What is VLC digital currency
digital currency has the main characteristics of network packet. This kind of data packet is composed of data code and identification code. The data code is the content we need to transmit, while the identification code indicates where the data packet comes from and goes
based on the characteristics of digital money, the direct benefit of digital money to the central bank is not only saving the cost of paper money issuance, circulation and settlement, but also enhancing the central bank's ability to control funds.
there is no price limit for P.S. digital currency trading, so investment should be cautious!
the digital currency launched by the central bank is a national sovereign currency, which is based on the digitalization of RMB. This is a piece of data generated by a complex algorithm, which contains blockchain and encryption technology, making it unique. The payment of Alipay and WeChat is not digital money, but only based on the payment realized by electronic accounts. Compared with the current pattern of "payment transfer collection" with the help of third-party payment, what digital currency needs to achieve is "decentralization", that is, to cancel the transfer link and directly hand over the money from the payer's account to the payee, so as to rece the payment cost in currency circulation
types of digital currency
according to different issuing or consensus mechanisms, it can be divided into four categories:
1, proof of work (POW)
proof of work. The system rewards are obtained through the mining of computing power to complete the issuance and distribution of currency. More work, more gain. Such as bitcoin, lightcoin (LTC)
the advantage is that the mining cost can form a monetary price support to a certain extent, and the disadvantage is that energy consumption and environmental protection are criticized< 2. Proof of stake (POS). Allocate the newly generated currency or interest according to the amount and time of cryptocurrency you hold. Such as dash and Neo
compared with pow, POS is more energy-saving, but it increases the security risk
3. The evolution scheme of delegated proof of stake (dpos)
POS. Similar to the voting mechanism of the board of directors, through the election of representatives to vote and make decisions, n accounting nodes are elected to create, verify, sign and supervise each other. Such as the grapefruit coin (EOS)
the advantage is high efficiency, but the problem is that it presents a semi centralized state
4. POW + POS hybrid mechanism
POW is mainly used to issue currency, and POS is used to maintain the system. For example, PPC
according to the project type, it can also be divided into four categories:
1. Currency category
digital currency issued for the purpose of transfer, payment and value storage. For example, bitcoin, bitcoin cash (BCH), Monroe (XmR), and grin
2. Public chain currency, that is, the digital currency issued by public chain projects, is generally the "fuel" for the application projects to run on the public chain. Such as eth, grapefruit coin, TRX and ont
3. Application token, that is, digital currency issued by decentralized application projects, is equivalent to equity or points. For example, OMG (payment application), GXC (data application), 1st (game application)
4. Platform currency, that is, the digital currency issued by the digital currency exchange, is equivalent to equity, points or fuel. For example, BNB, HT and okb.
Core password is used to protect national top secret, secret and secret information, while ordinary password is used to protect national secret and secret information
core password and ordinary password are used to protect state secret information, effectively guarantee the security of central government orders and military orders, and build a password barrier for safeguarding the sovereignty, security and development interests of national cyberspace. According to the law of the people's Republic of China on keeping state secrets, state secrets refer to matters related to national security and interests, which are determined according to legal proceres and only known to a certain range of people within a certain period of time According to the different protected objects, the code law divides the core code and ordinary code
extended data:
the core password and common password part specifies the requirements for the use of core password and common password, the security management system, and a series of special security systems and measures for the state to strengthen the work of core password and common password
in the part of commercial password, it stipulates the commercial password standardization system, testing and certification system, market access management system, use requirements, import and export management system, e-government e-authentication service management system and commercial password in-process and post supervision system
When it comes to digital currency, your first reaction may be bitcoin or Libra, which Facebook plans to launch
from the perspective of usage scenarios, the central bank's digital currency does not pay interest, and can be used in small, retail and high-frequency business scenarios, which is no different from paper money. At the same time, the use should comply with all the existing regulations on cash management, anti money laundering and anti-terrorism financing
the Xueshuo innovation blockchain Technology Workstation of Lianqiao ecation online is the only approved "blockchain Technology Specialty" pilot workstation of "smart learning workshop 2020 Xueshuo innovation workstation" launched by the school planning, construction and development center of the Ministry of ecation of China. Based on providing diversified growth paths for students, the professional station promotes the reform of the training mode of the combination of professional degree research, proction, learning and research, and constructs the applied and compound talent training system