Position: Home page » Bitcoin » BTC hackers attack China

BTC hackers attack China

Publish: 2021-04-28 12:27:55
1.

at present, the vast majority of digital currency transactions are concted in exchanges. Among the numerous exchanges, bitfinex, binance, okex and so on are well-known

However, bitcoin and other digital currencies, as decentralized assets, have to be traded in a centralized exchange, which seems to have hidden contradictions and dangers

1. Problems and challenges of stock exchanges=“ //www.yuanxue365.com/en/img_fd039245d688d43fdf16c83b761ed21b0ff43bbf ">

in February 2014, Mt. GOx, the world's largest bitcoin exchange at that time, was stolen 850000 bitcoins, and the price of bitcoin suffered a" cliff "crash on that day. Later, it was revealed that Mt. GOx was in fact a thief, and only 7000 bitcoins were actually stolen

in August 2016, bitfinex, the largest U.S. dollar bitcoin trading platform, suffered a security vulnerability, resulting in the theft of 120000 bitcoins, which was worth $65 million at that time. If converted into the price in December 2017, it would be worth nearly $2 billion

on December 19, 2017, South Korea's youbit exchange was attacked by hackers and lost 4000 bitcoins, and the exchange declared bankruptcy

on December 21, 2017, the Ukrainian liqui exchange was stolen 60000 bitcoins, and the unit price of bitcoin plummeted by US $2000

in 2018, such a drama will only continue

in addition to the threat of hackers, traditional exchanges also have some inherent shortcomings, such as lack of supervision and inefficiency. The security of the exchange for investors can only rely on its own credit, and the cost of running is very low. The stock exchange is regulated at the national level, but there is no such sword of Damocles on the top of the digital currency exchange. Moreover, in an exchange, the same order can only be submitted to one exchange. After the user places an order, the funds used for the transaction will be frozen and can only wait for the completion or cancellation of the transaction. These are undoubtedly inefficient

All in all, the problems of exchanges are the problems of centralization

2. Decentralization of exchanges=“ //www.yuanxue365.com/en/img_86d6277f9e2f070889a173c9e224b899a801f257 ">

(1) the progress of the exchange itself

the upgrade of security means is various. At present, the best use is cold wallet, that is, to keep the digital currency in the offline U disk. At the end of 2017, when the YouTube exchange was attacked, 75% of its assets were withdrawn into the cold purse in time to avoid greater losses. However, it seems to be a helpless way to protect the online assets by offline means. Of course, there should be many other methods, which will not be repeated here

(2) the representative of cross ledger transaction is ripple network, and the operating company is ripple labs, which is a semi centralized system. Ripple is a decentralized clearing agreement. In order to solve the high cost and delay of inter-bank clearing, its base currency is XRP. Ripple network can connect all kinds of assets, such as US dollar, RMB, Japanese yen, bitcoin, etc. to its own network. In this system, U.S. dollars or bitcoin can be converted into reborn currency, and then reborn currency can circulate freely in the network, just as a highway is built between various assets. Due to the support of major banking institutions, the reborn currency achieved nearly 300 times growth in 2017

(3) decentralized exchange

some teams try to use blockchain technology to build a decentralized exchange. This kind of decentralized exchange, to some extent, is an extension of cross ledger trading

bitshares is the most representative of early rising projects. It builds a blockchain development platform with servers scattered all over the world. Even if some of them are attacked, the system will not collapse. Anyone can transfer money and borrow money freely on this platform, and can also quickly build a centralized exchange based on this platform. In order to ensure stable value, bitstocks also require three times of digital assets as collateral. At present, bitstocks are running fairly well

later, with the development of Ethereum and smart contract, the x x protocol came into being. This is an open protocol running in the Ethereum blockchain and a decentralized exchange in the Ethereum ecosystem. The agreement has attracted many investors. At present, it has completed financing and started to build open source software tools and infrastructure. Of course, there are many competitors. Ether Delta, IDEX and oasis DEX are trying to provide similar functions. Moreover, it is a smart contract system based on Ethereum, which only supports erc20 token. If other smart contract public chains start to rise, the demand will be reced

in addition, there are some teams that are entering, such as the domestic road seal agreement, looping (LRC) in English. They adopted a design similar to the X protocol, and also introced a fast payment function similar to the lightning network. It is characterized by trying to match multiple exchanges, the user's order can be broadcast to multiple exchanges, and completed by different exchanges. Moreover, the user can still use the account funds after placing an order, and the user's behavior of transferring part or all of the funds is equivalent to partial or total cancellation. To some extent, it improves the breadth and timeliness of the transaction. However, this system seems to have damaged the "power" of the existing exchanges. Whether we can persuade everyone to play together will be a difficult problem

