Position: Home page » Blockchain » Attack blockchain to steal money

Attack blockchain to steal money

Publish: 2021-04-23 10:35:47
1. The blockchain can find the transaction direction and address, but you can't confirm who the address belongs to, which means that it is an anonymous and non lost item. Moreover, bitcoin transaction is irreversible, so it can't be recovered after being stolen
2. Stolen currency and being attacked should be a headache for the exchange and it is difficult to avoid. Large exchanges usually set up their own technical team to develop the transaction payment system. Small and medium-sized exchanges can dock with third-party technical service providers, so the cost of R & D and operation and maintenance is relatively low
the exchange I am familiar with uses the currency payment enterprise version, which is a digital asset security payment system. The general principle is to store the private key locally, bind the exchange's unique client with multiple encryptions, and the system itself does not save the private key, so as to prevent the possibility of digital currency theft from the source. It is also convenient to operate, with unified management of Multi Chain and multi currency and convenient reconciliation
hope to adopt.
3. Both indivials and enterprises can purchase alicloud servers and develop an app. However, real name authentication is required. Personal real name certification and enterprise real name certification, after passing the certification, you can easily choose cloud computing procts. Leave a message or see the content of the blog, Lao Wei has written many detailed articles, which can help you get started.
4.

Osmanthus fragrans doesn't belong to Osmanthus fragrans. Cigui, also known as Huaye tree, mouse thorn; It is a plant of Ilex family. Evergreen shrubs or small trees, landscaping tree species. It is mainly distributed in the middle and lower reaches of the Yangtze River in China

There are four groups of Osmanthus fragrans, namely Dangui, Jingui, Yingui and sijigui. Among them, Osmanthus fragrans, Osmanthus fragrans and Osmanthus fragrans all bloom in autumn and are collectively called August osmanthus. Generally, it takes at least 10 years for Osmanthus fragrans seedlings to bloom in open field. For newly transplanted seedlings, it is not allowed to apply fertilizer too early. Sowing seedlings, after two years of cultivation, the next spring can be transplanted, flowering period in ten years

5. Osmanthus fragrans is a variety with strong suitability. As long as the pruning is moderate, the water and fertilizer management is in place, and the light conditions are good, the flowering period of the year can be seen; Full flower depends on the planting conditions and management level, generally has two years of recovery period is almost
however, Osmanthus fragrans should not be planted on the roadside with poor st conditions, because the st will affect the photosynthesis of leaves and lead to non flowering
when transplanting Osmanthus fragrans, the mud head should not be scattered, and the seedlings should be planted within one day. After planting, the seedlings should be drenched in time, at least twice a day. Water should be inserted for the first time, that is, the roots should be filled with mud, pruned properly, new buds can be grown to prove survival, and fertilizer can be applied after one month, so that they can blossom in the same year
6. In a simple explanation, 51% attack is also called majority attack. It means that malicious miners control more than 50% of the hash rate of the blockchain network, and then attack the network and take over the blockchain network, so that criminals can reverse transactions, stop payment or prevent new transactions from being confirmed
for more information about 51% attacks, you can learn about them on the password finance network,
7.

It was reported on May 29 that recently, Vulcan team of 360 company found a series of high-risk security vulnerabilities in EOS, a blockchain platform. It is verified that some of the vulnerabilities can remotely execute arbitrary code on EOS nodes, that is, they can directly control and take over all nodes running on EOS through remote attacks

the hidden dangers of blockchain network security need to be paid attention to

EOS is a new blockchain platform known as "blockchain 3.0". At present, its token market value is as high as 69 billion yuan, ranking fifth in the global market value

in the blockchain network and digital currency system, nodes, wallets, mines, exchanges and smart contracts all have many attack surfaces. 360 security team has found and exposed several serious security vulnerabilities for digital currency nodes, wallets, mines and smart contracts

this time, the 360 security team found a series of new security vulnerabilities in the smart contract virtual machine of EOS platform, which is a series of unprecedented security risks. No security researchers have found such problems before. This type of security problem not only affects EOS, but also may affect other types of blockchain platforms and virtual currency applications

360 expressed the hope that through the discovery and disclosure of this vulnerability, the blockchain instry and security peers will pay more attention to the security of such issues, and jointly enhance the security of the blockchain network

content source: surging news

8. How to protect my bitcoin after bifurcation
if bitcoin really forks, as an ordinary user, the biggest risk is replay attack
what is replay attack? If bitcoin is split into one or more bitcoins, such as btc1 / btc2 / btc3, each bitcoin account will have a corresponding number of all bifurcated coins according to its bitcoin balance
because the address, private key, algorithm, etc. on each chain are the same, and the transaction format is also the same, the transaction initiated on one blockchain can be broadcast on another blockchain and may be confirmed. This is the "replay attack."
in short, when you transfer btc1, your btc2 / btc3 may also be transferred at the same time
however, at present, many forked coins have done two-way anti replay attack processing to avoid the risk of replay attack after forking.
9.

In virtual currency transactions, security problems occur every day. Blockchain technology can ensure that all transactions will not be tampered with, but central transactions using virtual currency are vulnerable to hackers

conclusion:

this is to remind investors that virtual currency investment and trading are not protected by law. Anyone who tries to cross the red line should not take any chances by using virtual currency; Money laundering; Our behavior will be severely punished by law

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750