http区块链
请查看相关英文文档
Will IPFS replace HTTP?
At least in the short term, there is no hope!
Although Some people say: IPFS will replace the Internet Protocol (HTTP). So what exactly is IPFS and can it replace HTTP?
What is IPFS
IPFS (also known as Interstellar File System) is a point-to-point distributed file. It can make our Internet faster, more secure, and more open.
Disadvantages of current HTTP
Our current Internet life is closely related to HTTP. It can be said that without HTTP, our current Internet life would not be possible. But as something that has been running for 20 years, there must be some flaws.
HTTP’s centralization is inefficient and costly. In a centralized protocol system, the information you want to download is stored in the server. Every time you download a file using the HTTP protocol, you have to download it from a centralized server. When downloading a file, one server can only serve one client, which is very inefficient.
If we use the hierarchical structure of current Internet applications to compare future blockchain applications, there will be three kings of the track. There are public application chain systems, file storage systems and data management systems. As a seed player in the file storage system, IPFS's technical strength has been widely recognized by the outside world, and it is bound to take the lead first.
IPFS is stable and great, but it also has obvious problems:
IPFS is based on the mature technology of BT software. There are not many modifications in the core. In theory, it can be compared with The current BT software is interoperable (of course it does not do this).
The biggest innovation of IPFS is the use of DAG technology to transform data from a seed file organization into a file system organization. Due to the HASH used by IPFS The path has unlimited namespaces, so in theory people all over the world can put all files under the same file system. This is also the origin of the name of the IPFS interstellar file system.
The second major innovation of IPFS is the concept of Dweb. Our network today is based on the HTTP protocol. HTTP is a centralized traffic model, which is a serious It wastes bandwidth resources and relies heavily on the global backbone network. Of course, this also provides convenience for some major countries to control the network. It is also more convenient for hackers to DDoS you if you are unhappy. The IPFS Web is a P2P node network without a specific server.
Problems with the IPFS project
1. There is a lack of ecological incentives to ensure the operation of IPFS nodes
IPFS is just a protocol technology. Without an incentive ecosystem, everything is empty and unachievable.
Second, DWeb is difficult to implement
There is currently no hope that the Web browser itself supports IPFS, and it can be connected to the specified server through IPFS_API Node, all the current advantages are actually incomplete and cannot be self-consistent. And after connecting to a specific node, this shortcoming will cause the entire system to remain centralized.
The innovation and imagination of IPFS have attracted the attention of many people around the world and helped them solve the problems they faced, including the Hero Node project and the official FileCoin. And it's just a technical protocol, so IPFS itself can't fail.
The two major pain points of IPFS are: the lack of ecological incentives to ensure the operation of IPFS nodes and the difficulty of implementing DWeb.
㈡ What are the differences between blockchain and the Internet
Blockchain is essentially a decentralized ledger system that is decentralized, open, and information cannot be tampered with. Programmable and other features can be used as the underlying storage and transmission protocol of the value Internet. Blockchain is expected to lead us from personal trust and institutional trust to the era of machine trust. The consensus mechanism is the core of regional chain construction. Digital currency is just the beginning. Blockchain can change more. It can reshape the world's trust system and solve many problems in the past where the cost of trust was too high.
As an analogy between blockchain and the Internet, they have one core difference: the values of the underlying protocols and upper-layer applications of blockchain and the Internet are completely reversed. Mainly due to the two core characteristics of the blockchain:
The first characteristic is that zero-knowledge proof causes changes in data ownership. In other words, the user's personal data on the blockchain belongs to the user and does not need to be provided to the application and stored on a central server. Then Internet application layer services, such as BAT, the core supporting "data" behind the market value, have lost their original value in the blockchain field.
Another feature is the economic incentive model brought by tokens, which gives extremely high value to the underlying protocol. In the Internet era, no one paid for the http protocol, no one paid for sending and receiving emails, and no one paid for Google's search services.
What are the basic concepts of blockchain programming and development technology
With the continuous development of the Internet, the development and application of blockchain technology has also been put on the agenda. Today java Course http://www.kmbdqn.com/ Let’s learn about the basic concepts that need to be mastered in blockchain programming and development technology.
1. Blockchain technology
Chain data structure, the header of each block stores the hash value pointing to the previous node, which is connected in turn.
Based on the P2P network, the distributed node consensus algorithm maintains and updates data to ensure that the data is "non-tamperable".
Use cryptography principles to ensure the security of data transmission and access.
Automated scripts (smart contracts) to program and manipulate data.
Essentially it is a decentralized database, and what it ultimately wants to solve is the trust issue in Internet transmission.
2. Decentralization
The entire network is jointly participated and maintained by each node, and does not rely on central processing nodes , each node is a center.
Data storage and update are distributed and do not require intermediary or trust structure endorsement.
3. Private chain, public chain and alliance chain
Private chain:
p>Participating nodes have limited qualifications and controllability, and limited reading and writing.
Weak centralization solves the problem of trust among "teammates" (within the organization).
Public chain:
Open, anyone can read the data on the chain and participate in transactions.
