Position: Home page » Currency » What kind of cryptocurrency is true

What kind of cryptocurrency is true

Publish: 2021-04-06 11:04:58
1.

Differences:

non encrypted currency (enterprise currency):

1, personal behavior

2, company's own currency

3, unable to decentralize

4, unable to trade on international trading platform

5, unlimited issuance

6, no mine website, no original code

7, controllable price, mostly one-way relationship (dining ticket of an enterprise, Qmoney and so on)

open source digital cryptocurrency:

1. Decentralization -- not regulated by indivials, companies and national banks

2. Limited issue

3. Free trade on international trading platform

4. Original code

5. Not taxed, not frozen, uncontrollable price

cryptocurrency advantages:

1. Compared with paper money, Save the cost of printing, data audit, anti-counterfeiting, escort circulation, safe keeping and so on

2. It is impossible to control the number of issues without issuing institutions

3. Borderless. If you use cryptocurrency transaction, directly enter the account address, click the mouse, wait for the network to confirm the transaction, a lot of money will pass

4. Using cryptocurrency in any store can save the cost of tax and capital supervision

5. It is not controlled by the central bank and the quantity is limited, so it can completely resist the pressure of inflation. Let the wealth of the common people keep its value and increase its value The cryptocurrency other than bitcoin is also known as counterfeit currency and competitive currency (English: altcoin). Part of it is a virtual currency similar to bitcoin, which is based on the ideas, principles and source code of bitcoin. At present, more than 800 cryptocurrencies are in circulation

because bitcoin itself does not have an authoritative issuing institution and state power to maintain its authority and uniqueness, bitcoin and its imitators can only get along equally. It is not absolutely exclusive

2.

Digital cryptocurrency is a kind of currency that is not issued by legal tender institutions and controlled by the central bank. It is based on the open source code of a group of equations calculated by computers all over the world, and is generated by a large number of calculation processing of computer graphics card and CPU. It uses the design of cryptography to ensure the security of all aspects of currency circulation

development materials:

  1. definition of digital currency:

    digital currency is abbreviated as digiccy, which is the abbreviation of "digital currency" in English and the alternative currency in the form of electronic currency. Both digital gold coin and cryptocurrency belong to digiccy< br />

3.
4. Cryptocurrency is legal in China. Encrypted digital currency is a part of digital assets, and QQ, game accounts, game equipment are protected by law in China
encrypted digital currency generally refers to bitcoin, Ethereum, lightcoin, DCT and other open source currencies.
5. Different people have different opinions on this issue! A lot of people and the media questioned it. But there are still a lot of people playing. The yield of this kind of currency may be relatively high, but it is unreliable. It is suggested to invest in digital currencies such as bitcoin, Ruitai coin and Qianjin card.
6. Safe and reliable digital wallet should be designed from at least five dimensions:
1. Security risk of running environment
the core file of encrypted digital currency Wallet - private key / mnemonics is stored on the terminal device, whether it is PC or mobile terminal, if the terminal device appears unsafe phenomenon, it has a very high security risk for private key / mnemonics
at the beginning of design, a secure digital wallet can avoid the possibility of private key / mnemonics being stolen e to the running environment. The security problems of the running environment on the terminal mainly include virus software, operating system vulnerabilities and hardware vulnerabilities
2. The security risk of network transmission
the security of network transmission is more reflected in the ability to resist man in the middle attack. Man in the middle attack means that the attacker creates independent contact with both ends of the communication and exchanges the data they receive, so that both ends of the communication think that they are talking directly with each other through a private connection, but in fact the whole conversation is completely controlled by the attacker
although most digital wallet applications use the HTTPS protocol to communicate with the server, the man in the middle attack method is to get the content of the HTTPS protocol by installing a digital certificate in the user terminal
a secure digital wallet needs to be able to scan the legality of all the digital certificates in the terminal, check the proxy settings in the network transmission process, and ensure the security of the basic network communication environment
in the development of digital wallet, whether to use two-way verification for communication verification at the network transmission level is also an important criterion to measure the security of a digital wallet application
3. The security risk of file storage mode
for the private key / mnemonics of digital wallet, the storage mode of terminal device also needs to be paid attention to in the security design. The access right of private key / mnemonic file directory, the form of private key / mnemonic file storage and the design of encryption algorithm all need to be strictly designed
when we analyze the security of several mainstream digital wallets, we find that even the well-known digital wallets are random in the storage of private key / mnemonic words. There are both plaintext storage and encrypted storage, but the decryption key is fixed in the code, which can not play any role in security defense
4. The security risk of the application itself
the security risk of the application itself mainly focuses on the security defense of the application installation package itself
whether the application installation package has the ability of anti tampering is a very core technical ability. In addition, memory security, anti debugging ability, life cycle management of private key / mnemonics, security of debugging log and security of development process also need to be enhanced
5. Security risk of data backup
if the mobile application can be backed up, it can use the machine with more powerful computing performance to brutally crack the private key / mnemonics. For example, if android:allowBackup Property is set to allow backup, then the backup mechanism of the system can be used to back up the application data files, and the private key / mnemonics of the encrypted digital currency will be backed up to the external media, which breaks the security boundary design of the operating system from another direction
for the majority of users, the security of digital wallet also means the security of wealth, so we must be careful when choosing digital wallet.
7. Encrypted digital currency is a kind of digital currency calculated by a certain encryption algorithm, such as bitcoin, Leyte coin, Ruitai coin, dogcoin, Weimeng coin, Ruibo coin and so on.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750