Pithy formula of bitcoin
on November 1, 2008, the hermit named "Nakamoto Tsung" watched the sky at night. Seeing that the time was ripe, he announced his new idea of issuing an electronic currency called "bitcoin" on a secret cryptography forum
then, in 2009, bitcoin was born
for a while, there were rumors all over the world:
"what is bitcoin?"
"what's the magic power of bitcoin?"
"can it compare with traditional currency?"
it's just a hermit's "masterpiece left behind". Why did it make such a big stir in the world<
it turns out that this bitcoin has risked the world's great injustice, escaped the high-ranking government control, and set up a "small autonomy" on its own:
bitcoin no longer needs to be issued by a specific institution, but is generated through a set of "institutions" designed by Nakamoto Tsung, which is based on a specific algorithm and through a large number of calculations. Regardless of the world, as long as you have a computer, access system, and operate the "organ", you can become a "coin digger"
a thousand waves were aroused for a while, and an undercurrent was set off in the river and Lake: men, women, old and young were yearning to invest in the "money digging fever"<
like this
}
or like this
}
but since ancient times, unique martial arts skills have come out, and most of the onlookers will see through them, but fengmaolingjiao is the one who really understands the mystery
in the same way, this "coin digger" who creates miracles is not something ordinary people can do at will. Even if everyone has a computer and computing tools, it depends on talent and hard work to generate a new bitcoin
if every "digger" wants to dig bitcoin, he has to go into many "mechanisms" of Nakamoto Tsung and use computers to solve a complex mathematical problem through huge calculation. This is far from enough. Whether we can understand the secret is not only related to the ability of the "coin digger", because the "mechanism" will automatically adjust the difficulty of the questions, so that the whole system will get a qualified answer every 10 minutes, while the vast army of "coin diggers" are crazy computing. Who can understand the secret depends on the nature
it's like buying lottery tickets. Everyone is crazy to generate various combinations of numbers with computing tools in hand. Whoever can guess the same string as the big prize will be the winner
in the end, the lucky person who was lucky enough to get a specific solution successfully created a bitcoin, and the reward for him was a total of 50 bitcoins
at this time, someone will ask, is bitcoin hard to get out of the endless mining
this is the true wisdom of Nakamoto's seclusion
like all kinds of gold, silver, iron and copper veins, bitcoin will be g out one day. A total of 21 million mathematical problems have been designed in the "mechanism" and 21 million corresponding qualified answers have been matched. In other words, the upper limit of bitcoin mining is controlled at 21 million
Where is the mystery
we know that the reason why the government calls the wind and the rain is precisely because it has the power to issue currency. Increasing and recing issuance are "fierce moves" to regulate the economy
and Nakamoto's restriction on the total amount of bitcoin has cut off the way for bitcoin market to be regulated, which is obviously the opposite
which is better? There are two schools in the world:
"supporters" think that eliminating intervention is a sign of social progress
the "losers" feel that fixed aggregate may lead to deflation, which in turn will lead to a series of market weakness and "bone breaking" of the overall economy
the merits and demerits will be left to future generations
since there is a reward for digging coins and the total amount is limited, isn't the mine going to be g through in just a few days
How could the "mechanism" that he had painstakingly researched be easily manipulated by the world<
Nakamoto has two rules under the "agency" neutrality:
first, the more bitcoin, the less reward
- when the total amount reaches 10.5 million hours (50% of 21 million), the reward will be halved to 25. When the total amount reached 15.75 million (5.25 million new output, or 50% of 1050), the bounty was further halved to 12.5. And so on
secondly, the more the total number of "coin diggers", the lower the efficiency
in this way, bitcoin will be proced more slowly in the later stage. According to the plan, from the birth of bitcoin in 2009, mining will last more than 100 years, and it will not reach the upper limit until 2140
today, the total amount of bitcoin mined out in the world is just over 16 million
all of the above are just a set of "mechanisms" carefully arranged by master Nakamoto. There is another set of "mechanisms" with such precision
bitcoin is a rare thing in the world, so how to trade it? How to manage
after living in seclusion for many years, Nakamoto studied cryptography, a unique security process for bitcoin circulation
the transaction behind bitcoin is very complicated. Bitcoin can generate bitcoin addresses randomly, and each address has a corresponding private key, which is equivalent to the bank card number and the corresponding password. Only when you have both can you manage your money
but is the complexity of this address comparable to that of ordinary bank cards
how confidential is the bitcoin address
