为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

区块链钱包地址能破解口令吗安全吗,区块链钱包地址能破解口令吗

发布时间:2023-12-10-07:12:00 来源:网络 区块链知识 区块   口令   钱包

区块链钱包地址能破解口令吗安全吗,区块链钱包地址能破解口令吗

今天我们来聊聊区块链钱包地址能否破解口令安全吗,首先让我们来看看三个相关关键词:区块链技术、加密算法和钱包安全。

区块链技术是一种分布式数据库技术,它以不可篡改的方式记录和存储数据,可以有效地防止数据的篡改和被盗取。它可以用于记录和存储金融交易、智能合约、身份验证等数据,从而使得数据更加安全可靠。

加密算法是一种用于加密和解密信息的数学算法,它可以将明文信息转换为不可读的密文,以防止数据被第三方窃取,保护数据的安全性。目前,常用的加密算法有RSA、DES、AES等。

钱包安全是指保护钱包中资产的安全性,通常是指使用加密算法对钱包中的资产进行加密,以防止外部攻击者窃取资产。钱包安全还可以通过使用多种安全措施,如多因子认证、钱包密码等,来保护用户的资产安全。

那么,回到我们的问题:区块链钱包地址能破解口令安全吗?答案是否定的,因为钱包地址本身不包含任何口令,它只是一个指向钱包的字符串,只有在使用加密算法对钱包中的资产进行加密之后,才能保证钱包中资产的安全。因此,想要保护钱包中的资产安全,只有通过加密算法和钱包安全措施来保护,而不是通过钱包地址本身。

总之,区块链钱包地址能破解口令安全吗?答案是否定的,要想保护钱包中的资产安全,只有通过加密算法和钱包安全措施来保护,而不是通过钱包地址本身。


请查看相关英文文档

⑴ What can you do if you know the blockchain address?

With the address, others can transfer money to you.
Blockchain address generally refers to wallet address. To put it bluntly, a wallet on the blockchain is a tool for managing digital assets (what we usually call coins). The transfer of your coins in and out, as well as the records of transfers in and out, are all achieved through the wallet. Just like you need a home address when you go home, digital currency also needs a home address. The difference is that digital currency addresses are unique.
What is an address? In a blockchain system, the private key is generally a 256-bit binary string randomly generated by a special random algorithm, and the public key is generated from the private key through an irreversible algorithm, (i.e. You can only deduce the result from the initial value, but cannot deduce the initial value from the result), and the public key passes the address of the irreversible algorithm (Note: Yes

⑵ If the private key of the blockchain is lost Is there any way to retrieve it?

Let me start with the conclusion: it cannot be retrieved!
The reason why the blockchain has anonymity is because there is no identity on it, only the address and private information. To operate the assets on the address, the private key is the only and necessary condition. As a blockchain user, the private key is everything. And in order to ensure the security of the blockchain, with the current computing power and technology, It is absolutely impossible to infer the private key from the address. If it is feasible, then all addresses on the entire blockchain will lose their security, and the assets on the blockchain will lose their meaning.
So it is so difficult How to solve the application problem of memorizing private keys? At present, blockchain wallets have actually met the demand to a certain extent. Few people actually memorize such complicated private keys to play with the blockchain. But Xin's third-party private key custodian is also an option (in fact, it is very close to the concept of online hot wallet), and the private key system combined with biometric technology can also be a direction to explore. (Fingerprints, voiceprints, etc.)
For more blockchain-related content, please browse my summary post:
https://bbs.bumeng.cn/thread-848-1-1.html?hmsr=%E6%90% 9C%E6%90%9C%E9%97%AE%E9%97%AE&hmpl=&hmcu=&hmkw=&hmci=

⑶ What is the relationship between the blockchain private key, public key and address

The relationship between the blockchain private key, public key and address is that the private key generates a public key, and the public key is converted into an address. So the private key is the most important. The relationship between the three is irreversible. An address cannot generate a public key, nor can a public key be converted into a private key.

