How to alarm blockchain
virtual currency fraud calls 110 directly
many departments, such as the China Banking and Insurance Regulatory Commission, the central office of information technology, the Ministry of public security and so on, issued risk tips, saying that some criminals, under the banner of "financial innovation" and "blockchain", absorbed funds by issuing the so-called "virtual currency", "virtual assets" and "digital assets", thus infringing the legitimate rights and interests of the public
this kind of activity is not really based on blockchain technology, but on the hype of blockchain concept, illegal fund-raising, pyramid selling and fraud. In essence, it is a Ponzi scheme of "repaying the old by borrowing the new", which is difficult to maintain the long-term operation of funds
the public should treat the blockchain rationally, not blindly believe the promises, establish a correct monetary concept and investment concept, and effectively improve the risk awareness. Report to the public security organ in time after being cheated
extended data:
the first is the obvious networking and cross-border of virtual currency. Relying on the Internet and chat tools for transactions, and using online payment tools to balance funds, the risks spread widely and spread quickly. Some lawless elements set up websites by renting overseas servers to carry out activities for domestic residents and control illegal activities remotely
some indivials claim that they have obtained the investment quota of overseas high-quality blockchain projects in the chat tool group and can invest on their behalf, which is most likely fraud. Most of these illegal funds flow overseas, which makes it very difficult to supervise and trace
followed by deception, temptation and concealment. They use hot concepts to hype, fabricate various "tall and tall" theories, and some also use celebrity "big V" platforms to publicize. They use airdrop "candy" as temptation to claim that "currency value only rises but not falls", "investment cycle is short, income is high, and risk is low", which has strong bewitching
in practice, criminals illegally make huge profits by manipulating the price trend of the so-called virtual currency, setting profit and withdrawal threshold. In addition, some criminals also issue tokens under the guise of ICO, IFO, IEO, etc., or hype virtual currency in the way of IMO under the banner of sharing economy, which has strong concealment and confusion
finally, there are many kinds of illegal risks in this kind of behavior. Through public publicity, the illegal elements attract the public to invest funds, lure investors and development personnel to join, and constantly expand the fund pool with the t of currency appreciation and development offline profits, which has the characteristics of illegal fund-raising, pyramid selling, fraud and other illegal acts
technical personnel can learn this technology, while non-technical personnel can start from the instry media and instry community
If an enterprise needs to develop blockchain applications, it can entrust a professional third-party company. In Guangzhou, today's technology is good.
Yes H2 >
the premise is that you should learn to collect evidence, recharge and record screenshots, and then form a rights group to contact other victims
go to the police station to report to the police together, the amount is huge, the police will pay attention to and file a case
of course, blockchain developers can also take some measures
one is to use professional code audit services,
the other is to understand the security coding specifications and take preventive measures
the security of cryptographic algorithm
with the development of quantum computer, it will bring great security threat to the current cryptosystem. Blockchain mainly relies on elliptic curve public key encryption algorithm to generate digital signature for secure transactions. Currently, the most commonly used ECDSA, RSA, DSA, etc. can not withstand quantum attacks in theory, and there will be greater risks. More and more researchers begin to pay attention to cryptographic algorithms that can resist quantum attacks
of course, in addition to changing the algorithm, there is another way to improve the security:
refer to bitcoin's treatment of public key address to rece the potential risk of public key disclosure. As users, especially bitcoin users, the balance after each transaction is stored in a new address to ensure that the public key of the address where bitcoin funds are stored is not leaked
security of consensus mechanism
the current consensus mechanisms include proof of work (POW), proof of stake (POS), delegated proof of stake (dpos), practical Byzantine fault tolerance (pbft), etc
POW faces 51% attack. Because POW depends on computing power, when the attacker has the advantage of computing power, the probability of finding a new block will be greater than that of other nodes. At this time, the attacker has the ability to cancel the existing transaction. It should be noted that even in this case, the attacker can only modify his own transaction, but not the transaction of other users (the attacker does not have the private key of other users)
in POS, attackers can only attack successfully when they hold more than 51% of the token, which is more difficult than 51% of the computing power in pow
in pbft, when the malicious nodes are less than 1 / 3 of the total nodes, the system is secure. Generally speaking, any consensus mechanism has its own conditions. As an attacker, we also need to consider that once the attack is successful, the value of the system will return to zero. At this time, the attacker does not get any other valuable return except destruction
for the designers of blockchain projects, they should understand the advantages and disadvantages of each consensus mechanism, so as to select an appropriate consensus mechanism or design a new consensus mechanism according to the needs of the scene
security of smart contract
smart contract has the advantages of low operation cost and low risk of human intervention, but if there are problems in the design of smart contract, it may bring great losses. In June 2016, the Dao, the most popular funding project of Ethereum, was attacked. The hacker obtained more than 3.5 million Ethereum coins, which later led to the bifurcation of Ethereum into Eth and etc
there are two aspects of the proposed measures:
one is to audit the security of smart contracts, and the other is to follow the principles of smart contract security development
the security development principles of smart contract are: be prepared for possible errors to ensure that the code can correctly handle the bugs and vulnerabilities; Release smart contracts carefully, do well in function test and security test, and fully consider the boundary; Keep smart contracts simple; Pay attention to the threat intelligence of blockchain and check and update in time; Be clear about the characteristics of blockchain, such as calling external contracts carefully
security of digital wallet
there are three main security risks in digital wallet: first, design defects. At the end of 2014, a user lost hundreds of digital assets e to a serious random number problem (repeated r value). Second, the digital wallet contains malicious code. Third, the loss of assets caused by the loss or damage of computers and mobile phones
there are four main countermeasures:
one is to ensure the randomness of the private key
the second is to verify the hash value before software installation to ensure that the digital wallet software has not been tampered with
the third is to use cold wallets
the fourth is to back up the private key.
