Binance Square

Digipear数梨

创造专注研究和科普Web3的兴趣社区,学习和分享web3的一切。我们希望在即将到来的新数字时代寻找确定性的α,为创造价值而努力。为什么要这样做:希望通过分享与传播,让更多人了解和进入Web3,共建一个更公平、更高效、更安全的数字世界。
16 Following
42 Followers
38 Liked
4 Shared
All Content
--
Translate
用时间搞你呗 还能有啥办法卡呢
用时间搞你呗 还能有啥办法卡呢
末日
--
I made a transaction yesterday but did not earn any points? What's going on?
Translate
产品经理绝对脑残玩意儿
产品经理绝对脑残玩意儿
疯袁
--
#币安Alpha积分

Let me summarize for those who are still confused

Deduct 2 points for not trading daily
Deduct 1 point for trading below 100u daily plus the 5 points we give you (33u) = 4 points
No deduction for trading above 100u daily plus we give you points (depending on how much you trade)
Holding 100u to 1000u gives you 1 point
And so on

In short, points will be deducted! You may not feel it daily, but your u will feel it
I prefer to understand the situation fully rather than just saying, oh, the rules are this or that
If you want to be a pawn and don't even know you're a pawn, that's your business

Some people are willing to know what they're doing for the airdrop, no comments
Some people come to work every day obediently, doing anything without thinking, don’t stop them
Anyway, everything needs to be explored, it's not like food is served on a platter, are you addicted to poison?

If I don’t want to participate in the airdrop next time, don’t trade, just hold, I still need to know that the points you accumulated through hard work in the early stages will be deducted, not that they won't
They will just slowly decrease, from 100u to 1000u only gives you 1 point
Every day just deduct 2 points

Not everyone's u is greater than 1000u, okay? You lost badly in contracts, and there are many people left just wanting to get a bit back from the airdrop
When did the crypto world become a place where one cannot stay as an individual? Speaking without thinking, brainless, having issues, or what?
Have these mixed-up folks thought about this: if you are always treated this way in reality and then come to the virtual world of crypto and are treated the same, how would you feel!
No one said what you understand or know is wrong, it’s just that you all keep saying things that aren’t human, right?
If you want to teach or explain, do it properly! Is it that hard?!
I didn't intend to be any kind of justice messenger, but how low must one live to express this kind of behavior towards others!
See original
If you can't afford to play, don't play ☺️
If you can't afford to play, don't play ☺️
See original
So bad it's unbearable, I really won't touch it again. My own insider trading + buying to create a market.
So bad it's unbearable, I really won't touch it again. My own insider trading + buying to create a market.
ez-win
--
Bearish
#bnb $BNB You might as well not give it, even a little less fee is not enough, I might as well short BNB directly.
See original
Upon careful consideration, you will find that famous battles in history rarely revolve around the concept of 'people'; most rely on timing and geographical advantages. The same is true in web3. A good technology can attract a crowd, and joining during the height of excitement is often not the best timing. It requires you to focus on early development and team-building directions, necessitating a clear judgment of the underlying logic. At this moment, you resemble a general standing before a sand table. There are many reasons you are willing to pay for it, stemming from fear, greed, or an emotional resonance with your thoughts at a particular moment. But upon careful reflection, these are all sales logic; a good product does not need to emphasize these intentionally. Perhaps in its early stages, you glance at it, and it accomplishes you.
Upon careful consideration, you will find that famous battles in history rarely revolve around the concept of 'people'; most rely on timing and geographical advantages. The same is true in web3.

A good technology can attract a crowd, and joining during the height of excitement is often not the best timing. It requires you to focus on early development and team-building directions, necessitating a clear judgment of the underlying logic. At this moment, you resemble a general standing before a sand table.
There are many reasons you are willing to pay for it, stemming from fear, greed, or an emotional resonance with your thoughts at a particular moment. But upon careful reflection, these are all sales logic; a good product does not need to emphasize these intentionally. Perhaps in its early stages, you glance at it, and it accomplishes you.
See original
#红包 #币安红包 I really have to complain about this operational ability Started posting at three points on time to claim, tweeted at 15:01, then deleted the tweet to change the time, changed it to five o'clock, and just threw out a link? Really ridiculous, if you can't handle holiday operations, then don't operate. Even if you get traffic, you can't handle it. What a waste.
#红包 #币安红包 I really have to complain about this operational ability

Started posting at three points on time to claim, tweeted at 15:01, then deleted the tweet to change the time, changed it to five o'clock, and just threw out a link?

