您可以在此處收聽或觀看此視頻:
從銀行業(yè)到區(qū)塊鏈的范式轉(zhuǎn)變
在過去的 600 年里,人們已經(jīng)習(xí)慣了讓值得信賴的第三方保管他們的資產(chǎn)。
銀行系統(tǒng)是受信任的第三方持有所有者財(cái)富的系統(tǒng),并且他們給予許可且有限的訪問權(quán)限。
然而,區(qū)塊鏈行業(yè)通過去中心化的原則扭轉(zhuǎn)了這一局面。
在區(qū)塊鏈行業(yè)中,所有者可以隨時(shí)直接訪問和控制自己的財(cái)富,而無需獲得許可。
在銀行業(yè),人們的財(cái)富是受信任的第三方的責(zé)任,而在區(qū)塊鏈行業(yè),人們的財(cái)富是完全擁有和控制的真正資產(chǎn)。
使用私鑰控制地址
在以太坊經(jīng)典(ETC)中,其工作方式是通過私鑰完全控制區(qū)塊鏈內(nèi)保存資產(chǎn)的地址。
私鑰就像 ETC 中財(cái)富所有者所持有的密碼,只有使用這些密碼才能轉(zhuǎn)移或交換資產(chǎn)。
通過將基于工作量證明的點(diǎn)對(duì)點(diǎn)區(qū)塊鏈網(wǎng)絡(luò)(如 ETC)整合到一個(gè)系統(tǒng)中,并讓用戶通過私鑰控制自己的資產(chǎn),受信任的第三方的影響力已顯著降低,并且成為簽署有效交易的唯一方法是通過使用僅由最終用戶持有的密鑰。
ETC 交易機(jī)制
然而,單獨(dú)持有私鑰并不是完整的安全模型。
交易簽名和發(fā)送到 ETC 網(wǎng)絡(luò)的方式涉及最終用戶端的應(yīng)用程序,他們?cè)谄渲兄付ń灰自敿?xì)信息;
例如資金去往地址以及要轉(zhuǎn)賬或兌換的金額;
然后使用私鑰簽署交易。
當(dāng)一筆交易被簽名并發(fā)送后,它需要到達(dá)ETC區(qū)塊鏈節(jié)點(diǎn),以便它可以重新傳輸?shù)秸麄€(gè)網(wǎng)絡(luò)進(jìn)行完全復(fù)制,并被礦工包含在一個(gè)區(qū)塊中。
一旦包含在被節(jié)點(diǎn)網(wǎng)絡(luò)驗(yàn)證并接受的區(qū)塊中,交易就會(huì)被執(zhí)行并最終確定。
ETC 查詢的機(jī)制
ETC 中的查詢以類似的方式工作,但不需要私鑰。
要查詢區(qū)塊鏈、檢查其余額以及有關(guān)其資產(chǎn)和交易的其他信息,用戶需要使用與上一節(jié)中相同類型的應(yīng)用程序。
When they open their apps to check their information on the ETC blockchain, the app consults with remote ETC nodes to retrieve the relevant data from the blockchain associated with their addresses.
The great majority of users in ETC send transactions and do their queries using third party nodes.
In a way, a blockchain is a kind of trusted third party, but the fact the the network is decentralized, and the data is replicated in all nodes globally, minimizes the influence of these trusted third parties to a sufficient degree that the security to users’ is very high.
However, even if one uses their own private keys and addresses, if the sending of transactions and querying of the blockchain is done through remote trusted third party nodes, then a significant part of the security to users is diminished.
This is because the dependency on third party nodes means that the nodes may not be accessible in certain circumstances, or that the nodes may be corrupted, so they could be processing transactions and queries fraudulently providing the wrong information to users or directing transactions and queries to alternative fraudulent chains.
For these reasons, for users such as people and businesses who value their holdings in ETC or with significant assets, the most secure setup is to actually run their own ETC nodes so they can be part of the blockchain directly.
This configuration ensures that transactions will always be sent to the right blockchain and that the queries will always be truthful.
In a way, seen from the traditional paradigm of banking, the combination of holding the private keys to the addresses and running their own nodes makes users full custodians of their own wealth and assets because they not only have exclusive ability to sign transactions but they also have personal and physical control of the information of the network.
To start running your own nodes and to connect your wallets to them so you can have your direct and complete access and custody of your ETC wealth, there are three options currently in the market:
The ETC Core Geth node: This is the core software client that is used by the great majority of node operators in ETC. It is the standard ETC community node that may be run on normal computers.
The ETCMC hardware node: This is a hardware ETC node that is part of a greater community with token compensation and various sources of revenues for participating in the system.
The DappNode hardware node: DappNode is a plain vanilla hardware node and may be used to run ETC mainnet nodes as well as the ETC Mordor testnet, and even clients of other blockchains.
Thank you for reading this article!
To learn more about ETC please go to: https://ethereumclassic.org