Can hackers change the number of bitcoins
Publish: 2021-04-07 23:06:58
1. You can introce bitcoin on the Internet. The characteristics of bitcoin can explain your problem. Many criminals launder money through bitcoin. You can focus on points 2 and 4
1. Complete decentralization, without issuing institutions, it is impossible to manipulate the number of issues. Its distribution and circulation are realized through open-source P2P algorithm
2. Anonymity, tax exemption and supervision free
3. Robustness. Bitcoin is completely dependent on P2P network and has no distribution center, so it cannot be shut down externally. Bitcoin price may fluctuate and collapse, and many governments may declare it illegal, but bitcoin and its huge P2P network will not disappear
4. Borderless and cross-border. Cross border remittance will go through layers of exchange control agencies, and the transaction records will be recorded by many parties. But if you trade with bitcoin, enter the digital address directly, click the mouse and wait for the P2P network to confirm the transaction, a lot of money will pass. It does not go through any regulatory agencies and will not leave any cross-border transaction records
5. It is difficult for the cat to survive. Because bitcoin algorithm is completely open source, anyone can download the source code, modify some parameters, recompile, and create a new P2P currency. But these counterfeit currencies are fragile and vulnerable to 51% attacks. Any indivial or organization, as long as it controls 51% of the computing power of a P2P currency network, can manipulate transactions and currency value at will, which will be a devastating blow to P2P currency. Many Shanzhai coins die in this link. The bitcoin network is robust enough. If you want to control 51% of the computing power of the bitcoin network, the number of CPUs / GPUs required will be astronomical.
1. Complete decentralization, without issuing institutions, it is impossible to manipulate the number of issues. Its distribution and circulation are realized through open-source P2P algorithm
2. Anonymity, tax exemption and supervision free
3. Robustness. Bitcoin is completely dependent on P2P network and has no distribution center, so it cannot be shut down externally. Bitcoin price may fluctuate and collapse, and many governments may declare it illegal, but bitcoin and its huge P2P network will not disappear
4. Borderless and cross-border. Cross border remittance will go through layers of exchange control agencies, and the transaction records will be recorded by many parties. But if you trade with bitcoin, enter the digital address directly, click the mouse and wait for the P2P network to confirm the transaction, a lot of money will pass. It does not go through any regulatory agencies and will not leave any cross-border transaction records
5. It is difficult for the cat to survive. Because bitcoin algorithm is completely open source, anyone can download the source code, modify some parameters, recompile, and create a new P2P currency. But these counterfeit currencies are fragile and vulnerable to 51% attacks. Any indivial or organization, as long as it controls 51% of the computing power of a P2P currency network, can manipulate transactions and currency value at will, which will be a devastating blow to P2P currency. Many Shanzhai coins die in this link. The bitcoin network is robust enough. If you want to control 51% of the computing power of the bitcoin network, the number of CPUs / GPUs required will be astronomical.
2.
as we all know, the "blackmail virus" is rampant all over the world, and hackers ask the "victims" who are recruited to pay bitcoin. According to the data, the price of bitcoin has skyrocketed by 2.21 million times in the past eight years
for the rise of bitcoin price, the Chinese people must have made their own contribution. After all, bitcoin trading in China once accounted for more than 80% of the global trading volume
However, according to the latest data from the research department of fire coin, Japan accounted for 46.4% of the global bitcoin trading volume last week, followed by the United States, accounting for 26.4%, China ranked third, and the trading volume dropped to 10%. Therefore, if the price of bitcoin exceeds 10000 yuan recently, the contribution of Chinese people should be very small3.
The reason for this blackmail virus attack has no direct relationship with bitcoin itself. The instry is worried that bitcoin will be "demonized". The reason why hackers want to pay ransom with bitcoin is that they only see its advantages in global transfer and remittance, and thus become the chosen means of payment

4. It's almost impossible. Bitcoin is stored in blockchain. Due to the characteristics of blockchain, it's almost impossible to modify the balance of bitcoin
5. The bitcoin server has its own independent system and management mechanism. The modified database does not match their database and is useless. The hot backup servers are automatically restored
6. Hello
1.
is the solution of the equation. For example, one number of a function can only be 1, 0, and negative 1. Then there are only three finite solutions<
2.
money is only in the middle, and it has to be spent before it has value, so you are right about the second point. The loss of wealth
3.
it's possible that whoever has a big maker will follow him, just like the virtual currency now has a big bitcoin plate and a big maker
just for personal point of view, don't spray if you don't like it, thank you.
1.
is the solution of the equation. For example, one number of a function can only be 1, 0, and negative 1. Then there are only three finite solutions<
2.
money is only in the middle, and it has to be spent before it has value, so you are right about the second point. The loss of wealth
3.
it's possible that whoever has a big maker will follow him, just like the virtual currency now has a big bitcoin plate and a big maker
just for personal point of view, don't spray if you don't like it, thank you.
7. Bitcoin can only be cracked by computing power, but the cost of cracking is too high. So no one is going to crack it.
8. Unless there is a vulnerability in the app that is easy to break. Hackers generally rely on these to go through layers of defense. To tamper with data. It's not that it's impossible.
9. According to the analysis of 360 security center, the campus network blackmail virus was spread by the "eternal blue" hacker weapon leaked by NSA“ "Eternal blue" can remotely attack the 445 port (file sharing) of windows. If the system does not install the Microsoft patch in March this year, it does not need any user operation. As long as it turns on the Internet, "eternal blue" can execute any code in the computer and implant malicious programs such as blackmail virus.
Hot content
