Withdrawal and closing of blockchain digital currency
Here you need to understand the correct digital currency issuance process, which is roughly divided into eight steps:
the first step is to build a digital token system
this is very simple. The code of bitcoin is public, and it is a kind of counterfeit currency after simple change; Ethereum's technology is open source. You can find a program to issue a coin on Ethereum's public chain. Now most of the counterfeit coins are on the public chain of Ethereum, and the distribution of tokens is also directly in Ethereum's wallet, which is very convenient
Step 2: find someone to endorse
if the project can be implemented, you may find a real influential tycoon, and by the way, you can take an angel wheel to do marketing. If the project is air money, it may be a grassroots tycoon. In any case, now that the coin circle is just emerging, many "tycoons" are actually grassroots. If you can't, you can send candy directly by virus marketing
Step 3: prepare a white paper
this has to be written on the top. For high-quality coin, vision, code, planning, team and so on need to be well written, which takes a lot of time. But for air coin, it's OK to find a professional agent directly, and it can be written in one day
The fourth step is to promote marketingfind all kinds of coin circle media to advertise, or get a virus activity to invite candy delivery, and brush the popularity
Step 5: love Western Europewith a certain popularity, he began to love Western Europe directly. Good projects are very simple, and they are often looted in a small scale. It doesn't matter if the air currency can't attract people. It's easy to find the agent investment channel to help you package the project
Step 6: contact the exchange
generally, they try their best to go to a well-known exchange. If there is no angel round, you can only take the money from aisio. It's not good. It's OK to go to an easy exchange
Step 7: public offering
once on the stock exchange, you will have enough confidence to speak. At this time, we can continue another wave of public offering. Anyway, what we give out are tokens, which can also attract more attention from the market
Step 8: go online
once the funds are sufficient and the quality of the project is good, there will be more mainstream exchanges. Once the mainstream exchange is finished, this is a reliable project
if it is normal, through the above eight steps is the use of blockchain technology of digital currency
but more often is the digital currency issued by indivials, belongs to MLM currency, more common in online private placement, such as the task Gang blocked before strong>
As of May 2020, blockchain and digital currency are illegal in China
according to the announcement of the people's Bank of China Central Network Information Office, Ministry of instry and information technology, State Administration for Instry and commerce, China Banking Regulatory Commission, China Securities Regulatory Commission and China Insurance Regulatory Commission on preventing the risks of token issuance and financing, Article 2 no organization or indivial shall illegally engage in token issuance and financing activities. Organizations and indivials that have completed the token issuance and financing should make arrangements such as refund, reasonably protect the rights and interests of investors, and properly handle risks. Relevant departments will seriously investigate and deal with the activities of token issuance and financing that refuse to stop and the illegal behaviors in completed token issuance and financing projects
Article 3 strengthen the management of token financing trading platform
from the date of this announcement, any so-called token financing trading platform shall not engage in the exchange business between legal currency and token and "virtual currency", and shall not buy or sell token or "virtual currency" as a central counter party, and shall not provide pricing for token or "virtual currency" Information intermediary and other services P>
extension data
"illegal financial institutions and illegal financial business activities ban" stipulates that:
eleventh, the criminal suspect, funds and property involved in illegal financial institutions and illegal financial activities, and the public security organs shall take compulsory measures according to law to prevent suspect from escaping and transferring funds and property. p>
Article 12 the people's Bank of China shall, after investigation and confirmation, make a decision to ban the illegal financial institutions and financial business activities, declare them illegal, order them to stop all business activities, and make an announcement
Article 13 if the people's Bank of China discovers that a financial institution opens an account, handles settlement and provides loans for an illegal financial institution or illegal financial business activities, it shall order the financial institution to stop the relevant business activities immediately. No unit or indivial may use the relevant funds without authorizationcoinbase transaction is a special transaction that generates bitcoin "out of thin air". Only miners can write this kind of transaction, and the number of generated bitcoin is limited by rules (new currency reced by half for every 210000 blocks + transaction fee for this block)
however, the rules do not stipulate that the miner must take away all the rewards that can be taken, and can choose not to take them
therefore, a mine pool connected with the RSK side chain has made a bug before, forgetting to take away the reward and occupying a pit in a block for nothing, which is equivalent to destroying the corresponding amount of bitcoin, making the total amount of bitcoin decrease a little bit permanently
in addition, to spend a bitcoin, you only need to specify the transaction ID and output serial number
as like as two peas in multiple blocks repeatedly write identical coinbase transactions, the transaction ID is also repeated.