Completely decentralized, the data on the chain cannot be tampered with by any person or institution.
Encourage participants to compete for accounting rights through a reward token mechanism.
Solve the problem of "human beings" (all people) being untrustworthy.
Consortium chain:
It is jointly participated, maintained and managed by multiple institutions. The data on the chain is only allowed within the system. Institutions read, write, and trade.
Partially decentralized, each institution runs one or more nodes.
Solve the problem of "organizational" (inter-agency) distrust.
㈣ What exactly should you learn about blockchain?
As we all know, blockchain is a product of recent years, but the market can focus on blockchain-related courses. It is said that there are many kinds of them, each with its own merits. Here, I will make a statistics for everyone, let’s learn, discuss and communicate together!
Blockchain
1. What is blockchain?
2. Prequel to Cryptocurrency: From David Chaum to Satoshi Nakamoto
3. What is decentralization? How does Bitcoin achieve decentralization?
4. How Bitcoin is transferred - five technologies of the Bitcoin blockchainSpecific details
5. Distributed ledger and decentralized network
6. UTXO: unspent transaction output, one of the core concepts of Bitcoin
7. Data structure of Bitcoin blockchain
8. Proof-of-work consensus mechanism
9. What does mining mean? What did the miners do?
10. What are the applications of blockchain? What changes will blockchain bring?
11. Blockchain will become the basic protocol of the Internet, similar to TCP/IP and HTTP
12. What is Ethereum? Why is it said to be the representative of Blockchain 2.0
13. Who is Buterin? He is the founder of Ethereum and a real bigwig in the blockchain industry
14. What is a smart contract?
15. What is an Ethereum smart contract?
16. Buterin talks about Ethereum’s Token system
17. Machines need tokens more than people
18. What is the ERC20 token standard?
19. The DAO crowdfunding event and the Ethereum fork
20. How should the token be designed? How to represent assets?
21. Classification of tokens (list of various classifications)
22. Technology and components of Ethereum smart contracts
23. ERC721 standard and CryptoKitties
24. Ethereum accounts (external accounts and contract accounts)
25. Four major characteristics of blockchain
26. Blockchain 3.0 is What does it look like?
27. What is EOS? What is the difference between EOS and Bitcoin and Ethereum?
28. EOS consensus mechanism and block generation
29. Daniel Larrimo (BM): the main developer of EOS
30. 1 Zhang Tu understands what EOS is
31. The "Impossible Triangle" of blockchain
32. What does blockchain application (decentralized application) look like?
33. How to recover the EOS key after it is stolen?
The Xueshuo Innovation Blockchain Technology Workstation under Lianqiao Education Online is the only "blockchain technology" approved by the "Smart Learning Workshop 2020- Xueshuo Innovation Workstation" carried out by the School Planning and Construction Development Center of the Ministry of Education of China. Professional” pilot workstation. The professional base is based on providing students with diversified growth paths, promoting the reform of the training model integrating professional degree research, production, and research, and building an applied and compound talent training system.
㈤ There are many blockchain applications now. What kind of blockchain applications are good? Where can I get a clear understanding of them?
I want to know about blockchain applications. , you can refer to many books and opinions, including "Blockchain in Pictures", "Blockchain: Reshaping the Economy and the World","New Economic Blueprint and Introduction", as well as articles on Binance Community, including a detailed understanding of the Binance Community platform, which is extremely powerful.
1. What is blockchain
Blockchain, as the name suggests, is composed of blocks and chains. It is a distributed data storage , point-to-point transmission, consensus mechanism, encryption algorithm and other new application models of computer technology. It is a chained data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be an untamperable, unforgeable, safe and trustworthy distributed ledger.
In 2008, Satoshi Nakamoto first proposed the concept of blockchain and encrypted digital currency in his paper "Bitcoin: A Peer-to-Peer Electronic Cash System". Starting from Bitcoin, blockchain has become the underlying technology of various digital currencies.
2. The working principle of blockchain:
1. Basic concepts include:
(1) Transaction: one operation will change the ledger status once , such as adding a record;
(2) Block: records transactions and status data that occurred within a specified time, which is a consensus and preservation of the current ledger status;
(3) Chain ( Chain): It is composed of blocks connected in chronological order and is a log record of the entire state change.
Understanding the working concept of blockchain, it is not difficult to understand its working principle. Suppose there is a distributed data record book. This record book only allows additions, deletions and changes. Its structure is composed of individual data records. A linear chain formed by "blocks" connected in series (this is also the origin of the name "blockchain"). To add new data, it must be placed in a new block. The maintenance node can propose a new block. However, a certain consensus mechanism must be used to reach agreement on the final selected block.
2. Take Bitcoin as an example to see how the blockchain works.
Bitcoin blocks are divided into two parts: block header and block body.
3. Core advantages and characteristics of blockchain
1. Decentralization
Block The processes of verification, accounting, storage, maintenance and transmission of chain data are all based on the distributed system structure. There is no centralized hardware or management organization. The rights and obligations of any node are equal. The data blocks in the system are composed of Nodes with maintenance functions in the entire system are jointly maintained.
