Why Bitcoin privacy is an art?


Author | Lucas Nuzzi

Translator | smile, Zebian | Carol

Produced | block chain base camp ( ID: blockchain_camp)

Over the past 10 years, the Bitcoin ecosystem to attract a large number of developers to invest hundreds of hours to improve and improve its underlying code base. Bitcoin (BTC) is basically the same. The reason is that the definition of its monetary attributes of a core set of common rules remain the same, such as supply and hard-coded algorithm inflation is unchanged. 

Over time, the bifurcation time and time again want to change these attributes, but all hostile attempts ended in failure. This is a painful process, but also to highlight and solidify the two major advantages Bitcoin: No single party can determine the development of Bitcoin, the lack of centralized control and protection of property currency Bitcoin.

And how to overcome obstacles to development

The Bitcoin become a popular phenomenon also makes the development of value on the Bitcoin software is more challenging than on other digital assets. In order not to undermine the value of their storage, developers can convert data are limited.

Nevertheless, it can be seen from the following example, in bitcoin innovation is still possible, but requires enough creativity and patience. 

Because the core layer is required to change the bit credits a political registration process may destroy its currency attribute (quasi-political process), so innovation is often realized in the form of modules . This development and the development of Internet protocol suite similar, different layers of different protocols dedicated to a specific function. For example, SMTP handles e-mail, FTP file handles, HTTP handles web pages, IP address responsible for handling user, TCP handles packet routing. Each of these protocols is only through continuous development of our current experience. 

Blockchain Capital of Spencer Bogart has found signs of this development: We are witnessing Bitcoin has its own protocol suite. Bitcoin core layer is not flexible enough, the current has spawned several additional protocols designed for various applications, such as Lightning BOLT standard for payment. Innovation can add some security, because this layered approach can reduce the potential risk to the greatest extent. 

In the following figure, the researchers try to draw up new plans Bitcoin technology stack and relatively complete representation. As can be seen from the figure, the block chain technology innovation is in full stack of advanced technology from layer 2 to the contract intelligent solutions. 

Note: However, this is not yet complete, nor an endorsement of the techniques listed in the figure. 

Layer 2

Lightning Network (lightning network) is the most prominent Bitcoin Layer 2 technology, there is a lot of discussion recently about the lightning network adoption rates. Which critics argue that, in assessing the lightning network user adoption, the total number of channels and locks BTC are significantly reduced . However, the rate of adoption of these indicators are not the most representative measure. 

One advantage lightning network underrated attribute is its privacy. Because lightning network does not depend on the state of global coordination, so that users can use other technologies and network coverage to direct transactions, such as using the Tor network. Private activities occur in the channel can not be captured lightning mainstream browser.

Therefore, private trading volume increased lightning network will result in a reduction of the content publicly, leading some people may mistakenly believe that adoption rate has dropped . Lightning network before widespread adoption still need to overcome barriers to substantive available, but using the wrong indicators to determine the current state of the network is of no use. 

Recently, another major advance in the field of privacy Layer 2 private messaging system over WhatSat-- lightning network. The project is Lightning Network Daemon (LND) is a modified version, LND allow private entities to connect communication messages to micro-payment as compensation for their services. This innovation LND itself to achieve a decentralized, anti-spam and anti-review of chat, such as improved lightning network routing protocols lightning-onion onion's. 

还有很多其他使用闪电网络私有小额支付的项目,包括基于闪电网络的云计算VPS、通过小额交易来共享收入的图像托管服务。研究人员将Layer 2定义为一套可以使用比特币基础层作为仲裁的应用,仲裁可以协调外部事件和解决争端。因此,比特币区块链的数据锚的主题已经超越了闪电,微软等公司也已经率先推出了比特币之上的去中心化ID系统。

  

智能合约

2010年,由于发现了比特币操作码中的一些错误,中本聪禁用了比特币编程语言Script的一些功能,在协议中删除了原始的比特币操作码。随后,有许多项目尝试以安全、可靠的方式将智能合约功能带回比特币中。 

经过这么多年的发展,研究人员发现高级表达的智能合约中伴随着潜在的安全风险。普遍的经验做法是向虚拟机中引入越多的功能,程序就越不可预测。近期,研究人员发现一些智能合约体系结构的新方法,新方法可以最大程度地减少不可预测性并可以提供大量的功能。 

其中一种名为Merklized Abstract Syntax Trees (MAST)的比特币智能合约新方法引发了新一轮比特币智能合约支持技术发展的浪潮。Taproot是MAST结构的实现,可以使整个应用以Merkle树的形式表示,其中树的每个分支表示不同的执行结果。 

最近出现的另一个创新趋势是用于比特币交易中保险箱(covenants)实现的新架构。保险箱最初是Greg Maxwell在2013年提出的一种假设实验,是一种限制余额使用方式的新方法。虽然该方法已经出现6年了,但在Taproot实现之前保险箱都是不切实际的的。当前,一种名为OP_CHECKTEMPLATEVERIFY(原名OP_SECURETHEBAG)的操作码正利用该技术来安全地在比特币中实现保险箱 

