为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

区块链多节点备份什么意思,区块链多节点备份怎么操作

发布时间:2023-12-15-08:45:00 来源:网络 区块链知识 区块   节点   备份

区块链多节点备份什么意思,区块链多节点备份怎么操作

区块链多节点备份是一种分布式的数据备份技术,它可以让一个网络中的多个节点都能够拥有一份完整的数据备份。这种技术可以有效防止单点故障,保证网络的可靠性,也能够提高网络的安全性。下面我们就来介绍一下区块链多节点备份的三个关键词:分布式节点、备份节点和备份算法。

分布式节点是指在区块链网络中,一个节点可以拥有多个副本,每个副本都可以在不同的节点上运行。这样,当一个节点发生故障时,另外一个节点就可以接管这个节点的工作,确保网络的可靠性。此外,分布式节点还可以提高网络的安全性,因为它可以防止攻击者攻击单个节点,从而破坏整个网络。

备份节点是指在区块链网络中,当一个节点发生故障时,网络中的其他节点会自动将其备份数据拷贝到备份节点上,以确保网络的可靠性。备份节点也可以防止攻击者攻击单个节点,从而破坏整个网络。

备份算法是指在区块链网络中,当一个节点发生故障时,网络中的其他节点会自动使用备份算法来将备份数据拷贝到备份节点上,以确保网络的可靠性。备份算法是一种分布式的算法,它可以有效地分发数据,减少单点故障,并保证网络的安全性。

以上就是关于区块链多节点备份的三个关键词:分布式节点、备份节点和备份算法的介绍。这种技术可以有效防止单点故障,保证网络的可靠性,也能够提高网络的安全性。如果您想要了解更多关于区块链多节点备份的知识,可以前往我们的网站进行查看。


请查看相关英文文档

『一』What are the existing problems of blockchain technology

1. Performance problems

Volume problems

area Blockchain’s requirements for data backup pose challenges for storage space. Blockchain requires that after a transaction is completed, it is broadcast to the entire network, and every node in the system must back up data.

Take Bitcoin as an example. The block data since the creation block has exceeded 60GB, and the amount of blockchain data is still increasing. This will bring problems to the operation of the Bitcoin Core client. A big challenge.

Processing speed issues

The Bitcoin blockchain currently processes a maximum of 6.67 transactions per second, and a confirmation time is about 10 minutes, which can easily cause congestion delays for a large number of transactions, which may Applications with small multiple transactions and highly time-sensitive transactions will be restricted.

Although there are some methods to overcome it, methods to comprehensively solve transaction efficiency still need to be discovered.

Energy consumption is too high

Thirdly, the computing power in the mining process does not produce additional actual social value, and also wastes a large amount of electronic resources. With the increasing popularity of currency, blockchain has gradually become a capital-intensive industry with high energy consumption.

2. Centralization problem

Inequality of nodes

First, in theory, every node in the distributed network should be treated equally , but in order to obtain rewards for mining, each node may increase its computing power to compete for hardware, resulting in node inequality and destroying the randomness of blockchain accounting rights.

Industrialized and large-scale mining has given rise to mining pools

Theoretically, if the mining pools collude to control more than 51% of the computing power for system supply, a dual Although the costs of payment far exceed the benefits in the actual process, the possibility of collusive supply cannot be denied.

3. Privacy and security issues

Private keys are easily stolen

First, the current blockchain uses an asymmetric key mechanism. It has high security, but the private key is stored locally and can be easily stolen by hackers.

The transparency of blockchain data can easily lead to privacy leaks

Every participant in the public chain can obtain a complete data backup, and the entire system is open and transparent. The currency protects privacy by isolating the connection between the transaction address and the holder’s true identity.

When the blockchain needs to carry more businesses, how nodes verify information and execute commands requires more consideration.

