The only reason why you don`t own Bitcoin is that you don`t know enough about it…. Bozhenko Oleh
Чтение книги онлайн.

Читать онлайн книгу The only reason why you don`t own Bitcoin is that you don`t know enough about it… - Bozhenko Oleh страница 7

СКАЧАТЬ of a public address:

      1BvBMSEYstWetqTFn5Au4m4GFg7xJaNVN2

      Add to this Bitcoin’s code as a program consists of 77,000 lines. The 70,000 lines are written in the programming language C++. In addition, the length of the chain in the Bitcoin blockchain has exceeded 710,000 blocks. To guess the bitcoin phrase to crack all the blocks will take over 38 nonillion years because the system has acquired a reliable cryptographic hashing algorithm – SHA-256. And that’s another reason why no one has been able to crack Bitcoin yet.

      Not everyone has heard of SHA-256, but in my opinion, it is one of the greatest American inventions of the 21st century. Developed by the National Security Agency (NSA) in 2001, SHA-256 is a secure hashing algorithm used in the iPhone to hash data, including the unique facial characteristics many of you use to unlock your phone.

      I won’t bore you with the details, but SHA-256 has never been broken or compromised, making Bitcoin one of the most secure protocols in the world. That is why it was decided to create a digital asset based on it. In 2010, SHA-256 was said to «have the potential to last several decades unless a large-scale breakout attack occurs.» That is good news, as Bitcoin was designed to be mined and stored for the next 140 years, maybe even longer.

      Remember that there is currently no hardware capable of damaging Bitcoin. The only thing that can damage it is the «51% Attack», in which an attacker captures more than half of the network’s mining capacity.

      The 51% attack is a potent threat to blockchain networks, including Bitcoin. It occurs when a single participant or group of blockchain participants control more than 50% of the network’s computing power. It means they can manipulate the transaction validation process and create fake transactions.

      In theory, a 51% attack allows an attacker to perform the following actions:

      – Transaction Veto. The attacker can reject or cancel certain transactions that they deem undesirable. It can cause a loss of trust in the network and reduce its integrity.

      – Double Spending. An attacker can conduct double spending, meaning he can spend the same bitcoins twice. He can cancel transactions that have already been made and use the same bitcoins for new payments.

      However, the 51% Attack requires significant computing power to implement successfully, making it complex and expensive. Despite the possibility of a 51% Attack, it is unlikely in the case of Bitcoin, something on the level of a myth, if you will.

      Perhaps mining will change hands, and one owner will gain control of 51% of the hash rate. But in this case, he is unlikely to jeopardize his business, as not only the network’s credibility would collapse but also all of his profits. It is all the more important to consider that this has happened many times in history if it makes sense. Just look at the distribution of miners across all the world’s mining companies (Figure 13). It would be enough for the two top players to collude and launch a 51% Attack, but they don’t, and for good reason.

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «Литрес».

      Прочитайте эту книгу целиком, купив полную легальную версию на Литрес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.

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
СКАЧАТЬ