Is this a scammer?

Be careful, as the current scammers They are all very clever, and some scams are linked together, making it difficult for people to detect them. You can tell your friends to think about it first and then learn more about the specific situation.

⑵ Do you need your own mobile phone number to use the real name of okpay wallet?

You must have your own mobile phone number to use the real name of okpay wallet. Okpay wallet real-name authentication requires the mobile phone number registered with your ID card for authentication. The okpay wallet is a high-quality blockchain software. Users can quickly understand the latest blockchain information in the okpay wallet.

⑶ How to ensure the security of blockchain use?

Blockchain itself solves the problem of large-scale collaboration between strangers, that is, strangers do not need to trust each other. You can collaborate with each other. So how to ensure trust between strangers to achieve each other's consensus mechanism? The centralized system uses credible third-party endorsements, such as banks. Banks are regarded as reliable and trustworthy institutions by ordinary people. People can trust banks and let banks resolve real-life disputes. But how does a decentralized blockchain ensure trust?
In fact, blockchain uses the basic principles of modern cryptography to ensure its security mechanism. The knowledge system involved in the field of cryptography and security is very complicated. I will only introduce the basic knowledge of cryptography related to blockchain, including Hash algorithm, encryption algorithm, information digest and digital signature, zero-knowledge proof, quantum cryptography, etc. You can use this lesson to understand how the blockchain using cryptography technology can ensure its confidentiality, integrity, authentication and non-repudiation.
Lesson 7 of the basic course: Basic knowledge of blockchain security
1. Hash algorithm (Hash algorithm)
Hash function (Hash), also known as hash function. Hash function: Hash (original information) = digest information. The hash function can map a binary plaintext string of any length into a shorter (usually fixed-length) binary string (Hash value).
A good hash algorithm has the following 4 characteristics:
1. One-to-one correspondence: The same plaintext input and hash algorithm can always get the same summary information output.
2. Input sensitivity: Even if there is any slight change in the plain text input, the newly generated summary information will change greatly, which is hugely different from the original output.
3. Easy to verify: both the plaintext input and the hash algorithm are public, and anyone can calculate by themselves whether the output hash value is correct.
4. Irreversible: If there is only the output hash value, it is absolutely impossible to deduce the plaintext from the hash algorithm.
5. Conflict avoidance: It is difficult to find two plaintexts with different contents, but their hash values ​​are consistent (collision occurs).
Example:
Hash (Zhang San lent Li Si 100,000, with a loan period of 6 months) = 123456789012
A record of 123456789012 is recorded in the ledger.
It can be seen that the hash function has 4 functions:
Simplifying information
It is easy to understand, and the hashed information becomes shorter.
Identification information
You can use 123456789012 to identify the original information, and the summary information is also called the id of the original information.
Concealed information
The ledger contains a record such as 123456789012, and the original information is concealed.
Verification information
If Li Si deceives when repaying the loan, Zhang San only lent Li Si 50,000, both parties can use the hash value and the previously recorded hash value 123456789012 to verify the original information
Hash (Zhang San lent Li Si 50,000, with a loan period of 6 months) = 987654321098
987654321098 is completely different from 123456789012, which proves that Li Si lied, successfully ensuring that the information cannot be tampered with .
Common Hash algorithms include MD4, MD5, and SHA series algorithms. Nowadays, the SHA series algorithms are basically used in mainstream fields. SHA (Secure Hash Algorithm) is not an algorithm, but a set of hash algorithms. It was originally the SHA-1 series. Now the mainstream applications are SHA-224, SHA-256, SHA-384, and SHA-512 algorithms (commonly known as SHA-2). Recently, SHA-3 related algorithms have also been proposed, such as those used by Ethereum. KECCAK-256 belongs to this algorithm.
MD5 is a very classic Hash algorithm, but unfortunately both it and the SHA-1 algorithm have been cracked, and are considered by the industry to be not secure enough to be used in commercial scenarios. It is generally recommended to use at least SHA2-256 or higher. Safe algorithm.
Hash algorithms are widely used in blockchains. For example, in a block, the next block will contain the hash value of the previous block, and the content of the next block + the hash value of the previous block The hash values ​​are used together to calculate the hash value of the next block, ensuring the continuity and non-tamperability of the chain.
2. Encryption and Decryption Algorithms
Encryption and decryption algorithms are the core technology of cryptography. They can be divided into two basic types in terms of design concepts: symmetric encryption algorithms and asymmetric encryption algorithms. They are distinguished according to whether the keys used in the encryption and decryption processes are the same. The two modes are suitable for different needs and form a complementary relationship. Sometimes they can also be used in combination to form a hybrid encryption mechanism.
Symmetric encryption algorithm (symmetric cryptography, also known as public key encryption, common-key cryptography),The keys for encryption and decryption are the same. The advantages are high computational efficiency and high encryption strength. The disadvantage is that the key needs to be shared in advance and the lost key is easily leaked. Common algorithms include DES, 3DES, AES, etc.
Asymmetric encryption algorithm (asymmetric cryptography, also known as public-key cryptography) is different from the encryption and decryption keys. Its advantage is that it does not need to share the key in advance; its disadvantage is that the calculation efficiency is low. Only short content can be encrypted. Common algorithms include RSA, SM2, ElGamal and elliptic curve series algorithms. Symmetric encryption algorithm is suitable for the encryption and decryption process of large amounts of data; it cannot be used in signature scenarios: and the key often needs to be distributed in advance. Asymmetric encryption algorithms are generally suitable for signature scenarios or key negotiation, but are not suitable for encryption and decryption of large amounts of data.
3. Information Digest and Digital Signature
As the name suggests, information digest is to perform a Hash operation on the information content to obtain a unique summary value to replace the original complete information content. Information summary is the most important use of the Hash algorithm. Utilizing the anti-collision characteristics of the Hash function, information summary can solve the problem that the content has not been tampered with.
Digital signatures are similar to signing on paper contracts to confirm contract content and prove identity. Digital signatures are based on asymmetric encryption and can be used to prove the integrity of a certain digital content and at the same time confirm the source (or non-repudiation) .
We have two property requirements for digital signatures that make them consistent with what we expect from handwritten signatures. First, only you can make your signature, but anyone who sees it can verify its validity; second, we want the signature to be relevant only to a specific file and not to other files. These can all be used to achieve digital signatures through our asymmetric encryption algorithm above.
In practice, we generally sign the hash value of the information rather than the information itself. This is determined by the efficiency of the asymmetric encryption algorithm. Corresponding to the blockchain, the hash pointer is signed. If this method is used, the previous one is the entire structure, not just the hash pointer itself.
4. Zero Knowledge proof
Zero knowledge proof means that the prover makes the verifier believe that a certain assertion is correct without providing any additional information to the verifier.
Zero-knowledge proofs generally meet three conditions:
1. Completeness: a true proof can allow the verifier to successfully verify;
2. Reliability (Soundness): a false proof It is impossible for the verifier to pass the verification;
3. Zero-Knowledge: If it is proved, no information other than the proof information can be learned from the proof process.
5. Quantum cryptographyQuantum cryptography
As the research on quantum computing and quantum communication receives more and more attention, quantum cryptography will have a huge impact on cryptographic information security in the future.
The core principle of quantum computing is to use qubits to be in multiple coherent superposition states at the same time. In theory, a large amount of information can be expressed through a small number of qubits and processed at the same time, greatly increasing the calculation speed.
In this case, a large number of current encryption algorithms are theoretically unreliable and can be cracked, which makes the encryption algorithms have to be upgraded, otherwise they will be broken by quantum computing.
As we all know, quantum computing is still in the theoretical stage and is still far away from large-scale commercial use. However, the new generation of encryption algorithms must take into account the possibility of this situation.

