[this chapter contains a lot of popular science bitcoin content. Readers who know bitcoin very well do not need to subscribe. In addition, the explanation of bitcoin in this article is purely written by the author Jun according to his own understanding, so there will be many mistakes, but the general concept is correct. Please understand]
I believe you have guessed that everything musk has experienced, including the small bookstall and the Yellow notebook, are actually the masterpiece of boss Jia, otherwise boss Jia can really let musk take over thousands of mobile phones as a time bomb?
The purpose of boss Jia to see musk is to let him get the concept of bitcoin and get out.
As for why boss Jia did this, that is the answer to be revealed later. Let's not mention these for the time being.
The topic is back to bitcoin. What is this bitcoin?
This is very complex in terms of complexity and simple in terms of simplicity. In fact, bitcoin is essentially a string of passwords, a string of unique passwords on the whole network.
It sounds incredible. A string of passwords can be worth more than $60000. Why should he? What can a string of passwords do? Can you open Daqian's bank account?
Of course not, but on the contrary, a pile of $60000 paper money is just a pile of paper, which is worse than a password.
Further, what is the digital cash in Alipay? What's more, it is a string of data, which is not as good as paper.
In fact, the fundamental reason why all money in the world can be maintained is not what the money itself can do, but the credit represented behind the money. Everyone believes in the value of the money and is willing to exchange their own products for him, which means that the money is established.
Almost all money in the world is endorsed by the country's credit, because personal credit is worthless in front of money.
But bitcoin is an exception. Bitcoin is not endorsed by the country's credit, but by the credit of the whole network.
Let's talk about the generation process of bitcoin.
I believe everyone must often use x sub x load, because this download method is much faster than other traditional download methods.
Because the x-sub-x load is different from the traditional download. The traditional download is to download files from a fixed server. Although the server has high stability and network, one server needs to face thousands of downloads, and the download speed is very slow.
X sub load x is different. Instead of downloading directly from the server provided by the service provider, it downloads directly from the downloaded user's computer.
For example, a user has a very good movie, but the movie is not suitable for putting on a public download server, so he makes the movie into an X sub file, and then publishes the file to the network, while ensuring that his computer is connected to the network.
At this time, if someone downloads the X sub file and double clicks it, they can directly enter the publisher's computer through the network and download the movie.
Once the download is completed, the two people's computers will have the film and seeds. In this way, the third person can download part of the film data from the two people's computers at the same time, so the download speed is greatly improved.
Then 3 people become 6 people and 6 people become 12 people. Anyway, with the passage of time, more and more people also own the film, so the download speed is faster and faster, because the download work is scattered to hundreds of private computers, rather than a single server, which is naturally faster.
In this way, each computer takes out part of its own computing resources, network resources and storage resources to form a large network, which is the concept of peer-to-peer network, that is, P2P network.
Once we understand this concept, we will continue to understand bitcoin.
The birth process of bitcoin is not complicated, but a process of solving mathematical problems.
Nakamoto, the creator of bitcoin, lists a very complex system of equations. You don't care what the system of equations is. You just need to know that there is no fixed solution to the system of equations. He has many different special solutions.
As for how to solve this equation, users don't have to bother, because Nakamoto has provided an open-source bitcoin mining knife software, which can directly calculate the special solution of bitcoin.
At the same time, according to the estimation, because the number of special solutions is limited, the number of bitcoins is also limited. There are only about 21 million bitcoins in the world at most, because there are only so many special solutions of this equation.
When the first person uses the bitcoin mining knife program to solve the first special solution, the bitcoin mining knife will reward the solver with 50 bitcoins, and then the answer, as well as the data changes of all transactions within 10 minutes, will be packaged into a data packet and stored on the peer-to-peer network mentioned earlier.
This packet is called a block, and the first packaged data is the first block.
When a user solves the second special solution, he will also be rewarded with 50 bitcoins, and then all transaction data will be packaged into a data packet within 10 minutes.
This packet is the second block, and the first block and the second block are connected with each other through peer-to-peer networks. Then the second block is connected with the third block, and the third block is connected with the fourth block. Finally, a long chain composed of countless blocks is formed, which is the so-called blockchain Technology.
This blockchain will be automatically stored in the computers of all users who have installed bitcoin mining knife software. Of course, some people may choose to delete data.
However, it doesn't matter, because there are countless identical blockchains stored in countless computers, which is equivalent to having countless data backups, which is absolutely safe.
Bitcoin itself is a string of passwords. When you upload the special solution to the bitcoin mining knife for verification, all the connected bitcoin mining knives in the world will verify your special solution at the same time.
As long as this special solution is new and completely different from other verified special solutions stored in all mining knives, the mining knife automatically generates a bitcoin private key, that is, a string of passwords that are too complex to be solved, and sends them to a bitcoin address you set.
At the same time, bitcoin mining knife will also produce a public key, which corresponds to the private key you get. A private key can only open one public key.
You are the only one who owns the private key, but the public key is stored in everyone's computer.
When trading bitcoin, you can only open the private key with your public key. In this way, the bitcoin miner will produce a new private key and send it to the bitcoin address of another user who paid for your bitcoin. In this way, you will lose the private key and bitcoin is equivalent to trading to another person.
This is the basic composition of bitcoin. You may be confused. Let's compare it vividly.
First, suppose that a person's circle of friends can add friends indefinitely, and will always be visible to all friends.
Then the owner of the circle of friends sent a question in the wechat circle of friends: what is fruit.
Then all friends can post a picture of fruit under the picture, and then all friends who have added this circle of friends can praise the picture if they think that the picture is really some kind of fruit and no other friends have posted the fruit before.
Only when more than 90% of your friends like it, will this fruit picture be recognized. At the same time, the system will automatically give the mapping person a string of password, which is bitcoin.
At the same time, all friends will also get a password box corresponding to the password box. At the same time, everyone will remember that there is a bitcoin on someone.
If someone wants to trade the bitcoin, he should first leave a message and say who he wants to give the bitcoin to.
Then, send your own password to open the password boxes in everyone's hands. Only when all these password boxes are opened can you get the unanimous approval of all your friends.
So the system takes back the original password, and then generates a new password and gives it to the person who was given it. At the same time, it regenerates into a new corresponding safe and gives it to all friends.
Well, that's roughly the process.
So in fact, blockchain technology is not so big. To put it bluntly, it is just data packets connected together. As long as any high school student, even junior high school student and primary school student has the corresponding network programming knowledge and connects to the Internet, he can complete a new blockchain.