Can you make money by reselling bitcoin
Development:
1. Bitcoin (bitcoin) is a kind of network virtual currency, which can buy real-life goods. It is characterized by decentralization, anonymity, and can only be used in the digital world. It does not belong to any country or financial institution, and is not subject to geographical restrictions. It can be exchanged anywhere in the world. Therefore, it is used as a money laundering tool by some criminals. In 2013, the U.S. government recognized the legal status of bitcoin, making the price of bitcoin soar. In China, on November 19, 2013, a bitcoin was equivalent to 6989 yuan
2. On January 7, 2014, Taobao announced that it would ban the sale of Internet virtual currencies such as bitcoin and lightcoin from January 14. West Virginia Democratic Senator Joe; On February 26, 2014, Joe Manchin issued an open letter to a number of regulatory authorities of the US federal government, hoping that relevant institutions would pay attention to the current situation of bitcoin encouraging illegal activities and disrupting the financial order, and demanded that actions be taken as soon as possible to completely ban the electronic currency. On January 11, 2017), the Shanghai headquarters of the people's Bank of China and the Shanghai Municipal Finance Office carried out on-site inspection of bitcoin China.
It's not against the law to do bitcoin business, but don't use bitcoin to do illegal things
the following is the bitcoin risk notice issued by the central bank and other five ministries and commissions (bitcoin home has the full text):
the notice defines the nature of bitcoin, and holds that bitcoin is not issued by the monetary authority, has no monetary attributes such as legal compensation and mandatory, and is not a real currency. In terms of nature, bitcoin is a specific virtual commodity, which does not have the same legal status as currency and cannot and should not be used as currency in the market. However, bitcoin trading as a commodity trading behavior on the Internet, ordinary people have the freedom to participate at their own risk
It's not against the law to do bitcoin business, but don't use bitcoin to do illegal things
in China, the regulations on the administration of RMB prohibit the proction and sale of token tickets. Because there is no clear judicial interpretation of the definition of token ticket, if bitcoin is included in the "token ticket", the legal prospect of bitcoin in China will face uncertainty
the notice of the Ministry of culture and the Ministry of Commerce on strengthening the management of virtual currency of online games (Wen Shi Fa [2009] No. 20) on June 4, 2009 stated that the application scope of virtual currency of online games was defined for the first time, and the distinction between the current virtual currency of online games and the virtual props in the game was made; At the same time, the notice said that the "notice" stipulates that enterprises engaged in related services must be approved before they can operate
in China, some Taobao stores also began to accept the use of bitcoin, and the number of businesses will graally increase
in October 2013, the first bitcoin quarterly, one bit, was released
on October 15, 2013, the network accelerator service of the network announced its support for bitcoin
on October 26, 2013, btcmini reported that GBL was hacked
on October 31, 2013, Lei Teng, a famous Internet lawyer, proposed the event of "filing a case to investigate the closure of GBL bitcoin trading platform as soon as possible", analyzed the "value function" and "use function" of bitcoin, and bitcoin should be governed by relevant laws
on December 5, 2013, notice of the Ministry of instry and information technology of the people's Bank of China, China Banking Regulatory Commission, China Securities Regulatory Commission and China Insurance Regulatory Commission on preventing bitcoin risk: bitcoin is a specific virtual commodity
as a commodity trading behavior on the Internet, ordinary people have the freedom to participate in bitcoin trading at their own risk
on September 4, 2017, announcement of the people's Bank of China Central Network Information Office, Ministry of instry and information technology, State Administration for Instry and commerce, China Banking Regulatory Commission, China Securities Regulatory Commission and China Insurance Regulatory Commission on preventing the risk of token issuance financing: it is prohibited to engage in token issuance financing activities (ICO)
the trading platform shall not engage in the exchange business between legal tender and token, or virtual currency, or buy or sell token or virtual currency as a central counter party, or provide pricing, information intermediary and other services for token or virtual currency
on November 2, 2018, the people's Bank of China released the 12th topic of China financial stability report 2018, which talked about "encrypted assets"
{rrrrrrr}
extended information:
currency transaction
purchase method
< P > users can buy bitcoin, and at the same time, they can use computers to "mine" bitcoin according to algorithms. When users "mine" bitcoin, they need to search for 64 bit numbers by computer and then, by repeatedly solving mysteries, compete with other gold miners to provide the required numbers for the bitcoin network. If the user's computer successfully creates a set of numbers, it will get 25 bitcoins
e to the decentralized programming of bitcoin system, only 25 bitcoins can be obtained every 10 minutes, and by 2140, the upper limit of bitcoins in circulation will reach 21 million. In other words, bitcoin system is able to achieve self-sufficiency, resist inflation through coding, and prevent others from destroying these codes
source of reference: network bitcoin
There are risks
on the one hand, the Internet real name system can become the "iron broom" to sweep away bad information, on the other hand, it will make all Internet platforms become "fat meat" in the eyes of hackers, increasing the risk of personal information leakage of Internet users
according to the analysis report on the situation of personal information leakage from websites in 2016 released by 360 patch day vulnerability platform in March 2017, 58.5% of the website vulnerabilities in 2016 will lead to the leakage of real name information, 62.4% of the website vulnerabilities will disclose behavior information, and the number of possible leaks can reach 4.23 billion and 4.01 billion
according to insiders, hackers often get users' registration information on Internet platforms and sell it to lawless elements by "scanning numbers and colliding libraries", but many platforms still lack effective defense measures against this "colliding library attack"
extended data:
holds up the "umbrella" of personal information for real name netizens
the major Internet platforms graally improve their own defense systems from both technical and regulatory aspects to prevent hacker attacks from leading to user information leakage. It is understood that a security team has been set up on an Internet shopping platform to discover high-level persistent threats on the internal network based on the security risk detection and identification of network security attacks, mine and detect phishing websites targeting buyers and businesses, and deal with them in a timely manner
the relevant departments of the state have successively issued various laws and regulations to ensure the information security of Internet users
"China's" decision on strengthening the protection of network information "," tort liability law "and its judicial interpretation and a series of legal provisions have repeatedly stressed the issue of personal information security. It can be seen that China's network information security and personal data security have been raised to the highest level of the country, and strict legal proceres and clear legal authorization are required for the use and collection of personal information. "
Zhu Wei, deputy director of the communication law research center of China University of political science and law, believes that under such a background, the comprehensive establishment of the real name system can actually strengthen the personal information security protection of users