The third is the blockchain address, which is usually 26 to 35 alphanumeric characters. The blockchain address is mainly derived from the public key. The blockchain address is equivalent to the bank card number we usually use. It can be disclosed to anyone. There are no security restrictions. Its main function is to receive and send messages.Send digital assets on the blockchain.

Blockchain technology is now in its early stages of development, but because of its decentralization, security, non-tampering and other characteristics, it may have killer-level applications in life and work in the future and has attracted much attention from various countries. Pay attention to. This article is for reference only, please leave a message for discussion.

⑷ Can USDT be stolen through address transfer?

No and it is illegal. During the transfer process, you can identify whether they are based on the same protocol by the starting number of the currency address: the address issued based on the Omni protocol starts with "1", and the address issued based on the erc-20 protocol starts with "0x". In fire Coin Wallet, you can also identify it by the currency icon: the usdt added by default on the homepage is based on the Omni protocol, and there is a small "Omni" style icon in the upper right corner of the icon. For USDT issued on the eth address based on the ERC-20 protocol, there is a small "Ethereum" style icon in the upper right corner of the icon. If there are usdt assets that need to be stored in the ETH address, you can click the "Asset Management" button on the homepage and manually add RMB (USD) tether USD (hereinafter referred to as usdt) tokens in the "ETH token" tab.
Extended information
1.1usdt = 1 US dollar. Users can use usdt to exchange 1:1 with US dollars at any time. Tether strictly adheres to the 1:1 reserve guarantee, that is, for every USDT token issued, its bank account will have a capital guarantee of US$1. Users can check their funds on the Tether platform, ensuring transparency. Users can transfer USD to the bank account provided by the company through Swift, and can also exchange USDT through the exchange. When exchanging USD, reverse the operation. Usdt is a digital asset issued on the Bitcoin blockchain based on the Omni (formerly mastercoin) protocol. Its circulation is based on the Bitcoin blockchain, which is stable and reliable. The biggest feature of USDT is that it is equivalent to the same amount of U.S. dollars and can be exchanged for each other on the trading platform. Usdt can be considered a Bitcoin-like token. People can transfer, store and spend money through the wallet. USDT's design as a replica of the U.S. dollar on a digital network makes it a good hedge token in the highly volatile cryptocurrency market. Fiat first defined a concept, Fiat.
2. Of course, French currency does not refer to French currency, but legal currency, especially currency that has no intrinsic value but is circulated as currency due to the designation of the government and law. Such as US dollars, euros, Japanese yen and RMB. The word fiat refers to fiat currency in English and comes from Latin. The token issued by the tether company based on the stable value currency U.S. dollar (USD) is called tether USD, or usdt for short, 1 usdt = US $1. Usdt belongs to the blockchain 2.0 currency and is based on the Omni (original mother currency) protocol.for issuance and trading. The transaction confirmation and other parameters of USDT are consistent with Bitcoin. Users can transfer USD to the bank account provided by the company through Swift, or exchange USDT through the exchange. On redemption, the operation is reversed.

