Position: Home page » Bitcoin » Old traders analyze bitcoin

Old traders analyze bitcoin

Publish: 2021-04-21 02:15:44
1. In order to understand the technical principle of bitcoin, we need to understand two important cryptographic techniques: hash code: it converts a long string into a fixed length string, and its conversion is irreversible, that is, it is impossible to guess the original string from hash code. Sha256 is mainly used in bitcoin protocol
public key system: corresponds to a public key and a private key, keeps the private key in the application and publishes the public key. When Party A transmits information to Party B, it can use Party A's private key to encrypt the information, and Party B can use Party A's public key to decrypt the information, so as to ensure that the third party cannot impersonate Party A to send the information; At the same time, when Party A transmits information to Party B, it is encrypted with Party B's public key and sent to Party B, and then Party B decrypts it with his own private key, so as to ensure that the third party cannot eavesdrop on the communication between the two people. RSA is the most common public key system, but the lliptic curve digital signature algorithm is used in bitcoin protocol. What's the difference between cash and bank account? Bitcoin is an electronic currency in BTC. In this article, it is also used to refer to the whole bitcoin system. Like opening an account in a bank, the corresponding concept in bitcoin is address. Everyone can have one or more bitcoin addresses, which are used to pay and collect money. Each address is a string that starts with 1. For example, I have two bitcoin accounts, and. A bitcoin account is uniquely determined by a pair of public key and private key. To save the account, you only need to save the private key file. Unlike bank accounts, banks keep all transaction records and maintain the book balance of each account, while bitcoin's transaction records are jointly maintained by the whole P2P network through a pre agreed protocol. How much money is in my account address? Although the current account balance can be seen by bitcoin software, unlike banks, there is no place to maintain the book balance of each address. It can only calculate the account balance in real time through all historical transactions. How do I pay? When I pay from address a to address B of the other party, the payment amount is e. at this time, both parties will announce the transaction information to each network node, telling address a to pay to address B, and the payment amount is e. In order to prevent the third party from forging the transaction information, the transaction information will be encrypted with the private key of address A. at this time, the network node receiving the transaction information can use the public key of address a to verify that the transaction information is indeed sent by address a. Of course, trading software will help us do these things, we just need to input the relevant parameters in the software. What will the network node do after receiving the transaction information? This is the most important part of the bitcoin system, which needs to be elaborated. For the sake of simplicity, only bitcoin protocol has been implemented. In the current version, each network node will save all transaction information synchronously. There are two kinds of transaction information in history, one is & quot; Verified & quot; The transaction information, that is, the verified transaction information, is stored in a series of "blocks". Each & quot; block" Is the previous & quot; bock" The ID of each block is the hash code of the hash code of the block and the new transaction information (see an actual block). The other category refers to those who also & quot; Unverified & quot; The transaction information just paid above belongs to this category. When a network node receives new unverified transaction information (possibly more than one), it can calculate the book balance of each address at that time because the node keeps all the transaction information in history, so it can calculate whether the transaction information is valid, that is, whether there is enough balance in the payment account. After eliminating the invalid transaction information, it first takes out the last & quot; block" Then, the unverified transaction information is combined with the ID, and a verification code is added to form a new "block". It needs a lot of calculation to build a new block, because it needs to calculate the verification code, so that the above combination becomes a block, that is, the first several bits of the hash code of the block are 1. At present, the first 13 bits need to be 1 (generally, the specific method is uncertain), which means that if the block is generated by enumeration method, the average number of enumerations is 16 ^ 13. Using CPU resources to generate a block is called "gold mining", because the proction of the block will get a certain reward, and the reward information has been included in the block. When a network node generates a new block, it will broadcast to other network nodes. However, this network block may not be accepted by the network, because it is possible that other network nodes have proced the block earlier. Only the earliest block or the block with the largest number of subsequent blocks is valid, and the remaining blocks are no longer used as the initial blocks of the next block. How does the other party confirm