Position: Home page » Currency » Digital currency holders should be protected

Digital currency holders should be protected

Publish: 2021-04-30 12:15:54
1. The real digital currency, the country has not yet issued. Today's digital currency is issued by swindlers. If you buy it, it's not as good as Ming coin. You can see it, touch it, and know who sold it to you.
2. Digital currency is abbreviated as digiccy, which is the abbreviation of "digital currency" in English. It is an alternative currency in the form of electronic currency. Both digital gold coin and cryptocurrency belong to digiccy
digital currency is a kind of unregulated and digital currency, which is usually issued and managed by developers and accepted and used by members of specific virtual communities. The European Banking authority defines virtual currency as a digital representation of value, which is not issued by the central bank or authorities, nor linked with legal currency. However, because it is accepted by the public, it can be used as a means of payment, or it can be transferred, stored or traded in electronic form
according to the notice on preventing the financing risk of token issuance, there is no approved digital currency trading platform in China. According to China's digital currency regulatory framework, investors have the freedom to participate in digital currency transactions at their own risk

warm tips: the above information is for reference only. Before investing, it is recommended that you first understand the risks existing in the project, and understand the investors, investment institutions, chain activity and other information of the project, rather than blindly investing or mistakenly entering the capital market. Investment is risky, so we should be cautious when entering the market
response time: December 11, 2020. Please refer to the official website of Ping An Bank for the latest business changes
[Ping An Bank I know] want to know more? Come and see "Ping An Bank I know" ~
https://b.pingan.com.cn/paim/iknow/index.html
3.

The contract transaction of digital currency is not safe. There are still many loopholes in the digital currency trading platform, for example, the most common are the following six kinds:

1. Denial of service attack

denial of service attack is the most important attack against the digital currency trading platform at present. Through denial of service attack, the attacker makes the trading platform unable to access normally, Because users can not accurately distinguish the degree of attack, it often causes panic asset transfer, which brings some loss

2. Phishing incident

even the best technical measures at present can not make the digital currency trading platform avoid phishing attacks. Some hackers and criminals can confuse digital currency investors by means of fake domain names or fake pages, while ordinary investors can't identify the authenticity, so it's easy to cause asset losses

Many digital currency trading platforms use a single private key to protect the hot wallet. If hackers can access a single private key, they can crack the hot wallet related to the private key. For example, in the attack on yapizon of Seoul stock exchange in 2017, the attackers stole hot wallets from the trading platform twice in a year, resulting in a total loss of nearly 50% of the assets of the trading platform and eventually leading to the bankruptcy of the trading platform

Fourth, e to the lack of perfect risk isolation measures, or ineffective supervision on the rights of employees, some employees who have the operation rights of the platform use internal trust to seek unjust wealth for themselves. For example, in 2016, the event of employees stealing bitcoin on shapeshift caused a total loss of US $230000 to the trading platform by stealing and reselling sensitive information to others

Fifth, the software vulnerability of digital currency trading platform includes single sign on vulnerability, OAuth protocol vulnerability and so on. At present, all countries have laws requiring banks or other financial institutions to implement information security measures to protect customers' deposits. However, e to the fact that the blockchain field is still in its infancy, there is a lack of such specifications for encrypting digital assets. Therefore, it is not accidental that many trading platforms have a large number of loopholes in the absence of security constraints

6. Transaction malleability the technical supporters of blockchain often think that blockchain transactions are highly secure because they are recorded on records that are said to be unchangeable, but each transaction needs to have a corresponding signature, and the records can be forged temporarily before the final confirmation of the transaction

extended data:

rules of contract transaction

1. Transaction time

contract transaction is 7 * 24 hours transaction, which will be interrupted only ring the settlement or delivery period of 16:00 (UTC + 8) every Friday. In the last 10 minutes before delivery, the contract can only be closed, not opened

Transaction types are divided into two types, opening and closing. Opening and closing positions are divided into two directions: buying and selling:

buying open long (bullish) refers to buying a certain number of contracts when users are bullish and bullish on the index. Carry out "buy open more" operation, match success will increase long position

selling pingo (multi order closing) refers to the selling contract that the user makes up for when he is no longer bullish on the future index, offsets with the current buying contract and exits the market. Carry on "sell flat much" operation, match after success, will rece long position

short selling (bearish) refers to the new sale of a certain number of certain contracts when the user is short or bearish on the index. Carry out the operation of "sell short" and increase the short position after successful matching

buy close (short single close) refers to the buy contract that the user will not be bearish on the future index market and make up for, offset with the current sell contract and exit the market. Carry out "buy short" operation, after matching successfully, short position will be reced