保险箱在借贷(和基于比特币的衍生品)背景下是非常有用的,因为能够创建针对特定比特币余额的策略。但是最比特币使用性的潜在影响远远超过了借贷。保险箱可以实现诸如Bitcoin Vaults之类的东西,即在托管情况下提供相当于第二个私钥的功能,允许用户冻结被黑客窃取的资金。 

Schnorr签名本质上是使这些新的智能合约方法成为可能的技术原语。目前还有一些正在理论证明阶段的技术,比如Scriptless Scripts。Scriptless Scripts可以使用完全私有和可扩展的比特币智能合约以数字签名的形式表示,而不是操作码。这些新方法可以在比特币之上构建新的智能合约应用。

 

挖矿

近年来,针对挖矿协议也有很多进展,尤其是矿池成员使用的协议。虽然比特币挖矿的集中化问题经常被夸大,但矿池运营者所拥有的算力结构可以进一步分散。

也就是说,矿池运营者可以通过算力的分配来决定矿池成员将进行哪些交易。随着时间的推移,一些矿池运营者在未经成员同意的情况下滥用算力来进行交易审查、挖空块和重新分配哈希值等操作。

挖矿协议的修改就是为了解决矿池算力集中的问题。对比特币挖矿来说,最重大的变化之一是矿池中使用最多的协议Stratum的第二版。Stratum V2是实现了BetterHash的一个完整协议,BetterHash是一个辅助协议,可以使矿池成员能够独自确定他们要挖矿的区块的组成。 

其他有助于提供稳定性的进展包括人们对哈希速率和难度系数的关注。

 

隐私

当前,又许多新协议都将更多的隐私选项引入了比特币。也就是说,未来几年,比特币隐私可能仍将是一门艺术而非一门科学。

一般来说,跨数字资产进行私人交易的最大问题是解决方案不够成熟。关注交易图隐私的隐私资产往往会忽视网络层隐私,反之关注网络层隐私的隐私资产往往会忽视交易图隐私。这两个方向都缺乏成熟度和使用率,这使得通过P2P网络层或区块链层的统计分析可以很容易实现交易溯源。

目前,有一些项目正在努力解决这两个方面的界限。

对于交易图隐私来说,P2EP和CheckTemplateVerify这样的解决方案可以就足够了,因为效率比隐私更重要。CoinJoin中加入了许多新功能,可以提高为降低交易费用的用户的进行私人交易的采用率。在CoinJoin中,隐私仍然不是最佳的选择,但由于可以看到交易的金额,因此保留了比特币的可审计性。 

如果降低交易费用成为用户使用的主要攻击,就会导致比特币匿名集的增加,通过统计分析反匿名化会比目前更加主观。 

P2P通信的隐私方面也取得了很大的进步,像Dandelion这样的协议正在加密网络中进行测试。可替代的交易中继协议Erlay可以增加私有通信的效率,减少运行节点的开销。Erlay提高了效率,使得更多的用户可以轻松地完成IBD并持续对链进行验证,这对限制ISP带宽的国家来说非常有用。

这只是个开始,演进还将继续

总的来说,比特币是一套不断发展的协议,以上例子只是改进比特币技术框架的一部分。尽管在相对严格的一组规则和价值观中进行开发对于开发人员非常具有挑战性,但目前只有分层方法才使这种逐步的、有效的变更成为可能。在整个过程中要最小化比特币的政治,保护其基本的货币属性。开发人员也在学习如何在这种框架的限制下进行有意义的开发。 

原文:https://cointelegraph.com/news/the-evolution-of-bitcoins-technology-stack  

本文为 CSDN 翻译,转载请注明来源出处。

【End】

技术战“疫”,贾扬清、李飞飞要给程序员直播讲AI技术!

2月18日、2月20日,阿里云CIO学院攻“疫”技术课程正式开启。您将获得与达摩院数据库首席科学家 、阿里巴巴集团副总裁、ACM 杰出科学家李飞飞,Caffe之父、ONNX创始人、阿里巴巴集团副总裁贾扬清,阿里巴巴集团副总裁、阿里 CIO 学院院长胡臣杰等顶级技术专家直播互动的机会。

推荐阅读 

浅谈程序的内存布局

百度移动平台关闭安卓渠道;苹果将推 iPhone SE 2 代;微软开源 Scalar | 极客头条

疫情之下,哪些行业正在逆势爆发?

比特币技术栈的演进

大神如何一招完美解决Hadoop集群无法正常关闭的问题!| 博文精选

直击AAAI 2020,一文读完微软亚研6篇精选论文

你点的每一个在看,我认真当成了喜欢

猛戳“阅读原文”,填写中国远程办公-调查问卷

发布了1719 篇原创文章 · 获赞 4万+ · 访问量 1538万+

Guess you like

Origin blog.csdn.net/csdnnews/article/details/104386214