Chapter 613: The Most Dangerous and the Safest
readx;
It turned out to be an email from ESSI to herself?
Lin Hong looked at the email address, and he couldn't see anything from the address, but what did the other party mean by attaching such a signature at the end?
Is ESSI herself? Or is it a spoof by someone else?
Looking at the question raised by the other party, thinking about it, Lin Hong finally felt that it was more likely to be the real ESSI. Pen % fun % Pavilion www.biquge.info
ESSI, a mysterious hacker in the network, is the founder of the famous cracking organization Core.
At the beginning, Guang Yongyuan told him that he speculated that ESSI was probably Chinese, and he didn't know if it was true.
The discussion group they are in is a secret discussion group, and when sending letters, they are encrypted through PGP software, and then sent to the outside world, that is to say, even if Lin Hong wants to check, it is not so easy to find.
Of course, Lin Hong didn't have to find out everyone, the other party asked him such a question in private, and revealed his identity, which was obviously very friendly.
From this, it can be seen that this ESSI is also bullish on Bitcoin and does not want others to know about this flaw so early.
This 51% vulnerability has always existed in theory, but the reality may be a little different.
At the beginning of Bitcoin's development, the computing power of the entire network may be relatively small, and a more powerful machine may be able to occupy 51% of the computing power, but this is a distributed network after all, and when more and more people participate in this project and more and more computers access this network, it is not easy to occupy 51% of the computing power. Because, at that time, it will be the power of one person to compete with all the Bitcoin participants in the world.
In other words, the more Bitcoin develops, the more secure it becomes, and at a certain order of magnitude, even if the government wants to use a supercomputer to counter it, it may not work.
Lin Hong paced around his room, thinking of a solution.
It's a pity. In the end, he found that there was no solution to this problem, and he could only hope that Bitcoin would develop smoothly and that he would not meet such crazy people in the early stage.
Lin Hong sat back down in front of the computer and wrote back to ESSI.
"ESSI, I have admired the name for a long time, and I have read the letter. The problem you mentioned does exist, but unfortunately, there is no good solution in mind at the moment. But. As you know, this problem should only exist in the early stage of Bitcoin's development, and this vulnerability will no longer exist in the later stage. Thank you for the reminder, and if you have any good suggestions, please let us know. Stay connected, ghoster salute. ”
This is an unsolvable problem, and Lin Hong can only put it aside.
The design of Bitcoin is the only solution he can find that can perfectly solve all the shortcomings of previous electronic money. There was absolutely no way he would just give up.
Lin Hong went on to write the Bitcoin software.
One of the characteristics of P2P software is that the client and server side are integrated into one, and data can be downloaded. It can also act as a server to provide services to others.
With the experience of Bit Messenger, he writes Bitcoin software very quickly.
The theoretical framework in the early stage has long been conceived, and now it is just a natural process for this theoretical practice.
It basically only took about five or six hours to write this software, but it took a lot of time to debug.
It had been a long time since he had slept before, and after Lin Hong had written the prototype, he rested for the night. I adjusted my body, and then spent half a day debugging.
The beta version of the Bitcoin client is officially released!
It's a day to remember.
This bitcoin client is actually equivalent to an electronic currency wallet software, which can be used to send and receive bitcoins and verify the legitimacy of transactions. Broadcast transaction data externally, as well as download and save all transactions across the Bitcoin network.
However, now that the software has just come out, there is only one node in the Bitcoin network, and there is no transaction data in it at all.
Then. Lin Hong wrote a simple mining software, according to the mining algorithm mechanism, using the CPU to calculate the head of the data block, and finally mining bitcoins.
Since it is just beginning, the difficulty of mining is directly 1, which means that as long as you start the computer, it is very easy to mine bitcoins.
Lin Hong excitedly started the mining test program, and the number in the software continued to rise, and the progress bar soon rose from zero to 100.
The first Bitcoin block was produced! The "Genesis Block" that has been remembered by those who came after it was born!
