Digital currency lacks derivatives
It's illegal
the central bank indicated that it has not issued legal digital currency, nor authorized any institutions and enterprises to issue legal digital currency, and there is no promotion team. At present, the so-called "digital currency" in the market is not legal digital currency
In addition, the so-called "digital currency" launched by some institutions and enterprises and the so-called promotion of the central bank's issuance of digital currency may involve pyramid selling and fraud
extended information:
virtual currency is the electronization of illegal currency, and its original issuer is not the central bank. This kind of virtual currency is mainly limited to circulation in a specific virtual environment. Digital currency can be used for real goods and services transactions, but only the digital currency issued by the state is legal digital currency
in 2013, the central bank, together with five ministries and commissions, issued the notice on prevention of bitcoin risks, which clearly defined non legal digital currencies such as bitcoin as virtual commodities, which do not exist in the form of currency and legal currency
The contract transaction of digital currency is not safe. There are still many loopholes in the digital currency trading platform, for example, the most common are the following six kinds:
1. Denial of service attack
denial of service attack is the most important attack against the digital currency trading platform at present. Through denial of service attack, the attacker makes the trading platform unable to access normally, Because users can not accurately distinguish the degree of attack, it often causes panic asset transfer, which brings some loss
2. Phishing incident
even the best technical measures at present can not make the digital currency trading platform avoid phishing attacks. Some hackers and criminals can confuse digital currency investors by means of fake domain names or fake pages, while ordinary investors can't identify the authenticity, so it's easy to cause asset losses
Many digital currency trading platforms use a single private key to protect the hot wallet. If hackers can access a single private key, they can crack the hot wallet related to the private key. For example, in the attack on yapizon of Seoul stock exchange in 2017, the attackers stole hot wallets from the trading platform twice in a year, resulting in a total loss of nearly 50% of the assets of the trading platform and eventually leading to the bankruptcy of the trading platform Fourth, e to the lack of perfect risk isolation measures, or ineffective supervision on the rights of employees, some employees who have the operation rights of the platform use internal trust to seek unjust wealth for themselves. For example, in 2016, the event of employees stealing bitcoin on shapeshift caused a total loss of US $230000 to the trading platform by stealing and reselling sensitive information to others Fifth, the software vulnerability of digital currency trading platform includes single sign on vulnerability, OAuth protocol vulnerability and so on. At present, all countries have laws requiring banks or other financial institutions to implement information security measures to protect customers' deposits. However, e to the fact that the blockchain field is still in its infancy, there is a lack of such specifications for encrypting digital assets. Therefore, it is not accidental that many trading platforms have a large number of loopholes in the absence of security constraints 6. Transaction malleability the technical supporters of blockchain often think that blockchain transactions are highly secure because they are recorded on records that are said to be unchangeable, but each transaction needs to have a corresponding signature, and the records can be forged temporarily before the final confirmation of the transaction
extended data:
rules of contract transaction
1. Transaction time
contract transaction is 7 * 24 hours transaction, which will be interrupted only ring the settlement or delivery period of 16:00 (UTC + 8) every Friday. In the last 10 minutes before delivery, the contract can only be closed, not opened
Transaction types are divided into two types, opening and closing. Opening and closing positions are divided into two directions: buying and selling:buying open long (bullish) refers to buying a certain number of contracts when users are bullish and bullish on the index. Carry out "buy open more" operation, match success will increase long position
selling pingo (multi order closing) refers to the selling contract that the user makes up for when he is no longer bullish on the future index, offsets with the current buying contract and exits the market. Carry on "sell flat much" operation, match after success, will rece long position
short selling (bearish) refers to the new sale of a certain number of certain contracts when the user is short or bearish on the index. Carry out the operation of "sell short" and increase the short position after successful matching