that the payment is successful? When the payment information is distributed to the network node, the network node begins to calculate whether the transaction is valid (that is, whether the account balance is enough to pay), and attempts to generate blocks containing the transaction information. When six blocks (one direct block and five subsequent blocks) contain the transaction information, the transaction information is considered "verified", so that the transaction is formally confirmed, and the other party can confirm the successful payment. A possible problem is that I will pay the balance of address a to address B, and at the same time pay to address C. If I only verify that the single comparison transaction is valid. At this point, my way of cheating is to generate six blocks including B to B and six blocks including C to C before the truth is revealed. Because I need a very long CPU time to generate a block, compared with the whole network, the probability of my cheating success is very small. What is the motivation of network nodes to proce blocks? As can be seen from the above description, in order to make the transaction information effective, the network node needs to generate 1 and 5 subsequent blocks to contain the transaction information, and such block generation is very CPU intensive. How to let other network nodes help to proce blocks as soon as possible? The answer is very simple. The agreement stipulates that BTC will be rewarded for the address where the block is proced, as well as the Commission promised by both parties. At present, the reward for procing a block is 50btc, which will be halved every four years in the future. For example, the reward will be 25btc from 2013 to 2016. Is the transaction anonymous? Yes, and No. All bitcoin transactions are visible. We can check all transaction records of each account, such as mine. But what's different from the banking monetary system is that everyone's account itself is anonymous, and everyone can open many accounts. In general, anonymity is not as good as it claims. But bitcoin has another advantage in doing black market trading: it can't be frozen. Even if the police trace a bitcoin address, there is nothing they can do unless they trace the computer used by the exchange based on the Internet address. How to ensure that bitcoin does not depreciate? Generally speaking, in the case of equivalent trading activities, the value of money is inversely proportional to the amount of money issued. Unlike the traditional money market, the central bank can determine the amount of money issued. Bitcoin does not have a central issuing institution. Only by procing blocks can we get a certain amount of BTC currency. Therefore, bitcoin's new amount of money depends on: 1. The speed of procing blocks: bitcoin's agreement stipulates that the difficulty of procing blocks is fixed at an average of 2016 every two weeks, about 10 minutes. Moore's law of doubling CPU speed every 18 months will not speed up the proction of block. 2. The number of rewards for block proction: at present, 50 BTC is awarded for each block proced, which is halved every four years. In 2013, 25 BTC is awarded, and in 2017, 12.5 BTC is awarded. Considering the above two factors, bitcoin's currency issuing speed is not controlled by any single node in the network. Its protocol makes the currency stock known in advance, and the maximum stock is only 21 million BTC
2. Bitcoin is different from the previous currency, it completely relies on the Internet to create and trade; Bitcoin's unique technical attributes lead to its economic and cultural attributes beyond the present currency. Bitcoin is a kind of electronic currency proced by open-source P2P software. Compared with the paper currency in circulation, the biggest feature of bitcoin is decentralization and global circulation in the network world, followed by high security and high confidentiality. These technical attributes further extend to the economic attributes of no inflation, no freezing, and no man-made supply; In terms of culture, bitcoin is popular among anarchists and liberals. The advantages of bitcoin are artificially exaggerated, and its anti inflation and anti inflation functions cannot stand up to scrutiny. In the long run, the prospect of bit is hard to match that of gold. In the most optimistic case, it will become a means of payment in some areas; But in the short and medium term, bit still has room for speculation and imagination. In addition, the use of bitcoin in some sensitive areas highlights the increasingly prominent role of information in national security
1. The advantages of bitcoin are exaggerated: About decentralization, no transaction costs and anti inflation
it is true that bitcoin has various advantages over paper money, but these advantages have been over interpreted. First of all, bitcoin is a kind of decentralized currency, which will not have the same risk of central bank controlling money supply and affecting market value as paper money; Bitcoin is mainly held in the hands of large investors, and the market depth is not enough. At present, the trading behavior of large investors is also very easy to affect the price of bitcoin. Even if the attribute of decentralization is regarded as the advantage of bitcoin when it is fully mature, then the prerequisite of holding decentralization should be added. In addition, there are great differences between centralized and decentralized online payment systems in the degree and type of financial risks they are exposed to