This kind of block was affectionately called the "Bitcoin Gold Bar" by later miners. According to the design principles of Bitcoin, the number of bitcoins in one "gold bar" in the first four years is fifty.
Lin Hong's bitcoin client shows the number of places from zero to fifty, and in the entire bitcoin network, there is also the first transaction record, this record is the mining record, the first data block to be packaged, if you carefully analyze this data block, you will find that this record some details of the birth of this bitcoin, such as block id, hash value, difficulty, creation time, number of transfers (number of transactions), number of bitcoins, block size...... Wait a minute.
Lin Hong continued to mine bitcoin using the mining program while debugging the two software.
His mining difficulty at this time is 1, and there is no one else to compete with him, it is the easiest time to mine, as long as the machine is started, you can basically mine bitcoins, and it is a block at a time, there are fifty bitcoins.
As he digs, he begins to refine his original design and add some details to make Bitcoin more reasonable.
Mining is actually the process of constantly cracking the calculation of the hash value of the block head, which takes up a lot of CPU cycle time, every time you mine, the CPU is basically running at full load, and it also needs to consume a lot of electricity.
In fact, this is also Lin Hong's ingenuity in this design.
Anything that is too easy to get is not very precious, and he knows that, which is why he designed it this way, in order to mine bitcoins, it must spend a lot of machine computing power in it, which is the consumption of resources.
In this case, just like mining in real life, if you want to mine gold and silver mines, you must spend labor and time to replace the corresponding returns.
In a computer, the resource is the computing power of the computer, which currently refers to the computing time cycle of the CPU. It takes a certain amount of computing power and time to mine bitcoins, and as the difficulty of mining increases, this time will be extended accordingly.
During this time, Lin Hong devoted all his attention to the development of Bitcoin, and the company's affairs were temporarily handed over to Zhang Jin. Fortunately, he arranged the company's affairs a while ago, and there was nothing to do when he left temporarily.
Eight days later, Lin Hong finally decided that he wanted to complete the Bitcoin client and mining program, and he sorted it out into v0.1 and released it in this secret email.
During this time, the discussion about Bitcoin has not stopped.
It can be said that this email has never been so lively since it was created.
Some people continue to discuss the principle of Bitcoin and explore the details, after all, in that paper, Lin Hong only wrote a general theory, and did not talk too much about the details.
Others are imagining what kind of impact Bitcoin will have on society after it is born.
Others have been urging ghoster to ask about the progress of software implementation, and many people have even expressed their willingness to volunteer and do their part.
When Lin Hong released the v0.1 version, everyone immediately downloaded the torrent in the attachment as soon as possible, and then downloaded it immediately through the file download function of bit messenger.
Everyone really didn't expect that Ghoster would implement the first version so quickly, which shows that Ghoster is not only theoretical, but also proficient in programming and a doer.
Software is actually very simple, the key is the mechanism implemented in the software.
Along with the client, there is also the source code, considering the problem of confidentiality, Lin Hong did not provide the Linx version for the time being, but only provided the source code versions of the two platforms of Windows and Linux.
In this way, the first users of the Bitcoin network started the mining program in their computers, mined day and night, contributed their computing power to the Bitcoin network, and also obtained bitcoins.
With everyone joining, the data in the Bitcoin network has also begun to change, first of all, the most obvious is that the difficulty has begun to increase, it is no longer as easy as before, but relatively speaking, it is still quite easy.
Just like a newly discovered gold mine, new entrants are sure to make money easily.
The day after the release of the Bitcoin client, the first transaction was generated in the Bitcoin network, which was sent by Lin Hong to ESSI, with a total of 100 bitcoins.
Similar to Bit Messenger, Bitcoin's public key and private key addresses are a series of encrypted characters, the public key is the receiving address, this string of 34-bit characters is unique, and the same wallet can theoretically generate an infinite number of addresses.
That is to say, if you are careful that you often use a certain account to receive money and expose your identity, you can directly generate a new one, which can also receive bitcoins.
In this way, Bitcoin, which was later called the "most dangerous" and "safest" electronic currency, took a small and very important step. (To be continued)