therefore, this kind of situation also occupies the pit of a block in vain, and permanently destroys the corresponding amount of bitcoin
it seems to me that this is still a security vulnerability, so the new version of bitcoin software later banned the writing of repeated coinbase transactions. But until now, there has been no ban on miners not getting their e rewards
generally speaking, a coin is controlled by a private key. If a coin is transferred to an address where no one knows the private key, it will be destroyed
if the owner does a good job in security, and the private key is not disclosed and cannot be guessed, but he accidentally loses the private key, it is equivalent to destroying all the coins he owns
there are only some special circumstances that require intentional destruction of coins
one is irreversibly converted into another kind of currency, such as the contract currency XCP attached to bitcoin and wormhole cash WHC attached to BCH
the second is to save certificates and data on the chain, such as the time stamp: panbiao.com/2013/08 /
and the crowd funding of the original Ethereum founding team: zhuanlan.hu.com/p/29
the private key is essentially a big number. Whoever knows this number can control the currency on the corresponding address. So the private key must be generated with reliable random number, otherwise it may be guessed and stolen
compared with the token, the address is the hash of the public key. There is no way to judge whether an address has a corresponding public key and private key (even if the public key is known, the corresponding private key cannot be known). Therefore, even if it is explicitly the address of "burned" token, the system does not prohibit the transfer in
strictly speaking, what locks the currency is a small program (script). This program takes the input as the public key and digital signature. First, check whether the public key hash is consistent, and then check whether the digital signature is valid. If it is valid, it will be verified and transfer is allowed; Otherwise, it will be judged that the transaction is illegal and refuse to package into the chain
it is the whole node software that explains and executes this program. It can be said that the software code of the whole node specifically defines a coin
however, the current situation is very embarrassing. Most miners do not run the whole node, only a few mines are running. The vast majority of users do not run the whole node, even if they run the whole node, they can only perform verification, no computing power, no block
facing the use of voltage generally 480 V, although one installation uses 4160 V, shielded cable end. Many textile mills and processing plants use 480 V distribution, with 2300 fifth very large delta often connected, so that plant action may continue, even if a stage becomes grounded, but these systems are equipped with ground display lights, and usually have special fault tracking equipment, so that the first stage to ground fault can be detected and isolated
other plants use a solidly grounded or resistor grounded circuit to trip with a selective earth fault. Heavy copper chains extend from the construction of steel frames, each motor providing grounding in most plants. In addition, the 480 V line is usually run on a metal conctor, which is often used as an additional ground conctor, which is ultimately bonded to the substation ground bed. Conctor ground command can be good for low resistance paths, if continuity is guaranteed in each union and flex coupling vibration, if not a problem. However, in some installations using shake head screen size separation, especially in sand and gravel or dredge plants, vibration may be so severe that the wire can literally be unshakable into pieces. In these cases, the conctor did not make enough frame grounding conctors
most surface mine visits also utilize resistance grounded system circuits to feed portable and mobile devices powered by trailing cables. However, at least one facility uses a floating delta secondary if there is no grounding conctor. Theoretically, the ground fault current cannot flow in a delta system, but in reality it does because of the stray capacitance circuit. In addition, if two nearby devices have progressively failed to frame at different stages, a person who involves both machines at the same time will be shocked with a full range of line to line voltages. Ungrounded systems pose a significant risk to personnel unless they are equipped with a very sensitive GFI type trip, which is not available except for 120 volt circuits. All rake access utilizes shielded trailing cables, and their power system is equipped with resistance