Binance Square
LIVE
芥子空间
@Square-Creator-0a7870528
为您建设一个安全的数字空间,管理您最重要的数据和数字资产。
Following
Followers
Liked
Shared
All Content
LIVE
--
See original
It is great to see Binance supporting the #Ordinals protocol. The potential of the Ordinals protocol has not yet been fully explored, and there is still a lot of room for development and opportunities. A new inscription protocol was discovered, Ordinals The first token of the protocol has just been deployed, please pay attention if you are interested.
It is great to see Binance supporting the #Ordinals protocol. The potential of the Ordinals protocol has not yet been fully explored, and there is still a lot of room for development and opportunities.
A new inscription protocol was discovered, Ordinals The first token of the protocol has just been deployed, please pay attention if you are interested.
See original
What functions can #BTC Ecosystem do, but #ETH。 cannot do? The narrative of the next bull market may be hidden here.
What functions can #BTC Ecosystem do, but #ETH。 cannot do? The narrative of the next bull market may be hidden here.
See original
The first generation blockchain project #BTC🔥🔥 , after five or six years of operation, the second generation blockchain project #eth was born. So here’s the problem, after so many years, there’s still no sign of the third generation. Will it still be bred from the Bitcoin ecosystem? #第三代区块链
The first generation blockchain project #BTC🔥🔥 , after five or six years of operation, the second generation blockchain project #eth was born. So here’s the problem, after so many years, there’s still no sign of the third generation. Will it still be bred from the Bitcoin ecosystem? #第三代区块链
See original
In the end, projects like #nostr will gain support from more people and form a community with strong vitality.
In the end, projects like #nostr will gain support from more people and form a community with strong vitality.
See original
Social data is very important personal privacy data and should not be made public on the chainTraditional social software, personal address books, chat records, and interaction data between friends are basically shared with service providers. There are also some software that focus on privacy. The well-known Whatsapp has more than 1 billion users. Although it also supports end-to-end encrypted chat between users, the address book and other data are shared with the service provider. Followed by Telegram, you can choose end-to-end encryption and address book encryption, but encryption is not enabled by default. These two most influential software are centralized service applications that are not open source. The code cannot be audited and the behavior cannot be controlled. It is difficult to predict any changes in terms of service in the future. Signal is another highly acclaimed secure messaging app. Although the number of users is not as high as that of WhatsApp and Telegram, it still has a considerable number of users. Signal is an open source application whose communications are end-to-end encrypted. Signal will not expose users' friend information or address book to service providers. But Signal is also a centralized service and faces an unknown future.

Social data is very important personal privacy data and should not be made public on the chain