⑸ How to obtain the blockchain key file

1. A method for retrieving the blockchain system key, which is characterized by including the following steps: Step 1. Create Original key pair; Step 2, calculate the business key pair based on the original key pair; Step 3, calculate the address and account based on the business key pair; Step 4, when the business key is lost, perform Step 2. 2. According to the claims The method for retrieving the blockchain system key described in 1 is characterized in that the original key pair includes an original private key and an original public key. 3. The method for retrieving the blockchain system key according to claim 2, characterized in that in step 1, creating an original key pair includes the following steps: Step 11. Generate an original seed using a random number. ; Step 12: Generate an original key pair from the original seed through an asymmetric encryption algorithm. The original key pair includes an original private key and an original public key. 4. The blockchain system key retrieval method according to claim 1, characterized in that in step 2, the business key pair includes a business private key and a business public key. 5. The method for retrieving the blockchain system key according to claim 4, characterized in that in step 2, specifically, a business seed is generated according to the seed production data, and a business key is generated according to the business seed. Yes, it specifically includes the following steps: Step 21, use the original private key as the encryption key, perform a seed generation operation on the seed production data, and obtain a unique ciphertext as the business seed; Step 22, use the business seed The non-pair encryption algorithm generates a business key pair, which includes a business private key and a business public key. 6. The blockchain system key retrieval method according to claim 5, characterized in that in step 21, the seed production data includes the original public key or any other selected data. 7. The method for retrieving the blockchain system key according to claim 5, characterized in that in the step 21, the seed generation operation includes an hmac encryption algorithm operation, a salted hash encryption algorithm operation, Symmetric encryption algorithm operation or asymmetric encryption algorithm operation. 8. The method for retrieving the blockchain system key according to claim 3 or 5, characterized in that the asymmetric encryption algorithm includes rsa algorithm, ecc algorithm, ecdsa algorithm, sm2 algorithm and sm9 algorithm. Any of them. 9. The method for retrieving the blockchain system key according to claim 5, characterized in that if the unique ciphertext is not a hash value, then a hash operation is performed on the ciphertext to obtain The hash value of the ciphertext is used as the service seed; if the ciphertext is a hash value, it can be directly used as the service seed, or the hash operation can be performed again or multiple times, and the obtained hash value is used as the service seed. 10. The method for retrieving the blockchain system key according to claim 7, characterized in that:Symmetric encryption algorithms include any one of des algorithm, 3des algorithm, rc2 algorithm, rc4 algorithm, rc5 algorithm, aes algorithm, sm1 algorithm, sm4 algorithm, sm7 algorithm and zuc algorithm.

⑹ Dear friends, does anyone know how to retrieve the mnemonic phrase in the blockchain if it is lost?

There is no way to retrieve the mnemonic phrase if it is lost. Why? I lost my words and there is no way to retrieve them?

In the blockchain, all the user’s assets are stored on the blockchain, and the control of the assets on the chain is proven through the private key. Without the private key, you cannot control your assets. . Therefore, the essence of the wallet is a private key management tool. Users can use the wallet to create private keys, keep the private keys, and use the private keys to sign transactions. (Mnemonics are another form of private key. We recommend users to keep mnemonics because they are more convenient to keep and use)

The essence of a wallet created by a user is to randomly generate a The group mnemonic phrase, due to its decentralized nature, does not store the user's wallet private information. Therefore, after generating the mnemonic phrase, the user must keep it by himself. This set of mnemonic words can be used to derive the private key of the wallet, the public key of the wallet can be derived from the private key, and the wallet address can be derived from the public key.

According to the above explanation, if we want to retrieve the mnemonic phrase, we need to know the process of generating the mnemonic phrase: first generate a 128-bit random number, and then check the random number 4 bit, get a 132-bit number, and then divide it into every 11 bits, so that there are 12 binary numbers, and then use each number to look up the word list defined by BIP39, so that 12 mnemonics are obtained. So the question is, is it possible to collide with the mnemonic words through brute force cracking?

Let’s calculate the number of mnemonics that can be generated. The BIP39 mnemonic vocabulary contains a total of 2048 words, and each group of mnemonics has a total of 12 words. According to the formula: n!/( n - r )!, the number can be calculated as 2048!/(2048-12)! = 5. e+39. LJGG+V: sjqsszh

You may have no idea about this number. We can take an example and compare it. The amount of sand on the earth is about 1 followed by 18 zeros. If you can generate one million mnemonics per second, you can generate 1000000*60*60*24*365=3.1536 e+13 mnemonics in one year, and it will take approximately 1.6715937e+26 years to traverse all mnemonics , so brute force cracking is impossible to succeed.

So for users, if the mnemonic phrase and private key are all lost, they cannot be retrieved through brute force cracking. Because of the decentralized nature, they cannot be retrieved. However, if the mnemonic phrase is lost, the private key is still saved and will not affect the use of the wallet.

