See how to ensure the security of NFT from the suspected abolition of the magic core

On the evening of July 20, a number of blockchain and digital collection vertical media reported: According to insiders, Tencent is planning to abolish the “Magic Core” business this week, and the news has been communicated to the grassroots cadres of the Magic Core team. Magic Core is a digital collection platform under Tencent. It was launched in August 2021, and it has been less than a year. On July 2, Tencent News App also suspended the sales service of digital collections.

Although Phantom and Tencent have not yet confirmed this, the news caused a thousand waves. As one of the largest NFT platforms in China, rumors of the abolition of Magic Nucleus have had a big impact on the digital collection industry , especially for those users who have purchased digital collections. That is to say, it does not support the release of NFTs by third parties, nor does it open the transfer and transaction functions. Even if Tencent really intends to close the platform, I believe there will be appropriate plans and measures to ensure that digital collections are purchased on the Magic Core for the purpose of collection and appreciation. Users, their normal rights and interests are not affected, but the panic of the entire industry caused by this incident is still inevitable.

Prior to this, users generally tended to think that the digital collections they purchased were safe, and even most people, out of trust and convenience considerations, entrusted the private key to the platform. This incident undoubtedly sounded the alarm for people: Even if it exists on the blockchain, NFT is still like most data and digital properties on the Internet, its security is not foolproof.

Almost all international NFTs are on the public chain, and there are enough and scattered nodes to ensure the security of the public chain; due to the legality of the public chain, the domestic digital Tibetan platforms basically choose the alliance chain, and the current actual situation Yes, although it is nominally a consortium chain, almost all the nodes of these chains are managed by a single company. Strictly speaking, not only can they not be called consortium chains, but they cannot even be regarded as real blockchains. They are still a back-end system in essence, and the security and even the existence of the chain are completely in the hands of a company.

Therefore, if users want to ensure the security of their digital assets, the choice of the chain environment is very important, and a chain environment that is truly governed by multiple parties may be the correct answer. The individual will or business problems of any party will not affect the entire chain, and its security and possibility of ever-present are far greater than those of a chain controlled by only one company. Accordingly, NFTs on such a chain environment are more secure.

For example, the BSN-DDC basic network consists of dozens of open consortium chains with different characteristics. If there is a problem with any of the digital Tibetan platforms in the network, as long as the DDC/NFT held by the user is generated by the official BSN DDC contract, and If the user manages the private key by himself, he can contact the BSN official to convert all DDCs to another normal operating platform, or the users can directly manage them through the official DDC safe deposit box to ensure the long-term security of these DDCs. exist.

Within this year, the DDC network will also allow qualified operators to build their own node data centers, including trusted institutions such as the government, central state-owned enterprises, and technology companies, so that the DDC network can form a truly distributed and decentralized structure. Co-construction and co-governance ensure the lasting and stable operation and existence of the network.

It is worth mentioning that, as a primary “public information system”, blockchain allows users to have absolute control over the data stored in the corresponding public system by replacing traditional usernames and passwords with private keys. On the premise that the security of the chain is fully guaranteed, the security of data is ensured from a personal perspective. To this end, DDC Network has always advocated that end users manage their own private keys as one of its core concepts, and has launched an open-source official DDC safe deposit box, which is freely available to all DDC platform parties to enable end users The private key can be managed independently. At present, the PC-side DDC safe box based on the Chrome browser has been released, and the mobile terminal DDC safe box will be launched within two months.

Regardless of the final result, the “phantom nuclear abolition” will be an event that will have a profound impact on China’s digital Tibet industry, and the entire industry may usher in a major turning point. On the one hand, the platform side and the technical side will carry out more explorations on the application of NFT technology outside the field of digital collections, so that this technology can be more “extracted from the virtual and the real”, which will enable the traditional economy and promote the development of the digital economy. Play more value to promote the sustainable development of the industry; on the other hand, users’ data and digital asset security awareness may awaken, and begin to accept and try to use their own private key management model to replace the platform hosting model. Prepare for the challenge of how to deal with the security of personal data and digital assets before the advent of the era of integrated systems and the Metaverse.

Posted by:CoinYuppie,Reprinted with attribution to:
Coinyuppie is an open information publishing platform, all information provided is not related to the views and positions of coinyuppie, and does not constitute any investment and financial advice. Users are expected to carefully screen and prevent risks.

Like (0)
Donate Buy me a coffee Buy me a coffee
Previous 2022-08-01 22:36
Next 2022-08-01 22:39

Related articles