Chapter 631: A Major Discovery

readx;

At the end of the month, Xiao Qiang asked for a monthly pass, and the monthly pass was a bit too miserable. Pen @ fun @ pavilion wWw. biqUgE怂 ļ½‰ļ½Žļ½†ļ½

------------

Although many people have participated in the development of bitcoin and a lot of bitcoins have been mined, bitcoin is not valuable, and it is only regarded by others as something similar to points.

Many people joined the mining team out of curiosity, they started the mining software, mined some bitcoins, experimented with the sending and receiving functions of bitcoins, and then ...... There is no then.

Except for a few enthusiasts, many people uninstalled the software, did not even save the key, and deleted it directly, because the current Bitcoin is not worth much.

The key is the only way to open the wallet, and once the key is abandoned or lost, the wallet that holds those bitcoins can no longer be opened.

Once bitcoins are thrown away or lost, as long as the bitcoin network does not disappear, they will remain in the network forever like ghosts, but no one, one terminal, or one network cable owns them.

They don't die, but they don't reappear in someone's wallet, they only exist in the chain of transactions in the Bitcoin network, they exist, but they don't exist.

Whether it is Liu Jian or Valen, the bitcoins they mined were directly discarded. Valen just wanted to experiment with his idea, while Liu Jian thought that part of the bitcoin was "stolen money", and he was no longer interested.

In the first four years, half of the number of bitcoins will be mined, but a significant part of the bitcoins will be abandoned forever, so that by the day all the bitcoins are mined, the total number of bitcoins circulating in the market, plus those stored as a store of value, is far less than 21 million.

Fortunately, Bitcoin is theoretically infinitely divisible, and there is no shortage of them.

……

After Lin Hong and the Night Demon ended the call, he took a look at the calculation force curve. I was relieved to find that the computing power of the main network had directly decreased, and finally returned to the original level.

This time it was good luck, and there were quite a few people who helped with the defense. So much so that before he could even make a move, this attack was already over.

But it will definitely not be so lucky every time, Lin Hong feels that he should do something to prevent it in advance.

He thought about it, and finally decided that Daredevil's method was good.

Although it is unethical to use broiler mining, in order to make Bitcoin develop healthily and smoothly, he decided to create an emergency defense plan against 51% attacks in particular, namely. Once it is found that there is a huge change in the computing power of a certain force, and the early warning condition of a 51% attack is reached, then this defense plan is activated to increase the overall computing power accordingly.

The method used in this scheme is to mine through super worms.

Lin Hong added the mining function to the super worm, monitored the changes in the computing power of the main network at any time, and automatically sent mining instructions to the super worm network once there was a suspicious situation. Allow the Super Worm to mine, thereby reducing the ratio of the attacker's computing power to the total computing power.

"It's all about Bitcoin moving forward." Lin Hong said to himself.

He spent several hours reinventing the Super Worm again, which was already the third major version of the Super Worm. The last time the transformation was passively carried out because of the vulnerability changes caused by the upgrade of the operating system, but this time it was active.

Considering the stealthy nature of super worms, the computing power of each super worm must not be too large, it can be said that it can only be described as weak, but it is better because of the huge number of thousands of super worms working at the same time, and the computing power that can be generated cannot be ignored.

Of course, in normal times, super worms will not participate in mining, and will only automatically trigger this condition when the Bitcoin network is threatened.

Wait for Lin Hong to finish the test. It was already evening.

He stretched, then remembered something, picked up the phone, and dialed Zhou Tong's number.

"Brother Zhou, how is the matter that I told you last time?"

"The personnel are already in place. However, the equipment is still being debugged, and if nothing else, mining can officially start in two days. Zhou Tong's voice came out of the phone, "We studied it and found that if you mine in the official way, the efficiency is not very high, and the speed of mining is mainly related to the CPU, and we plan to build a multi-core computer by ourselves, which can not only improve computing power, but also save a lot of costs." ā€

Now the mining efficiency is mainly related to the CPU, and after Zhou Tong received Lin Hong's instructions, he held an internal engineer meeting to discuss this matter.