⑺ [Cat Talk] There are two keys to open a Bitcoin wallet: private key and public key

If you don’t understand the blockchain, you don’t know the most basic things like public key and private key. Conceptually, owning a wallet is like poking a crocodile in the head with your finger, for newcomers in the currency circle, it is extremely risky. This article is dedicated to new friends in the currency circle to help you sort out the basic common sense of Bitcoin wallets.

Blockchain Observation Network mentioned in the article "What is Blockchain" that in the blockchain world, everyone has two unique virtual keys: public key and private key.

"Public key" can be simply understood as a bank card, which can be sent to the counterparty of the transaction. The bank card number is equivalent to the "address" used in Bitcoin transfers.

To put it more professionally, the public key is a 65-byte string. How long is it? 130 letters and numbers stacked together. If the public key is too long, firstly, it will be too troublesome to make transactions. Secondly, why do you have to expose the true content of the public key? This is like taking out your bank card and showing it to others everywhere. Therefore, the address we see now is a shorter public key generated by the digest algorithm.

The other party can send you money only if they know your address; moreover, anyone who has your address can check the number of transactions (No. Transactions) of this wallet address on the official website of Blockchain.info, and receive How many Bitcoins have been received (Total Received), and how many Bitcoins are left in the wallet (Final Balance), as shown below:

"Private key" is like a bank card that cannot be told to others. password. It is a string of 256-bit random numbers. Because it is particularly inhumane for non-IT users to remember this binary private key full of 0s and 1s, this large string of private keys was processed, and the final private key was a string starting with 5/K/L presented before us.

The relationship between public key, private key and address is:

1) Private key → public key → address

The private key generates a unique corresponding public key key, and the public key generates a unique corresponding address;

2) Private key encryption, public key decryption

In other words, A uses the private key to encrypt the transaction information (digital signature ), B uses A's public key to decrypt the digital signature.

Among them, the private key is an extremely private thing. If you send your private key to someone else, start writing a novel now. The name has been decided for you, and it will be called "Farewell, Bitcoin."

If it were Teacher Li Xiaolai (onlineIt is strongly recommended for currency circle tycoons such as those who own hundreds of thousands of BTC) to use cold wallets (offline wallets) and store them separately; the rich people on TV have their own safes in banks. You can also refer to them if you have conditions.

At that time, the above method was the safest approach. But as the successor of Leek, let’s assume for the moment that we only use idle funds and hold a small number of Bitcoins, for example, less than 5. Then, cold wallets that cost thousands and are complex to operate are a bit overkill; therefore, the Blockchain Observation Network limits the choices to exchanges and light wallets:

On the trading platform If you buy (a very small amount of) Bitcoin on the exchange, you can continue to store it on the exchange without withdrawing it. This method is most suitable for newbies in the currency circle. Before we have a deep understanding of the story behind each cryptocurrency, we are always full of curiosity. Bitcoins placed on the exchange can be directly traded. The transaction is simple and fast, without the need to go through a digital wallet. ; On the other hand, the platform has a complete range of currencies, which can satisfy our early adopter mentality and make it easy to try out our skills at any time.

Moreover, large exchanges such as Huobi and Binance (which have been blocked) not only have a much higher security level than some small platforms designed to harvest leeks, but are also simple to operate and can be used quickly. To get started, you only need to keep your account and password safe (for a higher level of security, turn on Google two-step verification), and leave the rest to the platform.

It is worth noting that the assets stored on the exchange do not entirely belong to ourselves, but rather are lent to the platform. The number we see in the asset column is equivalent to the platform providing us with A white note for borrowing money. In addition, the trading platform itself is not decentralized. If security measures are not in place, users’ account passwords may be obtained by hackers.

Light wallets are relative to "full node" wallets.