4. Upgrade and incentive issues

The number of participating nodes in the public chain is huge

Whether it is upgradingNeither upgrading nor fixing errors can be done centrally by shutting down the system, so it may be necessary to consider relaxing decentralization.

There is a competitive game between each node

Requires the improvement of incentive compatibility mechanism, how to enable self-interested nodes in the decentralized system to spontaneously carry out block data verification And accounting work, and designing a reasonable penalty function to suppress irrational competition is another challenge faced by the blockchain.

『二』How does blockchain prevent data tampering

Blockchain is a new application model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithms. .

Different from traditional distributed storage, the uniqueness of blockchain distributed storage is mainly reflected in two aspects: First, each node of the blockchain Complete data is stored according to the block chain structure. Traditional distributed storage generally divides the data into multiple parts for storage according to certain rules. Second, the storage of each node in the blockchain is independent and has equal status, relying on the consensus mechanism to ensure the consistency of storage, while traditional distributed storage generally synchronizes data to other backup nodes through the central node.

No node can record ledger data independently, thus avoiding the possibility of a single bookkeeper being controlled or bribed to record false accounts. Also because there are enough accounting nodes, theoretically speaking, the accounts will not be lost unless all nodes are destroyed, thereby ensuring the security of the accounting data.

The transaction information stored on the blockchain is public, but the account identity information is highly encrypted and can only be accessed with the authorization of the data owner, thus ensuring the security and personalization of the data. privacy.

Blockchain proposes four different consensus mechanisms, which are suitable for different application scenarios and strike a balance between efficiency and security.

Based on the above characteristics, this data storage technology can perfectly prevent the possibility of data tampering. In reality, it can also be applied to many fields. It is better than our electronic certificate storage technology in electronic contract signing. provides a safer and more reliable guarantee.

『三』What is blockchain technology? What exactly is blockchain?

In a narrow sense, blockchain is a way to store data in a chronological order. A chained data structure composed of blocks connected in sequence, and a cryptographically guaranteed distributed ledger that cannot be tampered with or forged.

Broadly speaking, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, and uses cryptography to ensure data transmission and access. It is a new distributed infrastructure and computing method that uses smart contracts composed of automated script codes to program and operate data securely.

[Infrastructure]

Generally speaking, the blockchain system consists of data layer, network layer, consensus layer, incentive layer, contract layer and application layer composition. in, the data layer encapsulates the underlying data blocks and related basic data and basic algorithms such as data encryption and timestamps; the network layer includes distributed networking mechanisms, data dissemination mechanisms and data verification mechanisms; the consensus layer mainly encapsulates the network nodes Various consensus algorithms; the incentive layer integrates economic factors into the blockchain technology system, mainly including the issuance mechanism and distribution mechanism of economic incentives; the contract layer mainly encapsulates various scripts, algorithms and smart contracts, and is the core of the blockchain technology The basis of programming features; the application layer encapsulates various application scenarios and cases of the blockchain. In this model, the chain block structure based on timestamps, the consensus mechanism of distributed nodes, economic incentives based on consensus computing power, and flexible programmable smart contracts are the most representative innovations of blockchain technology.

Extended information:

[Blockchain core technology]

Blockchain mainly solves the trust and security issues of transactions, so it addresses this issue Four technological innovations:

1. Distributed ledger means that transaction accounting is completed by multiple nodes distributed in different places, and each node records a complete account, so they all Can participate in supervising the legality of transactions and can also jointly testify for them.

The uniqueness of blockchain's distributed storage is mainly reflected in two aspects: First, each node of the blockchain stores complete data according to the block chain structure. Traditional distributed storage generally stores The data is divided into multiple parts for storage according to certain rules. Second, the storage of each node in the blockchain is independent and has equal status, relying on the consensus mechanism to ensure the consistency of storage, while traditional distributed storage generally synchronizes data to other backup nodes through the central node.