2. Open and transparent
The system is open. In addition to the private information of the transaction parties being encrypted, the blockchain data is open to everyone, and anyone can query the blockchain through the public interface. Data and development related applications, so the entire system information is highly transparent.
3. Security
Blockchain adopts consensus-based specifications and protocols (such as a set of open and transparent algorithms) to make the entire systemAll nodes can exchange data freely and securely in a trustless environment, so that trust in "people" is changed to trust in machines, and any human intervention has no effect.
4. Information cannot be tampered
Once the information is verified and added to the blockchain, it will be stored permanently. Unless more than 51% of the nodes in the system (almost impossible) can be controlled at the same time, otherwise Modifications to the database on a single node are invalid, so the data stability and reliability of the blockchain are extremely high.
5. Anonymity
Since the exchange between nodes follows a fixed algorithm, the data interaction does not require trust (the program rules in the blockchain will judge whether the activity is valid by itself), so the counterparty does not need to Making the other party trust you by disclosing your identity is very helpful for the accumulation of credit.
4. Classification of Blockchains
Currently, the most mainstream classification of Blockchains is to divide Blockchains into Public Blockchains based on different participants. ), Private Blockchain and Consortium Blockchain.
1. Public chain: Anyone can participate in the use and maintenance, and can obtain effective confirmation of the blockchain. The public chain is the earliest blockchain and the most widely used blockchain at present. , typically such as the Bitcoin blockchain, the information is completely public.
If a permission mechanism is introduced, it will include private chain and alliance chain.
2. Private chain: A company or individual only uses blockchain technology and has exclusive write permission to the blockchain, and the information is not made public. At present, conservative giants (traditional finance) all want to experiment with private blockchains, and the application products of private blockchains are still being explored.
3. Consortium chain: It is a blockchain between the public chain and the virtual chain, jointly controlled by multiple organizations. The use of this chain is managed with authority and can be controlled by managers and also based on The manager's wishes are open to others.
In addition, according to the different usage scenarios and purposes of blockchain, it is divided into currency chains for the purpose of digital currency, property rights chains for the purpose of recording property rights, crowdfunding chains for the purpose of crowdfunding, etc. .
5. Analysis of specific application scenarios of blockchain
1. Information anti-counterfeiting
On May 28, Tencent CEO Ma Huateng spoke at the Guiyang Digital Expo The problem of Moutai anti-counterfeiting has been raised: the anti-counterfeiting method based on cloud-based comprehensive blockchain technology will be much more efficient than traditional anti-counterfeiting methods. In future anti-counterfeiting verification scenarios, users may only need to perform a simple scan with their mobile phone to obtain a large amount of complete information based on different dimensions.
Take Moutai as an example:
Distillery address, production workshop, operating employees, inspectors, factory time, transportation vehicle information and driver information,
Wine vintage raw material source, raw material supplier, storage warehouse number, raw material transportation vehicle and driverInformation,
All information can be accurately traced to its source, permanently recorded and cannot be tampered with.
The authenticity can be easily verified based on the above information.
2. Food safety issues
As early as November last year, Walmart had cooperated with IBM to ensure food safety by using blockchain technology to track food sources. safety and increase the circulation of food to reduce costs. For large supermarkets such as Wal-Mart, when food safety problems occurred in the past, it took several days to investigate the source of the problematic food. After using this technology, only one piece of information about the product is required. It can accurately trace the source of important information such as food origin, inspectors, suppliers, logistics and transportation, and quickly detect problems within a few minutes. Currently, products tracked using blockchain include packaging products in the United States and pork in China.
3. Information Security
Blockchain technology is promoting a revolution in information security technology. Three major security threats: man-in-the-middle attack, data tampering, and DDoS
(1) Identity protection
PKI is a common public key encryption used in various communication applications such as email, messaging applications, and websites. technology. However, since most PKI implementations rely on a centralized trusted third-party certification authority (CA) to issue, activate and store user certificates, hackers can attack PKI to fake user identities or crack encrypted information.
CertCoin is the first blockchain PKI implementation, coming from MIT, which removes the centralized certification center and uses the blockchain as a distributed ledger of domain names and public keys.
Pomcor Company: Blockchain PKI implementation path: retain the certification center and use the blockchain to store hash values of issued and activated certificates. Users can verify the authenticity of certificates through decentralized and transparent sources, while also improving network access performance through local authentication of keys and signatures based on blockchain copies.
(2) Data integrity protection
GuardTime has developed a keyless signature architecture (KSI) based on blockchain technology to replace key-based data authentication technology. KSI stores hashes of the original data and files on the blockchain, runs hashing algorithms to verify other copies, and compares the results with the data stored on the blockchain. Any tampering with the data will be quickly detected because the original hash table is stored on millions of nodes.
(3) Protection of critical infrastructure
The "Achilles' heel" of the Internet, DDoS has entered the TB era, and DDoS is still the easiest way for hackers to defeat large targets at low cost. As a weapon, DNS services are the primary target for hackers to carry out large-scale damage, but blockchain technology is expected to fundamentally solve it.
