Position: Home page » Currency » Digital currency can be cracked

Digital currency can be cracked

Publish: 2021-04-19 16:44:37
1.

We need to call the police. This belongs to currency fraud. We can't blindly trust the virtual investment platform that can easily earn a lot of money. Fraud gangs often use "small investment, big income" as t to let investors taste the sweetness first and then increase investment, so as to achieve the purpose of fraud

at present, the so-called "digital currency" in the market is not legal digital currency. The so-called "digital currency" launched by some institutions and enterprises and the so-called promotion of the central bank's issuance of digital currency may involve pyramid selling and fraud. It is necessary for the general public to raise their risk awareness, invest rationally and prudently, and prevent the interests from being damaged

extended information:

five ways to distinguish whether digital currency is MLM currency. virtual currency does not rely on specific monetary institutions to issue, it is based on a specific algorithm, generated through a large number of calculations, is a decentralized way of issuing. Each different terminal node is responsible for maintaining the same account book, and the maintenance process is mainly to package and encrypt the transaction information by the algorithm, while the MLM currency is mainly issued by a certain organization, and the profit is made by pulling the head

2. Transaction mode. Virtual currency is a kind of sporadic transaction formed spontaneously in the market. After the scale is formed, the third party graally establishes an exchange to complete the transaction. The MLM currency is issued by an institution and traded on its own platform

3. The virtual currency itself is an open source program, maintained in the GitHub community. The parameters and methods of the total amount limit are shown in the open source code. The open source of MLM currency is completely ing other people's open source code, and there is no use of open source code to build programs, so its essence is controlled by the website like Q currency

Whether the source code link is given. The general decentralized digital currency will give the source code link in the prominent position of the official website, so as to show the operation mechanism of the monetary system openly and transparently. What MLM currency focuses on is the transaction process of recharge purchase, not to mention its operation mechanism, and even the website does not have the link address of the source code

5. Whether the official website starts with HTTPS. In general, the addresses of the official website and trading website of decentralized digital currency begin with HTTPS. The purpose of this kind of website is to protect users' data from illegal theft. But the official website of MLM currency, trading website and other related websites do not start with HTTPS

2. Now it's hard to say that digital currency may also be stolen. All technology, there will be loopholes.
3. The following is for reference only:
very large
in the field of blockchain and virtual currency, such cases of losses caused by the security of exchanges occur frequently, causing great economic losses to users. The security experts of Juhui ggfx also gave a hint: there are still many loopholes in the current digital currency trading platform, for example, the most common are the following six kinds:
the first kind: denial of service attack
denial of service attack is the most important attack against the digital currency trading platform at present. Through denial of service attack, the attacker makes the trading platform unable to access normally, Because users can not accurately distinguish the degree of attack, it often causes panic asset transfer, which brings some loss
the second kind: phishing
even the best technical measures at present can not make the digital currency trading platform avoid phishing attacks. Some hackers and outlaws can confuse digital currency investors by means of fake domain names or fake pages, while ordinary investors can't identify the authenticity, so it's easy to cause asset losses
the third: Hot wallet protection
many digital currency trading platforms use a single private key to protect the hot wallet. If hackers can access a single private key, they can crack the hot wallet related to the private key. For example, in the attack on yapizon of Seoul stock exchange in 2017, the attackers stole hot wallets from the trading platform twice in a year, resulting in a total loss of nearly 50% of the assets of the trading platform and eventually leading to the bankruptcy of the trading platform
Fourth: internal attack
e to the lack of perfect risk isolation measures or ineffective supervision on the authority of employees, the digital currency trading platform also has employees' self-monitoring and stealing, and some employees with operating authority of the platform use internal trust to seek ill gotten gains for themselves. For example, in 2016, the event of employees stealing bitcoin on shapeshift caused a total loss of US $230000 to the trading platform by stealing and reselling sensitive information to others
the fifth: software vulnerability
the software vulnerability of digital currency trading platform includes single sign on vulnerability, OAuth protocol vulnerability, etc. At present, all countries have laws requiring banks or other financial institutions to implement information security measures to protect customers' deposits. However, e to the fact that the blockchain field is still in its infancy, there is a lack of such specifications for encrypting digital assets. Therefore, it is not accidental that many trading platforms have a large number of loopholes in the absence of security constraints
sixth: transaction malleability
Technical supporters of blockchain often think that blockchain transactions are highly secure because they are recorded on records that are said to be unchangeable, but each transaction needs to have a corresponding signature, and the records can be temporarily forged before the final confirmation of the transaction. Mt. GOx, which once accounted for 80% of the world's total transactions, was hacked to submit code changes to the public ledger before the initial transaction was released, resulting in a loss of 473 million US dollars< br /> &# 160;
4.