Full-node wallets, such as Bitcoin-Core (core wallet), need to synchronize all blockchain data when running, occupy a considerable amount of memory space (currently at least 50GB or more), and are completely decentralized;

Although the light wallet also relies on other full nodes on the Bitcoin network, it only synchronizes transaction data related to itself, basically achieving decentralization and improving user experience.

According to different device types, we divide light wallets into:

1) PC wallet: suitable for computer desktop operating systems (such as Windows/MacOS/Linus);

2) Mobile wallet: suitable for Android and iOS smartphones, such as Bitether wallet (Ethereum also has a PC version);

3) Web wallet: accessed through a browser, such as mentioned above The web version of blockchain.

Light wallets are relatively simple to operate and are generally available for free. When applying for a wallet, the system will generate a private key. Get ready to hit the blackboard!

1) Do not take screenshots or photos and store them in your mobile phone;

2) Do not send private key information to anyone;

3) It is best to write down (several copies) by hand and hide them Where you feel safest.

In a word, whoever masters the private key of the wallet has absolute control of the wallet. As long as the private key is in your hands, your Bitcoins will never be lost.

Finally, a few words. As ordinary investors, we don’t need to do much:

1) Take a snack and don’t lose your mobile phone. After all, you have lost the right mobile phone. There are risks in the Bitcoin wallet;

2) Don’t delete the wallet application on the device. Unless you decide not to use this wallet anymore, it will be very troublesome later;

3) Set a complex password (see point 1 for the reason) and remember it carefully. This is what you will keep if the private key is lost.

For those of you who can’t remember your password and are too lazy to back up your private key scientifically, let’s just keep the money in the bank.

⑻ The importance of blockchain wallets

Now more and more people are beginning to participate in blockchain projects, and those who understand and participate in them believe that they will use blocks Chain wallet, the "wallet" here refers to a virtual tool used to store and use virtual currency.

Wallets are mainly divided into cold wallets and hot wallets, which include private keys, public keys and auxiliary words. Next, I will explain their differences and functions in detail.

Cold wallet: A cold wallet refers to a wallet that is not connected to the Internet and stores digital currency offline. Users generate digital currency addresses and private keys on an offline wallet and then save them. The cold wallet integrates functions such as digital currency storage, multiple transaction password settings, publishing the latest market conditions and information, and providing hard fork solutions, which can effectively prevent hackers from stealing.

Hot wallet: Hot wallet refers to a wallet that needs to be connected to the Internet. It is more convenient to use, but now the network is more complex, there are many phishing websites, and there are risks, so it is difficult to use a wallet or exchange. It is best to set different passwords and enable secondary authentication to ensure the security of your assets.

In summary, cold wallets are more secure than hot wallets.

Private key: The private key is a string of data generated by a random algorithm. It can calculate the public key through an asymmetric encryption algorithm, and the public key can then calculate the currency address. The private key is very important, as the password is hidden from all but the owner of the address. Blockchain assets are actually on the blockchain. The owner actually only owns the private key and has absolute control over the assets in the blockchain through the private key. Therefore, the core issue of blockchain asset security lies in the storage of the private key. The owner must keep it safe. and traditional useCompared with account name and password forms, the biggest advantage of using public key and private key transactions is to improve the security and integrity of data transmission. Because of the corresponding relationship between the two, users basically do not have to worry about the data being hacked during the transmission process. Possibility of interception or modification midway. At the same time, because the private key encryption must be decrypted by the public key it generates, the sender does not have to worry about the data being forged by others.

Public key: The public key appears in pairs with the private key. Together with the private key, they form a key pair and are stored in the wallet. The public key is generated from the private key, but the private key cannot be derived from the public key. The public key can obtain the wallet address through a series of algorithm operations, so it can be used as a certificate of ownership of this wallet address.

Mnemonic phrase: The mnemonic phrase uses a fixed algorithm to convert the private key into more than ten common English words. The mnemonic phrase and the private key are interoperable and can be converted into each other. It is just a friendly format for the private key of the blockchain digital wallet.