each address is made up of a string of letters and numbers about 33 bits long, always starting with 1 or 3
how many such random addresses are there? The answer is: probably more than the sand on earth
it's not easy to break such a complex "secret protection system"
in this way, with the second "organ" blessing of Nakamoto Tsung, bitcoin circulation has more security than ordinary currency
it's no wonder that with the advent of bitcoin, the currency world is shaking, and a new fight is in the dark
bitcoin, like countless secret lone Rangers, grows savagely under the authority of the government. According to the legend, bitcoin is free (decentralized, tax-free, regulatory free), strong (relying on P2P network, external can not be closed), omnipresent (cross-border, borderless), and anonymous
you can understand, "freedom", "coming and going without name" and "omnipresent", which means that bitcoin can not only be tracked and supervised by the government, but also grow wildly in the world. It's a great way for hackers to blackmail
moreover, since last year, bitcoin has been rising wildly, and hackers all over the Internet know this information well
there is no doubt that bitcoin is a safe and profitable way to blackmail
like this
@
or like this< But all the martial arts in the world are strong. Bitcoin also has weaknesses
there are three pithy formulas:
first, bitcoin network is not broken, and trading platform is fragile
Second, the "black market" trading, speculation rampant, price roller coaster day by day
thirdly, it is difficult for ordinary people to understand the secrets of nature because of their profound martial arts
in particular, the third point is that although the Kung Fu is good, the threshold is too high, which is lamentable
then, if you look at China today, where is bitcoin going
to be fair, in the eyes of the mother of the central bank, it is not too much to say that bitcoin is a barbaric growth: in the past year, with the devaluation of RMB, bitcoin has once again become the target of investors' speculation, and its value has increased by 120%
smart passers-by have already seen through everything
@
coupled with the emerging bitcoin virus, it seems that it is time for bitcoin to be subject to a wave of regulation.
the deeper meaning is: the higher the computing speed of an honest mine, the higher the computing speed of the mine that forges bitcoin. If he has invested his money in mining, but is making counterfeit money, if everyone doesn't admit it (we will certainly refuse the counterfeit money), isn't he going to lose all his money? It's better to dig the real money honestly. It's also cost effective.
As we approach the end of the year, when we plan to sprint for the goal of the end of the year, earn more bonus and prepare to release ourselves in the Spring Festival, don't forget that the fraudsters also have such a plan. At this time, the tide of shopping on double 12 and new year's day comes one after another, and people working outside are also busy booking tickets and air tickets for the Spring Festival, which provides opportunities for fraudsters. Here, liewang, the first online fraud information reporting platform linked by the police and the people in China, makes an inventory of the new trends of online fraud in 2017. Can you see through all these scams
trend 1: mobile payment has become the mainstream, beware of two-dimensional code trap
mobile payment has greatly facilitated people's life and made people travel easily. However, there are many criminals who use the way of scanning two-dimensional code to carry out fraud, which is impossible to prevent. For example, on bike sharing, a fake QR code is used to cover the regular QR code, and the avatar is set as the official icon of bike sharing to cheat users to pay or recharge; Next to the store's two-dimensional code, there are words full of temptation, such as "scan code to grab red packets", "scan code discount", etc., to lure users to scan the code, and then obtain user information or directly guide users to transfer money. There are even criminals who the illegal parking notice posted on the car by traffic police. The fake ticket is attached with a payment QR code to lure the car owner to scan the code to pay a "fine"
trend 2: fake businesses want to refund. Users should be careful of being" loaned online "
generally, people think that their bank card balance is small, even if they encounter swindlers, it doesn't matter. However, according to the report cases received by liewang platform, In the common refund fraud in 2017, fraudsters use mobile phones to receive SMS verification code to lure victims into Internet micro loan business, and finally transfer the loan to the swindler's account. This kind of fraud often involves a high amount of money and brings serious property losses to users
trend 3: mobile phones also contain extortion virus, and the payment method is more" people-friendly "
mobile phone extortion software has become a common tool for criminals to seek benefits e to its low proction cost and fast cash flow. At present, there are different forms of blackmail software in the mobile application market. Different from the blackmail software in the computer, bitcoin is needed to pay for it. The payment form in the mobile blackmail software is more "people-friendly"
