Super-brain hacker

Chapter 613 The Most Dangerous and Safest

It turned out to be ESSI's email to himself?

Lin Hong looked at the email address and couldn't see anything from the address, but what does it mean that the other party attached such a signature at the end?

Is it ESSI himself? Or is it someone else's spoof?

Looking at the question raised by the other party and thinking about it, Lin Hong finally felt that it was more likely to be the real ESSI.

ESSI, a mysterious hacker in the network, is the founder of the famous cracking organization CORE.

At the beginning, Guang Yongyuan told him that he speculated that ESSI was likely to be Chinese, and he didn't know if it was true.

The discussion group they are in is a secret discussion group. When sending letters, they are encrypted through PGP software and then sent to the public. That is to say, even if Lin Hong wants to find it, it is not so easy to find it.

Of course, Lin Hong doesn't have to find out everyone clearly. He raised such a question about the direction in private and showed his identity. Obviously, he is very friendly.

From this point, it can be seen that this ESSI is also very optimistic about Bitcoin, and I don't want others to know about this defect so early.

This 51% attack vulnerability has always existed in theory, but the actual situation may be a little different.

At the beginning, when Bitcoin was just developed, the computing power of the whole network may still be relatively small. Any machine with a more powerful configuration may occupy 51% of the computing power, but after all, this is a distributed network. More and more people are participating in this project, and more and more computers are connected to this network. At that time, it is not easy to occupy 51% of the computing power. Because at that time, the power of one person will compete with all the Bitcoin participants in the world.

That is to say, the more Bitcoin develops, the more secure it will be. At a certain order of magnitude, even if the government wants to compete with a supercomputer, it may not work.

Lin Hong was tucking up and down in his room, thinking about solutions.

It's a pity. In the end, he found that there was no solution to this problem, and he could only hope that Bitcoin would develop smoothly all the way, and he would not meet such a crazy person in the early stage.

Lin Hong sat back in front of the computer and replied a letter to ESSI... I have been looking forward to it for a long time, and the letter has been read. The problem you mentioned does exist, but unfortunately, no good solution has been thought of for the time being. However. As you know, this problem should only exist in the early stage of Bitcoin's development, and this loophole will no longer exist in the later stage. Thank you for your reminder. In addition, if you have any good suggestions, please let me know. KEEP IN TOUCH, GHOSTER PAY TRIBUTE.

This is an unsoluted problem, and Lin Hong can only put it aside.

The design of Bitcoin is the only solution he can find so far that can perfectly solve all the defects of electronic currencies in the past. He can never give up like this.

Lin Hong continued to write Bitcoin software.

P2P software has a feature, that is, the client and server are integrated, and data can be downloaded. It can also act as a server to serve others.

With the experience of bit messenger, he writes Bitcoin software very quickly.

The theoretical framework in the early stage has long been clearly conceived, but now it is just a natural process for this theoretical practice.

It only took about five or six hours to write this software, but it took a long time to debug.

I haven't slept for a long time before. After Lin Hong wrote the prototype, he rested for one night. I adjusted my body, and then spent half a day debugging.

Bitcoin client beta version is officially released!

This is a memorable day.

This Bitcoin client is actually equivalent to an electronic money wallet software, which can be used to send and receive Bitcoin to verify the legitimacy of the transaction. Broadcast transaction data, and download and save all transactions in the entire Bitcoin network.

However, now that the software has just come out, there is only one node in the Bitcoin network, and there is no transaction data in it at all.

Then. Lin Hong wrote a simple mining software. According to the algorithm mechanism of mining, he used the CPU to calculate the head of the data block, and finally excavated Bitcoin.

Because it is the beginning, the difficulty of mining is directly 1, that is to say, as long as you turn on the computer, it is very easy to dig Bitcoin.

Lin Hong excitedly launched the mining test program. The number in the software continued to rise, and the progress bar soon rose from zero to 100.

The first Bitcoin block has been generated! The "Genesis Block" that has been remembered by the latecomers was born!

This kind of block was affectionately called "Bitcoin nuggets" by later miners. According to the design principle of Bitcoin, in the first four years, the number of bitcoins in a "gold nugget" was 50.

