When BCC was born, it continued the mining difficulties of BTC. Miners lose money to mine out of faith. When Bitcoin was born, it even took 12 hours to produce a piece. In order to ensure the stable development of BCC network, BCC adopts the strategy of dynamically adjusting the mining difficulty, which can ensure that the mining speed of BCC can adapt to the decline of computing power.
BTC adjusts the difficulty every 20 16 blocks, while BCC adds the rule that "if the MTP interval in the past 6 blocks is longer than 12 hours, the difficulty will be lowered by 20% next time". At present, the difficulty of BCC mining has been reduced a lot, which is about 13% of BTC mining. At present, the box pop-up speed of BCC is close to the average value of one box pop-up in 10 minutes.
Extended data:
BCC mining principles:
BCC's previous life was bitcoin. Before the fork, its data stored in the blockchain and running software were compatible with all bitcoin nodes. After the fork, new code is executed and large blocks are packaged, thus forming a hard fork on the chain. At present, BCC is still a futures, and in August 1 officially branched into a new currency.
Security issues faced by Bitcoin:
The user's first security threat comes from the user-activated hard fork or UAHF-all BTC holders who control their private keys at fork get the same number of BCCs.
Then the problem comes: there are many trading platforms for designing bitcoin in China, but it should be noted that many investors use third-party transactions or unsupported software wallets, but investors themselves do not control their private keys, so the third-party trading platforms finally receive new coins. Some platforms will notify customers, while others will not.
Many investors have transferred their assets to the supported bitcoin wallet hours before the hard fork, while investors without independent wallets can only wait.
There are many opportunities for phishing attacks or other malicious attacks, especially considering that most successful malicious attacks against Bitcoin focus on controlling private keys or hacker exchanges, rather than directly attacking currency. Regarding bitcoin security, you can also add your own micro-signal seciot communication.
BCC is very similar to BTC in technology, adding greater blocking and transaction replay protection, which adopts a new signature form. Bitcoin cash transactions use the new SIGHASH_FORKID, which can prevent bitcoin cash transactions from repeating themselves in the bitcoin block.
The new signature hash also brings additional benefits, such as the input value signature improves the security of the hardware wallet and eliminates the secondary hash problem. In a word, it can be said that it is safer than BTC in theory, and its purpose is to start and use it faster and more conveniently.
However, BCC does face a major threat, that is, most attacks, that is, the security risk that a single entity gains more than 565,438+0% of the network processing capacity. At the same time, * * *, which is shared by two blockchains, is carrying out an interruption attack with the enemy. Most attackers use network interruption to split the network to improve the success rate.
At the same time, partition network and network delay attack are both threats. According to the latest research paper, for the so-called distributed network, it is easier than assumed, and 20% of bitcoin nodes are hosted in less than 100 IP prefixes.
Synopsis: Nick Leeson is an ordinary employee of Bahrain Bank. He wants to be a trader on the exchange. Make a fortune in the financial field. Everything s