The contract transaction of digital currency is not safe. There are still many loopholes in the digital currency trading platform, for example, the most common are the following six kinds:

1. Denial of service attack

denial of service attack is the most important attack against the digital currency trading platform at present. Through denial of service attack, the attacker makes the trading platform unable to access normally, Because users can not accurately distinguish the degree of attack, it often causes panic asset transfer, which brings some loss

2. Phishing incident

even the best technical measures at present can not make the digital currency trading platform avoid phishing attacks. Some hackers and criminals can confuse digital currency investors by means of fake domain names or fake pages, while ordinary investors can't identify the authenticity, so it's easy to cause asset losses

Many digital currency trading platforms use a single private key to protect the hot wallet. If hackers can access a single private key, they can crack the hot wallet related to the private key. For example, in the attack on yapizon of Seoul stock exchange in 2017, the attackers stole hot wallets from the trading platform twice in a year, resulting in a total loss of nearly 50% of the assets of the trading platform and eventually leading to the bankruptcy of the trading platform

Fourth, e to the lack of perfect risk isolation measures, or ineffective supervision on the rights of employees, some employees who have the operation rights of the platform use internal trust to seek unjust wealth for themselves. For example, in 2016, the event of employees stealing bitcoin on shapeshift caused a total loss of US $230000 to the trading platform by stealing and reselling sensitive information to others

Fifth, the software vulnerability of digital currency trading platform includes single sign on vulnerability, OAuth protocol vulnerability and so on. At present, all countries have laws requiring banks or other financial institutions to implement information security measures to protect customers' deposits. However, e to the fact that the blockchain field is still in its infancy, there is a lack of such specifications for encrypting digital assets. Therefore, it is not accidental that many trading platforms have a large number of loopholes in the absence of security constraints

6. Transaction malleability the technical supporters of blockchain often think that blockchain transactions are highly secure because they are recorded on records that are said to be unchangeable, but each transaction needs to have a corresponding signature, and the records can be forged temporarily before the final confirmation of the transaction

extended data:

rules of contract transaction

1. Transaction time

contract transaction is 7 * 24 hours transaction, which will be interrupted only ring the settlement or delivery period of 16:00 (UTC + 8) every Friday. In the last 10 minutes before delivery, the contract can only be closed, not opened

Transaction types are divided into two types, opening and closing. Opening and closing positions are divided into two directions: buying and selling:

buying open long (bullish) refers to buying a certain number of contracts when users are bullish and bullish on the index. Carry out "buy open more" operation, match success will increase long position

selling pingo (multi order closing) refers to the selling contract that the user makes up for when he is no longer bullish on the future index, offsets with the current buying contract and exits the market. Carry on "sell flat much" operation, match after success, will rece long position

short selling (bearish) refers to the new sale of a certain number of certain contracts when the user is short or bearish on the index. Carry out the operation of "sell short" and increase the short position after successful matching

buy close (short single close) refers to the buy contract that the user will not be bearish on the future index market and make up for, offset with the current sell contract and exit the market. Carry out "buy short" operation, after matching successfully, short position will be reced

3. Order method

limit order: the user needs to specify the price and quantity of the order. Limit order can be used for opening and closing positions

order at opposite price: if you choose to order at opposite price, you can only enter the order quantity, not the order price. The system will read the latest competitor price at the moment of receiving the entrustment (if the user buys, the competitor price is the selling price of 1); If it is a sell, then the counter price is buy 1 price). Issue a price limit order for this counter price

4. Position

the user owns the position after opening and trading, and the positions in the same direction of the same contract will be merged. In a contract account, there can only be 6 positions at most, that is, multiple positions of current week contract, short positions of current week contract, multiple positions of next week contract, short positions of next week contract, multiple positions of quarterly contract and short positions of quarterly contract

5. Order restriction

the platform will restrict the number of single user's positions in a certain period of contract and the number of single open / close positions, so as to prevent users from manipulating the market

when the number of positions or entrustments of users is too large, the platform has the right to require users to take risk control measures, including but not limited to cancellation of orders, closing positions, etc. The platform has the right to adopt measures including but not limited to limiting the total number of positions, limiting the total number of consignments, limiting the opening of positions, withdrawing orders, forcibly closing positions, etc. for risk control

5.