The distributed storage of blockchain makes hacker attacks lose focus. Nebulis is developing a distributed DNS system using the Ethereum blockchain and the InterPlanetary Internet File System (IPFS, a distributed alternative to HTTP product) to registerand resolve domain names. The biggest weakness of DNS is caching. Caching makes DDoS attacks possible and is also the bane of centralized governments censoring social networks and manipulating DNS registrations. A highly transparent, distributed DNS system can effectively prevent any entity, including the government, from manipulating records.
IV. Financial Industry
(1) Digital Currency: Improving the convenience of currency issuance and use
For example, foreign Bitcoin and Ethereum, our country currently There are Nuo Compao and so on.
From the use of physical transactions, to physical currency and credit currency, to the rise of the Bitcoin network, more people are aware of the distributed ledger blockchain technology behind it, and gradually outside of digital currency applied in many scenarios.
(2) Cross-border payment and settlement: realize point-to-point transactions and reduce intermediate costs
Transfer and payment. At present, the most mature application of blockchain technology is payment and transfer. Blockchain technology can avoid complicated systems, save the process of inter-bank reconciliation and review, and speed up settlement; using virtual currency does not require the intervention of a clearing house, reducing transaction fee. The clearing procedures of each country are different. It takes 2 or 3 days for a single remittance to arrive, which is inefficient and accounts for a large proportion of funds in transit. No longer going through a third party, point-to-point payment is formed through blockchain technology. Eliminating the need for third-party institutions, you can make payments throughout the day, receive money in real time, quickly withdraw cash, and reduce hidden costs, helping to avoid financial risks. It is timely and convenient.
(3) Bills and supply chain financial business: reduce human intervention, reduce costs and operational risks
Point-to-point value transfer, physical bills or central system for control and verification; intermediary will be eliminated and human intervention reduced. Improved efficiency, smoother financing channels, lower risks, and benefits for all parties.
(4) Securities issuance and trading: realize quasi-real-time asset transfer and accelerate transaction clearing speed
The application of blockchain technology can make the securities trading process simpler, more transparent and faster , Reduce IT systems with repetitive functions and improve the efficiency of market operations. For stocks, blockchain can eliminate paper and pen or spreadsheet records, reduce human errors in transactions, and improve the transparency and traceability of trading platforms. Citi and Nasdaq collaborate to advance blockchain applications.
(5) Customer credit reporting and anti-fraud: reduce legal compliance costs and prevent financial crimes
Customer information and transaction records recorded in the blockchain help banks identify Abnormal transactions and effectively prevent fraud. The technical characteristics of blockchain can change the existing credit reporting system. When banks perform "know your customer" (KYC), the data of customers with bad records will be stored in the blockchain.
Equity crowdfunding: Equity crowdfunding based on blockchain technology can achieve decentralized trust and investors’ returns are guaranteed.
5. Supply chain management
Distributed ledger system, participants track the ownership of assets throughout the process, and can be used to track auto parts when moving between countries and factories.
Toyota operates its core parts supply chain and develops blockchain technology solutions. Using a large amount of data helps Toyota more efficiently ensure the accuracy of recorded data and can also help manage the supply chain. At the same time, the blockchain supply chain can control warranty, repair goods-related costs and specifications through smart contracts, and transactions throughout the product life cycle are irrevocable.
The shipping industry’s first public solution, deployed by Maritime Transport International (MTI), uses blockchain supply chain technology to share Verified Gross Mass (VGM) information for shipping containers. Information about container VGM is important to ensure ships are properly stowed and to prevent accidents at sea and in ports. VGM data is stored on the blockchain supply chain, providing a permanent record for port officials, shipping companies, shippers and cargo owners. This replaces cumbersome logs, spreadsheets, data brokers and private databases.
Logistics Integrity System Wagonbang Wagonbang launched a blockchain-based financial solution for logistics enterprises, aiming to provide enterprises with reliable financial services. It can not only help drivers solve the problem of loan difficulty, but also change the current situation of lack of integrity in the industry and help build a logistics integrity system. Help build the identity chain of logistics companies and create a trusted data ecosystem for logistics companies. Using a transparent, supervisory, and traceable algorithm model, we screen reliable companies that need financial support and provide them with financial services. On the other hand, at the technical level, various law enforcement departments are linked to jointly punish dishonest companies.
6. Government management
(1) Election
Based on the characteristics of blockchain technology and considering the shortcomings of current election technology, we will build an open source , Blockchain applications for elections, voting and lottery, we call it ElectionChain. We hope to optimize election and voting technology to make voting more open and transparent, reduce human manipulation, and allow voters to verify their election results.
Including identity authentication, multi-chain system, flash investment protocol, consensus algorithm EDPOS, privacy protection, voting mechanism design, decentralized ELC rental market, storage solutions, smart contracts, etc.
(2) Government services
Aiming to realize an e-government digital ecosystem based on blockchain technology and provide citizens with government services and an automated mechanism for the business of various government departments, it must be All areas of national government affairs are combined to form a common information space, including government agencies, economic data, financial transactions and social fields. This ecosystem should also include registries and corresponding software for building smart contract-based applications and platforms for government agencies, businesses and public users.
