BlogHide Resteemsnibuaiwo (64)in eth1 • 4 years agoRead ETH1 and ETH2 in ETH in one articleContent Phase 0 of ETH2.0 is planned to be launched in the summer of 2020. Phase 0 is based on the beacon chain. Ethereum users can deposit 32 ETH tokens into the pledge storage contract on the…nibuaiwo (64)in defi • 4 years agoDeFi user portrait: Who is using it?Foreword: At present, the overall number of DeFi users is about 100,000. Compared with mainstream web2 applications, this magnitude is almost negligible. However, for the encryption field, this is…nibuaiwo (64)in transaction • 4 years agoTransaction processContent Below, I will string up the entire process to see how Bitcoin completes a transaction. A transaction is the bitcoin of one address, transferred to another address. Since all bitcoin…nibuaiwo (64)in likelib • 4 years agoLikeLib analysis frameworkContent Cóng qū kuài liàn hángyè fāzhǎn jiǎodù ér yán,LikeLib de zuìzhōng yuànjǐng shì dǎzào yīgè fēnbù shì de wèilái “yínháng”, tōngguò jiànlì bùtóng qū kuài liàn zhàngběn zhī jiān de liánjiē…nibuaiwo (64)in bitcoin • 4 years agolatest progressContent The newly released Bitcoin Core 0.11.2 introduces a new script operation: OP_CHECKLOCKTIMEVERIFY. Abbreviated as CLTV The new payment method allows transaction output to be unavailable…nibuaiwo (64)in multi • 4 years agoThe status quo of multi-signatureContent Today, more than 65 million bitcoin transactions have used multi-signature technology, most of which use P2SH. This shows that P2SH has played a vital role in the process of…nibuaiwo (64)in plan-combined • 4 years agoImplementation plan-combined currencyContent Core idea: Different users jointly create a single Bitcoin transaction, which includes all user input. The main reason is that although the merger becomes a single transaction, the…nibuaiwo (64)in pinocchio • 4 years agoPinocchio AgreementMultiplication homomorphism The last step of the Pinocchio protocol, B needs to check E(L(s) R(s)-O(s))=E(H(s) T(s)), but in fact, we only mentioned Until E(x) satisfies the additive…nibuaiwo (64)in attack • 4 years ago51% attack paradoxWe originally assumed that the person who launched the 51% attack was for profit. We can calculate the cost and benefit of the attacker. Let’s review the prerequisites for understanding the…nibuaiwo (64)in coin • 4 years agoMLM coins, air coinsBitcoin is a self-witnessed prophecy," Satoshi Nakamoto said that there is nothing wrong with the phrase. But! Can Satoshi Nakamoto say, I can't say? So many people in the currency circle also…nibuaiwo (64)in miners • 4 years agoMiners' earningsThe confirmation of the transaction is inseparable from the miner. Why would anyone want to be a miner? The Bitcoin protocol stipulates that miners who dig new blocks will be rewarded. At the…nibuaiwo (64)in signatures • 4 years agobitcoin signaturesThen there are several concepts to understand: Bitcoin: essentially a string of digital signatures. Public key: can be understood as the address of the Bitcoin wallet. Private key: can be understood…nibuaiwo (64)in blockchain • 4 years agoblockchain performanceContent At present, the Ethereum network is limited by the single-threaded performance of the CPU. After optimization, it can reach 50 or 100 transactions per second. However, in actual…nibuaiwo (64)in eos • 4 years agoEOS.IO systemThe EOS.IO system cannot force block producers to send any messages to other accounts. Each block producer has its own subjective measure of the computational complexity and time complexity of…nibuaiwo (64)in consensus • 4 years agoFamous consensus design theoryContent FLP impossibility principle The theoretical lower limit of consensus algorithm The paper proposing the theorem was published in 1985 by the three authors of Fischer, Lynch and Patterson.…nibuaiwo (64)in dpos • 4 years agoDPoS mechanismConsensus mechanism The consensus mechanism in the blockchain was born to solve the problem of "who will keep the books". In traditional transaction systems, such as Alipay, there is a central…nibuaiwo (64)in byzantine • 4 years agoPractical Byzantine Fault Tolerant AlgorithmPBFT is the abbreviation of Practical Byzantine Fault Tolerance. The algorithm is actually to reach a consensus on incoming messages and get a global order. In the case of no more than 1/3 of the…nibuaiwo (64)in raft • 4 years agoraftBecause there have been a large number of articles on the Internet that have introduced the raft algorithm in detail, this part will only briefly explain the basic principles and procedures of the…nibuaiwo (64)in cross • 4 years agoCross-chain implementationInsert picture description here User AB needs to swap 1BTC and 10ETH. A uses a password to generate a cipher text. And use ciphertext to lock 1BTC to B. A sets a retracement transaction, and if…nibuaiwo (64)in hash • 4 years agoHash functionHā xī hánshù yòu chēng wéi shùzì zhāiyào huò sàn liè hánshù, tā de tèdiǎn shì shūrù yīgè zìfú chuàn, kěyǐ shēngchéng lìngwài yīgè zìfú chuàn, dànshì rúguǒ shūrù bùtóng, shūchū de zìfú chuàn jiù…