⑷ A friend asked for a verification code to register True Color World. Is there any risk? Is True Color World a scam?

Because the country’s laws on blockchain projects have regulations, real names must be Authentication ensures authenticity, etc. Therefore, True World strictly complies with relevant laws to force users to undergo real-name authentication.
But if you are worried about your personal information being leaked, you can also choose not to perform real-name authentication. Since you choose to play on this platform, you must be mentally prepared.
True World is an online platform that can be traded at any time. The platform mainly provides users with convenient financial management services to facilitate users to better organize their online blockchain financial management data and help users detect the most important financial information in real time. Market data allows users to better use data to gain benefits. Users can also breed mice on the platform, and then decide whether to buy or sell based on changes in online trading conditions. Users can observe the latest trading conditions, helping users obtain the latest financial services for the convenience of customers

⑸ What does it mean to receive the zbcom verification code

The meaning of receiving the zbcom verification code is to verify whether I am operating.

If the verification code is not obtained by myself using ZB.COM, it is usually caused by someone else entering the wrong mobile phone number. If others do not know the content of the verification code, they will not be able to operate it.

ZB.COM is a blockchain digital currency trading platform. Blockchain is an important concept of Bitcoin and is essentially a decentralized database.

⑹ How do you need a verification code for OuYi trading?

According to OuYi okex regulations, you may also need to enter Google verification code/mobile phone verification code/email verification and other confirmations, and then withdraw coins The application will be posted to the blockchain network, and after the miners confirm it, your currency withdrawal will be completed.
Ouyi OKEX software app is a mobile service platform designed for users to conduct Bitcoin transactions. The software updates the Bitcoin market and dynamics in real time every day, allowing you to follow global trends. Software transactions are guaranteed by the platform throughout the entire process, and account opening and transactions are very simple and convenient.

⑺ Why was the zbcom verification code sent to me?

The zbcom verification code has the risk of leaking mobile phone information or being sent by mistake.
This is a website for blockchain digital currency transactions 1. Mobile phone information is leaked. The mobile phone number that receives text messages is usually the mobile phone number bound to the identity during registration. Under normal circumstances, personal information needs to be protected and not disclosed at will. Prevent property damage.
2. It is possible that someone else got the wrong number, causing the verification code to be sent to their mobile phone.

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 36046 文章总数
  • 3637265访问次数
  • 3078建站天数