㈥Linux learning materials: What is the relationship between blockchain and cloud computing
After years of development, cloud computing has become a very mature technology. This is how experts define cloud computing: Cloud computing is a pay-per-use model that provides available, convenient, and on-demand services.Required network access into a configurable shared pool of computing resources (resources include networks, servers, storage, application software, services), these resources can be quickly provided with little management effort or interaction with service providers Very little interaction.
The concept of blockchain is relatively simple. It is a new application model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. Its essence can be understood as distributed ledgers and smart contracts. If it is simpler, the blockchain is equivalent to a protocol like HTTP, which is used for value exchange and value transfer.
After understanding the definitions of the two, you will find that from a definition point of view, there is no connection between the two. But in fact, blockchain, as a resource with on-demand attack requirements, can be understood as part of cloud computing. So in general, although the two are very different, they can be integrated with each other. I believe that better technologies will be born.
㈦ You have to know the operating principles and development of blockchain!
1. Why is there innovation in blockchain?
The starting point of the first generation of the Internet is the TCP/IP protocol, which implements a unified format for peer-to-peer transmission of information by all nodes on the network. Open code. However, the impact of such an uncomplicated innovation on mankind is epoch-making. It has programmed, agreed, and enforced the basic values required by a unified global market: "freedom, equality, and fraternity." Then the STMP email protocol, HTTP domain name protocol, etc. were derived, achieving low-cost and high-efficiency global information transmission in a decentralized manner. As Alibaba Vice President Gao Hongbing said:
"The Internet is to eliminate the (information) supply chain that has very low value and high cost - it is open, interconnected, peer-to-peer, globalized, and decentralized."
We know: The essence of the market is also decentralized. It automatically executes the decentralized agreement of "equivalent exchange". Just as Nobel Prize winner Ronald Coase summed up: "The market economy is based on two On the basis of deep cognition: admitting ignorance and tolerating uncertainty." Adam Smith also described the market as: "the invisible hand"! Therefore, the market must require the low-cost flow of information decentralization, and the Internet has adapted to the global Under the general climate formed by the unified market, it turned out to be.
However, the first generation of Internet decentralized solved the problem of low-cost and efficient transmission of information, but it did not solve the problem of credit of information. Therefore, what the second-generation Internet must break through is: how to establish global credit in a decentralized manner so that value transfer can be carried out at low cost and with high efficiency.
So what are the problems with the original centralized credit system? As we all know: centralized credit, such as the legal currencies of various countries, has different credit values, and the clearing systems are also incompatible, which adds a lot of cost to global trade. The current global credit system centered on the US dollar has a "Triffin Paradox" in its mechanism (the essence is that a country's legal currency cannot simultaneously resolve the conflict between its own economic interests and global economic needs). Therefore, 20In 2009, Zhou Xiaochuan, governor of the People's Bank of China, called for the creation of a super-sovereign storage currency. In the same year, Satoshi Nakamoto disclosed the first-generation blockchain source code - "Bitcoin" - online.
2. How does the blockchain system operate?
First of all, Satoshi Nakamoto knew very well that establishing a credit system for payment must solve the problem of preventing "duplicate payments", that is, no counterfeit currency can be created. The centralized credit system relies on state machinery to prevent counterfeit currency. What about "Bitcoin"? Satoshi Nakamoto's great innovation is to "timestamp" every transaction. There is a block (block: equivalent to a network account book) every ten minutes, and all network transactions for these ten minutes are correctly timestamped. The question is who will cover it? Satoshi Nakamoto did not assume that everyone on the Internet is Lei Feng. He agreed with Adam Smith: people in the market are greedy. He asked the so-called "miners" to compete for the accounting rights of these ten-minute blocks. The rules of the competition were to correctly record the accounting and at the same time solve the SHA256 problem. Who can prove that their computer has the fastest computing power (the so-called PROOF OF WORK mechanism), he can compete for the legal accounting rights of these ten-minute blocks and get a reward of twenty-five bitcoins. This is the so-called "mining" process. It is actually a decentralized credit process that establishes a network-wide ledger - the blockchain. Therefore, the more essential function of miners is "bookkeepers"!
Satoshi Nakamoto is here In its Bitcoin white paper, the process of establishing this credit system is described in detail:
Step 1: In order for the entire network to recognize it as valid, each transaction must be broadcast to each node (node: that is, the miner);
The second step: Each miner node must correctly timestamp each transaction in these ten minutes and record it in that block;
The third step: Each miner node must Compete for the legal accounting rights of this ten-minute block by solving the SHA256 puzzle, and strive to get a reward of twenty-five bitcoins (fifty bitcoins every ten minutes for the first four years, decreasing by half every four years);< br>Step 4: If a miner node solves the SHA256 puzzle of these ten minutes, it will publish all the timestamped transactions recorded in its ten-minute blocks to the entire network, and they will be checked by other miner nodes in the entire network;< br>Step 5: Other miner nodes in the entire network check the correctness of the block accounting (because they are also stamping the accounting at the same time, but they have not competed for the legal block accounting rights, so there is no reward), there is no error Finally, they will compete for the next block after the legal block, thus forming a single chain of legal accounting blocks, which is the general ledger of the Bitcoin payment system - the blockchain.
