复旦大学区块链研究院,复旦大学区块链研究中心
请查看相关英文文档
㈠ 2 geeks, 6 patents, 4 scopes and 10 specific scenarios, understand the origin and prospects of INE technology in one article
About Wireless Mesh Network (WMN) technology p>
Wireless Mesh network is developed from wireless Ad-hoc network.
Ad-hoc network is a multi-hop, centerless, self-organizing wireless network, also known as Multi-hop Network. The entire network has no fixed infrastructure. Each Nodes are mobile and can dynamically maintain contact with other nodes.
In order to achieve the goal of ubiquitous communication in wireless communications, it is necessary to develop a wireless multi-hop network technology that is fully suitable for civilian communications based on the technical foundation of Ad-hoc, Wireless Mesh Network Technology (WMN) ) appears.
Wireless Mesh network technology was initially widely used in the military. As a mesh topology, WMN has the characteristics of being independent of infrastructure, highly dynamic, multi-hop, automatic networking, autonomous configuration and repair. , there is no single point of failure, and if any node in the network stops working, it will not affect the operation of the entire network. The entire network has tenacious vitality and is known as the "unbreakable network."
Eight technology patents in the Mesh field
Distributed as a combination of blockchain and the Internet As a powerful enterprise in Mesh network, INE Intelligent Ecosystem not only has the most suitable token economic model for implementation, but also owns: six software copyrights and two mesh technology hardware patents in the field of Mesh mesh network; in Mesh network mobility networking It has leading advantages in the industry at home and abroad in terms of performance and key core protocol algorithms (Protocol).
The patent names of the above Mesh network software and hardware are:
Self-sufficient NexFi wireless ad hoc network protocol software [abbreviation: NexFi ad hoc network] V1.0
Self-sufficient NexFi key synchronization software [abbreviation: NexFi key] V1.0
Portable hotspot router for mobile ad hoc access
1 A configuration-free intelligent wireless self-organizing connector
A wireless Ad Hoc network congestion control mechanism based on virtual transmission protocol
An intelligent self-organizing network connection device for digital signage
The main inventors are Pei Songwen, Zhu Junfeng, and Chen Yubin, and all patents belong to Shanghai Ziqi Network Technology Co., Ltd.
Shanghai Ziqi Network Technology Co., Ltd. is affiliated to Dr. Zhu Junfeng, the chief architect of INE's intelligent ecological technology. Dr. Zhu is also the general leader of INE's Shanghai Mesh technology team.
The first meeting between Yu Rui and Dr. Zhu
The spark of two technical geeks
Raymond Xiong Xiong / Project sponsor, CEO & CTO
Master of Computer Science, California State University
Former senior consultant of Sky IT Support in Los Angeles
Engaged in data acquisition and processing systems in the United States He has worked in development and algorithm research for more than ten years, participated in the research and development of early blockchain technology, and has authoritative views on the implementation and application scenarios of blockchain technology.
Zhu Junfeng Eric Zhu Ph.D/Chief Technical Architect/Head of IntelliShare Shanghai Team
PhD in Computer Science, Fudan University
Expert Committee of Shanghai Cloud Computing Promotion Center Expert/Expert of the Open Source Committee of Shanghai Software Promotion Center/Member of the OpenStack China Community Expert Group, former Chief Engineer of Pudong Software Park. He has been engaged in technology and product research and development in the fields of communication technology and high-performance computing for more than ten years, and has published many papers in international Rank2 conferences and SCI journals.
Xiong Yurui, the founder of the INE project, returned to China to start a business after studying in the United States for 18 years. Yurui studies algorithm models in global big data. The tentacles of technical research include traditional technologies. to commercial finance, from the Internet of Things to AI, and ultimately focus on distributed networks and the blockchain token economy. Yu Rui believes that the two natural distributed forms will collide to create a scientific research project that everyone can participate in.
Driven by this concept, Yu Rui resolutely decided to return to China to start a business, and became acquainted with Dr. Zhu Junfeng, an expert in communication networks. Dr. Zhu is also an expert on the expert committee of the Shanghai Cloud Computing Promotion Center and a senior technical expert in the Mesh field. . Based on the natural distributed structure of the Mesh network, he is very optimistic about its decentralized technology and blockchain, and is excited about the INE token.He was very interested in the implementation of applications under the incentive model. As a Mesh technology supporter of INE's intelligent ecosystem, he joined the co-construction of INE and later served as the chief technical architect of INE.
Two technology geeks are determined to move the Mesh network from its current military use to large-scale civilian use, so that everyone in the future world can independently participate in the establishment and sharing of a distributed network, and gain access to The concept of income, the INE Intelligent Ecosystem (IntelliShare) that perfectly combines blockchain, came into being.
