diff --git a/banner-1.png b/banner-1.png deleted file mode 100644 index 3638a3e3a6..0000000000 Binary files a/banner-1.png and /dev/null differ diff --git a/content/blog/2023-10-19-ethereum-classic-course-38-contracts-between-individuals-and-businesses-on-blockchains/banner-1.png b/content/blog/2023-10-19-ethereum-classic-course-38-contracts-between-individuals-and-businesses-on-blockchains/banner-1.png new file mode 100644 index 0000000000..7b9b39a6df Binary files /dev/null and b/content/blog/2023-10-19-ethereum-classic-course-38-contracts-between-individuals-and-businesses-on-blockchains/banner-1.png differ diff --git a/content/blog/2023-10-19-ethereum-classic-course-38-contracts-between-individuals-and-businesses-on-blockchains/index.md b/content/blog/2023-10-19-ethereum-classic-course-38-contracts-between-individuals-and-businesses-on-blockchains/index.md index c20bfd5fd8..8c1d983ef1 100644 --- a/content/blog/2023-10-19-ethereum-classic-course-38-contracts-between-individuals-and-businesses-on-blockchains/index.md +++ b/content/blog/2023-10-19-ethereum-classic-course-38-contracts-between-individuals-and-businesses-on-blockchains/index.md @@ -4,7 +4,7 @@ date: 2023-10-19 author: Donald McIntyre contributors: ["DonaldMcIntyre"] tags: ["education", "series"] -linkImage: ./banner.png +linkImage: ./banner-1.png --- --- diff --git a/content/blog/2023-10-19-ethereum-classic-course-38-contracts-between-individuals-and-businesses-on-blockchains/index.zh.md b/content/blog/2023-10-19-ethereum-classic-course-38-contracts-between-individuals-and-businesses-on-blockchains/index.zh.md index f78a7f6afc..bd8934e83f 100644 --- a/content/blog/2023-10-19-ethereum-classic-course-38-contracts-between-individuals-and-businesses-on-blockchains/index.zh.md +++ b/content/blog/2023-10-19-ethereum-classic-course-38-contracts-between-individuals-and-businesses-on-blockchains/index.zh.md @@ -4,7 +4,7 @@ date: 2023-10-19 author: Donald McIntyre contributors: ["DonaldMcIntyre"] tags: ["education", "series"] -linkImage: ./banner.png +linkImage: ./banner-1.png --- --- diff --git a/content/blog/2023-10-25-ethereum-classic-is-property-rights-on-a-global-scale/1.png b/content/blog/2023-10-25-ethereum-classic-is-property-rights-on-a-global-scale/1.png new file mode 100644 index 0000000000..0f05874183 Binary files /dev/null and b/content/blog/2023-10-25-ethereum-classic-is-property-rights-on-a-global-scale/1.png differ diff --git a/content/blog/2023-10-25-ethereum-classic-is-property-rights-on-a-global-scale/banner.png b/content/blog/2023-10-25-ethereum-classic-is-property-rights-on-a-global-scale/banner.png new file mode 100644 index 0000000000..befe622b94 Binary files /dev/null and b/content/blog/2023-10-25-ethereum-classic-is-property-rights-on-a-global-scale/banner.png differ diff --git a/content/blog/2023-10-25-ethereum-classic-is-property-rights-on-a-global-scale/index.md b/content/blog/2023-10-25-ethereum-classic-is-property-rights-on-a-global-scale/index.md new file mode 100644 index 0000000000..cce69ee59d --- /dev/null +++ b/content/blog/2023-10-25-ethereum-classic-is-property-rights-on-a-global-scale/index.md @@ -0,0 +1,103 @@ +--- +title: "Ethereum Classic Is Property Rights on a Global Scale" +date: 2023-10-25 +author: Donald McIntyre +contributors: ["Donald McIntyre"] +tags: ["education", "series"] +linkImage: ./banner.png +--- + +--- +**You can listen to or watch this interview here:** + + + +--- + +![](./banner.png) + +Because of its replicated ledger, the account system, and that it can host all sorts of assets, Ethereum Classic (ETC) is not only a cryptocurrency, but a technology that enables property titles and registries to exist inside its highly secure and neutral system. This enables property rights on a global scale that cross all borders. + +This is part four of a four part series that will explain what is Ethereum Classic from four angles. The titles of this series will be: + +1. Ethereum Classic Is a Proof of Work Cryptocurrency Blockchain + +2. Ethereum Classic Has a Supply Cap Like Bitcoin + +3. Ethereum Classic Is a Smart Contracts Cryptocurrency Blockchain + +4. Ethereum Classic Is Property Rights on a Global Scale + +## Property Rights as a Concept + +In nature there are no rights, much less property, only forceful control. An example may be when lions mark and defend their territory. + +Control of an object is the product of possession of such object and may be related to property, but it may also mean it is only possessed and controlled but not owned. + +Possession is to have the object in our domain. However, to possess an object does not mean to have property or control. For example I may have a car in my driveway, but I don’t have the keys and it may be there because it was stolen. + +Property is a creation of man through law. Property formalizes the concepts above of territory, control, possession, and domain. If we have an object in our domain, we have possession, we may have control, and we may have legal property to it. + +Ownership is the legal relationship between a person or firm with an object. + +All these things may be enabled by smart contracts on a blockchain such as Ethereum Classic. + +## How Are Property Registries Today? + +Once physical or informational objects are recognized as property they may be registered in books and ledgers that represent title and ownership of such objects. + +In the cases of registrable objects such as real estate, vehicles, intellectual property, patents, and others, their corresponding registry books and ledgers are usually kept and maintained by municipal, state, provincial, or national governments. + +Originally, they were physical books with special ledger designs that registered the names of the owners, the objects’ specific data, the previous owner, dates of purchase, etc. + +Now these same registries are usually held in computer systems as databases with the same information as their paper counterparts described above. + +## The ETC Account System as a Property Registry + +ETC may be a much more secure property registry technology as its ledger is fully replicated across many computers around the world, it is completely decentralized, and it is a proof of work blockchain, which makes it practically impossible to tamper with by man or nature. + +At its heart, ETC contains an account system, where each public address is only controlled by a private key, and this private key is only controlled by whoever possesses it. This base infrastructure makes ETC optimal to hold property registries when they become recognized legally in various parts of the world. + +Standards such as ERC-20 tokens and NFTs (ERC-721 tokens) further enhance ETC as a property system as they may be used to represent shares of firms, voting rights, and even physical objects in the real world. + +As Ethereum Classic is programmable, it enables all of the above, but it may also provide additional benefits such as markets where these objects may be traded, trusts and wills to manage the transfer of assets given specific conditions, and the ability to perform complex transactions, all with very fast settlements and very low risks. + +## Types of Property Possible on ETC + +![](./1.png) + +Given the attributes explained above, ETC may host several types of property that may be available seamlessly on a global scale. These property categories may include: + +**The ETC Coin:** The ETC coin itself is the first asset that is possessed, held, and controlled using the Ethereum Classic blockchain. It is also widely legally recognized as property, and this implies recognizing the underlying ledger as a property registry. + +**Fungible Tokens:** Fungible tokens enabled by ERC-20 smart contracts are another form of property in ETC that may be programmable with rules ranging from voting to financial rights. + +**Non-Fungible Tokens:** Non-fungible tokens enabled by ERC-721 smart contracts started as GIFs and JPEGs but their potential may expand to representing all kinds of property in digital and physical form. + +**Real Estate:** An example of real world assets that may be represented as NFTs and bought and sold inside ETC are real estate properties. Homes, apartments, land, and other real estate will likely be booked and traded in the system, and complex transactions and rules including mortgages and liens will be integrated seamlessly. + +**Movable Property:** Just as real estate, movable property such as cars, motorcycles, and trucks may be hosted on ETC as NFTs, and traded in markets as well a be managed with complex transactions involving loans, or renting, or leasing. + +**Firms:** Firms such as corporations, partnerships, and nonprofits may be represented inside ETC by means of ERC-20 tokens and decentralized organizations (DAOs). These DAOs may issue shares, have voting rights, and integrate all corporate governance and bylaws typical of traditional legal persons. + +**Securities:** As said above, company shares may exist inside ETC instead of traditional depository and clearing services. Also, the issuance and administration of debt securities may be possible as well as derivatives and futures contracts. + +**Trusts:** Trusts are possible in ETC by means of smart contacts. Grantors may establish programmable trusts and fund them with property on ETC to be managed by trustees who may provide their services and charge for them. + +## The Relationship of Law and Property on ETC + +It is important to differentiate between the law and the ETC blockchain. + +Ethereum Classic only enforces possession and control of objects, it is not a legal instrument in itself. Similar to the example given before, it is more or less like driving a car because you have the keys; that you have possession and control over it does not necessarily mean that you own it. + +Property and ownership are legal abstractions that are enforced outside of the blockchain. ETC is the physical aid where the property may be booked and enforced. + +Additionally, that transactions and transfers occur on the blockchain does not change that people will not have disputes about the ownership of things. Disputes will continue to be resolved through legal systems. + +However, it is very likely that Ethereum Classic will eventually be officially recognized as property registry technology in general, and all registrable assets and legal contracts governing these properties will exist in ETC. + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-10-25-ethereum-classic-is-property-rights-on-a-global-scale/index.zh.md b/content/blog/2023-10-25-ethereum-classic-is-property-rights-on-a-global-scale/index.zh.md new file mode 100644 index 0000000000..04903bc498 --- /dev/null +++ b/content/blog/2023-10-25-ethereum-classic-is-property-rights-on-a-global-scale/index.zh.md @@ -0,0 +1,97 @@ +--- +title: "以太坊经典是全球范围内的财产权" +date: 2023-10-25 +author: Donald McIntyre +contributors: ["Donald McIntyre"] +tags: ["education", "series"] +linkImage: ./banner.png +--- + +--- +**由此收听或观看此次访谈:** + + + +--- + +![](./banner.png) + +由于其复制的账本、账户系统以及它可以托管各种资产,以太坊经典(ETC)不仅仅是一种加密货币,而且是一种技术,可以使财产权和登记存在于其高度安全和中立的系统内。这使得跨越所有边界的全球范围内的财产权成为可能。 + +这是一个四部分系列的第四部分,将从四个角度解释以太坊经典是什么。本系列的标题将是: + +1. 以太坊经典是一种工作证明加密货币区块链 +2. 以太坊经典像比特币一样有供应上限 +3. 以太坊经典是一种智能合约加密货币区块链 +4. 以太坊经典是全球范围内的财产权 + +## 财产权的概念 + +在自然界中,没有权利,更不用说财产了,只有强制控制。一个例子可能是狮子标记并保卫他们的领土。 + +对物体的控制是拥有该物体并可能与财产相关,但也可能仅意味着拥有和控制,而不拥有。 + +拥有是将物体置于我们的支配范围内。然而,拥有物体并不意味着拥有财产或控制权。例如,我可以在车道上有一辆汽车,但我没有钥匙,它可能在那里是因为被盗。 + +财产是通过法律由人类创造的。财产形式化了上述领土、控制、拥有和支配的概念。如果我们在我们的领域内拥有一个物体,我们就拥有它,我们可能拥有控制权,我们可能对它拥有合法财产权。 + +所有这些都可以由以太坊经典等区块链上的智能合同启用。 + +## 当今的财产登记 + +一旦将物理或信息对象识别为财产,它们可以在代表这些对象的所有权和所有权的书籍和账本中进行注册。 + +对于可注册的物体,如房地产、车辆、知识产权、专利等,它们相应的登记簿和账本通常由市政、州政、省政或国家政府保管和维护。 + +最初,它们是具有特殊账本设计的实体书籍,记录了所有者的名称、对象的具体数据、前一位所有者、购买日期等信息。 + +现在,这些相同的登记簿通常保存在计算机系统中,作为与上述纸质副本相同信息的数据库。 + +## 以太坊经典的账户系统作为财产登记 + +以太坊经典可能是一种更安全的财产登记技术,因为它的账本完全复制在世界各地的许多计算机上,它完全分散化,而且是一种工作证明区块链,这使得它几乎不可能被人为或自然干扰。 + +在其核心,ETC包含一个账户系统,其中每个公共地址只能由私钥控制,而这个私钥只能由持有者控制。这个基础设施使ETC成为在世界各地的各个地方被合法承认后拥有财产登记的最佳选择。 + +像ERC-20代币和NFTs(ERC-721代币)这样的标准进一步增强了ETC作为财产系统的功能,因为它们可以用来代表公司股份、投票权,甚至现实世界中的物体。 + +由于以太坊经典是可编程的,它可以实现以上所有功能,但它还可以提供额外的好处,比如可以在其中交易这些物体的市场,可以用信托和遗嘱来管理在特定条件下的资产转移,以及可以执行复杂的交易,而且结算非常快速,风险非常低。 + +![](./1.png) + +鉴于上面解释的属性,ETC可能可以托管多种类型的财产,这些财产可以在全球范围内无缝获得。这些财产类别可能包括: + +**ETC代币:** ETC代币本身是使用以太坊经典区块链拥有、持有和控制的第一资产。它也被广泛法律承认为财产,这意味着承认底层账本作为财产登记。 + +**可替代代币:** 由ERC-20智能合同启用的可替代代币是ETC中的另一种财产形式,可以根据投票和金融权利等各种规则进行编程。 + +**不可替代代币:** 由ERC-721智能合同启用的不可替代代币最初是GIF和JPEG,但它们的潜力可能扩展到代表数字和实物形式的所有种类的财产。 + +**房地产:** 作为NFT代表并在ETC内购买和销售的现实世界资产的一个示例是房地产属性。房屋、公寓、土地和其他房地产可能会在系统中预订和交易,包括按揭和留置权在内的复杂交易和规则将无缝整合。 + +**动产:** 与房地产一样,动产,如汽车、摩托车和卡车,也可以作为NFT代币托管在ETC上,并在市场上交易,还可以通过涉及贷款、租赁或租赁的复杂交易进行管理。 + +**公司:** 公司,如公司、合伙企业和非营利组织,可以通过ERC-20代币和分散组织(DAOs)在ETC内部表示。这些DAO可以发行股份,拥有投票权,并集成所有传统法律主体通常具有的公司治理和章程。 + +**证券:** 如前所述,公司股份可以存在于ETC中,而不是传统的存管和结算服务。此外,债券的发行和管理也是可能的,以及衍生品和期货合同。 + +**信托:** 通过智能合同,ETC中可以实现信托。授予者可以建立可编程信托,并用ETC上的财产资助信托,由受托人管理,受托人可以提供其服务并为其收费。 + +## 法律与ETC上的财产的关系 + +重要的是要区分法律和ETC区块链之间的区别。 + +以太坊经典只强制执行对物体的拥有和控制,它本身不是法律工具。与前面给出的例子类似,这更或多是像因为你有钥匙而驾驶一辆汽车;你拥有和控制它不一定意味着你拥有它。 + +财产和所有权是在区块链之外强制执行的法律抽象。ETC是财产可能被预订和执行的物理辅助。 + +此外,交易和转让发生在区块链上并不会改变人们对物品所有权的争议。争议将继续通过法律体系解决。 + +然而,很可能以太坊经典最终会被正式承认为通用财产登记技术,所有可登记的资产和管理这些财产的法律合同都将存在于ETC中。 + + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC: https://ethereumclassic.org diff --git a/content/blog/2023-10-26-proof-of-work-is-good-for-humanity/1.png b/content/blog/2023-10-26-proof-of-work-is-good-for-humanity/1.png new file mode 100644 index 0000000000..70cf55b397 Binary files /dev/null and b/content/blog/2023-10-26-proof-of-work-is-good-for-humanity/1.png differ diff --git a/content/blog/2023-10-26-proof-of-work-is-good-for-humanity/banner.png b/content/blog/2023-10-26-proof-of-work-is-good-for-humanity/banner.png new file mode 100644 index 0000000000..a5d34a112e Binary files /dev/null and b/content/blog/2023-10-26-proof-of-work-is-good-for-humanity/banner.png differ diff --git a/content/blog/2023-10-26-proof-of-work-is-good-for-humanity/index.md b/content/blog/2023-10-26-proof-of-work-is-good-for-humanity/index.md new file mode 100644 index 0000000000..35b99206a4 --- /dev/null +++ b/content/blog/2023-10-26-proof-of-work-is-good-for-humanity/index.md @@ -0,0 +1,107 @@ +--- +title: "Proof of Work Is Good for Humanity" +date: 2023-10-26 +author: Donald McIntyre +contributors: ["Donald McIntyre"] +tags: ["philosophy"] +linkImage: ./banner.png +--- + +--- +**You can listen to or watch this interview here:** + + + +--- + +![](banner.png) + +Everybody talks about blockchains and crypto, but very few know about decentralization. + +The real invention of the blockchain industry is not “money” or “Bitcoin” or “blockchain”. + +The revolutionary invention is the proof of work (POW) based Nakamoto Consensus. + +Nakamoto Consensus uses the POW as a focal point for all the machines connected to the network to be on the same page every 10 minutes, in the case of Bitcoin (BTC), and every 13 seconds, in the case of Ethereum Classic (ETC). + +The fact that this focal point exists is the key to decentralization because every node in the system can join, exit, and join again whenever they wish, without the need of checking with anyone or anything else other than the information of the proof of work itself. + +This has enormous benefits for humanity. + +## What Does Proof of Work Do? + +But, before explaining the benefits of POW it is worth learning how it works. + +A POW blockchain such as ETC is constantly receiving new transactions. When any machine in the network receives a new transaction they immediately retransmit it to the rest of the network for full replication. This means that all computers in the system have a copy of each transaction. + +A subgroup of the machines in the network called miners get batches of these transaction and seal them with a cryptographic stamp called a hash. This hash is what consumes so much work and power to create, hence “proof of work”. + +When any of the miners creates the cryptographic hash first, it sends the new block of transactions, which includes the stamp, to the rest of the network for full replication. When the rest of the network verifies the transactions and the hash of the block, they add it as the last block in the chain and pay the miner a set number of coins for their work. + +## What Are the Advantages of Proof of Work? + +The method described above has several advantages that keep the network decentralized. Decentralization is important because it reduces the influence of trusted third parties who can tamper with the blockchain. + +The first advantage is that so much work was put into creating the block that, when the rest of the nodes in the network receive it, they know it is the correct one just by verifying the stamp. If imposters or attackers were sending them alternative blocks they would discard them because only blocks with the work done would be accepted. + +The second advantage is that when new nodes want to join the network, it is very easy to check which is the legitimate blockchain just by verifying all the work done in the chain of blocks since genesis. By doing this, any machine can actually join, leave, or join again without even consulting with any third party. This is the key to permissionlessness and censorship resistance! + +The other advantage of POW is that to create the coins, a lot of work has to be done. This is similar to how gold works in the real world, thus making the coins scarce. + +## Proof of Work Is Good for the Climate! + +POW mining is now the single most sustainably powered global industry in the world. Over 56% of the energy it uses comes from renewable sources. + +Because of the same reasons, carbon emissions in POW are trending lower. + +Additionally, as methane gas is 84 times more warming than CO2, and because POW mining is very mobile, and may be turned on and off due to market conditions, POW miners are using the methane that is stranded from oil wells to power their computers, thus transforming the methane into CO2 which actually makes it carbon negative! + +## Proof of Work Provides Power to Poor Areas + +As said above, because POW mining is very mobile, and may be turned on and off due to market conditions, it usually seeks cheap sources of energy that may be remote and stranded. + +This provides financing to these sources and makes them flourish in poor areas. + +For example, in Africa there are small hydropower generators popping up in remote regions, providing electricity for the first time in these areas, because POW miners use these sources first, providing the bulk of the demand, thus making them economically viable to distribute to other consumers locally. + +## Proof of Work Is Property Rights on a Global Scale + +Property and ownership are very weak across the world, even in advanced economies. However, the recognition of blockchains such as ETC as property registries would be revolutionary. + +The ETC coin itself is the first asset that is possessed, held, and controlled using the Ethereum Classic POW blockchain. It is also widely legally recognized as property, and this implies recognizing the underlying ledger as a property registry. + +The ETC account system, the ERC-20 and ERC-721 standards, combined with POW will enable property rights globally which will cross all borders seamlessly, improving property rights everywhere. + +Some of the registrable objects that could be managed on POW blockchains will include NFTs, fungile tokens, real estate, vehicles, corporations, nonprofits, securities, and trusts among many others. + +## Proof of Work Is Digital Gold + +![](./1.png) + +As said before, because the coins in POW blockchains are only created after miners have spent a lot of capital and electricity building the blocks, these cryptocurrencies are considered digital gold. + +The term “digital old” denotes the hardness of the money. This means that the currency is scarce and does not lose value as time passes by, but, to the contrary, it maintains or gains value. + +This is counterintuitive in today’s world of fiat currencies, which are all inflationary. But, the economic consequences and the relabalacing of wealth in the world would be significantly impacted if POW cryptocurrencies were adopted as global reserves. Which will likely happen. + +## Proof of Work Is Unprecedented Security In Computer Science + +The reason why cryptocurrencies as Bitcoin didn’t exist before was because network designs to that point in computer science had a fault tolerance of 1/3 of the participating nodes. This means that if 33% of the machines in the network were to attack the system, they could do it. + +As said at the beginning of this post, the brilliant invention of POW raised the fault tolerance threshold to 50% of nodes. Not only that, but because of its strong cryptography and energy wall of protection, the only thing that these attacks may do is to double spend coins, which is a narrow kind of attack and may be avoided by waiting more confirmations in these blockchains. + +## Proof of Work Is Good for Humanity + +So, POW is clean, it provides a focal point for all nodes in the network to join and leave whenever they wish without checking with third parties, it provides hard money, and it enables consensus among all machines to be on exactly the same state of the system globally every round. + +These features combined produce trust minimization, permissionlessness, and censorship resistance on blockchains making them the most secure computer networks known to man. + +The great benefits to the world of these things are that they are good for the climate, they provide electricity to the poor in remote regions of the world, good for property and other rights on a global scale, they provide hard money for people worldwide to save, and bring unprecedented security to computer systems in general. + +Proof of work is, indeed, good for humanity! + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-10-26-proof-of-work-is-good-for-humanity/index.zh.md b/content/blog/2023-10-26-proof-of-work-is-good-for-humanity/index.zh.md new file mode 100644 index 0000000000..d402b6ae5d --- /dev/null +++ b/content/blog/2023-10-26-proof-of-work-is-good-for-humanity/index.zh.md @@ -0,0 +1,105 @@ +--- +title: "工作量证明对人类发展有益" +date: 2023-10-26 +author: Donald McIntyre +contributors: ["Donald McIntyre"] +tags: ["philosophy"] +linkImage: ./banner.png +--- + +--- +**由此收听或观看本期访谈:** + + + +--- + +![](banner.png) + +每个人都在谈论区块链和加密货币,但很少有人了解分散化。 + +区块链行业真正的发明不是“货币”或“比特币”或“区块链”。 + +革命性的发明是基于工作证明(POW)的中本聪共识。 + +中本聪共识将POW作为所有连接到网络的机器的焦点,使它们每隔10分钟(比特币的情况)或每隔13秒(以太坊经典的情况)都保持在同一个页面上。存在这一焦点的事实是分散化的关键,因为系统中的每个节点都可以在任何时候自由加入、退出和再次加入,而无需与除了工作证明本身的信息之外的任何人或任何其他东西进行核实。 + +这对人类有巨大的好处。 + +## 工作证明的作用是什么? + +但在解释POW的好处之前,值得了解它是如何工作的。 + +POW区块链,如ETC,不断接收新的交易。当网络中的任何一台机器收到新交易时,它们会立即将其转发给网络中的其他机器以进行完全复制。这意味着系统中的所有计算机都有每个交易的副本。 + +网络中的一组机器,称为矿工,获取了这些交易的批次,并使用称为哈希的密码戳封存它们。这个哈希是消耗大量工作和电力来创建的,因此称为“工作证明”。 + +当矿工中的任何一台首先创建密码哈希时,它将新的交易块,其中包括该戳,发送到网络的其他部分进行全面复制。当网络的其他部分验证交易和块的哈希后,它们将其添加为链中的最后一个块,并为矿工的工作支付一定数量的硬币。 + +## 工作证明的优势是什么? + +上述描述的方法具有保持网络分散化的几个优势。分散化很重要,因为它减少了可以篡改区块链的受信任第三方的影响。 + +第一个优势是创建块时投入了大量工作,因此,当网络中的其他节点接收它时,它们通过验证戳就知道它是正确的。如果冒充者或攻击者向他们发送替代块,它们将丢弃它们,因为只有经过工作的块才会被接受。 + +第二个优势是,当新节点想要加入网络时,非常容易通过验证自从创世以来链上的所有工作来检查哪个是合法的区块链。通过这样做,任何机器都可以自由加入、离开或再次加入,甚至无需与任何第三方进行咨询。这是无需许可和抵制审查的关键! + +POW的另一个优势是,要创建硬币,必须完成大量的工作。这类似于黄金在现实世界中的运作方式,从而使硬币变得稀缺。 + +## 工作证明对气候有益! + +POW挖矿现在是全球可持续供电的最大产业。超过56%的能源来自可再生能源。 + +出于相同的原因,POW的碳排放正在逐渐降低。 + +此外,由于甲烷气体的温室效应是二氧化碳的84倍,而且由于POW挖矿非常便携,可以根据市场情况随时启动和关闭,POW矿工正在利用从油井中滞留的甲烷来为其计算机供电,从而将甲烷转化为二氧化碳,实际上使其成为碳负数! + +## 工作证明为贫困地区提供动力 + +如上所述,由于POW挖矿非常便携,可以根据市场情况随时启动和关闭,因此通常会寻找价格便宜的偏远和滞留的能源来源。 + +这为这些能源来源提供了资金,使它们在贫困地区蓬勃发展。 + +例如,在非洲,遥远地区正在出现小型水电发电机,为这些地区首次提供电力,因为POW矿工首先使用这些能源,提供了大部分需求,从而使它们在当地分发给其他消费者变得经济可行。 + +## 工作证明是全球范围内的财产权 + +财产和所有权在世界各地都非常薄弱,即使在发达经济体中也是如此。然而,承认ETC等区块链作为财产登记将是一场革命。 + +ETC代币本身是使用以太坊经典POW区块链拥有、持有和控制的第一资产。它也被广泛法律承认为财产,这意味着承认底 + +层账本作为财产登记。 + +ETC的账户系统、ERC-20和ERC-721标准,结合POW,将使全球范围内的财产权得以实现,无缝跨越所有边界,从而提高财产权。 + +一些可登记的对象包括NFT、可替代代币、房地产、车辆、公司、非营利组织、证券和信托等。 + +## 工作量证明是数字黄金 + +![](./1.png) + +正如前面所说,因为在POW区块链中,只有在矿工投入大量资本和电力来构建区块后,这些加密货币才会被创建,所以这些加密货币被认为是数字黄金。 + +术语“数字黄金”表示货币的硬度。这意味着货币是稀缺的,不会随着时间的推移贬值,相反,它会保持或增值。 + +这在今天的法定货币世界中是违背直觉的,因为所有的法定货币都是通货膨胀的。但是,如果POW加密货币被采用为全球储备,这将显著影响全球的经济后果和财富的重新平衡。这很可能会发生。 + +## 工作证明在计算机科学中具有前所未有的安全性 + +比特币等加密货币之前不存在的原因是因为计算机科学中的网络设计在容错能力上有着1/3的参与节点。这意味着如果网络中的33%的机器攻击系统,他们可以成功。 + +正如本文开头所说,POW的杰出发明将容错阈值提高到了50%的节点。不仅如此,由于其强大的密码学和能源保护墙,这些攻击可能做的唯一的事情就是双重花费硬币,这是一种狭义的攻击,可以通过在这些区块链上等待更多的确认来避免。 + +## 工作证明有益于人类 + +因此,POW是清洁的,它为网络中的所有节点提供了加入和离开的焦点,而无需与第三方进行核实。它提供了硬通货,并使所有机器在全球范围内每轮都保持完全相同的状态,从而实现了信任最小化、无需许可和抵制审查,使其成为人类已知的最安全的计算机网络。 + +这些事物对世界有巨大的好处,它们有益于气候,为世界偏远地区的贫困人口提供了电力,有益于全球范围内的财产和其他权利,为全球范围内的人们提供了坚实的货币以储蓄,并为计算机系统带来了前所未有的安全性。 + +工作证明确实有益于人类! + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC,欢迎访问: https://ethereumclassic.org diff --git a/content/blog/2023-10-31-ethereum-classic-makes-human-action-fluorish/1.png b/content/blog/2023-10-31-ethereum-classic-makes-human-action-fluorish/1.png new file mode 100644 index 0000000000..9788e9e4cf Binary files /dev/null and b/content/blog/2023-10-31-ethereum-classic-makes-human-action-fluorish/1.png differ diff --git a/content/blog/2023-10-31-ethereum-classic-makes-human-action-fluorish/banner.png b/content/blog/2023-10-31-ethereum-classic-makes-human-action-fluorish/banner.png new file mode 100644 index 0000000000..8068045c51 Binary files /dev/null and b/content/blog/2023-10-31-ethereum-classic-makes-human-action-fluorish/banner.png differ diff --git a/content/blog/2023-10-31-ethereum-classic-makes-human-action-fluorish/index.md b/content/blog/2023-10-31-ethereum-classic-makes-human-action-fluorish/index.md new file mode 100644 index 0000000000..e91b0238d9 --- /dev/null +++ b/content/blog/2023-10-31-ethereum-classic-makes-human-action-fluorish/index.md @@ -0,0 +1,105 @@ +--- +title: "Ethereum Classic Makes Human Action Flourish" +date: 2023-10-31 +author: Donald McIntyre +contributors: ["Donald McIntyre"] +tags: ["philosophy"] +linkImage: ./banner.png +--- + +--- +**You can listen to or watch this interview here:** + + + +--- + +![](./banner.png) + +## Purpose of Man + +From a biological perspective it may be argued that the purpose of man is to seek food, shelter, and to reproduce. + +From a Biblical perspective the mandate is very similar: “Be fruitful and multiply, and fill the earth”. + +Therefore, there should be little controversy in the opinion that people spend most of their lives seeking economic goods to satisfy their needs, and that these goods range from housing, to food, transportation, and clothing, etc. + +However, man has historically done these things in one of two ways: By means of violence (the primitive way) or by means of commerce (the modern way). + +## Incentives + +The choice between using violence or commerce is constantly weighed in people’s minds. Our minds are like advanced economic calculators that continuously measure our potential costs, potential rewards, and the probabilities of these things. + +When in environments that are underdeveloped, or in the jungle, the most likely method of choice to achieve our purpose will be violence. When there are no rules, and no coordinating institutions, then we will run more risks and incur in higher costs to ensure our survival and that of our descendants. + +When environments are more structured, developed, and effective, then our choices will usually be to comply with the system. + +By “effective” we mean that our basic goals are met. + +## Human Action + +![](./1.png) + +Societies and economies are about human action, not about things, and rules act like funnels that direct human action in more constructive social behavior. + +Rules model our incentives to change our primitive violent method, of breaking and killing things, to that of complying with the system. And, to comply has more rewards and less costs. + +“Constructive social behavior” means a human action that has incentives to conduct itself peacefully, such as through commerce, political institutions, justice systems, etc. + +One of the most useful tools to accomplish these things has been technology, and Ethereum Classic (ETC) is a new paradigm in this trend. + +## Property + +As we wrote in a [previous post](https://ethereumclassic.org/blog/2023-10-25-ethereum-classic-is-property-rights-on-a-global-scale), ETC is property rights on a global scale. + +Because property is fundamental for the survival of man; as it is not possible for humans to have shelter, food, and reproduce safely without the exclusive control and possession of things and space; then systems and technologies that protect property rights are essential for non-violent human action. + +However, historically, both the law and technological tools have always been somewhat biased and corrupted because they have depended on trusted third parties to run them. These agents have a history of abusing their positions of trust. + +Ethereum Classic is a global decentralized, permissionless, and censorship resistant network with very strong rules that guarantee property rights through its account systems and smart