آدرس کانال:
دسته بندی ها:
حیوانات ,
اتومبیل
زبان: فارسی
مشترکین:
4.13K
توضیحات از کانال
🇸🇦لآ اِلَهَ اِلّا اللّهُ مُحَمَّدٌ رَسُوُل اللّهِ 🇸🇦
♂️ ʙʟᴀᴄᴋ ʜᴀᴛ ʟᴇᴀᴋꜱ
❌ ɴᴏ ғᴏʀᴄᴇ ᴛᴏ ᴊᴏɪɴ ❌
𝗟𝗲𝘁'𝘀 𝗟𝗲𝗮𝗿𝗻 𝗧𝗼𝗴𝗲𝘁𝗵𝗲𝗿 👿
𝙎𝙋𝙍𝙀𝘼𝘿𝙄𝙉𝙂 𝙆𝙉𝙊𝙒𝙇𝙀𝘿𝙂𝙀 𝙁𝙊𝙍 𝙁𝙍𝙀𝙀 🎩
@Software_Hacker_kalilinux
Ratings & Reviews
Reviews can be left only by registered users. All reviews are moderated by admins.
5 stars
1
4 stars
0
3 stars
1
2 stars
0
1 stars
1
آخرین پیام ها 8
2022-05-19 19:56:07
To be continued
165 views16:56
2022-05-19 19:55:33
All these nodes in this network create a consensus. They agree about what blocks are valid and which are not. Nodes in the network will reject blocks that are tampered with.
So, to successfully tamper with a blockchain
You will need to tamper with all blocks on the chain
Redo the proof-of-work for each block
Take control of greater than 50% of the peer-to-peer network.
After doing all these, your tampered block becomes accepted by everyone else. This is next to an impossible task. Hence, Blockchains are so secure. Next, in this beginner’s Blockchain development tutorial, we will learn how a Blockchain transaction works?
163 views16:55
2022-05-19 19:55:05
140 views16:55
2022-05-19 19:55:02
Let’s see what happens when any user creates a new block. This new block is sent to all the users on the network. Each node needs to verify the block to make sure that it hasn’t been altered. After complete checking, each node adds this block to their blockchain.
110 views16:55
2022-05-19 19:54:52
94 views16:54
2022-05-19 19:54:41
Distributed P2P Network
However, there is one more method which is used by blockchains to secure themselves, and that’s by being distributed. Instead of using a central entity to manage the chain, Blockchains use a distributed peer-peer network, and everyone is allowed to join. When someone enters this network, he will get the full copy of the blockchain. Each computer is called a node.
87 views16:54
2022-05-19 19:54:37
This kind of mechanism makes it quite tough to tamper with the blocks, so even if you tamper with even a single block, you will need to recalculate the proof-of-work for all the following blocks. Thus, hashing and proof-of-work mechanisms make a blockchain secure.
86 views16:54
2022-05-19 19:54:31
81 views16:54
2022-05-19 19:54:18
Proof of Work
Hashes are an excellent mechanism to prevent tempering, but computers these days are high-speed and can calculate hundreds of thousands of hashes per second. In a matter of a few minutes, an attacker can tamper with a block and then recalculate all the hashes of other blocks to make the blockchain valid again.
To avoid the issue, blockchains use the concept of Proof-of-Work. It is a mechanism that slows down the creation of the new blocks.
A proof-of-work is a computational problem that takes a certain to effort to solve. But the time required to verify the results of the computational problem is very less compared to the effort it takes to solve the computational problem itself.
In the case of Bitcoin, it takes almost 10 minutes to calculate the required proof-of-work to add a new block to the chain. Considering our example, if a hacker would to change data in Block 2, he would need to perform proof of work (which would take 10 minutes) and only then make changes in Block 3 and all the succeeding blocks.
81 views16:54
2022-05-19 19:54:15
Therefore, changing a single block can quickly make all following blocks invalid.
76 views16:54