a batch of blackmail software captured in 2017 attached wechat two-dimensional code information to the blackmail interface, and prompted the winner to directly scan the two-dimensional code for payment by wechat, which will automatically unlock after successful payment, and the user will automatically enter the transfer interface after scanning the code. However, through technical analysis, this kind of blackmail software does not have any code related to wechat transfer. The so-called "scan payment, automatically unlock" is actually a fraud, even if the user transfers, it will not automatically unlock
trend 4: fake customer service requests to provide payment code and swipe only by numbers
because code scanning payment is simple and convenient, in 2016, many fraudsters took a screenshot of the two-dimensional code to swipe. But in 2017, as payment companies added anti fraud tips or confidentiality settings in the process of payment QR code screenshots, swindlers immediately thought of countermeasures and swindled the numbers under the payment code, forming a new instrial chain
criminals often disguise themselves as merchants customer service, requiring users to provide figures such as Alipay, WeChat and other payment bar codes, and then, on the grounds of digital failure, require users to refresh the numbers and send them several times to achieve the purpose of stealing. p>
trend 5: download the specified software, but the account password is shared by cloud disk
users' privacy information can be stolen without using phishing websites and Trojan horse software. This year, swindlers have come up with new tricks: as long as the victims' trust is obtained, they can download cloud disk, synchronization software and other procts, log in to the account designated by the swindler to upload files and synchronize, and then they can easily get information. What's more, if the user synchronizes the SMS verification code at any time, the swindler can easily steal the funds in the bank card
fraudsters often disguise themselves as e-commerce, suppliers and other customer services, requiring users to download some cloud disk synchronization software, and then provide the specified account password for users to log in. At this time, if the user logs in and synchronizes the personal account, password and other information on the software according to the swindler's instructions, the funds on the account will be transferred quietly
trend 6: new phishing websites on mobile terminals are more covert and easy to be recruited
as security manufacturers increase their efforts to crack down on phishing websites, phishing website makers also strengthen their covert means, spread links by using proct sharing functions such as short URL, cloud disk service, browser and social tools, and finally jump through the URL, Guide users to phishing sites to launch online fraud
trend 7: indemnity should be paid in intimate way. Be careful with this kind of fraud SMS
as early as 2013, 360 company discovered a high-risk fraud binding the victim's online banking account. In recent years, with the use of mobile payment becoming more and more popular, In 2017, there was a similar kind of fraud, which used a payment platform to bind accounts and swipe victims' accounts
in May 2017, Mr. Di received a flight delay text message sent in the name of the airline, with flight information and customer service phone number attached in the text message, and said that Mr. Di could get 300 yuan of delay compensation. Fake customer service in the phone to guide Mr. Di refund operation, and provide the enterprise account, but also ask Mr. Di to open intimate payment function. However, after Mr. Di opened, he found that he had two dections, and realized that Mr. Di was cheated and immediately called the police
trend 8: investment in the circle of friends? Do not gambler psychology
in everyone's wechat group or circle of friends, there are often many activities or proct recommendations under the banner of discount. Not long ago, Mr. Wang saw a WeChat official account named "double half price win" in WeChat group chat. Mr. Wang then identified the official account as having an enterprise certification and believed that the platform had high credibility. p>
Mr. Wang invested a small amount in the early stage, and found that there was a certain income every day, so he subsequently invested in batches, but graally began to lose money“ He wants to invest more in order to earn back the capital. As a result, when contacting customer service again, he found that the other party had blackmailed him. Only then did he realize that he had been cheated and that the money he had invested had gone to nothing
trend 9: identity impersonation has a new pattern, be careful that "friends" are high imitations
in the past, online fraud of identity impersonation often occurred on QQ, wechat and other social platforms, but this year, swindlers shifted their focus to microblog. The swindler specially studies the social habits of the victims, such as the relationship between microblog staff and chat content, and then changes their avatars and nicknames to create high imitation numbers. Because most of the fake users are abroad, it is difficult for their microblog friends to distinguish the true from the false in time
trend 10: the combination of various means makes it impossible to prevent the" ghost "fraud.
