Bitcoin mailbox hacked
some malware also make great use of the parallel computing power of graphics cards. In August 2011, botnet of bitcoin mining was discovered, and Mac OS X infected by Trojan horse was also discovered to mine bitcoin.
on June 19, 2011, security vulnerability of mt.gox (Magic: abbreviation of the gathering online exchange) bitcoin trading center caused the price of 1 bitcoin to drop to 1 cent (although other transactions were not affected). The reason is that a hacker stole the user's mtgox certificate from the computer infected with the Trojan horse, so he transferred bitcoin to his own account and sold it, resulting in a large number of "ask" requests at that price. A few minutes later, mtgox shut down and cancelled the abnormal transactions in the hacking incident, making the price of bitcoin rebound back to $15. In the end, the bitcoin exchange rate went back to what it was before the crash. Accounts equivalent to more than $8750000 were affected
in July 2011, the operator of bitomat, the world's third largest bitcoin trading center, announced the loss of access rights to the wallet.dat file that records 17000 bitcoins (about 220000 US dollars). At the same time, announced the decision to sell services to make up for the loss of users
in August 2011, mybitcoin, one of the processing centers of common bitcoin transactions, announced that it had been attacked by hackers and shut down. Involving 49% of customers' deposits, more than 78000 bitcoins (then equivalent to about $800000) are missing
in early August 2012, bitconica was sued in the San Francisco court for damages of about $460000. In 2012, bitconica was attacked twice by hackers, accused of ignoring the security of customers' funds and forging withdrawal applications
in late August 2012, bitcoin savings and trust was shut down by its owner, leaving about US $5.6 million in debt. At the same time, he was accused of operating the Ponzi scheme. In September 2012, the securities and Exchange Commission began to investigate the case
in September 2012, bitfloor trading center was also hacked, and 24000 bitcoins (about US $250000) were stolen. Bitfloor was suspended. Bitfloor resumed operations in the same month, and its founder said he had reported the theft to the FBI and that he was planning to compensate the victims, but the compensation schele was unclear
in June 2011, a hacker transferred 25000 bitcoins into his account, which is equivalent to 500000 US dollars. The whole transaction could not be traced. Although the owner of bitcoin announced the theft on the Internet, it was useless. The hacker became the first thief of bitcoin
in 2012, 46703 bitcoin worth US $228845 was stolen e to the disclosure of the super management password of the server of the website hosting provider linode. More than 43000 stolen bitcoins belong to bitcoinica, a bitcoin trading platform. Another 3094 bitcoins are owned by Marek palatinus, a Czech programmer. Gavin Andersen, the chief bitcoin programmer, also lost his five bitcoins.
Bitcoin blackmail refers to an email received in the mailbox. The content of the email generally includes: malicious software on the computer has captured the recipient's indecent photos through the webcam, knows the recipient's real password, etc., which makes the recipient fear and demands to pay the sealing fee in the form of "bitcoin"
if the blackmailer passes the email, he will take the next step, and he does have a lot of important information. In any case, don't transfer bitcoin to blackmailers. It's a bottomless hole. It's a good choice to keep all the evidence and report to the police. The above personal opinions are welcome to be criticized and corrected. Agree with me, please click like before you go, thank you! Like me, please pay attention to me, thank you again
Call the police. If you receive a similar e-mail, you can directly pull the sender into the blacklist, and report the e-mail, so that you will not receive such e-mail. In addition, if the e-mail box can, you can set a receiving rule, set sensitive words, and then do not accept such e-mail, which can help to avoid such e-mail. Do not click any link above to avoid being stolen
if the threat of extortion is violence, the perpetrator claims that it will be carried out in the future; The threat of kidnapping violence was implemented at that time and on the spot. The perpetrator of the crime of extortion does not abct the victim to hide and control, while the crime of kidnapping should abct the victim to hide and control
extended information:
the constituent elements of the crime of extortion:
1. Subjective elements
this crime shows direct intention in subjective aspect, and must have the purpose of illegally extorting other people's property. If the actor does not have this purpose, or the purpose of obtaining property is not illegal, for example, the creditor uses threatening language to urge the debtor to speed up the repayment in order to repay the long overe debt, it does not constitute the crime of extortion
The object of this crime is a complex object, which not only infringes the ownership of public and private property, but also endangers the personal rights or other rights and interests of others. This is one of the distinctive characteristics of this crime which is different from larceny and fraud. The object of this crime is public and private propertyat first glance, it's a liar, just a new routine
now bitcoin is more than 80000. Think about it.