3. Order method

limit order: the user needs to specify the price and quantity of the order. Limit order can be used for opening and closing positions

order at opposite price: if you choose to order at opposite price, you can only enter the order quantity, not the order price. The system will read the latest competitor price at the moment of receiving the entrustment (if the user buys, the competitor price is the selling price of 1); If it is a sell, then the counter price is buy 1 price). Issue a price limit order for this counter price

4. Position

the user owns the position after opening and trading, and the positions in the same direction of the same contract will be merged. In a contract account, there can only be 6 positions at most, that is, multiple positions of current week contract, short positions of current week contract, multiple positions of next week contract, short positions of next week contract, multiple positions of quarterly contract and short positions of quarterly contract

5. Order restriction

the platform will restrict the number of single user's positions in a certain period of contract and the number of single open / close positions, so as to prevent users from manipulating the market

when the number of positions or entrustments of users is too large, the platform has the right to require users to take risk control measures, including but not limited to cancellation of orders, closing positions, etc. The platform has the right to adopt measures including but not limited to limiting the total number of positions, limiting the total number of consignments, limiting the opening of positions, withdrawing orders, forcibly closing positions, etc. for risk control

4. There is no digital currency issue
5. You can rest assured that it is true and effective, and every transaction information has a clear record and is trustworthy.. Are you satisfied with my answer? If you are satisfied, please take it
6. At present, there are many problems in the application of digital currency, such as the confidentiality of transaction data, privacy and privilege mechanism, calculation and storage efficiency. Among them, operation security risk and privacy leakage risk are the basis of digital currency security. Therefore, it is necessary to study the construction of a new e-money security account model, the research on the key leakage tracking and revocation technology of distributed digital money account, and the research on the privacy and anonymity of e-money account, so as to establish a mechanism to ensure the security and privacy of digital money.
7. Don't put it on any electronics
record on paper
even if offline, data may be stolen, even if it is shut down, it may be turned on remotely
8.

With the advent of digital currency, the encryption algorithm of currency is becoming more and more important. What are the types of passwords

classical cipher types mainly include transposition cipher and rearrangement of alphabetic order messages. For example, "Hello world" becomes "ehlol owrdl"

Diffie Hellman and RSA algorithms have been widely used except for the first public example of high quality public key algorithms. Other asymmetric key algorithms include Cramer schup cryptosystem, ElGamal encryption and various elliptic curve techniques

some well-known cryptosystems include RSA encryption, Schnorr Signature, El Gamal encryption, PGP and so on. More complex password systems include e-cash system, signcryption system, etc. Now more cryptosystems include interactive proof systems, such as zero knowledge proof, which is used for secret sharing

for a long time, information collection and law enforcement agencies have been interested in cryptography. The importance of secret communication is self-evident. Because cryptography promotes privacy protection, it also attracts great interest of cryptography supporters. Therefore, there is a history of controversial legal issues around cryptography, especially since the emergence of cheap computers makes it possible to widely use high-quality cryptography

nowadays, cryptocurrency transactions are semi anonymous, which makes them very suitable for a series of illegal activities, such as money laundering and tax evasion. However, the proponents of cryptocurrency often attach great importance to the anonymity of digital currency and think that it can protect the privacy of users. Some cryptocurrencies are more private than others

Cryptocurrency is a new type of digital asset, which is based on the network distributed on a large number of computers. This decentralized structure enables them to exist outside the control of the government and central authorities. The term "cryptocurrency" also comes from the encryption technology used to protect the network

blockchain is an organization method to ensure the integrity of digital currency transaction data, and it is an important part of many cryptocurrencies. Many experts believe that blockchain and related technologies will subvert many instries, including finance and law. Cryptocurrencies have been criticized for many reasons, including their use for illegal activities, exchange rate fluctuations and the vulnerability of the infrastructure that underpins them. However, digital currency is also praised for its portability, divisibility, anti inflation and transparency

9.

The contract transaction of digital currency is not safe. There are still many loopholes in the digital currency trading platform, for example, the most common ones are as follows:


1. Denial of service attack

denial of service attack is the most important attack against the digital currency trading platform at present. Through the denial of service attack, the attacker makes the trading platform unable to access normally, while the user cannot accurately distinguish the attack degree, It often leads to panic asset transfer, which brings some loss

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750