BTC protocol hijacking
BTC, usdt, ETH, BCH, LTC mean respectively:
1, BTC
bitcoin. The concept was first proposed by Nakamoto in 2009. According to Nakamoto's idea, the open source software is designed and released, and the P2P network is built on it. Bitcoin is a kind of P2P digital currency. Point to point transmission means a decentralized payment system
2, usdt
TEDA currency is a virtual currency that links cryptocurrency with legal currency US dollar, and is a virtual currency kept in foreign exchange reserve account and supported by legal currency
EthEthereum is an open source public blockchain platform with intelligent contract function, which provides decentralized Ethereum virtual machine to process point-to-point contract through its special cryptocurrency ether
4. BCH
bitcoin cash is a new version of bitcoin with different configurations launched by a small number of bitcoin developers
at 20:20 on August 1, 2017, bitcoin cash starts mining, and each bitcoin investor's account will have the same amount of bitcoin cash (BCH)
5, LTC
litecoin, abbreviated as LTC, currency symbol: & # 321;; It is a kind of network currency based on "peer-to-peer" technology. It is also an open source software project under MIT / X11 license. It can help users make instant payments to anyone in the world
source of reference: network bitcoin
source of reference: network TEDA coin
source of reference: network Ethereum
source of reference: network bitcoin cash
source of reference: network letcoin
source of reference: Network
They are:
bitcoin
the concept of bitcoin was first proposed by Nakamoto in 2009. According to Nakamoto's ideas, the open source software was designed and released, and the P2P network was built on it. Bitcoin is a kind of P2P digital currency. Point to point transmission means a decentralized payment system
bitcoin cash
bitcoin cash is a new version of bitcoin with different configurations launched by a small number of bitcoin developers
extended data:
virtual currency refers to non real currency. Well known virtual currency, such as network company's network currency, Tencent company's Q currency, Q point, Shanda company's voucher, Sina's Micro currency (used for micro games, Sina reading, etc.), chivalrous Yuanbao (used for chivalrous road game), silver pattern (used for bixue Qingtian game)
the popular digital currencies in 2013 are bitcoin, Leyte coin, infinite coin, quark coin, zeta coin, BBQ coin, pennies (Internet), invisible gold bar, red coin and prime currency. At present, hundreds of digital currencies are issued all over the world. Popular in the circle & quot; The legend of "bitcoin, Wright silver, infinite copper, pennies aluminum"
2. If you don't have a backup, you have to call the police
3. Contacting hackers without permission can't recover data, and they will only sink deeper and deeper
4. Pay attention to more backup and multiple ways in the future, and the daily responsibilities of the administrator should also be managed by someone.
Start VB. Form Form1
Caption =" Form1"< br /> ClientHeight = 6165
ClientLeft = 60
ClientTop = 450
ClientWidth = 10035
LinkTopic = " Form1"< br /> ScaleHeight = 6165
ScaleWidth = 10035
StartUpPosition = 3 35;39; Start VB.CommandButton Command1
Caption =" "< After /> Height ===495<<<<<<> Left =3480<<<<
TabIndex ==10<<<<<<> //> eiHeiHeiHeiIndeIndeIndeIndex ====4920<<<
/> />> eieiHeight ===============Text = " 8" br /> Top = 1200
Width = 615
End
Start VB.TextBox Text3
Height = 495
Left = 3960
TabIndex = 6
Text = " 5" br /> Top = 1200
Width = 615
End
Start VB.TextBox Text2
Height = 495
Left = 4920
TabIndex = 5
Text = " 5" br /> Top = 480
Width = 615
End
Start VB.TextBox Text1
Height = 495
Left = 3960
TabIndex = 4
Text = " 3" Top ===480<<<<<<<<<<<<<<<<<<<> End<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<> Top ==2400<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>LabelLabel4
Caption ="" quot; The HeiHeight ===495<<<<<<< /> Left =4680<<<<<<<< /> TabIndex ===<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< /> TabIndeIndeIndeIndex <<<<<<<<<<<<<<<<<<<<<<< />>>>>>>>> />>>>> />>>> The eiHeiHeiHeiHeiHeiTop Top = 1920
Width = 2535
End
Start VB. Label Label3
Caption ="& quot; br /> Height = 495
Left = 4680
TabIndex = 2
Top = 720
Width = 135
End
Start VB. Label Label Label2
Caption = " "< br /> Height = 495
Left = 3000
TabIndex = 1
Top = 1320
Width = 855
End
Start VB. Label Label Label1
Caption = " "< br /> Height = 255
Left = 3000
TabIndex = 0
Top = 600
Width = 735
End
End
VB Attributes Form1"< br />Attributes of VB Global NameSpace = False
Attributes of VB Creatable = False
Attributes of VB to PredeclaredId = True
Attributes of VB Exposed = False
Private Sub Command1 Click()
Dim T1 As Integer, T2 As Integer, T3 As Integer
T1 = Val(Text1) * 60 + Val(Text2)
T2 = Val(Text3) * 60 + Val(Text4)
T3 = T2 - T1
Label5 = " " " T3
Label6 = " " " Int((T3 / 60 * 2.5) * 10 + 0.5) / 10
End Sub
The reason for this blackmail virus attack has no direct relationship with bitcoin itself. The instry is worried that bitcoin will be "demonized". The reason why hackers want to pay ransom with bitcoin is that they only see its advantages in global transfer and remittance, and thus become the chosen means of payment

1. It can solve the problems that other public chains can't solve, that is, the value. The infrastructure of the public chain is mature, not to mention the future
2, block transmission is the fastest, from second to second
3. The wallet can store bitp, BTC, Eth and other multi clock currencies and realize Flash cash, cross chain, and players in the coin circle don't need to download multiple wallets
4, multi address generation, currency mixing technology, to achieve two-way anonymity
5, beyond the Ethernet 2.0 BPOs four main node mining
6. For the second truly decentralized public chain native coin, the project side only has 1% in the first year, and the price voice is given to all consensus makers
7. Now is the stage of consensus building to grab the original currency. The mode is free and humanized, with high viscosity and low wastage rate
8, low-key and practical operation, step by step on the time node, seamless closed-loop, unlimited growth space.
hope to help you remember to adopt them as the answer