Keystore: Mainly common in Ethereum wallet apps (Bitcoin is similar to the Ethereum Keystore mechanism: BIP38). It is obtained by encrypting the private key through the wallet password, and the mnemonic phrase Different, generally it can be saved as text or JSON format. In other words, Keystore needs to be decrypted with the wallet password before it is equivalent to the private key. Therefore, Keystore needs to be used with the wallet password to import the wallet. When a hacker steals the Keystore, without a password, it is possible to unlock the Keystore by brute force cracking the Keystore password. Therefore, it is recommended that users set a slightly more complicated password, such as adding special characters, at least 8 characters, and make it safe. storage.

In summary: The function of the wallet is to protect our private key. The private key is the full authority to control the assets. Only those who have the private key can use the virtual currency in this account. When using the wallet, remember not to disclose your wallet's private key, mnemonic phrase, Keystore and other information to others. This information is important information that can directly steal your digital assets.

Things to note when using the wallet:

1. Make a backup copy of the private key and mnemonic phrase. It is best to write a handwritten copy on your mobile phone and save it.

2. Do not click on unknown websites easily.

3. Do not take screenshots or take photos to save.

In short, the most important thing is to keep your private key.

⑼ The cryptographic technology of blockchain includes

Cryptography technology is the core of blockchain technology. The cryptographic technology of blockchain includes digital signature algorithm and hash algorithm.
Digital Signature Algorithm
Digital Signature Algorithm is a digital signatureA subset of the standard that represents a specific public-key algorithm used only for digital signatures. The key is run on the message hash generated by SHA-1: to verify a signature, the hash of the message is recalculated, the signature is decrypted using the public key and the results are compared. The abbreviation is DSA.

Digital signature is a special form of electronic signature. So far, at least more than 20 countries have passed laws recognizing electronic signatures, including the European Union and the United States. my country's electronic signature law was adopted at the 11th meeting of the Standing Committee of the 10th National People's Congress on August 28, 2004. . A digital signature is defined in the ISO 7498-2 standard as: “Some data appended to a data unit, or a cryptographic transformation made to the data unit, which allows the recipient of the data unit to confirm the source and origin of the data unit. The integrity of the data unit and protects the data from forgery by a person (e.g. the recipient)”. The digital signature mechanism provides an identification method to solve problems such as forgery, denial, impersonation and tampering. It uses data encryption technology and data transformation technology to enable both parties to send and receive data to meet two conditions: the receiver can identify what the sender claims. Identity; the sender cannot later deny that it sent the data.
Digital signature is an important branch of cryptography theory. It is proposed to sign electronic documents to replace handwritten signatures on traditional paper documents, so it must have 5 characteristics.
(1) The signature is credible.
(2) The signature cannot be forged.
(3) Signatures are not reusable.
(4) Signed documents are immutable.
(5) The signature is non-repudiation.
Hash algorithm
Hash is to convert an input of any length (also called pre-mapping, pre-image) into a fixed-length output through a hash algorithm, and the output is a hash value. This transformation is a compressed mapping in which the space of hash values ​​is usually much smaller than the space of inputs. Different inputs may hash to the same output, but the input values ​​cannot be deduced in reverse. Simply put, it is a function that compresses a message of any length into a message digest of a fixed length.
Hash algorithm is a one-way cryptographic system, that is, it is an irreversible mapping from plaintext to ciphertext, with only encryption process and no decryption process. At the same time, the hash function can change an input of any length to obtain a fixed-length output. The one-way characteristics of the hash function and the fixed length of the output data allow it to generate messages or data.
Represented by the Bitcoin blockchain, secondary hashing is used many times in the workload proof and key encoding process, such as SHA (SHA256(k)) or RIPEMD160 (SHA256(K)). This The advantage of this method is that it increases the workload orThe author increases the difficulty of cracking without knowing the agreement.
Represented by the Bitcoin blockchain, the two main hash functions used are:
1. SHA-256, mainly used to complete PoW (proof of work) calculations;
2.RIPEMD160, mainly used to generate Bitcoin addresses. As shown in Figure 1 below, the process of generating an address from a public key for Bitcoin.