Really ridiculous, if you can't handle holiday operations, then don't operate. Even if you get traffic, you can't handle it. What a waste.
See original
https://rewards.illuvium.io/ Those who have played ilv games can check if there is any https://zklink.io/novadrop zklink query. Those who hold nft and have crossed nft can check it airdrop.orderly.network Those who have done galaxy tasks can check it https://claims.aethir.com/ Those who have done aethir tasks, run nodes, hold red beans or Solana madlab can check it #Airdrop‬ #ath #ILV #zkLink
https://rewards.illuvium.io/
Those who have played ilv games can check if there is any
https://zklink.io/novadrop zklink query. Those who hold nft and have crossed nft can check it
airdrop.orderly.network
Those who have done galaxy tasks can check it
https://claims.aethir.com/
Those who have done aethir tasks, run nodes, hold red beans or Solana madlab can check it
#Airdrop‬ #ath #ILV #zkLink
See original
Zks Layer 2 has been held back for too long Congratulations to each other The query link address is as follows https://claim.zknation.io/ #ZKS以太坊空投 #zkSync #Airdrop‬ The interaction standard requirements are still relatively high, requiring interaction and lp contribution. Those who have not yet boarded can refer to the leading standards and bring the boutique account for operation next time
Zks Layer 2 has been held back for too long
Congratulations to each other
The query link address is as follows
https://claim.zknation.io/
#ZKS以太坊空投 #zkSync #Airdrop‬

The interaction standard requirements are still relatively high, requiring interaction and lp contribution. Those who have not yet boarded can refer to the leading standards and bring the boutique account for operation next time
--
Bullish
See original
The rise and fall of traditional finance and the rise of SaaB staking services: a game of value reshaping“Have you ever seen a way to generate income by pledging the business model of an enterprise?” 01 Reshaping business models and opening a new era of digitalization Recently, P2P.org has launched the Staking-as-a-Business (SaaB) network staking service. What is staking? In a blockchain network, staking refers to the process of holding and locking a certain amount of cryptocurrency to receive rewards. Imagine you put your money in a bank time deposit. The bank will use your deposit to invest or lend to others, and give you a certain interest in return. Staking works similarly, you "deposit" your cryptocurrency into the blockchain network, help the network verify transactions and maintain security, and receive new cryptocurrency as "interest."

The rise and fall of traditional finance and the rise of SaaB staking services: a game of value reshaping

“Have you ever seen a way to generate income by pledging the business model of an enterprise?”
01
Reshaping business models and opening a new era of digitalization
Recently, P2P.org has launched the Staking-as-a-Business (SaaB) network staking service.
What is staking? In a blockchain network, staking refers to the process of holding and locking a certain amount of cryptocurrency to receive rewards.
Imagine you put your money in a bank time deposit. The bank will use your deposit to invest or lend to others, and give you a certain interest in return. Staking works similarly, you "deposit" your cryptocurrency into the blockchain network, help the network verify transactions and maintain security, and receive new cryptocurrency as "interest."
See original
The core of level two is waiting, just like a hunter waiting for prey on the grassland The core of level one is searching, like a gold prospector searching for gold in the river bed The essence of learning is to enhance cognition. Wealth beyond cognition cannot be obtained, easily tolerated, or retained. If you want to make all the money in the market, you will end up making no money at all. You can’t have your cake and eat it too, just try to achieve the ultimate in one direction #axl #sol #Portal
The core of level two is waiting, just like a hunter waiting for prey on the grassland
The core of level one is searching, like a gold prospector searching for gold in the river bed

The essence of learning is to enhance cognition. Wealth beyond cognition cannot be obtained, easily tolerated, or retained.

