[ETC(以太坊经典)]为什么个人和企业应该在 ETC 中运行自己的节点

194
银行系统是受信任的第三方持有所有者财富的系统,并且他们给予许可且有限的访问权限。However,evenifoneusestheirownprivatekeysandaddresses,ifthesendingoftransactionsandqueryingoftheblockchainisdonethroughremotetrustedthirdpartynodes,thenasignificantpartofthesecuritytousersisdiminished
okx

您可以在此处收听或观看此视频:

从银行业到区块链的范式转变

在过去的 600 年里,人们已经习惯了让值得信赖的第三方保管他们的资产。

银行系统是受信任的第三方持有所有者财富的系统,并且他们给予许可且有限的访问权限。

然而,区块链行业通过去中心化的原则扭转了这一局面。

在区块链行业中,所有者可以随时直接访问和控制自己的财富,而无需获得许可。

在银行业,人们的财富是受信任的第三方的责任,而在区块链行业,人们的财富是完全拥有和控制的真正资产。

使用私钥控制地址

在以太坊经典(ETC)中,其工作方式是通过私钥完全控制区块链内保存资产的地址。

私钥就像 ETC 中财富所有者所持有的密码,只有使用这些密码才能转移或交换资产。

通过将基于工作量证明的点对点区块链网络(如 ETC)整合到一个系统中,并让用户通过私钥控制自己的资产,受信任的第三方的影响力已显着降低,并且成为签署有效交易的唯一方法是通过使用仅由最终用户持有的密钥。

ETC 交易机制

然而,单独持有私钥并不是完整的安全模型。

交易签名和发送到 ETC 网络的方式涉及最终用户端的应用程序,他们在其中指定交易详细信息;

例如资金去往地址以及要转账或兑换的金额;

然后使用私钥签署交易。

当一笔交易被签名并发送后,它需要到达ETC区块链节点,以便它可以重新传输到整个网络进行完全复制,并被矿工包含在一个区块中。

一旦包含在被节点网络验证并接受的区块中,交易就会被执行并最终确定。

ETC 查询的机制

ETC 中的查询以类似的方式工作,但不需要私钥。

要查询区块链、检查其余额以及有关其资产和交易的其他信息,用户需要使用与上一节中相同类型的应用程序。

When they open their apps to check their information on the ETC blockchain, the app consults with remote ETC nodes to retrieve the relevant data from the blockchain associated with their addresses.

The great majority of users in ETC send transactions and do their queries using third party nodes.

The Risks of Third Party Nodes

In a way, a blockchain is a kind of trusted third party, but the fact the the network is decentralized, and the data is replicated in all nodes globally, minimizes the influence of these trusted third parties to a sufficient degree that the security to users’ is very high.

However, even if one uses their own private keys and addresses, if the sending of transactions and querying of the blockchain is done through remote trusted third party nodes, then a significant part of the security to users is diminished.

This is because the dependency on third party nodes means that the nodes may not be accessible in certain circumstances, or that the nodes may be corrupted, so they could be processing transactions and queries fraudulently providing the wrong information to users or directing transactions and queries to alternative fraudulent chains.

The Most Secure Setup

For these reasons, for users such as people and businesses who value their holdings in ETC or with significant assets, the most secure setup is to actually run their own ETC nodes so they can be part of the blockchain directly.

This configuration ensures that transactions will always be sent to the right blockchain and that the queries will always be truthful.

In a way, seen from the traditional paradigm of banking, the combination of holding the private keys to the addresses and running their own nodes makes users full custodians of their own wealth and assets because they not only have exclusive ability to sign transactions but they also have personal and physical control of the information of the network.

How Can Users Run Their Own ETC Nodes?

To start running your own nodes and to connect your wallets to them so you can have your direct and complete access and custody of your ETC wealth, there are three options currently in the market:

The ETC Core Geth node: This is the core software client that is used by the great majority of node operators in ETC. It is the standard ETC community node that may be run on normal computers.

The ETCMC hardware node: This is a hardware ETC node that is part of a greater community with token compensation and various sources of revenues for participating in the system.

The DappNode hardware node: DappNode is a plain vanilla hardware node and may be used to run ETC mainnet nodes as well as the ETC Mordor testnet, and even clients of other blockchains.

Thank you for reading this article!

To learn more about ETC please go to: https://ethereumclassic.org

欧易

欧易(OKX)

用戶喜愛的交易所

币安

币安(Binance)

已有账号登陆后会弹出下载

进群交流|欧易官网