What else can digital currency do
It's illegal
First, digital currency ICO is illegal in China.
in September 2017, the people's Bank of China issued an announcement on preventing the financing risk of token issuance, which formally determined that ICO is illegal financing without approval, and no organization or indivial is allowed to participate
later, it was announced on April 23, 2018 that the left and right digital currency ICO platforms had all withdrawn from the Chinese market, so the current ICO is illegal in China
Second, digital currency exchange is prohibited in China.
after announcing that ICO is an illegal financing activity, the central bank also listed services such as trading, exchange, pricing and information intermediary for virtual currency as prohibited items, which means that digital currency exchange is illegal in China
all trading platforms, including bitcoin China, okcion and fire coin, announced in 2018 that they would stop the RMB recharge business and graally shut down their trading platforms. As of April 2018, all digital currency exchanges had completely withdrawn from the Chinese market
digital currency generally has a special digital currency exchange. We can buy the digital currency we need in our digital currency exchange
we can buy from our friends in addition to the exchange. If a friend has something, you can discuss and ask if he can sell it to you
we can buy our digital currency from traders nearby if we need more
we accept payment by digital currency payment service. If we open a physical store, we can support payment by digital currency, so we can also get our digital currency
finally, we can get digital currency by mining, and we can get digital currency by equipping mining machine to work mining, such as investing more hardware
digital currency trading: it can be traded only after RMB or digital currency is recharged in a third-party digital currency exchange
purchase of digital currency: no matter how many coins you buy, there is no limit. For example, if bitcoin is 100000 yuan, you can buy 0.0001, and there is no limit on how many coins you can buy or sell
digital currency trading time: 365 days a year, 24 hours a day, can be traded
very large
in the field of blockchain and virtual currency, such cases of losses caused by the security of exchanges occur frequently, causing great economic losses to users. The security experts of Juhui ggfx also gave a hint: there are still many loopholes in the current digital currency trading platform, for example, the most common are the following six kinds:
the first kind: denial of service attack
denial of service attack is the most important attack against the digital currency trading platform at present. Through denial of service attack, the attacker makes the trading platform unable to access normally, Because users can not accurately distinguish the degree of attack, it often causes panic asset transfer, which brings some loss
the second kind: phishing
even the best technical measures at present can not make the digital currency trading platform avoid phishing attacks. Some hackers and outlaws can confuse digital currency investors by means of fake domain names or fake pages, while ordinary investors can't identify the authenticity, so it's easy to cause asset losses
the third: Hot wallet protection
many digital currency trading platforms use a single private key to protect the hot wallet. If hackers can access a single private key, they can crack the hot wallet related to the private key. For example, in the attack on yapizon of Seoul stock exchange in 2017, the attackers stole hot wallets from the trading platform twice in a year, resulting in a total loss of nearly 50% of the assets of the trading platform and eventually leading to the bankruptcy of the trading platform
Fourth: internal attack
e to the lack of perfect risk isolation measures or ineffective supervision on the authority of employees, the digital currency trading platform also has employees' self-monitoring and stealing, and some employees with operating authority of the platform use internal trust to seek ill gotten gains for themselves. For example, in 2016, the event of employees stealing bitcoin on shapeshift caused a total loss of US $230000 to the trading platform by stealing and reselling sensitive information to others
the fifth: software vulnerability
the software vulnerability of digital currency trading platform includes single sign on vulnerability, OAuth protocol vulnerability, etc. At present, all countries have laws requiring banks or other financial institutions to implement information security measures to protect customers' deposits. However, e to the fact that the blockchain field is still in its infancy, there is a lack of such specifications for encrypting digital assets. Therefore, it is not accidental that many trading platforms have a large number of loopholes in the absence of security constraints
sixth: transaction malleability
Technical supporters of blockchain often think that blockchain transactions are highly secure because they are recorded on records that are said to be unchangeable, but each transaction needs to have a corresponding signature, and the records can be temporarily forged before the final confirmation of the transaction. Mt. GOx, which once accounted for 80% of the world's total transactions, was hacked to submit code changes to the public ledger before the initial transaction was released, resulting in a loss of 473 million US dollars< br /> 160;
coinbase transaction is a special transaction that generates bitcoin "out of thin air". Only miners can write this kind of transaction, and the number of generated bitcoin is limited by rules (new currency reced by half for every 210000 blocks + transaction fee for this block)
however, the rules do not stipulate that the miner must take away all the rewards that can be taken, and can choose not to take them
therefore, a mine pool connected with the RSK side chain has made a bug before, forgetting to take away the reward and occupying a pit in a block for nothing, which is equivalent to destroying the corresponding amount of bitcoin, making the total amount of bitcoin decrease a little bit permanently
in addition, to spend a bitcoin, you only need to specify the transaction ID and output serial number
as like as two peas in multiple blocks repeatedly write identical coinbase transactions, the transaction ID is also repeated.
therefore, this kind of situation also occupies the pit of a block in vain, and permanently destroys the corresponding amount of bitcoin
it seems to me that this is still a security vulnerability, so the new version of bitcoin software later banned the writing of repeated coinbase transactions. But until now, there has been no ban on miners not getting their e rewards
generally speaking, a coin is controlled by a private key. If a coin is transferred to an address where no one knows the private key, it will be destroyed
if the owner does a good job in security, and the private key is not disclosed and cannot be guessed, but he accidentally loses the private key, it is equivalent to destroying all the coins he owns
there are only some special circumstances that require intentional destruction of coins
one is irreversibly converted into another kind of currency, such as the contract currency XCP attached to bitcoin and wormhole cash WHC attached to BCH
the second is to save certificates and data on the chain, such as the time stamp: panbiao.com/2013/08 /
and the crowd funding of the original Ethereum founding team: zhuanlan.hu.com/p/29
the private key is essentially a big number. Whoever knows this number can control the currency on the corresponding address. So the private key must be generated with reliable random number, otherwise it may be guessed and stolen
compared with the token, the address is the hash of the public key. There is no way to judge whether an address has a corresponding public key and private key (even if the public key is known, the corresponding private key cannot be known). Therefore, even if it is explicitly the address of "burned" token, the system does not prohibit the transfer in
strictly speaking, what locks the currency is a small program (script). This program takes the input as the public key and digital signature. First, check whether the public key hash is consistent, and then check whether the digital signature is valid. If it is valid, it will be verified and transfer is allowed; Otherwise, it will be judged that the transaction is illegal and refuse to package into the chain
it is the whole node software that explains and executes this program. It can be said that the software code of the whole node specifically defines a coin
however, the current situation is very embarrassing. Most miners do not run the whole node, only a few mines are running. The vast majority of users do not run the whole node, even if they run the whole node, they can only perform verification, no computing power, no block.
the subject of the project (private, ordinary company, or foundation)
White Paper Writing (what level and direction will naturally position yourself)
legal opinions (white paper compliance, non securitization certification, private placement, public offering related compliance provisions, etc.)
what packaging? How to publicize? What platforms are there? Channel? Media
what exchange (also divided into 369 and so on)
these are all symbols of the strength of the project!
unless you charge 4.50 cents for electricity once there, or you will die ~ ~ besides, now the mine disaster has come slowly!! You 100 750 a month down can dig a hard to say, mining graphics card requirements are very high!!! At present, 1080ti is out of stock in many places ~ ~
personally, I think you should think about the transformation of Internet cafes rather than changing professions