in March 2017, 360 assisted the Shenzhen police in successfully cracking down the" midnight ghost "Telecom fraud Gang, which the police identified as an illegal trade instry chain relying on personal information, It is a high-tech, high intelligence, cross platform, remote-control new type of telecom network fraud crime that combines mobile cloud service, operator's deputy number service and Internet financial service. And this kind of stealing brush mainly uses different services of various platform service providers. A single service does not have the security risk of stealing brush, but it is combined to form stealing brush. In order to make it difficult for the victims to detect, the criminals choose to commit crimes late at night. The whole process does not need to have any contact with the victims, and the victims do not need to reply to any SMS, so prevention is very difficult
from the above ten cases, the current situation of network fraud is still not optimistic. The anti fraud experts of liewang platform hereby remind the netizens that the new year is approaching, the fraudsters are highly active, and all kinds of fraud means emerge in endlessly. At this time, we need to improve the anti fraud awareness, so that the fraudsters have no chance to take advantage of it
net hunting platform is jointly launched by Beijing Public Security Bureau and 360. It is an innovative platform to crack down on Internet fraud through Internet platform and Internet technology. Up to now, liewang platform has established contact with public security organs in more than 300 regions of the country, helped to detect more than 100 major Internet fraud cases, involving 170 million yuan, and knocked down more than 10 large-scale fraud gangs with strict organization and clear division of labor. Internet users can report malicious programs, malicious web addresses, fraulent phone calls, etc. to 360 Internet security center through the platform. Every piece of information reported by Internet users will be included in the big data of liewang platform, providing effective clues for the police to solve cases
one summer evening, he was reading an article in the yard. Suddenly I saw many fireflies flying in the low air. The flicker of light was dazzling in the dark. He thought, if you put many fireflies together, it will become a lamp. So he went to find a white silk pocket, caught dozens of fireflies and put them in it. Then he tied the pocket and hung him up. Although it was not very bright, it could barely be used for reading. From then on, as long as there are fireflies, he will go to grab one as a lamp. As a result of his hard work, he finally became a senior official
the same is true of Sun Kang of the same era. Because he had no money to buy lamp oil, he could not read at night and had to go to bed early. He thought it was a pity that time had run away in vain
in the middle of the night, when he woke up from his sleep and turned his head to the window, he found a light in the crack of the bed. It turns out that the snow is coming out, you can use it to read. So he got dressed, took out his books and went outside. The light of snow on the wide land is much brighter than that in the house. Regardless of the cold, Sun Kang immediately began to read. His hands and feet were frozen, so he got up and ran, rubbing his fingers. Since then, whenever there was snow in the evening, he would not miss such a good opportunity to study tirelessly. This kind of spirit of painstaking learning promoted his knowledge to advance by leaps and bounds and made him a learned man. Later, he became a senior official and did a lot of good things for the people< Fan Zhongyan was born in the Northern Song Dynasty. When he was two years old, his father died of illness, and his mother was destitute, so she had to take Zhongyan in her arms and remarry to a family surnamed Zhu. Fan Zhongyan grew up in Zhu's family
Fan Zhongyan has studied very hard since he was a child. The Zhu family is a rich family. However, in order to encourage himself, he often goes to the temples on the nearby mountains to study. That's why his life is extremely hard. He only cooks a pot of thick porridge every day, turns it into four pieces when it's cold, takes two pieces in the morning and two pieces in the evening, mixes a few pickles, and continues to study after eating. Sometimes I feel tired when reading at night, so I wash my face with cold water to dispel sleepiness. His spirit of studying hard left a deep impression on the monks
after becoming an official, Fan Zhongyan criticized the current situation, was impassioned and often ignored his own safety. He assiously encouraged himself, and did not eat much meat. His wife and children were only self-sufficient. He often recites: "the scholar should be the first to worry about the world, and the later to be happy."< When Zhang Haidi was 5 years old, she suffered from spinal cord hemangioma and high paraplegia, so she didn't go to school. When she was a child, she began to teach herself knowledge with indomitable perseverance. She taught herself professional courses in primary school, middle school and university. When Zhang Haidi was 15 years old, she was sent to a poor mountain village in Shenxian County, Liaocheng with her parents. However, she was not afraid of hard life, but devoted her youth with an optimistic and upward spirit. There, she taught the children in the village primary school, overcame all kinds of difficulties to learn medical knowledge, and enthusiastically treated the villagers with acupuncture and moxibustion. During her stay in Shen County, she treated more than 10000 people for free, and was warmly praised by people
Zhang Haidi, with a firm belief that "if he is a meteor, he will leave the light to the world", has learned English, German and Japanese by himself, bearing the pain that ordinary people can't imagine. He also translated 130000 words of English novels, wrote a large number of literary works and made remarkable achievements.