contracts. + +## Labour + +People may spend their time procuring and producing things for themselves and their families, or they can focus on working and making a specific good they may specialize at and exchange it for others. + +Labour is the human action that is dedicated to the activities necessary to produce these goods. + +When the environment is underdeveloped and hostile, then human action, manifested as labor, is directed to self preservation, thus directed at producing various goods for personal survival. + +When the environment has developed systems and technologies that enable commerce sustainably, then labor is directed at satisfying other people’s needs in exchange for their specialized products. + +ETC enables the interaction of individuals everywhere to do commerce through smart contracts, dapps and agreements, and its sound monetary system. + +## Capital and Consumption + +When man can satisfy his purpose because his incentives are channeled through developed systems and technologies; and therefore his human action is constructive, because his property is protected by the system and his labor rewarded; then the result of these things is capital formation. + +Capital are goods that are not used for consumption, but for creating other goods, which will ultimately be exchanged for consumer goods through commerce. + +People make choices between immediate consumption and capital investment (savings) constantly, and the more developed the system is, the more capital formation there will be in a society. Therefore, the more collective prosperity. + +ETC is a technology that fosters capital formation through its account system, which protects property, and smart contracts and dapps, which enable peaceful human action worldwide. And, the fruits of people’s labor may be saved in its cryptocurrency that guarantees long term value preservation through its fixed supply. + +## Markets + +We have mentioned the terms “commerce” and “exchange” several times in this post, but how do people conduct this commerce and exchange we speak of? + +For people to see others’ products, compare prices, and buy and sell them, they need a meeting point, whether physical or digital, have the information about the objects they wish to trade, and a set of ethical rules to conduct their transactions, and, ultimately, settle their deliveries and payments. + +These meeting points or places are what are called markets. Markets have existed for millenia in human societies and have been responsible for the gradual reduction in violence in human action and its replacement for peaceful commerce. + +Ethereum Classic is a platform that supports the creation of financial markets and markets for physical or digital objects through NFTs. These markets will range from tokens to securities markets, and from vehicle to real estate markets. + +## Civilization + +When man can direct more of his time to capital formation in a peaceful manner due to systems and technologies that protect his property, labor, and guarantee commerce, then the cost of capital in the economy tends to decrease. + +As the cost of capital decreases, there is more demand for it, which increases the supply of consumer goods, which reduces their prices, which creates more prosperity and capital formation in society. As Saifedean Ammous explained in [his book](https://saifedean.com/poe) “Principles of Economics” this may be referred to as the process of civilization. + +Civilization is peaceful human action that increases general prosperity. Technologies such as ETC, that enhance property rights, make labor and exchange more efficient and secure, and trust minimize all related processes, guaranteeing premissionlessness and censorship resistance, make positive human action flourish. + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-10-31-ethereum-classic-makes-human-action-fluorish/index.zh.md b/content/blog/2023-10-31-ethereum-classic-makes-human-action-fluorish/index.zh.md new file mode 100644 index 0000000000..e1dfa5b882 --- /dev/null +++ b/content/blog/2023-10-31-ethereum-classic-makes-human-action-fluorish/index.zh.md @@ -0,0 +1,105 @@ +--- +title: "以太坊经典促使人类行动蓬勃发展" +date: 2023-10-31 +author: Donald McIntyre +contributors: ["Donald McIntyre"] +tags: ["philosophy"] +linkImage: ./banner.png +--- + +--- +**由此收听此次访谈:** + + + +--- + +![](./banner.png) + +## 人的目的 + +从生物学的角度来看,可以认为人的目的是寻找食物、住所和繁衍后代。 + +从圣经的角度来看,任务非常相似:“生养众多,遍满大地”。 + +因此,人们花费大部分时间寻找经济物质以满足他们的需求,这些物质包括住房、食物、交通和衣物等。 + +然而,人类历史上以两种方式来实现这些目标:通过暴力(原始方式)或通过商业(现代方式)。 + +## 动机 + +在人们的思维中,不断权衡使用暴力还是商业的选择。我们的思维就像先进的经济计算器,不断衡量潜在成本、潜在回报以及这些事情的概率。 + +在不发达或丛林环境中,实现我们的目标最有可能的方法是暴力。当没有规则,没有协调机构时,为了确保我们自己和后代的生存,我们将承担更大的风险和更高的成本。 + +当环境更加有结构、发达和高效时,我们通常会选择与体系保持一致。 + +所谓“高效”是指我们的基本目标得以实现。 + +## 人的行动 + +![](./1.png) + +社会和经济关乎人的行动,而不是物品,规则起到引导人类行动走向更有建设性社会行为的作用。 + +规则塑造了我们改变原始暴力方式,即破坏和杀害物品,以遵守体系的激励。遵守体系的好处更多,成本更少。 + +“建设性社会行为”意味着具有和平进行的激励,如通过商业、政治机构、司法系统等。 + +实现这些事情的最有用工具之一是技术,以太坊经典(ETC)是这一趋势中的新范例。 + +## 财产 + +正如我们在[之前的帖子](https://ethereumclassic.org/blog/2023-10-25-ethereum-classic-is-property-rights-on-a-global-scale)中所写的,ETC是全球范围内的财产权。 + +因为财产对于人类的生存至关重要,人类无法在没有对物品和空间的独占控制和占有权的情况下安全地获得住所、食物和繁衍后代;因此,保护财产权的系统和技术对于非暴力人类行动至关重要。 + +然而,从历史上看,法律和技术工具始终有些偏见和腐化,因为它们一直依赖于可信赖的第三方来运行。这些代理人有滥用其信任地位的历史。 + +以太坊经典是一个全球分散、无需许可和抗审查的网络,通过其帐户系统和智能合约,它有很强的规则,保证财产权。 + +## 劳动 + +人们可以花时间为自己和家人采购和生产物品,也可以专注于工作,制作他们可能擅长的特定商品,并以其它物品交换。 + +劳动是致力于生产这些商品所必需的人的行动。 + +当环境不发达和充满敌意时,人的行动表现为劳动,用于自我保护,因此用于生产各种物品以维持个人生存。 + +当环境具有可持续进行商业的系统和技术时,劳动则致力于满足他人的需求,以交换他们的专业产品。 + +ETC通过其帐户系统、智能合约、分布式应用程序和其坚固的货币系统,使世界各地的个体能够通过智能合约、分布式应用程序和协议进行商业。 + +## 资本和消费 + +当人能够通过保护其财产、劳动和保证商业的系统和技术以和平的方式投入更多时间进行资本形成时,经济中的资本成本往往降低。 + +随着资本成本的降低,对资本的需求增加,这增加了消费品的供应,降低了其价格,从而创造了更多的繁荣和资本形成。正如Saifedean Ammous在[他的书中](https://saifedean.com/poe)所解释的那样,这可以被称为文明化过程。 + +文明化是增加普遍繁荣的和平人类行动。诸如ETC这样增强财产权、使劳动和交换更加高效和安全、最小化信任所有相关流程的技术,使积极人类行动蓬勃发展。 + +## 市场 + +在本文中,我们已经多次提到“商业”和“交换”这些术语,但人们是如何进行这种商业和交换的呢? + +要看到他人的产品、比较价格、购买和出售它们,人们需要一个会面的地方,无论是实际的还是数字的,拥有他们希望交易的物品的信息,以及一组用于进行交易的道 + +德规则,最终解决他们的交付和支付问题。 + +这些会面点或地点被称为市场。市场在人类社会中已经存在了几千年,它们为人类行动中暴力逐渐减少,被和平商业所取代,发挥了作用。 + +以太坊经典是一个支持金融市场和物理或数字物品市场的平台,通过NFT支持这些市场。这些市场将涵盖从代币到证券市场,从交通工具到房地产市场等各个领域。 + +## 文明 + +当人能够由于保护其财产、劳动和保证商业的系统和技术而以和平的方式投入更多时间进行资本形成时,经济中的资本成本往往降低。 + +随着资本成本的降低,对资本的需求增加,这增加了消费品的供应,降低了其价格,从而创造了更多的繁荣和资本形成。正如Saifedean Ammous在[他的书中](https://saifedean.com/poe)所解释的那样,这可以被称为文明化过程。 + +文明化是增加普遍繁荣的和平人类行动。诸如ETC这样增强财产权、使劳动和交换更加高效和安全、最小化信任所有相关流程,使积极人类行动蓬勃发展。 + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC,欢迎访问: https://ethereumclassic.org diff --git a/content/blog/2023-11-01-etc-spotlight-etc-network-info-with-mario-michel/1.png b/content/blog/2023-11-01-etc-spotlight-etc-network-info-with-mario-michel/1.png new file mode 100644 index 0000000000..6bffd82f1e Binary files /dev/null and b/content/blog/2023-11-01-etc-spotlight-etc-network-info-with-mario-michel/1.png differ diff --git a/content/blog/2023-11-01-etc-spotlight-etc-network-info-with-mario-michel/banner-2.png b/content/blog/2023-11-01-etc-spotlight-etc-network-info-with-mario-michel/banner-2.png new file mode 100644 index 0000000000..a4f7cfa486 Binary files /dev/null and b/content/blog/2023-11-01-etc-spotlight-etc-network-info-with-mario-michel/banner-2.png differ diff --git a/content/blog/2023-11-01-etc-spotlight-etc-network-info-with-mario-michel/banner.png b/content/blog/2023-11-01-etc-spotlight-etc-network-info-with-mario-michel/banner.png new file mode 100644 index 0000000000..6ed7db4de5 Binary files /dev/null and b/content/blog/2023-11-01-etc-spotlight-etc-network-info-with-mario-michel/banner.png differ diff --git a/content/blog/2023-11-01-etc-spotlight-etc-network-info-with-mario-michel/index.md b/content/blog/2023-11-01-etc-spotlight-etc-network-info-with-mario-michel/index.md new file mode 100644 index 0000000000..1f16d081a7 --- /dev/null +++ b/content/blog/2023-11-01-etc-spotlight-etc-network-info-with-mario-michel/index.md @@ -0,0 +1,37 @@ +--- +title: "ETC Ecosystem Spotlight: ETC-Network.Info With Mario Michel" +date: 2023-11-01 +author: Donald McIntyre +contributors: ["Donald McIntyre"] +tags: ["guide"] +linkImage: ./banner-2.png +--- + +--- +**You can listen to or watch this interview here:** + + + +--- + +![](./1.png) + +In this ETC Spotlight we interviewed Mario Michel, founder of [ETC-Network.Info](https://etc-network.info/) about all the services he provides for the Ethereum Classic network. + +We spoke about the following topics: + +- Why Mario created these services +- Mario's background +- The different Explorers ETC-Network.Info provides +- Show all RPCs and WebSockets (ETC endpoints) +- Present the ETC statistics dashboard +- The Remix IDE +- The new service, Whale Watch +- A not yet public released version of the Fork Monitor +- The other services provided: Nodes, markets, upgrades page, and ETC status + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-11-01-etc-spotlight-etc-network-info-with-mario-michel/index.zh.md b/content/blog/2023-11-01-etc-spotlight-etc-network-info-with-mario-michel/index.zh.md new file mode 100644 index 0000000000..fb53117b9e --- /dev/null +++ b/content/blog/2023-11-01-etc-spotlight-etc-network-info-with-mario-michel/index.zh.md @@ -0,0 +1,37 @@ +--- +title: "ETC 生态系统聚焦:Mario Michel 的 ETC-Network.Info" +date: 2023-11-01 +author: Donald McIntyre +contributors: ["Donald McIntyre"] +tags: ["guide"] +linkImage: ./banner-2.png +--- + +--- +**由此收听或观看本次访谈:** + + + +--- + +![](./1.png) + +在这期ETC焦点采访中,我们采访了[ETC-Network.Info](https://etc-network.info/)的创始人Mario Michel,了解他为以太坊经典网络提供的各种服务。 + +我们谈到了以下主题: + +- Mario为什么创建了这些服务 +- Mario的背景 +- ETC-Network.Info提供的不同区块浏览器 +- 展示所有RPC和WebSockets(ETC端点) +- 展示ETC统计仪表板 +- Remix集成开发环境 +- 新服务Whale Watch +- 未公开发布的Fork Monitor的新版本 +- 提供的其他服务:节点、市场、升级页面和ETC状态 + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC,欢迎访问: https://ethereumclassic.org diff --git a/content/blog/2023-11-02-etc-proof-of-work-course-introduction/1.png b/content/blog/2023-11-02-etc-proof-of-work-course-introduction/1.png new file mode 100644 index 0000000000..5312155fd1 Binary files /dev/null and b/content/blog/2023-11-02-etc-proof-of-work-course-introduction/1.png differ diff --git a/content/blog/2023-11-02-etc-proof-of-work-course-introduction/banner-3.png b/content/blog/2023-11-02-etc-proof-of-work-course-introduction/banner-3.png new file mode 100644 index 0000000000..50f9cc5436 Binary files /dev/null and b/content/blog/2023-11-02-etc-proof-of-work-course-introduction/banner-3.png differ diff --git a/content/blog/2023-11-02-etc-proof-of-work-course-introduction/banner.png b/content/blog/2023-11-02-etc-proof-of-work-course-introduction/banner.png new file mode 100644 index 0000000000..48b259dadf Binary files /dev/null and b/content/blog/2023-11-02-etc-proof-of-work-course-introduction/banner.png differ diff --git a/content/blog/2023-11-02-etc-proof-of-work-course-introduction/index.md b/content/blog/2023-11-02-etc-proof-of-work-course-introduction/index.md new file mode 100644 index 0000000000..81ab8d5935 --- /dev/null +++ b/content/blog/2023-11-02-etc-proof-of-work-course-introduction/index.md @@ -0,0 +1,98 @@ +--- +title: "ETC Proof of Work Course: Introduction" +date: 2023-11-02 +author: Donald McIntyre +contributors: ["Donald McIntyre"] +tags: ["series", "education"] +linkImage: ./banner-3.png +--- + +--- +**You can listen to or watch this interview here:** + + + +--- + +As we explained in the “Ethereum Classic Course” introduction, Ethereum Classic (ETC) is one of the most valuable blockchains in the world because it is the largest proof of work smart contracts blockchain and the most secure system to host and operate decentralized applications (dapps). + +At the core of its value proposition is the technology of Proof of Work (POW). POW provides true decentralization, sound money, and the most trust minimized dapps. + +![](./1.png) + +In this course, that we named the “ETC Proof of Work Course”, we will explain why POW is so revolutionary and how ETC benefits from it. + +This course is divided in 8 sections that we list below. Each of sections 2 through 8 start with a post that describes the advantages of POW to ETC. + +## Part 1: Describing POW + +1. All the Components of Bitcoin Already Existed +2. What Didn’t Exist Was a Secure Consensus Mechanism +3. How Does Proof of Work Work? +4. Why POW Based Nakamoto Consensus Is Secure and Complete +5. The POW Mining Difficulty Adjustment Explained + +## Part 2: Benefits of POW + +6. ETC Is BTC Philosophy With ETH Technology +7. The Revolutionary Benefits of Proof of Work? +8. POW Promotes Basic Rights +9. The Meaning of Immutability in POW +10. The POW Permissionless Paradox + +## Part 3: Positioning of POW + +11. A Model for Ethereum Classic and Ethereum Complementation +12. How Ethereum Proved that the POW Fee Model Will Work +13. There Will Only Be 3 or 4 POW Blockchains in the Future +14. POW Winners Compared to Global Reserve Currencies +15. POW Will Be the Base Layer of the Blockchain Industry + +## Part 4: Security of POW + +16. The Three Pillars of Ethereum Classic +17. POW Has Division of Power, POS Does Not +18. POW Blockchains Will Always Be Under Constant Social Attack +19. POW Is Digital Gold, POS Is Community Fiat Money + +## Part 5: POS Fallacies and POW Ungovernance + +20. Integrating Bit Gold in Ethereum Classic +21. If It's Not Proof of Work, Then It's Not a Blockchain +22. Why POS Is Less Secure Than POW +23. POW Security Model and Ungovernance Explained +24. Proof of Work Is Not Voting + +## Part 6: POW Philosophy + +25. The Innovation of ETC Is Unstoppability +26. POS Social Consensus vs POW Code Is Law +27. What Does “Security” Mean in POW Blockchains? +28. POW Is Censorship Resistant, PoS Is Not +29. POW Is a Commodity, PoS Is a Security + +## Part 7: Explaining the Value of POW + +30. Why Does ETC Have Value? +31. POW’s Focus on Trust Minimization +32. The Enormous Value of POW During Banking Crises +33. The Meaning of Finality in POW + +## Part 8: Debunking the POW Naysayers + +34. Mining ETC +35. POW Must Be Attackable to be Secure +36. POW Is Not What Makes a Blockchain Unscalable +37. POW Is Not Inefficient nor Wastes Energy + +As seen above, the 8 sections of the ETC Proof of Work Course promise to cover all important aspects of the technology and, when you put all the parts together, how it represents a powerful change in paradigm in computer science and for the world. + +Following this introduction, we will publish 37 text articles and their corresponding videos developing all the topics laid out here. + +We hope you find this course as valuable as the Ethereum Classic Course! + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-11-02-etc-proof-of-work-course-introduction/index.zh.md b/content/blog/2023-11-02-etc-proof-of-work-course-introduction/index.zh.md new file mode 100644 index 0000000000..698708b5f7 --- /dev/null +++ b/content/blog/2023-11-02-etc-proof-of-work-course-introduction/index.zh.md @@ -0,0 +1,96 @@ +--- +title: "ETC工作量证明课程:介绍" +date: 2023-11-02 +author: Donald McIntyre +contributors: ["Donald McIntyre"] +tags: ["series", "education"] +linkImage: ./banner-3.png +--- + +--- +**您可以由此收听此次访谈:** + + + +--- + +正如我们在“以太坊经典课程”的介绍中所解释的,以太坊经典(ETC)是世界上最有价值的区块链之一,因为它是最大的工作量证明智能合约区块链,也是托管和运行分布式应用程序(dapps)最安全的系统。 + +其价值主张的核心是工作量证明(POW)技术。POW提供了真正的去中心化、可靠的货币和最小信任的dapps。 + +![](./1.png) + +在这门课程中,我们称之为“ETC工作量证明课程”,我们将解释为什么POW如此革命性,以及ETC如何从中受益。 + +这门课程分为8个部分,我们以下面列出的每个部分2到8开始,其中有一篇文章描述POW对ETC的优势。 + +## 第一部分:描述POW + +1. 比特币的所有组成部分已经存在 +2. 不存在的是安全的共识机制 +3. POW是如何工作的? +4. 为什么基于POW的中本聪共识是安全和完整的? +5. 解释POW挖矿难度调整 + +## 第二部分:POW的好处 + +6. ETC是比特币哲学与以太坊技术 +7. POW的革命性好处? +8. POW促进基本权利 +9. POW中不可变性的含义 +10. POW的无权限悖论 + +## 第三部分:POW的定位 + +11. 以太坊经典和以太坊相辅相成的模型 +12. 以太坊如何证明POW费用模型将奏效 +13. 未来只会有3或4个POW区块链 +14. POW胜者与全球储备货币的比较 +15. POW将成为区块链行业的基础层 + +## 第四部分:POW的安全性 + +16. 以太坊经典的三大支柱 +17. POW有权力的分割,而POS没有 +18. POW区块链将一直面临持续的社会攻击 +19. POW是数字黄金,POS是社区法定货币 + +## 第五部分:POS的谬误和POW的无治理 + +20. 在以太坊经典中集成比特黄金 +21. 如果不是工作量证明,那就不是区块链 +22. 为什么POS不如POW安全 +23. 解释POW安全模型和无治理 +24. 工作量证明不是投票 + +## 第六部分:POW哲学 + +25. 以太坊经典的创新是不可阻挡的 +26. POS社会共识与POW法典是法律 +27. 在POW区块链中,“安全”是什么意思? +28. POW具有抵抗审查制度,而POS没有 +29. POW是一种商品,POS是一种证券 + +## 第七部分:解释POW的价值 + +30. 为什么ETC有价值? +31. POW关注信任的最小化 +32. 在银行危机期间POW的巨大价值 +33. POW中最终性的含义 + +## 第八部分:驳斥POW的反对者 + +34. 挖掘ETC +35. POW必须可攻击才能安全 +36. POW不是使区块链不可扩展的原因 +37. POW既不低效也不浪费能源 + +如上所述,ETC工作量证明课程的8个部分承诺覆盖技术的所有重要方面,当您将所有部分综合考虑在一起时,它代表了计算机科学和世界的一种强大的范式变革。 + +在此介绍之后,我们将发布37篇文字文章和相应的视频,详细讨论此处列出的所有主题。希望您会像以太坊经典课程一样觉得这门课程具有价值! + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC,欢迎访问: https://ethereumclassic.org diff --git a/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/1.png b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/1.png new file mode 100644 index 0000000000..cb43052ef0 Binary files /dev/null and b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/1.png differ diff --git a/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/10.png b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/10.png new file mode 100644 index 0000000000..c1f305b508 Binary files /dev/null and b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/10.png differ diff --git a/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/2.JPG b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/2.JPG new file mode 100644 index 0000000000..9e32085125 Binary files /dev/null and b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/2.JPG differ diff --git a/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/3.JPG b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/3.JPG new file mode 100644 index 0000000000..35a584728b Binary files /dev/null and b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/3.JPG differ diff --git a/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/4.png b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/4.png new file mode 100644 index 0000000000..3dd6565cbb Binary files /dev/null and b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/4.png differ diff --git a/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/5.png b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/5.png new file mode 100644 index 0000000000..e54b72e177 Binary files /dev/null and b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/5.png differ diff --git a/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/6.png b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/6.png new file mode 100644 index 0000000000..0b8ea5c904 Binary files /dev/null and b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/6.png differ diff --git a/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/7.png b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/7.png new file mode 100644 index 0000000000..adb4f42417 Binary files /dev/null and b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/7.png differ diff --git a/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/8.png b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/8.png new file mode 100644 index 0000000000..eff09432f2 Binary files /dev/null and b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/8.png differ diff --git a/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/9.png b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/9.png new file mode 100644 index 0000000000..5052c267fa Binary files /dev/null and b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/9.png differ diff --git a/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/banner-1.png b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/banner-1.png new file mode 100644 index 0000000000..47a54af4cd Binary files /dev/null and b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/banner-1.png differ diff --git a/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/banner.png b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/banner.png new file mode 100644 index 0000000000..997b6a76e7 Binary files /dev/null and b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/banner.png differ diff --git a/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/index.md b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/index.md new file mode 100644 index 0000000000..15f79462c7 --- /dev/null +++ b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/index.md @@ -0,0 +1,191 @@ +--- +title: "Mining Ethereum Classic With the Jasminer X16-Q High Throughput Quiet Server" +date: 2023-11-07 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["guide"] +linkImage: ./banner-1.png +--- + +--- +**You can listen to or watch this video here:** + + + +--- + +![](./banner.png) + +As a proof of work blockchain, mining is an important function in Ethereum Classic (ETC). + +The miners’ job is to constantly gather transactions, group them into batches, and to do a lot of work, spending a lot of electricity, to create a cryptographic stamp to seal the blocks. + +Then, they send the blocks to the rest of the network, which verifies the transactions and the cryptographic stamps, and pays the miners with newly created ETC coins. + +This process is vital to the permissionlessness and censorship resistance of ETC as the proofs of work themselves are the focal points that keep the network decentralized on a global scale. + +In this post we will explain how to contribute, and make money, mining ETC using the Jasminer X16-Q High Throughput Quiet Server. + +## 1. Buying the Jasminer X16-Q + +![](./1.png) + +The first step is to buy the Jasminer X16-Q. We found three possible places: the Jasminer manufacturer, Amazon, and Miner Bros. + +In the Jasminer website it may say it is “out of stock”, but management told us at the POW Summit that they have units available. + +Links to where you may purchase the Jasminer X16-Q are: + +- Jasminer.com: https://www.jasminer.com/#/productDetail/908ad3781bff473ba9155276caa84456 + +- Amazon: https://www.amazon.com/Jasminer-Ethereum-throughput-Compatible-100V-240V/dp/B0CJBJJXC + +- Miner Bros: https://www.cryptominerbros.com/product/jasminer-x16-q-ethereum-classic-miner + +We have no agreements nor perceive any revenues, fees, or commissions from any brands mentioned in this post. + +## 2. Jasminer X16-Q Unboxing + +![](./2.JPG) + +When you receive your Jasminer X16-Q, you will get it with a server power cord, an ethernet cable, and an antenna if you wish to use WiFi to connect it. + +In our case, we will connect it through our local WiFi router using the ethernet cable. + +We also need a power step up transformer because in our location in Oklahoma, USA we have 110 volt electricity, but the Jasminer uses a 200 to 240 volt input. + +As seen in the image, we have our Jasminer ASIC, the ethernet cable, the power cord, our transformer (with its power cord), and our internet router aligned for connection and setup. + +## 3. Jasminer X16-Q Connection + +![](./3.JPG) + +The next step to start mining ETC with your Jasminer X16-Q is to connect all the parts and to turn it on. + +As seen in the image, you have to connect 3 things: + +1. The Jasminer ASIC to the transformer if you are using one (if not, then connect it directly to the wall). + +2. The transformer to the power outlet on the wall. + +3. The Jasminer ASIC to your router using the ethernet cable. + +Once you have all the parts connected turn on the power button on the back of the Jasminer. + +## 4. Experience How Quiet the Jasminer X16-Q Is! + +One thing that is true to its brand promise is that when you connect and start running your Jasminer, it is incredibly quiet! + +In the short video in this section we demonstrate how quiet the ASIC is: + + + +## 5. Finding and Logging in to the Jasminer X16-Q User Interface + +![](./4.png) + +When you have all the parts connected and running, then you need to go to your PC and log in to the user interface of your Jasminer X16-Q. + +To be able to do this your Jasminer and your PC must be connected to the same router. + +The IP address to login to the Jasminer UI is: + +https://192.168.0.142 + +The default ID and password are: + +**ID:** root + +**Password:** root + +When you log in, then you must change your password in the “Settings” tab. + +## 6. Getting the Mining Pool Configuration Information + +![](./5.png) + +Once you have your Jasminer all setup and ready to mine, then you need to go to your mining pool to get the configuration information to point your Jasminer X16-Q to it. + +In our case we will use F2Pool, the largest mining pool in the ETC ecosystem, to configure and point our Jasminer. + +The link to find the configuration data is: + +https://f2pool.io/mining/guides/how-to-mine-ethereum-classic/ + +From there you will see, copy, and enter the following data points into your Jasminer: + +**Pool URL:** stratum+tcp://etc.f2pool.com:8118 + +**User/Worker:** accountName.workerName + +**Password:** Your choice + +In the following section we explain how to do this. + +## 7. Configuring the Jasminer X16-Q With the Mining Pool Data + +![](./6.png) + +To configure your miner to point to your mining pool, go to the the “Settings” tab again, and then click the “Miner” link. + +In the next screen you will see forms with fields to enter the data for several pools. This is for backup in case one pool is down, so your miner can jump to the other. + +As F2pool gave us only one ETC pool URL to use, we will add it to the “Pool 1” section. + +Copy and paste the pool URL in the corresponding field. Then, the worker name must be your user ID on F2pool, followed by a dot, and then followed by a number or name you may give to your miner. + +In our case we used our F2pool user name and the number “28” as the name of our Jasminer: + +**donald1968.28** + +The password may be whatever you wish, we used “123”. + +To save your data press “SUBMIT” at the bottom of the page. + +## 8. Checking the Mining Statistics on the Jasminer X16-Q + +![](./7.png) + +Once you press “SUBMIT” in the previous step, then you are mining ETC! + +To check the statistics of your Jasminer on its UI, you will need to wait for a few minutes until the dashboard populates. + +As seen on the image in this section, we have been mining ETC for more than 50 minutes, so the Jasminer dashboard has all the statistics for that period. + +The main chart shows the hashrate on a minute by minute basis. It has consistently been around 1900 MH/s which is the capacity of this machine. + +Other data that it shows are the time mined, fan speeds, and the network data. + +## 9. Checking Mining Statistics on Your Mining Pool + +Once you have your miner set up and working with the local statistics confirmed, then you can go to your mining pool statistics page to see how your Jasminer is doing from the mining pool’s perspective. + +On your account, you must select “ETC” as the network you want to explore, and then go to the “Workers” link to see your Jasminer statistics. + +![](./8.png) + +In the next screen you will see the hash rate of your worker, and below a section with your worker name and its statistics. + +![](./9.png) + +If you scroll down, you will see a chart with the aggregate hash rate as time passes by. + +## 10. Congratulations! + +So, now that you have your Jasminer X16-Q High Throughput Quiet Server all set up and working we congratulate you for becoming an ETC miner! + +![](./10.png) + +If you go to your F2pool account to the “Revenue” section, you will see your accumulated rewards in ETC, with tools to manage your money. + +Happy mining! + +--- + +**Thank you for reading this article!** + +To learn more about Jasminer please go to: https://jasminer.com + +To learn more about F2pool please go to: https://www.f2pool.com/ + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/index.zh.md b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/index.zh.md new file mode 100644 index 0000000000..068165e158 --- /dev/null +++ b/content/blog/2023-11-07-mining-ethereum-classic-with-the-jasminer-x16-q-high-throughput-quiet-miner/index.zh.md @@ -0,0 +1,190 @@ +--- +title: "使用茉莉矿机Jasminer X16-Q高通量静音服务器挖掘以太经典" +date: 2023-11-07 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["guide"] +linkImage: ./banner-1.png +--- + +--- +**由此收听本期视频:** + + + +--- + +![](./banner.png) + +作为工作证明区块链,挖矿是以太经典(ETC)中的一个重要功能。 + +矿工的工作是不断收集交易,将它们分组成批次,并进行大量工作,消耗大量电力,以创建用于封存区块的加密印记。 + +然后,他们将区块发送给网络的其余部分,网络验证交易和加密印记,然后用新创建的ETC代币支付矿工。 + +这个过程对于ETC的无许可性和抗审查性至关重要,因为工作证明本身是保持全球范围内网络去中心化的关键点。 + +在本文中,我们将解释如何通过使用Jasminer X16-Q高通量静音服务器来参与挖矿,赚取ETC代币。 + +## 1. 购买Jasminer X16-Q + +![](./1.png) + +第一步是购买Jasminer X16-Q。我们找到了三个可能的购买地点:Jasminer制造商、亚马逊和矿工兄弟。 + +在Jasminer网站上,可能会显示“缺货”,但管理层在POW峰会上告诉我们他们有现货可供购买。 + +您可以在以下链接购买Jasminer X16-Q: + +- Jasminer.com:https://www.jasminer.com/#/productDetail/908ad3781bff473ba9155276caa84456 + +- 亚马逊:https://www.amazon.com/Jasminer-Ethereum-throughput-Compatible-100V-240V/dp/B0CJBJJXC + +- 矿工兄弟:https://www.cryptominerbros.com/product/jasminer-x16-q-ethereum-classic-miner + +我们对在本文中提到的任何品牌都没有协议,也不收取任何收入、费用或佣金。 + +## 2. Jasminer X16-Q拆箱 + +![](./2.JPG) + +当您收到Jasminer X16-Q时,您将获得一个服务器电源线、一个以太网电缆,以及一个天线(如果您希望使用WiFi进行连接)。 + +在我们的情况下,我们将使用以太网电缆通过本地WiFi路由器连接它。 + +此外,我们需要一个电源升压变压器,因为在美国俄克拉荷马州的我们所在地,电压为110伏特,但Jasminer使用的是200至240伏特的输入电压。 + +正如图像所示,我们有我们的Jasminer ASIC、以太网电缆、电源线、变压器(带电源线)以及用于连接和设置的互联网路由器。 + +## 3. Jasminer X16-Q链接 + +![](./3.JPG) + +以下是使用Jasminer X16-Q开始挖掘ETC的下一步,连接所有部件并打开它。 + +如图所示,您需要连接以下3个部分: + +1. 如果您使用变压器,将Jasminer ASIC连接到变压器(如果不使用变压器,则直接连接到墙上)。 + +2. 将变压器连接到墙上的电源插座。 + +3. 使用以太网电缆将Jasminer ASIC连接到您的路由器。 + +一旦您连接好所有部件,请打开Jasminer背面的电源按钮。 + +## 4. 感受Jasminer X16-Q的静音程度 + +品牌的承诺之一是,当您连接并开始运行Jasminer时,它非常安静! + +在本节的短视频中,我们展示了ASIC有多安静: + + +## 5. 查找并登录到Jasminer X16-Q用户界面 + +![](./4.png) + +当您已连接并运行所有部件后,您需要前往您的电脑并登录到Jasminer X16-Q的用户界面。 + +为了能够这样做,您的Jasminer和电脑必须连接到同一个路由器。 + +登录到Jasminer UI的IP地址是: + +https://192.168.0.142 + +默认的ID和密码为: + +**ID:** root + +**密码:** root + +登录后,您必须在“设置”选项卡中更改您的密码。 + +## 6. 获取矿池配置信息 + +![](./5.png) + +## 一旦您已经设置好Jasminer,并准备开始挖矿,您需要前往您的矿池以获取配置信息,以将您的Jasminer X16-Q指向该矿池。 + +在我们的情况下,我们将使用F2Pool,ETC生态系统中最大的矿池,来配置和指向我们的Jasminer。 + +找到配置数据的链接是: + +https://f2pool.io/mining/guides/how-to-mine-ethereum-classic/ + +从那里,您将看到、复制并输入以下数据点到您的Jasminer: + +**矿池URL:** stratum+tcp://etc.f2pool.com:8118 + +**用户/矿工:** 帐户名.矿工名 + +**密码:** 您的选择 + +在接下来的部分,我们将解释如何操作。 + +## 7. 使用矿池数据配置Jasminer X16-Q + +![](./6.png) + +要将您的矿工指向矿池,请再次前往“设置”选项卡,然后单击“矿工”链接。 + +在下一个屏幕上,您将看到表格,其中有多个矿池的数据输入字段。这是为了备份,以防一个矿池宕机,这样您的矿工可以切换到另一个矿池。 + +由于F2pool只提供了一个ETC矿池URL供使用,我们将其添加到“矿池1”部分。 + +复制并粘贴矿池URL到相应的字段中。然后,矿工名称必须是您在F2pool上的用户ID,后面跟着一个点,然后是您为您的矿工指定的编号或名称。 + +在我们的情况下,我们使用了我们的F2pool用户名和“28”作为我们Jasminer的名称: + +**donald1968.28** + +密码可以是您希望的任何内容,我们使用了“123”。 + +要保存您的数据,请按页面底部的“提交”按钮。 + +## 8. 在Jasminer X16-Q上检查挖矿统计数据 + +![](./7.png) + +一旦您在前一步中按下“提交”,那么您就开始挖ETC了! + +要在Jasminer的用户界面上查看您的矿工的统计信息,您需要等待几分钟,直到仪表板填充数据。 + +如本部分的图像所示,我们已经挖矿超过50分钟,因此Jasminer的仪表板具有该时段的所有统计数据。 + +主要图表显示了每分钟的算力。它一直保持在大约1900 MH/s,这是这台机器的容量。 + +其他显示的数据包括挖矿时间、风扇速度和网络数据。 + +## 9. 在您的矿池上检查挖矿统计数据 + +一旦您的矿工设置好并经过本地统计数据的确认,您可以前往您的矿池统计页面,从矿池的角度查看您的Jasminer的情况。 + +在您的帐户中,您必须选择“ETC”作为您要查看的网络,然后前往“矿工”链接以查看您的Jasminer的统计信息。 + +![](./8.png) + +在下一个屏幕上,您将看到您的矿工的算力,以及下方有您的矿工名称和其统计信息的部分。 + +![](./9.png) + +如果您向下滚动,您将看到一个随着时间推移的总算力图表。 + +## 10. 祝贺! + +所以,现在您已经准备好并运行您的Jasminer X16-Q高通量静音服务器,我们恭喜您成为了一个ETC矿工! + +![](./10.png) + +如果您前往F2pool帐户的“收益”部分,您将看到您在ETC中累积的奖励,以及用于管理您的资金的工具。 + +愿您挖矿愉快! + +--- + +**感谢您阅读本期文章!** + +了解更多有关茉莉矿机: https://jasminer.com + +了解更多有关F2pool: https://www.f2pool.com/ + +了解更多有关ETC: https://ethereumclassic.org diff --git a/content/blog/2023-11-08-proof-of-stake-is-broken-because-of-its-incentives/banner-4.png b/content/blog/2023-11-08-proof-of-stake-is-broken-because-of-its-incentives/banner-4.png new file mode 100644 index 0000000000..4a7b7ff633 Binary files /dev/null and b/content/blog/2023-11-08-proof-of-stake-is-broken-because-of-its-incentives/banner-4.png differ diff --git a/content/blog/2023-11-08-proof-of-stake-is-broken-because-of-its-incentives/banner.png b/content/blog/2023-11-08-proof-of-stake-is-broken-because-of-its-incentives/banner.png new file mode 100644 index 0000000000..0524908180 Binary files /dev/null and b/content/blog/2023-11-08-proof-of-stake-is-broken-because-of-its-incentives/banner.png differ diff --git a/content/blog/2023-11-08-proof-of-stake-is-broken-because-of-its-incentives/index.md b/content/blog/2023-11-08-proof-of-stake-is-broken-because-of-its-incentives/index.md new file mode 100644 index 0000000000..07e0de7adb --- /dev/null +++ b/content/blog/2023-11-08-proof-of-stake-is-broken-because-of-its-incentives/index.md @@ -0,0 +1,109 @@ +--- +title: "Proof of Stake Is Broken Because of its Incentives" +date: 2023-11-08 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["philosophy"] +linkImage: ./banner-4.png +--- + +--- +**You can listen to or watch this video here:** + + + +--- + +![](./banner-4.png) + +We have produced many articles and videos explaining the benefits of proof of work (POW) and why it is a truly decentralized technology. + +It is worth noting that Bitcoin (BTC) and Ethereum Classic (ETC) have been working with a 99% plus uptime since 2009 and 2015 respectively in a totally decentralized way. + +However, in proof of stake (POS) the same cannot be said. Since Ethereum migrated to that consensus mechanism, it has [been censored](https://www.coindesk.com/tech/2022/10/14/censored-ethereum-blocks-hit-the-51-threshold-over-the-past-24-hours) and has had problems with [staking pool centralization](https://www.coindesk.com/consensus-magazine/2023/09/29/opposing-centralization-in-ethereum-staking). + +In this post we will explain the main design flaws of POS and why it it is broken, in other words, centralized. + +## No Economic Friction + +In any industry there is always a tendency for concentration. What level of concentration usually depends on frictional costs that impede economic scale of single players. + +For example, in the legal industry there are hundreds of thousands of law firms because humans are not scalable. Individual lawyers only have a set number of hours to work and that is the number they can sell. Therefore, to increase supply, more lawyers are needed, increasing the number of law firms. + +On the other hand, in banking there are usually three or four banks that dominate the industry with huge market shares because that business is largely powered by technology, which reduces friction, and the larger the banks get the more secure and appealing they are to the public. + +Proof of stake has a similar concentration pattern as in banking, but its frictional costs are even lower. + +In POS, stakers worldwide have their deposits inside a single network, and having money in a staking pool or not is trivial cost wise. People can stake any amount in staking pools such as Lido, Coinbase, or RocketPool, and immediately get a liquid token that represents the ETH they staked. + +This increased efficiency, and the fact that the larger the staking pools are they appear more secure and appealing, has created mega staking pools like Lido, that regularly control more than 33% of staked coins, crossing the fault tolerance threshold in POS chains, meaning that they can disrupt the operation of the system. + +The above means that anyone anywhere in the world can stake, staking is frictionless, they can stake in any pool they wish, but they all wish to stake in the big and secure ones, and, therefore, the bias to centralization is accentuated. + +In proof of work, there are economies of scale as well, but because there are much higher frictional costs, then mining has always been concentrated but nevertheless decentralized. + +POW demands that miners sink capital into machines, then they have to spend enormous amounts of electricity in creating blocks, and only then they perceive a return in coins. + +Additionally, the distribution of electricity sources is dispersed all around the world, making it difficult to centralize operations. + +On top of this all, the fault tolerance threshold in POW networks is 51% making it even more difficult to reach a disrupting share in those systems. + +## Staking Penalties Induce Bad behavior + +Proof of work has a positive incentive system of participation: If a miner produces a block that conforms to the rules, then it is accepted and rewarded, if it does not conform, then it is rejected and nothing else happens. + +Proof of stake has a negative incentive system: If stakers produce blocks that conform to the rules, then they are rewarded, but if they don’t, or even have unstable behavior like being offline, then they get penalized. + +The penalization system in proof of stake creates perverse incentives that we explain below. + +### It Leads to Staking Pool Centralization + +Because there are several types of penalties in POS, and to avoid them largely depends on that validators must be working persistently and with nor errors, then the public prefers to delegate the technical operation of this type of data infrastructure to more sophisticated players. + +This means that there are millions of ETH staked, but most of them are in the largest staking pools such as Lido, Coinbase, RocketPool, Binance, and Kraken. + +In POW mining, miners may have failures in their operations, interruption due to unstable flows of electricity, down internet connection, or they may even be banned like in the case of China in 2021, but they won’t suffer any penalties, and they can regroup and start mining again whenever they wish. + +### It Leads to Litigation + +In such a complex set of rules as in POS, with arbitrary definitions of "bad behavior" and subsequent high penalties, this opens the door for legal interpretations of what is "good" or "bad" similar to traditional legal systems. + +A such, this leads POS to be a litigious system where disgruntled stakers, validators, and pools may start lawsuits against developers, the Ethereum Foundation, and early investors to recover past penalties. + +A system with rewards, performance clauses, and monetary penalties is more suitable for a traditional kind of contract rather than "Code Is Law" systems as blockchains should be. + +Additionally, there is the possibility that the designers have not thought of all the “good” and “bad” behavior scenarios, as they have clearly failed for the economic behaviors, and this may create unforeseen legal conflicts. + +### It Induces the Stockholm Syndrome + +This has not been detected in POS yet, but we pose the following rhetorical question: + +In such a strict, complex set of rules as proof of stake, where validators need to be part of the majority 2/3s of the system in order not to get penalized, wouldn't many of them start to validate epochs (groups of blocks) and voting for individual blocks regardless of validity, out of fear of the penalty rather than because the transactions and blocks are true and verified? + +This is something that could already be happening now, and the system clearly induces validators to just go with the flow as sheep do even if they may be going in the wrong direction. + +## The Rich Get Richer (And Control Everything) + +Finally, there is an economic effect that proof of stake has that has been made worse by EIP-1559 and is particularly perverse in Ethereum. + +EIP-1559 is a set of rules introduced in the network that has no use other than creating a convoluted burning mechanism so that ETH coin supply would plateau and then start decreasing. Basically it burns more or less half of the fees each time a transaction is executed. The other half is earned by the miners. + +This in itself is a gimmick just to make individual coins more valuable, which is ethically dubious. + +But it is perverse in a broader economic and social way as it introduces the [Cantillon effect](https://en.wikipedia.org/wiki/Richard_Cantillon) in Ethereum, which is that the rich get richer and the poor get poorer. + +We explain this system bias mechanism as follows: + +1. Stakers (read "rich people" and "staking elites") have their surplus and savings parked in staking pools and earn a constant income, increasing their nominal amounts with the rewards and their wealth overtime as the coins gain value due to the reduction in supply. + +2. The general economy, composed of people who save very little or live paycheck to paycheck, use the currency for daily expenses but every time they transact, a fraction is burned. + +At a macro level, this scheme produces a transfer of wealth from the poor to the rich. The stock used by the poor is diminishing as the stock used by the rich is increasing. + +Another effect is that the large coin holders will eventually be very few and will have even more control over the system than what they already have in the present. + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-11-08-proof-of-stake-is-broken-because-of-its-incentives/index.zh.md b/content/blog/2023-11-08-proof-of-stake-is-broken-because-of-its-incentives/index.zh.md new file mode 100644 index 0000000000..7600f2ee16 --- /dev/null +++ b/content/blog/2023-11-08-proof-of-stake-is-broken-because-of-its-incentives/index.zh.md @@ -0,0 +1,111 @@ +--- +title: "权益证明因其激励机制而失效" +date: 2023-11-08 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["philosophy"] +linkImage: ./banner-4.png +--- + +--- +**由此收听本期访谈:** + + + +--- + +![](./banner-4.png) + +我们已经制作了许多文章和视频,解释了工作证明(POW)的好处,以及为什么它是一种真正去中心化的技术。 + +值得注意的是,比特币(BTC)和以太坊经典(ETC)自2009年和2015年以来一直以99%以上的正常运行时间在完全去中心化的方式下运行。 + +然而,在权益证明(POS)方面,情况并非如此。自以太坊迁移到这种共识机制以来,它已经[受到审查](https://www.coindesk.com/tech/2022/10/14/censored-ethereum-blocks-hit-the-51-threshold-over-the-past-24-hours),并且存在[权益池集中问题](https://www.coindesk.com/consensus-magazine/2023/09/29/opposing-centralization-in-ethereum-staking)。 + +在这篇文章中,我们将解释POS的主要设计缺陷以及为什么它已经破裂,换句话说,变得中心化。 + +## 没有经济摩擦 + +在任何行业中,总会存在一种集中趋势。集中程度通常取决于妨碍单个参与者经济规模的摩擦成本。 + +例如,在法律行业,有数以千计的律所,因为人类不具备可扩展性。个体律师只有固定数量的工作小时,这就是他们可以出售的数量。因此,为了增加供应,需要更多的律师,从而增加了律所的数量。 + +另一方面,在银行业通常有三家或四家主导业界的银行,因为这个业务主要由技术驱动,减少了摩擦,而且银行规模越大,对公众越安全和吸引人。 + +权益证明具有与银行业类似的集中模式,但其摩擦成本更低。 + +在POS中,全球的权益持有者将其存款放在一个网络中,而将资金放入权益池或不放入在成本方面都不重要。人们可以将任何数量的资金放入权益池,如Lido、Coinbase或RocketPool,立刻获得代表其权益的ETH的流动代币。 + +这种提高的效率以及权益池规模越大,看起来越安全和吸引人,已经创造了像Lido这样的超大权益池,经常控制超过33%的权益币,超越了POS链的容错阈值,这意味着他们可以干扰系统的运行。 + +上述情况意味着世界各地的任何人都可以进行权益投票,权益投票是无摩擦的,他们可以选择在任何池中进行权益投票,但他们都愿意在大型和安全的池中进行权益投票,因此,中心化的偏见被加重。 + +在工作证明中,也存在规模经济,但由于摩擦成本更高,因此采矿一直是集中的但仍然是去中心化的。 + +POW要求矿工将资本投入机器,然后在创建区块时花费大量电力,然后才能获得硬币回报。 + +此外,电力来源的分散分布在世界各地,使中心化运营变得更加困难。 + +此外,POW网络中的容错阈值为51%,这使得更难达到这些系统的干扰份额。 + +## 权益惩罚引发不良行为 + +工作证明具有积极的参与激励系统:如果矿工产生符合规则的区块,那么它会被接受并获得奖励,如果不符合规则,则会被拒绝,不会发生其他事情。 + +权益证明具有负激励系统:如果权益持有者产生符合规则的区块,他们会得到奖励,但如果不符合规则,或者甚至有不稳定的行为,比如离线,那么他们将受到惩罚。 + +权益证明中的惩罚系统创造了我们下面解释的恶劣激励。 + +### 它导致了权益池的集中 + +因为POS中存在各种类型的惩罚,而避免这些惩罚在很大程度上取决于验证者必须持续工作,没有错误,所以公众更愿意将这种数据基础设施的技术运营委托给更有经验的参与者。 + +这意味着有数百万ETH被抵押,但其中大部分都在像Lido、Coinbase、RocketPool、Binance和Kraken这样的最大权益池中。 + +在POW挖矿中,矿工可能会在运营中出现故障,电力不稳定流、互联网连接中断,甚至可能被像2021年中国那样禁止,但他们不会受到任何惩罚,他们可以随时重新组织并开始挖矿。 + +### 它导致了诉讼 + +在POS中存在如此复杂的规则,存在 + +对“恶劣行为”的武断定义以及随后的高额惩罚,这打开了解释何为“好”或“坏”的法律解释的大门,类似于传统的法律体系。 + +因此,POS成为一个容易引发诉讼的系统,不满的权益持有者、验证者和权益池可能会起诉开发者、以太坊基金会和早期投资者以恢复以前的惩罚。 + +一个具有奖励、绩效条款和经济处罚的系统更适合于传统的合同,而不适合于区块链应该是“法律即代码”的系统。 + +此外,设计者可能尚未考虑到所有的“好”和“坏”行为情景,正如他们明显在经济行为方面失败一样,这可能会导致意想不到的法律冲突。 + +### 它诱发了斯德哥尔摩综合症 + +尽管在POS中尚未发现这一问题,但我们提出以下反问: + +在如此严格、复杂的权益证明规则下,验证者需要成为系统的大多数2/3,以免受到惩罚,那么他们中的许多人是否会开始验证区块(区块组)并投票支持个别区块,而不考虑其有效性,只是出于对惩罚的恐惧而这么做,而不是因为交易和区块是真实和经过验证的? + +这是可能已经在发生的事情,而且这个系统明显鼓励验证者像绵羊一样随波逐流,即使他们可能正在走错方向。 + +## 富者愈富(并控制一切) + +最后,权益证明有一个经济效应,由于EIP-1559而变得更糟,特别是在以太坊。 + +EIP-1559是引入到网络中的一组规则,除了创建一个复杂的销毁机制以使ETH的货币供应稳定并开始减少以外没有其他用途。基本上,每次执行交易时会燃烧大约一半的手续费。另一半由矿工获得。 + +这本身只是为了使个别硬币更有价值而采取的噱头,这在道义上是可疑的。 + +但从更广泛的经济和社会角度来看,它引入了以太坊中的[坎蒂隆效应](https://en.wikipedia.org/wiki/Richard_Cantillon),即富者愈富,穷者愈贫。 + +我们解释这一系统偏向机制如下: + +1. 权益持有者(即“富人”和“权益精英”)将其剩余和储蓄存放在权益池中,获得持续的收入,随着奖励和硬币因供应减少而增值,他们的名义金额也在增加。 + +2. 一般经济由那些几乎不储蓄或靠工资度日的人组成,他们用货币进行日常支出,但每次进行交易时都会燃烧一部分。 + +在宏观层面,这一方案导致贫富之间的财富转移。穷人使用的货币减少,而富人使用的货币增加。 + +另一个效果是,大的硬币持有者最终将非常少,并且将对系统拥有更多的控制权,比目前已经拥有的控制权更多。 + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC,欢迎访问: https://ethereumclassic.org diff --git a/content/blog/2023-11-09-etc-proof-of-work-course-1-all-the-components-of-bitcoin-already-existed/1.png b/content/blog/2023-11-09-etc-proof-of-work-course-1-all-the-components-of-bitcoin-already-existed/1.png new file mode 100644 index 0000000000..b0a5b5060d Binary files /dev/null and b/content/blog/2023-11-09-etc-proof-of-work-course-1-all-the-components-of-bitcoin-already-existed/1.png differ diff --git a/content/blog/2023-11-09-etc-proof-of-work-course-1-all-the-components-of-bitcoin-already-existed/banner.png b/content/blog/2023-11-09-etc-proof-of-work-course-1-all-the-components-of-bitcoin-already-existed/banner.png new file mode 100644 index 0000000000..851bc5a62c Binary files /dev/null and b/content/blog/2023-11-09-etc-proof-of-work-course-1-all-the-components-of-bitcoin-already-existed/banner.png differ diff --git a/content/blog/2023-11-09-etc-proof-of-work-course-1-all-the-components-of-bitcoin-already-existed/index.md b/content/blog/2023-11-09-etc-proof-of-work-course-1-all-the-components-of-bitcoin-already-existed/index.md new file mode 100644 index 0000000000..670fd1e2a2 --- /dev/null +++ b/content/blog/2023-11-09-etc-proof-of-work-course-1-all-the-components-of-bitcoin-already-existed/index.md @@ -0,0 +1,121 @@ +--- +title: "ETC Proof of Work Course: 1. All the Components of Bitcoin Already Existed" +date: 2023-11-09 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["series", "education"] +linkImage: ./banner.png +--- + +--- +**You can listen to or watch this video here:** + + + +--- + +![](./1.png) + +After 14 years of existence of Bitcoin (BTC) we still cannot stop marvelling at the amazingness of the invention. A decentralized monetary system for the internet. The separation of money and state. Gold but inside the internet. A feat that some were seeking but no one could achieve, except Satoshi Nakamoto. + +However, Bitcoin is a collection of components that were all known in general, and to the men who were researching the subject before January of 2009, the time Bitcoin was launched. + +There is no innovation in Bitcoin’s parts, and, in fact, the majority of their concepts and ideas were years or even centuries old! + +In this post we go over the major components of Bitcoin, explain their preexistence, and prepare the stage to explain what was Bitcoin’s true revolutionary invention. + +## Peer-to-Peer Networks Already Existed + +It could be said that the internet itself is a peer-to-peer network. It was developed in the 1960s and consists of a series of computers that share the same protocol to send messages between each other. + +Then, in 1999 the concept of file sharing in a peer-to-peer network was popularized by Napster, which enabled people to share music files over the internet. + +Bitcoin is a global peer-to-peer network of computers that hold the same exact copy of the blockchain, which is the database with the property titles that contains the cryptocurrency. + +The idea of putting property titles in a peer-to-peer network was known and written about [as early as 1998](https://nakamotoinstitute.org/secure-property-titles/). + +## Hard Money Already Existed + +Gold is money because it is divisible, portable, and durable, but most importantly because it is scarce. + +Scarcity is what gives a money its property of hardness. The more scarce the currency is, the harder it gets, and the harder it gets, the more it holds it value over time. + +This lesson is something that humans had understood for millenia. When the Roman emperors started debasing their money by mixing the gold with lower value metals, they knew what they were doing and its inflationary consequences. + +When Europe experienced high inflation in the 16th and 17th centuries because of the massive inflow of Spanish silver coins from the new world, they knew what was the source and the cause. + +If a new digital currency were to be created it had to be hard money. + +## Triple Entry Accounting Already Existed + +When we are figuring out our budget or keeping track of money flows we may write a single column with the credits and debits. This is what is called “single entry accounting” because each transaction is just one entry in our column. + +A few hundred years ago, to solve the accounting of more complex organizations, the “double entry accounting” system was developed. This consists of making two entries of the same transaction in two different ledgers, usually as a credit in one account and as a debit in another. This was a significant advance because when the accounts balanced, then they had a higher guarantee of accuracy. + +Bitcoin uses what is called “triple entry accounting” which is to put in the same transaction the initial credit and debit, and to add to them a cryptographic signature to seal them. This increased the security and accuracy of the system even more. + +However, triple entry accounting, the hallmark of Bitcoin’s “[UTXO](https://www.investopedia.com/terms/u/utxo.asp)” system had been proposed by Ian Grig years earlier [in 2005](https://iang.org/papers/triple_entry.html). + +## Fully Replicated Ledgers Already Existed + +The heart of Bitcoin’s security is the idea that the blockchain must be fully replicated in all participating nodes of the system. + +The more nodes hold the fully replicated ledger in as different continents, regions, cultures, and countries as possible, the more secure the system is because it becomes practically impossible to tamper with or damage by man or nature. + +The concept of networks of computers holding redundant copies of the information had been a standard in networking systems since the 1980s. + +The problem that these networks had was that if as little as 1/3 of the nodes of the system were to fail, then the whole system would fail. This is what was called the [Byzantine Generals Problem](https://lamport.azurewebsites.net/pubs/byz.pdf). + +## Bit Gold Already Existed + +The idea that an object with the same characteristics of gold but inside the internet could theoretically be created was developed by Nick Szabo in early 1998. + +He called his idea “[Bit Gold](https://nakamotoinstitute.org/bit-gold/)” and was inspired by a proof of work system created by Adam Back called [HashCash](http://www.hashcash.org/papers/). + +HashCash made computers do a lot of computational work to create a cryptographic stamp, also called a “proof of work”, that would be attached to an email. As each email would have to be stamped, then it would prevent spam, because whoever wanted to flood the internet with emails would have to spend a lot of computational cycles and electricity doing it. + +Nick Szabo’s brilliant idea was that the proof of work cryptographic stamp could be analogous to gold but in the internet. If an ounce of gold requires a lot of work by gold miners to produce, and this makes it scarce, then if a cryptographic stamp requires a lot of work by computers to produce, this makes it scarce as well, hence “digital gold” or “Bit Gold”. + +The heart of Bitcoin’s monetary system is this Bit Gold. + +## B-money Already Existed + +Based on the idea of Nick Szabo to create Bit Gold, Wei Dai thought of a system that would create coins backed by Bit Gold in a peer-to-peer network. + +He called his idea “B-money” and the way it worked was in the following steps: + +1. Some computers in the peer-to-peer network work to produce a cryptographic stamp using a lot of computing power and electricity + +2. Then, they send the stamp to the rest of the network for verification that the work was done + +3. When the rest of the nodes in the system verify that the stamp is legitimate, then they pay the producers of the stamp a set number of newly created coins inside the system + +As you may have realized, the above is how Bitcoin works! However, Wei Dai’s [paper about B-money](http://www.weidai.com/bmoney.txt) was published in late 1998! + +## Trust Minimization Already Existed + +The whole point of the blockchain industry is to reduce trust in third parties because trusted third parties tend to abuse their power. + +Indeed, Satoshi Nakamoto mentioned trust minimization [14 times](https://etherplan.com/2020/02/29/satoshi-nakamoto-mentioned-trust-minimization-14-times-in-the-bitcoin-white-paper/10210/) in the Bitcoin white paper! + +The idea is that the property of the coins, meaning the ledger with the accounts and balances, should not be under the custody of a trusted institution, and that the supply or monetary policy of the cryptocurrency should not be dictated by a group of people or government. + +The full replication of the Bitcoin blockchain in thousands of computers worldwide, and that the network is totally decentralized makes it trust minimized because there is no party that can tamper with the ledger or change its monetary policy. + +However, this concept and goal of trust minimization had already been developed and [written about](https://nakamotoinstitute.org/trusted-third-parties/) by Nick Szabo in 2001! + +## So, What Was Bitcoin’s Invention? + +This is an excellent question that many asked themselves in the [early days](https://unenumerated.blogspot.com/2011/05/bitcoin-what-took-ye-so-long.html)! + +The amazing invention by Satoshi Nakamoto was not hard money, peer-to-peer networking, triple entry accounting, trust minimization, digital gold, a cryptocurrency, or a fully replicated ledger. + +His invention was what is called “Nakamoto Consensus” which is HOW all these parts WORKED TOGETHER. + +We will explain how Nakamoto Consensus, also known as “Proof of Work”, works in the next class! + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-11-09-etc-proof-of-work-course-1-all-the-components-of-bitcoin-already-existed/index.zh.md b/content/blog/2023-11-09-etc-proof-of-work-course-1-all-the-components-of-bitcoin-already-existed/index.zh.md new file mode 100644 index 0000000000..b7825af5f5 --- /dev/null +++ b/content/blog/2023-11-09-etc-proof-of-work-course-1-all-the-components-of-bitcoin-already-existed/index.zh.md @@ -0,0 +1,121 @@ +--- +title: "ETC工作量证明课程:1. 比特币的所有组成部分已经存在" +date: 2023-11-09 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["series", "education"] +linkImage: ./banner.png +--- + +--- +**欢迎由此收听或观看本期视频:** + + + +--- + +![](./1.png) + +14年来,比特币(BTC)的存在仍然令人惊叹,这是一项不可思议的发明。它是互联网上的去中心化货币系统,实现了货币与国家的分离。它就像黄金,但存在于互联网中。这是一项某些人一直在寻求但却没有实现的壮举,只有中本聪(Satoshi Nakamoto)实现了。 + +然而,比特币是一系列已经广泛知晓的组成部分的集合,而且在2009年1月比特币发布之前,研究这一主题的人们已经了解了这些组成部分。 + +比特币的各部分没有创新,事实上,它们的大部分概念和思想都已经存在数年甚至数个世纪! + +在本篇文章中,我们将讨论比特币的主要组成部分,解释它们的存在,为解释比特币的真正革命性发明做好准备。 + +## 对等网络已经存在 + +可以说互联网本身就是一个对等网络。它是在1960年代开发的,由一系列计算机组成,它们共享相同的协议来相互发送消息。 + +然后,1999年,对等网络中文件共享的概念由Napster普及,使人们能够通过互联网共享音乐文件。 + +比特币是一种全球性的对等计算机网络,这些计算机都拥有区块链的完全相同副本,这是包含加密货币的财产所有权的数据库。 + +将财产所有权放在对等网络中的想法早在1998年就已经被了解并写出。 + +## 基本货币已经存在 + +黄金之所以成为货币,是因为它具有可分割性、可携带性和耐久性,但最重要的是因为它是稀缺的。 + +稀缺性是货币硬度的来源。货币越稀缺,它就越硬,而它越硬,它就越能保持其价值。 + +这一教训是人类几千年来已经了解的。当罗马皇帝开始通过将黄金与低价值金属混合来贬值他们的货币时,他们知道他们在做什么以及它的通货膨胀后果。 + +当16世纪和17世纪的欧洲因来自新大陆的大规模银币涌入而经历高通货膨胀时,他们知道问题的根源和原因。 + +如果要创建一种新的数字货币,它必须是硬货币。 + +## 三重记账已经存在 + +当我们在制定预算或跟踪资金流动时,我们可能会写一个只有贷方和借方的单列。这被称为“单一记账”,因为每个交易都只是我们列中的一个输入。 + +几百年前,为了解决更复杂的组织的会计问题,开发了“双重记账”系统。这包括在两个不同的分类账中制定同一交易的两个记录,通常一个是借记,另一个是贷记。这是一项重大进步,因为当账户平衡时,它们具有更高的准确性保证。 + +比特币使用的是所谓的“三重记账”,即在同一交易中放置初始的贷方和借方,并为它们添加一个加密签名以密封它们。这进一步提高了系统的 + +安全性和准确性。 + +然而,三重记账,也就是比特币的“UTXO”系统的特点,早在2005年由Ian Grig提出。 + +## 完全复制账本已经存在 + +比特币安全的核心是区块链必须在系统的所有参与节点中完全复制。 + +拥有完全复制账本的节点越多,分布在不同大陆、地区、文化和国家,系统就越安全,因为几乎不可能通过人为或自然的方式篡改或损害它。 + +自20世纪80年代以来,计算机网络系统中存在冗余信息副本的概念一直是一种标准。 + +这些网络所面临的问题是,如果系统中的不到1/3的节点出现故障,整个系统将失败。这就是所谓的“拜占庭将军问题”。 + +## 比特黄金已经存在 + +可以理论上创建一个在互联网内部具有与黄金相同特性的物品的概念是由Nick Szabo于1998年初开发的。 + +他称之为“Bit Gold”,并受到Adam Back创建的名为“HashCash”的工作证明系统的启发。 + +HashCash通过让计算机执行大量计算工作来创建加密标志,也称为“工作证明”,然后将其附加到电子邮件上。因为每封电子邮件都必须加盖标志,所以它可以防止垃圾邮件,因为任何想要通过互联网发送大量电子邮件的人都必须花费大量的计算周期和电力。 + +Nick Szabo的杰出想法是,工作证明的加密标志可以类似于互联网中的黄金。如果一盎司黄金需要黄金矿工付出大量努力来生产,这使其变得稀缺,那么如果加密标志需要计算机付出大量努力来生产,那么这也使它稀缺,因此称为“数字黄金”或“Bit Gold”。 + +比特币货币系统的核心是这个Bit Gold。 + +## B-money已经存在 + +基于Nick Szabo创建Bit Gold的想法,Wei Dai想出了一种在对等网络中创建以Bit Gold支持的硬币的系统。 + +他称他的想法为“B-money”,它的工作方式如下: + +1. 对等网络中的一些计算机通过使用大量计算能力和电力来生成加密标志 + +2. 然后,他们将标志发送给网络的其余部分,以验证工作是否已完成 + +3. 当系统中的其余节点验证标志是合法的时,他们会向标志的制作者支付系统内新创建的一定数量的硬币 + +正如你可能已经意识到的,上述就是比特币的运作方式!然而,Wei Dai于1998年末发表了关于B-money的[论文](http://www.weidai.com/bmoney.txt)! + +## 信任最小化已经存在 + +整个区块链行业的目标是减少对第三方的信任,因为可信赖的第三方往往滥用其权力。 + +事实上,Satoshi Nakamoto在比特币白皮书中提到了信任最小化[14次](https://etherplan.com/2020/02/29/satoshi-nakamoto-mentioned-trust-minimization-14-times-in-the-bitcoin-white-paper/10210/)! + +其想法是,货币的属性,即账户和余额的分类账,不应该由受信任的机构保管,而加密货币的供应或货币政策也不应该由一组人或政府来决定。 + +比特币区块链在全球数千台计算机中的完全复制以及网络的完全去中心化使其信任最小化,因为没有任何一方可以篡改分类账或更改其货币政策。 + +然而,这一信任最小化的概念和目标已经在2001年由Nick Szabo开发和[撰写](https://nakamotoinstitute.org/trusted-third-parties/)! + +那么,比特币的真正发明是什么? + +这是一个很好的问题,许多人在[早期曾问过自己](https://unenumerated.blogspot.com/2011/05/bitcoin-what-took-ye-so-long.html)! + +Satoshi Nakamoto的不可思议的发明不是硬货币、对等网络、三重记账、信任最小化、数字黄金、加密货币或完全复制账本。他的发明是所谓的“中本聪共识”,即所有这些部分如何协同工作。 + +我们将在下一课中解释中本聪共识,也称为“工作证明”,是如何工作的! + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC,欢迎访问: https://ethereumclassic.org diff --git a/content/blog/2023-11-14-ethereum-classic-and-the-web3/1.png b/content/blog/2023-11-14-ethereum-classic-and-the-web3/1.png new file mode 100644 index 0000000000..44d99fda63 Binary files /dev/null and b/content/blog/2023-11-14-ethereum-classic-and-the-web3/1.png differ diff --git a/content/blog/2023-11-14-ethereum-classic-and-the-web3/banner.png b/content/blog/2023-11-14-ethereum-classic-and-the-web3/banner.png new file mode 100644 index 0000000000..1573e6a56f Binary files /dev/null and b/content/blog/2023-11-14-ethereum-classic-and-the-web3/banner.png differ diff --git a/content/blog/2023-11-14-ethereum-classic-and-the-web3/banner1.png b/content/blog/2023-11-14-ethereum-classic-and-the-web3/banner1.png new file mode 100644 index 0000000000..8fb8d514a8 Binary files /dev/null and b/content/blog/2023-11-14-ethereum-classic-and-the-web3/banner1.png differ diff --git a/content/blog/2023-11-14-ethereum-classic-and-the-web3/index.md b/content/blog/2023-11-14-ethereum-classic-and-the-web3/index.md new file mode 100644 index 0000000000..f0f5aa86c2 --- /dev/null +++ b/content/blog/2023-11-14-ethereum-classic-and-the-web3/index.md @@ -0,0 +1,89 @@ +--- +title: "Ethereum Classic and the Web3" +date: 2023-11-14 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["series", "education"] +linkImage: ./banner1.png +--- + +--- +**You can listen to or watch this video here:** + + + +--- + +The promise of the blockchain industry is decentralization of technological systems and networks so that people and businesses may continue conducting their affairs while depending less on trusted third parties. + +Trusted third parties; such as governments, corporations, and special interests; manage nearly all systems in the world through data centers and cloud services and are security holes because they tend to abuse the trust that has been deposited in them. + +The Web3 is a vision of a decentralized web and software applications using the capabilities of the blockchain industry. + +In the next sections we will explain what is the Web3, what is Ethereum Classic (ETC), how the Web3 will work on ETC and the blockchain sector in general, and why apps on ETC will be the most secure in the world. + +## What Is the Web3? + +Websites and apps today use front end software code to deliver the user experience, back end code to perform the core operations and services of the applications, images, document files, and databases to store the information of users and system states. + +All these components are usually hosted and executed in centralized data centers or cloud services with servers controlled by few people. + +Using the blockchain industry paradigm of decentralization, the future of websites and apps is that they will store and execute these components in decentralized systems. + +For example, the images and files will be stored in file storage blockchains, the databases will be stored in database storage blockchains, the front end will be stored in distributed code networks, and the back end code will be stored and executed in smart contract blockchains such as ETC. + +## What Is ETC? + +To give a glimpse of how these systems will work, an explanation of how ETC works will be illustrative. + +Ethereum Classic is a blockchain that holds accounts, balances, and software programs. Both the ledger, with the accounts and balances, and the software programs are copied in all participating nodes in the network. This means that where in centralized systems everything is under the control of one entity in their servers, in ETC the ledger and the software programs are really replicated in many computers around the world, which are owned by many people of different regions, cultures, nations, and languages. + +A blockchain is a system that operates as described above, and when the software programs are stored in it, they become decentralized. These decentralized programs are what are called “smart contracts”. + +This level of decentralization guarantees that no one entity or group may tamper or arbitrarily change or censor the accounts, balances, and software programs in ETC. + +## How Will the Web3 Work With ETC? + +![](./banner.png) + +So, the way the Web3 will use ETC is that the Ethereum Classic blockchain will host the backend critical security components of website and applications. + +ETC will not really be used for file storage, heavy databases, or front end code. + +As ETC is a highly secure smart contracts blockchain, because it uses proof of work as its consensus mechanism, the most appropriate use of its capabilities by websites and apps will be for such use cases as storage of treasuries and the rules to manage those treasuries. + +Web3 will also use ETC for other highly secure back end functions such as for decentralized autonomous organizations (DAOs), property registries, and storing high value NFTs that may represent digital or real world objects, such as real estate or vehicles. + +## How Will the Web3 Work With the Blockchain Industry in General? + +If the Web3 will use ETC for backend code only, then what will it use to store and manage the rest of the components? + +The blockchain industry is a collection of systems that, at their core, replicate all the information in as many nodes as possible to achieve decentralization, which has the benefits of trust minimization. + +In the image below you may see how the industry will be layered. People will use their wallets to connect to Web3 and apps, then those apps will use the best blockchains and networks to run their components for their specific use cases. + +However, today, the majority of websites used are centralized and the decentralized applications’ backends are stored exclusively in one blockchain such as Ethereum. + +What will happen in the future is that websites and applications will use multiple blockchains and industry systems to provide the complete experience to users and to have ALL their components decentralized. + +This means that, as said before, the front end code will be hosted in a specialized network, the files and images in another, the databases in another, and the backend code in ETC. + +![](./1.png) + +## Why Applications in ETC Will Be the Most Secure Apps in the World + +For the very high security use cases, the decentralized web and apps will not be so distributed, though. + +There will be applications that will need very high security standards and those will only be provided by large proof of work networks such as ETC. + +Ethereum Classic is the environment where the most secure applications in the world will exist. + +This is because it is a proof of work blockchain, it has a fixed monetary policy, and it is programmable with smart contracts. These three components combined in the same system, and the fact that it is the largest blockchain in the world with this design, provide the highest level of decentralization, thus trust minimization, thus security for the Web3. + +For this kind of function, users will use their hardware wallets to interact with high security apps, and the apps will be simple user interfaces, probably locally hosted apps in personal computers or mobile devices, and will interact directly with ETC only. + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-11-14-ethereum-classic-and-the-web3/index.zh.md b/content/blog/2023-11-14-ethereum-classic-and-the-web3/index.zh.md new file mode 100644 index 0000000000..29aee65586 --- /dev/null +++ b/content/blog/2023-11-14-ethereum-classic-and-the-web3/index.zh.md @@ -0,0 +1,89 @@ +--- +title: "以太坊经典和Web3" +date: 2023-11-14 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["series", "education"] +linkImage: ./banner1.png +--- + +--- +**由此收听或观看本期内容:** + + + +--- + +区块链行业的承诺是去中心化技术系统和网络,以便人们和企业可以继续开展业务,同时不再过分依赖可信任的第三方。 + +可信任的第三方,例如政府、公司和特殊利益团体,通过数据中心和云服务管理世界上几乎所有的系统,它们是安全漏洞,因为它们倾向于滥用人们对它们的信任。 + +Web3 是一个分散式网络和软件应用程序的愿景,利用了区块链行业的能力。 + +在接下来的部分中,我们将解释什么是 Web3,什么是以太经典(ETC),Web3 将如何在 ETC 和整个区块链行业中运作,以及为什么在 ETC 上的应用程序将是全球最安全的。 + +## 什么是 Web3? + +今天的网站和应用程序使用前端软件代码提供用户体验,使用后端代码执行应用程序的核心操作和服务,使用图像、文档文件和数据库存储用户和系统状态的信息。 + +所有这些组件通常托管和在由少数人控制的集中数据中心或云服务中执行。 + +使用区块链行业的去中心化范例,网站和应用程序的未来将在分散式系统中存储和执行这些组件。 + +例如,图像和文件将存储在文件存储区块链中,数据库将存储在数据库存储区块链中,前端将存储在分布式代码网络中,后端代码将存储和执行在智能合同区块链中,如 ETC。 + +## 什么是 ETC? + +为了简要说明这些系统将如何运作,解释一下 ETC 的工作原理将有助于理解。 + +以太经典是一个区块链,保存账户、余额和软件程序。账户和余额的分类帐以及软件程序都复制在网络中的所有参与节点中。这意味着在集中式系统中,一切都在一个实体的服务器控制下,而在 ETC 中,分类帐和软件程序实际上在世界各地许多不同地区、文化、国家和语言的人们拥有的许多计算机中复制。 + +区块链是如上所述运作的系统,当软件程序存储在其中时,它们变得分散化。这些分散化的程序被称为“智能合同”。 + +这种程度的去中心化保证没有一个实体或团体可以篡改或任意更改或审查 ETC 中的账户、余额和软件程序。 + +## Web3 如何与 ETC 协同工作? + +![](./banner.png) + +因此,Web3 将使用以太经典区块链来托管网站和应用程序的关键后端安全组件。 + +ETC 实际上不会用于文件存储、大型数据库或前端代码。 + +由于以太经典使用工作证明作为其共识机制,因此它是一个高度安全的智能合同区块链,网站和应用程序最适合利用其能力的用例将包括存储资金库和管理这些资金库的规则。 + +Web3 还将使用 ETC 用于其他高度安全的后端功能,例如分散自治组织(DAO)、财产登记和存储代表数字或实际世界对象的高价值 NFT,例如房地产或车辆。 + +## Web3 如何与整个区块链行业协同工作? + +如果 Web3 仅用于后端代码,那么它将用于存储和管理其他组件的内容是什么呢? + +区块链行业是一组系统,从本质上来说,它会在尽可能多的节点中复制所有信息,以实现去中心化,从而获得了最小化信任的好处。 + +在下图中,您可以看到该行业将被分层。人们将使用他们的钱包连接到 Web3 和应用程序,然后这些应用程序将使用最佳区块链和网络来运行其特定用例的组件。 + +然而,今天,使用的大多数网站都是集中的,分散式应用程序的后端仅存储在一个区块链中,例如以太坊。 + +未来将发生的是,网站和应用程序将使用多个区块链和行业系统,以为用户提供完整的体验,并将所有组件都去中心化。 + +这意味着,正如之前所说,前端代码将托管在专门的网络中,文件和图像将托管在另一个网络中,数据库将托管在另一个网络中,后端代码将托管在 ETC 区块链中。 + +![](./1.png) + +## 为什么 ETC 中的应用程序将成为世界上最安全的应用程序 + +对于需要非常高安全标准的用例来说,分散式网络和应用程序将不会如此分散。 + +将会有一些应用程序需要非常高的安全标准,而这些标准只会由大型工作证明网络,如 ETC,提供。 + +以太经典是世界上最安全应用程序存在的环境。 + +这是因为它是一个工作证明区块链,具有固定的货币政策,可以通过智能合同进行编程。这三个组件结合在同一系统中,以及它是世界上最大的采用这种设计的区块链,提供了最高水平的去中心化,从而最小化了信任,从而提高了Web3的安全性。 + +对于这种类型的功能,用户将使用他们的硬件钱包与高安全性的应用程序互动,这些应用程序将是简单的用户界面,可能是在个人计算机或移动设备上本地托管的应用程序,并且将仅直接与 ETC 互动。 + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC: https://ethereumclassic.org diff --git a/content/blog/2023-11-15-unified-emergency-responses-in-proof-of-work-blockchains-is-not-centralization/banner.png b/content/blog/2023-11-15-unified-emergency-responses-in-proof-of-work-blockchains-is-not-centralization/banner.png new file mode 100644 index 0000000000..8f3596bcd8 Binary files /dev/null and b/content/blog/2023-11-15-unified-emergency-responses-in-proof-of-work-blockchains-is-not-centralization/banner.png differ diff --git a/content/blog/2023-11-15-unified-emergency-responses-in-proof-of-work-blockchains-is-not-centralization/banner2.png b/content/blog/2023-11-15-unified-emergency-responses-in-proof-of-work-blockchains-is-not-centralization/banner2.png new file mode 100644 index 0000000000..c1c6e3bb0b Binary files /dev/null and b/content/blog/2023-11-15-unified-emergency-responses-in-proof-of-work-blockchains-is-not-centralization/banner2.png differ diff --git a/content/blog/2023-11-15-unified-emergency-responses-in-proof-of-work-blockchains-is-not-centralization/index.md b/content/blog/2023-11-15-unified-emergency-responses-in-proof-of-work-blockchains-is-not-centralization/index.md new file mode 100644 index 0000000000..c5fbcf1f33 --- /dev/null +++ b/content/blog/2023-11-15-unified-emergency-responses-in-proof-of-work-blockchains-is-not-centralization/index.md @@ -0,0 +1,107 @@ +--- +title: "Unified Emergency Responses In Proof of Work Blockchains Is Not Centralization" +date: 2023-11-15 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["philosophy"] +linkImage: ./banner2.png +--- + +--- +**You can listen to or watch this video here:** + + + +--- + +![](./banner.png) + +It has been pointed out before that because Bitcoin (BTC) and Ethereum Classic (ETC) have had coordinated emergency responses to bugs and attacks in the past, that this proves that they are centralized systems. + +These arguments are not true. + +In this post we will explain what is a unified emergency response, we will list some occasions in which there have been unified emergency responses both in BTC and ETC, which may be wrongly interpreted as centralization, and we will explain how these systems work at scale. + +## What Is a Unified Emergency Response + +If people are using their cell phones and it is discovered that there is a general bug in the system, all users will soon receive a notification to upgrade their devices. As everyone goes accepting the terms and conditions and initiating the upgrades, it will take a few minutes in each phone until the download of the software patch is completed. Then, all phones will ask users to restart them and everything will be fixed in a matter of a few hours. + +The above is a typical emergency response for fixing bugs in software systems. They are so easy and smooth because those systems are centralized, therefore very few people direct the whole upgrade process, and our devices and operating systems have channels and backdoors through which the providers can communicate instructions to users or sometimes even manage the systems remotely. + +This kind of unilateral response is impossible in decentralized blockchains such as Bitcoin and Ethereum Classic. + +With so many independent nodes in the networks located in different continents, regions, countries, and cultures, to achieve this level of centralized coordination is practically impossible. This is why these systems are secure. + +However, Bitcoin and ETC have repeatedly been upgraded very quickly after catastrophic bugs or attacks. + +How does an emergency response look like in a decentralized blockchain? + +If anywhere in the world any user detects a failure in Bitcoin or ETC, they will immediately report the problem on social media and/or in the GitHub repository of the respective blockchain node software. + +When the above happens, very quickly all economic nodes, meaning node operators with businesses dependent on running these nodes, will immediately raise the alert in their organizations, which may include exchanges, mining pools, mining companies, dapps, blockchain explorers, node services, etc. + +As the core developers of these systems are alerted by all the noise in the ecosystem, they will immediately try to identify and create an emergency patch to correct the failure. + +When the patch is announced by core developers, then the whole ecosystem of these blockchains will download and activate the new software, thus resolving the problem. + +## Example of Emergency Responses in Bitcoin + +**The Overflow Bug of 2010:** On August 15 2010, on block 74,638, Bitcoin issued 184 billion BTC. This was a bug in the software client that a hacker discovered and started to exploit. Core developers identified the failure within 90 minutes. Within a few hours the patch was released and the network went back to normal. + +**The 2013 Involuntary Fork:** In March 11 of 2013 some nodes in the Bitcoin network started to work on a different blockchain than the rest of the nodes, this is what is called a network split. The Bitcoin node software had been upgraded from version 0.7 to 0.8 but not all operators had done the upgrade. Because of a glitch in the 0.8 version, all the nodes and miners with that version split from the mainnet. After several alerts and alarms on social media, core developers started to work on a fix, and persuaded all network users to downgrade their nodes to the 0.7 version, fixing the failure. + +## Example of Emergency Responses in Ethereum Classic + +**The Gas Reprice of 2016:** In October of 2016 a series of attacks on Ethereum Classic started to happen due to an inadequately low cost of certain operation codes in the virtual machine. After 10 to 14 days of development and ecosystem coordination, the fix to rebalance the gas costs were introduced by core developers by way of a hard fork on block 2,500,000. + +**The 51% Attacks of 2020:** In August of 2020 there were a series of 51% attacks on ETC that involved the loss of several million dollars to the victims. The fix to solve this problem was not a change in the rules of the protocol but the addition of a feature called “Modified Exponential Subjective Scoring (MESS)” to the software clients of ETC that would reject alternative attacking blockchains. This feature was released in mid October of 2020 and the majority of node operators have used it. + +## Normal Operation vs Failure of a Blockchain + +As seen in the previous examples, both Bitcoin and ETC are supposed to be decentralized, but each time there has been a failure, emergency responses have been coordinated swiftly similar to centralized systems. + +Does this mean that BTC and ETC are really centralized? + +The answer is no. Whoever makes the analogy of centralized operating systems with decentralized blockchains is failing to distinguish the differences because they are making a very simplistic comparison of unified behavior and response times, and are not identifying the causes for such behavior. + +When a blockchain is operating normally, there is no coordination whatsoever between the globally diverse sets of node operators, miners, and users in systems as Bitcoin and ETC. To convince all these participants of changes that are not desired, are controversial, or even lack interest, is practically impossible! + +However, when there are failures in the systems, then these same participants, not only react quickly and positively to changes, but they may be on alert 24 hours a day to anxiously implement them swiftly. + +## Incentives for Emergency Responses + +The reason for this highly coordinated emergency response behavior in decentralized systems is that the incentives for resolving failures are the same as the incentives for the systems to be live and running in a totally decentralized way. + +Liveness and decentralization are valuable because they guarantee the correct operation, censorship resistance, permissionlessness, and immutability of the ledger with accounts, balances, sound money, and unstoppable applications. + +The minute that these attributes are threatened by software bugs or attacks, all ecosystem operators and users of the blockchain will naturally want to fix the system as soon as possible. + +There is no mystery, conspiracy, or centralization, it is just the incentives of the ecosystem that drive it to act in a unified and coordinated fashion. + +## Incentives for Decentralization + +Proof of the above argument is that each time Bitcoin or ETC have been fixed after failures, they have both returned to full operation very quickly in a totally decentralized manner. + +And, when any new controversial changes have been proposed, the typical debates and kantankerous attitudes between the same participants has regained the floor. + +In social groups, if decentralization is achievable without degenerating the systems, then participants will choose decentralization. + +Centralization is not a desired state of affairs. “Voting”, “Democracy”, and “Republic” are not ideal systems, they are just the least worse we can do. + +But in proof of work systems there cannot be tyrants, kings, constitutions, presidents, or congresses. It is not possible because participants will never choose that, because they are not necessary, and they will always prefer to split. + +## Ethereum Classic at Scale Is Decentralized + +As a final note, it is important to highlight that when these systems are small or their ecosystems are developing, they may seem centralized because few players control significant shares of the resources. + +This is yet another fallacy in which detractors may fall. Blockchains such a Bitcoin and Ethereum Classic are even more decentralized at scale. It is just a matter of growth. + +As these networks grow, there will be more node operators in more regions spread around the world. There will also be more miners seeking cheap sources of electricity which are naturally distributed around the globe. And, there will be more users, investors, and dapp developers everywhere who will permissionlessly access the system. + +The increase in all these participants, and the fact that BTC and ETC use proof of work, makes them more decentralized and immutable. + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-11-15-unified-emergency-responses-in-proof-of-work-blockchains-is-not-centralization/index.zh.md b/content/blog/2023-11-15-unified-emergency-responses-in-proof-of-work-blockchains-is-not-centralization/index.zh.md new file mode 100644 index 0000000000..a507a13bb3 --- /dev/null +++ b/content/blog/2023-11-15-unified-emergency-responses-in-proof-of-work-blockchains-is-not-centralization/index.zh.md @@ -0,0 +1,107 @@ +--- +title: "统一的紧急响应在工作证明区块链中并不等同于中心化" +date: 2023-11-15 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["philosophy"] +linkImage: ./banner2.png +--- + +--- +**由此收听本期内容:** + + + +--- + +![](./banner.png) + +这篇文章指出,之前有人曾指出,比特币(BTC)和以太经典(ETC)过去曾协调应对错误和攻击的紧急响应,因此认为它们是中心化系统。然而,这些论点是不正确的。 + +在本文中,我们将解释什么是统一的紧急响应,列举了比特币和以太经典中曾发生过统一的紧急响应的情况,这可能被错误解释为中心化,以及解释这些系统如何在规模上运作。 + +## 什么是统一的紧急响应 + +如果人们正在使用他们的手机,而系统中发现了一个通用的错误,所有用户将很快收到升级设备的通知。当每个人都接受了条款和条件并启动了升级时,每部手机将在几分钟内完成软件补丁的下载。然后,所有手机将要求用户重新启动它们,一切都将在几个小时内修复。 + +上述是修复软件系统错误的典型紧急响应。它们之所以如此简单和顺利,是因为这些系统是中心化的,因此很少有人指导整个升级过程,而且我们的设备和操作系统有渠道和后门,通过这些渠道提供商可以向用户传达指令,甚至远程管理系统。 + +这种单方面的响应在比特币和以太经典等分散式区块链中是不可能的。 + +由于这些网络中有许多独立的节点分布在不同的大陆、地区、国家和文化中,要实现这种中心化协调的水平几乎是不可能的。这就是为什么这些系统是安全的。 + +然而,比特币和以太经典在经历灾难性错误或攻击后,已经多次迅速升级。 + +分散式区块链中的紧急响应是什么样的? + +如果世界上的任何用户在比特币或以太经典中发现故障,他们将立即在社交媒体上和/或在各自区块链节点软件的GitHub存储库中报告问题。 + +当发生上述情况时,所有经济节点(即依赖运行这些节点的业务的节点操作者)将迅速在其组织中发出警报,这可能包括交易所、矿池、矿业公司、dapp、区块链浏览器、节点服务等。 + +由于这些系统的核心开发者受到生态系统中的所有噪音的警报,他们将立即尝试识别并创建用于纠正故障的紧急补丁。 + +当核心开发者宣布补丁时,这些区块链的整个生态系统将下载并激活新软件,从而解决问题。 + +## 比特币紧急响应示例 + +**2010年的溢出漏洞:** 在2010年8月15日,在第74,638块上,比特币发行了1840亿个BTC。这是软件客户端中的一个错误,一名黑客发现并开始利用。核心开发者在90分钟内确定了故障。几个小时后,补丁发布,网络恢复正常。 + +**2013年的非自愿分叉:** 在2013年3月11日,比特币网络中的一些节点开始在与其他节点不同的区块链上工作,这就是所谓的网络分叉。比特币节点软件已从版本0.7升级到0.8,但并非所有操作者都进行了升级。由于0.8版本中存在一个故障,所有使用该版本的节点和矿工都从主网中分离出来。在社交媒体上发出多次警报后,核心开发者开始着手解决问题,并说服所有网络用户将他们的节点降级到0.7版本,从而修复了故障。 + +## 以太经典紧急响应示例 + +**2016年的燃料价格调整:** 在2016年10月,以太经典遭受了一系列由于虚拟机中某些操作代码成本过低而发动的攻击。经过10至14天的开发和生态系统协调,核心开发者通过硬分叉在第2,500,000块上引入了重新平衡燃料成本的修复方案。 + +**2020年的51%攻击:** 在2020年8月,以太经典遭受了一系列51%的攻击,涉及数百万美元的损失。解决此问题的方法不是改变协议规则,而是向以太经典软件客户端添加 + +一个名为“Modified Exponential Subjective Scoring (MESS)”的功能,该功能将拒绝替代攻击区块链。这一功能于2020年10月中旬发布,大多数节点操作者已经使用了它。 + +## 区块链的正常运作与故障 + +正如前面的示例所示,比特币和以太经典都应该是分散式的,但每次出现故障时,紧急响应都迅速协调,类似于中心化系统。 + +这是否意味着比特币和以太经典确实是中心化的? + +答案是否定的。将中心化操作系统与分散式区块链进行类比的人未能区分其中的差异,因为他们对统一的行为和响应时间进行了非常简单的比较,没有识别造成这种行为的原因。 + +当区块链正常运行时,在像比特币和以太经典这样的全球多样化的节点操作者、矿工和用户之间根本没有协调。要说服所有这些参与者接受不希望、有争议或甚至没有兴趣的更改几乎是不可能的! + +然而,当系统出现故障时,同样的参与者不仅会迅速积极地对待更改,而且他们可能会全天候保持警惕,迅速实施这些更改。 + +## 紧急响应的激励 + +分散式系统中高度协调的紧急响应行为的原因是解决故障的激励与系统以完全分散的方式运行的激励相同。 + +活跃性和分散化非常重要,因为它们保证了账户、余额、稳定货币和不可阻止应用程序的正确运行、抗审查、无需许可和不可变性。 + +一旦这些属性受到软件错误或攻击的威胁,区块链的所有生态系统操作者和用户自然而然地会希望尽快修复系统。 + +没有神秘、阴谋或中心化,只是生态系统的激励推动它以统一和协调的方式行动。 + +## 分散化的激励 + +上述论点的证明是,每当比特币或以太经典在故障后得到修复时,它们都迅速以完全分散的方式恢复运行。 + +而且,每当提出新的有争议的更改时,相同的参与者之间典型的辩论和争吵态度也再次出现。 + +在社交团体中,如果可以在不损害系统的情况下实现分散化,那么参与者将选择分散化。 + +中心化不是一种理想的状态。"投票"、"民主"和"共和国"都不是理想的制度,它们只是我们可以做的最差的选择。 + +但在工作证明系统中,不能有暴君、国王、宪法、总统或国会。这是不可能的,因为参与者永远不会选择这样做,因为这是不必要的,他们总是更愿意分裂。 + +## 以太经典在规模上是分散的 + +最后需要强调的是,当这些系统很小或它们的生态系统正在发展时,它们可能会看起来中心化,因为少数玩家控制着重要的资源份额。 + +这是另一种批评者可能会犯的错误。比特币和以太经典等区块链在规模上甚至更加分散。这只是一个增长的问题。 + +随着这些网络的增长,将会有更多的节点操作者在全球各地的更多地区,还将有更多的寻求分布在全球的廉价电源的矿工。此外,将有更多的用户、投资者和dapp开发人员,他们将无需许可地访问系统。 + +所有这些参与者的增加,以及BTC和ETC使用工作证明机制,使它们更加分散和不可变。 + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC: https://ethereumclassic.org diff --git a/content/blog/2023-11-16-etc-proof-of-work-course-2-what-didnt-exist-was-a-secure-consensus-mechanism/1.png b/content/blog/2023-11-16-etc-proof-of-work-course-2-what-didnt-exist-was-a-secure-consensus-mechanism/1.png new file mode 100644 index 0000000000..ea5c601169 Binary files /dev/null and b/content/blog/2023-11-16-etc-proof-of-work-course-2-what-didnt-exist-was-a-secure-consensus-mechanism/1.png differ diff --git a/content/blog/2023-11-16-etc-proof-of-work-course-2-what-didnt-exist-was-a-secure-consensus-mechanism/banner.png b/content/blog/2023-11-16-etc-proof-of-work-course-2-what-didnt-exist-was-a-secure-consensus-mechanism/banner.png new file mode 100644 index 0000000000..eecf6e33fd Binary files /dev/null and b/content/blog/2023-11-16-etc-proof-of-work-course-2-what-didnt-exist-was-a-secure-consensus-mechanism/banner.png differ diff --git a/content/blog/2023-11-16-etc-proof-of-work-course-2-what-didnt-exist-was-a-secure-consensus-mechanism/index.md b/content/blog/2023-11-16-etc-proof-of-work-course-2-what-didnt-exist-was-a-secure-consensus-mechanism/index.md new file mode 100644 index 0000000000..d255c527c9 --- /dev/null +++ b/content/blog/2023-11-16-etc-proof-of-work-course-2-what-didnt-exist-was-a-secure-consensus-mechanism/index.md @@ -0,0 +1,79 @@ +--- +title: "ETC Proof of Work Course: 2. What Didn’t Exist Was a Secure Consensus Mechanism" +date: 2023-11-16 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["series", "education"] +linkImage: ./banner.png +--- + +--- +**You can listen to or watch this video here:** + + + +--- + +In the previous class, 1, we explained that all the components of Bitcoin already exited. So, what was Bitcoin’s invention? + +As we wrote, the amazing invention by Satoshi Nakamoto was not hard money, peer-to-peer networking, triple entry accounting, trust minimization, digital gold, a cryptocurrency, or a fully replicated ledger. + +His invention was what is called “Nakamoto Consensus” which is HOW all these parts WORKED TOGETHER. + +![](./1.png) + +The brilliant idea was that the proof of work (POW) cryptographic stamp not only could be used to create the analogy of gold on the internet, called “Bit Gold”, but that the information of the POW itself could be a focal point for all the nodes of the network globally to be on the same exact state of the database, all at the same time, in their complete isolation, without the need to consult with any other source or authority. This was the key to decentralization and the magnitude of proof of work! + +## What Is a Consensus Mechanism? + +The idea of blockchains is to replicate the same information on all nodes of the system. The problem was how machines which were controlled by different people in different continents, regions, and cultures could agree on which is the correct information to replicate and store locally. + +This was because just by sending the information was not enough security because if only 1/3 of the participating machines in the system cheated, then the communication would fail. + +A consensus mechanism is a way for computers in a peer-to-peer network to distribute information to each other and to reach a consensus on the same exact state of the data every set amount of time, which is 10 minutes in the case of Bitcoin or 13 seconds in the case of Ethereum Classic (ETC). + +Satoshi’s invention of “Nakamoto Consensus”, which will be explained in detail in classes 3, 4, and 5, was a new consensus mechanism that had a higher security level than what was available at the time. + +## POW As an Analogy of Gold + +So, the way the discovery progressed was that HashCash was invented in 1997 to prevent spam, and it used proof of work to make machines work every time they sent an email. + +Then, as we explained in the last class, Nick Szabo’s idea was that the proof of work cryptographic stamp itself could be analogous to gold but in the internet. + +If an ounce of gold requires a lot of work by gold miners to produce, and this makes it scarce and valuable, then if a cryptographic stamp requires a lot of work by computers to produce, this should make it scarce and valuable as well, hence “digital gold” or “Bit Gold”, as Szabo called it. + +The heart of Bitcoin’s monetary system is this Bit Gold, and the work to create Bit Gold would be the key to consensus. + +## Bit Gold As the Focal Point + +The way that Bit Gold, or the proof of work cryptographic stamp, works as a consensus mechanism is by contrast. + +If you were to receive several bars of gold, and all were of the same size and looked the same, but all except one were made of gold painted wood, then it would be very easy for you to know which is the real gold bar. Just by feeling the weight it would be enough of a hint to differentiate the dishonest vs the honest gold bars. + +In the same way, all computers in a proof of work blockchain such as Bitcoin may constantly receive blocks from several sources of which the majority may be imposters trying to trick them, but they always know which is the correct block every round just by checking the proof of work cryptographic hash. This is how Bit Gold becomes the focal point of consensus in the system. + +## What Is to Be on the Same Exact State? + +As we explained in a previous section, the idea of blockchains is to replicate the same information on all nodes of the system to reach a consensus on the same exact state of the data every set amount of time. + +By “data” it is meant the ledger with the accounts and balances of the cryptocurrency. This means that all the machines that work on the Bitcoin blockchain hold the same exact copy of the accounts and balances of all users. + +To be on the same exact state means that every 10 minutes in Bitcoin, all the nodes in the system have their databases updated with the same exact new block, therefore they all have the same exact number of blocks, with the same exact copy of all the account and balance history. + +## Why Is POW Secure? + +The full replication of the data explained in the previous section is the central security strategy of Bitcoin as it guarantees a level of redundancy of the information that is very difficult to tamper with or destroy by man or nature. + +The key contribution of proof of work, which was the key to the creation of Bitcoin and the whole blockchain industry, was that it enabled consensus between all machines with a higher threshold for attackers to be able to interfere with the integrity of the data. + +To disrupt Bitcoin, more than 50% of the existing computing base or the same or larger computing base would have to be built to create attacking blocks to trick the rest of the network into accepting them. + +The other feature was that all the nodes, in their complete isolation, without the need to consult with any other source or authority, could reach this consensus on the same copy of the data. This is the key to decentralization. + +In the next few classes we will explain how all of this works! + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-11-16-etc-proof-of-work-course-2-what-didnt-exist-was-a-secure-consensus-mechanism/index.zh.md b/content/blog/2023-11-16-etc-proof-of-work-course-2-what-didnt-exist-was-a-secure-consensus-mechanism/index.zh.md new file mode 100644 index 0000000000..6f8aa923bd --- /dev/null +++ b/content/blog/2023-11-16-etc-proof-of-work-course-2-what-didnt-exist-was-a-secure-consensus-mechanism/index.zh.md @@ -0,0 +1,83 @@ +--- +title: "工作量证明课程:第2部分. 