Mesh era application scenarios
When the Mesh network was born, it was used as a military communication network.
INE Mesh can be used to integrate various military service resources and assist the military in unified command and joint operations. Provide the military with temporary networking, communication command and logistics support wireless network services required for camps, exercises and wartime. Achieve unified command and coordination across different military functional units.
Using the flexible networking method of INE Mesh, the military wireless network system can have the following applications:
Full mobile networking of military vehicles
Installing wireless Mesh on military vehicles Nodes form a movable mesh ad hoc network. Used for group marches, exercises, emergencies or war needs, providing support for wireless data, wireless voice and wireless video surveillance. When vehicles move, formations change, and network topology changes, the INE Mesh structure can automatically form a network so that the network will not interrupt connections. Nodes can automatically jump to maintain the stable operation of the entire network.
Hybrid networking
Mesh network node types can be divided into two categories: fixed backbone nodes and mobile access nodes.
Fixed backbone nodes are composed of two types: one is a fixed node pre-installed at a height such as the top of a building, and the other is a mobile communication vehicle parked somewhere that acts as a fixed backbone node. Networks can be quickly built on routes that need to be passed in advance or around campsites.
Place the INE Mesh mobile access node on the vehicle and use omnidirectional antennas to perform seamless and uninterrupted voice and video transmission in a wireless network composed of fixed nodes when the vehicle is traveling at high speed.
Other wireless Mesh nodes are placed on ordinary military vehicles for mobile use. Troops can quickly build networks along pre-planned routes or around camps. When an exercise or operation begins, the established wireless Mesh backbone link can provide stable and reliable high-bandwidth wireless connections for all other mobile nodes and military terminals, allowing for uninterrupted real-time battlefield observation in the form of voice, video and data multi-services. Transmit combat information and send combat instructions.When the troops return to the camp, timely supply support can also be coordinated through the communication system.
Nowadays, driven by the digital age, the existing network system has begun to seek the supporting power of the underlying architecture to achieve global coverage of the Internet.
Under the demand of the market, Mesh network will embark on the road of commercial application, and INE, which is implemented with Mesh network, will open up distributed network applications under the trend of blockchain technology. New track.
1. Blockchain ecological network
2. Networkless communication
3. Internet of Things
4. Transportation network
It can be used in residential areas, schools, medium and large enterprises, hospitals, factories, etc.;
p>
Value 1
Regional smart management
The INE network grafts the regional Internet usage, monitoring network, security network, power network, etc. to form a smart community faster, thereby carrying out intelligent management of the people.
Value 2
Regional network security
< p> The characteristics of the INE network make the regional network difficult to be attacked by hackers, improving data security and privacy security.
Value Three
Regional Token Business Upgrade
Based on the network as the user entrance, it can not only connect internally without the Internet link provided by the operator, but also access the Internet in parallel, and customize a business operation model of exclusive Token circulation for each area, which can better support area business culture and residents.
Used for internal communications on islands, cruise ships, military, expeditions, and remote areas.
Value 1
Internal wireless communication
< p> In areas without Internet such as cruise ships and islands, the INE network is used to form an internal communication system. Connection and communication can be carried out through the INE network without the Internet.
Value 2
High communication security
In scenarios such as the military and high-confidence meetings, through the dedicated network and identity encryption established by INE's small base stations, which are physically isolated from the outside Internet, there are no security loopholes and internal leaks from remote hacker attacks.
It can be used in smart homes, smart communities, industrial automation, smart retail, smart medical care, environmental monitoring, etc.
Value 1
Lower cost
The INE network chip is implanted in Internet-connected items and will self-organize the network, eliminating the network traffic consumption expenses of operators for purchasing Internet of Things equipment. At the same time, compared with wired IoT, wireless does not require wiring costs.
Value 2
Node online
INE network chips can be quickly embedded into various intelligent terminal devices to meet high-quality network requirements under the Internet of Things and ensure that each "node" in the Internet of Things network is always online.
Value three
Smart monitoring system
Monitor IoT infrastructure, transmit measurement, monitoring and analysis data, handle problems in real time, update data, and maintain high interactivity between people and smart devices.
Value Four
Helping smart cities
Maintain a high degree of interaction and connectivity between people, people and things, and things and things in intelligent systems, create a smart city nervous system, bring the digital world into every device, every person, every home, every organization, and create digitalization City.
It can be used in in-vehicle networks, public transportation, car rental systems, etc.
Value 1
Public transportation network
In urban public transportation networks, INE Mesh can customize dedicated channels for local Internet of Vehicles to realize functions such as free dispatching of vehicles, traffic accident warnings, and road traffic information query.