If you want to make all the money in the market, you will end up making no money at all.
You can’t have your cake and eat it too, just try to achieve the ultimate in one direction
#axl #sol #Portal
See original
[A Web3 concept every day] Distributed computing and Web3 A typical distributed computing is cloud computing. For example, Google Drive will save user data on multiple remote servers. Users can access files anytime and anywhere. If one server goes down, another one will be replaced. Another example is Amazon Cloud and Alibaba Cloud. Providing distributed servers for enterprises, enterprises no longer need to purchase large server groups, but rent them as needed to meet different needs. In short, distributed computing is to spread computing tasks across multiple nodes to achieve higher performance and security. So what is the connection between distributed computing and Web3? The purpose of Web3 is to allow users to own and control their own data and digital assets, so using distributed computing to provide decentralized storage and computing for Web3 is the proper meaning of the question. When we say blockchain, we actually refer to a distributed ledger maintained by multiple nodes. The content of the ledger is stored in each node, which is essentially distributed storage. The verification process of the ledger is performed by each node, which is essentially distributed computing. So it can be said that distributed storage and distributed planning together constitute Web3.
[A Web3 concept every day] Distributed computing and Web3
A typical distributed computing is cloud computing. For example, Google Drive will save user data on multiple remote servers. Users can access files anytime and anywhere. If one server goes down, another one will be replaced. Another example is Amazon Cloud and Alibaba Cloud. Providing distributed servers for enterprises, enterprises no longer need to purchase large server groups, but rent them as needed to meet different needs.

In short, distributed computing is to spread computing tasks across multiple nodes to achieve higher performance and security. So what is the connection between distributed computing and Web3?

The purpose of Web3 is to allow users to own and control their own data and digital assets, so using distributed computing to provide decentralized storage and computing for Web3 is the proper meaning of the question.

When we say blockchain, we actually refer to a distributed ledger maintained by multiple nodes. The content of the ledger is stored in each node, which is essentially distributed storage. The verification process of the ledger is performed by each node, which is essentially distributed computing. So it can be said that distributed storage and distributed planning together constitute Web3.
See original
Once there is a big airdrop, a group of people will share that they have played thousands or hundreds of numbers, and then win as many as they can. After sharing, I will probably also talk about my experience at the end. Over and over again, the core is: try to be like a real user. nothing more than 1. Independent IP 2. The withdrawal time and amount of coins from the exchange are random. 3. Divide accounts into several groups as much as possible, and randomly interact with different projects every day. You don’t need to use synchronizers for all of them, first brush project A, and then brush project B, but completely randomly. 4. Leave a gas balance of 10-20u 5. There are some large transfer records to make the wallet authentic I found that many people who have never mentioned the project will jump out when the project is released. I don’t understand the meaning of pursuing such people. Let’s not discuss whether it is what he said. Let’s talk about a simple logic: why he didn’t share it when he masturbated before. The reason was simply because he was afraid of too much competition. The real situation is: there are fewer people who don’t have an invitation code, and those who have an invitation code are especially lucky. Most of the people who airdrop will make money as long as the project is airdropped, but those who have never released any junk projects that occasionally appear are evenly divided. Lu Mao Party Profit ——from chess game Telling the truth is worth it, continue to learn every day and grow regularly. Be familiar with how the project works and not be controlled by emotions #空投项目 #撸毛
Once there is a big airdrop, a group of people will share that they have played thousands or hundreds of numbers, and then win as many as they can.
After sharing, I will probably also talk about my experience at the end. Over and over again, the core is: try to be like a real user.
nothing more than
1. Independent IP
2. The withdrawal time and amount of coins from the exchange are random.
3. Divide accounts into several groups as much as possible, and randomly interact with different projects every day. You don’t need to use synchronizers for all of them, first brush project A, and then brush project B, but completely randomly.
4. Leave a gas balance of 10-20u
5. There are some large transfer records to make the wallet authentic

I found that many people who have never mentioned the project will jump out when the project is released. I don’t understand the meaning of pursuing such people.