At present, there is still a long way to go for the construction of decentralized exchange. In 3-5 years, traditional exchange will still be the main battlefield of digital currency

However, in the future, it is worth looking forward to let the decentralized digital currency get rid of the shackles of centralization

2. At present, there is an unpopular way to use bug to get your character into the wall, so that you won't be attacked by monsters, but you can't get out. If you insist on going to three-layer mining, the best way is to form a team to go down mining together
3. 100m bandwidth has little to do with the connected computer
because the connected computers are controlled by the policy settings of the router
the most important thing is to allocate your bandwidth reasonably. In theory, if you download resources from a computer in your network segment, if your router does not allocate bandwidth, it may cause the computers in the whole network segment to get stuck on the Internet
if the distribution is reasonable and the router is powerful, then 200 computers can be easily handled.
4.
  1. many countries suffered from network attacks

  2. < / OL >

    on May 12, many countries around the world suffered from large-scale network attacks. After the computers of the attackers were locked, they were required to pay bitcoin to unlock. The spread of malware began in the UK. At present, no hacker organization has claimed the attack

    According to a report released by Kaspersky laboratory, a Russian network security enterprise, on the 12th, it was found that 74 countries and regions around the world had suffered the attack, and the actual scope may be wider. The agency said that in the 20 most attacked countries and regions, Russia was far more vulnerable than other victims, and Chinese mainland ranked fifth. p>
5. No, but Indian hackers attacked a Chinese medical website in February, and Chinese hackers are too lazy to pay attention to them
6.

The latest data from the national Internet Emergency Response Center (CNCERT) shows that China is increasingly suffering from overseas cyber attacks. CNCERT sampling monitoring found that in less than 60 days from January 1 to February 28, 2013, 6747 overseas Trojan horses or botnet control servers controlled more than 1.9 million hosts in China; Among them, 2194 control servers located in the United States control 1.287 million hosts in China, and the United States ranks first in terms of both the number of control servers and the number of hosts in China
China has suffered serious overseas attacks, most of which come from the United States
previously, the New York Times, the Wall Street Journal and other American media said that they were attacked by Chinese hackers. Spokesmen of the Chinese Ministry of foreign affairs, Ministry of national defense and other departments severely refuted this, and repeatedly reiterated that China's laws prohibit hacker attacks and other acts that undermine Internet security. The Chinese government has always resolutely cracked down on related criminal activities, and China is also one of the main victims of cyber attacks
a large number of data released by CNCERT this time show that the situation of network attacks in China is very serious, and detailed examples of specific cases of domestic institutions and enterprises suffering from overseas attacks are given
the data shows that in the first two months of this year alone, 5324 overseas hosts implemented remote control of 11421 websites in China through implanted backdoors. Among them, 1959 hosts in the United States controlled 3579 websites in China, and 132 hosts in Japan controlled 473 websites in China. According to the number of controlled domestic websites, the United States ranks first
in addition, 96% of the phishing websites for China's online banking, payment platforms and online shopping malls are located abroad, among which 619 servers in the United States carry 3673 phishing pages for domestic websites, and the number of phishing pages carried by the United States servers accounts for 73.1% of the total number of phishing pages< According to the case provided by CNCERT, Chinese websites are frequently attacked by foreign countries, which is mainly reflected in two aspects: one is that websites are invaded and tampered by foreign countries; the other is that websites are tampered with by foreign countries; Second, the website is invaded by foreign countries and the back door is installed. China is also frequently attacked by DDoS attacks from abroad
the latest data shows that on February 24, 2013, the e-mail system of China Tibet network was implanted into the back door. On February 22, 2013, the English version of the enterprise branch of china.com was attacked by an address from the United States, and the page was maliciously tampered with. On January 28, 2013, the IP address of the people's network was attacked by DDoS from abroad. There was obvious abnormal traffic between 18:30 and 20:20. The peak traffic was 100Mbps, which was about 12 times of the normal traffic. The UDP traffic accounted for 95%, and about 88% came from abroad
as China's national vulnerability database, cnvd has been attacked by a large number of foreign countries, and some attacks also try to penetrate website servers to obtain vulnerability information. From November 2012 to January 2013, in the attack monitoring of cnvd website, the number of attacks from foreign countries and regions ranked first, with 5792 attacks from the United States
in fact, the cases of overseas cyber attacks in China are far more than that. A large number of organizations including state ministries, enterprises and colleges have been invaded by overseas networks
from September 2012 to February 2013, the websites of 85 important government departments, important information systems, scientific research institutions and other institutions in China, such as an important government department, a provincial examination institute, a Property Insurance Co., Ltd., and a scientific research institute Wuhan virus Institute, were intruded by foreign countries and implanted into the back door of the website, of which 39 were intruded by addresses from the United States
in an interview with reporters, the person in charge of China's state Internet Information Office pointed out that China is an Internet power, but not an Internet power. A large number of facts have proved that China has been one of the main victims of cyber attacks for many years. The Chinese government has always firmly opposed and cracked down on hacker attacks in accordance with the law. In September 2011, China, Russia and other countries jointly submitted the draft "international code of conct for information security" to the United Nations in order to promote the resolution of cyber security issues. China calls on the international community to formulate a code of conct for responsible countries in cyberspace on this basis, so as to jointly build a peaceful, safe, open and cooperative cyberspace and safeguard the common interests of the international community