No node can record ledger data independently, thus avoiding the possibility of a single bookkeeper being controlled or bribed to record false accounts. Also because there are enough accounting nodes, theoretically speaking, the accounts will not be lost unless all nodes are destroyed, thereby ensuring the security of the accounting data.

2. Asymmetric encryption and authorization technology. Transaction information stored on the blockchain is public, but account identity information is highly encrypted and can only be accessed with authorization from the data owner. , thus ensuring data security and personal privacy.

3. The consensus mechanism is how all accounting nodes reach a consensus to determine the validity of a record. This is both a means of identification and a means of preventing tampering. Blockchain proposes four different consensus mechanisms, which are suitable for different application scenarios and strike a balance between efficiency and security.

The consensus mechanism of the blockchain has the characteristics of "the minority obeys the majority" and "everyone is equal". "The minority obeys the majority" does not entirely refer to the number of nodes, but can also be the computing power and the number of shares. Or other characteristic quantities that the computer can compare. "Everyone is equal" means that when a node meets the conditions, all nodes have the right to give priority to the consensus result, which will be directly recognized by other nodes and may eventually become the final consensus result.

4. Smart contracts. Smart contracts are based on these trustworthy and non-tamperable data and can automatically execute some predefined rules and terms. Take insurance as an example. If everyone's information (including medical information and risk occurrence information) is true and trustworthy, it will be easy to automate claims settlement in some standardized insurance products.

In the daily business of insurance companies, although transactions are not as frequent as those in the banking and securities industries, the reliance on trusted data continues unabated. Therefore, the author believes that using blockchain technology from the perspective of data management can effectively help insurance companies improve their risk management capabilities. Specifically speaking, it is mainly divided into risk management of policyholders and risk supervision of insurance companies.