buy close (short single close) refers to the buy contract that the user will not be bearish on the future index market and make up for, offset with the current sell contract and exit the market. Carry out "buy short" operation, after matching successfully, short position will be reced
3. Order method
limit order: the user needs to specify the price and quantity of the order. Limit order can be used for opening and closing positions
order at opposite price: if you choose to order at opposite price, you can only enter the order quantity, not the order price. The system will read the latest competitor price at the moment of receiving the entrustment (if the user buys, the competitor price is the selling price of 1); If it is a sell, then the counter price is buy 1 price). Issue a price limit order for this counter price
4. Position
the user owns the position after opening and trading, and the positions in the same direction of the same contract will be merged. In a contract account, there can only be 6 positions at most, that is, multiple positions of current week contract, short positions of current week contract, multiple positions of next week contract, short positions of next week contract, multiple positions of quarterly contract and short positions of quarterly contract
5. Order restriction
the platform will restrict the number of single user's positions in a certain period of contract and the number of single open / close positions, so as to prevent users from manipulating the market
when the number of positions or entrustments of users is too large, the platform has the right to require users to take risk control measures, including but not limited to cancellation of orders, closing positions, etc. The platform has the right to adopt measures including but not limited to limiting the total number of positions, limiting the total number of consignments, limiting the opening of positions, withdrawing orders, forcibly closing positions, etc. for risk control
even if it's live broadcasting, it's no problem. Live broadcasting is mainly about processor and memory. You can satisfy it, but you need to ensure the network speed
For atoms: the number of electrons and protons is the number of elements. For example, h is element 1, which contains one electron and one proton
The neutron number should know the mass number. If you haven't learned this yet, the mass number can be simply regarded as the relative atomic mass, the number of neutrons = the relative atomic mass minus the number of protons. For example, if O is element 8, it has eight electrons and eight protons. Relative to the atomic mass of 16, the number of neutrons = 16-8 = 8for ions, protons and neutrons are exactly the same as above, and electrons change, gain more and lose less. The method is similar
the number of electrons outside the nucleus = atomic number = proton number inside the nucleus = nuclear charge number (the number of electrons outside the nucleus of an ion = atomic number (sum) - charge number)
the maximum number of electrons held by each electron layer is 2n ^ 2 (n is the electron layer number). The number of electrons in the outermost layer is not more than 8 (when the k layer is the outermost layer, it is not more than 2). There are no more than 18 electrons in the second outer layer and 32 electrons in the last three layer
the extranuclear electrons are always arranged in the electron layer with the lowest energy first, and then from the inside to the outside, they are arranged in the L layer and then in the m layer. The above four laws are interrelated and cannot be understood in isolation
extended data:
neutrons exist in neutron stars as clusters (neutron stars are one of the few possible endpoints after supernova explosions e to gravitational collapse at the end of star evolution.) In the middle. The neutrons in the solar system mainly exist in all kinds of nuclei, and the neutrons in the elements are very rare β Decay is a change in which the neutron in the element releases an electron to become an element of the previous element sequence
Neutrons can be classified according to their velocities. High energy (high-speed) neutrons have the ability to ionize and penetrate deep into matter. Neutrons are the only ionizing radiation that can make other substances radioactive. This process is called "neutron excitation"“ "Neutron excitation" is widely used in the proction of radioactive materials in medical, academic and instrial fields High energy neutrons can travel very long distances in air. Neutron radiation needs to be masked by hydrogen rich materials, such as concrete and water. Nuclear reactor is a common neutron source, and water is used as an effective neutron shieldarrangement rule:
1. The electrons are arranged in different layers from the nucleus to the nucleus, and the energy is from low to high
The maximum number of electrons in each layer is 2n2 (n is the number of electron layers) There are no more than 8 electrons in the outermost layer (no more than 2 in the first layer), no more than 18 electrons in the second outer layer and no more than 32 electrons in the last three layers In general, the electrons are always in the lowest energy layer, that is, the first layer, when the first layer is full, then the second layer, when the second layer is full, then the third layer