secondly, the low transaction cost of bitcoin is not without transaction cost. On the contrary, e to the increasing difficulty of bitcoin mining and the further stability of currency value, the dependence of relevant transaction platforms on transaction cost will increase, which will certainly increase the transaction cost. Finally, the confidentiality of the bitcoin transaction needs to be discussed. The principle of the bitcoin transaction makes all the processes of each bitcoin transaction stored in each machine. If someone can determine the real background of a transaction, they can find all the transactions down and up through these data
compared with other advantages, anti inflation or anti inflation is the most publicized advantage. Although its supply is stable and the upper limit of supply is locked according to its algorithm, unless the whole world is unified and all countries use bits as currency, it can not prevent the over issuance of money only as a means of payment or a storage of value, just as the current existence of gold can not constrain the growth of each country's currency. If bits can only be used as a means of payment in local areas (such as the network), then global or some countries' inflation will still be transmitted to the areas where bits are used. Therefore, the use of bits to prevent inflation is basically untenable, or has a strong premise. As for anti inflation, that is to say, it has the function of value storage, it needs to have the property similar to gold. However, from the reality, bit's essential property and prospect are still hard to match gold. See below for details
2. Bitcoin's future positioning is too high
the expectation of bitcoin's future in the market generally compares it with gold and US dollar, which is relatively high. The recognition of gold not only lies in its natural physical properties, but also in its official acceptance as a reserve currency (or an important allocation of foreign exchange assets). In theory, bitcoin as an electronic currency does not have the unique and exclusive status, and it is more difficult to become the official reserve of central banks like gold. Therefore, it is not appropriate to expect too much bit. As an electronic currency, bit has the first mover advantage. If it can be guaranteed in terms of security, its most optimistic prospect will be as a means of payment in local areas
3. Speculation and speculative demand caused by event factors are the main reasons for the rise of bitcoin in this round
under the credit currency system, people's lack of confidence in the currencies of various countries and pessimistic economic prospects are the general environment for the rise of bitcoin in this round. The speculation of the major dealers in the market and the derivatives market of bitcoin, together with the speculative psychology of the participants, further accelerated its rise. Btcchina's investment of US $5 million and the announcement of Ben's position are the main driving factors for the recent surge
however, a lot of big players start to enter the market and buy a lot, which not only drives the bit price up to a high level, but also increases the market risk. Chamath, a former Facebook executive, has spent $5 million on bitcoin and plans to spend another $10 million. Bitcoin investment trust also exceeded its target within four weeks, raising $15 million. These people's investments not only make bitcoin further rise, but also concentrate on the holding of bitcoin, which strengthens the influence of indivials and institutions on the price of bitcoin and increases the market risk
4. There is still strong room for speculation in the medium and short term
although our previous analysis is not optimistic about the prospect of bit, it is likely that bit will still have strong room for speculation in such a short and medium term period of time as one year. As mentioned in the previous analysis, the creators of bitcoin advocate that the generation of bitcoin is not manipulated by human factors, which is quite different from the credit currencies of various countries. We expect that the monetary policies of major countries will be divided next year. With the release of economic risks and the heavy damage to traditional asset markets, bitcoin will have better room for speculation and imagination< The use of bitcoin in some sensitive areas highlights the increasingly prominent role of information in national security
the U.S. government seized the drug trading website "Silk Road" at the beginning of last month. A crowdfunding network called "assassination market" even marked the sale of murderers with bitcoin price. The founder of the assassin market, under the pseudonym of kuwabatake Sanjuro, is an extreme anarchist. Both prism gate incident and the use of bitcoin in relevant sensitive fields highlight the increasingly prominent position of information field in national security. The Third Plenary Session proposed the establishment of the national security committee, which will play an important role in China's security strategy and expand from traditional national defense, stability maintenance / urban security to information security and other emerging areas
3. The following is for your reference:
when it comes to the big three of traditional contracts, I have to mention bitmex. This old exchange was once the largest bitcoin contract trading platform in the world. With the advantages of good market depth and low transaction fees, it has long been at the top of the global exchanges only by contract trading. On the evening of May 19, bitmex suddenly went down, and investors could not operate normally for more than an hour. The last outage occurred two months ago. Although bitmex is still in the leading camp in the field of contract exchanges, its aura is much dimmer than at its peak. Repeated downtime and successive court cases have made many users suspicious of the platform and added uncertainty to the future of the platform
according to the latest data from skew, a cryptocurrency derivatives analysis company, bitmex ranked fourth with us $2.17 billion in the 24-hour BTC contract trading volume of the exchange, followed by fire coin, okex and coin an, with trading volumes of US $4.08 billion, US $3.93 billion and US $35.4 respectively, among which fire coin ranked first was nearly twice as high as bitmex. It can be seen that the performance of the old contract exchange's hot money and okex is still good. In just three months, the online perpetual contract of Huo coin won the first place in trading volume, which is closely related to the global compliance, mine pool, public chain, HT and other invisible values behind Huo coin group. On the other hand, however, when faced with the "312 exam", Huo coin and okex did not seem to go smoothly. For a while, problems such as pin insertion, downtime, network cable pulling, and inability to close positions swarmed in, and even the headquarters rights protection incident occurred. Like bitmex, customers of both exchanges are questioning whether this is a manifestation of "shoplifting"? In the face of extremely high trading volume and accumulated instry reputation over the past few years, how should Xiaosan choose
in September 2019, Jex, the cryptocurrency derivatives platform, was acquired by the security capital, and a / b double contracts were launched in parallel. Almost at the same time, bitmex's official twitter also targeted "plagiarism" at coin an. From open margin trading to futures and options, currency security is following the path of contracts. It seems that the way of currency security entering the contract is not smooth: a series of scandals, such as deliberate pin insertion, K-line optimization and early position explosion, also broke out. But these still can't stop coin an from taking a share in the traditional contract giant's trading volume
of course, good depth, large user base and strong professionalism are the advantages of the first-line mainstream exchanges. The other side of the coin, such as bitmex's too professional user interface, has turned away many new retail investors and Xiao users. At the same time, KOL, big V and local communities, which have strong capacity to bring volume, resolutely join in the arms of emerging exchanges such as bybit and bitge e to low commission rebate and low handling charges
all along, bybit's image in the circle is more like an "overseas player". According to official data, most users of bybit are located in Europe, with only 20% in Asia. In addition, bybit performs well in proct experience and other aspects, and the proct interface is single and clear, which can give users a better visual experience. Recently, the relevant person in charge of bybit said that it is necessary to vigorously develop the domestic market, but at present, there are few bybit contract varieties, and the Chinese market contract market competition is white hot, and the customer demand is diversified. If it wants to sink, I wonder if it will be acclimatized? Let's see
bitget is starting to make its mark in the contract instry this year. Because of its strong user experience and customer service, it has attracted a large number of Xiao users, and has good trading depth, so it is called "black horse of contract trading" in the circle. Recently, the newly launched one click merchandising proct is widely praised for its focus on solving the two-way pain points of users and traders. It is especially suitable for small white users and can play contracts without threshold. According to the evaluation on social network, bitget didn't go down in the two extreme markets of last year's "9.25" and this year's "3.12". The drawback is that although the positive and negative currencies are complete, before bitget only had one warehouse by one, not the whole warehouse, some users will not be used to it. Fortunately, now this function is online. It's a good choice
emerging exchange FTX was established in 2019. According to skew, a well-known data website, the daily trading volume of eth futures jumped to a record high of US $245 million on February 28, an increase of 51% compared with us $162 million on February 25. Behind the gorgeous trading data, the CEO of FTX fell into the scandal of misappropriating the assets of exchange customers, which also dragged FTX into a negative quagmire. According to the relevant data, most of FTX customers are from quantitative organizations, and the operation interface also stays at the PC side. At present, the app version has not been launched. For most domestic retail investors who are used to mobile Internet, inconvenient use is one of the biggest problems.
4. The essence of money is circulation. I don't mean illegal or small-scale. Bitcoin is similar to gold now. You can't say it doesn't have the characteristics of money, but it is not money. If it can't be recognized by most people in the future, it will lose all the properties of money
5.

