The resource loading... loading...

Don't miss out on the advances and breakthroughs in technology!

Author: Inventors quantify - small dreams, Created: 2017-07-12 10:30:16, Updated:

Don't miss out on the advances and breakthroughs in technology!

img

  • The first key technological point: the creation of blockchain technology represented by Bitcoin:

    Bitcoin was the first successful application of blockchain technology and has since become a blockchain network that is not restricted by the operation of a single server, open to code and rules, and avoids centralized control. Bitcoin pioneered the use of countless computers around the world to operate and protect a common database, where everyone can participate and become a recorder and witness, and no one can decide or modify the rules of operation alone.

    Bitcoin has been operating on a public network for seven years, and its market value has reached $40 billion. This is a huge reward for any hacker. An attacker who wants to manipulate the data must control 51% of the computers, or have more powerful computing power than the current Bitcoin network, which is almost impossible.

  • The second key technology: smart contracts represented by ETH and Ethereum

    Ethereum is a blockchain network that supports a full-fledged smart contract, and it's normal to misunderstand the first sentence, so I'll explain in human terms.

    Since ancient times, the execution of a law or contract has been dependent on a specific executor. If there are exceptional circumstances, such as the interests of the executor, the fact that the executor was bribed, etc., and the executor refuses to execute or is unable to execute, then the law and contract lose its effect.

    A smart contract is a contract that is executed by a machine, and once it is published, it is published on the Internet, verified and executed by countless machines, and the creator of the contract cannot withdraw or change the contract, so there is absolutely no need to worry about the effectiveness of the contract.

    Turing Complete means that the execution of machine commands is unique and infallible, unlike human language, which is always ambiguous and ambiguous, so there are always so many lawsuits in the human world that there are not in the world of Turing Complete machines. Every command, every contract, is unambiguous and the execution is unique.

    The Turing-complete smart contract is a truly decentralized contract that can be executed accurately and without error, and is the true contract in human history.

  • The third key technology: Zcash as a representative zero-knowledge proof privacy technology application

    The Bitcoin Coinbase is open and transparent, and the number of Bitcoins, transaction history, and Bitcoin flow information and records of any nickname can be publicly consulted. The United States used this feature to analyze the tracking of Bitcoin nickname information on the dark web, eliminating an illegal organization.

    The latter is known as the anonymous Monero and Dashcoin, each based on a different encryption algorithm. Currently, the two anonymous coins are widely accepted on the dark web, with a market value of $600 million and $3.3 billion respectively.

    In late 2016, a coin called Zcash was released, which uses an algorithm called zero-knowledge proof. Zero-knowledge proof is based on a formula for true proof and achieves anonymity.

    A simple example of zero-knowledge proof is: when you log in to WeChat on your PC, you do not need to enter the WeChat ID and password, you only need to scan the two-dimensional code that pops up to authenticate the landing. During the entire process, you do not need to enter your username and password, so that hackers with the stolen code cannot hack and steal. And the intercepted temporary two-dimensional information will also be immediately invalidated, and the hacker will have no value even if he steals.

    Zero-knowledge proof allows you to operate your account when necessary to protect your privacy, without revealing your ID to prove your identity. For example, in the TV series, Oyang-Yang uses a bank card that involves a bribe to buy a piece of clothing and reveals his identity because he has to use a signature. Zero-knowledge proof technology allows you to operate anonymously, without having to show your identity and prove your ownership and operating rights to the account.

  • The fourth key technological point:Sia.techStatus.im and Mysterium.network are decentralised to share networking and anonymity technologies.

    Sia is a decentralized encrypted storage solution, where your personal data or business secrets are currently stored on some disk and can be viewed by humans, so there are often illegal or infringing or other hints you know. Sia encrypts your information, slices it into different servers, and is a multi-storey storage that ensures the security and stability of the data.

    status is a decentralized encrypted communication tool similar to WeChat. Remember the bubble of the filter door, all online communications of foreign companies such as Facebook, Twitter, Google and Apple are accessed and monitored by the FBI.

    Mysterium is a decentralized VPN network, somewhat similar to Sia, which uses a number of global node servers to create an encrypted, dedicated channel network. All network channels are based on a public encryption algorithm, while distributed nodes guarantee unmonitored, fast network speeds, no bottlenecks, and no single node plug-in affects the overall network flow.

    Now that shared storage, CPUs, VPNs, and centralized chat apps are out there, will there be decentralized companies where everyone is a shareholder?

Translated from the original by the publisher.


More