Blockchain-Network

『四』What is the core technology of blockchain

Simply put, blockchain is a system that provides Byzantine fault tolerance , and ensures the final consistency of the distributed database; from the data structure point of view, it is a chain data block structure based on time series; from the node topology point of view, all its nodes are redundant backups of each other; from the operation point of view , which provides a public and private key management system based on cryptography to manage accounts.
Perhaps the above concept is too abstract, let me give you an example so that you can understand it easier.
You can imagine that there are 100 computers distributed around the world. The network between these 100 machines is a wide area network, and the owners of these 100 machines do not trust each other.
So, what kind of algorithm (consensus mechanism) do we use to provide it with a trustworthy environment and make:
The data exchange process between nodes cannot be tampered with, and the generated historical records It cannot be tampered with;
The data of each node will be synchronized to the latest data, and the validity of the latest data will be verified;
Based on the principle of the minority obeying the majority, the data maintained by the overall node can objectively reflect the exchange history.
Blockchain is a technical solution created to solve the above problems.
2. The core technology components of blockchain
Whether it is a public chain or a consortium chain, it requires at least four modules: P2P network protocol, distributed consistency algorithm (consensus mechanism), encryption signature algorithm, Account and storage model.
1. P2P network protocol
P2P network protocol is the lowest module of all blockchains and is responsible for network transmission and broadcast of transaction data, node discovery and maintenance.
Usually what we use is the Bitcoin P2P network protocol module, which follows certain interaction principles. For example: when connecting to other nodes for the first time, you will be required to confirm the status according to the handshake protocol. After the handshake, you will start to request the address data and block data of the Peer node.
This P2P interaction protocol also has its own set of instructions, which are reflected in the command in the Message Header.In the domain, these commands provide the upper layer with functions such as node discovery, node acquisition, block header acquisition, and block acquisition. These functions are very low-level and very basic functions. If you want to learn more, you can refer to the Peer Discovery chapter in the Bitcoin Developer Guide.
2. Distributed consensus algorithm
In the field of classic distributed computing, we have non-Byzantine fault-tolerant algorithms represented by the Raft and Paxos algorithm families, as well as the PBFT consensus algorithm with Byzantine fault-tolerant characteristics.
If we look at it from the perspective of technological evolution, we can draw a picture in which blockchain technology has expanded the original distributed algorithm economically.
In the picture, we can see that computer applications were mostly single-point applications at the beginning, and cold disaster recovery was used for high availability and convenience. Later, they developed into multi-active in different places. These multi-active in different places may use load balancing. and routing technology. With the development of distributed system technology, we have transitioned to distributed systems based on Paxos and Raft.
In the field of blockchain, PoW workload proof algorithm, PoS equity proof algorithm, and DPoS proxy equity proof algorithm are mostly used. The above three are the mainstream consensus algorithms in the industry. These algorithms are similar to the classic distributed consensus algorithm. The difference is that they incorporate the concept of economic games. Below I will briefly introduce these three consensus algorithms respectively.
PoW: Usually refers to solving a mathematical problem of specific difficulty under given constraints. Whoever solves it faster can obtain the right to bookkeeping (block production). This solution process is often converted into a calculation problem, so when competing for speed, it becomes who has a better calculation method and whose equipment has better performance.
PoS: This is a proof-of-stake mechanism. Its basic concept is that the difficulty of generating a block should be proportional to your stake (ownership ratio) in the network. The core idea of ​​its implementation is: Use the coin age (CoinAge) of your locked tokens and a small proof of work to calculate a target value. When the target value is met, you will be able to obtain accounting rights.
DPoS: A simple understanding is to convert the bookkeepers in the PoS consensus algorithm into a small circle composed of a specified number of nodes, instead of everyone can participate in bookkeeping. This circle may have 21 nodes or 101 nodes, depending on the design. Only nodes in this circle can obtain accounting rights. This will greatly improve the throughput of the system, because fewer nodes means that the network and nodes are controllable.
3. Encrypted signature algorithm
In the field of blockchain, the most commonly used hash algorithm is the hash algorithm. The hash algorithm has the characteristics of collision resistance, irreversibility of the original image, and problem friendliness.
Among them, problem friendliness is the basis for the existence of many PoW currencies. In Bitcoin, SHA256 algorithmThe method is used as the calculation method for proof of work, which is what we call the mining algorithm.
In Litecoin, we will also see the Scrypt algorithm, which is different from SHA256 in that it requires large memory support. In some other currencies, we can also see mining algorithms based on the SHA3 algorithm. Ethereum uses an improved version of the Dagger-Hashimoto algorithm, named Ethash, which is an IO-intractable algorithm.
Of course, in addition to the mining algorithm, we will also use the RIPEMD160 algorithm, which is mainly used to generate addresses. Most of the numerous Bitcoin derivative codes adopt the Bitcoin address design.
In addition to addresses, we will also use the core and the cornerstone of the blockchain Token system: public and private key cryptographic algorithms.
In the Bitcoin code, ECDSA is basically used. ECDSA is a combination of ECC and DSA. The entire signature process is similar to DSA, except that the algorithm used in the signature is ECC (Elliptic Curve Function).
Technically, we start by generating a private key, then generate a public key from the private key, and finally generate an address from the public key. Each of the above steps is an irreversible process, which means that the public key cannot be derived from the address. , derived from the public key to the private key.
4. Account and transaction model
From the initial definition, we know that blockchain can be considered a distributed database from a technical perspective only. So, what type of database do most blockchains use? What about the database?
When I designed the Metaverse blockchain, I referred to a variety of databases, including NoSQL’s BerkeleyDB and LevelDB, and some currencies use SQL-based SQLite. These underlying storage facilities are mostly lightweight embedded databases. Since they do not involve the ledger characteristics of the blockchain, these storage technologies are no different from those used in other situations.
The ledger characteristics of blockchain are usually divided into UTXO structure and ledger structure based on Accout-Balance structure, which we also call the ledger model. UTXO is the abbreviation of "unspent transaction input/output", which translated means "unspent transaction input/output".
This is an accounting mode for Token transfer in the blockchain. Each transfer appears in the form of input and output; in the Balance structure, there is no such mode.