Let’s not discuss whether it is what he said. Let’s talk about a simple logic: why he didn’t share it when he masturbated before. The reason was simply because he was afraid of too much competition.
The real situation is: there are fewer people who don’t have an invitation code, and those who have an invitation code are especially lucky. Most of the people who airdrop will make money as long as the project is airdropped, but those who have never released any junk projects that occasionally appear are evenly divided. Lu Mao Party Profit
——from chess game

Telling the truth is worth it, continue to learn every day and grow regularly. Be familiar with how the project works and not be controlled by emotions
#空投项目 #撸毛
See original
[A web3 concept every day] Must-know cryptography Encryption algorithms are the most commonly heard concepts in public chains, wallets and other fields. But how to ensure the security of the wallet and how to ensure the link of the block? This all requires the help of cryptography. Cryptographic technology is the underlying technology for the security of blockchain systems. Hash functions and public-private key pairs commonly used in web3 are representatives of them. Hash Function: Also called hash function, or hash for short, it can realize input of any length and convert it into a fixed-length output: h=H(m), which means that whatever you input will be hashed Algorithm, what is finally obtained is a string of fixed-length characters, one input corresponds to one output, and its security is based on its collision resistance (Collision-Resistant), that is, it is difficult to find two inputs with the same output. In the blockchain, hash functions are used in two places, one is the Merkle tree root hash, and the other is the block pointer connecting the blocks. The Merkle tree root hash is to hash all transactions, then form a new value and then hash it. Finally, only one hash value is found, which is the Merkle tree root hash. Because it is impossible to find two inputs with the same output, this means that as long as the content of the transaction changes, the Merkle tree root hash will also change, so as long as the root hash does not change, the transaction is correct. In the same way, find a hash for the entire block data, and put the entire hash value into the next block header. As long as the hash value remains unchanged, it means that all previous blocks have not been tampered with. , are all correct. Public-private key pair: It is the famous public key cryptography algorithm. Public key cryptography uses a pair of related keys for encryption and decryption: a public "public key" and a secret "private key." The "public key" can be disclosed to anyone and used to encrypt data. The "private key" must be kept secret and known only to the owner. It is used to decrypt data encrypted by the corresponding public key. Public key cryptography algorithms are based on the complexity of certain mathematical problems. For example, the security of the RSA algorithm (a popular example of asymmetric encryption) is based on the difficulty of factoring large numbers. In other words, you can think of this process as a "black box" for encryption and decryption. #每日学习 #eth #BTC!
[A web3 concept every day] Must-know cryptography
Encryption algorithms are the most commonly heard concepts in public chains, wallets and other fields. But how to ensure the security of the wallet and how to ensure the link of the block? This all requires the help of cryptography. Cryptographic technology is the underlying technology for the security of blockchain systems. Hash functions and public-private key pairs commonly used in web3 are representatives of them.

Hash Function: Also called hash function, or hash for short, it can realize input of any length and convert it into a fixed-length output: h=H(m), which means that whatever you input will be hashed Algorithm, what is finally obtained is a string of fixed-length characters, one input corresponds to one output, and its security is based on its collision resistance (Collision-Resistant), that is, it is difficult to find two inputs with the same output.
In the blockchain, hash functions are used in two places, one is the Merkle tree root hash, and the other is the block pointer connecting the blocks. The Merkle tree root hash is to hash all transactions, then form a new value and then hash it. Finally, only one hash value is found, which is the Merkle tree root hash. Because it is impossible to find two inputs with the same output, this means that as long as the content of the transaction changes, the Merkle tree root hash will also change, so as long as the root hash does not change, the transaction is correct. In the same way, find a hash for the entire block data, and put the entire hash value into the next block header. As long as the hash value remains unchanged, it means that all previous blocks have not been tampered with. , are all correct.