Traditional social software, personal address books, chat records, and interaction data between friends are basically shared with service providers. There are also some software that focus on privacy. The well-known Whatsapp has more than 1 billion users. Although it also supports end-to-end encrypted chat between users, the address book and other data are shared with the service provider. Followed by Telegram, you can choose end-to-end encryption and address book encryption, but encryption is not enabled by default. These two most influential software are centralized service applications that are not open source. The code cannot be audited and the behavior cannot be controlled. It is difficult to predict any changes in terms of service in the future. Signal is another highly acclaimed secure messaging app. Although the number of users is not as high as that of WhatsApp and Telegram, it still has a considerable number of users. Signal is an open source application whose communications are end-to-end encrypted. Signal will not expose users' friend information or address book to service providers. But Signal is also a centralized service and faces an unknown future.
See original
Explain web3 accounts and account security from another perspectiveWhat is a web3 account? The usual explanation is a pair of randomly generated public and private keys in the cryptographic sense. The public key is displayed to the outside world and is used to represent the user. The private key is controlled by the user himself and is used to encrypt and sign data. Public and private keys are strictly paired. The public key is like a lock, and the private key is like a key. There is only one key for a lock. Whoever owns the private key is the owner of the web3 account. But for ordinary people, web3 accounts are too different from commonly used accounts. For example, mobile phone numbers, or user names for network services, or even ID numbers are all very different from the long list of addresses in web3. Because you cannot understand its principles, you will also have doubts about its security, which will ultimately affect the acceptance of web3, not to mention the need for users to manage their own accounts. Letting ordinary people understand the principles and security of web3 accounts may be one of the foundations for the large-scale application of web3. Cryptographic calculations involve large number operations, and the security of accounts comes from mathematical problems such as large number factorization and discrete logarithm problems. For example, the current mainstream web3 account and Ethereum wallet address have a private key length of 32 bytes, which is 2^256, which is approximately equal to 10^78. This is a large number, and the current global computing power cannot exhaust such a large private key space within a feasible time. Judging from the current computing power and technical level, the time required to find a specific private key through exhaustive search or brute force cracking is extremely huge and exceeds the scope of practical feasibility. The above is a technical explanation, which is relatively easy to understand for people who understand technology. But for people who don't understand technology, it's still not easy to understand, and it doesn't allow them to have a very perceptual understanding and fully trust the security of a pair of keys in their hands. We try to explain the security of web3 accounts from another more vivid perspective. The universe is infinite. The universe we observe is a spherical area about 90 billion light-years in diameter, but this is probably only a very small area of ​​the universe. According to scientists' estimates, the number of atoms in the observable universe is approximately between 10^80 and 10^85. We noticed that the value range of a web3 account is about 10^78, and the number of atoms in the universe may be 10^80. The difference between these two numbers is only 100 times, which is a number within the range that we can understand and imagine.Therefore, although we have no perception of how big 10^78 is, because we are in the universe, we can understand the vastness of the universe relatively perceptually, so we can have a similar perception of the web3 account. We can think of it this way, each web3 account is the number of an atom in the universe, but the location of this atom in the universe is determined by its private key. The security of web3 accounts comes from the fact that no one can determine the exact location of this atom in the universe based on a number. When we look up at the stars, admire the magnificence and mystery of the universe, and lament the vastness of the universe, we can also be sure that there is a small atom in it, which truly belongs to us, and others will never be able to find it.

Explain web3 accounts and account security from another perspective

What is a web3 account? The usual explanation is a pair of randomly generated public and private keys in the cryptographic sense. The public key is displayed to the outside world and is used to represent the user. The private key is controlled by the user himself and is used to encrypt and sign data. Public and private keys are strictly paired. The public key is like a lock, and the private key is like a key. There is only one key for a lock. Whoever owns the private key is the owner of the web3 account. But for ordinary people, web3 accounts are too different from commonly used accounts. For example, mobile phone numbers, or user names for network services, or even ID numbers are all very different from the long list of addresses in web3. Because you cannot understand its principles, you will also have doubts about its security, which will ultimately affect the acceptance of web3, not to mention the need for users to manage their own accounts. Letting ordinary people understand the principles and security of web3 accounts may be one of the foundations for the large-scale application of web3. Cryptographic calculations involve large number operations, and the security of accounts comes from mathematical problems such as large number factorization and discrete logarithm problems. For example, the current mainstream web3 account and Ethereum wallet address have a private key length of 32 bytes, which is 2^256, which is approximately equal to 10^78. This is a large number, and the current global computing power cannot exhaust such a large private key space within a feasible time. Judging from the current computing power and technical level, the time required to find a specific private key through exhaustive search or brute force cracking is extremely huge and exceeds the scope of practical feasibility. The above is a technical explanation, which is relatively easy to understand for people who understand technology. But for people who don't understand technology, it's still not easy to understand, and it doesn't allow them to have a very perceptual understanding and fully trust the security of a pair of keys in their hands. We try to explain the security of web3 accounts from another more vivid perspective. The universe is infinite. The universe we observe is a spherical area about 90 billion light-years in diameter, but this is probably only a very small area of ​​the universe. According to scientists' estimates, the number of atoms in the observable universe is approximately between 10^80 and 10^85. We noticed that the value range of a web3 account is about 10^78, and the number of atoms in the universe may be 10^80. The difference between these two numbers is only 100 times, which is a number within the range that we can understand and imagine.Therefore, although we have no perception of how big 10^78 is, because we are in the universe, we can understand the vastness of the universe relatively perceptually, so we can have a similar perception of the web3 account. We can think of it this way, each web3 account is the number of an atom in the universe, but the location of this atom in the universe is determined by its private key. The security of web3 accounts comes from the fact that no one can determine the exact location of this atom in the universe based on a number. When we look up at the stars, admire the magnificence and mystery of the universe, and lament the vastness of the universe, we can also be sure that there is a small atom in it, which truly belongs to us, and others will never be able to find it.
LIVE
--
Bearish
See original
The climax is over, leaving endless emptiness. #BTC $
The climax is over, leaving endless emptiness. #BTC $
See original
Ideal web3 account: unlimited connectivity and scalabilityIn the web3 network, the ideal state is that with a DID account, you can connect and enjoy all services, even all network services, including web2, so that users no longer have to worry about remembering account passwords, and there is no need to worry about personal security. Privacy data leakage problem. But the reality is skinny. Don’t say that web2 network is impossible, even web3 network, because there are different public chains and different networks, which means there are different account systems. Moreover, for certain purposes, individuals may create many different accounts for use in different environments. The direct result of this is that no matter what, users have a bunch of accounts to manage and a bunch of passwords to remember.

