Binance Square
LIVE
LIVE
CryptoInspired
--463 views
🟢Step 1: Hashing transactions 👉The first step of mining a block is to take pending transactions from the memory pool and submit them, one by one, through a hash function. Each time a piece of data is run through a hash function, an output of fixed size called a hash is generated. 👉In the context of mining, the hash of each transaction consists of a string of numbers and letters that acts as an identifier. The transaction hash represents all the information contained in that transaction. 🟢In addition to hashing and listing each transaction individually, the miner also adds a custom transaction, in which they send themselves the block reward. This transaction is called the coinbase transaction and is what creates brand new coins. In most cases, this transaction is the first to be recorded in a new block, followed by all the pending transactions awaiting validation. 🟢Step 2: Creating a Merkle tree 👉After each transaction is hashed, the hashes are organized into what is called a Merkle tree (also known as a hash tree). A Merkle tree is generated by organizing transaction hashes into pairs, then hashing them. 🟢The new hash outputs are then organized into pairs and hashed again, and the process is repeated until a single hash is created. This last hash is also called the root hash (or Merkle root) and is basically the hash that represents all the previous hashes used to generate it. 🟢Next topic 🔵Finding a valid block header (block hash)

🟢Step 1: Hashing transactions

👉The first step of mining a block is to take pending transactions from the memory pool and submit them, one by one, through a hash function. Each time a piece of data is run through a hash function, an output of fixed size called a hash is generated.

👉In the context of mining, the hash of each transaction consists of a string of numbers and letters that acts as an identifier. The transaction hash represents all the information contained in that transaction.

🟢In addition to hashing and listing each transaction individually, the miner also adds a custom transaction, in which they send themselves the block reward. This transaction is called the coinbase transaction and is what creates brand new coins. In most cases, this transaction is the first to be recorded in a new block, followed by all the pending transactions awaiting validation.

🟢Step 2: Creating a Merkle tree

👉After each transaction is hashed, the hashes are organized into what is called a Merkle tree (also known as a hash tree). A Merkle tree is generated by organizing transaction hashes into pairs, then hashing them.

🟢The new hash outputs are then organized into pairs and hashed again, and the process is repeated until a single hash is created. This last hash is also called the root hash (or Merkle root) and is basically the hash that represents all the previous hashes used to generate it.

🟢Next topic

🔵Finding a valid block header (block hash)

Жауапкершіліктен бас тарту туралы мәлімдеме: үшінші тараптардың пікірлері бар. Қаржылық кеңес емес. Шарттар мен талаптарды қараңыз.
0
Қатысты автор
LIVE
@CryptoInspired