As we approach the end of the year, when we plan to sprint for the goal of the end of the year, earn more bonus and prepare to release ourselves in the Spring Festival, don't forget that the fraudsters also have such a plan. At this time, the tide of shopping on double 12 and new year's day comes one after another, and people working outside are also busy booking tickets and air tickets for the Spring Festival, which provides opportunities for fraudsters. Here, liewang, the first online fraud information reporting platform linked by the police and the people in China, makes an inventory of the new trends of online fraud in 2017. Can you see through all these scams

trend 1: mobile payment has become the mainstream, beware of two-dimensional code trap

mobile payment has greatly facilitated people's life and made people travel easily. However, there are many criminals who use the way of scanning two-dimensional code to carry out fraud, which is impossible to prevent. For example, on bike sharing, a fake QR code is used to cover the regular QR code, and the avatar is set as the official icon of bike sharing to cheat users to pay or recharge; Next to the store's two-dimensional code, there are words full of temptation, such as "scan code to grab red packets", "scan code discount", etc., to lure users to scan the code, and then obtain user information or directly guide users to transfer money. There are even criminals who the illegal parking notice posted on the car by traffic police. The fake ticket is attached with a payment QR code to lure the car owner to scan the code to pay a "fine"

trend 2: fake businesses want to refund. Users should be careful of being" loaned online "

generally, people think that their bank card balance is small, even if they encounter swindlers, it doesn't matter. However, according to the report cases received by liewang platform, In the common refund fraud in 2017, fraudsters use mobile phones to receive SMS verification code to lure victims into Internet micro loan business, and finally transfer the loan to the swindler's account. This kind of fraud often involves a high amount of money and brings serious property losses to users

trend 3: mobile phones also contain extortion virus, and the payment method is more" people-friendly "

mobile phone extortion software has become a common tool for criminals to seek benefits e to its low proction cost and fast cash flow. At present, there are different forms of blackmail software in the mobile application market. Different from the blackmail software in the computer, bitcoin is needed to pay for it. The payment form in the mobile blackmail software is more "people-friendly"

a batch of blackmail software captured in 2017 attached wechat two-dimensional code information to the blackmail interface, and prompted the winner to directly scan the two-dimensional code for payment by wechat, which will automatically unlock after successful payment, and the user will automatically enter the transfer interface after scanning the code. However, through technical analysis, this kind of blackmail software does not have any code related to wechat transfer. The so-called "scan payment, automatically unlock" is actually a fraud, even if the user transfers, it will not automatically unlock

trend 4: fake customer service requests to provide payment code and swipe only by numbers

because code scanning payment is simple and convenient, in 2016, many fraudsters took a screenshot of the two-dimensional code to swipe. But in 2017, as payment companies added anti fraud tips or confidentiality settings in the process of payment QR code screenshots, swindlers immediately thought of countermeasures and swindled the numbers under the payment code, forming a new instrial chain

criminals often disguise themselves as merchants customer service, requiring users to provide figures such as Alipay, WeChat and other payment bar codes, and then, on the grounds of digital failure, require users to refresh the numbers and send them several times to achieve the purpose of stealing. p>

trend 5: download the specified software, but the account password is shared by cloud disk

users' privacy information can be stolen without using phishing websites and Trojan horse software. This year, swindlers have come up with new tricks: as long as the victims' trust is obtained, they can download cloud disk, synchronization software and other procts, log in to the account designated by the swindler to upload files and synchronize, and then they can easily get information. What's more, if the user synchronizes the SMS verification code at any time, the swindler can easily steal the funds in the bank card

fraudsters often disguise themselves as e-commerce, suppliers and other customer services, requiring users to download some cloud disk synchronization software, and then provide the specified account password for users to log in. At this time, if the user logs in and synchronizes the personal account, password and other information on the software according to the swindler's instructions, the funds on the account will be transferred quietly

trend 6: new phishing websites on mobile terminals are more covert and easy to be recruited

as security manufacturers increase their efforts to crack down on phishing websites, phishing website makers also strengthen their covert means, spread links by using proct sharing functions such as short URL, cloud disk service, browser and social tools, and finally jump through the URL, Guide users to phishing sites to launch online fraud

trend 7: indemnity should be paid in intimate way. Be careful with this kind of fraud SMS

as early as 2013, 360 company discovered a high-risk fraud binding the victim's online banking account. In recent years, with the use of mobile payment becoming more and more popular, In 2017, there was a similar kind of fraud, which used a payment platform to bind accounts and swipe victims' accounts

in May 2017, Mr. Di received a flight delay text message sent in the name of the airline, with flight information and customer service phone number attached in the text message, and said that Mr. Di could get 300 yuan of delay compensation. Fake customer service in the phone to guide Mr. Di refund operation, and provide the enterprise account, but also ask Mr. Di to open intimate payment function. However, after Mr. Di opened, he found that he had two dections, and realized that Mr. Di was cheated and immediately called the police

trend 8: investment in the circle of friends? Do not gambler psychology

in everyone's wechat group or circle of friends, there are often many activities or proct recommendations under the banner of discount. Not long ago, Mr. Wang saw a WeChat official account named "double half price win" in WeChat group chat. Mr. Wang then identified the official account as having an enterprise certification and believed that the platform had high credibility. p>