Public-private key pair: It is the famous public key cryptography algorithm.
Public key cryptography uses a pair of related keys for encryption and decryption: a public "public key" and a secret "private key." The "public key" can be disclosed to anyone and used to encrypt data. The "private key" must be kept secret and known only to the owner. It is used to decrypt data encrypted by the corresponding public key.
Public key cryptography algorithms are based on the complexity of certain mathematical problems. For example, the security of the RSA algorithm (a popular example of asymmetric encryption) is based on the difficulty of factoring large numbers. In other words, you can think of this process as a "black box" for encryption and decryption.
#每日学习 #eth #BTC!
See original
[A web3 concept every day] Quickly understand PAXOS PAXOS is a typical strongly consistent non-Byzantine consensus algorithm. It is different from the PoW and PoS we talked about earlier. Strong consistency means that all nodes in the system receive consistent results at the same point in time. Non-strong consistency means that it takes a certain amount of time for all data in the system to reach consensus, such as PoW and PoS. So what is non-Byzantium? Byzantine refers to the "traitor" problem, which is a problem with extremely destructive, unpredictable, and random characteristics, such as hacker attacks. Non-Byzantine refers to problems such as downtime, network delay, and information loss. The Paxos algorithm sets up three nodes: proposer, acceptor and learner. How it works is that the proposer sends a uniquely numbered proposal to the acceptor during the Prepare phase to request a commitment. When the acceptor responds, if they have previously accepted other proposals, they will return the values ​​and numbers of those proposals to the proposer. If the proposer obtains the commitment of more than half of the acceptors, it will enter the Accept phase and send the specific value of the proposal. Once this value is accepted by more than half of the acceptors, consensus is reached on the proposal. The learner is then informed of this decision, which is to ensure that other parts of the system know which proposals were accepted, thus maintaining data consistency across the network. According to the famous CAP theorem, a distributed system cannot guarantee consistency, availability, and partition tolerance at the same time. All consensus algorithms are based on actual conditions to achieve a balance among the three. The purpose of PAXOS is to ensure strong consistency, which results in sacrificing a certain amount of availability. Different from PoW, PoW achieves eventual consistency, which means that short-term forks can be allowed, while PAXOS will not have forks, because only consistent results can allow the system to continue running. At the same time, its focus is on solving non-Byzantine faults, which will also cause the system to fail to operate normally when it is attacked by malicious attacks. For example, if a malicious proposer keeps issuing new proposals, the entire system will come to a standstill. #Paxos #热门话题 #每日解析
[A web3 concept every day] Quickly understand PAXOS

PAXOS is a typical strongly consistent non-Byzantine consensus algorithm. It is different from the PoW and PoS we talked about earlier. Strong consistency means that all nodes in the system receive consistent results at the same point in time. Non-strong consistency means that it takes a certain amount of time for all data in the system to reach consensus, such as PoW and PoS.

So what is non-Byzantium? Byzantine refers to the "traitor" problem, which is a problem with extremely destructive, unpredictable, and random characteristics, such as hacker attacks. Non-Byzantine refers to problems such as downtime, network delay, and information loss. The Paxos algorithm sets up three nodes: proposer, acceptor and learner. How it works is that the proposer sends a uniquely numbered proposal to the acceptor during the Prepare phase to request a commitment. When the acceptor responds, if they have previously accepted other proposals, they will return the values ​​and numbers of those proposals to the proposer. If the proposer obtains the commitment of more than half of the acceptors, it will enter the Accept phase and send the specific value of the proposal. Once this value is accepted by more than half of the acceptors, consensus is reached on the proposal. The learner is then informed of this decision, which is to ensure that other parts of the system know which proposals were accepted, thus maintaining data consistency across the network.