⑽ Imtoken wallet "address, password, private key, mnemonic phrase, Keystore"

Before using imToken, there are several terms that must be deeply understood, otherwise it may cause confusion. Loss of blockchain assets, these terms are address, password, private key, mnemonic, and keystore.

If we take a bank account as an analogy, the corresponding contents of these 5 words are as follows:

Address = bank card number

Password = bank card password< br />
Private key = bank card number + bank card password

Mnemonic = bank card number + bank card password

Keystore + password = bank card number + bank card Password

Keystore ≠ Bank card number

Address = bank card number

1. Generate

After creating the wallet, a A 42-bit string starting with 0x. This string is the wallet address. One wallet corresponds to one wallet address. The address is unique and cannot be modified. That is to say, the transfer and payment addresses of all tokens in a wallet are the same. For example, the transfer and payment address of ETH in a wallet is the same as the transfer and payment address of EOS. This is different from that on the trading platform. The transfer and payment addresses for different tokens on the platform are generally different. Therefore, you must confirm the address before transferring money to the trading platform.

2. Purpose

The wallet address can be used to receive money transfers from others, and can also be used as a certificate for transferring money.

Password = bank card password

1. Settings

When creating a wallet, you need to set a password, which requires no less than 8 characters. For security reasons, it is best to make the password more complex. The password can be modified or reset. There are two ways to modify the password. One is to modify the password directly, which requires entering the original password. If you forget the original password, use the mnemonic phrase or private key to import the wallet, and set a new password at the same time.

2. Purpose

The password has two uses. One is the payment password when transferring money;The second is the login password when importing the wallet using keystore.

3. Features

In the real world, a bank card only corresponds to one password. After the password is modified, the original password will lose its effect. But in the imToken wallet, it is different. A wallet can use different passwords on different mobile phones, and they are independent of each other and do not affect each other. For example, if a password is set in mobile wallet A, importing the wallet on mobile phone B and setting a new password will not affect the password usage of mobile wallet A.

Private key = bank card number + bank card password

1. Export

After creating the wallet, enter the password to export the private key. This private key It is a plain text private key, consisting of a 64-bit string. A wallet has only one private key and cannot be modified.

2. Purpose

In the imported wallet, enter the private key and set a password (without entering the original password), you can enter the wallet and have control of the wallet. You can transfer the tokens in the wallet.

Mnemonic phrase = bank card number + bank card password

Mnemonic phrase = private key

1. Backup

After creating the wallet, a backup mnemonic function will appear. Select the backup mnemonic and enter the password. 12 words will appear. There is a space between each word. This is the mnemonic. There is only one mnemonic for a wallet. The word cannot be modified.

2. Purpose

The mnemonic is another form of private key and has the same function as the private key. In the import wallet, enter the mnemonic and By setting a password (without entering the original password), you can enter the wallet and have control of the wallet, and you can transfer the tokens in the wallet.

3. Features

The mnemonic phrase can only be backed up once. After the backup, it will never be displayed in the wallet again, so be sure to copy it down when backing up.

keystore+password=bank card number+bank card password

Keystore ≠ bank card number

keystore=encrypted private key

keystore+password=private key

1. Backup

There is a backup keystore function in the wallet. Select the backup keystore, enter the password, and a large section of characters will appear. This iskeystore.

2. Purpose

In the imported wallet, select the official wallet, enter the keystore and password, and you can enter the wallet. It should be noted that this password is the wallet password originally set on this phone. This is different from using a private key or mnemonic phrase to import a wallet. Using a private key or mnemonic phrase to import a wallet does not require you to know the original password and you can directly reset it. Set password.

3. Features

The keystore is an encrypted private key and is closely related to the wallet password. After the wallet password is modified, the keystore will change accordingly. When using the keystore to import the wallet , you need to enter a password. This password is the wallet password when backing up the keystore, and has nothing to do with subsequent password changes.