Value 2
Private communication network
Replace the calling machine used by self-driving tours, group convoys, etc.and other functions, directly connecting cars to realize communication and positioning.
Wind farm Power pipeline Ferry reservoir
Construction site Oil exploration Forest fire prevention
Scenic cableway Smart ocean Emergency rescue
Intelligent hardware
More application scenarios...
01
Petroleum Industry
Supports petroleum in special working conditions without network In exploration and development, and field construction, Mesh technology can be used to freely organize and build networks for instant communication, data transmission, and security management.
02
Ferry Reservoir
INE The Mesh monitoring system can monitor reservoir data and form a ferry communication network to solve ship dispatching and maritime communication problems.
03
Scenic Ropeway
Pass Fixed monitoring points (INE Mesh monitoring equipment) and mobile monitoring points (drones embedded with INE Mesh chips) inspect dangerous areas.
04
Construction site
to INE Mesh chips are grafted onto sensors and monitoring systems to monitor construction sites, which will greatly improve safety warnings.
05
Ocean of Wisdom
In The Ocean Development Zone has set up an INE Mesh wiring-free network system to solve the problems of difficult offshore wiring and poor networks in edge areas.
06
Emergency Rescue
INE Mesh self-organizing modules quickly form a communication network in disaster areas, enabling instant communication, improving search and rescue efficiency, and saving lives.
07
Wind farm
Each wind power generation equipment is used as a Mesh node to transmit power data in real time, consisting of Dedicated network for wind farms.
08
Intelligent Hardware
INE Mesh chips or self-organizing network modules are connected to wireless charging equipment and mobile phones. Every smart hardware can be a mobile network operator.
09
Forest fire prevention
In Several Mesh monitoring nodes are set up throughout the forest to monitor the forest at any time and take immediate measures to reduce losses when a fire alarm is detected.
10
Electrical pipelines
Will The INE Mesh wireless network technology module is installed in the maintenance worker's AR instrument to quickly restore the city's power and shorten the maintenance cycle.
In the Internet era, the diverse demands for networks have become increasingly prominent in the digital trend, and distributed Mesh network technology has begun its implementation process. The Mesh network of INE's intelligent ecosystem combined with blockchain technology will create a different exclusive network ecology with strong team and technical support, opening a new track in a new era of distributed shared networks.
㈡ "Blockchain 2.0" epub download and online reading, please ask for Baidu network disk cloud resources
"Blockchain 2.0" (Tan Lei) e-book network disk download for free online reading
Resource link:
Link: https://pan..com/s/170oJP3ZDXqD-McSUManDEw Extraction code: 6uh2
Book title: Blockchain 2.0
Author: Tan Lei
Douban score: 5.6
Publisher: Electronic Industry Press
Publication year: 2016-4
Number of pages: 240
Content introduction:
Blockchain is a distributed technology born out of the Bitcoin protocol, and it is also a perfect credit system. The principles and characteristics of blockchain determine that it has an inherent mission to reconstruct the future shape of various industries including finance, and some even place their hopes on it to create a more ideal world. In view of the fact that many people's understanding of blockchain is still in the "coin era", "Blockchain 2.0" aims to truly present the cause and essence of blockchain by launching the new concept of blockchain 2.0, and explain blockchain in a popular way. chain technologyThe principles and mysteries of the blockchain fully describe the applications and trends of the blockchain. "Blockchain 2.0" contains both real cases, rigorous deductions, and original designs. It is an excellent resource with great novelty and practical value for relevant decision-makers, practitioners, academic researchers, and the general public. material.
About the author:
Tan Lei is a senior expert in the fields of global Internet technology, data operations, and data analysis and mining. Bachelor's degree in Computer Science from Fudan University, Master of Computer Science from Duke University, USA. CIO of China Industrial Design Association, once served at Microsoft headquarters in the United States for 13 years. He has extensive experience in data analysis, data mining, cloud computing, product development and management, Internet advertising, etc. The author and translator of seven professional books including "New Internet: Big Data Mining" and "Data Nuggets: E-commerce Data Operations".
Chen Gang, whose English name is Jerry, nickname: Financial Uncle. Senior financial media person, founder and managing director of Gaoronghui Capital, and consultant to many start-up companies. He once worked for China Business Network, Oriental Fortune Network and CICC Online.
㈢What is the truth about "Air Coin"
Air Coin is developed by the so-called application of blockchain technology without any credit endorsement or physical support. The essence of "digital currency" is not a real digital currency. It is characterized by high returns on the surface, but in fact it is extremely risky. The rise and fall of the currency is completely controlled by the issuer.
It mainly relies on packaging a good concept that blockchain is omnipotent to deceive laypeople into crowdfunding investments. The color of speculation is particularly obvious. However, benefiting from market dividends, these coins have appreciated more than 5 times. However, just a few months later, these frothy air coins were exposed as frauds and were exposed by media reports. These companies became the hardest hit areas for regulatory governance.