Generally speaking, each transaction must undergo six block confirmations, that is, six ten-minute accounting, before it can finally be recognized as a legal transaction on the blockchain. The following is the accounting format of Bitcoin:
So the so-called "Bitcoin" is such a billing system: it includes the owner electronically signing with the private key and paying to the next owner, and then the entire network's "miners" "Time-stamped accounts form a blockchain.
3. What are the innovations in Bitcoin’s blockchain finance?
Similar to gold, trying to establish decentralized credit on the global Internet may allow value to flow across the entire network at high speed and at low rates (currently each transfer The transfer rate is one ten thousandth);
The total amount of currency is agreed upon by the cryptographic protocol;
Compared to gold, digital currency is infinitely divisible;
The value of currency can be based on a large number of P2P transactions ;
Full transparency in financial management (every transaction can be traced on the blockchain).
Bitcoin’s blockchain-wide accounting system has established a market value of US$10 billion, the highest on the global Internet. Therefore, Wu Xiaoling, dean of Tsinghua PBC School of Finance, pointed out: The blockchain experiment established distributed credit, which is an upgraded version of Internet TCP/IP, upgrading from information transmission to value transmission;
4. Bitcoin’s blocks What are the inherent flaws of the chain system?
Bitcoin’s blockchain system has had successes since it was open sourced on the Internet in 2009, but it also shows some inherent flaws that are difficult to overcome:
The total amount cannot be adjusted at any time As the market situation changes, it will inevitably rise and fall sharply;
Mining is high-carbon. Only less than 1% of miners can compete for the accounting rights of blocks of less than ten minutes, and more than 99% of other miners participating in the competition have the computing power. Waste;
The annual inflation of about 10% has greatly increased the cost of the Bitcoin financial ecology, and even threatened her survival;
As a decentralized self-organizing DAC system, the operating costs of the accounting and issuance functions are too high high.
As a global payment system, its efficiency is far from meeting the actual requirements of global trade. The Bitcoin network currently confirms a maximum of 7 transactions per second. In comparison, Visa's network system can process 10,000 transactions per second at the fastest, and Alipay's record is 80,000 transactions per second on Singles' Day in 2014!
5. Block The development of chain technology 2.0:
As the 2.0 upgrade and development of blockchain, it first focuses on solving the high-carbon mining of Bitcoin accounting:
When we discuss how to overcome the high carbon of Bitcoin mining and accounting Professor Liu Taoxiong from the Tsinghua Institute of Economics pointed out that mining competition relies on computing power. In the end, only one company competes for the legal accounting rights, and the other 99% of the miner nodes are mined for nothing, which is a waste of resources. It is obviously unreasonable. If The whole network transparently knows the legal accounting rights of the next block, and it is randomly generated in the entire network, which eliminates the high carbon cost of competitive accounting! After hearing this, we all praised Professor Liu for his brilliant idea, because the second generation is now more successful. Coin NXT has this mechanism. Their white paper is called "Transparent Forging". However, the probability of the accounting rights going to someone is directly proportional to the NXT token holdings in each miner node wallet. This is called the proof of equity mechanism ( PROOF OF STOCK). Of course, this also triggered a debate about the unfair distribution of tokens by NXT to early investment developers!
RIPPLE is a semi-decentralized blockchain solution that utilizes a "trusted gateway"gateways) perform blockchain accounting, and their credit is based on the consensus ledger protocol that these gateways will not do evil at the same time.
The most ambitious attempt is Ethereum, which combines blockchain technology with Turing completeness, hoping to develop a basic platform that can support the construction of various blockchain systems in the future. The development of various credit currencies, digital assets, smart protocols and even financial derivatives. The system design is to unify blockchain accounting on the ETHERUM platform and be used by all developers. Maybe their official version will be released in the near future.
6. Possible applications of blockchain innovation in other fields:
Now, blockchain’s attempts to establish decentralized credit are no longer limited to the financial world, but have attracted attention from all fields of society, especially in At present, some of China's central credit institutions, such as the "Red Cross", are in a "collapse" situation. Blockchain can provide a new way of thinking and technical options for social management. The following are some new developments and related discussions we have learned about:
The combination of blockchain and the Internet of Things unifies digital assets and atomic assets, smooths the difference between consumer assets and cash assets, expands public credit, and accelerates value circulation; (IBM-Samsung)
Built on the blockchain Intellectual property protection system, accounting for the use of intellectual property across the entire network, and establishing a global advertising market;
Whether blockchain can provide technical support for the issuance of protocol-based cryptographic currencies by emerging economies along the Belt and Road;
Block Chain + cloud computing can develop into a decentralized self-media and community system;
Blockchain can build a decentralized equity crowdfunding system, allowing innovative projects to enter the circulation field in advance;
Blockchain can develop Develop a fully transparent financial management system;
Blockchain supports the establishment of a global decentralized corporate organization.
