Block chain entry - questions about Bitcoin

    Speaking of Bitcoin believe everyone is familiar with, after all, never before in which electronic money as Bitcoins that today's well-known that a financial product like gold stocks can be used to "fry" the. Bitcoin is like a legend on the Internet, we may have heard it many, many magical properties, and as like before I know nothing about these little question mark, often think Bitcoin will have many friends.

Small question mark, if you have a lot of friends?
This article aims to try (function) level series from the effects of the various techniques that do not rely on Bitcoin discussion of specific implementation technology, simply stated this technology can play what kind of effect (function) in order to clarify some concept of currency bits, instead of the current block chain.

Preliminaries

Examples cited here only to illustrate the specific implementation function, irrespective of the bit credits

hash function

    We are most familiar with the MD5 hash function should be non-none other than, it is all too common, and we know that the site database in a variety of account passwords often using MD5 encryption, so we chose to illustrate the function of MD5 hash function. Briefly, hash function is irreversible to any electronic data (only brute force) is converted into a string of fixed length numbers, such as string "admin" through MD5 hash obtained after "21232F297A57A5A743894A0E4A801FC3", which is a hexadecimal number, you can also use it as a string. In addition hash function also has a feature that even slight changes to the original data, the digital output will be different, for example, the above string to I "Admin", generated number into a "E3AFED0047B08059D0FADA10F400C1E5", note this feature because the length of the input data is not changed. Thus hash function is often used to check the integrity of files or data after the transmission.

Asymmetric encryption

    There are a lot of asymmetric encryption algorithm, the most classic is the RSA, its typical function is used to overcome the traditional symmetric encryption because the encryption and decryption keys are the same and can not be guaranteed by key communications environment (this thing get what encryption?) Security transmission barrier. In asymmetric encryption system, a public key can be easily made, anyone can use the public key encryption, but only the private key can decrypt the encrypted public key information. With peers is only the private key can be encrypted public key to decrypt the information, which is asymmetric encryption another application, namely digital signatures, the private key is not in the case of a leak, use it to encrypt information like the signature information as you can prove that the information must come from the holder of the private key (public key we all have, to decrypt it out, it shows the success of the effective).

And the relationship between bit block chain of credits

    Bitcoin is Nakamoto order to achieve kind of like cash or gold that you can always deal directly (P2P), but can be avoided by digital information can lead to a perfect copy of a sum of money n times (double flowers) of problem a digital proposed currency. In order to achieve Bitcoin, Satoshi created a specific mechanism, and this mechanism is specific people (Nakamoto has not clearly stated the term) abstract becomes a framework (because now Bitcoin block chain and the use of specific or differentiated implemented), called the block chain technology, is clear that this technology not only can be used to achieve Bitcoin, there are many other applications, it will be so hot. In short bitcoin block chain is applied, and a block chain is presented in Bitcoin after birth.

Why block chain to be called the block chain?

    We also bitcoin block chain is only as an example in order to avoid double flowers problems, you must put all transactions are recorded, and this account must be truthful and reliable. In implementing this accounting mechanism, Bitcoin about every 10 minutes the transaction information occurred during this time packed into a "block" (with the number of transactions during this period does not matter), and in order to ensure the authenticity of this block head has been attached a hash value of a block of data and a proof of effort (i.e., the nonce in the figure below, what is demonstrated below speaks workload), so continuous, each two regions They are connected in series between the hash value of the block by up to form a chain, which is called block chain. All work blocks after the chain if you want to modify a deal (false accounting) must be redone to make false accounts to prove the trust of the entire network.

Block chain

Bitcoin is what form of existence? (Bitcoin is a file it?)

    I do not remember how long ago saw a news that a man in his old home computer inadvertently found a few bits of money, then flourishes, was put on the pinnacle of life. . . This news made me thought it was some kind of Bitcoin is the same thing file. That is not what can be obtained through a bunch of copy and paste? In fact not the case, that turned out not otaku Bitcoin itself, but bitcoin wallet. It is the essence of the so-called Bitcoin wallet asymmetric key pair to the user through the private key to sign each transaction, and the Bitcoin network is used to verify the authenticity of the transaction by the public. So he found a private key actually won the right to continue to use these Bitcoin transaction, which is dug out a few bits coins.

