<!DOCTYPE html>
<html>

<head>
    <meta charset="UTF-8">
    <title></title>
    <meta name="viewport" content="width=device-width, user-scalable=no">
    <meta http-equiv="X-UA-Compatible" content="IE=Edge,chrome=1">
    <script src="./js/flexible.js"></script>
    <link rel="stylesheet" href="./css/reset.css">
    <link rel="stylesheet" href="./css/common.css">
    <link rel="stylesheet" href="./css/protocol.css">
</head>

<body>
    <div class="wrapper">
        <p class="blod" style="font-size: 16px;margin-bottom:18px;">WEBank the novice must-read
        </p>
        <p><i>Basic concept of block chain: </i>based on the wallet developed by WEChain,WEChain is a decentralized global block chain e-competitive ecological engine, and also a service engine of the underlying block chain technology.
        </p>
        <p><i>Address: </i>34 - bit hash value (hexadecimal) string.
        </p>
        <p><i>Private key: </i>a 56-bit hexadecimal hash value string that illustrates the importance of a plaintext private key in one sentence: "whoever holds the private key will have the right to use the wallet!"Also, if someone else gets your plaintext
            private key, you can easily transfer your assets without any passwordWEChain.
        </p>
        <p>Basic characteristics of block chain
        </p>
        <p><i>Decentralization: </i>because the entire network has no central ruler.
        </p>
        <p>System relies on multiple participants fair constraints on the network, so the rights and obligations of any every few nodes are equal, and each node will store all data on this block chain.
        </p>
        <p>Even if the node is damaged or attacked, there is still no threat to the books.
        </p>
        <p><i>Irreversible: </i>block chain information must be irrevocable, not casually destroy system is open source, the system must be open and transparent, so after a deal was cut in the broadcast, reach more than 6 confirmed successfully recorded,
            and irreversible irrevocable.
        </p>
        <p><i>Tamper-resistant: </i>ensure that the information or contracts cannot fake books in a certain person or several people's hands, the possibility of fraud is very high, but everyone has a book in his hand, unless more than 51% of people in the
            whole WEChain change a account, otherwise any tampering is invalid, and this is the superiority of collective maintenance and supervision.
        </p>
        <p><i>Anonymity: </i>the identity of each block node information does not need to notice or authentication, information transmission can be a simple example, anonymous is on your block chain to a wallet address a deal, but not know the exact corresponding
            address behind is that a person, or your private key to be a hacker stealing, not from a purse that hackers who are in the address
        </p>
        <p>A wallet is a management tool for the private key. It contains only the private key, not an exact token.
        </p>
        <p>The private key in the purse.
        </p>
        <p>The user signs the transaction with a private key, thereby proving that the user has the output right of the transaction.
        </p>
        <p>The output transaction information is stored in the block chain.
        </p>
        <p><i>Emergency treatment: </i>once found his wallet appears not transferred out of the deal, operation or aware of your private key has already been leaked, so immediately stop using the wallet (don't transfer to the purse), a new purse (of course,
            to do well the new purse backup) and then immediately move assets to a new purse, a lot of people want to purse service providers to help find the stolen money or hackers information, this basic knowledge in the previous part is more clear,
            because is decentralized wallet, so it is difficult to provide effective clues to help the victims "solve".
        </p>
        <p>When deleting your wallet, remember the wallet private key.
        </p>
        <p>It is recommended to record the private key after the wallet is created, to verify whether the record private key is correct, verify repeatedly, and confirm that it is correct.
        </p>
        <p><i>Lost the private key: </i>some small white in the backup when the private key, copy didn't do after the verification, or too untidy, make it difficult to identify in the late, this will lead to can't find my wallet.
        </p>
        <p>Therefore, we should be careful when backing up the wallet, and be good at using some safe management tools to ensure that we can find the private key at any time. <i>Anti-theft strategy: </i>Anti-theft strategy: we need to know what's been stolen?
        </p>
        <p>Is it an asset?
        </p>
        <p>Is it a certain token?
        </p>
        <p>In fact, the essence of anti-theft is to prevent our private key from leaking or being stolen by hackers. In terms of anti-theft strategy, the private key has a different emphasis.
        </p>
        <p class="blod">That's all for the help center
        </p>
        <p class="blod right">WEBank</p>
    </div>
</body>

</html>