Mr. Wang invested a small amount in the early stage, and found that there was a certain income every day, so he subsequently invested in batches, but graally began to lose money“ He wants to invest more in order to earn back the capital. As a result, when contacting customer service again, he found that the other party had blackmailed him. Only then did he realize that he had been cheated and that the money he had invested had gone to nothing

trend 9: identity impersonation has a new pattern, be careful that "friends" are high imitations

in the past, online fraud of identity impersonation often occurred on QQ, wechat and other social platforms, but this year, swindlers shifted their focus to microblog. The swindler specially studies the social habits of the victims, such as the relationship between microblog staff and chat content, and then changes their avatars and nicknames to create high imitation numbers. Because most of the fake users are abroad, it is difficult for their microblog friends to distinguish the true from the false in time

trend 10: the combination of various means makes it impossible to prevent the" ghost "fraud.

in March 2017, 360 assisted the Shenzhen police in successfully cracking down the" midnight ghost "Telecom fraud Gang, which the police identified as an illegal trade instry chain relying on personal information, It is a high-tech, high intelligence, cross platform, remote-control new type of telecom network fraud crime that combines mobile cloud service, operator's deputy number service and Internet financial service. And this kind of stealing brush mainly uses different services of various platform service providers. A single service does not have the security risk of stealing brush, but it is combined to form stealing brush. In order to make it difficult for the victims to detect, the criminals choose to commit crimes late at night. The whole process does not need to have any contact with the victims, and the victims do not need to reply to any SMS, so prevention is very difficult

from the above ten cases, the current situation of network fraud is still not optimistic. The anti fraud experts of liewang platform hereby remind the netizens that the new year is approaching, the fraudsters are highly active, and all kinds of fraud means emerge in endlessly. At this time, we need to improve the anti fraud awareness, so that the fraudsters have no chance to take advantage of it

net hunting platform is jointly launched by Beijing Public Security Bureau and 360. It is an innovative platform to crack down on Internet fraud through Internet platform and Internet technology. Up to now, liewang platform has established contact with public security organs in more than 300 regions of the country, helped to detect more than 100 major Internet fraud cases, involving 170 million yuan, and knocked down more than 10 large-scale fraud gangs with strict organization and clear division of labor. Internet users can report malicious programs, malicious web addresses, fraulent phone calls, etc. to 360 Internet security center through the platform. Every piece of information reported by Internet users will be included in the big data of liewang platform, providing effective clues for the police to solve cases

6.

Bitcoin trading platform undertakes most of the functions of "bitcoin for cash" and "cash for bitcoin". The three largest exchange platforms in the world are Mt. GOx, bitstamp and btcchina. If you think that the use of bitcoin wallet is too cumbersome, the transaction data block takes up too much space. You can also use the trading platform as an online wallet. But note that bitcoin in the trading platform is actually stored on the website server
the total number of bitcoin trading platforms at home and abroad is about 100000 BTC. The daily turnover of bitcoin trading platform in normal operation in China is about 50000 BTC. But trading volume doesn't mean bitcoin usage. Speculators keep buying and selling bitcoin in the trading platform, which makes the trading volume of bitcoin far larger than the turnover among users; Even less bitcoin is used for payment
there are many online bitcoin trading institutions at home and abroad, which accept the exchange of bitcoin and legal tender. Mt. GOx is the earliest bitcoin trading platform, which was established in Japan in 2010. Bitstamp and btc-e are two other foreign trading platforms. There are also a large number of trading platforms in China
anyone can set up a bitcoin trading platform and develop a trading platform, which is no different from the development of traditional websites. And open source website has ready-made PHP class library can be called. Any bitcoin trading platform will become a live target for hackers. Can we guarantee the security of the website? If the website is attacked by hackers and all the bitcoin stored on the server is taken away, how to explain to the registered users? Mt. GOx, headquartered in Japan, used to be the largest bitcoin trading platform. On February 25, 2014, the official website of mt.gox was blank. Mt. GOx has deleted all of its twitter posts
on February 25, 2014, a number of bitcoin trading platforms including coinbase, circle and "bitcoin China" jointly issued a statement, which defined the incident as "the ruthless betrayal of mt.gox users' trust is caused by the ugly behavior of a company"
these companies said: "in order to solve the trust crisis caused by the failure of mt.gox, the responsible bitcoin trading platform will work together to promote the future of bitcoin and ensure the capital security of all customers. On February 25, 2014, the opening price of "bitcoin China" was 3562.41 yuan. By 4:40 p.m., the price had dropped to 3185 yuan, down more than 10%
according to the historical market data of the platform, on January 27, 2014, 1 bitcoin could be converted into 5032 yuan RMB. This means that in less than a month on the platform, the price of bitcoin has dropped by 36.7%. At the end of October 2013, Hong Kong GBL platform absconded with funds, and the whereabouts of more than 20 million yuan of funds were unknown. The program of this trading website is very poor. It doesn't use SSL security protocol, and even the user name is stored in clear text. They don't have some basic programming knowledge. GBL relies on the broker to develop the new customer's "quasi MLM" mode
on October 22, 2013, looking at the market of bitcoin, Mr. Qiao, a citizen of Dongyang, searched GBL company, a bitcoin trading platform, on the Internet, and recharged 90000 yuan to buy and sell bitcoin through a third-party payment. On October 26, 2013, it was found that the staff of the online trading platform were not online, and some normal trading proceres could not be implemented. It was found that the registered address of the company was false after a check, and a total of 90000 yuan was cheated. This is the first case of "bitcoin" fraud in Dongyang City. The police remind the citizens who buy "bitcoin" on the Internet to pay attention to screening the authenticity of the website to prevent being cheated
western economists have a lot of worries about the current economic bubble phenomenon of bitcoin. Australian Economist John Quiggin called bitcoin as "the most pure example of economic bubble (perhaps the finest example of a pure bubble)" recently, bitcoin continues to be hot, so that the virus, Trojan horse active, anti-virus company said, January and bitcoin mining related Trojan horse variants of ten thousand. In addition, some netizens disclosed to the IT channel of chinanews.com that some counterfeit coins similar to bitcoin may have "special blocks" and be poached. For ordinary miners, this may be more terrible than a Trojan horse