According to the famous CAP theorem, a distributed system cannot guarantee consistency, availability, and partition tolerance at the same time. All consensus algorithms are based on actual conditions to achieve a balance among the three. The purpose of PAXOS is to ensure strong consistency, which results in sacrificing a certain amount of availability. Different from PoW, PoW achieves eventual consistency, which means that short-term forks can be allowed, while PAXOS will not have forks, because only consistent results can allow the system to continue running. At the same time, its focus is on solving non-Byzantine faults, which will also cause the system to fail to operate normally when it is attacked by malicious attacks. For example, if a malicious proposer keeps issuing new proposals, the entire system will come to a standstill. #Paxos #热门话题 #每日解析
See original
[A web3 concept every day] What is DePin? DePIN (Decentralized Physical Infrastructure) uses incentives to encourage individuals to share resources such as networks, thereby achieving a decentralized physical infrastructure network. This resource sharing covers storage, communication traffic, cloud computing, energy, etc. DePIN's model can transform the provider unit that provides basic cloud resources from an enterprise into a crowdsourcing model for individual users. DePIN uses incentives to encourage users to provide network resources that can be shared, including GPU computing power, hotspots, storage space, etc. However, early DePIN incentives had no practical use. How can DePIN now use a more complete incentive mechanism and a more complete related ecology to enable personal resource providers to obtain more practical incentives, bringing positive feedback development to providers and consumers as well as the development of the DePIN ecosystem. Yes, it's very abstract. DePIN Web3 emerged to address key challenges in the Web3 ecosystem, specifically bottlenecks associated with centralized infrastructure. This decentralized model reduces the stress of any single point of failure and provides a better infrastructure for decentralized applications. #depin #MOBILE #eth #sol🔥🔥🔥
[A web3 concept every day] What is DePin?
DePIN (Decentralized Physical Infrastructure) uses incentives to encourage individuals to share resources such as networks, thereby achieving a decentralized physical infrastructure network. This resource sharing covers storage, communication traffic, cloud computing, energy, etc. DePIN's model can transform the provider unit that provides basic cloud resources from an enterprise into a crowdsourcing model for individual users.

DePIN uses incentives to encourage users to provide network resources that can be shared, including GPU computing power, hotspots, storage space, etc. However, early DePIN incentives had no practical use. How can DePIN now use a more complete incentive mechanism and a more complete related ecology to enable personal resource providers to obtain more practical incentives, bringing positive feedback development to providers and consumers as well as the development of the DePIN ecosystem. Yes, it's very abstract.

DePIN Web3 emerged to address key challenges in the Web3 ecosystem, specifically bottlenecks associated with centralized infrastructure. This decentralized model reduces the stress of any single point of failure and provides a better infrastructure for decentralized applications.
#depin #MOBILE #eth #sol🔥🔥🔥
See original
Small tips @JupiterExchange will remove the $JUP official pool at 11pm tonight Additional background: In order to prevent airdrop selling pressure, the official set up a pool of 0.4-0.7 for a total of 7 days, so it has been trading sideways in this range recently. What is the next step? Let the market tell you #sol #jup
Small tips

@JupiterExchange will remove the $JUP official pool at 11pm tonight

Additional background: In order to prevent airdrop selling pressure, the official set up a pool of 0.4-0.7 for a total of 7 days, so it has been trading sideways in this range recently. What is the next step? Let the market tell you #sol #jup
See original
Following yesterday’s delisting of XMR, let’s share knowledge about the privacy track. Monero was officially launched in April 2014, so it has been 10 years. It was the earliest attempt to add privacy attributes. Since Layer 1 currently does not support privacy on its public network, since all records are recorded on the blockchain, anyone can read its contents. This creates privacy concerns due to the possibility of linking distributed ledger addresses to real identities. The open and transparent nature of the blockchain allows users' transaction transfer records and on-chain activity records to be viewed by anyone. Users' sensitive information may be easily obtained, and users face the dilemma of "streaking" in the Web3 world. The privacy public chain provides users with privacy protection solutions. Through technologies such as zero-knowledge proof and secure multi-party computation, users can selectively hide sensitive information. In layman's terms, every operation on the chain will be packaged and sent to a smart contract. The user's transaction records can be queried through the blockchain browser. The data includes the sent data object, time, quantity, etc. Users who have used privacy products will find that when you deposit a fund into a privacy account, the funds will be subcontracted to dozens or even hundreds of contract accounts for two-way interaction, and then executed from the thread. , and then the total amount of your funds, transfer time, and return address cannot be tracked. This solved a lot of "passage" issues at certain times. Some people ask, since Monero is so popular in the privacy world and the dark web world, why does the currency price not rise? You can understand by giving a simple phenomenon: Monero exists as an anonymous value carrier in these worlds. Legal currency goes in and becomes Monero. Monero transactions obtain demand goods. Sellers sell Monero and get legal currency. They are free and easy in the real world. comfortable. So you see, Monero is just a carrier at this time. The carrier is not too dependent on price but focuses on usage scenarios. It is convenient and can be calculated with legal currency on the same day. Basically, it will be replaced when it is used up. There is another thing that must be mentioned. Is there still room for Monroe in the future? Value determines price, butt determines head. When demand exceeds supply, rising prices are inevitable #xmr #XMR將被幣安下架 #隐私赛道 #zen
Following yesterday’s delisting of XMR, let’s share knowledge about the privacy track.