According to a number of foreign media reports, after hackers announced last week that they had stolen 1.5tb of HBO data, the most well-known cable TV network in the United States suffered a new wave of leaks on Monday. A number of data, including its most popular drama game of thrones, were further made public, becoming a chip for hackers to extort $6 million worth of bitcoin
< H2 >
the threat of hackers is not groundless. At the end of April this year, a hacker group called the dark overlord (TDO) released the contents of the first 10 episodes of the fifth season of orange is the new black on the resource download website the Pirate Bay
at that time, the organization also claimed that it had other TV networks, such as fox, IFC, Nat Geo, ABC and other dramas and films, including "NCI: Los Angeles", "Jesse arrived" and "extreme agent 3"
although it is not clear whether the two leaks are of the same origin, it is certain that the target of hackers for the entertainment instry has shifted from film companies to TV networks with a wider audience
What are the advantages of first-class fire engineer besides affiliation< In addition to affiliation, the registered fire engineer has the following advantages:
1. The registered fire engineer has the veto power on the design evaluation, operation and safety operation of the fire facilities of the project
2. It is in charge of and sealed by the Ministry of public security, and the certificate is mandatory
3. The first level registered fire engineer can be employed as an engineer, which is also one of the main basis for the evaluation of senior fire engineer
the second level can be employed as assistant engineer, partially replacing the function of registered safety engineer
4. In terms of certificate registration, the registered fire engineer belongs to the head of the Fire Department of the Ministry of public security, and is registered by the provincial fire department. It does not conflict with the certificate of constructor, and belongs to two management departments, and there is no network between the departments
5. At present, the threshold for the person in charge of some major projects has begun to add "one level fire engineer certificate required". The greater the power, the greater the responsibility. The fire engineer has a high degree of decision-making power on an engineering project. The main purpose of first-class fire Engineer: the quantity is clearly stipulated in Chapter II of order No. 129 of the Ministry of Public Security:
first class inspection and maintenance Qualification: more than 10 people, including at least 6 first class Registered Fire Engineers
Level 2 Inspection and maintenance Qualification: more than 6 people, including at least 3 level 1 registered Fire Engineers
three level inspection and maintenance Qualification: more than one person
first class safety assessment qualification: more than 12 people, including at least 8 first class Registered Fire Engineers
Level 2 safety assessment qualification: more than 8 people, including at least 4 level 1 registered Fire Engineers
obtain the qualification of inspection, maintenance and safety assessment at the same time: the number of people is 80% of the sum of the two qualifications, and should not be less than the number of people with any single qualification condition
the first-class fire engineer not only has the advantage of being attached to the price, but also has a broad prospect in practice. It is a good choice to win this certificate whether from the perspective of earning extra money or from the perspective of job hopping. You must seize the opportunity to pass the 2018 fire test!
first, [content interpretation]
(1) "the things in the world are not difficult to legislate, but difficult to act according to the law." It is the common expectation of the people that cyberspace is clean and upright. Since April this year, the state authorities have effectively purified the ecology of cyberspace through a series of "combined fists" such as interviews, rectification and removal from shelves, in response to the problems of illegal and illegal activities such as the chaos of short video on the Internet and live broadcasting involving pornography on the Internet
(2) "grasp the time and effect, build concentric circles online and offline, better gather social consensus, and consolidate the common ideological foundation of the whole Party and the people." To build this "concentric circle", we should take the party's leadership as the radius and fully gather centripetal force; We should take laws and regulations as the radius to clean up the network pollutants; We should take all kinds of media as the radius and innovate means to spread positive energy; We should take the mass line as the radius to build a new platform for network public opinion
(3) only by working hand in hand can we ride the wind and waves. In the journey of building a network power, network security plays an important role in national security. Therefore, we must lead the network security construction with the overall national security concept, and build a solid barrier for the national security in the new era with the network security construction< (1) on August 21, 2016, Xu Yuyu, an examinee in Linyi City, Shandong Province, was cheated of 9900 yuan of tuition fees by a telephone fraud. She was heartbroken and depressed, eventually leading to cardiac arrest. She was rescued by the hospital and died
(2) the cyber security law can avoid the recurrence of Xu Yuyu's tragedy. First of all, the root of precision fraud lies in the disclosure of citizens' personal information The network security law defines the responsibility boundaries of the holders, collectors and users of citizens' personal information, especially emphasizes the "right to control" and "right to know" of citizens' own information, which maximally avoids the recurrence of precise fraud in the Xu Yuyu case. Secondly, the network real name system needs to be strictly implemented