Characteristics of air currency:
1. Use the founder’s background and other existing honors to endorse the project.
2. Don’t focus on technology, focus on marketing, and put publicity first.
3. The white paper does not have any technical description. It consists entirely of project plans and has no substantive technical roadmap.
4. In the later period, most projects were listed on exchanges as their main purpose, and the currency price was the only criterion for measuring projects.
5. The skyrocketing price of currency is not due to the overcoming of a certain technical difficulty or the progress of the project, but due to certain marketing methods.
This answer is provided by Kangbo Finance. Kangbo Finance focuses on interpretation of hot financial events and popularization of financial knowledge. It adheres to professionalism and pursues fun. It produces financial content that people can understand and delivers financial value in vivid and diverse ways. . Hope this answer is helpful to you.
㈣ If you want to be a programmer, what major should you study in college?
If you want to be a programmer, you can study these two majors:
1. Software engineering
The software engineering major is based on computer science and technology disciplines, emphasizing the engineering nature of software development, so that students can master computer science and technology knowledge and skills.Basically, master the basic knowledge, basic methods and basic skills necessary to engage in software requirements analysis, software design, software testing, software maintenance and software project management, highlight the cultivation of students' professional knowledge and professional skills, and cultivate students who can engage in software Senior professionals in development, testing, maintenance and software project management.
2. Computer Science and Technology
The Computer Science and Technology major mainly cultivates good scientific literacy and a systematic and better mastery of computer science and technology, including computers. Basic theories, basic knowledge and basic skills and methods of hardware, software and applications, computer science and technology disciplines that can be engaged in computer teaching, scientific research and application in scientific research departments, educational units, enterprises, institutions, technical and administrative departments and other units of senior scientific and technical talents.
If you choose these two majors, you will learn a series of programming languages such as c language, c++, java, javaweb, etc. in college. It should be noted that in college, one language course usually ends in one semester. The learning progress will be very fast, and the course schedule will not be sufficient. If you want to learn well, you have to rely on your own efforts after class, and you must at least master a language that you are good at.
Abilities required to be a programmer
1. Programming language ability
As a qualified computer programmer , proficiency in a language is a must. This kind of proficiency does not mean that you can be proficient after reading a programming manual or copying a few programs. It requires accumulation over a long period of time.
2. Coding ability
Complying with coding standards is the most basic requirement for a programmer. The other one is comments. Be careful not to comment for the sake of comments. For classes, the main purpose is to explain responsibilities; for methods, the main purpose is to explain; for method bodies, the main purpose is to explain the implementation ideas. For large sections of code, divide them into sections, separate them with blank lines, and use inline comments to explain them.
3. Object-oriented thinking ability
Most programming languages are object-oriented programming languages. The common essence of these object-oriented programming languages is object-oriented thinking. Mastering these is more important than the object-oriented language itself, such as understanding inheritance, polymorphism, and overloading. Understanding of basic object-oriented principles, such as the open-closed principle, the interface isolation principle, the single responsibility principle, etc. On this basis, you should master common design patterns, such as factory pattern, strategy pattern, observer pattern, template method pattern, command pattern, etc.
㈤ How to interpret Suning’s blockchain white paper
“The unique credit mechanism constructed by blockchain technology is very promising,” Qiao Xinliang, vice president of Suning Technology Group, told reporters. On July 20, 2018, Suning Technology Research Institute, Suning Financial Research Institute and Suning Cloud released the "Suning Blockchain White Paper", which explained in detail the advantages of blockchain in retail, logistics, technology, finance, cultural and creative industries, etc. Suning Application scenarios in fields such as industry and public services, pointing out the development route for the many industries that blockchain technology can serve in the future. At the same time, it provides a practical summary based on in-depth research on the use of blockchain in the smart retail ecosystem, implementation scenarios, and solutions, focusing on specific solutions for each scenario.
“Large companies, especially companies with many industrial layouts, have advantages in the application of new technologies such as blockchain, because these companies have the business infrastructure and data to promote the use of technology. Operational capabilities can more effectively promote business aggregation and accelerate implementation," said Liu Xiaofan.
Content source Sina Finance
㈥ CCTV News investigation revealed the truth about "air currency"
On September 4 last year, the central bank issued a document clarifying Token issuance and financing were stopped. This kind of financing entity's behavior of raising so-called "virtual currencies" such as Bitcoin and Ethereum from investors through the illegal sale and circulation of tokens has since been banned in the country. Now half a year has passed, what is the market situation of virtual currency? CCTV Financial Channel's simulcast investigation team conducted an in-depth report on this.