Автордың басқа контентімен танысу

--
Educational Post What is crypto faucets? The earliest crypto faucet may be a bitcoin faucet created in 2010 by the then-lead developer of the Bitcoin network named Gavin Andresen. It gave 5 BTC for free to each user who completed a simple captcha. This bitcoin faucet eventually gave out 19,715 BTC in total, helping to distribute early BTC ownership widely. It was instrumental in educating the initial network of bitcoin users, leading to the cryptocurrency’s healthy growth later on.  Naturally, no crypto faucets would deliver such massive payouts today as bitcoin and other cryptocurrencies’ prices have increased significantly. But emerging crypto projects still need to attract new users, and there are many people out there who want to learn about crypto. Crypto faucets play a role in connecting the supply and demand. How do crypto faucets work?  Crypto faucets are generally made to be simple and user-friendly. Users usually need to register an account with the digital asset service first. There are also dedicated crypto faucet sites and apps that specialize in offering free crypto to users who complete simple tasks. In both cases, users should have their crypto wallets to receive the rewards and may sometimes be asked to verify their identity. Users are offered to complete tasks that can include watching videos, reading articles, watching ads, playing games, and taking quizzes or surveys. The service can also ask users to refer friends to it. These tasks are relatively straightforward, and most people would have no problem completing them. But, in some cases, the tasks can be rather time-consuming.#BTC #BinanceWish
--
Educational Post: What Are Decentralized Applications (DApps)? Decentralized applications (DApps) are smart contract-powered digital applications or programs that run on blockchains rather than centralized servers. They look and feel similar to regular mobile apps on your smartphone and offer a wide variety of services and functions from gaming to finance, social media, and much more. As the name suggests, DApps run on decentralized peer-to-peer networks. A smart contract works as a set of predefined rules enforced by computer code. When and if certain conditions are met, all network nodes will execute the tasks that the contract specifies. Once a smart contract is deployed on the blockchain, it is hard to change the code or destroy it. Therefore, even if the team behind the DApp has disbanded, users can still access the DApp. While the interfaces of DApps and traditional applications can look similar, DApps offer multiple benefits compared to their centralized counterparts. Web apps store data on centralized servers. A single compromised server may take down the entire network of the app, making it temporarily or permanently unusable. Centralized systems may also suffer from data leakages or theft, putting the companies and individual users at risk. DApps, in contrast, are built on distributed networks with no central authority. With no single point of failure, DApps are less vulnerable to attacks, making it very difficult for malicious actors to hijack the network. The P2P network can also ensure the DApp continues to work with minimal downtime, even if individual computers or parts of the network malfunction. The decentralized nature of DApps also means that users can have more control over the information they share. With no companies controlling users’ personal data, they don’t need to provide real-world identity to interact with a DApp. Instead, they can use a crypto wallet to connect to DApps and fully control what information they share.
--
📈How not to get caught by scammers? ⠀ 1️⃣ Personal messages When you fill out forms to get into Whitelist, or even just following the project, you join official Telegram and Discord groups (other social networks are also possible) and then suddenly you get a personal message that "you won" or "you were selected" or shortly before the token is put on the market, you may receive a message with a token contract. 100% it will be scammers. They monitor users who joined groups and start sending personal messages. 🟢Never follow links from private messages, don't reply to them and delete/block the chat immediately so as not to lose your funds. 🟢You can minimize the appearance of such messages through the security settings in the app: ●In Telegram, we recommend banning them from adding you to groups. ●Discord has a feature to prohibit private messages. Don't be afraid to close and delete private messages from unknown contacts, because administrators of the projects you follow will never write to you first. 2️⃣ Email Sometimes you may get a message about a prize or some other information from the project to your email. The first thing you should do is to check the sender of the message. In 99% of cases they will say through their official media that they send out a mail to the users and they will say which e-mail it should come from. Also we want to warn you against downloading any files from e-mails of unknown senders, even text ones, as it can cause installation of malware. 3️⃣ Fishing Phishing sites are quite common. These are copies of project sites, games or entire exchanges, by connecting to them or by signing a contract you can lose your funds. Don't be a "fish". ✅You may be wondering, how do you know the official channel of a project? ⚫️First, when publishing information on the channel, we always attach links to the site/channel or other official source. ⚫️Second, you may also find the links you need on aggregator sites like CoinMarketCap or CoinGecko (if the project is already launched, the token contract address is also available there).#BTC
--
How To Do Your Own Analysis? ⠀ Friends, we have a lot of newbies who are just starting out in cryptocurrency. So I decided to make a post about how to do your own analysis of projects. In other words - DYOR (Do Your Own Research). One post will not reveal in details all the aspects we need to take into account when analyzing. I plan to do a second post like this, but it will depend on what assets you show under this post. It's up to you. Below we break down the main metrics for DYOR. ✅Project website On the website, you will always be greeted with a brief squeeze of the project. Be sure to read the white paper to learn all the basic details: • What is the project? • What are its benefits? • What opportunities does the project offer? • The project roadmap. When analyzing the roadmap, pay attention to whether the project is on track. If it is lagging behind, it indicates some difficulty in implementation. ✅Funds Funds are analyzed to see who is acting as the guarantor of the project's success? 🟢It is important: • Which foundations have already supported the project? • What successful cases do these foundations have? • Will the funds be interested in further development of the project and its token? Having good funds "on board" increases the likelihood that the launch will be successful and the project will have a better chance of getting support from new investors in the future. A resource for fund analysts and where they invest is Chain Broker ✅Community and Social Media You need to gauge the excitement around the project and audience engagement/ 🟢Important: • How active the project's social networks are: Telegram, Twitter, Discord, Medium, GitHub, and so on. • How involved is the team in maintaining social networks? • Ambassador Program. Is it active or does it only have a name? When analyzing social networks, you need to assess not the number of subscribers, likes and reposts, but how active the audience is among themselves. You can write any question in the discord chat and see how quickly you get an answer.
--
Сайт картасы
Cookie Preferences
Платформаның шарттары мен талаптары