7. It is necessary to arouse the Chinese government's attention to the network and realize the establishment of network forces.
8. This kind of thing will not happen. After the plane collision incident between China and the United States that year, there was a large-scale hacker confrontation between China and the United States. Generally speaking, hacker attacks are criminal in nature. If there is no major political incident, there will not be a direct large-scale confrontation. Every time there is a political incident, there will be attacks between hackers, It's just that the scale is different, and the government often turns a blind eye to the hacker confrontation between countries. This is often e to the national consciousness of the people. Just imagine, if your country is bullied by other countries, your people will be arrested for complaining. Do you think who will be patriotic in the future? To deal with large-scale hacker attacks, it is impossible to absolutely prohibit them (unless you physically cut off the optical cables between countries). As long as we keep our main organization websites from being paralyzed, small websites can be recovered immediately without too much loss. For example, we can limit the traffic of websites to prevent flood attacks
9.

the final result of the Sino US hacker war is that Chinese hackers are merciful and only change the page without destroying DOS

according to us network security experts, Chinese hackers are widely expanding their attack teams and providing a hacker tool called "kill America" on the Internet, but they are only teaching people how to alter the page, and they are not destroying the DOS (denial of service) of the website

American hackers launched attacks on Chinese websites, causing Guangdong hackers to participate in the "May 1 counterattack". For this attack, some hackers said that the purpose is not only to counterattack, but also to expose the serious security problems existing in Chinese websites and arouse the attention of all parties

Chinese hackers launched a counterattack against the United States. Thousands of American websites were hacked. In the two-day attacks, the main damage was commercial websites, namely websites with ". Com" suffix. Government ". Gov" and institutions ". Org" are relatively few, and ecation department ". E" has not touched them

China hacker alliance, China hawk alliance and China Red guest alliance rose in this campaign. It can be said that the Sino US hacker war has promoted the progress of Chinese hackers, and the "China Red guest alliance" has shocked the global hacker organizations with the total attack of 80000 members, making them deeply experience the real strength of Chinese hackers

after the end of the war, a large number of hackers disappeared and retired one after another. In addition, the dissolution of the China Red guest alliance made this world shaking campaign the first hacker war in the world

10. In 14 years, there will be reports, and now there will still be fools who insist on reporting and believing.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750