March 7 bitcoin hackers
some malware also make great use of the parallel computing power of graphics cards. In August 2011, botnet of bitcoin mining was discovered, and Mac OS X infected by Trojan horse was also discovered to mine bitcoin.
on June 19, 2011, security vulnerability of mt.gox (Magic: abbreviation of the gathering online exchange) bitcoin trading center caused the price of 1 bitcoin to drop to 1 cent (although other transactions were not affected). The reason is that a hacker stole the user's mtgox certificate from the computer infected with the Trojan horse, so he transferred bitcoin to his own account and sold it, resulting in a large number of "ask" requests at that price. A few minutes later, mtgox shut down and cancelled the abnormal transactions in the hacking incident, making the price of bitcoin rebound back to $15. In the end, the bitcoin exchange rate went back to what it was before the crash. Accounts equivalent to more than $8750000 were affected
in July 2011, the operator of bitomat, the world's third largest bitcoin trading center, announced the loss of access rights to the wallet.dat file that records 17000 bitcoins (about 220000 US dollars). At the same time, announced the decision to sell services to make up for the loss of users
in August 2011, mybitcoin, one of the processing centers of common bitcoin transactions, announced that it had been attacked by hackers and shut down. Involving 49% of customers' deposits, more than 78000 bitcoins (then equivalent to about $800000) are missing
in early August 2012, bitconica was sued in the San Francisco court for damages of about $460000. In 2012, bitconica was attacked twice by hackers, accused of ignoring the security of customers' funds and forging withdrawal applications
in late August 2012, bitcoin savings and trust was shut down by its owner, leaving about US $5.6 million in debt. At the same time, he was accused of operating the Ponzi scheme. In September 2012, the securities and Exchange Commission began to investigate the case
in September 2012, bitfloor trading center was also hacked, and 24000 bitcoins (about US $250000) were stolen. Bitfloor was suspended. Bitfloor resumed operations in the same month, and its founder said he had reported the theft to the FBI and that he was planning to compensate the victims, but the compensation schele was unclear
in June 2011, a hacker transferred 25000 bitcoins into his account, which is equivalent to 500000 US dollars. The whole transaction could not be traced. Although the owner of bitcoin announced the theft on the Internet, it was useless. The hacker became the first thief of bitcoin
in 2012, 46703 bitcoin worth US $228845 was stolen e to the disclosure of the super management password of the server of the website hosting provider linode. More than 43000 stolen bitcoins belong to bitcoinica, a bitcoin trading platform. Another 3094 bitcoins are owned by Marek palatinus, a Czech programmer. Gavin Andersen, the chief bitcoin programmer, also lost his five bitcoins.
in May 2017, computer network virus attacks have spread to 74 countries, including the United States, the United Kingdom, China, Russia, Spain, Italy, etc.
1. Complete decentralization, without issuing institutions, it is impossible to manipulate the number of issues. Its distribution and circulation are realized through open-source P2P algorithm
2. Anonymity, tax exemption and supervision free
3. Robustness. Bitcoin is completely dependent on P2P network and has no distribution center, so it cannot be shut down externally. Bitcoin price may fluctuate and collapse, and many governments may declare it illegal, but bitcoin and its huge P2P network will not disappear
4. Borderless and cross-border. Cross border remittance will go through layers of exchange control agencies, and the transaction records will be recorded by many parties. But if you trade with bitcoin, enter the digital address directly, click the mouse and wait for the P2P network to confirm the transaction, a lot of money will pass. It does not go through any regulatory agencies and will not leave any cross-border transaction records
5. It is difficult for the cat to survive. Because bitcoin algorithm is completely open source, anyone can download the source code, modify some parameters, recompile, and create a new P2P currency. But these counterfeit currencies are fragile and vulnerable to 51% attacks. Any indivial or organization, as long as it controls 51% of the computing power of a P2P currency network, can manipulate transactions and currency value at will, which will be a devastating blow to P2P currency. Many Shanzhai coins die in this link. The bitcoin network is robust enough. If you want to control 51% of the computing power of the bitcoin network, the number of CPUs / GPUs required will be astronomical.