The following is the full record of CCTV's "News Investigation", edited and compiled by ChainDD App:
The hot currency speculators still can't help it
In January this year, Yang Chao, a virtual currency investor, saw the price of Bitcoin rising and raised money to invest. However, he lost tens of millions in less than two months.
Virtual currency investor Yang Chao: The price I bought Bitcoin at that time was 100,000 yuan per gram. Then I bought about two to three million Bitcoins at this price. Then the price of Bitcoin began to decline and fall, and every time it fell by 10%, I would restock, replenish the spot, and buy the spot again.
In fact, this is not Yang Chao’s first time speculating in coins. Before the token issuance financing and trading platform was banned, his losses had exceeded 2 million. A reluctant Yang Chao believes that the ICO ban issued by the central bank has no impact on investors like him. However, the results of re-entry were even more disappointing.
Air coins appear frequently, and newly issued tokens increase more than 30 times
In the central bank’s document in September last year, token issuance financing was clearly defined as : "Essentially, it is an act of illegal public financing without approval, which is suspected of illegal selling of tokens, illegal issuance of securities, illegal fund-raising, financial fraud, pyramid schemes and other illegal and criminal activities." However, due to technical convenience, domestic The behavior of "virtual currency" investors buying and selling tokens still exists in large numbers, and is even getting more intense. Why is it so popular?
Mao Hongliang, Director of the Blockchain Research Office of the National Internet Financial Security Technical Expert Committee: After September, the number of online digital currencies has become much richer than before, such as Huobi and OK. There are more than 100 currencies, which makes this area even richer. Before September 2017, there were basically three, Bitcoin, Litecoin and Ethereum.
In the large number of new currencies, bubbles are increasing. Li Xiaolai, known as "China's No. 1 Bitcoiner", admitted that it is simply impossible to completely avoid the "bubble" in the token market. Investors' enthusiasm continues unabated, and the reason behind the endless supply of token issuance and financing is that tokens continue to break out in the market, or even disappear directly.
Virtual currency investor Li Xiaolai: There must be some coins that have been invested and then disappeared, disappeared, and were ruined. There must be some, and the proportion is quite large. I don’t tell you because I am embarrassed. Who has nothing to do to say that you think I am so stupid? Now it is obvious that there is a bubble, and there has always been a bubble, but no one knows where the bubble is or how big it is.
In the bubble, the most dangerous thing is the "air currency" that has no support from real projects at all.
On January 15, 2018, Hero Chain, known as the world's first gambling game platform to support digital cryptocurrency, "broke" immediately after it went online, falling from the issue price of 0.6 yuan to 0.05 yuan.
On March 14, the Public Security Bureau of a certain county in China opened a case for investigation on suspicion of fraud
In January 2018, the space chain, which focuses on "launching satellites" and building the concept of a space operating system, launched ICO
On January 10, the token SPC was issued to private equity investors, and nearly 1 billion yuan was raised privately in just one day
On March 28, the Space Chain project and related proxy investments were suspected of The fraud has been filed by the Development Zone Branch of the Yangzhou Municipal Public Security Bureau
On February 1, 2018, Art Chain was suspected of false propaganda and fell into a currency withdrawal crisis. Later, the project team conducted a 1:1 repurchase and the website is currently offline. , the founder disappeared.
There is another important reason for the frequent appearance of "air coins". Unlike other financing projects, the financing subject of token issuance financing does not need to be a real company, just a temporarily formed "team" can become the financing subject. After the central bank banned token issuance and financing, original domestic token projects have chosen to migrate their servers, financing subject registration places, etc. overseas. Token financing projects with "teams" as the main financing body do not even need to move their registration places. Everything can continue to raise money as usual.
Celebrity platforms ignore value and fall into capital money-making games
There is a logic behind the issuance of a large number of different types of tokens, that is, each token is based on a certain area Blockchain technology or applied “virtual currency”. In theory, being optimistic about this token means being optimistic about the blockchain technology behind it. However, amidst the rapid rise and fall of the market, even some air coins, that is, tokens that do not have any real projects behind them, are still accepted by the market. What has actually happened?
The reporter found that for ordinary investors, in the current virtual currency pricing, even tokens that are truly supported by physical projects are difficult to price based on the valuation of physical projects with reference to IPO projects. When the information is completely opaque, the price of a virtual currency depends entirely on the packaging of the project and even theWho will support the project? Li Xiaolai often appears in the promotion of some projects and becomes a platform person, including air projects.
Experts said that as long as capital is willing, even if there is no project behind the air currency, the price may rise significantly. Because countries lack effective supervision, capital can easily draw away the funds of small investors through ups and downs games. Such an operation is not difficult for a large number of newly issued tokens or small currencies with a small total financing amount in the current market. Non-disclosure, opacity, uncertainty of project value, and investors’ expectations of getting rich suddenly amplify the risks of the “virtual currency” market.