『Wu』What technology does the blockchain apply to achieve this function?

The blockchain applies the following technologies to achieve it
The first is the consensus mechanism, the commonly used consensus The main mechanisms include PoW, PoS, DPoS, PBFT, PAXOS, etc. Since there is noThere is a center, so there needs to be a preset rule to guide the nodes of all parties to reach an agreement on data processing. All data interactions must be carried out in accordance with strict rules and consensus;
The second is cryptography technology, password Cryptozoology technology is one of the core technologies of blockchain. Many classic algorithms of modern cryptography are used in current blockchain applications, mainly including: hash algorithm, symmetric encryption, asymmetric encryption, digital signature, etc.
The third type is distributed storage. Blockchain is a distributed ledger on a peer-to-peer network. Each participating node will independently and completely store and write block data information. The advantages of distributed storage compared with traditional centralized storage are mainly reflected in two aspects: data information is backed up on each node to avoid data loss due to single point failure; data on each node is stored independently, effectively avoiding Malicious tampering with historical data.
Smart contracts: Smart contracts allow trusted transactions without a third party. As long as one party reaches the pre-set goals of the agreement, the contract will automatically execute the transaction. These transactions are trackable and irreversible. It has the advantages of transparency, credibility, automatic execution, and mandatory performance. Blockchain technology has many unique features that make it a unique invention and give it unlimited horizons to explore.

『Lu』 What is blockchain mining and what does it do? Detailed introduction to blockchain and virtual currency

When Bitcoin was first released, people discovered that it was decentralized. , not subject to any central control; it is completely open, except for the encryption of transaction information, the entire system information is highly transparent, and the technology is open source; security, as long as you cannot control %51 of all nodes, you cannot modify the data arbitrarily, which makes it Relatively safe; independent, the entire model and Bitcoin do not rely on any third party. All nodes verify and exchange data within the system without any intervention

Here we explain in detail what blockchain technology is, To put it bluntly, it is block + chain, so what is "block"? What is a "chain" again?

A block is a ledger. Transaction accounting is completed by multiple nodes distributed in different places, and each node records a complete account, so they can all participate in supervising the legality of the transaction, and at the same time Can jointly testify for it

Each block contains the cryptographic hash of the previous block, the corresponding timestamp, and the transaction data (usually a hash value calculated using the Merkle tree algorithm) represents), this design makes the block content difficult to tamper with. Distributed ledgers connected by blockchain technology can effectively record transactions between two parties and permanently verify the transactions.

The function of the hash function h(): convert a string of any length into a fixed-length (for example, 256 bits) output. The output is also called a hash value. This output is irreversible

It is difficult to find two different x and y such that h(x) = h(y), that is to say, two different inputs will have different outputs. Theoretically, two different inputs may have different outputs, but this is almost impossible. For example, if an infinite space is mapped to a finite space, there must be a many-to-one situation. The theory exists, but there are no rules. It is guaranteed that you cannot find this result through any mathematical inference. Why is it 256 bits here? Isn't it longer? Because 256 bits are secure enough.

Split the ledger into blocks. For example, a piece of paper in a book is a block. Each block records transactions within a period of time, such as 10 minutes.

We divide Each piece of paper is likened to a block. A part of content is added to each block. We call it a block header, which records the hash value of the parent block. Each block stores the hash value of the parent block. , connect all blocks smoothly to form a blockchain

Record the hash value of block 1 to the block header of block 2. In this way, the block header of each block is recorded The hash value of the parent block, each block is linked in order, this is called a blockchain. The first block has no block header and is also called the genesis block

The blockchain is a ledger. Only when transactions occur in the ledger will the money in your account increase. If you need to make a transaction, you first need an account number and password. Just like your bank card has an account number and password, others can make a transfer to you. The account password on the block ledger is the public key and private key