The so-called mining is actually doing? Why should so many graphics cards, charge so much power?

    The so-called mining is actually in accounting in order to maintain the entire Bitcoin network to prevent double flowers problems. So why do the digging can get bitcoins? Bitcoin mechanism to encourage everyone to participate in maintenance of the network, a new incentive mechanism, that is, each block of a successful package you can get a bit of money as an incentive to produce new defenders (the miners) are. So naturally we all want that package can block people, then how to determine who is going to block the package it? Bitcoin uses a mechanism (PoW) a so-called proof of the work that is made a condition, only the first to meet the conditions of the miners before they can package block, then what conditions? For example, to find a string of data, hash value of the string of data has some characteristics, such as a block of hash and the first n bits of the same (and only on a block hash has put links to play the role of tampering ). Familiar with the hash function of children's shoes will soon realize that this requires a lot of computing, of course, not necessarily, maybe you're lucky, just a random number a hash on the condition of it? (I feel you would like peach) Therefore, in order Qiuwen quickly, miners use a lot of computing device (video card) to find data in order to be able to meet the conditions of the package block and then get rewarded. This also led to a lot of power consumption. With more and more miners added to the competition, the rising count Networks, the condition becomes easier, however, in order to ensure a seal 10 minutes to block network bit credits will increase the difficulty of satisfying the conditions ( more and more difficult to get new currency, cooking the books more and more difficult).

As long as I will get my bitcoin mining thing?

    Read the above description, it is clear that the answer is not necessarily. If you just casually looking for a microcontroller to mining, the first to find qualified workload proved too small possibility of data, completely unable to compete with mine, making it difficult to obtain reward seal block.

Why will not inflation Bitcoin?

    Nakamoto Bitcoin was 50 at the time of the creation of the first block of Bitcoin as a reward, Bitcoin mechanism requires that every full 210 000 blocks, block the creation of new incentives will be reduced by half, but also Nakamoto It limits the total number of Bitcoin is 21 million, so that they can calculate all Bitcoin is expected to issue completed in 2140. Increasingly fewer bits credits mechanism such that it is different from the hair credits, generally not inflation.

Why blackmail virus to use Bitcoin as a means of exchange?

wannacry virulent

    We have all heard can not be traced to the payee by the payment address Bitcoin, but also heard flowing information Bitcoin accounts are open and transparent, it sounds a little bit contradictory. So how exactly is the reason hackers anonymous Bitcoin achieve it? This involves two aspects.

1. The bits of the coin mechanism itself

    Bitcoin is a decentralized network of networks, is equal between each node, they jointly maintain the entire bitcoin books. These nodes scattered across the globe, no one single authority to control all of the nodes; secondly Although Bitcoin flowing information is transparent, but this is only the level of the public purse, Bitcoin account is only one pair of asymmetric secret key, do not contain any personal information, but also by the user to generate a new wallet at any time, in bitcoin creation paper, Nakamoto recommendations for each transaction using a new purse to purse avoid specific relevance to the individual. ; And normal Bitcoin node does not store a transaction which came first ip initiated.


    But Bitcoin transaction traffic is not encrypted, That is when the hacker extortion virus from hanging on the money transferred out of the account, the transfer of traffic or are likely to be intercepted by the network where he firewalls; and If there is a wide range of authority placed in the network of non-normal node , which records the correspondence between indecent dealings with sponsors ip to find what is probably always the first node to receive a trade request, then anonymity will be weak. Thus hackers also need to use other means to aid anonymous.

2. Anonymous hackers using other means of

    From the above description we can see hackers still need to assist other means to hide ip, but this time in relation to the famous Tor network appearances, as to why the Tor hide ip, within the scope of this discussion is not in this article.

Published 12 original articles · won praise 23 · views 60000 +

Guess you like

Origin blog.csdn.net/qq_33917045/article/details/105341873