Super-brain hacker

Chapter 631 Major Discovery

At the end of the month, Xiaoqiang asked for a monthly pass. The monthly pass is a little too miserable... Since the development of Bitcoin, although many people have participated in it, and a lot of Bitcoin has been dug out, Bitcoin is not valuable, and it is only regarded as something similar to points by others.

Many people joined the mining team because they were curious. They started mining software, dug some bitcoins, experimented with the sending and receiving functions of bitcoins, and then... there was no more.

Except for a few enthusiasts, many people uninstalled the software, didn't even save the key, and deleted it directly, because Bitcoin is not valuable now.

The

key is the only channel to open the wallet. Once the key is abandoned or lost, the wallet that holds those bitcoins can no longer be opened.

Once Bitcoin is thrown away or lost, as long as the Bitcoin network does not disappear, they will exist in the network forever like ghosts, but no one, a terminal or a network cable owns them.

They are not dead, but they will not reappear in someone's wallet. They only exist in the transaction chain in the Bitcoin network. They exist, but they are equivalent to non-existent.

Whether it is Liu Jian or Warren, the bitcoins they dig up have been directly abandoned. Warren just wanted to test his own ideas, while Liu Jian thought that part of Bitcoin was "stolen money" and he was no longer interested.

In the first four years, half of the number of bitcoins will be mined, but a considerable part of bitcoins will be mined. But it was abandoned forever, so that on the day when all the bitcoins were mined, the total number of bitcoins circulating in the market, plus those stored by people as a value-preserving currency, was far less than 21 million.

Fortunately, Bitcoin can be divided infinitely in theory, and there is nothing that is not enough.

......

After Lin Hong and Daredevil finished the call, they looked at the calculation curve. I was relieved to find that the computing power of the main network had directly decreased, and finally returned to the original level.

I'm lucky this time. Many people helped with the defense, so that before he took action, the attack was over.

But I'm sure I won't be so lucky every time. Lin Hong thinks that something should be done in advance to prevent it.

After thinking about it, he finally thought that Daredevil's method was good.

Although it is unethical to use broiler mining, in order to allow Bitcoin to develop healthily and smoothly, he decided to create an emergency defense plan especially for 51% attacks, that is, once it is found that there is a huge change in the computing power of a certain stock and the early warning conditions of 51% attack are met, it will be started. This defense plan improves the overall computing power accordingly.

The method used in this scheme is to mine through super worms.

Lin Hong added mining function to the super worm. Monitor the change of computing power of the main network at any time. Once there is a suspicious situation, it will automatically send mining instructions to the super worm network, allowing the super worm to mine, thus reducing the proportion of the attacker's computing power to the overall computing power.

"Everything is for the smooth development of Bitcoin." Lin Hong said to himself.

It took him several hours to transform the super worm again. This is already the third major version of the super worm. The last modification was passively modified because of the vulnerability changes caused by the upgrade of the operating system, but this time it was active.

Considering the hidden characteristics of super worms, the computing power of each super worm must not be too large, which can only be described as weak. But the victory is that with a large number of thousands of super worms working at the same time, the computing power that can be generated cannot be ignored.

Of course, super worms usually do not participate in mining, and only when the Bitcoin network is threatened will this condition be automatically triggered.

When Lin Hong's test is finished, it's already evening.

He stretched out, and then remembered something, so he picked up the phone and dialed Zhou Tong's number.

"Brother Zhou, how's the matter I told you last time going?"

"The personnel are in place, but the equipment is still being debugged. If nothing unexpected happens, you can officially start mining in two days." Zhou Tong's voice came from the phone, "We studied it and found that if we mine in the official way, the efficiency is not very high. The speed of mining is mainly related to the CPU. We plan to build our own multi-core computers, which can not only improve computing power, but also save a lot of costs."

Now the mining efficiency is mainly related to the CPU. After receiving Lin Hong's instructions, Zhou Tong held an internal engineer meeting to discuss this matter.

Of course, the things assigned by the boss should be done well, but they are all technicians with ideas. Naturally, they will not be carried out rigidly, but carried out targeted research, and finally discussed an optimal solution, that is, to use the existing conditions to create a special equipment for mining, and other computers Unnecessary external devices are omitted, such as floppy drives, monitors, etc., focusing on the CPU.