Lao Wang (who already has a private key and a public key) wants to transfer 10 BTC to Zhang, which requires some operations

It is proved that Lao Wang himself issued the transfer signature function Sign (Lao Wang’s private key + Transfer information: Lao Wang transferred 10 BTC to Zhang San) = signature of this special account
The verification is that Lao Wang himself issued the transfer verification function Verify (Lao Wang’s address + Transfer details: Lao Wang transferred 10 BTC to Zhang San) + Signature of this transfer) = true
Once the transfer is recorded in the block, no one can change it. Zhang San will increase it by 10 BTC, and Lao Wang will decrease it by 10 BTC accordingly. The entire operation is automatic, such as your wallet The app will help you do this. The app knows your private key, you tell the wallet the transaction content, the wallet signature is announced to the entire network, and it waits for others to verify the transaction

Centralized accounting The efficiency will be higher. Banks, governments or Alipay will keep accounts for you, which is very reliable, because they can't touch your money unless they have your private key

There are some disadvantages in centralized accounting< /p>

In decentralization, everyone can keep accounts, and everyone can keep a complete ledger. Anyone can download the open source program, participate in Bitcoin’s p2p network, and listen to data from all over the worldThe transaction sent becomes an accounting node and participates in accounting. Assume that Xiaoyi releases a transaction and broadcasts it to the entire network. Accounting node A monitors the transaction. A verifies that the transaction is true and then puts it into the transaction pool to continue. Spread to other nodes, because it is network propagation, the transaction pools of different accounting nodes are not necessarily the same at the same time. Every 10 minutes, one person is selected from all accounting nodes according to a certain method, and after verifying that the transaction of this node is true , and then compare the transaction records in the selected node transaction pool with the transaction records in the transaction pool of your own (A) node. After the comparison, you will delete the transactions recorded by the selected accounting node in your own transaction pool. Otherwise, continue accounting and wait for the next selection. Every 10 minutes is a cycle. During this 10 minutes, all accounting nodes will record accounts normally. After 10 minutes, a node will be selected to treat the transactions in its transaction pool as a new transaction. block, this block comes from the transaction pool of an accounting node I randomly selected among all accounting nodes, and the cycle continues

The transaction is not completed when it is recorded, only when the transaction becomes Once a certain block is reached, the transaction is truly completed. This is a complete accounting process of decentralization. Your transaction will not be recorded immediately because the p2p network propagation takes time. If the node of the selected block has not received your transaction, the transaction will be not done. A block is generated every 10 minutes, but not all transactions within 10 minutes can be recorded. 10 minutes is just an average value

Due to the characteristics of decentralized accounting, accounting nodes with accounting rights will receive a 50BTC reward every ten minutes, which is about the same for every 210,000 blocks. In 4 years, the reward is halved. Bitcoin has been halved twice since its issuance. Then a new block is generated every ten minutes. The reward for this accounting node is 10.5 BTC. If it is halved every 4 years, the total number of BTC can be calculated. The amount is approximately 21 million, and it is expected to be mined in 2040. Recording the reward of a block is also the only way to issue Bitcoin. When BTC is mined, the only income that the accounting node can obtain is the transaction fee

Accounting nodes compete for accounting rights through questions,

Find a certain random number that makes the equation invalid
SHA256 hash function (random number + parent block hash value + Transactions in the transaction pool) A certain specified value)
There is no other solution except traversing the random numbers starting from 0 and trying luck. The process of solving the problem is also called mining, so the accounting node that solves this problem is also called mining. It’s called a miner. The faster you traverse random numbers, the greater the possibility of getting the accounting rights. This traversal speed is called computing power by mine bosses. In order to obtain this computing power, mine bosses will Purchase more mining machines with higher computing power