In short, in this era when credit has become a scarce resource, the technological innovation of blockchain, as a distributed credit model, provides new opportunities for finance, social management, talent evaluation and decentralized organization construction in the global market. All provide a broad development prospect.
㈧ Blockchain technology empowers Web3.0
Web3.0 will be a value Internet. Its openness, trust establishment and identity management are in line with Web2 .0 makes a big difference. The development of blockchain has just established the basic technical foundation for Web3.0 and will play a key role in Web3.0. In Web3.0, blockchain-related technologies include: peer-to-peer network technology, data storage and exchange systems, digital identities, blockchain-based financial networks, blockchain-based trust systems and smart contracts, etc.
Web 3.0 was originally called the Semantic Web by Tim Berners-Lee, the inventor of the World Wide Web (WWW), and its goal is to become a more autonomous, intelligent and open Internet. The definition of Web 3.0 can be expanded as follows: data will be divided intoInterconnected in a decentralized manner, this would be a huge leap from our current Internet, where data is primarily stored in centralized repositories. Additionally, users and machines will be able to interact with the data. To do this, the program needs to understand the information conceptually and contextually. With this in mind, two cornerstones of Web 3.0 are the Semantic Web and artificial intelligence (AI).
From the perspective of users (users), Web3.0 and Web2.0 will be improved in many aspects in terms of presentation and experience. The following features are some of the aspects recognized by the industry: < br />
At the same time, with the development of network capabilities, artificial intelligence, and the explosive growth of data, the construction of Web3.0 networks will be a disruptive development for Web2.0, which reflects Web 3.0 will inevitably be an open, trustless, permissionless network, thereby realizing the true vision of the Internet.
Web3.0 will be a value Internet, and its openness, trust establishment and identity management are very different from Web2.0. The development of blockchain has just established the basic technical foundation for Web3.0 and will play a key role in Web3.0. In Web3.0, blockchain-related technologies include: peer-to-peer network technology, data storage and exchange systems, digital identities, blockchain-based financial networks, blockchain-based trust systems and smart contracts, etc.
Peer-to-peer network system: P2P Networking
The network architecture adopted by Web1.0 and 2.0 revolves around the architecture of the core network, access network and local area network. Such a network is basically a star structure, with data exchanged from the end up through the access network to the core network, and then routed down to its destination address. Internet applications rely on relatively centralized computing and storage. Once the network fails or is overwhelmed, service failure will occur immediately. Service failures of Internet giants are common and have huge impacts.
The Web3.0 network will be more flexible, and data communication will be more based on point-to-point networks. Point-to-point networks rely on the existing architecture of Web2.0 as infrastructure, and virtualization will be built on top of it. P2P network layer. Each user node/terminal is connected to multiple terminal nodes at the same time, and network communication occurs through direct connections between terminals or through third-party relays. Such a connection has many benefits, such as: nodes can obtain information from multiple paths at the same time, so the data access speed can be more efficient; when there are multiple copies of data, information can be obtained from the nearest node, and network resource utilization is high ; The tolerance for network failures is greatly improved, and partial network failures will not affect the communication effect; the network links are abundant and the data transmission speed is very fast.
The peer-to-peer network is also the basis for ensuring other features of Web3.0, which we will describe in the following sections. LibP2P is currently a relatively mature peer-to-peer network technology. Networks including IPFS, Filecoin, Ethereum2.0 and other platforms that provide services for Web3.0 are all built on LibP2P.
Terminals using point-to-point networks need to continuously maintain and maintain a large number of network links, and can intelligently perceive network problems and resist malicious links and attacks. This brings challenges to the development of P2P networks. At the same time, the P2P network is built on the basis of the existing network and requires comprehensive support for existing network protocols. Affected by the network scale effect, the development of the P2P network will first start with the technical facilities related to the blockchain and gradually Expand to a wider area.
Data storage and exchange system - The Underlying File System
Web1.0 and Web2.0 are built on the HTTP protocol. The HTTP protocol provides a simple file access method through path (URL), and users can access files and web content through URL.
HTTP is a client/server communication protocol, which forms the basis for almost all data exchanges on the current Internet. The term client-server means that there is a requesting party (the client - usually a web browser) that requests information from the server (the computer that provides the information - usually a web page or part of a web page). This protocol relies on Domain Name Server (DNS) servers to locate file paths. The DNS server itself is a large network that includes thirteen root servers, as well as numerous zone servers linked down. The DNS service network itself is a centralized network, and some attacks are directly targeted at the DNS network.
With Web 3.0, this mechanism is changing. The technology most likely to replace the current DNS system is called the InterPlanetary File System, or IPFS for short. When HTTP is gradually replaced by IPFS, indeed, we may be inclined to call it Internet 3.0.
The IPFS network also needs to address files (content), but completely different from the HTTP protocol in that the addressing service of IPFS no longer relies on centralized services like the DNS network, but It is completely carried out through the decentralized distributed hash table (DHT: Decentralized Hash Table). The network layer of IPFS is LibP2P, so it can provide greater flexibility and fault tolerance.. At the same time, IPFS draws on many technologies from peer-to-peer file systems to form a complete set of protocols, including: BitTorrent, Git, SFS, etc.