Ideal web3 account: unlimited connectivity and scalability

In the web3 network, the ideal state is that with a DID account, you can connect and enjoy all services, even all network services, including web2, so that users no longer have to worry about remembering account passwords, and there is no need to worry about personal security. Privacy data leakage problem. But the reality is skinny. Don’t say that web2 network is impossible, even web3 network, because there are different public chains and different networks, which means there are different account systems. Moreover, for certain purposes, individuals may create many different accounts for use in different environments. The direct result of this is that no matter what, users have a bunch of accounts to manage and a bunch of passwords to remember.
See original
Ideal web3 account: save and manage personal dataFor a web3 account, in addition to being able to manage its own digital assets, it must also have the ability to manage its own various data. Among applications that embody "users have full control over their personal data", cryptocurrency wallets (that is, digital wallets) are a typical example. Digital wallets securely store users’ public and private keys, allowing us to send, receive and manage our own digital assets. It uses advanced encryption technology to protect private keys and prevent unauthorized access. With a digital wallet, we have complete control over our funds and can access them at any time and anywhere as long as there is an internet connection. This kind of application that does not require other people's permission, will not be controlled by others, and is completely in one's own hands fully embodies the spirit of "users have complete control over personal data". After more than ten years of development, digital wallets have become more and more recognized and accepted by people, and have promoted the development of web3.

Ideal web3 account: save and manage personal data

For a web3 account, in addition to being able to manage its own digital assets, it must also have the ability to manage its own various data.

Among applications that embody "users have full control over their personal data", cryptocurrency wallets (that is, digital wallets) are a typical example. Digital wallets securely store users’ public and private keys, allowing us to send, receive and manage our own digital assets. It uses advanced encryption technology to protect private keys and prevent unauthorized access. With a digital wallet, we have complete control over our funds and can access them at any time and anywhere as long as there is an internet connection. This kind of application that does not require other people's permission, will not be controlled by others, and is completely in one's own hands fully embodies the spirit of "users have complete control over personal data". After more than ten years of development, digital wallets have become more and more recognized and accepted by people, and have promoted the development of web3.
See original
Ideal web3 accountWhat should a #理想的web3账户 look like? I asked this question to chatGPT3.5, and its answer is as follows: A perfect and ideal Web3 account should have the following characteristics: Decentralized control: The account should provide users with complete control over digital assets and personal data. It should not be restricted by any centralized control agency or intermediary, allowing individuals to independently manage their accounts. Privacy and security: Accounts should value privacy and security and adopt strong encryption and authentication mechanisms. It should protect users’ identities, transactions and sensitive information from unauthorized access or tampering. Interoperability: An ideal Web3 account should be compatible with various blockchain networks and protocols, enabling seamless interaction and interoperability between different platforms and decentralized applications (dApps). It should support transferring and managing assets on multiple chains. User-friendly experience: Accounts should provide a user-friendly interface and intuitive functionality that makes it easy for individuals of all technical backgrounds to use and operate the Web3 ecosystem. It should provide clear and simple ways to access and control digital assets, interact with dApps, and manage account settings. Portability: Accounts should be portable, allowing users to access and manage their assets from different devices and platforms. It should support multiple devices such as desktops, laptops, smartphones, and hardware wallets, ensuring users can switch seamlessly without worrying about loss of functionality or security. Governance and voting rights: The ideal Web3 account will give users governance and voting rights in the decentralized network. It should enable users to participate in decision-making processes such as protocol upgrades, community proposals, and consensus mechanisms. Integration with Web2: While Web3 aims to decentralize the internet, the ideal account should also integrate with Web2’s services and platform. It should allow users to interact with traditional centralized applications and services, bridging the gap between the old Internet and the new Internet paradigm. It is important to note that as technology continues to advance and new innovations emerge in the blockchain space, the concept of the perfect ideal Web3 account may change. This answer is already very comprehensive, but it answers this question more from a technical perspective. If we reorganize the above answers from the perspective of user usage and assume that there is an app that implements these features, we can see that this app must have the following capabilities: a #非托管的web3账户 management system that conforms to user habits. A non-managed account: Users manage their own accounts. Intuitive account management and recovery functions. Users have complete control. Used to store and manage users’: digital assets. Personal data helps users connect to other users. Point-to-point encrypted communication connects to other network services, no matter what. Is it a web2 or web3 service that is interoperable? Ultimately, it can give users#赋能和创造价值 value for their data: the digital intellectual property rights and assetization of works use AI technology to enhance or compensate for certain aspects of the user's abilities. From the current various wallets It seems that most of them only realize the management of digital assets, focus on the realization of financial services, and do not pay enough attention to account management and personal data management;In terms of interoperability, it only pays attention to cross-chain, and there is little progress in connection and interoperability with other web2 services. It's still far from an ideal web3 account. Of course, the discussion here is just one opinion, and there is no guarantee that this will be the case in the future. What web3 accounts will eventually develop into is completely determined by user expectations and technology development.