at present, the vast majority of digital currency transactions are concted in exchanges. Among the numerous exchanges, bitfinex, binance, okex and so on are well-known
However, bitcoin and other digital currencies, as decentralized assets, have to be traded in a centralized exchange, which seems to have hidden contradictions and dangers1. Problems and challenges of stock exchanges=“ //www.yuanxue365.com/en/img_fd039245d688d43fdf16c83b761ed21b0ff43bbf ">
in February 2014, Mt. GOx, the world's largest bitcoin exchange at that time, was stolen 850000 bitcoins, and the price of bitcoin suffered a" cliff "crash on that day. Later, it was revealed that Mt. GOx was in fact a thief, and only 7000 bitcoins were actually stolen
in August 2016, bitfinex, the largest U.S. dollar bitcoin trading platform, suffered a security vulnerability, resulting in the theft of 120000 bitcoins, which was worth $65 million at that time. If converted into the price in December 2017, it would be worth nearly $2 billion
on December 19, 2017, South Korea's youbit exchange was attacked by hackers and lost 4000 bitcoins, and the exchange declared bankruptcy
on December 21, 2017, the Ukrainian liqui exchange was stolen 60000 bitcoins, and the unit price of bitcoin plummeted by US $2000
in 2018, such a drama will only continue
in addition to the threat of hackers, traditional exchanges also have some inherent shortcomings, such as lack of supervision and inefficiency. The security of the exchange for investors can only rely on its own credit, and the cost of running is very low. The stock exchange is regulated at the national level, but there is no such sword of Damocles on the top of the digital currency exchange. Moreover, in an exchange, the same order can only be submitted to one exchange. After the user places an order, the funds used for the transaction will be frozen and can only wait for the completion or cancellation of the transaction. These are undoubtedly inefficient
All in all, the problems of exchanges are the problems of centralization2. Decentralization of exchanges=“ //www.yuanxue365.com/en/img_86d6277f9e2f070889a173c9e224b899a801f257 ">
(1) the progress of the exchange itself
the upgrade of security means is various. At present, the best use is cold wallet, that is, to keep the digital currency in the offline U disk. At the end of 2017, when the YouTube exchange was attacked, 75% of its assets were withdrawn into the cold purse in time to avoid greater losses. However, it seems to be a helpless way to protect the online assets by offline means. Of course, there should be many other methods, which will not be repeated here
(2) the representative of cross ledger transaction is ripple network, and the operating company is ripple labs, which is a semi centralized system. Ripple is a decentralized clearing agreement. In order to solve the high cost and delay of inter-bank clearing, its base currency is XRP. Ripple network can connect all kinds of assets, such as US dollar, RMB, Japanese yen, bitcoin, etc. to its own network. In this system, U.S. dollars or bitcoin can be converted into reborn currency, and then reborn currency can circulate freely in the network, just as a highway is built between various assets. Due to the support of major banking institutions, the reborn currency achieved nearly 300 times growth in 2017
(3) decentralized exchange
some teams try to use blockchain technology to build a decentralized exchange. This kind of decentralized exchange, to some extent, is an extension of cross ledger trading
bitshares is the most representative of early rising projects. It builds a blockchain development platform with servers scattered all over the world. Even if some of them are attacked, the system will not collapse. Anyone can transfer money and borrow money freely on this platform, and can also quickly build a centralized exchange based on this platform. In order to ensure stable value, bitstocks also require three times of digital assets as collateral. At present, bitstocks are running fairly well
later, with the development of Ethereum and smart contract, the x x protocol came into being. This is an open protocol running in the Ethereum blockchain and a decentralized exchange in the Ethereum ecosystem. The agreement has attracted many investors. At present, it has completed financing and started to build open source software tools and infrastructure. Of course, there are many competitors. Ether Delta, IDEX and oasis DEX are trying to provide similar functions. Moreover, it is a smart contract system based on Ethereum, which only supports erc20 token. If other smart contract public chains start to rise, the demand will be reced
in addition, there are some teams that are entering, such as the domestic road seal agreement, looping (LRC) in English. They adopted a design similar to the X protocol, and also introced a fast payment function similar to the lightning network. It is characterized by trying to match multiple exchanges, the user's order can be broadcast to multiple exchanges, and completed by different exchanges. Moreover, the user can still use the account funds after placing an order, and the user's behavior of transferring part or all of the funds is equivalent to partial or total cancellation. To some extent, it improves the breadth and timeliness of the transaction. However, this system seems to have damaged the "power" of the existing exchanges. Whether we can persuade everyone to play together will be a difficult problem
At present, there is still a long way to go for the construction of decentralized exchange. In 3-5 years, traditional exchange will still be the main battlefield of digital currency However, in the future, it is worth looking forward to let the decentralized digital currency get rid of the shackles of centralization2. If you don't have a backup, you have to call the police
3. Contacting hackers without permission can't recover data, and they will only sink deeper and deeper
4. Pay attention to more backup and multiple ways in the future, and the daily responsibilities of the administrator should also be managed by someone.
The second wave of blockchain candy of kecoin.com starts to be distributed at 20:00 today. Friends who have registered before can't register any more. They don't have the time to get on the bus
< img SRC = "52286412118" / >
You can call 12377 to report a blackmail. In addition to maintaining personal privacy through "12377", we can also report "seven bottom line harmful information" such as "network blackmail and paid deletion", "violent and terrorist audio and video harmful information", violation of laws and regulations bottom line, and "illegal and bad information" such as obscenity and pornography
all citizens can report online illegal case clues and online illegal and bad information
the report website of the Ministry of public security will take every clue seriously. After verification, if the situation is true, the public security organ will deal with the reported website and relevant personnel in accordance with the law, and feed back the handling situation to the informant
extended information:
notes for reporting:
1. Real name reporting is advocated. Please fill in the contact information for real name reporting
2. Please fill in all columns in the report form truthfully and try to be detailed. Marked with & quot***& quot; Required items are required
3. For the convenience of query processing results, please register users. Registered users can query the processing results of previous reports after logging in, while non registered users can only query the investigation situation of a single report with the alarm code and query password