Monero was officially launched in April 2014, so it has been 10 years. It was the earliest attempt to add privacy attributes. Since Layer 1 currently does not support privacy on its public network, since all records are recorded on the blockchain, anyone can read its contents. This creates privacy concerns due to the possibility of linking distributed ledger addresses to real identities.

The open and transparent nature of the blockchain allows users' transaction transfer records and on-chain activity records to be viewed by anyone. Users' sensitive information may be easily obtained, and users face the dilemma of "streaking" in the Web3 world.

The privacy public chain provides users with privacy protection solutions. Through technologies such as zero-knowledge proof and secure multi-party computation, users can selectively hide sensitive information.

In layman's terms, every operation on the chain will be packaged and sent to a smart contract. The user's transaction records can be queried through the blockchain browser. The data includes the sent data object, time, quantity, etc. Users who have used privacy products will find that when you deposit a fund into a privacy account, the funds will be subcontracted to dozens or even hundreds of contract accounts for two-way interaction, and then executed from the thread. , and then the total amount of your funds, transfer time, and return address cannot be tracked. This solved a lot of "passage" issues at certain times.

Some people ask, since Monero is so popular in the privacy world and the dark web world, why does the currency price not rise? You can understand by giving a simple phenomenon: Monero exists as an anonymous value carrier in these worlds. Legal currency goes in and becomes Monero. Monero transactions obtain demand goods. Sellers sell Monero and get legal currency. They are free and easy in the real world. comfortable. So you see, Monero is just a carrier at this time. The carrier is not too dependent on price but focuses on usage scenarios. It is convenient and can be calculated with legal currency on the same day. Basically, it will be replaced when it is used up. There is another thing that must be mentioned. Is there still room for Monroe in the future? Value determines price, butt determines head. When demand exceeds supply, rising prices are inevitable
#xmr #XMR將被幣安下架 #隐私赛道 #zen
See original
[A web3 concept every day] Classification of consensus mechanisms People who don’t understand the consensus mechanism must have this question: Why are there so many consensus mechanisms? As mentioned earlier, the consensus mechanism is to solve the "trust problem", that is, to make everyone believe that something really happened. Returning to technology, it is actually to allow the distributed system to reach a consistent state, but this is not the only characteristic of the distributed system. Generally speaking, distributed systems have several most important characteristics: consistency, availability, partition tolerance, liveness, scalability, etc. However, according to the FLP theorem and the CAP theorem, there is no way for a distributed system to have consistency and high availability at the same time, which means that the design of all consensus mechanisms must make a trade-off. Therefore, current projects will basically make some innovations at the consensus mechanism level to better adapt to actual needs and application scenarios. But generally speaking, there are standards for the classification of consensus mechanisms. The simplest one is classified based on participation rights. Consensus mechanisms that require authorization to participate are often used in private chains and consortium chains, such as PBFT; consensus mechanisms that everyone can participate without authorization are used in public chains, such as PoW. Secondly, it can be classified according to resource types, such as computing resources such as PoW, pledged assets such as PoS, storage space such as PoC (Proof of Space/Storage), etc. This is also the consensus mechanism type most commonly used in public chains. Of course, it can also be classified according to the strength of consistency. Strong consistency such as Paxos, Raft, PBFT, and non-strong consistency such as PoW, PoS, etc. It can also be classified according to the fault tolerance types we talked about before, such as those that can tolerate crash failures but cannot tolerate Byzantine faults, such as Paxos, VR, etc.; there are also those that can tolerate malicious nodes and malicious behaviors, such as PBFT, PoW, PoS, etc. Finally, it can also be classified according to finality. The mechanism that is irreversible after the decision is executed is represented by PBFT; the mechanism that is reversible within a certain period of time after the decision is executed, but as time goes by, the possibility of reversibility becomes smaller and smaller, is represented by PoW. Consensus mechanism is a large subject. We always hear about endless innovations, but it remains the same. As long as you understand the characteristics of distributed systems, consensus mechanism is not mysterious. #共识机制 #热门话题
[A web3 concept every day] Classification of consensus mechanisms
People who don’t understand the consensus mechanism must have this question: Why are there so many consensus mechanisms?