Whoever solves the problem correctly first will get the accounting rights. A accounting node is found firstThe solution is announced to the entire network. After other nodes verify that it is correct, node A obtains the block, gains 12.5 BTC, and restarts a new round of calculation after the new block. This method is called (POW) allocating accounting rights

It usually takes about 10 minutes to solve this random number. 10 is not absolute, because the process of solving this problem is a process of luck. In response to changes in computing power in the future, Bitcoin will increase or decrease the difficulty every 2016 blocks, about two weeks, so that the average block generation time is ten minutes

Each block contains The encrypted hash of the previous block, the corresponding timestamp, and the transaction data (usually represented by a hash value calculated by the Merkle tree algorithm) are included. This design makes the block content difficult to tamper with. Distributed ledgers connected by blockchain technology can effectively record transactions between two parties and permanently verify the transactions.

Different from traditional stored data, each node of the blockchain stores complete data according to the block chain structure. Each node of the blockchain is independent and has equal status, relying on The consensus mechanism ensures storage consistency, while traditional distributed storage generally synchronizes data to other backup nodes through a central node.

Mahjong is a traditional Chinese blockchain project. A group of four miners work together. The miner who first collides with the correct hash value of 13 numbers can obtain the accounting rights and be rewarded.

Many people say that blockchain is a scam and Bitcoin is a scam. This may be a scam, but this technology has been widely recognized and applied. The cryptography knowledge involved in blockchain can only be used by ordinary people. Even if you don’t understand it, the most important thing is to look at the problem from a relatively rational perspective. Don’t let the wind be the rain.

There is something incredible about this technology. It maintains absolute order without a center or supervision. This is the trust that only needs to be established by everyone’s consensus. Bitcoin created this consensus. In the blockchain In the world everyone is fair and equal.

『撒』 What are the technical attributes of blockchain

Blockchain technology originated from a scholar with the pseudonym "Satoshi Nakamoto" in 2008 The foundational paper "Bitcoin: A Peer-to-Peer Electronic Cash System" was published in 2016. In a narrow sense, blockchain is a chained data structure that combines data blocks in a sequential manner in chronological order, and is a cryptographically guaranteed distributed ledger that cannot be tampered with or forged. The technical attributes of the blockchain network mainly include: anonymity, decentralization, non-tampering, distributed storage, multiple backups, data encryption, etc. Anonymity means that during the transaction process of any user in the blockchain network, the transaction data sent does not contain any data related to personal information. Transactions are conducted between users through addresses, and address managementTheoretically it can be generated infinitely. Decentralization refers to the method of reaching consensus through multi-node joint decision-making, converting the original single management decision-making solution into a multi-party joint decision-making, and all nodes in the blockchain network have equal data control rights and obligations, and any node can Data stored in the blockchain network can be accessed, and the access process can be executed synchronously and concurrently. Immutability means that except for the genesis block, every subsequent block in the blockchain contains the unique hash value of the data in the previous block, and then the blocks are connected in series through the unique hash value. Once the block data of one of the nodes is changed, the hash value generated by this block will also change. During the block connection process, the subsequent block cannot find the block corresponding to the hash value of the previous block, and the blockchain is forced to disconnect, and the data saved by the node will no longer be recognized by other nodes. , becomes worthless. The concepts of distributed storage and multiple backups are different from the distributed storage of current databases. The distributed storage of blockchain not only stores data in different geographical locations and physical devices. Each device has complete ledger data instead of data fragments. Data redundancy can be solved to a certain extent by using Merkle tree technology. remaining questions. Data encryption mainly refers to using asymmetric encryption to encrypt data with a public key and decrypt it with a private key or encrypt it with a private key and decrypt it with a public key. In this encryption method, during the data transmission process, the data does not need to contain the key for data decryption. Instead, the decryption operation is completed through the key in the hands of the recipient, eliminating information security risks caused by interception during the data transmission process.