at present, the vast majority of digital currency transactions are concted in exchanges. Among the numerous exchanges, bitfinex, binance, okex and so on are well-known
However, bitcoin and other digital currencies, as decentralized assets, have to be traded in a centralized exchange, which seems to have hidden contradictions and dangers1. Problems and challenges of stock exchanges=“ //www.yuanxue365.com/en/img_fd039245d688d43fdf16c83b761ed21b0ff43bbf ">
in February 2014, Mt. GOx, the world's largest bitcoin exchange at that time, was stolen 850000 bitcoins, and the price of bitcoin suffered a" cliff "crash on that day. Later, it was revealed that Mt. GOx was in fact a thief, and only 7000 bitcoins were actually stolen
in August 2016, bitfinex, the largest U.S. dollar bitcoin trading platform, suffered a security vulnerability, resulting in the theft of 120000 bitcoins, which was worth $65 million at that time. If converted into the price in December 2017, it would be worth nearly $2 billion
on December 19, 2017, South Korea's youbit exchange was attacked by hackers and lost 4000 bitcoins, and the exchange declared bankruptcy
on December 21, 2017, the Ukrainian liqui exchange was stolen 60000 bitcoins, and the unit price of bitcoin plummeted by US $2000
in 2018, such a drama will only continue
in addition to the threat of hackers, traditional exchanges also have some inherent shortcomings, such as lack of supervision and inefficiency. The security of the exchange for investors can only rely on its own credit, and the cost of running is very low. The stock exchange is regulated at the national level, but there is no such sword of Damocles on the top of the digital currency exchange. Moreover, in an exchange, the same order can only be submitted to one exchange. After the user places an order, the funds used for the transaction will be frozen and can only wait for the completion or cancellation of the transaction. These are undoubtedly inefficient
All in all, the problems of exchanges are the problems of centralization2. Decentralization of exchanges=“ //www.yuanxue365.com/en/img_86d6277f9e2f070889a173c9e224b899a801f257 ">
(1) the progress of the exchange itself
the upgrade of security means is various. At present, the best use is cold wallet, that is, to keep the digital currency in the offline U disk. At the end of 2017, when the YouTube exchange was attacked, 75% of its assets were withdrawn into the cold purse in time to avoid greater losses. However, it seems to be a helpless way to protect the online assets by offline means. Of course, there should be many other methods, which will not be repeated here
(2) the representative of cross ledger transaction is ripple network, and the operating company is ripple labs, which is a semi centralized system. Ripple is a decentralized clearing agreement. In order to solve the high cost and delay of inter-bank clearing, its base currency is XRP. Ripple network can connect all kinds of assets, such as US dollar, RMB, Japanese yen, bitcoin, etc. to its own network. In this system, U.S. dollars or bitcoin can be converted into reborn currency, and then reborn currency can circulate freely in the network, just as a highway is built between various assets. Due to the support of major banking institutions, the reborn currency achieved nearly 300 times growth in 2017
(3) decentralized exchange
some teams try to use blockchain technology to build a decentralized exchange. This kind of decentralized exchange, to some extent, is an extension of cross ledger trading
bitshares is the most representative of early rising projects. It builds a blockchain development platform with servers scattered all over the world. Even if some of them are attacked, the system will not collapse. Anyone can transfer money and borrow money freely on this platform, and can also quickly build a centralized exchange based on this platform. In order to ensure stable value, bitstocks also require three times of digital assets as collateral. At present, bitstocks are running fairly well
later, with the development of Ethereum and smart contract, the x x protocol came into being. This is an open protocol running in the Ethereum blockchain and a decentralized exchange in the Ethereum ecosystem. The agreement has attracted many investors. At present, it has completed financing and started to build open source software tools and infrastructure. Of course, there are many competitors. Ether Delta, IDEX and oasis DEX are trying to provide similar functions. Moreover, it is a smart contract system based on Ethereum, which only supports erc20 token. If other smart contract public chains start to rise, the demand will be reced
in addition, there are some teams that are entering, such as the domestic road seal agreement, looping (LRC) in English. They adopted a design similar to the X protocol, and also introced a fast payment function similar to the lightning network. It is characterized by trying to match multiple exchanges, the user's order can be broadcast to multiple exchanges, and completed by different exchanges. Moreover, the user can still use the account funds after placing an order, and the user's behavior of transferring part or all of the funds is equivalent to partial or total cancellation. To some extent, it improves the breadth and timeliness of the transaction. However, this system seems to have damaged the "power" of the existing exchanges. Whether we can persuade everyone to play together will be a difficult problem
At present, there is still a long way to go for the construction of decentralized exchange. In 3-5 years, traditional exchange will still be the main battlefield of digital currency However, in the future, it is worth looking forward to let the decentralized digital currency get rid of the shackles of centralization2. If you don't have a backup, you have to call the police
3. Contacting hackers without permission can't recover data, and they will only sink deeper and deeper
4. Pay attention to more backup and multiple ways in the future, and the daily responsibilities of the administrator should also be managed by someone.