a bitcoin blackmail virus named "CTB Locker" is spreading in China. The virus can extort ransom from users by encrypting their computer files remotely. Users' files can only be opened after paying ransom
according to anti-virus experts, the virus cannot be cracked at home and abroad. On May 27, 2014, through the analysis of transaction data, Willy report website came to the conclusion that the soaring price of bitcoin last year and the huge increase in the trading volume of Mt. GOx may be e to false transactions, and may even involve insiders of Mt. GOx
nowadays, more and more people begin to suspect that the sharp rise of bitcoin in November 2013 and the increase of mt.gox's trading volume are partly e to a fraud. Specifically, a robot called "Willy" buys five to 10 bitcoins every five to 10 minutes, and this behavior lasts for at least a month
the bitcoin price of mt.gox has soared from about $200 in early November 2013 to a record high of $1236 on December 4 last year. While making early participants excited, more and more analysts began to explore the reasons behind: is it because Chinese people are speculating in their free exchanges? Or is it because bitcoin's resistance to government confiscation after the "Silk Road incident" led to a large outflow of this virtual currency
Willy report is a website with only one article, which describes in detail all kinds of suspicious robot trading activities from September to November 2013

7. You win too much, the rhythm of being called, I've been called two
8. As a front-line exchange, it is certainly much safer than a small exchange in terms of security. In terms of software and hardware, it is the top in the instry.
9.

when it comes to bitcoin, I don't know which country has money. People with some knowledge know that bitcoin is actually a virtual currency. In 2008, after the global financial crisis, a person who called himself "Zhongben" created a virtual currency "bitcoin"blockchain or P2P bitcoin. Unlike all other currencies, bitcoin has no specific currency issuer< therefore, if bitcoin is used maliciously, it is likely to be used by others, which is likely to have a huge impact on the domestic economy. Therefore, for the sake of security, many countries do not recognize the legitimacy of bitcoin

the advantages of blockchain are openness, simple review and high reliability. For example, there are now four people in business: A, B, C and D. A gives B money. Before B pays C, B must "package" the transaction between a and B and give it to C together, so that B can be considered to have completed a transaction similarly, before C and D transactions, it is necessary to package the transactions between a and B and between B and C and D“ "Package" will reward traders with one bitcoin at a time. Due to the special trading mode of bitcoin, bitcoin is deeply loved by some people. According to statistics, since the official birth of bitcoin, it has completed 11 trillion dollar transactions! In other words, from 2009 to 2019, a total of 11 trillion US dollars have been transferred through bitcoin. What we need to know is that U.S. Treasury bonds are about 22.5 trillion yuan. That is to say, bitcoin has such huge energy. In about 10 years, bitcoin has transferred half of U.S. Treasury bonds. Why don't countries recognize its legal status? The first reason is the problem of "black instrial chain". Because of the particularity of bitcoin, it is easier for some people in the "black instry chain" to use it. I believe everyone knows its purpose

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750