Ideal web3 account

What should a #理想的web3账户 look like? I asked this question to chatGPT3.5, and its answer is as follows: A perfect and ideal Web3 account should have the following characteristics: Decentralized control: The account should provide users with complete control over digital assets and personal data. It should not be restricted by any centralized control agency or intermediary, allowing individuals to independently manage their accounts. Privacy and security: Accounts should value privacy and security and adopt strong encryption and authentication mechanisms. It should protect users’ identities, transactions and sensitive information from unauthorized access or tampering. Interoperability: An ideal Web3 account should be compatible with various blockchain networks and protocols, enabling seamless interaction and interoperability between different platforms and decentralized applications (dApps). It should support transferring and managing assets on multiple chains. User-friendly experience: Accounts should provide a user-friendly interface and intuitive functionality that makes it easy for individuals of all technical backgrounds to use and operate the Web3 ecosystem. It should provide clear and simple ways to access and control digital assets, interact with dApps, and manage account settings. Portability: Accounts should be portable, allowing users to access and manage their assets from different devices and platforms. It should support multiple devices such as desktops, laptops, smartphones, and hardware wallets, ensuring users can switch seamlessly without worrying about loss of functionality or security. Governance and voting rights: The ideal Web3 account will give users governance and voting rights in the decentralized network. It should enable users to participate in decision-making processes such as protocol upgrades, community proposals, and consensus mechanisms. Integration with Web2: While Web3 aims to decentralize the internet, the ideal account should also integrate with Web2’s services and platform. It should allow users to interact with traditional centralized applications and services, bridging the gap between the old Internet and the new Internet paradigm. It is important to note that as technology continues to advance and new innovations emerge in the blockchain space, the concept of the perfect ideal Web3 account may change. This answer is already very comprehensive, but it answers this question more from a technical perspective. If we reorganize the above answers from the perspective of user usage and assume that there is an app that implements these features, we can see that this app must have the following capabilities: a #非托管的web3账户 management system that conforms to user habits. A non-managed account: Users manage their own accounts. Intuitive account management and recovery functions. Users have complete control. Used to store and manage users’: digital assets. Personal data helps users connect to other users. Point-to-point encrypted communication connects to other network services, no matter what. Is it a web2 or web3 service that is interoperable? Ultimately, it can give users#赋能和创造价值 value for their data: the digital intellectual property rights and assetization of works use AI technology to enhance or compensate for certain aspects of the user's abilities. From the current various wallets It seems that most of them only realize the management of digital assets, focus on the realization of financial services, and do not pay enough attention to account management and personal data management;In terms of interoperability, it only pays attention to cross-chain, and there is little progress in connection and interoperability with other web2 services. It's still far from an ideal web3 account. Of course, the discussion here is just one opinion, and there is no guarantee that this will be the case in the future. What web3 accounts will eventually develop into is completely determined by user expectations and technology development.
See original
See original
Account management is too difficult, which is an important reason why web3 cannot be widely used In terms of user experience, the biggest difference between a web3 application and a web2 application (referring to centralized services and applications) is account management. In web2 services, when we create an account, because we submit enough private information, the service provider can understand who we are in many aspects, so we don’t worry if we forget our password or even lose our account, because the service provider can help We retrieve the account number and password. But in web3, we need to take care of our accounts ourselves. If we lose the account, it is permanently lost, and the account will never be recovered, even if there are 10,000 Bitcoins stored in it. For a technical geek, managing his own web3 account is not a problem at all. He even keeps the entire private key in his mind without relying on any media. But for an ordinary person, whether it is memorizing private keys or backing up mnemonic words, it is a huge challenge. Any negligence will cause huge irreparable losses. How to provide ordinary users with an account management experience similar to web2 is the prerequisite for web3 applications to be widely used.