6. Conclusion

In the real world, if you lose your bank card and forget your password, you can go to the bank to help you find it, and your money is still yours. Money cannot be lost, this is the advantage of centralization.

But in the blockchain world, no one stores your wallet information except yourself. If your wallet information is lost, no one can help you retrieve it, not even the wallet company. Therefore, as long as you protect your wallet information, the property in your wallet belongs only to you and no one can take it away. This is the advantage of decentralization.

1. Forget

What will be the consequences if you forget your wallet information? There are several situations:

(1) If the address is forgotten, you can use the private key, mnemonic phrase, keystore + password, and import it into the wallet to retrieve it.

(2) If you forget your password, you can use your private key, mnemonic phrase, and import it into your wallet to reset your password.

(3) If the password is forgotten and there is no backup of the private key and mnemonic phrase, the password cannot be reset and the token cannot be transferred, which is equivalent to losing control of the wallet.

(4) If the password is forgotten, the keystore will lose its function.

(5) If you forget the private key, you can export the private key as long as your wallet has not been deleted and the password has not been forgotten.

(6) If the private key is forgotten, you can also use mnemonic words, keystore + password, and import it into the wallet to retrieve it.

(7) If you forget the mnemonic phrase, you can import the private key, keystore+password into the wallet and back up the mnemonic phrase again.

(8) If you forget the keystore, as long as your wallet has not been deleted and the password has not been forgotten, you can back up the keystore again.

(9)keysIf you forget tore, you can use the private key and mnemonic phrase to import the wallet and back up the keystore again.

As can be seen from the above, as long as there is information in "private key, mnemonic phrase, Keystore + password", the wallet is there. Therefore, it is most important to back up your "private key, mnemonic phrase, Keystore + password".

2. Leakage

It is important to back up your wallet information, and it is also important to prevent wallet information from being leaked. What will be the consequences if wallet information is leaked? There are several situations:

(1) The address is leaked, it doesn’t matter.

(2) The password is leaked, it doesn’t matter.

(3) If the address + password are leaked, it doesn’t matter as long as the phone is not lost.

(4) The keystore is leaked, but the password is not. It doesn’t matter.

(5) If the keystore+ password is leaked, others can enter the wallet and transfer the coins.

(6) If the private key is leaked, others can enter the wallet and transfer the coins.

(7) If the mnemonic phrase is leaked, others can enter the wallet and transfer the coins.

As can be seen from the above, as long as one piece of information in "private key, mnemonic phrase, Keystore + password" is leaked, others will have control of your wallet, and the coins in your wallet will be Others move away. Therefore, the "private key, mnemonic phrase, Keystore + password" must not be leaked. Once the possibility of leakage is discovered, the coins inside must be transferred immediately.

3. Backup

Since the private key, mnemonic phrase, Keystore + password are so important, how to save them? The safest way is: handwritten paper< br />
Since the Keystore contains a lot of content, it is inconvenient to copy it by hand, and it is not safe to save it on a computer. Therefore, you do not need to back up the Keystore. It is enough to just copy the private key and mnemonic phrase by hand. Pay attention to the following points:

(1) Make several copies, place them in different safe areas, and tell your family members.

(2) Verify the handwritten content and import it into the wallet to see if it can be successful to prevent copying errors.

(3) Do not disseminate backup information on Internet-connected devices, including email, QQ, WeChat, etc.

(4) Teach your family how to operate a wallet.

If you need to query your blockchain assets, please click belowFor the corresponding blockchain asset link, enter the asset address and click Query.

BTC blockchain query link https://btc.com/

ETH series blockchain query link https://etherscan.io/
< br /> ETC Blockchain Query http://gastracker.io/

ZEC Blockchain Query https://explorer.zcha.in/

BTS Block Chain query https://bitshares.openledger.info/#/dashboard

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 37790 文章总数
  • 3637292访问次数
  • 3082建站天数