安全的共识机制的缺少" +date: 2023-11-16 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["series", "education"] +linkImage: ./banner.png +--- + +--- +**由此收听或观看本期内容:** + + + +--- + +在前面的第1节课中,我们解释了比特币的所有组成部分都已存在。那么,比特币的发明是什么呢? + +正如我们所写的,中本聪的惊人发明不是硬通货、点对点网络、三重账簿会计、最小化信任、数字黄金、加密货币或完全复制的总账簿。 + +他的发明是所谓的“中本聪共识”,即所有这些部分如何协同工作的方式。 + +![](./1.png) + +在上一节课中,我们解释了比特币的所有组成部分都已存在。那么,比特币的发明是什么呢? + +正如我们所写的,中本聪的惊人发明不是硬通货、点对点网络、三重账簿会计、最小化信任、数字黄金、加密货币或完全复制的总账簿。 + +他的发明是所谓的“中本聪共识”,即所有这些部分如何协同工作的方式。 + +## 什么是共识机制? + +区块链的理念是在系统的所有节点上复制相同的信息。问题是,由不同地区、区域和文化的不同人控制的计算机如何就要复制和本地存储的正确信息达成一致。 + +这是因为仅仅发送信息并不足够安全,因为如果系统中参与的计算机中有三分之一的机器作弊,通信将失败。 + +共识机制是对等网络中的计算机相互分发信息并在每一定时间内达成数据的相同确切状态的一种方法,比特币的情况是每10分钟一次,以太坊经典(ETC)的情况是每13秒一次。 + +中本聪的“中本聪共识”发明,将在第3、4和5课中详细解释,是一种比当时可用的共识机制更安全的新共识机制。 + +## 作为黄金类比的工作证明(POW) + +因此,这一发现的进展方式是,HashCash于1997年被发明出来,以防止垃圾邮件,它使用工作证明使机器在每次发送电子邮件时都要进行工作。 + +然后,正如我们在上一课中解释的,尼克·萨博的想法是,工作证明密码戳本身可以类比于黄金,但在互联网中。 + +如果一盎司黄金需要黄金矿工大量劳动才能生产,这使得黄金稀缺且有价值,那么,如果加密戳需要计算机大量工作才能生成,这也应该使它稀缺且有价值,因此尼克·萨博称之为“数字黄金”或“比特黄金”。 + +比特币货币系统的核心是这个比特黄金,而创建比特黄金的工作将是达成共识的关键。 + +## 比特黄金作为焦点 + +比特黄金或工作证明密码戳作为共识机制的工作方式是通过对比。 + +如果你收到了几根黄金棒,它们的大小都相同,看起来都一样,但除了一根以外,其他都是木制的金条,那么很容易知道哪一根是真正的黄金条。仅凭重量就足以区分不诚实的与诚实的黄金条。 + +同样,比特币等工作证明区块链中的所有计算机可能不断从多个来源接收区块,其中大多数可能是试图欺骗它们的冒名顶替者,但它们总是通过检查工作证明密码散列来确定每一轮的正确区块。这是比特黄金如何成为系统中共识的焦点。 + +## 什么是相同的确切状态? + +正如我们在前一节中所解释的,区块链的理念是在系统的所有节点上复制相同的信息,以便在每一定时间内达成数据的相同确切状态。 + +所谓的“数据”是指加密货币的账户和余额总账簿。这意味着所有工作在比特币区块链上的计算机都持有完全相同的所有用户的账户和余额历史的副本。 + +拥有相同确切状态意味着每10分钟在比特币中,系统中的所有节点都会将其数据库更新为相同确切的新区块,因此它们都具有相同数量的区块,以及相同的账户和余额历史的副本。 + +## 为什么工作量证明(POW)安全? + +在前一节中解释的数据的完全复制是比特币的中央安全策略,因为它保证了信息的冗余程度,使其难以被人为或自然因素破坏。 + +工作证明的关键贡献,也是比特币和整个区块链行业的关键,是它实现了所有机器之间的共识,同时提高了攻击者干扰数据完整性的门槛。 + +要破坏比特币,必须构建超过50%的现有计算基础,或者构建相同或更大的计算基础,以创建攻击区块以欺骗网络的其余部分接受它们。 + +另一个特征是,所有节点,在完全隔离的情况下,无需与任何其他来源或权威咨询,就能在相同数据副本上达成共识。这是分散化的关键。 + +在接下来的几节课中,我们将解释所有这些是如何运作的! + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC: https://ethereumclassic.org diff --git a/content/blog/2023-11-21-what-is-a-51-attack/2.png b/content/blog/2023-11-21-what-is-a-51-attack/2.png new file mode 100644 index 0000000000..b2f8321c1a Binary files /dev/null and b/content/blog/2023-11-21-what-is-a-51-attack/2.png differ diff --git a/content/blog/2023-11-21-what-is-a-51-attack/3.png b/content/blog/2023-11-21-what-is-a-51-attack/3.png new file mode 100644 index 0000000000..454b468ec9 Binary files /dev/null and b/content/blog/2023-11-21-what-is-a-51-attack/3.png differ diff --git a/content/blog/2023-11-21-what-is-a-51-attack/banner.png b/content/blog/2023-11-21-what-is-a-51-attack/banner.png new file mode 100644 index 0000000000..6ef938dd0b Binary files /dev/null and b/content/blog/2023-11-21-what-is-a-51-attack/banner.png differ diff --git a/content/blog/2023-11-21-what-is-a-51-attack/index.md b/content/blog/2023-11-21-what-is-a-51-attack/index.md new file mode 100644 index 0000000000..ed0db06acb --- /dev/null +++ b/content/blog/2023-11-21-what-is-a-51-attack/index.md @@ -0,0 +1,133 @@ +--- +title: "What Is a 51% Attack?" +date: 2023-11-21 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["education"] +linkImage: ./banner.png +--- + +--- +**You can listen to or watch this video here:** + + + +--- + +![](./banner.png) + +As there seems to be many who still ask what are 51% attacks, what happened to Ethereum Classic (ETC) in the past, and have confusion about these things, we decided to write this post to answer all the doubts and correct all confusions. + +Indeed, ETC was attacked in two opportunities when it was a smaller, secondary blockchain in the past. + +These attacks are not “hacks”, are narrow, and non-systemic, meaning that ETC never “broke”, the attacks only affect the victims but not all users, nor do they affect the whole network functionality. + +In the following sections we will explain the history of these kinds of networks, what are 51% attacks, and why ETC is now stronger than ever, thus it is extremely unlikely that there will be these kinds of attacks again. + +## Before it Was 33% Attacks + +Before the invention of Bitcoin and the use of what is called Nakamoto Consensus, which uses proof of work as its consensus method, peer-to-peer networks to manage digital currency were not possible because they were very easy to attack. + +In a [computer science paper](https://lamport.azurewebsites.net/pubs/byz.pdf) in 1982 it was proven that the threshold to attack these networks was only 33% of the nodes. + +![The Byzantine Generals Problem](./2.png) + +This means that if only 1 in 3 of participating machines were to corrupt the information transmitted in the system, then the whole system could be compromised. + +This problem was called the “Byzantine Generals Problem”. + +## Now it Is 51% Attacks + +The brilliant discovery by Satoshi Nakamoto, who invented Bitcoin, was that, using proof of work, the cryptographic stamps or hashes that seal each block of data in the network were in themselves a new form of consensus mechanism that would enable all nodes in the system to be synchronized in lockstep in a decentralized way. + +By using this signaling system, that requires enormous amounts of computational work and consumption of electricity, then the threshold to attack the network was raised from 33% of the participating machines to 51%. + +This higher level of security is what enabled Bitcoin to exist unchallenged to this day since its inception. + +The method created by Satoshi is what is called “Nakamoto Consensus”. + +## What Happened in Ethereum Classic? + +However, that the threshold was raised from 33% to 51% in proof of work blockchains such as Bitcoin and ETC still means that this incredibly powerful system can still be attacked if anyone achieves 51% of the computing power. + +This is what happened in ETC when it was a minor secondary blockchain. + +On January 5th and 7th of 2019, there were two 51% attacks on the ETC network, and then, in August of 2020, there were three 51% attacks. + +In all cases crypto exchanges were targeted and they lost millions of dollars in what are called “double spends” which is the only kind of attack that can be perpetrated using 51% of the computing power in these kinds of blockchains. + +## What Is a Double Spend? + +As the name describes it, a double spend is to spend the same coins twice. However, this is just a simplistic term. + +Double spends are really that a thief may have coins in an address in a blockchain, and that they may transfer them to a victim, but then they can make them appear back again in their own address, thus tricking the victim while stealing from them something of value. + +The way they do this is by sending coins in a normal transaction which will be included in a block in the chain, and then reorganizing the blocks in the network with new blocks that do not include the original transaction, therefore making the coins disappear from the victim’s account. + +How this can be achieved will be explained in the next three sections. + +## How ETC Nodes Reach Consensus + +To learn how a 51% or double spend attack (both are the same) may be achieved, it is important to know how nodes in a blockchain reach consensus of the same exact state of the chain every 13 seconds in the case of ETC. + +A blockchain constantly receives new transactions, and these transactions are re-transmitted to all nodes in the system. When a subgroup of the nodes, called miners, receive the transactions, they accumulate them in batches and then seal them with a cryptographic stamp that requires an enormous amount of computational work to create, thus the name “proof of work”. When the miners create the stamp, they get the sealed block and send it to the rest of the network for verification. When the rest of the network verifies that the transactions are correct and that the cryptographic stamp is legitimate, then they include the block as the latest block in the chain of blocks, or “blockchain”. + +The fact that the enormous amount of work was done is actually the information that all nodes need to know that that is the correct block. This is because it is very difficult for attackers to build blocks without such a large computing base. + +## The Rule of the Chain With the Most Work Done + +The interesting thing is that the same information of the proof of work for each block is what keeps the blockchain unified at all times and permits nodes worldwide to join, leave, and join again whenever they want without censorship or the need of any permission. + +They can do this by simply checking the accumulated work done in the whole chain of blocks. If there are attacking alternative blockchains, then they can add the total work done in each and just follow the one with the most accumulated work. Because the attacker chains would have a difficult time to build such a large computing base as in Bitcoin or ETC, then the network would always converge on the correct and honest chain. + +So, the work done in each block keeps the network synchronized every round, and the addition of the accumulated work in the whole chain history keeps the system unified behind one single blockchain. + +## Description of a 51% Attack + +The problem arises when attackers can temporarily garner 51% of the mining computing power. When this happens, then they do have the ability to build an alternative chain to perpetrate a 51% attack or double spend. + +The way they do this is by selecting a victim, say a crypto exchange, then they send them a large amount of ETC worth several million dollars, and then they exchange it for another coin, say Monero (XMR). When they have millions of dollars in XRM in their account in the exchange, then they withdraw all the XMR to their own address on the Monero blockchain. + +When they complete the withdrawal process of the XMR, then they start building, with their large computing base in ETC, which must be 51% or more of the total miner computing power in the network, an alternative blockchain starting from the block where their original transaction to the exchange is. + +In this alternative chain, that will have more accumulated work than the main chain, they will actually delete their original transaction of ETC to the exchange. + +When they build the alternative chain that has more accumulated work than the main chain, then they will send it to the rest of the nodes of the network. + +Because of “the rule of the chain with the most work done” explained above, then all nodes in the ETC network will abandon the main chain they were working on and immediately adopt the new alternative chain built by the attacker. + +Once the whole network migrates to the attacker’s blockchain, the original transaction to the exchange would have disappeared. This means that the exchange, that received the original deposit of millions of dollars in ETC, now does not have that money in their address any more. They have just disappeared. + +However, the thieves of the attacker chain, will now have two large amounts of coins worth millions of dollars: the original ETC that they recovered by deleting their original transaction to the exchange and the XMR in the Monero blockchain that they stole from the exchange. + +This is how 51% attacks or double spends steal money from their victims. + +## How Can 51% Attacks Be Avoided? + +Even though they are unlikely, in all proof of work blockchains, including the largest one, Bitcoin, there are several strategies to avoid 51% attacks: + +**Network size:** The most obvious one, and the reason why 51% attacks are sporadic and unlikely, is to have the largest computing base as possible. The more attractive a coins is, the more the price rises, the more the price rises, the more rewards the miners will receive, the more the rewards the miners receive, the more hash power, and the more hash power, the less likely an attacker will be able to perpetrate double spends. This is how size protects proof of work blockchains. + +**Leading in a specific mining algorithm:** Aside from sheer size, to be the leading chain in a specific mining algorithm is also a good form of protection. When a chain is second or third in a mining algorithm, then the miners of the bigger chains could point their machines to the smaller chain and attack it as it would be more or less trivial for them to achieve a 51% share of computing power. This is the reason why ETC was attacked before, because it was the second largest chain in its segment after Ethereum when it was a proof of work network. + +**Waiting for more confirmations:** At the user level, waiting for more confirmations before considering a transaction final is the main way to protect themselves from double spends. This is because the more blocks are created on top of the block in which a transaction is entered, the more secure that transaction gets. For example, if I received 100 ETC in the last block, that transaction is easier to reverse than a transaction that I received 100,000 blocks ago. This is because the attackers would have to re-do the whole 100,000 blocks, spending all that electricity and computing power again, before they could perpetrate the double spend. + +## Why Is ETC Unlikely to be Attacked Again + +![](./3.png) + +If having more hash power brings more protection and security to a blockchain, then ETC has become much more secure in the last 14 months. + +This is because Ethereum has migrated from proof of work to proof of stake in September of 2022 and this made many miners, who were left stranded, to start mining ETC. + +As seen in the chart in this section, ETC’s computing base, as measured by hashrate, increased from around 24 TH/s to more than 150 TH/s since Ethereum’s migration. + +Not only has ETC gained in its mining computing base, but also has become the leading blockchain in its hashing algorithm (ETCHash/ETHash) and the largest proof of work, smart-contract-capable blockchain in the world. + +This provides yet another protection layer and makes it very unlikely that ETC will be attacked with double spends again. + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-11-21-what-is-a-51-attack/index.zh.md b/content/blog/2023-11-21-what-is-a-51-attack/index.zh.md new file mode 100644 index 0000000000..9f5241dc91 --- /dev/null +++ b/content/blog/2023-11-21-what-is-a-51-attack/index.zh.md @@ -0,0 +1,133 @@ +--- +title: "什么是51%攻击?" +date: 2023-11-21 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["education"] +linkImage: ./banner.png +--- + +--- +**由此收听本次内容:** + + + +--- + +![](./banner.png) + +由于仍有许多人询问什么是51%攻击,以及以前发生在以太经典(ETC)上的事情,并对这些事情感到困惑,我们决定写下这篇文章,回答所有疑问并纠正所有困惑。 + +确实,在过去,ETC在成为较小、次要的区块链时曾两次遭受攻击。 + +这些攻击不是“黑客攻击”,而是有限的、非系统性的,这意味着ETC从未“崩溃”,这些攻击只影响受害者,而不是所有用户,也不会影响整个网络功能。 + +在接下来的章节中,我们将解释这些网络的历史,什么是51%攻击,以及为什么ETC现在比以往任何时候都更强大,因此极不可能再次发生这种类型的攻击。 + +## 在那之前是33%攻击 + +在比特币的发明和所谓的纳卡莫托共识的使用之前,该共识方法使用工作证明作为其共识方法,点对点网络管理数字货币是不可能的,因为它们很容易受到攻击。 + +在1982年的[计算机科学论文](https://lamport.azurewebsites.net/pubs/byz.pdf)中证明,攻击这些网络的门槛仅为节点的33%。 + +![The Byzantine Gnerals Problem](./2.png) + +这意味着如果参与的三台机器中有一台损坏了系统中传输的信息,整个系统可能会受到威胁。 + +这个问题被称为“拜占庭将军问题”。 + +## 现在是51%攻击 + +中本聪(Satoshi Nakamoto)的卓越发现是,使用工作证明,网络中每个数据块的密码印章或哈希本身就是一种新的共识机制形式,它可以使系统中的所有节点以一种去中心化的方式同步锁步。 + +通过使用这个需要大量计算工作和电力消耗的信号系统,攻击网络的门槛从参与机器的33%提高到了51%。 + +这更高的安全级别是比特币自问世以来一直无可争议地存在的原因。 + +中本聪创造的方法被称为“中本聪共识”。 + +## 以太经典发生了什么? + +然而,即使在工作证明的区块链中,如比特币和ETC中,将门槛从33%提高到51%仍然意味着,如果有人获得51%的计算能力,这个强大的系统仍然可能受到攻击。 + +这就是在ETC作为较小次要区块链时发生的事情。 + +在2019年1月5日和7日,ETC网络遭受了两次51%攻击,然后在2020年8月,又发生了三次51%攻击。 + +在所有情况下,加密交易所成为攻击目标,它们在所谓的“双花”中损失了数百万美元,这是在这类区块链中只能实施的攻击。 + +## 什么是双花? + +顾名思义,双花是指将同样的硬币花费两次。然而,这只是一个简单化的术语。 + +双花实际上是指窃贼可能在区块链的一个地址中拥有硬币,并将其转移到受害者那里,但然后他们可以使硬币再次出现在他们自己的地址中,从而欺骗受害者,并窃取一些有价值的东西。 + +他们这样做的方式是通过发送硬币进行正常交易,这将被包含在链中的一个块中,并且通过使用不包括原始交易的新块重新组织网络中的块,从而使硬币从受害者的帐户中消失。 + +如何实现这一点将在接下来的三个部分中解释。 + +## ETC节点如何达成共识 + +要了解51%或双花攻击(两者都是相同的)是如何实现的,重要的是要了解区块链中的节点如何在每13秒(在ETC的情况下)内达成链的完全相同状态的共识。 + +区块链不断接收新交易,这些交易被重新传输到系统中的所有节点。当一组称为矿工的节点收到交易时,它们将其积累成批次,然后用需要大量计算工作才能创建的密码印章密封它们,因此称为“工作证明”。当矿工创建印章时,他们得到密封的块并将其发送到网络的其余部分进行验证。当网络的其余部分验证交易正确且密码印章合法时,它们将该块包含为链上最新的块,或称为“区块链”。 + +实际上已经完成了大量工作的信息是所有节点需要知道的正确块。这是因为攻击者很难在没有如此庞大计算基础的情况下构建块。 + +## 具有最多工作完成的链的规则 + +有趣的是,每个块的工作证明相同的信息实际上是区块链始终统一并允许全球节点随时加入、离开并在没有审查或任何许可的情况下重新加入的原因。 + +他们可以通过简单地检查整个区块链中累积的工作完成情况来实现这一点。如果存在攻击性的替代区块链,则它们可以添加每个区块链中完成的总工作,并只需按照具有最多累积工作的那个链。因为攻击者链将很难建立如比特币或ETC那样庞大的计算基础,所以网络将始终趋向于正确和诚实的链。 + +因此,每轮完成的工作保持网络同步,而整个链历史中累积的工作加在一起则保持系统统一在一个单一的区块链后面。 + +## 51%攻击的描述 + +当攻击者能够暂时获得51%的挖矿计算能力时,问题就出现了。当发生这种情况时,他们确实有能力构建替代链以进行51%攻击或双花。 + +他们这样做的方式是选择一个受害者,比如一个加密交易所,然后向他们发送价值数百万美元的ETC,并将其兑换为另一种硬币,比如门罗(XMR)。当他们在交易所的账户中有数百万美元的XMR时,然后将所有XMR提取到门罗区块链上的他们自己的地址。 + +当他们完成对XMR的提取过程后,然后他们开始使用他们在ETC中的大型计算基础,该基础必须占网络总挖矿计算能力的51%或更多,从其最初的交易到交易所的区块开始构建替代区块链。 + +在这个替代链中,将具有比主链更多的累积工作,他们将实际上删除其ETC到交易所的原始交易。 + +当他们构建具有比主链更多累积工作的替代链时,他们将其发送到网络的其余节点。 + +由于上面解释的“具有最多工作完成的链的规则”,那么ETC网络中的所有节点都将放弃他们曾经工作过的主链,并立即采纳攻击者构建的新的替代链。 + +一旦整个网络迁移到攻击者的区块链,原始的交易到交易所的交易将消失。这意味着接收了数百万美元ETC的交易所现在不再在他们的地址中拥有这笔钱。他们刚刚消失了。 + +然而,攻击者链的窃贼现在将拥有两笔价值数百万美元的硬币:通过删除他们对交易所的原始交易而恢复的原始ETC和从交易所窃取的门罗区块链中的XMR。 + +这就是51%攻击或双花从受害者那里窃取钱的方式。 + +## 如何避免51%攻击? + +即使它们不太可能在所有工作证明的区块链中发生,包括最大的比特币在内,也有几种避免51%攻击的策略: + +**网络规模:** 最明显的一个,也是51%攻击零星且不太可能发生的原因是尽可能拥有最大的计算基础。一种货币越有吸引力,价格上涨,矿工将获得的奖励越多,矿工获得的奖励越多,哈希功率越大,攻击者越不可能实施双花。这就是规模如何保护工作证明的区块链的方式。 + +**在特定挖矿算法中领先:** 除了规模外,成为特定挖矿算法中的领先链也是一种良好的保护形式。当链在特定挖矿算法中排名第二或第三时,较大链的矿工可能会将他们的机器指向较小链并攻击它,因为对他们来说达到51%的计算能力可能相对轻松。这就是为什么ETC之前会受到攻击的原因,因为在它是工作证明网络时,在以太坊之后,它是其段中第二大的链。 + +**等待更多的确认:** 在用户级别上,等待更多的确认才考虑交易最终是保护自己免受双花的主要方法。这是因为在输入交易的块上创建更多的块,该交易就会变得更加安全。例如,如果我在最后一个块中收到了100 ETC,那么这笔交易比我在100,000个块之前收到的100 ETC更容易被反转。这是因为攻击者在执行双花之前必须重新做整个100,000块,再次花费所有那些电力和计算能力。 + +## 为什么ETC不太可能再次受到攻击 + +![](./3.png) + +如果拥有更多的哈希功率能够为区块链带来更多的保护和安全性,那么在过去的14个月里,ETC已经变得更加安全。 + +这是因为以太坊在2022年9月从工作证明迁移到了权益证明,这导致许多滞留下来的矿工开始挖矿ETC。 + +正如在本节图表中所示,ETC的计算基础,以哈希率为衡量标准,从以太坊迁移时的约24 TH/s增加到了超过150 TH/s。 + +ETC不仅在其挖矿计算基础上取得了进展,而且已成为其哈希算法(ETCHash/ETHash)中的领先区块链,也是世界上最大的工作证明区块链。 + +这提供了另一层保护,使得ETC极不可能再次遭受双花攻击。 + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC,欢迎访问: https://ethereumclassic.org diff --git a/content/blog/2023-11-22-ethereum-classic-is-programmable-digital-gold/banner.png b/content/blog/2023-11-22-ethereum-classic-is-programmable-digital-gold/banner.png new file mode 100644 index 0000000000..b5d4d0670b Binary files /dev/null and b/content/blog/2023-11-22-ethereum-classic-is-programmable-digital-gold/banner.png differ diff --git a/content/blog/2023-11-22-ethereum-classic-is-programmable-digital-gold/index.md b/content/blog/2023-11-22-ethereum-classic-is-programmable-digital-gold/index.md new file mode 100644 index 0000000000..0e7e82cd93 --- /dev/null +++ b/content/blog/2023-11-22-ethereum-classic-is-programmable-digital-gold/index.md @@ -0,0 +1,74 @@ +--- +title: "Ethereum Classic Is Programmable Digital Gold" +date: 2023-11-22 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["philosophy"] +linkImage: ./banner.png +--- + +--- +**You can listen to or watch this video here:** + + + +--- +![](./banner.png) + +Proof of work (POW) coins are digital gold because they are built on top of an objective proof of work base. + +Proof of stake and proof of authority coins are pure fiat community money because they have no objective base, so they depend exclusively on their communities for their hardness, which is weak or weaker than trusting governments for the monetary policy. + +In this post, we will focus on why proof of work coins are digital gold, why Ethereum Classic (ETC) in particular is programmable digital gold, and why this makes ETC the most trust minimized blockchain in the world. + +## What Is Bit Gold? + +It is very likely that Satoshi Nakamoto actually wanted to build Bit Gold when he created Bitcoin. The prefix “Bit” is a big hint, I would say! + +In proof of work blockchains such as Bitcoin (BTC) and ETC there is actually Bit Gold hidden in their databases. This Bit Gold are the cryptographic stamps or hashes that seal each block. + +This is what was envisioned was going to be the money on the internet originally. + +However, because of problems in its design that couldn’t be solved at the time, Satoshi used the model proposed by Wei Dai to build the first proof of work blockchain. + +## What Is a Fiat Community Token? + +Wei Dai’s model was to use Bit Gold as a backup and then create a fiat currency to pay for the work done by the computers in the network. + +It is very important to understand that BTC and ETC are fiat community tokens that are issued after a lot of work was done by miners in a proof of work network. But they are not the Bit Gold themselves. + +These tokens are fiat community tokens because they are just a parameter in the software of the networks, they are not the direct product of computational work as the cryptographic hashes are. + +## Why Is Bitcoin Digital Gold? + +Nevertheless, to create the coins in Bitcoin, miners have to do a lot of computational work and invest a lot of capital in operations and electricity. This means that the BTC tokens are not issued unless this enormous cost has been incurred. This is what makes BTC valuable and scarce, just as gold in the real world is valuable and scarce due to the cost of extracting it from nature. + +So the first reason why BTC is digital gold is because the work to create the blocks is the same work that is required to issue the coins. + +The second reason is that it has a fixed monetary policy. Bitcoins are not only costly to create, but they are being created at a decreasing rate (50% less per block every 4 years) and this establishes a total supply of 21,000,000 that will ever exist. + +## Why Is Ethereum Classic Programmable Digital Gold? + +In exactly the same way as Bitcoin, to create the coins in ETC, miners have to do a lot of computational work and invest a lot of capital in operations and electricity. The ETC tokens are not issued unless this enormous cost has been incurred, thus making ETC digital gold just like BTC. + +And, as Bitcoin, ETC has a fixed monetary policy. ETC is being created at a decreasing rate (20% less per block every 2 years) and this also establishes a total fixed supply, but in the case of ETC it will be 210,700,000. + +However, the additional feature that ETC has is that it supports smart contracts. Smart contracts are software programs that when they are sent to the ETC network, they become decentralized because they get replicated across all nodes of the system globally just like the ledger with accounts and balances. + +This means that ETC coins are digital gold, but they can also be managed by these software programs or “Dapps” inside ETC, which means that ETC is programmable, and therefore programmable digital gold. + +## Why Is Ethereum Classic More Trust Minimized? + +Indeed, arguably, ETC is the most trust minimized blockchain in the world as its decentralized applications are hosted inside the largest proof of work smart contracts blockchain in the world. + +If to manage digital gold, users need to use external applications that are not hosted inside the POW blockchain, then those applications are not as secure, thus not as trust minimized. + +But in ETC, because the dapps are inside the highly secure environment of its POW system, then not only the digital gold is trust minimized but also its applications. + +This is what makes ETC more trust minimized, and why programmable digital gold is so unique and valuable. + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-11-22-ethereum-classic-is-programmable-digital-gold/index.zh.md b/content/blog/2023-11-22-ethereum-classic-is-programmable-digital-gold/index.zh.md new file mode 100644 index 0000000000..7bb0f91de5 --- /dev/null +++ b/content/blog/2023-11-22-ethereum-classic-is-programmable-digital-gold/index.zh.md @@ -0,0 +1,74 @@ +--- +title: "以太经典是可编程的数字黄金" +date: 2023-11-22 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["philosophy"] +linkImage: ./banner.png +--- + +--- +**欢迎由此收听或观看本期内容:** + + + +--- +![](./banner.png) + +工作证明(POW)币是数字黄金,因为它们建立在客观的工作证明基础之上。 + +而权益证明和权威证明币则是纯粹的法定社区货币,因为它们没有客观基础,因此完全依赖于它们的社区来确保其硬度,这种硬度弱于或弱于信任政府的货币政策。 + +在这篇文章中,我们将重点讨论为什么工作证明币是数字黄金,为什么以太经典(ETC)特别是可编程数字黄金,以及为什么这使得ETC成为世界上最受信任的最小化区块链。 + +## 什么是比特黄金? + +很可能中本聪在创建比特币时实际上想要构建比特黄金。前缀“比特”是一个很大的提示,我会说! + +在工作证明区块链中,如比特币(BTC)和ETC实际上隐藏着比特黄金。这个比特黄金就是密封每个区块的密码印章或哈希。 + +最初设想的是这将是互联网上的货币。 + +然而,由于当时无法解决的设计问题,中本聪使用了韦戴提出的模型构建了第一个工作证明区块链。 + +## 什么是法定社区代币? + +韦戴的模型是使用比特黄金作为备份,然后创建一种法定货币来支付网络中计算机执行的工作。 + +非常重要的是要理解BTC和ETC是在工作证明网络中矿工完成了大量工作之后发行的法定社区代币。但它们并不是比特黄金本身。 + +这些代币是法定社区代币,因为它们只是网络软件中的一个参数,它们不是与密码哈希一样是直接计算工作的直接产物。 + +## 为什么比特币是数字黄金? + +然而,为了在比特币中创建硬币,矿工必须进行大量的计算工作,并在运营和电力方面投资大量资本。这意味着除非发生了巨大的成本,否则不会发行BTC代币。这就是使BTC有价值和稀缺的原因,就像现实世界中黄金由于从自然界中提取的成本而有价值和稀缺一样。 + +所以,BTC是数字黄金的第一个原因是创建区块的工作与发行硬币所需的工作相同。 + +第二个原因是它有一个固定的货币政策。比特币不仅制造成本高昂,而且制作速度递减(每4年每个区块减少50%),这确定了总供应量为2100万。 + +## 为什么以太经典是可编程数字黄金? + +与比特币完全相同,为了在ETC中创建硬币,矿工必须进行大量的计算工作,并在运营和电力方面投资大量资本。除非发生了巨大的成本,否则不会发行ETC代币,从而使ETC成为数字黄金,就像BTC一样。 + +而且,与比特币一样,ETC有一个固定的货币政策。ETC的制作速度递减(每2年每个区块减少20%),这也确定了一个固定的总供应量,但在ETC的情况下是210,700,000。 + +然而,ETC具有的附加功能是它支持智能合约。智能合约是一种软件程序,当它们发送到ETC网络时,它们变得去中心化,因为它们在全球系统的所有节点上都会被复制,就像账户和余额的分类账一样。 + +这意味着ETC硬币是数字黄金,但它们也可以由ETC内部的这些软件程序或“Dapps”管理,这意味着ETC是可编程的,因此是可编程数字黄金。 + +## 为什么以太经典更加最小化信任? + +实际上,可以说ETC是世界上最受信任的区块链,因为其去中心化应用程序托管在世界上最大的工作证明智能合约区块链内。 + +如果用户需要使用不托管在POW区块链内的外部应用程序来管理数字黄金,那么这些应用程序就不够安全,因此不够信任。 + +但在ETC中,因为Dapps位于其POW系统的高度安全环境内,因此不仅数字黄金是受信任的,而且其应用程序也是受信任的。 + +这就是使ETC更受信任的原因,以及为什么可编程数字黄金是如此独特和有价值。 + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC,欢迎访问: https://ethereumclassic.org diff --git a/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/0.png b/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/0.png new file mode 100644 index 0000000000..373c0114a9 Binary files /dev/null and b/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/0.png differ diff --git a/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/1.png b/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/1.png new file mode 100644 index 0000000000..de0317b120 Binary files /dev/null and b/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/1.png differ diff --git a/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/2.png b/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/2.png new file mode 100644 index 0000000000..ab4c471a40 Binary files /dev/null and b/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/2.png differ diff --git a/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/3.png b/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/3.png new file mode 100644 index 0000000000..41d8a21218 Binary files /dev/null and b/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/3.png differ diff --git a/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/4.png b/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/4.png new file mode 100644 index 0000000000..4d5cc8c429 Binary files /dev/null and b/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/4.png differ diff --git a/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/banner.png b/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/banner.png new file mode 100644 index 0000000000..b548b0fcf6 Binary files /dev/null and b/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/banner.png differ diff --git a/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/index.md b/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/index.md new file mode 100644 index 0000000000..8978f3a2aa --- /dev/null +++ b/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/index.md @@ -0,0 +1,87 @@ +--- +title: "ETC Proof of Work Course: 3. How Does Proof of Work (POW) Work?" +date: 2023-11-23 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["series", "education"] +linkImage: ./banner.png +--- + +--- +**You can listen to or watch this video here:** + + + +--- + +In the previous class, 2, we explained that the brilliant idea of Satoshi Nakamoto when he invented Bitcoin was that the proof of work cryptographic stamp not only could be used to create the analogy of gold on the internet, called “Bit Gold”, but that the information of the POW itself could be a focal point for all the nodes of the network globally to be on the same exact state of the database, all at the same time, in their complete isolation, without the need to consult with any other source or authority. + +This was the key to decentralization and the magnitude of proof of work. + +In this class we will explain how POW actually works in the next sections where we will show a diagram with the four steps of the POW process and explain each one. + +## The Four Steps of the Proof of Work Process + +![](./0.png) + +Above is the full diagram of the POW process. The first step is the data to stamp or hash cryptographically, the second the hashing in itself, the third is hitting the target established by the protocol, and the fourth is the winning of the reward. + +## 1. Data to Stamp + +![](./1.png) + +As blockchains are chains of blocks of data, the blocks are related to each other by including the stamp or hash of the previous block in the next. Then, the current transactions are added to the data to hash, plus a timestamp, and finally a random iterating number which we will explain in step 3. + +## 2. Cryptographic Stamping + +![](./2.png) + +The second step of the process is to pass the data described in the previous step through a cryptographic hashing algorithm. When this is done, a new stamp or hash is generated for this particular block. These hashes are very large hexadecimal numbers that look like this: + +` +686f746a95b6f836d7d70567c302c3f9ebb5ee0def3d1220ee9d4e9f34f5e131 +` + +## 3. Hitting the Target + +![](./3.png) + +The third step is to check if the hash number hit a target that the network algorithm imposed. If it didn’t hit it, then the miners go back to the previous step, change the random iterating number, and then generate a new hash and try again, they do this trillions of times per second per round! + +## 4. Winning the Reward + +![](./4.png) + +The fourth step of the POW method is hitting the target. When any of the miners hits the target, then they win the reward for that block! + +## What Is the Result of This Miner Competition? + +So, in summary, miners group transactions in batches, add to them a time stamp, the previous block cryptographic stamp or hash, and a random iterating number. Once they do this, they create a new cryptographic stamp for this new block specifically and immediately check if it hit a specific target that the protocol determined. + +If it didn’t hit the target, then the miners go back, change the random iterating number as soon as possible and try again. If they didn’t hit the target again, then they try again, and again, and again, until one of the miners hits the target. + +They may do this trillions of times per second, and this is what uses up so much energy and is referred to as “proof of work” because only by working in trying so many times, using so much computing power and electricity, is that, statistically, one of the miners will hit the target within the range of the standard block time, which is 10 minutes in the case of Bitcoin, and 13 seconds for Ethereum Classic. + +The result is a competition between miners to see who hits the target first. This is what motivates them to constantly increase their computing power. + +The more and more miners enter to compete, the more agregarte computing power the blockchain will have., and the growing hash rate increases the security of the system. + +Brilliant! Isn’t it? + +A cryptographic stamp that is created using a lot of work and electricity is more secure because the focal point on which all nodes of the system converge to decide which is the next block becomes extremely difficult to forge by attacks. + +Also, the accumulated work of all the blocks in the chain serves as the method of decentralization. + +We will explain how this security, consensus, and decentralization is achieved in the next few classes + +## POW Is Only a Part of Nakamoto Consensus + +However, POW is only one component of the four components of the whole consensus mechanism. + +In the next class we will explain the general mechanism of Nakamoto Consensus! + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/index.zh.md b/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/index.zh.md new file mode 100644 index 0000000000..e8bd585612 --- /dev/null +++ b/content/blog/2023-11-23-etc-proof-of-work-course-3-how-does-proof-of-work-pow-work/index.zh.md @@ -0,0 +1,87 @@ +--- +title: "ETC工作证明课程:3. 工作证明(POW)是如何工作的?" +date: 2023-11-23 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["series", "education"] +linkImage: ./banner.png +--- + +--- +**您可以由此收听或观看本期内容:** + + + +--- + +在上一堂课,第2节,我们解释了中本聪在发明比特币时的精彩思想,即工作证明的密码印章不仅可以用来在互联网上创建黄金的类比,称为“比特黄金”,而且POW本身的信息可以成为全球网络的所有节点在同一时间完全孤立地处于数据库相同状态的焦点,无需与任何其他来源或权威咨询。 + +这是去中心化和工作证明的重要性所在。 + +在本节课中,我们将解释POW实际是如何工作的,在接下来的几节中,我们将展示一个包含POW过程四个步骤的图表,并解释每个步骤。 + +## 工作量证明的四步操作 + +![](./0.png) + +以上是POW过程的完整图表。第一步是对数据进行加密戳或哈希,第二步是哈希本身,第三步是达到协议设定的目标,第四步是赢得奖励。 + +## 1. 数据加密戳 + +![](./1.png) + +由于区块链是数据块的链,这些块通过在下一个块中包含前一个块的加密戳或哈希来相互关联。因此,当前的交易被添加到要进行哈希的数据中,加上一个时间戳,最后加上一个我们将在第3步中解释的随机迭代号。 + +## 2. 密码印章 + +![](./2.png) + +该过程的第二步是将前一步描述的数据通过密码哈希算法。完成此操作后,为该特定块生成一个新的戳或哈希。这些哈希是非常大的十六进制数,看起来像这样: + +` +686f746a95b6f836d7d70567c302c3f9ebb5ee0def3d1220ee9d4e9f34f5e131 +` + +## 3. 达到目标 + +![](./3.png) + +第三步是检查哈希数是否达到网络算法强加的目标。如果未命中目标,矿工将返回到上一步,更改随机迭代号,然后生成一个新的哈希并重试,他们每秒每轮可能会这样做数万亿次! + +## 4. 赢得奖励 + +![](./4.png) + +POW方法的第四步是达到目标。当任何矿工达到目标时,他们就赢得了该块的奖励! + +## 这场矿工竞争的结果是什么? + +因此,总的来说,矿工将交易分组成批次,为其添加时间戳,前一个块的密码戳或哈希以及一个随机迭代号。一旦完成此操作,他们为这个新块创建一个新的密码戳,立即检查它是否命中协议确定的特定目标。 + +如果未命中目标,矿工将返回,尽快更改随机迭代号并重试。如果他们再次未命中目标,他们将再次尝试,一遍又一遍,直到其中一个矿工达到目标。 + +他们可能每秒会执行数万亿次尝试,这就是为什么消耗了如此多的能量,并被称为“工作证明”的原因,因为只有通过不断尝试,使用大量的计算能力和电力,统计上才有一个矿工在标准区块时间范围内(比特币为10分钟,以太经典为13秒)命中目标的可能性。 + +结果是矿工之间的竞争,看谁先达到目标。这是激励他们不断增加计算能力的动力。 + +参与竞争的矿工越来越多,区块链的集体计算能力就越来越大,不断增长的哈希率提高了系统的安全性。 + +是不是太精彩了? + +通过使用大量工作和电力创建的密码戳更加安全,因为系统的所有节点汇聚到决定下一个块的焦点,攻击变得极其困难。 + +此外,链中所有块的累积工作作为去中心化的方法。 + +在接下来的几堂课中,我们将解释如何实现这种安全性、共识和去中心化。 + +## POW仅是中本聪共识的一部分 + +然而,POW只是整个共识机制的四个组成部分之一。 + +在下一堂课中,我们将解释中本聪共识的总体机制! + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC: https://ethereumclassic.org diff --git a/content/blog/2023-11-28-the-ethereum-classic-contributions-app/1.png b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/1.png new file mode 100644 index 0000000000..994046b843 Binary files /dev/null and b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/1.png differ diff --git a/content/blog/2023-11-28-the-ethereum-classic-contributions-app/10.png b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/10.png new file mode 100644 index 0000000000..f854a71923 Binary files /dev/null and b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/10.png differ diff --git a/content/blog/2023-11-28-the-ethereum-classic-contributions-app/11.png b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/11.png new file mode 100644 index 0000000000..19459ed4f2 Binary files /dev/null and b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/11.png differ diff --git a/content/blog/2023-11-28-the-ethereum-classic-contributions-app/2.png b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/2.png new file mode 100644 index 0000000000..6df3f471d5 Binary files /dev/null and b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/2.png differ diff --git a/content/blog/2023-11-28-the-ethereum-classic-contributions-app/3.png b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/3.png new file mode 100644 index 0000000000..beab548b34 Binary files /dev/null and b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/3.png differ diff --git a/content/blog/2023-11-28-the-ethereum-classic-contributions-app/4.png b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/4.png new file mode 100644 index 0000000000..8c4c7ff4cf Binary files /dev/null and b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/4.png differ diff --git a/content/blog/2023-11-28-the-ethereum-classic-contributions-app/5.png b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/5.png new file mode 100644 index 0000000000..08850aa639 Binary files /dev/null and b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/5.png differ diff --git a/content/blog/2023-11-28-the-ethereum-classic-contributions-app/6.png b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/6.png new file mode 100644 index 0000000000..e800f7e532 Binary files /dev/null and b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/6.png differ diff --git a/content/blog/2023-11-28-the-ethereum-classic-contributions-app/7.png b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/7.png new file mode 100644 index 0000000000..7d99a2af0e Binary files /dev/null and b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/7.png differ diff --git a/content/blog/2023-11-28-the-ethereum-classic-contributions-app/8.png b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/8.png new file mode 100644 index 0000000000..17ef47f59e Binary files /dev/null and b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/8.png differ diff --git a/content/blog/2023-11-28-the-ethereum-classic-contributions-app/9.png b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/9.png new file mode 100644 index 0000000000..60c729ecfb Binary files /dev/null and b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/9.png differ diff --git a/content/blog/2023-11-28-the-ethereum-classic-contributions-app/banner.png b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/banner.png new file mode 100644 index 0000000000..b33813b9b8 Binary files /dev/null and b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/banner.png differ diff --git a/content/blog/2023-11-28-the-ethereum-classic-contributions-app/index.md b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/index.md new file mode 100644 index 0000000000..dab4dbea34 --- /dev/null +++ b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/index.md @@ -0,0 +1,169 @@ +--- +title: "The Ethereum Classic Contributions App" +date: 2023-11-28 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["guide"] +linkImage: ./banner.png +--- + +--- +**You can listen to or watch this video here:** + + + +--- + +![](./1.png) + +[Istora Mandiri](https://github.com/IstoraMandiri) is one of the most important volunteer contributors to Ethereum Classic (ETC). He has built the [ethereumclassic.org](https://ethereumclassic.org/) website, wrote most or all of the static content (and some important posts as well), he wrote the [seminal essay](https://www.ethereumclassicclassic.org/) that finally defeated the Treasury attempt in ETC, he conducted the [ETC community calls](https://www.youtube.com/channel/UCp07VPnC1ejyAp5gMvvA4dw), he is building an application called [NourishMint](https://youtu.be/1nPnG8YHEFA?si=L28OHfzh7rHpyJyz) to incentivize other community members to contribute to ETC, and he built the app that is the subject of this post: the Ethereum Classic [Contributions](https://etc.contributions.app/) app! + +Many people wish to contribute to the ETC assets mentioned above, but the problem is that it would require knowledge of how to use a platform for developers called GitHub. + +Therefore, a tool was needed to help this segment of the community so they could help keep the information about various aspects of Ethereum Classic up to date. + +## What Is the ETC Contributions App? + +![](./2.png) + +This is why Istora decided to build the Ethereum Classic Contributions web application to make it very easy for any user globally to add content to the different ETC community assets without having to learn how to use GitHub. + +By going to the link [etc.contributions.app](https://etc.contributions.app/) anyone may contribute various types of content to ETC. + +One of the great benefits of this system is that it not only opens the door for the general community to contribute, but it does it in a more decentralized manner and democratically, enabling anyone in the world to propose content. + +The security of the system is a team of administrators who curate the content before publication. + +## Contributing Anonymously + +![](./3.png) + +Another of the benefits is that users of the app may add their suggestions anonymously by just pressing on the CONTRIBUTE button and adding their proposals. + +As long as the content is relevant and positive for Ethereum Classic, it will be posted. + +## Contributing Credited + +![](./4.png) + +However, if contributors wish to be credited with their additions, then they can create an account on GitHub and login to the app by pressing the button SIGN IN WITH GITHUB. + +In this case the contributions will be identified with the contributor’s user ID on GitHub. + +In any case, users still don’t have to learn how to use GitHub to get credit. + +The option for accreditation is voluntary and only to identify the user who wishes so and is submitting the proposal. + +## Contribution Types + +![](./5.png) + +Regardless of anonymity or accreditation, all users may contribute any of these six types of content: + +- ETH_Classic tweets +- ETC_Network tweets +- App submissions +- Video submissions +- News article submissions +- Links to services submissions + +The first two are tweets that are published on the Ethereum Classic X accounts which are [@eth_classic](https://twitter.com/eth_classic) and [@etc_network](https://x.com/etc_network). + +The last four are submissions that are published on the [ethereumclassic.org](https://ethereumclassic.org/) website, in their corresponding sections. + +## Contributing ETH_Classic Tweets + +![](./6.png) + +To contribute to the [@eth_classic](https://twitter.com/eth_classic) X account of the ETC community, users need to press on the CONTRIBUTE button on the home of the app, and then on the “@eth_classic tweets” section in the next screen. + +In the next step, the contributions app will show users the form to fill so they can propose a tweet to the ETC admins. + +The options are to create a new tweet from scratch, to do a retweet, or to reply to a tweet. + +Then, there is a field to add the text which may include links, hashtags, and emojis. + +Finally, the app lets users add images to tweets as well. + +## Contributing ETC_Network Tweets + +![](./7.png) + +To contribute to the [@etc_network](https://x.com/etc_network) X account of the ETC community, the process is the same as with the [@eth_classic](https://twitter.com/eth_classic) account. Users have to press on the CONTRIBUTE button on the home of the app, and then select the “@etc_network tweets” section in the next screen. + +In the next step, the contributions app will show users the form to fill so they can propose a tweet to the ETC admins. + +The options are to create a new tweet from scratch, to do a retweet, or to reply to a tweet. + +Then, there is a field to add the text which may include links, hashtags, and emojis. + +At the bottom, the app lets users add images to tweets as well. + +## Submitting an App + +![](./8.png) + +To submit a new decentralized application, or dapp, to the ETC community website, users need to press on the CONTRIBUTE button and then select “Application” in the menu. + +Once in the form, users must fill the following fields and items: + +- App category +- App name +- URL to launch the app +- App description +- Upload an app icon +- Author name +- Author link + +Then there are other optional fields that dapp developers may use to enhance their listing and trust in their application. + +## Submitting a Video + +![](./9.png) + +To submit a new video link to the ETC community website, users need to press on the CONTRIBUTE button and then select “Video” in the menu. + +Once in the form, users must fill the following fields and items: + +- YouTube video ID or link +- Tags to mark what type it is +- Override title in case the user does not want to use the original title of the video +- An optional description of the video +- The language in which the video is featured + +## Submitting a News Article + +![](./10.png) + +To submit a news article link to the ETC community website, users need to press on the CONTRIBUTE button and then select “News Article” in the menu. + +Once in the form, users must fill the following fields and items: + +- Article title +- Article URL +- Author name +- Source name +- Published date +- Tags + +Both in videos and articles submissions, it is important for users to propose content that is truly referred to ETC rather than tangential topics. + +## Submitting a Service Link + +![](./11.png) + +There are many services that support ETC in the market and many are listed on the Ethereum Classic community website. + +Any ETC service provider who wishes to submit a link to their product needs to press on the CONTRIBUTE button and then select “Service Link” in the menu. + +Once in the form, providers must fill the following fields and items: + +- Category +- Service name +- Service homepage or URL + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-11-28-the-ethereum-classic-contributions-app/index.zh.md b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/index.zh.md new file mode 100644 index 0000000000..953414009d --- /dev/null +++ b/content/blog/2023-11-28-the-ethereum-classic-contributions-app/index.zh.md @@ -0,0 +1,169 @@ +--- +title: "以太坊经典贡献应用" +date: 2023-11-28 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["guide"] +linkImage: ./banner.png +--- + +--- +**由此收听或观看本期内容:** + + + +--- + +![](./1.png) + +[Istora Mandiri](https://github.com/IstoraMandiri) 是以太经典(Ethereum Classic,简称 ETC)最重要的志愿贡献者之一。他创建了 [ethereumclassic.org](https://ethereumclassic.org/) 网站,编写了大部分或所有静态内容(以及一些重要的帖子),他还写了[开创性的文章](https://www.ethereumclassicclassic.org/),最终击败了 ETC 中的财政尝试。他主持了 [ETC 社区会议](https://www.youtube.com/channel/UCp07VPnC1ejyAp5gMvvA4dw),他正在构建一款名为 [NourishMint](https://youtu.be/1nPnG8YHEFA?si=L28OHfzh7rHpyJyz) 的应用,以激励其他社区成员为 ETC 做出贡献,而且他还建立了这篇文章所涉及的应用程序:Ethereum Classic [Contributions](https://etc.contributions.app/) 应用程序! + +许多人希望为上述 ETC 资产做出贡献,但问题是这需要使用一个名为 GitHub 的开发者平台的知识。 + +因此,需要一个工具来帮助社区中的这一部分人,使他们能够帮助保持有关以太经典各个方面的信息最新。 + +## 什么是 ETC Contributions App? + +![](./2.png) + +这就是为什么 Istora 决定构建以太经典贡献网络应用程序,使任何全球用户都能轻松添加内容到不同的 ETC 社区资产,而无需学习如何使用 GitHub。 + +通过访问链接 [etc.contributions.app](https://etc.contributions.app/),任何人都可以为 ETC 贡献各种类型的内容。 + +这个系统的一个巨大优势是它不仅为一般社区打开了贡献之门,而且以更加去中心化和民主的方式实现,使世界上的任何人都能提出内容建议。 + +系统的安全性由一组管理员团队负责,在发布之前审核内容。 + +## 匿名贡献 + +![](./3.png) + +另一个好处是应用程序的用户可以通过仅需点击“贡献”按钮并添加他们的建议来匿名地提出建议。 + +只要内容与以太经典相关且积极,它将被发布。 + +## 认可贡献 + +![](./4.png) + +然而,如果贡献者希望为他们的添加获得认可,那么他们可以在 GitHub 上创建帐户并通过按下“使用 GitHub 登录”按钮登录应用程序。 + +在这种情况下,贡献将使用贡献者在 GitHub 上的用户 ID 进行标识。 + +无论如何,用户仍然不必学习如何使用 GitHub 就能获得认可。 + +认证选项是自愿的,仅用于识别希望这样做并提交建议的用户。 + +## 贡献类型 + +![](./5.png) + +无论匿名还是认证,所有用户都可以贡献以下六种类型的内容: + +- ETH_Classic 推文 +- ETC_Network 推文 +- 应用提交 +- 视频提交 +- 新闻文章提交 +- 服务链接提交 + +前两者是发布在以太经典 X 账户上的推文,这些账户是 [@eth_classic](https://twitter.com/eth_classic) 和 [@etc_network](https://x.com/etc_network)。 + +最后四个是在 [ethereumclassic.org](https://ethereumclassic.org/) 网站上发布的提交,在其相应部分中。 + +## 贡献 ETH_Classic 推文 + +![](./6.png) + +要为 ETC 社区的 [@eth_classic](https://twitter.com/eth_classic) X 账户做贡献,用户需要在应用程序的主页上点击“贡献”按钮,然后在接下来的屏幕中选择“@eth_classic 推文”部分。 + +在下一步中,贡献应用程序将向用户展示填写表格的界面,以便他们可以向 ETC 管理员提议推文。 + +用户可以选择从头开始创建新推文,转推,或回复推文。 + +然后,有一个字段可添加文本,其中可能包括链接、标签和表情符号。 + +最后,该应用程序允许用户向推文中添加图片。 + +## 贡献 ETC_Network 推文 + +![](./7.png) + +要为 ETC 社区的 [@etc_network](https://x.com/etc_network) X 账户做贡献,流程与 [@eth_classic](https://twitter.com/eth_classic) 账户相同。用户需要在应用程序的主页上点击“贡献”按钮,然后在接下来的屏幕中选择“@etc_network 推文”部分。 + +在下一步中,贡献应用程序将向用户展示填写表格的界面,以便他们可以向 ETC 管理员提议推文。 + +用户可以选择从头开始创建新推文,转推,或回复推文。 + +然后,有一个字段可添加文本,其中可能包括链接、标签和表情符号。 + +在底部,该应用程序还允许用户向推文中添加图片。 + +## 提交应用 + +![](./8.png) + +要向 ETC 社区网站提交新的去中心化应用程序(DApp),用户需要点击“贡献”按钮,然后在菜单中选择“应用”。 + +进入表格后,用户必须填写以下字段和项目: + +- 应用类别 +- 应用名称 +- 启动应用的 URL +- 应用描述 +- 上传应用图标 +- 作者名称 +- 作者链接 + +然后还有其他可选字段,DApp 开发者可以使用这些字段来增强他们的列表和提高对他们应用程序的信任。 + +## 提交视频 + +![](./9.png) + +要向 ETC 社区网站提交新的视频链接,用户需要点击“贡献”按钮,然后在菜单中选择“视频”。 + +进入表格后,用户必须填写以下字段和项目: + +- YouTube 视频 ID 或链接 +- 标记视频类型的标签 +- 在用户不想使用视频的原始标题时覆盖标题的可选标题 +- 视频的可选描述 +- 视频特色的语言 + +## 提交新闻文章 + +![](./10.png) + +要向 ETC 社区网站提交新闻文章链接,用户需要点击“贡献”按钮,然后在菜单中选择“新闻文章”。 + +进入表格后,用户必须填写以下字段和项目: + +- 文章标题 +- 文章 URL +- 作者姓名 +- 来源名称 +- 发布日期 +- 标签 + +在视频和文章提交中,用户应该提出真正与 ETC 有关而不是离题的内容。 + +## 提交服务链接 + +![](./11.png) + +市场上有许多支持 ETC 的服务,而许多都在以太经典社区网站上列出。 + +任何希望向其产品提交链接的 ETC 服务提供商都需要点击“贡献”按钮,然后在菜单中选择“服务链接”。 + +进入表格后,提供商必须填写以下字段和项目: + +- 类别 +- 服务名称 +- 服务主页或 URL + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC,欢迎访问: https://ethereumclassic.org diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/0.png b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/0.png new file mode 100644 index 0000000000..f734443627 Binary files /dev/null and b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/0.png differ diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/1.png b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/1.png new file mode 100644 index 0000000000..30c39f3202 Binary files /dev/null and b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/1.png differ diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/10.png b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/10.png new file mode 100644 index 0000000000..c4be67b9f1 Binary files /dev/null and b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/10.png differ diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/11.png b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/11.png new file mode 100644 index 0000000000..790dfafff6 Binary files /dev/null and b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/11.png differ diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/12.png b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/12.png new file mode 100644 index 0000000000..8408440e6d Binary files /dev/null and b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/12.png differ diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/13.png b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/13.png new file mode 100644 index 0000000000..7729206e0f Binary files /dev/null and b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/13.png differ diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/14.png b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/14.png new file mode 100644 index 0000000000..c7da97ba27 Binary files /dev/null and b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/14.png differ diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/2.png b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/2.png new file mode 100644 index 0000000000..253f06f72c Binary files /dev/null and b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/2.png differ diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/3.png b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/3.png new file mode 100644 index 0000000000..7c4ae50198 Binary files /dev/null and b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/3.png differ diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/4.png b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/4.png new file mode 100644 index 0000000000..0b2f43e618 Binary files /dev/null and b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/4.png differ diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/5.png b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/5.png new file mode 100644 index 0000000000..291e93c51c Binary files /dev/null and b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/5.png differ diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/6.png b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/6.png new file mode 100644 index 0000000000..56f783def0 Binary files /dev/null and b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/6.png differ diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/7.png b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/7.png new file mode 100644 index 0000000000..c12359582a Binary files /dev/null and b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/7.png differ diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/8.png b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/8.png new file mode 100644 index 0000000000..0543acd352 Binary files /dev/null and b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/8.png differ diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/9.png b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/9.png new file mode 100644 index 0000000000..6be8d78873 Binary files /dev/null and b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/9.png differ diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/banner1.png b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/banner1.png new file mode 100644 index 0000000000..f4af660553 Binary files /dev/null and b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/banner1.png differ diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/index.md b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/index.md new file mode 100644 index 0000000000..26392463a4 --- /dev/null +++ b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/index.md @@ -0,0 +1,121 @@ +--- +title: "Using the DappNode VPN With Your ETC Nodes" +date: 2023-11-29 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["series", "education"] +linkImage: ./banner1.png +--- + +--- +**You can listen to or watch this video here:** + + + +--- + +![](./0.png) + +The DappNode hardware node is a device that lets users run nodes from their homes or offices. + +The Ethereum Classic (ETC) core developer team maintains ETC client packages in the DappNode DappStore that users may activate to run ETC mainnet and testnet nodes. + +One of the features of the DappNode product is that it allows users to access their ETC nodes from remote locations globally using a VPN connection. + +In this post we will explain how to connect to your DappNode instance from remote locations using the WireGuard VPN protocol. + +If you don’t have a DappNode yet and wish to get one to run ETC nodes, please follow the instructions in the post we wrote about the subject: + +How to Run an Ethereum Classic Node Using DappNode + +In the following sections we will explain how to connect to your DappNode using the DappNode VPN service. + +## 1. Connect to Your DappNode in Your Local WiFi Network + +![](./1.png) + +If you already got and set up your DappNode to run your ETC nodes, then access it by connecting to its WiFi network again, and then typing “my.dappnode” on your browser. When the DappNode user interface (UI) opens, you will see the DappNode dashboard with your ETC nodes running. + +## 2. Go to the VPN Tab on the Menu and Select the WireGuard Option + +![](./2.png) + +To be able to connect to your DappNode remotely, from anywhere in the world using VPN, go to the VPN tab and then select the “WireGuard” option. This is the recommended protocol by DappNode. The DappNode team actually runs VPN servers so their users may connect to their local nodes. + +## 3. Go to the WireGuard Connection Documentation + +![](./3.png) + +In the WireGuard VPN screen on your DappNode UI, click on the “How to connect to your Dappnode VPN” link. There, you will see all the documentation pertaining to the DappNode WireGuard VPN service. + +## 4. Click on the WireGuard Website Link + +![](./4.png) + +Once on the documentation, scroll down to section 2 and click on the link to the WireGuard website. + +## 5. Click on the WireGuard Client for Your Operating System + +![](./5.png) + +On the WireGuard website, you will see all the client download options for the different operating systems. Click on the one for your operating system to install the WireGuard client on your computer. In our case we used the macOS installation option. + +## 6. Download the WireGuard Client + +![](./6.png) + +If in your operating system you need to use the App Store, Google Play, or other repository, then install the WireGuard client from there to your computer. In our case we downloaded and installed WireGuard from the Apple App Store. + +## 7. Open Your WireGuard Client on Your Computer + +![](./7.png) + +Once downloaded and installed, open your WireGuard application on your computer. + +## 8. Add a New Tunnel on Your WireGuard Client + +![](./8.png) + +Once opened, you will see the WireGuard icon on your desktop screen above or below depending on your operating system. Click on it and select “Manage Tunnels”. Next, you will see the WireGuard box to manage tunnels. Click on the “+” button on the box, or on the option that will let you add a tunnel, but NOT on the “Import tunnel(s) from file” button. + +## 9. See the WireGuard New Tunnel Form + +![](./9.png) + +In the next step, you will see the new tunnel form. In it, you will enter the WireGuard credentials for your local DappNode and the name of this tunnel, but first we need to get the credentials from our DappNode in the next section. + +## 10. Get Your WireGuard Link Credentials From Your DappNode + +![](./10.png) + +To get the VPN credentials, go back to your DappNode UI, go again to the VPN tab, to the WireGuard sub-page, and click on the “Get link” button. + +## 11. Copy the VPN Credentials of Your DappNode + +![](./11.png) + +When the credentials section opens, then copy that text and go back to the WireGuard new channel form. + +## 12. Paste the Credentials on WireGuard and Name Your Channel + +![](./12.png) + +On the WireGuard form, delete whatever text was there before and paste the new credentials for your DappNode. Also, name this channel in the field above on the form, and then press “Save”. In our case we named our channel “dappnode_admin” and we pasted our credentials, but, for this example, we obfuscated our channel data for security reasons. + +## 13. Activate Your Channel + +![](./13.png) + +In the next step, your WireGuard client will show your new channel already created. Now, you need to press the “Activate” button to go live with your new VPN connection. + +## 14. Connect Remotely to Your DappNode ETC Nodes + +![](./14.png) + +Once you activated your new channel on your computer you need to wait a few minutes for the information to propagate to the corresponding servers and clients. Then, you can connect to your DappNode remotely!! As an example, in the image in this section, you will see that the WireGuard client icon is bright white now on our display, and we are connected from a remote location to our local network (my phone’s hotspot). From now on, you may connect to your DappNode from anywhere in the world using any WiFi connection by opening your WireGuard client on your computer and activating your DappNode tunnel!! + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/index.zh.md b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/index.zh.md new file mode 100644 index 0000000000..e39ab2ddbc --- /dev/null +++ b/content/blog/2023-11-29-using-the-dappnode-vpn-with-your-etc-nodes/index.zh.md @@ -0,0 +1,121 @@ +--- +title: "与ETC节点一起使用DappNode VPN" +date: 2023-11-29 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["series", "education"] +linkImage: ./banner1.png +--- + +--- +**由此收听或观看本期内容:** + + + +--- + +![](./0.png) + +DappNode 硬件节点是一种设备,允许用户在他们的家或办公室运行节点。 + +以太经典(ETC)核心开发团队在 DappNode DappStore 中维护 ETC 客户端包,用户可以激活以运行 ETC 主网和测试网节点。 + +DappNode 产品的一个特点是它允许用户使用 VPN 连接从全球任何地方远程访问他们的 ETC 节点。 + +在本文中,我们将解释如何使用 WireGuard VPN 协议从远程位置连接到您的 DappNode 实例。 + +如果您还没有 DappNode 并希望获取一个来运行 ETC 节点,请按照我们关于此主题的文章中的说明操作: + +如何使用 DappNode 运行以太经典节点 + +在接下来的部分中,我们将解释如何使用 DappNode VPN 服务连接到您的 DappNode。 + +## 1. 在本地 WiFi 网络中连接到您的 DappNode + +![](./1.png) + +如果您已经获得并设置了 DappNode 以运行您的 ETC 节点,请再次连接到其 WiFi 网络,然后在浏览器中输入“my.dappnode”。当 DappNode 用户界面(UI)打开时,您将看到带有正在运行的 ETC 节点的 DappNode 仪表板。 + +## 2. 转到菜单中的 VPN 选项卡并选择 WireGuard 选项 + +![](./2.png) + +要能够从世界各地的任何地方远程连接到您的 DappNode,请转到 VPN 选项卡,然后选择“WireGuard”选项。这是 DappNode 推荐的协议。DappNode 团队实际上运行 VPN 服务器,以便用户可以连接到他们的本地节点。 + +## 3. 转到 WireGuard 连接文档 + +![](./3.png) + +在您的 DappNode UI 上的 WireGuard VPN 屏幕上,点击“如何连接到您的 DappNode VPN”链接。在那里,您将看到有关 DappNode WireGuard VPN 服务的所有文档。 + +## 4. 点击 WireGuard 网站链接 + +![](./4.png) + +一旦进入文档,滚动到第 2 节,然后点击链接到 WireGuard 网站的链接。 + +## 5. 选择适用于您操作系统的 WireGuard 客户端 + +![](./5.png) + +在 WireGuard 网站上,您将看到不同操作系统的所有客户端下载选项。点击适用于您操作系统的选项,以在计算机上安装 WireGuard 客户端。在我们的情况下,我们使用了 macOS 安装选项。 + +## 6. 下载 WireGuard 客户端 + +![](./6.png) + +如果在您的操作系统中需要使用 App Store、Google Play 或其他仓库,则从那里将 WireGuard 客户端安装到您的计算机。在我们的情况下,我们从 Apple App Store 下载并安装了 WireGuard。 + +## 7. 打开您计算机上的 WireGuard 客户端 + +![](./7.png) + +下载并安装后,在您的计算机上打开 WireGuard 应用程序。 + +## 8. 在 WireGuard 客户端上添加新的隧道 + +![](./8.png) + +一旦打开,您将在桌面屏幕上看到 WireGuard 图标,位置取决于您的操作系统是在上方还是在下方。点击它并选择“管理隧道”。接下来,您将看到管理隧道的 WireGuard 窗口。点击窗口上的“+”按钮,或者选择允许您添加隧道的选项,但不要点击“从文件导入隧道”按钮。 + +## 9. 查看 WireGuard 新隧道表单 + +![](./9.png) + +在下一步中,您将看到新的隧道表单。在其中,您将输入您的本地 DappNode 的 WireGuard 凭据以及此隧道的名称,但首先我们需要在下一节中从我们的 DappNode 获取凭据。 + +## 10. 从您的 DappNode 获取 WireGuard 链接凭据 + +![](./10.png) + +要获取 VPN 凭据,请返回到您的 DappNode UI,再次转到 VPN 选项卡,到 WireGuard 子页面,并点击“获取链接”按钮。 + +## 11. 复制您的 DappNode 的 VPN 凭据 + +![](./11.png) + +当凭据部分打开时,复制该文本,然后返回到 WireGuard 新通道表单。 + +## 12. 在 WireGuard 上粘贴凭据并为您的通道命名 + +![](./12.png) + +在 WireGuard 表单上,删除之前存在的任何文本并粘贴您的 DappNode 的新凭据。此外,在表单上方的字段中为此通道命名,然后按“保存”。在我们的情况下,我们将通道命名为“dappnode_admin”并粘贴了我们的凭据,但出于安全原因,对于这个示例,我们对通道数据进行了模糊处理。 + +## 13. 激活您的通道 + +![](./13.png) + +在下一步中,您的 WireGuard 客户端将显示您已经创建的新通道。现在,您需要按下“激活”按钮以启动您的新 VPN 连接。 + +## 14. 从远程位置连接到您的 DappNode ETC 节点 + +![](./14.png) + +一旦在计算机上激活了新通道,您需要等待几分钟,以便信息传播到相应的服务器和客户端。然后,您可以远程连接到您的 DappNode!!例如,在本节的图像中,您将看到我们的显示屏上的 WireGuard 客户端图标现在是明亮的白色,我们已从远程位置连接到我们的本地网络(我手机的热点)。从现在开始,您可以通过打开计算机上的 WireGuard 客户端并激活 DappNode 隧道,从世界任何地方的任何 WiFi 连接连接到您的 DappNode! + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC,欢迎访问: https://ethereumclassic.org diff --git a/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/1.png b/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/1.png new file mode 100644 index 0000000000..91ec4e4758 Binary files /dev/null and b/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/1.png differ diff --git a/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/2.png b/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/2.png new file mode 100644 index 0000000000..7775826235 Binary files /dev/null and b/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/2.png differ diff --git a/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/3.png b/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/3.png new file mode 100644 index 0000000000..26b619c7d2 Binary files /dev/null and b/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/3.png differ diff --git a/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/4.png b/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/4.png new file mode 100644 index 0000000000..355ab5b683 Binary files /dev/null and b/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/4.png differ diff --git a/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/5.png b/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/5.png new file mode 100644 index 0000000000..09ca68ebc1 Binary files /dev/null and b/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/5.png differ diff --git a/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/banner.png b/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/banner.png new file mode 100644 index 0000000000..1771e2a7d4 Binary files /dev/null and b/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/banner.png differ diff --git a/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/index.md b/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/index.md new file mode 100644 index 0000000000..dc0476f02c --- /dev/null +++ b/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/index.md @@ -0,0 +1,83 @@ +--- +title: "ETC Proof of Work Course: 4. Why POW Based Nakamoto Consensus Is Secure and Complete" +date: 2023-11-30 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["series", "education"] +linkImage: ./banner.png +--- + +--- +**You can listen to or watch this video here:** + + + +--- + +In the previous class, 3, we explained how Proof of Work (POW) works, but that it is only a component of the general consensus mechanism technology that POW blockchains such as Bitcoin (BTC) and Ethereum Classic (ETC) use. + +We described the four steps of the POW process and explained that the competition between miners is what increases the computer power of the network, and that this growth in computing power is what makes the system more secure and valuable. + +In this class, we will explain the broader Nakamoto Consensus design, describe each step (which are also four), and then write about its features and benefits. + +## The Four Steps of Nakamoto Consensus + +![](./1.png) + +The four steps of the Nakamoto Consensus mechanism are the reception of new transactions, block building by miners, transmission of the blocks to the rest of the network, and block verification by node operators. + +## 1. Reception of New Transactions + +![](./2.png) + +A proof of work blockchain constantly receives transactions from users worldwide. When nodes in the network receive these transactions, they immediately turn around and re-send them to the rest of the nodes so they are fully replicated across the whole network. + +## 2. Miners Group Transactions Into Batches and Build Blocks + +![](./3.png) + +A subgroup of the participating machines in the system are what are called miners. When miners receive new transactions, they group them into batches and build the blocks doing a lot of work (hence “proof of work”) spending a lot of capital in infrastructure and electricity. (To learn how POW works, please see class 3.) + +## 3. Finished Blocks Are Sent to Verifying Nodes + +![](./4.png) + +When miners produce blocks, they immediately send them to the rest of the network for verification. As miners are competing with each other, it is imperative for them for the rest of the network to acknowledge their newly created blocks as soon as possible in case competing blocks are propagating across the network. + +## 4. Nodes Verify Blocks, Add Them to the Blockchain, And Pay Miners + +![](./5.png) + +When the rest of the network receives the blocks, they verify them, including all transactions and that the cryptographic stamp was correct, and then they add the block as the latest one in the chain. As blocks are verified, they pay the winning miner the reward for that specific round. + +## What Are the Features And Benefits of Nakamoto Consensus? + +The economic model described above has been working with 99%+ uptime in Bitcoin since 2009 and in ETC since 2014. It is a perfect, balanced, decentralized method that has worked for years. + +The benefits of proof of work based Nakamoto Consensus are decentralization, permissionlessness, and censorship resistance. + +Other benefits we have identified are: + +**Survivability:** Because of the POW based security in ETC, accounts, balances, and smart contracts will survive in the long term. + +**Unstoppability:** In ETC, currency transfers and decentralized applications are unstoppable. + +**Uncompromisable:** Accounts, balances, and decentralized applications cannot be compromised as in traditional systems. + +**Uncapturable:** ETC cannot be captured by government, corporations, or special interests. + +We will explain how all this is accomplished in class 7! + +## How Does Nakamoto Consensus Manage Hashrate Growth? + +As hashrate grows in a proof of work blockchain, blocks get faster, if blocks get faster then the money is printed faster and the database gets bloated quickly, compromising security. + +There had to be a method to regulate the timing of block creation not only when hashrate increased, but also when it decreased due to market conditions. + +The method created by Satoshi Nakamoto to accomplish this stabilization is something called the “difficulty adjustment” which we will explain in the next class, 5! + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/index.zh.md b/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/index.zh.md new file mode 100644 index 0000000000..381251f864 --- /dev/null +++ b/content/blog/2023-11-30-etc-roof-of-work-course-4-why-pow-based-nakamoto-consensus-is-secure-and-complete/index.zh.md @@ -0,0 +1,83 @@ +--- +title: "ETC工作证明课程:4. 为什么基于POW的中本聪共识是安全和完整的" +date: 2023-11-30 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["series", "education"] +linkImage: ./banner.png +--- + +--- +**由此收听或观看本期内容:** + + + +--- + +在上一堂课,第3节,我们解释了工作证明(POW)的工作原理,但指出这仅仅是POW区块链(如比特币(BTC)和以太坊经典(ETC))使用的一般共识机制技术的组成部分。 + +我们描述了POW过程的四个步骤,并解释了矿工之间的竞争是如何增加网络计算能力的,而这种计算能力的增长是使系统更安全和有价值的原因。 + +在这一课中,我们将解释更广泛的中本聪共识设计,描述每个步骤(也是四个步骤),然后写一些关于其特征和优势的内容。 + +## 中本聪共识的四个步骤 + +![](./1.png) + +中本聪共识机制的四个步骤是接收新交易、矿工构建区块、将区块传输到网络的其余部分以及节点操作员验证区块。 + +## 1. 接收新交易 + +![](./2.png) + +工作证明区块链不断接收来自全球用户的交易。当网络中的节点接收到这些交易时,它们立即将其重新发送到网络的其余节点,以便在整个网络中完全复制。 + +## 2. 矿工将交易分组并构建区块 + +![](./3.png) + +系统中参与的机器的一个子组被称为矿工。当矿工收到新交易时,他们将其分组并构建区块,通过大量工作(因此称为“工作证明”)在基础设施和电力方面花费大量资金。 (要了解POW的工作原理,请参见第3节。) + +## 3. 完成的区块被发送到验证节点 + +![](./4.png) + +当矿工产生区块时,他们立即将其发送到网络的其余部分进行验证。由于矿工彼此竞争,因此对于网络的其余部分尽快承认其新创建的区块是至关重要的,以防竞争区块正在网络中传播。 + +## 4. 节点验证区块,将其添加到区块链中,并支付矿工 + +![](./5.png) + +当网络的其余部分接收到区块时,它们验证区块,包括所有交易和加密戳是否正确,然后将该区块添加为链中的最新区块。随着区块的验证,它们向获胜的矿工支付该特定轮次的奖励。 + +## 中本聪共识的特点和优势是什么? + +上述经济模型自2009年比特币诞生以来一直在99%以上的正常运行,并且自2014年以太坊经典以来也一直如此。这是一个完美的、平衡的、分散的方法,已经运行多年。 + +基于工作证明的中本聪共识的优势包括分散化、无需许可和抗审查。 + +我们还确定的其他好处包括: + +**生存能力:** 由于ETC基于POW的安全性,账户、余额和智能合约将在长期内保持存在。 + +**不可阻挡:** 在ETC中,货币转移和去中心化应用是无法阻挡的。 + +**不可妥协:** 账户、余额和去中心化应用程序无法像传统系统中那样被妥协。 + +**不可俘获:** ETC不能被政府、公司或特殊利益所俘获。 + +我们将在第7节中解释所有这些是如何实现的! + +## 中本聪共识如何管理算力增长? + +随着工作证明区块链的算力增长,区块的速度加快,如果区块速度加快,那么货币的印刷速度就会加快,数据库会迅速膨胀,从而危及安全性。 + +必须有一种方法来调节区块创建的时间,不仅在算力增加时,而且在由于市场条件而减少时。 + +中本聪创造的用于实现这种稳定的方法被称为“难度调整”,我们将在下一课,第5节中解释。 + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC,欢迎访问: https://ethereumclassic.org diff --git a/content/blog/2023-12-05-the-7-keys-to-ethereum-classic-success/banner-1.png b/content/blog/2023-12-05-the-7-keys-to-ethereum-classic-success/banner-1.png new file mode 100644 index 0000000000..8a5685aed8 Binary files /dev/null and b/content/blog/2023-12-05-the-7-keys-to-ethereum-classic-success/banner-1.png differ diff --git a/content/blog/2023-12-05-the-7-keys-to-ethereum-classic-success/banner.png b/content/blog/2023-12-05-the-7-keys-to-ethereum-classic-success/banner.png new file mode 100644 index 0000000000..d61af31fb9 Binary files /dev/null and b/content/blog/2023-12-05-the-7-keys-to-ethereum-classic-success/banner.png differ diff --git a/content/blog/2023-12-05-the-7-keys-to-ethereum-classic-success/index.md b/content/blog/2023-12-05-the-7-keys-to-ethereum-classic-success/index.md new file mode 100644 index 0000000000..e93e2857ee --- /dev/null +++ b/content/blog/2023-12-05-the-7-keys-to-ethereum-classic-success/index.md @@ -0,0 +1,103 @@ +--- +title: "The 7 Keys to Ethereum Classic's Success" +date: 2023-12-05 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["philosophy"] +linkImage: ./banner-1.png +--- + +--- +**You can listen to or watch this video here:** + + + +--- + +![](./banner-1.png) + +On a macro level, the blockchain industry may be divided into two large categories; the truly decentralized blockchains and the centralized systems that try to mimic the attributes of decentralized blockchains but changing some parts of their designs to conform to certain misguided ideas. + +However, these misguided changes in themselves are what remove the main attribute of true blockchains which is trust minimization. + +The other categorization is between those networks that are more versatile and those that are narrow in their use cases. + +In this post we will explain the 7 key reasons why Ethereum Classic (ETC) is in the most valuable position with regards to these categorizations. + +## 1. ETC Is a Proof of Work Blockchain + +ETC is a proof of Work (POW) blockchain, and this puts it in the category of truly decentralized systems because POW is the only way known to man that guarantees decentralization and the free participation of any node in a peer to peer network. + +By “free participation” we mean that anyone in the world may operate a node or mine ETC without any permission or censorship. + +It also means that anyone in the world may send transactions and have addresses with balances in ETC with the guarantee that they will not be confiscated nor tampered with by any special interest. + +POW aditionally means that there is a cryptographic wall that protects the history of transactions in the system that is practically impossible to violate. + +## 2. ETC Is Hard Money + +ETC is hard money because it is a POW blockchain, therefore the cost of creating the blocks is the cost of creating the coins, thus creating scarcity, unforgeable costliness, and value similar to gold in the real world. + +ETC also has a fixed coin supply schedule in its monetary policy, meaning that there will only be 210,700,000 ETC ever in existence. + +This stock is being issued as rewards are paid to miners on a per block basis, and is managed by reducing the amount paid by 20% every two years. + +The current inflation rate in ETC as per its present issuance is 3.91%; it will be less than 2% by 2032; and less than 1% by 2036. This trend will tend to zero in the following years. + +As hard money, ETC protects the value of users’ savings and investments in the long term. + +## 3. ETC Is Programmable + +Ethereum Classic is programmable at the base layer through smart contracts inside its highly secure environment. + +Smart contracts are software programs that when they are sent to the network, they get replicated in all the nodes of the systems, therefore becoming totally decentralized. + +The other competing POW chains such as Bitcoin, Litecoin, DOGE, Monero, or Kaspa, are not programmable, thus are simple and limited systems that only hold accounts, balances, and can move money from one account to the other, but nothing else. + +ETC is a leap in versatility comparable to how computers were a leap in versatility versus pocket calculators in 1980s. + +## 4. ETC Is Fully Replicated + +ETC’s blockchain; or database, with accounts, balances, and smart contracts; is fully replicated, meaning that 100% of the nodes keep an identical copy of all the information. The more nodes there are, the more secure the system is. + +This was the original goal of blockchains; to achieve the full replication of the data in as many participating peers as possible to guarantee maximal redundancy. + +POW was the key to achieve this replication through consensus in a decentralized way, and is actually the second most important security guarantee of the technology. + +Full replication was the first security guarantee, and it offers a redundancy that makes the system resistant to tampering by man or destruction by nature. ETC can survive even a nuclear war! + +## 5. ETC Is Composable + +Ethereum Classic is composable, which is a very important quality. + +Composability is possible because all accounts, balances, and decentralized software programs are inside the same system, therefore complex multi-app transactions may be performed in single transaction executions. + +When systems are separated; such as in Bitcoin, where the money is inside the blockchain but the applications are in other external platforms, because BTC is not programmable; then complex multi-app transactions are not possible as the blockchain does not have certainty of what is the state of the external system and the external system does not have certainty of what is the state of the blockchain. + +Composability is very important because it enables instantaneous transactions, shorter settlement times, reduces friction, and lowers transactional costs. + +## 6. ETC Is the Largest POW Smart Contracts Blockchain in the World + +Since Ethereum migrated to proof of stake in September of 2022, Ethereum Classic has become the largest proof of work smart contracts blockchain in the world. + +Having this position makes ETC extremely attractive because, when markets start to realize that proof of stake and proof of authority consensus are centralized and vulnerable, developers, investors, users, miners, and node operators will start to move to ETC. + +In the blockchain industry, security is only achieved through proof of work, and proof of work is only secure when the blockchain is the largest in its POW algorithm. + +ETC is now the largest blockchain in the ETHash/ETCHash algorithm, which makes it the most secure in that aspect as well. + +## 7. Applications in ETC Are the Most Secure Apps in the World + +![](./banner.png) + +Applications in ETC are the most secure in the world because the combination of proof of work, hard money, programmability, full replication, composability, and the fact that it is the largest in its category make it the most secure environment there is to run and execute applications. + +There is no other place in the universe where applications can be more secure than it ETC. + +Not in military data centers, not in corporate data centers, not in cloud services, and not in any kind of network that is not the largest proof of work programmable blockchain. + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-12-05-the-7-keys-to-ethereum-classic-success/index.zh.md b/content/blog/2023-12-05-the-7-keys-to-ethereum-classic-success/index.zh.md new file mode 100644 index 0000000000..ce377157b5 --- /dev/null +++ b/content/blog/2023-12-05-the-7-keys-to-ethereum-classic-success/index.zh.md @@ -0,0 +1,105 @@ +--- +title: "7个决定ETC成功的关键因素" +date: 2023-12-05 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["philosophy"] +linkImage: ./banner-1.png +--- + +--- +**您可以由此收听或观看本期内容:** + + + +--- + +![](./banner-1.png) + +宏观上,区块链行业可以分为两大类:真正分散的区块链和试图模仿分散区块链属性但改变设计的中心化系统,以符合某些错误的观念。 + +然而,这些错误的变化本身正是移除真正区块链的主要属性,即信任最小化的原因。 + +另一种分类是那些更为多功能和用途较窄的网络之间的区别。 + +在本文中,我们将解释以太坊经典(ETC)在这些分类方面处于最有价值位置的7个关键原因。 + +## 1. ETC 是工作量证明区块链 + +ETC是一种工作量证明(POW)区块链,这使其属于真正分散系统的范畴,因为POW是人类已知的唯一确保分散和任何节点自由参与点对点网络的方式。 + +所谓的“自由参与”是指世界上任何人都可以在没有任何许可或审查的情况下操作节点或挖掘ETC。 + +这也意味着世界上任何人都可以发送交易并拥有ETC余额的地址,并保证它们不会被任何特殊利益没收或篡改。 + +此外,POW还意味着存在一个几乎不可能违反的加密墙,用于保护系统中交易历史。 + +## 2. ETC 是硬货币 + +ETC是硬货币,因为它是POW区块链,因此创建区块的成本就是创建硬币的成本,从而创造了类似黄金在现实世界中的稀缺性、不可伪造的昂贵性和价值。 + +ETC在其货币政策中还设有固定的货币供应计划,意味着将来只会有210,700,000个ETC存在。 + +这个库存是作为奖励按每个区块支付给矿工,并通过每两年减少20%的方式管理。 + +根据其当前发行情况,ETC的通货膨胀率为3.91%;到2032年将低于2%;到2036年将低于1%。这一趋势将在随后的几年趋近于零。 + +作为硬货币,ETC在长期内保护用户储蓄和投资的价值。 + +## 3. ETC 是可编程的 + +以太坊经典通过其高度安全的环境内的智能合约在基础层面是可编程的。 + +智能合约是软件程序,当它们被发送到网络时,在系统的所有节点中都会被复制,因此变得完全分散。 + +其他竞争的POW链,如比特币、莱特币、狗狗币、门罗币或卡斯帕,都不可编程,因此是简单且功能有限的系统,只能保持帐户、余额并能够在帐户之间转移资金,但无法执行其他操作。 + +ETC在多方面的可变性使其与20世纪80年代计算机与口袋计算器相比具有相似的可变性。 + +## 4. ETC 是完全复制的 + +ETC的区块链,或者说数据库,包括帐户、余额和智能合约,是完全复制的,这意味着100%的节点保留了所有信息的相同副本。节点越多,系统越安全。 + +这是区块链的最初目标;在尽可能多的参与对等方中实现数据的完全复制,以确保最大的冗余性。 + +POW是通过分散的方式实现这种复制的关键,实际上是技术的第二个最重要的安全保障。 + +完全复制是第一个安全保障,它提供了一种冗余性,使系统能够抵抗人为篡改或自然破坏。ETC甚至可以在核战争中生存下来! + +## 5. ETC 是可组合的 + +以太坊经典是可组合的,这是一个非常重要的特性。 + +可组合性是可能的,因为所有帐户、余额和去中心化软件程序都在同一个系统中,因此可以在单个事务执行中执行复杂的多应用程序事务。 + +当系统分开时;比如在比特币中,其中资金在区块链内,但应用程序在其他外部平台上,因为BTC不可编程;则复杂的多应用程序事务是不可能的,因为区块链无法确定外部系统的状态,而外部系统也无法确定区块链的状态。 + +可组合性非常重要,因为它实现了即时交易、较短的结算时间,减少了摩擦,并降低了交易成本。 + +## 6. ETC 是世界上最大的POW智能合约区块链 + +自以太坊于2022年9月迁移到权益证明后,以太坊经典已成为世界上最大的工作量证明智能合约区块链。 + +拥有这个地位使ETC非常有吸引力,因为当市场开始意识到权益证明和权威证明共识是中心化和脆弱的时候,开发者、投资者、用户、 + +矿工和节点运营者将开始转向ETC。 + +在区块链行业,只有通过工作量证明才能实现安全性,而只有在区块链是其POW算法中最大的情况下,工作量证明才是安全的。 + +ETC现在是ETHash/ETCHash算法中最大的区块链,这也使其在这方面是最安全的。 + +## 7. ETC上的应用是世界上最安全的应用 + +![](./banner.png) + +在以太坊经典(ETC)上的应用之所以是世界上最安全的,是因为工作量证明、硬货币、可编程性、完全复制、可组合性以及它是其类别中最大的这些因素的结合,使其成为运行和执行应用程序最安全的环境。 + +在整个宇宙中,没有其他地方可以比ETC更安全地运行应用程序。 + +无论是在军事数据中心、企业数据中心、云服务中,还是在任何不是最大的工作量证明可编程区块链的网络中,都找不到比ETC更安全的应用环境。 + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC,欢迎访问: https://ethereumclassic.org diff --git a/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/1.png b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/1.png new file mode 100644 index 0000000000..2c7b2e8a1f Binary files /dev/null and b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/1.png differ diff --git a/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/2.png b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/2.png new file mode 100644 index 0000000000..f8b53e445a Binary files /dev/null and b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/2.png differ diff --git a/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/3.png b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/3.png new file mode 100644 index 0000000000..a1cc11827b Binary files /dev/null and b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/3.png differ diff --git a/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/4.png b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/4.png new file mode 100644 index 0000000000..c265a3461a Binary files /dev/null and b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/4.png differ diff --git a/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/5.png b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/5.png new file mode 100644 index 0000000000..a32c45bb28 Binary files /dev/null and b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/5.png differ diff --git a/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/6.png b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/6.png new file mode 100644 index 0000000000..c9ad14b27c Binary files /dev/null and b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/6.png differ diff --git a/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/7.png b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/7.png new file mode 100644 index 0000000000..85e102e8df Binary files /dev/null and b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/7.png differ diff --git a/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/8.png b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/8.png new file mode 100644 index 0000000000..7daab392da Binary files /dev/null and b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/8.png differ diff --git a/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/9.png b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/9.png new file mode 100644 index 0000000000..095bb5bcda Binary files /dev/null and b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/9.png differ diff --git a/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/banner-2.png b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/banner-2.png new file mode 100644 index 0000000000..fb0bc3669b Binary files /dev/null and b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/banner-2.png differ diff --git a/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/banner.png b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/banner.png new file mode 100644 index 0000000000..026ee2bcf4 Binary files /dev/null and b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/banner.png differ diff --git a/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/index.md b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/index.md new file mode 100644 index 0000000000..2d3b46a024 --- /dev/null +++ b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/index.md @@ -0,0 +1,149 @@ +--- +title: "Using MetaMask With Your Local DappNode to Connect to ETC" +date: 2023-12-06 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["series", "education"] +linkImage: ./banner-2.png +--- + +--- +**You can listen to or watch this video here:** + + + +--- + +![](./banner-2.png) + +A blockchain like Ethereum Classic (ETC) has two kinds of participants: miners and nodes. + +Miners produce blocks and are paid a reward in ETC coins on a per block basis for their work. + +Nodes receive new transactions from users, provide users with information about their accounts and balances, and verify blocks produced by miners. + +Wallets such as MetaMask, Trust Wallet, Emerald, Ledger, and Trezor, need to connect to a node every time you send a transaction to ETC or each time you check your accounts. + +However, the security guarantees of the different kinds of connections and setups with nodes are different. + +In this post we will explain what are these differences and how to connect your MetaMask wallet to your local ETC node using DappNode. + +## What Is DappNode? + +Because running nodes is relatively costly due to the size of the blockchain (an ETC full node size is currently around 57 GB), it is difficult to run them on regular computers, much less on machines that are meant for daily use. + +To solve this problem, there are companies that have developed very practical specialized devices that are only dedicated to running blockchain nodes. + +DappNode is one such company with its product [DappNode Home](https://dappnode.com/en-us/collections/all) which is a device that connects to the local WiFi network at home or office, and from there users may set up different blockchain nodes, including for the ETC mainnet. + +Another service that a DappNode provides is that it can be a local RPC endpoint for your wallets. + +## What Is an RPC Endpoint? + +Every time wallets, mining pools, solo miners, dapps, developer teams, or other kinds of endpoint users need to send transactions or smart contracts to ETC they need to send them to network nodes that receive the data and then re-transmit them to the rest of the network. + +Nodes are also used to query the blockchain to check accounts and balances. + +When a node serves as a window to enter transactions and data to ETC or to provide information about accounts and balances they are called endpoints or RPC endpoints. + +“RPC” stands for “Remote Procedure Call” which is usually a protocol that machines use to communicate to operate together. + +## What Are RPC Endpoint Providers? + +Some people or organizations run their own nodes so they use those, which is the most secure setup as they are located locally, so they are trusted. + +However, others prefer to focus on their own business and have third parties provide the service of node operation. + +For this, there are [public node services](https://ethereumclassic.org/network/endpoints), which work more or less like cloud services, that run ETC nodes and provide RPC endpoints, which work as URL addresses that accept transactions or queries from the public. + +Endpoint users use these services to send their transactions and smart contracts or query the blockchain instead of running their own ETC nodes. This is a less secure setup. + +## Wallets Also Provide Endpoint Services + +When using wallets such as Trust Wallet, Ledger or Trezor, they have embedded in their software the endpoints that those companies use. + +Many wallet providers use public endpoint services such as [Rivet](https://rivet.cloud/) for ETC or [Infura](https://www.infura.io/) for Ethereum. + +Other wallets are more open and let users change their endpoints and point their apps to whichever they prefer. + +MetaMask is one of this last kind of providers. + +## Using Your Own Endpoint Using DappNode + +![](./banner.png) + +MetaMask users can not only use the RPC endpoints they wish, local or third parties, but they can add and remove blockchain networks from their wallets. + +Most MetaMask users that use ETC have added Ethereum Classic as a network to their wallets, something that we explained how to do [here](https://ethereumclassic.org/blog/2022-12-21-using-ethereum-classic-with-metamask). + +However, most users have configured their wallets to connect to a public provider called Rivet (mentioned above) as their RPC endpoint. + +For more security, users can buy a DappNode, run an ETC node, which we explained how to do [here](https://ethereumclassic.org/blog/2023-04-26-how-run-an-ethereum-classic-node-using-dappnode), and use it as their local and more secure access to the ETC network. + +In the following sections we will explain how to connect your MetaMask to your local DappNode as an RPC endpoint. + +### 1. Going to Your Local DappNode Interface + +![](./1.png) + +Once you have your DappNode set up and running an ETC mainnet node on your local WiFi network, you have to connect to the DappNode user interface by going to the URL “my.dappnode” on your browser. Once there, click on the link “Packages” in the left hand vertical menu. + +### 2. Select ETC Core Geth + +![](./2.png) + +On the next screen, you will see all the packages and nodes that you are running. On DappNode you may run the ETC mainnet Core Geth node, the ETC tesnet node, and even Bitcoin nodes, or other blockchains. + +To access ETC click on the “ETC Core Geth” package. + +### 3. Find and Copy Your Local RPC Endpoint + +![](./3.png) + +In the next screen you will see the information for your ETC Core Geth node, including a line with the title ”Querying API”. The URL in that line is the RPC endpoint of your local ETC node running on the DappNode hardware. In our case it is: http://etc-core-geth.public.dappnode:8545. + +Copy the RPC endpoint URL. + +### 4. Go to Your MetaMask and Open the Main Menu + +![](./4.png) + +The next thing you need to do is to paste the RPC endpoint to your MetaMask so it connects to your local DappNode. To do this, open your MetaMask, enter your password, and open the main menu on the top right. + +### 5. Go to the Settings Menu + +![](./5.png) + +When the menu opens, click on the “Settings” link. + +### 6. Go to the Networks Menu + +![](./6.png) + +Once on the settings menu, click on the “Networks” link. + +### 7. Open the Ethereum Classic Network + +![](./7.png) + +In the next screen, you will see all the networks in your MetaMask. One of those networks will be “Ethereum Classic” as you very likely have already configured it before. Click on it. + +### 8. Find and Replace the Current RPC Endpoint URL + +![](./8.png) + +In the next screen, you will see the form with all the data corresponding to the ETC network. The second line is the “New RPC URL” field. There, you must have the Rivet or another public endpoint. To use your local DappNode you need to paste your DappNode RPC endpoint URL. In our case we will paste this one: http://etc-core-geth.public.dappnode:8545 + +### 9. Press Save + +![](./9.png) + +Once you pasted your local DappNode RPC endpoint for your local ETC Core Geth node in the “New RPC URL” field, then press “Save”. + +Congratulations! Now you can use your MetaMask with your local DappNode ETC node! + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/index.zh.md b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/index.zh.md new file mode 100644 index 0000000000..27cd5a5636 --- /dev/null +++ b/content/blog/2023-12-06-using-metamask-with-your-local-dappnode-to-connect-to-etc/index.zh.md @@ -0,0 +1,147 @@ +--- +title: "与本地DappNote和小狐狸一起连接ETC" +date: 2023-12-06 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["series", "education"] +linkImage: ./banner-2.png +--- + +--- +**由此观看本期视频:** + + + +--- + +![](./banner-2.png) + +区块链如以太坊经典(ETC)有两种参与者:矿工和节点。 + +矿工生成区块,根据每个区块的工作获得以太坊经典(ETC)硬币的奖励。 + +节点接收来自用户的新交易,向用户提供有关其账户和余额的信息,并验证矿工生成的区块。 + +诸如 MetaMask、Trust Wallet、Emerald、Ledger 和 Trezor 之类的钱包,在您发送交易到 ETC 或检查您的账户时,每次都需要连接到节点。 + +然而,使用不同类型的连接和与节点建立的设置的安全性保证是不同的。 + +在本文中,我们将解释这些差异以及如何使用 DappNode 将 MetaMask 钱包连接到本地 ETC 节点。 + +## 什么是 DappNode? + +由于运行节点相对昂贵,因为区块链的规模很大(ETC 完整节点大小目前约为 57 GB),在常规计算机上运行它们是困难的,更不用说用于日常使用的机器了。 + +为解决这个问题,有一些公司开发了非常实用的专门设备,专门用于运行区块链节点。 + +DappNode 是这样一家公司,其产品 [DappNode Home](https://dappnode.com/en-us/collections/all) 是一种连接到家庭或办公室本地 WiFi 网络的设备,用户可以从中设置不同的区块链节点,包括 ETC 主网。 + +DappNode 提供的另一项服务是可以成为您钱包的本地 RPC 终端。 + +## 什么是 RPC 终端? + +每当钱包、挖矿池、独立矿工、DApps、开发团队或其他终端用户需要将交易或智能合约发送到 ETC 时,它们需要将它们发送到接收数据然后重新传输到网络其余部分的网络节点。 + +节点还用于查询区块链以检查帐户和余额。 + +当节点用作输入交易和数据到 ETC 或提供有关帐户和余额的信息的窗口时,它们被称为终端或 RPC 终端。 + +“RPC” 代表 “远程过程调用”,通常是一种机器之间进行通信以协同操作的协议。 + +## 什么是 RPC 终端提供者? + +一些人或组织运行自己的节点,因此他们使用这些节点,这是最安全的设置,因为它们位于本地,因此受信任。 + +然而,其他人更喜欢专注于他们自己的业务,并由第三方提供节点操作服务。 + +为此,有 [公共节点服务](https://ethereumclassic.org/network/endpoints)(类似云服务的服务),运行 ETC 节点并提供 RPC 终端,这些终端作为接受公共交易或查询的 URL 地址。 + +终端用户使用这些服务发送交易和智能合约或查询区块链,而不是运行自己的 ETC 节点。这是一种较不安全的设置。 + +## 钱包也提供终端服务 + +使用 Trust Wallet、Ledger 或 Trezor 等钱包时,它们在其软件中嵌入了这些公司使用的终端。 + +许多钱包提供商使用 [Rivet](https://rivet.cloud/) 等公共终端服务用于 ETC 或 [Infura](https://www.infura.io/) 用于以太坊。 + +其他钱包更加开放,允许用户更改其终端并将其应用程序指向他们喜欢的任何终端。 + +MetaMask 就是这种提供商之一。 + +## 使用 DappNode 使用您自己的终端 + +![](./banner.png) + +MetaMask 用户不仅可以使用他们希望的 RPC 终端(本地或第三方),而且可以向他们的钱包添加和删除不同的区块链网络。 + +大多数使用 ETC 的 MetaMask 用户已将 Ethereum Classic 添加到其钱包中,我们在 [这里](https://ethereumclassic.org/blog/2022-12-21-using-ethereum-classic-with-metamask) 解释了如何操作。 + +然而,大多数用户已将其钱包配置为连接到一个名为 Rivet(上面提到的)的公共提供程序作为其 RPC 终端。 + +为了更安全,用户可以购买 DappNode,运行 ETC 节点,我们在 [这里](https://ethereumclassic.org/blog/2023-04-26-how-run-an-ethereum-classic-node-using-dappnode) 解释了如何操作,并将其用作连接到 ETC 网络的本地和更安全的访问。 + +在以下各节中,我们将解释如何将您的 MetaMask 连接到您的本地 DappNode 作为 RPC 终端。 + +### 1. 进入您的本地 DappNode 界面 + +![](./1.png) + +一旦您设置并在本地 WiFi 网络上运行 ETC 主网节点的 DappNode,您必须通过在浏览器中输入 URL “my.dappnode” 来连接到 DappNode 用户界面。一旦进入,点击左侧垂直菜单中的“Packages”链接。 + +### 2. 选择 ETC Core Geth + +![](./2.png) + +在接下来的屏幕上,您将看到您运行的所有包和节点。在 DappNode 上,您可以运行 ETC 主网 Core Geth 节点、ETC 测试网节点,甚至是比特币节点或其他区块链。要访问 ETC,请点击“ETC Core Geth”包。 + +### 3 + +. 查找并复制您的本地 RPC 终端 + +![](./3.png) + +在接下来的屏幕上,您将看到有关您的 ETC Core Geth 节点的信息,包括一个名为“Querying API”的行。该行中的 URL 是运行在 DappNode 硬件上的本地 ETC 节点的 RPC 终端。在我们的情况下,它是:http://etc-core-geth.public.dappnode:8545。复制 RPC 终端 URL。 + +### 4. 进入您的 MetaMask 并打开主菜单 + +![](./4.png) + +接下来,您需要将 RPC 终端粘贴到 MetaMask 中,以便它连接到您的本地 DappNode。为此,请打开您的 MetaMask,输入密码,并在右上角打开主菜单。 + +### 5. 进入设置菜单 + +![](./5.png) + +当菜单打开时,点击“Settings”链接。 + +### 6. 进入网络菜单 + +![](./6.png) + +在设置菜单中,点击“Networks”链接。 + +### 7. 打开 Ethereum Classic 网络 + +![](./7.png) + +在接下来的屏幕上,您将看到 MetaMask 中的所有网络。其中一个网络将是 “Ethereum Classic”,因为您很有可能在之前已经配置过。点击它。 + +### 8. 查找并替换当前的 RPC 终端 URL + +![](./8.png) + +在接下来的屏幕上,您将看到与 ETC 网络相关的所有数据的表单。第二行是 “New RPC URL” 字段。在那里,您可能已经有 Rivet 或其他公共终端。要使用您的本地 DappNode,您需要粘贴您的 DappNode RPC 终端 URL。在我们的情况下,我们将粘贴这个:http://etc-core-geth.public.dappnode:8545 + +### 9. 点击保存 + +![](./9.png) + +一旦您将本地 DappNode ETC Core Geth 节点的 RPC 终端粘贴到 “New RPC URL” 字段中,然后点击“Save”。 + +恭喜!现在您可以使用您的 MetaMask 与您的本地 DappNode ETC 节点一起使用! + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC,欢迎访问: https://ethereumclassic.org diff --git a/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/1.png b/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/1.png new file mode 100644 index 0000000000..241e1fd8ca Binary files /dev/null and b/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/1.png differ diff --git a/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/2.png b/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/2.png new file mode 100644 index 0000000000..eac106cf6a Binary files /dev/null and b/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/2.png differ diff --git a/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/3.png b/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/3.png new file mode 100644 index 0000000000..9b944d0c89 Binary files /dev/null and b/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/3.png differ diff --git a/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/4.png b/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/4.png new file mode 100644 index 0000000000..6a75f84be6 Binary files /dev/null and b/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/4.png differ diff --git a/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/banner-3.png b/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/banner-3.png new file mode 100644 index 0000000000..24a9ed28aa Binary files /dev/null and b/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/banner-3.png differ diff --git a/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/banner.png b/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/banner.png new file mode 100644 index 0000000000..a863675d36 Binary files /dev/null and b/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/banner.png differ diff --git a/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/index.md b/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/index.md new file mode 100644 index 0000000000..2a9bd37be2 --- /dev/null +++ b/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/index.md @@ -0,0 +1,96 @@ +--- +title: "ETC Proof of Work Course: 5. The POW Mining Difficulty Adjustment Explained" +date: 2023-12-07 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["series", "education"] +linkImage: ./banner-3.png +--- + +--- +**You can listen to or watch this video here:** + + + +--- + +![](./banner.png) + +In the previous class, 4, we explained the broader Nakamoto Consensus design, each of its steps, and its features and benefits. + +One of the most controversial parts of the proof of work (POW) method is the difficulty adjustment system. + +Nick Szabo [expressed concerns](https://unenumerated.blogspot.com/2011/05/bitcoin-what-took-ye-so-long.html) about it as it is a manipulable parameter, just like the monetary policy of POW coins, and not a completely objective and work based way of regulating the supply of the digital asset as is Bit Gold. + +On the other hand, Saifedean Ammous, the author of The Bitcoin Standard, The Fiat Standard, and Principles of Economics, [praised the difficulty adjustment](https://academy.saifedean.com/podcast/the-bitcoin-standard-podcast-seminar-september-10-2020/) as one of the most important components of Nakamoto Consensus because it regulates the supply of the cryptocurrency. + +In this post we will explain how the POW difficulty adjustment works, and what are its benefits. + +## What Is the Difficulty Adjustment? + +The difficulty adjustment basically regulates the timing of the supply of coins in POW blockchains as it enlarges or reduces the target to hit to determine the cryptographic stamp per block so that blocks can be created more or less constantly at the stipulated time intervals in each network, thus printing the coins at a steady pace. + +For example, the difficulty adjustment keeps Bitcoin’s block creation at 10 minute intervals on average, ETC at 13 seconds, and Litecoin at 2 1/2 minutes. + +This ensures that the printing of the coins is not too fast or too slow when miners increase or decrease hashrate in each network due to market conditions. + +## How Does the Difficulty Adjustment Work? + +![](./1.png) + +As miners need to hit a target range of numbers when creating the cryptographic stamp per block, the target can be enlarged or reduced depending on the speed of the blocks. The speed of the blocks increases or decreases if the total computing power held by miners increases or decreases. + +In the next sections we will explain states and options of the difficulty adjustment system. + +## 1. Stable Difficulty State + +![](./2.png) + +In a stable difficulty state, miners will take, on average, a certain time to hit the target for each block. In these conditions, that time is 10 minutes per block in Bitcoin, 13 seconds in ETC, and 2 ½ minutes for Litecoin. + +Note in the diagram, that in the stable difficulty state, it takes a number of attempts (red crosses mean failed attempts) to hit the target (green cross). + +## 2. Reducing Difficulty + +![](./3.png) + +If, for example, miners reduce the hashing power because the coin market is down, then the time that it would take to find a block would increase, slowing the creation of coins. To solve this and adjust the time back to the desired average, the target range will be enlarged, making it less difficult to hit. + +Note, as indicated in the diagram in this section, that less difficulty takes less attempts to hit the target. + +## 3. Increasing Difficulty + +![](./4.png) + +If miners were to increase the hashing power because the coin market is up, then the time that would take to find a block would decrease, creating more coins faster. To solve this and adjust the time back to the desired average, the target range will be reduced, making it more difficult to hit. + +Note, as indicated in the diagram in this section, that more difficulty takes more attempts to hit the target. + +## Benefits of the Difficulty Adjustment in Proof of Work Blockchains + +The difficulty adjustment in Bitcoin avoided the problems that Satoshi had when he created it. + +There was no market inside the network to exchange the Bit Gold for coins, and there was no technology available yet to create these tokens backed by Bit Gold. + +The difficulty adjustment simplified the mechanism by just creating coins in exchange for the work of the miners, but the Bit Gold itself was not used and has been buried in proof of work blockchains ever since. + +The end result is that the difficulty adjustment regulates supply of these coins by regulating blocktimes, therefore stabilizing the blockchains in terms of their monetary policies, hashrates, transaction velocities, confirmation times, settlement times, etc. + +## Putting it all Together for Ethereum Classic + +From classes 1 through 5 of this course, we have explained how POW works in detail. + +The benefits of POW to ETC are: + +- Decentralization +- Permissionlessness +- Hard money +- Censorship resistance + +In the next class, 6, we will explain the benefits and the great advantages of ETC with regards to Bitcoin and Ethereum. + +--- + +**Thank you for reading this article!** + +To learn more about ETC please go to: https://ethereumclassic.org diff --git a/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/index.zh.md b/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/index.zh.md new file mode 100644 index 0000000000..a69fec98e4 --- /dev/null +++ b/content/blog/2023-12-17-etc-proof-of-work-course-5-the-pow-mining-difficulty-adjustment-explained/index.zh.md @@ -0,0 +1,96 @@ +--- +title: "以太坊经典课程: 5. 矿工难度调整解释" +date: 2023-12-07 +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +tags: ["series", "education"] +linkImage: ./banner-3.png +--- + +--- +**您可以由此收听或观看本期内容:** + + + +--- + +![](./banner.png) + +在上一堂课中,第4堂,我们解释了更广义的中本聪共识设计,以及它的每个步骤、特点和优势。 + +在工作证明(POW)方法中,最具争议的部分之一是难度调整系统。 + +Nick Szabo在他的博客中[表达了担忧](https://unenumerated.blogspot.com/2011/05/bitcoin-what-took-ye-so-long.html),因为这是一个可操纵的参数,就像POW币的货币政策一样,并不是一种完全客观和基于工作的方式来调节数字资产供应,就像比特黄金(Bit Gold)一样。 + +另一方面,《比特币标准》、《法定货币标准》和《经济学原理》的作者Saifedean Ammous[赞扬了难度调整](https://academy.saifedean.com/podcast/the-bitcoin-standard-podcast-seminar-september-10-2020/),认为它是中本聪共识的最重要组成部分之一,因为它调节了加密货币的供应。 + +在这篇文章中,我们将解释POW难度调整的工作原理,以及它的好处。 + +## 什么是难度调整? + +难度调整基本上调节了POW区块链中的硬币供应时间,因为它扩大或缩小了每个区块的加密戳的目标,以便在每个网络中可以以更或更少地在规定的时间间隔内创建区块,从而以稳定的速度打印硬币。 + +例如,难度调整使比特币的区块平均创建时间保持在10分钟,ETC为13秒,莱特币为2分30秒。 + +这确保了在矿工根据市场条件增加或减少算力时,硬币的打印速度不会太快或太慢。 + +## 难度调整的工作原理是什么? + +![](./1.png) + +由于矿工在创建每个区块的加密戳时需要命中一个数字范围,因此目标根据区块的速度可以扩大或缩小。如果矿工的总计算能力增加或减少,区块的速度就会增加或减少。 + +在接下来的部分中,我们将解释难度调整系统的状态和选项。 + +## 1. 稳定的难度状态 + +![](./2.png) + +在稳定的难度状态下,矿工平均需要一定的时间来命中每个区块的目标。在这些条件下,比特币每个区块的时间是10分钟,ETC是13秒,莱特币为2分30秒。 + +请注意,在图表中,在稳定的难度状态下,需要一定数量的尝试(红叉表示失败的尝试)才能命中目标(绿叉)。 + +## 2. 降低难度 + +![](./3.png) + +例如,如果矿工减少哈希功率,因为币市下跌,那么找到一个区块所需的时间将增加,从而减缓硬币的创建。为了解决这个问题并将时间调整回所需的平均水平,目标范围将被扩大,使命中目标变得不那么困难。 + +请注意,在本节图表中指示的是,难度较小时,命中目标所需的尝试较少。 + +## 3. 增加难度 + +![](./4.png) + +如果矿工增加哈希功率,因为币市上涨,那么找到一个区块所需的时间将减少,从而更快地创建更多硬币。为了解决这个问题并将时间调整回所需的平均水平,目标范围将被缩小,使命中目标变得更加困难。 + +请注意,在本节图表中指示的是,难度较大时,命中目标所需的尝试较多。 + +## POW区块链难度调整的好处 + +比特币中的难度调整避免了中本聪在创建时遇到的问题。 + +在网络内部没有市场可以用Bit Gold交换硬币,而且还没有技术可用来创建由Bit Gold支持的代币。 + +难度调整通过仅通过矿工的工作创建硬币来简化机制,但Bit Gold本身并未被使用,并一直深埋在工作证明区块链中。 + +最终结果是,难度调整通过调节区块时间来调节这些硬币的供应,从而稳定了区块链的货币政策、算力、交易速度、确认时间、结算时间等方面。 + +## 将所有内容整合到以太经典 + +在本课程的第1至第5课中,我们详细解释了POW的工作原理。 + +POW对ETC的好处包括: + +- 分权 +- 无许可 +- 增强货币 +- 抗审查 + +在下一堂课,第6堂,我们将解释ETC相对于比特币和以太坊的好处和巨大优势。 + +--- + +**感谢您阅读本期文章!** + +了解更多有关ETC,请访问: https://ethereumclassic.org diff --git a/content/development/testnets/index.yaml b/content/development/testnets/index.yaml index b0943cf1aa..cb118ecf8d 100644 --- a/content/development/testnets/index.yaml +++ b/content/development/testnets/index.yaml @@ -1,5 +1,5 @@ title: Testnets -__updated: 2023-04-03 +__updated: 2023-11-27 __contribute: 1 seo: Information about the various Ethereum Classic testnets, with publicly available networks that can be used to test contracts and protocol upgrades. description: | @@ -9,13 +9,14 @@ description: | Additionally, Ethereum Classic has its own testnets that operate the Ethereum Classic version of the EVM, and deploying to one of these networks is also highly recommended before production release. These public testnets also provide faucets, so you can easily acquire testnet ETC and deploy your code. - If a faucet is not functioning correctly, please join the Ethereum Classic Community [Discord](https://ethereumclassic.org/discord) to ping for testnet funds. Someone in the dev-general chatroom will help you. + If a faucet is not functioning correctly, join the Ethereum Classic Community [Discord](https://ethereumclassic.org/discord) to ping for testnet funds. Someone in the dev-general chatroom will help you. Alternatively, you can easily mine your own testnet funds by locally running [core-geth](https://etclabscore.github.io/core-geth/getting-started/installation/) with the "geth --mordor --mine" command. You can use [chainlist.org](https://chainlist.org) to configure your web3 wallet with the appropriate RPC endpoints and explorers. - Configure Wallet: [Kotti](https://chainlist.org/chain/6), [Mordor](https://chainlist.org/chain/63) + Configure Wallet: [Mordor](https://chainlist.org/chain/63) __contributors: - gitr0n1n - IstoraMandiri + - chris-mercer items: testnets: __type: table @@ -47,21 +48,12 @@ items: chainId: name: ChainID items: - Testnet Kotti: - __name: Kotti - __chainId: 6 - __type: testnet - __networkId: 6 - __link: https://github.com/eth-classic/kotti - __faucet: http://kottifaucet.me/ - __consensusAlgo: poa - __miningAlgo: Clique Testnet Mordor: - __name: Mordor + __name: Mordor Testnet __chainId: 63 __type: testnet __networkId: 7 - __link: https://github.com/eth-classic/mordor - __faucet: https://mordor.canhaz.net/ + __link: https://github.com/mordortestnet + __faucet: https://easy.hebeswap.com/#/faucet __consensusAlgo: pow __miningAlgo: Etchash diff --git a/content/knowledge/course/index.md b/content/knowledge/course/index.md new file mode 100644 index 0000000000..6a00b71ea6 --- /dev/null +++ b/content/knowledge/course/index.md @@ -0,0 +1,61 @@ +--- +title: Ethereum Classic Course +author: Donald McIntyre +contributors: ["DonaldMcIntyre"] +--- + +This course is meant to be a detailed explanation of each part of Ethereum Classic, but to accomplish this task it is necessary to learn the background of the blockchain industry, how everything works, what is in store for the future of the sector, and how Ethereum Classic fits in all this. + +You can watch the full series in the following youtube [playlist](https://www.youtube.com/playlist?list=PLIzptAKK7iDTbFd_t7biMkE8KogfeYuYn). + + + +## Part 1: History + +- [1: Public-Key Cryptography](/blog/2022-12-22-ethereum-classic-course-1-public-key-cryptography) +- [2: The Cypherpunks](/blog/2022-12-29-ethereum-classic-course-2-the-cypherpunks) +- [3: The First Digital Currency Attempts](/blog/2023-01-05-ethereum-classic-course-3-the-first-digital-currency-attempts) +- [4: Satoshi Nakamoto and Bitcoin](/blog/2023-01-12-ethereum-classic-course-4-satoshi-nakamoto-and-bitcoin) +- [5: Vitalik Buterin and Ethereum](/blog/2023-01-19-ethereum-classic-course-5-vitalik-buterin-and-ethereum) +- [6: Ethereum Classic is the Original Chain](/blog/2023-01-26-ethereum-classic-course-6-ethereum-classic-is-the-original-chain) +- [7: Ethereum Classics Philosophy of Code is Law](/blog/2023-02-02-ethereum-classsic-course-7-ethereum-classics-philosophy-of-code-is-law) +- [8: Ethereum Classics Monetary Policy](/blog/2023-02-09-ethereum-classic-course-8-ethereum-classics-monetary-policy) + +## Part 2: How ETC Works + +- [9: The Units and Denominations of Ethereum Classic](/blog/2023-02-16-ethereum-classic-course-9-the-units-and-denominations-of-ethereum-classic) +- [10: Proof of Work Explained](/blog/2023-02-23-ethereum-classic-course-10-proof-of-work-explained) +- [11: Ethereum Classic Social and Physical Layer Security](/blog/2023-03-02-ethereum-classic-course-11-ethereum-classic-social-and-physical-layer-security) +- [12: Proof of Stake Explained](/blog/2023-03-09-ethereum-classic-course-12-proof-of-stake-explained) +- [13: Proof of Authority Explained](/blog/2023-03-16-ethereum-classic-course-13-proof-of-authority-explained) +- [14: What Are Smart Contracts](/blog/2023-03-23-ethereum-classic-course-14-what-are-smart-contracts) +- [15: What Are Dapps](/blog/2023-03-30-ethereum-classic-course-15-what-are-dapps) +- [16: What is WETC](/blog/2023-04-06-ethereum-classic-course-16-what-is-wetc) +- [17: What Are Private Keys, Public Keys, and Addresses](/blog/2023-04-13-ethereum-classic-course-17-what-are-private-keys-public-keys-and-addresses) +- [18: The Difference Between Wallets and Addresses](/blog/2023-04-20-ethereum-classic-course-18-the-difference-between-wallets-and-addresses) +- [19: What Are Raw Private Keys, Private Key JSON Files, and Secret Passphrases](/blog/2023-04-27-ethereum-classic-course-19-what-are-raw-private-keys-private-key-json-files-and-secret-passphrases) +- [20: What Are Custodial and Non-Custodial Wallets](/blog/2023-05-04-ethereum-classic-course-20-what-are-custodial-and-non-custodial-wallets) +- [21: What Are Hardware and Software Wallets](/blog/2023-05-11-ethereum-classic-course-21-what-are-hardware-and-software-wallets) +- [22: What Are Hot and Cold Wallets](/blog/2023-05-18-ethereum-classic-course-22-what-are-hot-and-cold-wallets) + +## Part 3: Industry Organization + +- [23: What Are Native Cryptocurrencies](/blog/2023-05-25-ethereum-classic-course-23-what-are-native-cryptocurrencies) +- [24: What Are Programmable Native Cryptocurrencies](/blog/2023-06-01-ethereum-classic-course-24-what-are-programmable-native-cryptocurrencies) +- [25: What Are ERC-20 Tokens](/blog/2023-06-08-ethereum-classic-course-25-what-are-erc-20-tokens) +- [26: What Are Convertible Stablecoins](/blog/2023-06-15-ethereum-classic-course-26-what-are-convertible-stablecoins) +- [27: What Are Algorithmic Stablecoins](/blog/2023-06-22-ethereum-classic-course-27-what-are-algorithmic-stablecoins) +- [28: What Are Privacy Coins](/blog/2023-06-29-ethereum-classic-course-28-what-are-privacy-coins) +- [29: What Are Decentralized Finance (DeFi) Coins](/blog/2023-07-06-ethereum-classic-course-29-what-are-decentralized-finance-defi-coins) +- [30: What Are File Storage Coins](/blog/2023-07-13-ethereum-classic-course-30-what-are-file-storage-coins) +- [31: Where to Find Cryptocurrency Lists and Prices](/blog/2023-07-20-ethereum-classic-course-31-where-to-find-cryptocurrency-lists-and-prices) +- [32: What Are Block Explorers](/blog/2023-07-27-ethereum-classic-course-32-what-are-block-explorers) +- [33: What Centralized and Decentralized Exchanges](/blog/2023-09-07-ethereum-classic-course-33-what-centralized-and-decentralized-exchanges) + +## Part 4: What Is in Store for the Future + +- [34: The Layers of the Blockchain Industry](/blog/2023-09-14-ethereum-classic-course-34-the-layers-of-the-blockchain-industry) +- [35: Non-Fungible Tokens (NFTs)](/blog/2023-09-21-ethereum-classic-course-35-non-fungible-tokens-nfts) +- [36: Ownership Records and Property Registries on Blockchains](/blog/2023-09-28-ethereum-classic-course-36-ownership-records-and-property-registries-on-blockchains) +- [37: Decentralized Autononous Organizations (DAOs)](/blog/2023-10-05-ethereum-classic-course-37-decentralized-autononous-organizations-daos) +- [38: Contracts Between Individuals and Businesses on Blockchains](/blog/2023-10-19-ethereum-classic-course-38-contracts-between-individuals-and-businesses-on-blockchains) diff --git a/content/navItems.global.yaml b/content/navItems.global.yaml index df0f0ac3ea..303ccf6ccc 100644 --- a/content/navItems.global.yaml +++ b/content/navItems.global.yaml @@ -71,6 +71,11 @@ learn: name: Knowledge description: Further reading on the foundations that underpin ETC navItems: + course: + __link: /knowledge/course + name: Course + description: A structured video and article series about Ethereum Classic + __icon: hat foundation: __link: /knowledge/foundation name: Foundation diff --git a/content/services/apps/apps.collection.yaml b/content/services/apps/apps.collection.yaml index acb55d0e78..82fd8597b9 100644 --- a/content/services/apps/apps.collection.yaml +++ b/content/services/apps/apps.collection.yaml @@ -1,3 +1,51 @@ +- date: 2023-11-22 + title: MonoNFT + description: A non-fungible token Marketplace. + image: ./images/231122-1340-mononft.png + type: nfts + author: Mono Money Pty Ltd + links: + - name: Launch App + link: https://mononft.net + - name: Twitter + link: https://twitter.com/mononftnet + icon: twitter + - name: Telegram Channel + link: https://t.me/mononftnet + icon: telegram + - name: Telegram Group + link: https://t.me/mononftgroup + icon: telegram + - name: Documentation + link: https://docs.mononft.net + icon: book +- date: 2023-10-26 + title: HebeSwap Oracle + description: HebeSwap Oracle is a middleware that integrates off-chain data into the Ethereum Classic (ETC) blockchain, enhancing smart contract capabilities. It provides a bridge between external data sources and smart contracts, enabling real-time data utilization. + image: ./images/231026-1611-hebeswap-oracle.png + type: finance + author: HebeBlock + authorLink: https://hebeblock.com + verifiedContract: https://etc.blockscout.com/address/0x148A40DDb8cb3edd76319E81Be3fE6C072853b2a?tab=contract + openSource: https://github.com/HebePlatform/Oracle + links: + - name: Launch App + link: https://oracle.hebeswap.com + - name: github + link: https://github.com/HebePlatform/Oracle + icon: github + - name: twitter + link: https://twitter.com/EtcHebeBlock + icon: twitter + - name: telegram + link: https://t.me/hebeOffice + icon: telegram + - name: discord + link: https://discord.com/invite/HFBUJ3AKFT + icon: discord + - name: medium + link: https://medium.com/@hebeblock + icon: medium - date: 2023-10-06 title: ETCMW MostWanted description: "ETC Most Wanted project provides opportunities to earn, build, play and socialize for all Ethereum Classic believers. ETCMW NFT is your key to all project infrastructure, it represents onchain as an enhanced ERC721 tokens with new existing features. Each ETCMW is completely unique, with a set of distinguishing traits and has one of the following roles: Common, Investor, Miner or Dev." diff --git a/content/services/apps/images/231026-1611-hebeswap-oracle.png b/content/services/apps/images/231026-1611-hebeswap-oracle.png new file mode 100644 index 0000000000..05e8fef56d Binary files /dev/null and b/content/services/apps/images/231026-1611-hebeswap-oracle.png differ diff --git a/content/services/apps/images/231122-1340-mononft.png b/content/services/apps/images/231122-1340-mononft.png new file mode 100644 index 0000000000..8c8b6a0729 Binary files /dev/null and b/content/services/apps/images/231122-1340-mononft.png differ diff --git a/content/services/exchanges/index.yaml b/content/services/exchanges/index.yaml index edebc40113..eabe2ed023 100644 --- a/content/services/exchanges/index.yaml +++ b/content/services/exchanges/index.yaml @@ -497,3 +497,6 @@ items: CoinMarketCap Markets List: __name: CoinMarketCap Markets List __link: https://coinmarketcap.com/currencies/ethereum-classic/markets/ + NOWPayments: + __name: NOWPayments + __link: https://nowpayments.io/ diff --git a/content/videos/videos.collection.en.yaml b/content/videos/videos.collection.en.yaml index ed936c6f81..dfa1cbca45 100644 --- a/content/videos/videos.collection.en.yaml +++ b/content/videos/videos.collection.en.yaml @@ -1,3 +1,12 @@ +- title: ETC Development Call - Spiral Network Upgrade + date: 2023-12-05 + uploaded: 2023-12-04 + youtube: psEzr2SmUpo + authorYoutube: channel/UCp07VPnC1ejyAp5gMvvA4dw + author: Ethereum Classic Community Calls + tags: + - development + - discussions - title: POW Summit - Day 2 date: 2023-09-28 uploaded: 2023-09-28 diff --git a/src/components/landing.js b/src/components/landing.js index 1d205792fb..6c022adad8 100644 --- a/src/components/landing.js +++ b/src/components/landing.js @@ -25,7 +25,7 @@ export default function Landing({
-
+ {/*
-
+
*/}