As mentioned earlier, the consensus mechanism is to solve the "trust problem", that is, to make everyone believe that something really happened. Returning to technology, it is actually to allow the distributed system to reach a consistent state, but this is not the only characteristic of the distributed system. Generally speaking, distributed systems have several most important characteristics: consistency, availability, partition tolerance, liveness, scalability, etc. However, according to the FLP theorem and the CAP theorem, there is no way for a distributed system to have consistency and high availability at the same time, which means that the design of all consensus mechanisms must make a trade-off.

Therefore, current projects will basically make some innovations at the consensus mechanism level to better adapt to actual needs and application scenarios. But generally speaking, there are standards for the classification of consensus mechanisms.

The simplest one is classified based on participation rights. Consensus mechanisms that require authorization to participate are often used in private chains and consortium chains, such as PBFT; consensus mechanisms that everyone can participate without authorization are used in public chains, such as PoW.

Secondly, it can be classified according to resource types, such as computing resources such as PoW, pledged assets such as PoS, storage space such as PoC (Proof of Space/Storage), etc. This is also the consensus mechanism type most commonly used in public chains.

Of course, it can also be classified according to the strength of consistency. Strong consistency such as Paxos, Raft, PBFT, and non-strong consistency such as PoW, PoS, etc.

It can also be classified according to the fault tolerance types we talked about before, such as those that can tolerate crash failures but cannot tolerate Byzantine faults, such as Paxos, VR, etc.; there are also those that can tolerate malicious nodes and malicious behaviors, such as PBFT, PoW, PoS, etc.

Finally, it can also be classified according to finality. The mechanism that is irreversible after the decision is executed is represented by PBFT; the mechanism that is reversible within a certain period of time after the decision is executed, but as time goes by, the possibility of reversibility becomes smaller and smaller, is represented by PoW.

Consensus mechanism is a large subject. We always hear about endless innovations, but it remains the same. As long as you understand the characteristics of distributed systems, consensus mechanism is not mysterious.

#共识机制 #热门话题
See original
The delisting of Monero has been causing a stir since the end of last year. There are still people running with faith on the track How much role privacy plays in the development of distributed technology still needs to be understood dialectically, but without exception, the emergence and withdrawal of any technology have their own significance. As long as you are willing to research, your knowledge will always be pushed forward. In the near future, I will share my knowledge about the privacy track for everyone to learn from. #xmr #门罗币 #Zen #隐私
The delisting of Monero has been causing a stir since the end of last year.
There are still people running with faith on the track
How much role privacy plays in the development of distributed technology still needs to be understood dialectically, but without exception, the emergence and withdrawal of any technology have their own significance. As long as you are willing to research, your knowledge will always be pushed forward.
In the near future, I will share my knowledge about the privacy track for everyone to learn from.
#xmr #门罗币 #Zen #隐私
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number

Latest News

--
View More

Trending Articles

Doctor-Moro
View More
Sitemap
Cookie Preferences
Platform T&Cs