Combine multiple CPUs to form a huge computing power, which is the basic principle of supercomputers. Their scheme is similar to this one, but the scale is much smaller than that of supercomputers.

Of course, to make such a special mining equipment is not just a simple CPU stacking, which involves a lot of details, not only the hardware should be compatible, but also the software should be matched and customized by yourself.

It was precisely because of their high requirements that the mining plan was postponed for a period of time and was not carried out immediately.

Lin Hong didn't say anything about this, but said, "Well, as soon as possible. If you have any questions, you can contact me directly."

He was not surprised by this. After all, the people in the company are different from the past, and many people have grown up. If they can't even think of this now, there is no need for the technical department to exist.

After hanging up the phone, Lin Hong decided to start upgrading the Bitcoin client.

At present, the version of the Bitcoin client is only V0.1, only a test version, and many functions are not perfect.

Since its release, some feedback and suggestions have gradually appeared on the open source forum. Lin Hong usually takes a look at the forum when he has time, and then collects these suggestions.

He used a bit messenger as an agent to log in to the open source forum to see if there is any new feedback.

A post caught his attention.

"Major discovery: Ninety-nine percent of the authors of Bitcoin and Bitcoin are the same person!"

This post has just been published for more than ten minutes, but there have been more than a dozen pages of replies.

This is a little abnormal.

In fact, this speculation has not been put forward by anyone, but usually, after discussing a few floors, it will slowly drown in other new posts, because many of these people are just guessing and there is no actual evidence to prove his point of view.

But this post is different. It depends on the number of clicks and replies, which are much more than previous discussion posts.

Lin Hong frowned slightly and clicked in.

The author first put forward his own argument, and then wrote thousands of words to prove his point of view, with pictures and text and detailed data.

He came to this conclusion mainly based on the coding habits of Bitcoin messenger and Bitcoin.

According to his theory, the habit of writing code is as difficult to copy as a person's handwriting. Everyone has their own unique habits. These small details are reflected in many places, such as the naming rules of variable names, the use of carriage returns and spaces, the algorithm code way to implement common functions, and It is the program structure and processing method used to implement a function...

These habits are often unconsciously displayed by programmers, which is completely a kind of subconscious behavior.

......

After reading this post, Lin Hong had to admit that the author's achievements in the field of data mining are indeed extraordinary. After all, when he wrote the Bitcoin client, he had already considered this situation and deliberately changed his coding style for fear that the coding style would reveal his identity.

Unexpectedly, there is a specialty in the art industry, and there are geeks and ghosts in every field. They are often able to do incredible things. Such people, in the circle, have a name called "geek", which is a kind of existence different from "hacker".

Obviously, the author of this post is a geek. The field he studies is programming style and habits. In this field, he is an absolute authority and can see a lot of hidden information from some information that everyone turns a blind eye.

Because this post is well-founded, it fully proves his point of view and has been recognized by many people.

Although everyone has made such speculation before, no one has provided sufficient evidence. THIS POST DIRECTLY CONNECTS THE AUTHOR OF BIT CONNECTOR WITH GHOSTER, THE AUTHOR OF BITCOIN.

"The thread starter is really awesome!"

"I have guessed it for a long time, but I have to admit that you are really awesome... Who is it? I want to be a teacher!"

"Can we think that GHOSTER has begun to lay out Bitcoin as early as five years ago?"

"I can tell you responsibly that this is a conspiracy... After disappearing for so long and reappearing in the world, I released something as off the sky like Bitcoin, just like releasing a bit messenger that year.

This message spread all over the Internet at a very fast speed.

The spokesman of the Free Software Foundation soon replied in the post, expressing close attention, and hoped that the author of Bitcoin could contact him as soon as possible to discuss important matters.

Lin Hong just smiled and then retreated.

This matter was a little beyond his expectation. Originally, he didn't want to pull these two things together, because it would make everyone pay more attention to himself, which was not what he wanted to see. ( To be continued. If you like this work, you are welcome to vote for recommendation and monthly ticket. Your support is my greatest motivation.) RQ