Liu Xiaolei, director of the Department of Finance at Peking University Guanghua School of Management and director of the Blockchain Laboratory: You have no value, but you can still speculate very high. Why? It’s just a fool. Although the value is zero, I It sells for ten yuan now, and there will be people willing to buy it for twenty yuan later. I'm looking for a bigger fool to sell it to him.
㈦ The factors behind anonymous coins being named by *** and forced to be removed from the shelves
In the cryptocurrency world, anonymous coins are relatively rarely mentioned. However, recently, Korean exchange Korbit took the lead in delisting DASH, Monero and Zcash, the three major anonymous coins, and Japan's Coincheck also implemented it simultaneously. What is the reason?
First, we need to understand the difference between "privacy coins" and "cryptocurrencies".
The difference between general cryptocurrencies and anonymous coinsThere are several important definitions of cryptocurrency (Cryptocurrency), such as "decentralized system", "immutability" and "anonymity".
Distributed system: This means that the database is distributed in every corner of the world. This will not result in the loss of data due to the destruction of a centralized database. Immutability: It means that the records after the transaction cannot be tampered with, which is related to the unique consensus mechanism of the system itself. Anonymity: The parties to the transaction cannot be directly identified.The author roughly divides cryptocurrencies into two categories, "general cryptocurrencies" and "anonymous coins", which are introduced below:
The so-called "anonymous" literally means "not** *Real name or no name." The former usually has an alias or code name, while the latter has no information at all. Similarly, in the world of cryptocurrency, currencies can also be divided into two types according to the degree of anonymity (anonymity), "general cryptocurrency" and "anonymity coins":
< /p> No real names are used in transactions, that is, "general cryptocurrency" does not use any names at all in transactions, that is, "anonymous coins"
The first method is the so-called "semi-anonymous" called "Pseudonymous" in English
The second method, "anonymous", is called "Anonymous" in English.
To explain the first method, "semi-anonymous", we take the most representativeUse "Bitcoin" as an example:
The origin of Bitcoin comes from Satoshi Nakamoto's paper, in which the concept of bookkeeping appears in the records of the entire blockchain. To put it bluntly, in Bitcoin transactions, except for the trader’s real name, other information is public and anyone can trace his transaction records, such as transaction amount, transaction time, etc. It's like you have your own account on PTT or Dcard. Villagers can use the IP location to find out whether this person is on campus, but the trick is that no one knows what the person behind the account looks like. .
In the same way, the "semi-anonymous" feature of "Bitcoin" is like knowing how much money is in a nearby house (wallet address), which wallets are doing transactions, the transaction amount, and the transaction times and other information, but we don’t know who the owner is. And based on this characteristic, the general outline of the wallet owner can be inferred. With this "semi-anonymous" feature, once some information is mastered by others, there is a chance to find the wallet owner through relevant clues.
It is this "semi-anonymous" feature that makes ***'s desire to regulate "general cryptocurrencies" possible. Therefore, when users want to register and use cryptocurrency exchanges, the relevant accounts must pass KYC (KnowYourCustomer) certification.
The advantage of the "semi-anonymous" feature is that the transaction records are public, and the security and fairness of the transaction are certified by the "miners", so both parties must not have any objections. If there are no clues, the wallet can be linked. address and the user's true identity, then "anonymity" is no problem. However, everyone can check your wallet address, which means they have the opportunity to identify your actual wealth. Once the correlation between the wallet and the user is identified, many real-life security issues will arise. Imagine, in your daily life, would you want every transaction to be known to your relatives and friends? Think about the time when your parents ask you to go over and reconcile with them after you swipe your credit card to make a purchase!
Therefore, the anonymity of cryptocurrencies such as "Bitcoin" only exists when your wallet address is not known to third parties and has never been linked to legal currency. As long as you know the wallet address and with the help of KYC, you can find the user himself.
Is this really the case? Let’s take a look at an example of transaction records on the blockchain:
1. The author randomly found a wallet address ""
2. Query this wallet on the blockchain< /p> The blockchain revealed some information, such as this wallet has a total of 5 transactions, currently holds 0.7881 Bitcoins, and has owned a total of 29.8411 Bitcoins. The transaction records show that this wallet first appeared on January 14, 2018, and was imported from the "" wallet, which means there must be some kind of connection between the two wallets. blockchain.info/address/
3. Found the transaction record of this wallet
This user paid to the "" wallet three times, spending a total of about 28 Bitcoins4. Interested parties can use relevant information to infer The true identity of the user of this wallet
When you have such a transaction record, coupled with the KYC implemented by international anti-money laundering laws, you will be able to perform various subsequent actions; such as "taxation." By the same token, transaction records on related digital currencies such as "Ethereum" and "Litecoin" are equally transparent. It really makes no sense to use this kind of easily traceable digital currency to conduct various underground economic operations.
