What is digital currency like
1. Security risk of running environment
the core file of encrypted digital currency Wallet - private key / mnemonics is stored on the terminal device, whether it is PC or mobile terminal, if the terminal device appears unsafe phenomenon, it has a very high security risk for private key / mnemonics
at the beginning of design, a secure digital wallet can avoid the possibility of private key / mnemonics being stolen e to the running environment. The security problems of the running environment on the terminal mainly include virus software, operating system vulnerabilities and hardware vulnerabilities
2. The security risk of network transmission
the security of network transmission is more reflected in the ability to resist man in the middle attack. Man in the middle attack means that the attacker creates independent contact with both ends of the communication and exchanges the data they receive, so that both ends of the communication think that they are talking directly with each other through a private connection, but in fact the whole conversation is completely controlled by the attacker
although most digital wallet applications use the HTTPS protocol to communicate with the server, the man in the middle attack method is to get the content of the HTTPS protocol by installing a digital certificate in the user terminal
a secure digital wallet needs to be able to scan the legality of all the digital certificates in the terminal, check the proxy settings in the network transmission process, and ensure the security of the basic network communication environment
in the development of digital wallet, whether to use two-way verification for communication verification at the network transmission level is also an important criterion to measure the security of a digital wallet application
3. The security risk of file storage mode
for the private key / mnemonics of digital wallet, the storage mode of terminal device also needs to be paid attention to in the security design. The access right of private key / mnemonic file directory, the form of private key / mnemonic file storage and the design of encryption algorithm all need to be strictly designed
when we analyze the security of several mainstream digital wallets, we find that even the well-known digital wallets are random in the storage of private key / mnemonic words. There are both plaintext storage and encrypted storage, but the decryption key is fixed in the code, which can not play any role in security defense
4. The security risk of the application itself
the security risk of the application itself mainly focuses on the security defense of the application installation package itself
whether the application installation package has the ability of anti tampering is a very core technical ability. In addition, memory security, anti debugging ability, life cycle management of private key / mnemonics, security of debugging log and security of development process also need to be enhanced
5. Security risk of data backup
if the mobile application can be backed up, it can use the machine with more powerful computing performance to brutally crack the private key / mnemonics. For example, if android:allowBackup Property is set to allow backup, then the backup mechanism of the system can be used to back up the application data files, and the private key / mnemonics of the encrypted digital currency will be backed up to the external media, which breaks the security boundary design of the operating system from another direction
for the majority of users, the security of digital wallet also means the security of wealth, so we must be careful when choosing digital wallet.
Mobile payment means that mobile clients use electronic procts such as mobile phones to make e-money payment. Mobile payment creates a new payment method and makes e-money popular. Because of the advantages of convenient and fast payment, eliminating counterfeit money, no change and so on, it is loved by many people< The Ministry of Commerce issued the "overall plan for the pilot project of deepening the innovation and development of service trade in China", and officially announced that the number of digital currency has expanded from the original 4 pilot cities to 28 , which means that digital currency is coming towards us. The same virtual currency and bitcoin, so these virtual currency can replace the status of paper money
Therefore, it is essentially no different from the paper currency RMB, and will not be wildly hyped like bitcoin. In a short period of time, virtual currency can not completely replace traditional currency. There are mainly two constraints: the first is the user's will, not everyone is used to this payment method; the second is the satisfaction of technical conditions, because the speed of transaction payment is mainly limited by the technical realization, and the goal of digital currency is only to replace part of the cash in circulation. So for a long time, it should be used in parallel with banknotesDigital money (electronic money or electronic currency) is a kind of money in digital form (different from paper money and coins). It shows properties similar to physical currency, but allows immediate transaction and boundaryless ownership transfer. Examples include virtual currency, cryptocurrency and currency issued by central bank and recorded in computer database (including digital base currency). Like traditional currencies, they may be used to buy physical goods and services, but they may also be restricted in some communities, such as online games
blockchain is divorced from sovereign credit. The issuing basis can not be guaranteed, and the currency value can not be stable, so it is difficult to truly form social wealth
the Xueshuo innovation blockchain Technology Workstation of Lianqiao ecation online is the only approved "blockchain Technology Specialty" pilot workstation of "smart learning workshop 2020 Xueshuo innovation workstation" launched by the school planning, construction and development center of the Ministry of ecation of China. Based on providing diversified growth paths for students, the professional station promotes the reform of the training mode of the combination of professional degree research, proction, learning and research, and constructs the applied and compound talent training system