How to select a crypto currency wallet
imToken Chief Security Officer Blue shares how to choose an exchange and wallet to hold your crypto assets
But for now, the problem is still not completely solved. Therefore, one challenge before Coin Security is how to break through the technical barriers as soon as possible.
Since the private key is a long string of meaningless characters that are difficult to remember, the mnemonic has emerged. The mnemonic is a fixed algorithm that converts a private key into a dozen or more common English words. The mnemonic and the private key are interoperable and can be converted to each other; it is simply used as a friendly format for the private key of a blockchain digital wallet. So here's the emphasis: the mnemonic is the private key! Due to its explicit nature, it is not recommended that it be kept electronically, but copied on a physical medium for safekeeping, it and Keystore complements each other as a dual backup
Most cold storage hardware uses a data cable, Bluetooth or even NFC for transmitting the signature output. Opaque, these methods make signature output extremely difficult to audit. An overlooked method for cold storage hardware communication is QR codes, which is a "WYSIWYG" solution. We believe that QR codes are the ideal way to transfer data between the cold and hot side because the output of the code is transparent. This allows the user to easily ensure that every unsigned transaction transmitted to the cold storage device is valid and that the signature from the cold side is valid. The output does not disclose private keys or sensitive information in any way.
China's official digital currency, first and foremost, is definitely going to be based on mobile payments, and mobile payments are inseparable from mobile phones. Huawei has a huge advantage in mobile phone terminals, as well as running the database level, and once the legal digital currency is issued, Huawei mobile phones may Will support digital currency wallets in the first place
Satoshi Nakamoto solves this problem simply and elegantly. Bitcoin allows individuals to transact directly on the basis of peer-to-peer technology that does not require a third party; such transfers cannot be reversed at will, so the parties do not The need to trust or understand each other. Bitcoin is a "trustless" currency, in the best sense of the word, because trust is not an issue. It becomes irrelevant. Since everyone can keep their wallet, there is no longer necessarily a need to use a "reliable" storage facility (i.e., a bank). Each user becomes a "self-service banker", with their wallet protected by a private key to prevent prying eyes and theft!
When transferring money to this address, let's say A Token of 100, then the address entered is the attacker's The default address provided, at which point the encoded input is 134 bytes, which is 2 bytes less than the normal data In this case, the EVM completes the missing byte bits at the end of the encoded data to make a total of 136. byte, so that the missing 0's in the address field are replaced by 0's in the data field, and since the 0's in the address field are replaced by 0's in the data field, the data segment will be missing zeroes, and the missing zeroes in the segment will be filled in automatically by the EVM, just as a segment moves to an address segment to fill in an address segment is missing byte bits, and then the missing byte bits of the data segment are filled in by EVM with 0. In this case, the transfer amount is changed from 100 to the nth power of 10016, where n is the missing address The number of the 0. In this way, an attacker is able to attack the exchange or wallet and steal the assets of the exchange and wallet. It is recommended that exchanges and wallets process transfers with strict verification of the transfer address to prevent short address attacks
Software EOA Wallet Hardware EOA Wallet Single Signature Smart Contract Wallet Multi-Signature Smart Contract Wallet Managed Wallet Software EOA Wallet