Some people will think that when the original wallet address and personal information are exposed, it will be fine as long as they change a wallet (i.e. wallet address). But in fact, if there is any problem between the old and new wallets, When funds are converted, the information will still exist on the blockchain and will also be traceable. Therefore, even if you have multiple wallets, you must ensure that transactions cannot occur between wallets, otherwise correlation will be defined. Moreover, when managing multiple wallets, the accounting costs are actually quite high.
As an aside, cryptocurrency transactions can be completed with various cryptocurrencies or fiat currencies. If you trade with fiat currencies, you have entered the financial system controlled by ***. Therefore, the author has heard that some people In order to resist tracking (wanting to avoid taxes or reduce price differences, etc.), we do not want to do transactions through cryptocurrency service providers. Instead, we resort to methods such as offline payment. However, this is actually very dangerous. Not only is there no way to trace back when being defrauded, but it may also involve personal safety. The problem. Imagine the black market transaction plot in the movie, where you give money while delivering goods, and it is a lot of money. Without the protection of a third party, if you are cheated, one party may just get the money and run away, but if there is a conflict, The two sides started fighting! Wow, this is too ***.
Back to the topic, Bitcoin’s anonymity is not strong enough, and anonymous “anonymous coins” have real application scenarios and needs.
Using the metaphor of transactions between corporate legal persons, "general cryptocurrency" can clearly see all transaction information between companies. Imagine, when every order and transaction record between Hon Hai and its suppliers is made public, what impact will it have on the company itself and the "stock market"? Looking at "anonymous coins" again, it's like you heard that transactions are happening every second between large and small companies in the technology industry, but you can't see the company name, transaction amount, transaction time, etc., but as a third-party The three parties can only see some insignificant certification records.
It can be seen that the anonymous currency hides the two elements of "wallet address" and "transaction amount". In addition to general needs, it also meets the needs of the underground economy, because except for the transaction parties, the rest of the No one can know the details. This is the main reason why "anonymity coins" are specifically named.
As for "Anonymity Coin", is it as magical as mentioned above? We use Monero's blockchain as an example:
1. Select any blockchain transaction record at will
The public information of the blockchain is only "FormBlock", "Fee", " Size", "Mixin", if you don't have the gold key of PaymentID, you can't see anything at all.2. The transaction amount and wallet address cannot be known
The total transaction amount of Input and Output is displayed as 0, and outsiders cannot know anything.Integrating the above-mentioned motivations for using "anonymity coins":
It is necessary to achieve the level of privacy protection provided by the current banking system and reduce the risk of information being disclosed. There is a need to go beyond the level of privacy protection afforded us by the current financial system.However, the motivation for using "anonymity coins" is a difficult matter to deal with from the perspective of government supervision. The author believes that this is the reason why "anonymous coins" are required to be removed from the shelves. Because there is no way to control it, they can only reduce its liquidity.
There is still too much to learn about the follow-up of "Anonymity Coin". Interested readers can go to the author's blog "Lin Puppy Research Laboratory" to do more learning and research with the author. If you are not familiar with cryptocurrency, you can first read the "Digital Currency Lazy Pack" series of articles or leave your information for subsequent updates.
The author has compiled several common methods to improve "anonymity" for readers to inquire further.
StealthaddressesMix (coin mixing) RingCT (ring signature) Zero-knowledgeSuccinctNon-(zk-SNARKs) (zero-knowledge proof) TorThere are many topics to discuss in the future. The author will first list a few topics, including Interested readers can leave me a message.
Differences in the degree of "anonymity" of anonymous coins. Methodology of "privacy protection technology". What anonymous coins currently exist in the world? Are there miners in privacy coins?
㈧ The 2020 Future Business Ecological Link Conference and the 5th Golden Gyro Award Ceremony opened grandly!
On December 11, 2020, it was announced by Ranhuai China Communications Industry Association Virtual Reality Professional Committee, Guangdong Game Industry Association, Shenzhen Science and Technology Association, and Shenzhen Information Service Industry Blockchain Association. , guided by the Shenzhen Internet Culture Market Association, hosted by Gyro Technology, co-organized by Shenzhen Science and Technology Development Exchange Center, Hengyue Maker Cube, and co-sponsored by industry leading media Game Gyro, VR Gyro, Gyro Esports, Gyro Finance, and Gyro Media 2020 Future Business Ecological Link Conference and Mr.