Digital currency carrier is digital currency wallet

digital currency is an alternative to paper money

functions and properties are exactly the same as banknotes, but the form is digital

Therefore, it can be seen that the use of digital currency will be more secure

In addition, digital currency has unique coding, and there is no way to forge it

and whose wallet digital currency enters may generate traceable information codes, including the identity information of the wallet owner. In this way, as long as the digital currency is spent or transferred, it is very easy to trace

even in the future, if big data and Internet of things technology are further upgraded, where you spend digital currency may be traceable, including spending a few yuan and so on, which can be easily known and traceable

in this case, your mobile phone is lost. On the one hand, it is difficult for the person who finds it to crack many passwords on the mobile phone. If the person who finds it takes a lot of effort to break the password, then if he wants to spend money or transfer money, it is also traceable

6. Digital cryptocurrency is not issued by legal tender institutions and is not controlled by the central bank. It is based on the open source code of a group of equations calculated by computers all over the world. It is generated by a large number of operations of computer graphics card and CPU, and uses the design of cryptography to ensure the security of all aspects of currency circulation. The design based on cryptography can make the cryptocurrency only be owned by real people. As we all know, virtual currency can be divided into two categories: non cryptocurrency (enterprise currency) and digital cryptocurrency
1. Non cryptocurrency (enterprise currency):
it is issued by companies or private indivials, and can be issued indefinitely. It does not need to solve the equation through the CPU program of computer graphics card. Because it can be issued unlimited according to the market demand, it does not have the value of collection and appreciation< Second, digital cryptocurrency:
it is not issued by legal tender institutions and is not controlled by the central bank. It is based on the open source code of a group of equations calculated by computers all over the world. It is generated by a large number of operations of computer graphics card and CPU, and uses the design of cryptography to ensure the security of all aspects of currency circulation. The design based on cryptography can make the cryptocurrency only be transferred or paid by the real owner< What does digital cryptocurrency look like
real open source code is a series of special solutions generated by a series of complex algorithms. After mining, cryptocurrency is a string of codes, just like the serial number in the lower left corner of RMB. As long as you master the open source code, whoever owns the serial number will have the right to use the cryptocurrency. You can really own this financial digital asset
bitcoin, Ethereum, Leyte, doggy, Ruitai, Ruibo, Dasch and so on are the most well-known coins in the ranking.
7. At present, hackers are focusing on the digital currency exchange. In their eyes, it's all fat and the asset security of stealing customers' information. Many exchanges have more or less security risks. It's recommended to go to the coin exchange to transfer the property safely. The coin exchange has achieved a balance between the security system and the system efficiency. So far, there has been no major security risks
8. If the property is cheated, it is necessary to report to the public security organ in time. The public security organ determines the nature of the case after examination. For those who meet the conditions of filing a case, it is necessary to obtain evidence by means of investigation to solve the case, so as to recover the loss of the victim
legal basis:
166th proceres for the handling of cases by public security organs. The public security organs should give immediate acceptance to citizens for the transfer, reporting, accusation, reporting or criminal suspect's automatic surrender, inquire about the situation, and make notes. After checking correctly, the signers, the complainants, the accusers, the informants, and the automatic surrendered persons will sign their names. Print your finger. When necessary, it shall be recorded or videotaped
Article 174 if, after examination, administrative punishment is not enough for criminal punishment, it shall be dealt with in accordance with the law or transferred to relevant departments
Article 175 after accepting a case, if a public security organ, upon examination, considers that there are facts of a crime that need to be investigated for criminal responsibility and that the case belongs to its own jurisdiction, it shall file the case with the approval of the person in charge of the public security organ at or above the county level; If a person considers that there is no criminal fact, or that the criminal fact is obviously minor and does not need to be investigated for criminal responsibility, or that there are other circumstances in which criminal responsibility is not investigated according to law, the case shall not be filed with the approval of the person in charge of the public security organ at or above the county level
if the public security organ decides not to file a case with a accuser, it shall make a notice of not filing the case and deliver it to the accuser within three days
187th, the public security organs should investigate the criminal cases that have been registered in time, collect and obtain evidence materials of the suspect's guilt or innocence, light offense or heavy crime.
9. Hello! yes.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750