Wu Chaoren can fly

Number of posts 1.0,000 and number of likes 20

What is rollup expansion

What is digital renminbi

p>

What is the RBF memory pool

The operating logic of the Bitcoin network

Read more exciting posts from the author

Best answer

Reposted from bitsbetter Pirate King 2021-08-0510:17:0810th floor: The currency is stored on the chain. It only requires a private key and corresponding address to confirm safety. The address is the real wallet. Generally speaking, the so-called "wallet" is a private key package. bitsbetter Pirate King 2021-08-0511:15:3112th Floor: Put the private key in someone else's possession...

Source

Bitcoin is a currency. Saifedean Ammous wrote a book called The Bitcoin Standard, in which he set out a series of tests to determine what qualities a currency must have, and divided them into three main categories: A currency must possess these qualities: The first point is that it has the function of value storage (i.e., value preservation,...

Source

『八』 Compared with the traditional distributed storage in the current blockchain technology What is the difference?

First, each node of the blockchain stores complete data according to the block chain structure. Traditional distributed storage generallyIt is to divide the data into multiple parts for storage according to certain rules.
Second, the storage of each node in the blockchain is independent and has equal status, relying on the consensus mechanism to ensure storage consistency, while traditional distributed storage generally synchronizes data to other backup nodes through the central node.
Data nodes can be different physical machines or different instances in the cloud.
The above is the difference between blockchain technology and traditional distributed storage analyzed by Jinwowo Network, for reference.

『九』 What are the methods for backing up the private key of a blockchain wallet?

When you create a blockchain wallet, after the creation is successful, the system will automatically Generate the wallet address, public key, and private key. However, you need to back up these yourself. The wallet will not save them for you. So how should you back up this information? How many methods are there?

First, a wallet with double security, and import the private key into the Armory client (1) for cold storage (2). Users can quickly find it from the cold storage in the client. Another advantage of the required private key is that it facilitates offline transaction transfers without having to re-import the private key every time. At the same time, the computer's operating system requires a password.

Second, the private key and public key of the wallet can be made into an electronic backup and synchronized to the cloud. You can copy and paste them into a document and mark the name. The document can be named in pinyin or garbled, but it must be saved in another document to indicate what the file is used for. However, the result of this is that you may forget which file is stored, so you need to note the information on your mobile phone, and at the same time, you need to arrange the review of the private key as a schedule event that repeats according to time (such as review once every two months). When the time is up, your mobile phone or computer will remind you to review. And it's not just a matter of recalling it a few times. You need to go to the backup and open the wallet that generated the private key, and log in again to see if the private key (and address) is correct.

Third, users can write down the private key and public key and address of the wallet on the document. If you name it, you can understand it yourself. It looks like a broken picture that cannot be opened, or even worse, we can compress the fake picture that cannot be opened into zip format and disguise it as a real picture, and then restore it when needed. The specific modification method can be found online.

  Fourth, the above three methods are all electronic backup methods. Another simple and crude method is to hand-copy the private key and public key in a diary to make it look less deliberate and abrupt. However, everyone needs to pay attention to this. , when copying, remember to write in clear and neat fonts to avoid illegible handwriting that may lead to incorrect input of the private key. At the same time, you also need to pay attention to the place where you save it. You can hide it in a private place at home (if possible, you can store it in a bank safe).

There are the above 4 methods for backing up the private key of a blockchain wallet. Of course, if you have a better backup method, you can also share it. You don’t have to use the above backup methods step by step. Finally, a backup suggestion: you can combine the above 2 to 4 methods to back up the private key to avoid forgetting it.

Notes:

(1) Armory client: Armory is a fully functional Bitcoin client that provides many innovative features that other client software does not have! Manage multiple wallets (deterministic and watch-only), print paper backups of your permanent work, import or delete private keys, and more.

(2) Cold storage: the cold storage of Bitcoin wallet. It refers to a method of saving the wallet offline.

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 38599 文章总数
  • 3637394访问次数
  • 3087建站天数