, Ms. Li Yuan, deputy director of the Intellectual Property Protection Department of Shenzhen Intellectual Property Office, and Mr. Liu Hongbang, co-chairman of Shenzhen Internet Culture Market Association, delivered speeches at the conference, and together with other industry figures, etc. 12 guests took the stage to present the "Shenzhen Digital Culture Industry Intellectual Property Protection Self-Discipline Initiative and Accurate Empowerment"Plan" launch ceremony to help!
Mr. Li Ming, Director of the Blockchain Research Office of the Electronic Technology Standardization Research Institute of the Ministry of Industry and Information Technology
The first guest of the Global Blockchain Industry Future Development Summit - Director of the Blockchain Research Office of the Electronic Technology Standardization Research Institute of the Ministry of Industry and Information Technology The first climax came in Mr. Li Ming’s wonderful speech. Later, Mr. Yang Dahao, founding partner of Gyro Finance, released the "2020 China Blockchain Industry Development Report" on behalf of the industry's leading media Gyro Finance.
Gyro Finance released the "2020 China Blockchain Industry Development Report"
The 2020 Global 5GXR Industry Development Summit delved into industry content. Guests discussed the current status of the XR industry in 2020 and thought about VR in 2021 and the next five years. /How will AR develop?
2020 Global 5GXR Industry Development Summit Site
Mr. Bao Yongzhe, the first Senior Vice President of Global Products and Strategy of HTCVive, used an online video to share. He shared about the XR ecological interactive innovation and gave the guests a glimpse of the future XR industry. The pace of change in interactive forms. Subsequently, Wang Hao, general manager of China Telecom Tianyi Cloud VR, shared China Telecom's comprehensive implementation of VR solutions in various categories and segments from the four dimensions of network, cloud, edge and terminal.
Mr. Wang Hao, General Manager of China Telecom Tianyi Cloud VR
In 2020, the sudden epidemic caused major changes in the global industry. As a new section of FBEC, the Global Traffic and Digital Marketing Summit has witnessed the slowdown in overall economic growth, corporate From the perspective of marketing changes and other aspects. Invite experts and big names from companies such as Juju Engine, Zhixian Technology, Weiboyi, Titanium Technology, Yale Technology, Hot Cloud Data, Huaqiang Fantawild (Shenzhen) Animation Co., Ltd., Lanren Tingshu, Caihua Logic and other companies to come to the scene. .
Global Traffic and Changcong Digital Marketing Summit Site
Looking at the overall situation, how to optimize marketing methods in the big environment? Looking for effective stock in the shrinking incremental market and making a strong breakthrough? With these questions, the guests attending the meeting will discuss them here today.
Ms. Gao Lizhen, Partner of ZingFront
The annual event is exciting and there are more surprises to look forward to
"Writing the future with the original intention", the developer training camp is one of the conference sub-venues, bringing together more than 100 companies from all over the country Excellent game publishers, overseas manufacturers, and developers jointly exchanged and shared information on entrepreneurship, game research and development, and experience, and released the "Game Industry Selected CP List 100+". During the roadshow, Chen Beihong, the founder of Shadow Games, Gu Mincong, the founder of Kuhai Games, Erliangjiu, the producer of Happyguys Studio, and Qiu Chenxi, the producer of Matrix Games, were invited to share their team's new products and related research and development experience with the participants. Wonderful views were frequently presented and the atmosphere was warm.
Developer training camp guest sharing
In the FBEC2020 interactive exhibition area, you can see Master Cicada, Network International, Akamai, Skyworth VR, Tianyi Cloud VR, DreamGlass, Chuangtong Lianda, Bixiao Project, 3Glasses, Hengsheng Dubbing, Noiton, Gyro Duoduo, XR Evolution, and Ruiliang Technology’s interactive booths. Guests stopped in front of the exhibitors to watch videos or queue up to experience it.
Interactive Exhibition Area of the Conference
70+ cooperative media focused on the FBEC2020 official news center. Official interviews in the four major fields of games, VR, blockchain, and digital marketing were launched simultaneously, from Bilibili Esports, Ping An Finance, and Baoneng More than 20 industry figures including Duan Yingka from the Group, NetEase Film Core, Huaqiang Fantawild, and Sanqi Interactive Entertainment were at the news center. Full of useful information, enjoy the feast of content!
Official News Center Interview
This afternoon, there are two sub-venues, the 3Glasses special session and the 2020XR Enterprise Monetization·Industry Application Forum, which are ready to go. The fifth Golden Gyro Award Ceremony is about to grandly open. The grand prize winners of more than 40 awards will be announced live, so stay tuned!
- 上一篇: 巴根区块链什么时候上线,巴根区块链能赚钱吗
- 下一篇: 四方精创是否是数字货币,四方精创资讯