(3) the two fraulent phone calls in the Xu Yuyu case were proved to have been authenticated by real name, but the personal information of real name authentication was not consistent with the user's identity Network security law once again restates and clarifies the network real name system. Network service providers must require users to provide real identity information, which blocks the existing loopholes of network real name system from the source
(4) finally, we need to work together to deal with telecom fraud The "network security law" gives everyone the right to report Telecom fraud and infringement of information and data. Each of us has the right and obligation to report Telecom fraud information to relevant departments. Only in this way can we work together to crack down on Telecom fraudsters to the greatest extent
2. The largest scale blackmail virus outbreak
(1) "black" user computers, encrypt computer data, and delete files without ransom; When computers are infected, users are required to pay ransom within three days, and as long as "bitcoin"... On the night of May 12, 2017, "wannacry" madly attacked the networks of hundreds of countries around the world, countless data were encrypted and locked by the virus, and the networks of China's basic instries were also greatly affected, involving many fields such as ecation, oil, transportation and public security systems
(2) behind the rampant blackmail virus is the serious threat to the national network sovereignty and data information security“ "Blackmail virus" reminds us once again that development without the premise of network security is water without a source and a tree without roots. The higher the level of informatization, the greater the damage that may be suffered
(3) on the one hand, we should strive to develop the Internet and new technologies to get rid of the situation of being controlled by others in technology; On the other hand, we should also enhance the important strategic position of network security and deal with the situation that indivial countries are trying to threaten China's peaceful development through network war
3. "9 + 1 Let's celebrate the new year together"
(1) on February 1, 2016, the "9 + 1 Let's celebrate the new year together" targeted poverty alleviation public welfare activity was jointly launched by China Internet development foundation and Sina Weibo, which was promoted by the Information Office of the central network. Combined with the tradition of sending red envelopes ring the Spring Festival, this activity called on microblog users to send "nine plus one" warm year red envelopes of 900 yuan to each poverty-stricken household in groups of nine with 100 yuan per person, so as to help 3264 poverty-stricken households in Guizhou, Hebei and other provinces
(2) "9 + 1" activity is better than carrying out "disintermediation" targeted poverty alleviation with the thinking of Internet. With accurate and real poverty alleviation information, the poverty alleviation actions of netizens can reach poor families directly. The payment of netizens must be carried out in a transparent, open and efficient environment. China Internet development foundation will successively publicize the implementation information of donations through the microblog platform, and accept the supervision of netizens in an open and transparent manner
(3) this is not only an important measure for the network information security work to take root, but also an in-depth exploration to ensure the network fund-raising activities, and also another great change to further promote the work of targeted poverty alleviation< (1) in 2017, "tmall double 11" global Carnival turnover reached 168.2 billion yuan, covering 225 countries and regions, involving 15 million kinds of goods of more than 140000 brands in the world. Among them, 167 brand businesses became members of "billion yuan club", of which 97 brands achieved half day turnover of more than 100 million yuan
(2) "more than 100 million transactions per day" is not only the embodiment of quality consumption, but also the result of China's economic improvement and efficiency, but also the commercial transformation promoted by Internet technology. In recent years, e-commerce trade volume is leading rapidly, mobile payment is leading the world, and sharing economy is attracting worldwide attention...
(3) a large number of Internet enterprises with innovative vitality have emerged one after another, and the international influence of Alibaba, Tencent, network, Huawei and other network information enterprises is increasing day by day. The Internet has not only given birth to new business forms and new models, but also brought vitality to many traditional instries. All walks of life are playing the role of informatization in improving total factor proctivity, and promoting the deep integration of Internet and real economy.
there are two cases of position explosion. One is that the futures customer still owes money to the futures exchange after closing the position, that is, the floating profit and loss of the account is equal to or greater than the total capital of the account, that is, the customer's equity is less than or equal to 0
because the market changes too fast, the margin on the account can no longer maintain the original contract before the investor has time to add margin, This kind of margin "return to zero" caused by forced closing e to insufficient margin is commonly known as "burst", and the meaning of "through" is the same as "burst".