The implementation principle of IPFS's content addressing method is very simple, which is to perform a hash operation on the content to generate a unique content identification (CID: Content Identity) related to the content. The anti-collision feature of the Hash algorithm ensures the uniqueness of the identification, so this identification is also called a content fingerprint; the certainty of the Hash algorithm ensures that the same content will generate the same identification, so in the same storage network, it can Content is deduplicated to achieve higher storage efficiency.
The goal of IPFS is to build a unified, decentralized storage platform that does not rely on a single entity, which is in line with the idea of blockchain. Compared with HTTP, IPFS has many advantages:
These characteristics of IPFS form the basis of Web3.0 data storage. Therefore, these characteristics of IPFS also become the characteristics of Web3.0. The IPFS network has been successfully operating for several years. As a public welfare, open, and open source network, its operation is very successful. However, for commercial operations, due to the lack of incentive layer and the difficulty in coordinating the service guarantee system of distributed nodes, there are still problems. There are many challenges, and these challenges are also what storage-related projects such as Filecoin hope to solve.
Digital identity based on cryptography - Digital Identities
Digital identity is another important technology brought about by the development of blockchain. It may become one of the most important features of Web 3.0. In today's internet, everything from identity theft to click fraud is rife, and it happens because the connection between two computers is not authenticated properly. In a Web 2.0 network, a server can never be sure that the client software accessing it is pretending to be a browser under the control of an identifiable human being. On the other side of the equation, the browser also doesn't know if the server and file it's accessing are the ones it intended to access.
However, it is much more difficult to commit fraud and deceit if everything involved in this interaction has a verifiable identity. With digital IDs, each person has a verifiable identity because each identity must be linked to a unique credential. Likewise, organizations have a verifiable identity. As for everything else involved in the interaction between client and server (hardware and software), these things can be tied directly to a unique ID belonging to a person or organization. And, thanks to technologies like zero-knowledge proofs, it’s possible for any party to prove they are authentic without even revealing their identity.
Digital ID enables two important functions of Web 3.0:
The very important reason for this is that user identity authentication and behavior verification are unified, and encryption technology is applied to every message, making security Greatly improve. Of course, these also increase the cost of terminal use, and the truth is always higher than the magic. As computing technology advances, the strength and algorithms of encryption will evolve, and security also relies on users protecting their private keys.
Based on blockchain financial network - Decetralized Finance
So far, we have mentioned two technical foundations: distributed file system and digital identity, both related to blockchain Chain technology related. The importance of blockchain to Web3.0 is self-evident, but its most important contribution lies in its ability to create tokens and maintain the network through carefully designed economic models, including the use of such tokens for governance. The ability to make small payments.
In a blockchain-based Web3.0 network, the way finance operates is very different from traditional finance. Finance is more programmed and changes more quickly and quickly. There is no need for banks and institutions to endorse it. The financial market is also an algorithmic market. Here, there are not only tokens with value storage that can store and transfer high amounts of value, but also small payment capabilities for fast transactions similar to the Lightning Network. Different tokens provide different functions. What is even more exciting is that the entire financial market is completely an algorithmic market and is not controlled by institutions. Therefore, algorithm-based equity trading, lending markets, non-stop real-time trading, insurance, futures, etc. can all be constructed. And continue to innovate.
Regarding the value of information, Web3.0 is completely different from Web2.0. Due to tokenization, the value of information can be directly reflected in transactions, realizing the unification of value flow and information flow. Unlike the free services in Web 2.0, which are full of illusions, service providers actually make profits through advertising and mining the value of users' data in a roundabout way.
Networks build trust - Trustless
One might argue that the most important contribution of blockchain is automated trust. This goes beyond the security that blockchain can provide through digital IDs by building a network of trust.
Some blockchains can create "smart contracts," programs that are attached to the blockchain and executed when specific blockchain events are triggered. The important thing about smart contracts is that the program code is the contract.
This makes smart contracts more deterministic than legal contracts. Legal contracts are enforced through legal systems, whose reliability varies from place to place but is never perfect. to legal contractsThe outcome of questioning is uncertain.
However, smart contracts can be 100% trusted. A simple example of a smart contract is given by the movement of goods in a supply chain. Items are shipped with an RFID tag that reports the location of the item when it is read. Smart contracts can automatically execute payments when goods arrive at a specific location - shipping, warehousing or import duties. Therefore, payments are predictable and can be happened with 100% confidence.
Naturally, smart contracts can be much more complex than this example. They can cover many situations that legal contracts currently cover, reducing the possibility of fraud.
㈨ The difference between IPFS and HTTP
http is centralized. All traffic is carried directly on the centralized server, which carries great pressure and can easily cause system crashes. HTTP also Vulnerable to DDOS attacks; the storage method of ipfs is decentralized and fragmented distributed storage, which cannot be attacked by hackers, files are not easily lost, and security is guaranteed.
- 上一篇: 区块链究竟是什么东西啊,区块链究竟是什么东西呀
- 下一篇: 彩票 区块链,区块链彩票系统源码