because the connected computers are controlled by the policy settings of the router
the most important thing is to allocate your bandwidth reasonably. In theory, if you download resources from a computer in your network segment, if your router does not allocate bandwidth, it may cause the computers in the whole network segment to get stuck on the Internet
if the distribution is reasonable and the router is powerful, then 200 computers can be easily handled.
another platform closed down e to hacker intrusion. Is bitcoin still in spring< Bitcoin (BTC): originally proposed by Nakamoto, it belongs to a kind of digital currency. It is based on a specific algorithm and generated through a large number of calculations. Therefore, the issuance of bitcoin is not manipulated by any government, bank, organization or indivial. The total number of bitcoins is very limited. In the past four years, there were only less than 10.5 million, and in the future, the total number of bitcoins will always be limited to 21 million
Hot Wallet: it can be connected to the Internet, has strong circulation, can be used for daily consumption, and is vulnerable to hackers
cold Wallet: it won't connect to the Internet and has poor circulation, but it is not easy to be attacked by hackers
gatecain explained in an official article that the server intrusion occurred between May 9 and May 12. On the night of May 9, the service was interrupted e to the restart of a server. Associated with the time node, I strongly feel that the hacker intrusion event has an indispensable relationship with this service interruption
on the evening of May 13, gatecoin detected some suspicious transactions, so it immediately suspended the service for investigation to prevent more unauthorized access to Eth and BTC hot wallets<
loss
the hacking incident caused huge losses to gatecoin, with 185000 Ethernet coins and 250 bitcoins, with a total value of US $2 million, accounting for 15% of gatecoin's total digital assets
the security company investigated and found the hackers' Ethernet and bitcoin addresses, and gatecoin is raising funds to make up for the losses
Wright coin, Ruitai coin, doggy coin, Ethereum, bitstock and other digital currencies are also excellent.
To handle etc, you need to provide the owner's valid ID card, driver's license and driving license, and the non owner himself needs to bring the agent's valid ID card; Vehicle insurance policy of this year; The ID card (or driver's license), organization code card (or instrial and commercial business license) and official seal are required for handling P>
can be processed through Alipay or WeChat booking, or it can be handled free of charge by banks or by ETC battalion and some high-speed service areas. You can bind a savings card or a credit card. It should be noted that the current balance in the bound savings card should be greater than or equal to 2000 yuan, and the 800 yuan in the card should be frozen as the deposit
extended information:
other precautions
1. Etc handling follows the principle of one car, one card and one label. If the vehicle has already handled etc, it cannot apply for etc business again. If your vehicle has been through etc and can be used normally, you don't need to handle it again, and you can also enjoy the toll discount
2. After applying for etc, you can apply for return within 7 natural days. If your etc card is no longer used, you can contact the bank to unbind the withholding account of the unused etc card
3. Originally, there was only etc card, so there was no need to cancel the etc card. You can directly apply for a new OBU free of charge in the original province