The number displayed in Lin Hong's Bitcoin client has changed from zero to 50, and the first transaction record has also appeared in the entire Bitcoin network. This record is a mining record, and the first packaged data block appears. If you carefully analyze this data block, you will find that it is recorded in it. Some details of the birth of Bitcoin, such as block ID, hash value, difficulty, creation time, number of transmissions (number of transactions), number of bitcoins, block size... and so on.

Lin Hong continued to dig Bitcoin while using the mining program, while debugging the two software.

His mining difficulty at this time is 1, and no one else competes with him. It is the easiest time to mine. As long as he starts the machine, he can basically dig Bitcoin, and it is a block at a time, with 50 bitcoins.

While digging, he began to improve his original design plan, adding some details as a supplement to make Bitcoin more reasonable.

Mining is actually the process of constantly cracking the calculation of the hash value of the block head. It takes up a lot of CPU cycle time. Every time you mine, the CPU is basically running at full capacity and also needs to consume a lot of electricity. After digging for a few days, the electricity meter at home is jumping up, and the electricity bill is eliminated. It costs a lot.

In fact, this is also Lin Hong's ingenuity in this design.

Anything that is too easy to get will not be very precious. He knows this well, so he designed it like this. If you want to dig Bitcoin, you have to spend a lot of machine computing power in it, which is the consumption of resources.

This situation, just like mining in real life, if you want to dig a gold ore ore ore, you must spend labor and time to replace the corresponding reward.

In a computer, resources are the computing power of the computer. At present, it refers to the computing time cycle of the CPU. It must take a certain amount of computing power and time to dig Bitcoin, and as the difficulty of mining increases, the time will be extended accordingly.

During this period, Lin Hong devoted all his mind to the development of Bitcoin, and the company's affairs were temporarily handed over to Zhang Jin. Fortunately, he arranged the company's affairs a while ago, and there was nothing to do if he left temporarily.

Eight days later, Lin Hong finally decided to almost perfect the Bitcoin client and mining program. He sorted it into a V0.1 version and then released it in this secret mailing list.

During this period, the discussion about Bitcoin has not stopped.

It can be said that this mailing list has never been so lively since it was created.

Some people continue to discuss the principles of Bitcoin and explore the details. After all, in that paper, Lin Hong only wrote a general theory, and the details were not talked about too much.

Some people are imagining what kind of impact Bitcoin will have on society after its birth.

There are also people who have been urging GHOSTER to ask about the progress of the implementation of the software, and even many people have expressed their willingness to be volunteers and do their part.

When Lin Hong released the V0.1 version, everyone immediately downloaded the torrent in the attachment as soon as possible, and then downloaded it immediately through the file download function of Bit messenger.

You really didn't expect that GHOSTER would implement the first version so quickly. It can be seen that GHOSTER is not only theoretical, but also proficient in programming and is a doer.

The software is actually very simple, and the key lies in the mechanism implemented in the software.

is open with the client, as well as the source code. Considering the issue of confidentiality, Lin Hong does not provide the LINX version for the time being, but only provides the source code version of the two platforms, WINDOWS and LINUX.

In this way, there are the first batch of users in the Bitcoin network. They start mining programs in their computers, dig day and night, contributing their computing power to the Bitcoin network, and also obtain Bitcoin.

With everyone's participation, the data in the Bitcoin network has also begun to change. First of all, the most obvious thing is that the difficulty begins to increase. It is no longer as easy as before, but relatively speaking, it is quite easy.

Just like a newly discovered gold mine, newcomers can definitely make money easily.

On the second day of the release of the Bitcoin client, the first transaction was generated in the Bitcoin network. This was the transaction sent by Lin Hong to ESSI, with a total of 100 bitcoins.

Similar to Bitcoin messenger, the public key and private key addresses of Bitcoin are a series of encrypted characters. The public key is the receiving address. This string of 34-bit characters is unique, and the same wallet can theoretically generate countless addresses.

That is to say, if you are careful that it is easy to expose your identity when you often use a certain account to collect money, you can directly generate a new one, and you can also receive Bitcoin.

In this way, Bitcoin, which was later called the "most dangerous" and "most secure" electronic currency, has taken a small step and is also a very important step. ( To be continued) RQ