Of course, the things assigned by the boss must be done well, but they are all technicians with ideas, so they will naturally not implement them rigidly, but conduct targeted research, and finally discuss an optimal plan, that is, use the existing conditions to build a special equipment for mining, and omit other unnecessary external equipment of the computer, such as floppy drives, monitors, etc., and focus on the CPU.

Combining multiple CPUs to form a huge amount of computing power is the basic principle of supercomputers, and their solution is similar to this, but on a much smaller scale than supercomputers.

Of course, to make such a special mining equipment, it is not just a simple CPU stacking, which involves a lot of details, not only the hardware must be compatible, but also the software should be matched and customized by yourself.

It is precisely because of their high requirements that this mining plan was postponed for a period of time and did not start immediately.

Lin Hong didn't say anything about this, just said, "Well, as soon as possible, if you have any questions, you can contact me directly." ā€

He was not surprised by this, after all, the people in the company are different from the past, many people have grown up, and if they can't even think of this now, then there is no need for the technical department to exist.

After hanging up the phone, Lin Hong decided to start upgrading the Bitcoin client.

At present, the version of the Bitcoin client is only v0.1, and it is only a test version, and many functions are not yet perfect.

Since the release, some feedback and suggestions have gradually begun to appear on the open source forum, and Lin Hong usually goes to the forum to take a look at it when he has time, and then collects these suggestions.

He logged into the open source forums through Bit Messenger as a proxy to see if there was any new feedback.

A post caught his attention.

"Big discovery: Ninety-nine percent of the authors of Bitcoin and Bitcoin are the same person!"

This post has only been published for ten minutes, but there are already more than a dozen pages of replies.

It's a bit of an anomaly.

Actually, this speculation has not been raised by no one, but usually, after discussing a few floors, it will slowly drown in other new posts, because many of these people are just speculations, and there is no actual evidence to prove their point.

However, this post is different, judging by the number of clicks and replies, it has much more clicks and replies than those previous discussion posts.

Lin Hong frowned slightly and clicked in.

The author first presented his arguments, and then wrote thousands of words to prove his point, and it was illustrated with detailed data.

He came to this conclusion mainly on the coding habits of two open-source software, BitMessenger and Bitcoin.

According to his theory, the habit of writing code is as difficult to copy as a person's handwriting, and each person has their own unique habits, which are reflected in many small details, such as the naming convention of variable names, the use of carriage returns and spaces, the way of algorithm code to implement common functions, and the program structure and processing methods used to implement a function......

These habits are often unconsciously manifested in programmers and are entirely subconscious.

……

After reading this post, Lin Hong has to admit that the author's attainments in the field of data mining are indeed extraordinary, after all, he has taken this situation into account when writing the Bitcoin client, and deliberately changed his coding style, just for fear that the coding style will reveal his identity.

But I didn't expect that there is a specialization in the art industry, and there are weird and ghostly talents in every field, and they are often able to do incredible things, such people, in the circle, have a name, called "geek", which is different from "hackers".

Obviously, the author of this post is a geek who works in the field of programming styles and habits, and in this field he is an absolute authority and can see a lot of hidden information in some information that everyone ignores.

It is precisely because this post is justified and well-founded that it fully proves his point of view and has been recognized by many people.

Although there have been such speculations before, no one has provided sufficient evidence. This post directly connects the author of Bit Messenger with the author of Bitcoin, Ghoster.

"The landlord is really good!"

"I've guessed it for a long time, but I have to admit that you're really good."

"Who the hell is Ghoster, I want to apprentice!"

"Can we assume that Ghoster started deploying Bitcoin five years ago?"

"I can tell you responsibly that this is a conspiracy."

……

Ghoster disappeared for so long, and after reappearing, it released something as rebellious as Bitcoin, just like it did when it released Bit Messenger.

The news spread throughout the Internet at breakneck speed.

A spokesperson for the Free Software Foundation quickly replied to the post, saying that he was paying close attention and hoped that the author of Bitcoin would contact him as soon as possible to discuss important matters.

Lin Hong just smiled, and then withdrew.

It was a bit of a surprise to him, he didn't want to bring the two things together, because it would draw more attention to him, which was not what he wanted to see.