Account management is too difficult, which is an important reason why web3 cannot be widely used

In terms of user experience, the biggest difference between a web3 application and a web2 application (referring to centralized services and applications) is account management. In web2 services, when we create an account, because we submit enough private information, the service provider can understand who we are in many aspects, so we don’t worry if we forget our password or even lose our account, because the service provider can help We retrieve the account number and password. But in web3, we need to take care of our accounts ourselves. If we lose the account, it is permanently lost, and the account will never be recovered, even if there are 10,000 Bitcoins stored in it. For a technical geek, managing his own web3 account is not a problem at all. He even keeps the entire private key in his mind without relying on any media. But for an ordinary person, whether it is memorizing private keys or backing up mnemonic words, it is a huge challenge. Any negligence will cause huge irreparable losses. How to provide ordinary users with an account management experience similar to web2 is the prerequisite for web3 applications to be widely used.
See original
How to manage private keys A safe house in the digital world, what determines its control? Very simple, the key to the safe house. Whoever holds the key is the owner of the safe house. This key is the private key of an asymmetric key in cryptography. Private keys are our core in the digital world. Users declare their sovereignty in the digital world through signature and encryption. So it can be considered that the private key is our incarnation in the digital world, as important as our body in the physical world. We must do everything possible and work hard to ensure its safety. This is the core work of our project.

How to manage private keys

A safe house in the digital world, what determines its control? Very simple, the key to the safe house. Whoever holds the key is the owner of the safe house. This key is the private key of an asymmetric key in cryptography. Private keys are our core in the digital world. Users declare their sovereignty in the digital world through signature and encryption. So it can be considered that the private key is our incarnation in the digital world, as important as our body in the physical world. We must do everything possible and work hard to ensure its safety. This is the core work of our project.
See original
How important is it to have a private key? The private key is at the core of who we are in the digital world because it is our account, our avatar in the digital world, and represents us in interacting with the digital world. We can declare our sovereignty in the digital world through signatures and encryption. I have discovered or created a piece of beautiful data and want to make it public so that everyone can share my joy. Then I will sign the data to prove that I discovered or created it first, and then make the data public. No one can deny this result (this is the autonomous expression of intellectual property in the digital world). I don’t want to make this data public, so I’ll encrypt it so no one knows what the data is. These encrypted data are stored on a decentralized storage system such as ipfs, and smart contracts ensure the permanent storage of user data files. This way my data will never be lost. Through the two methods of encryption and signature, we established it at #数字世界中的安全屋 , because no one can forcibly break through the wall established by cryptography without my permission. With such a safe house that we have complete control over, we can store any of our precious things in it without being peeked by others, let alone having to worry about being stolen by others.

How important is it to have a private key?

The private key is at the core of who we are in the digital world because it is our account, our avatar in the digital world, and represents us in interacting with the digital world.

We can declare our sovereignty in the digital world through signatures and encryption. I have discovered or created a piece of beautiful data and want to make it public so that everyone can share my joy. Then I will sign the data to prove that I discovered or created it first, and then make the data public. No one can deny this result (this is the autonomous expression of intellectual property in the digital world). I don’t want to make this data public, so I’ll encrypt it so no one knows what the data is. These encrypted data are stored on a decentralized storage system such as ipfs, and smart contracts ensure the permanent storage of user data files. This way my data will never be lost. Through the two methods of encryption and signature, we established it at #数字世界中的安全屋 , because no one can forcibly break through the wall established by cryptography without my permission. With such a safe house that we have complete control over, we can store any of our precious things in it without being peeked by others, let alone having to worry about being stolen by others.
See original
Why do we create a product like Mustard Seed Space? Why do you want to do this project? One of the main reasons is that I lost a lot of digital currencies. The losses were heavy and the lessons were profound. There are two reasons for the loss. One is because of #钱包的助记词丢了 , which caused me to lose 80% of my digital assets; the other is a company I trust, #cex被黑了 (but I don’t know if it was really hacked or if it was done by an insider) , this CEX persisted for a while, but eventually closed down, which caused the other 15% of my digital assets to return to zero. These two things happened one after another, which brought my digital assets to almost zero.

Why do we create a product like Mustard Seed Space?

Why do you want to do this project? One of the main reasons is that I lost a lot of digital currencies. The losses were heavy and the lessons were profound. There are two reasons for the loss. One is because of #钱包的助记词丢了 , which caused me to lose 80% of my digital assets; the other is a company I trust, #cex被黑了 (but I don’t know if it was really hacked or if it was done by an insider) , this CEX persisted for a while, but eventually closed down, which caused the other 15% of my digital assets to return to zero. These two things happened one after another, which brought my digital assets to almost zero.
Translate
什么是芥子空间?数字世界中的私人安全屋。 在现代互联网环境下,我们可以享受互联网上的各种服务,但我们很难完全掌控我们的数据。这些数据包括我们的个人信息、社交媒体账户、电子邮件、搜索记录等。我们的数字足迹在互联网上无处不在,这些数字数据被收集、存储、分析和利用,以便用于广告、营销、情报收集等目的。我们在互联网上的行为和活动被监视和控制,隐私被侵犯,甚至是代表我们个人的账户,也可能因为各种原因被关闭。 同时,随着#数字资产 (如数字货币)的爆发性增长,每个人会拥有越来越多的数字资产。个人的数字资产可能因为各种安全漏洞、黑客攻击等原因而遭受损失。如果个人不重视数据安全,最终可能会面临经济上的重大损失。泄露个人数据不再是一些可有可无、甚至看不见的损失,而是可能导致个人财产损失的重大风险。 作为普通人,我们常常认为自己就像大海中的一滴水,完全融入了大海之中,大多数情况下,不会有人特意关注我们,即使有数据泄露,也不会对我们造成多大的影响。但现在,我们迎来了人工智能的突破性进展,使得个体的监控和搜索变得更加便捷和全面。在AI面前,我们每个人都赤裸裸的,不再有隐身于群体的可能。任何个体,都有可能被置于24小时全方位全

什么是芥子空间?数字世界中的私人安全屋。

在现代互联网环境下,我们可以享受互联网上的各种服务,但我们很难完全掌控我们的数据。这些数据包括我们的个人信息、社交媒体账户、电子邮件、搜索记录等。我们的数字足迹在互联网上无处不在,这些数字数据被收集、存储、分析和利用,以便用于广告、营销、情报收集等目的。我们在互联网上的行为和活动被监视和控制,隐私被侵犯,甚至是代表我们个人的账户,也可能因为各种原因被关闭。
同时,随着#数字资产 (如数字货币)的爆发性增长,每个人会拥有越来越多的数字资产。个人的数字资产可能因为各种安全漏洞、黑客攻击等原因而遭受损失。如果个人不重视数据安全,最终可能会面临经济上的重大损失。泄露个人数据不再是一些可有可无、甚至看不见的损失,而是可能导致个人财产损失的重大风险。
作为普通人,我们常常认为自己就像大海中的一滴水,完全融入了大海之中,大多数情况下,不会有人特意关注我们,即使有数据泄露,也不会对我们造成多大的影响。但现在,我们迎来了人工智能的突破性进展,使得个体的监控和搜索变得更加便捷和全面。在AI面前,我们每个人都赤裸裸的,不再有隐身于群体的可能。任何个体,都有可能被置于24小时全方位全
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number

Latest News

--
View More

Trending Articles

avatar
ICT bull
View More
Sitemap
Cookie Preferences
Platform T&Cs