Position: Home page » Ethereum » Ethereum blacklist

Ethereum blacklist

Publish: 2021-05-02 14:39:39
1. A number of victims of virtual currency fraud cases distributed all over the country said that they were refused to file a case when reporting to the local police because virtual currency could not be valued and could not reach the starting loss amount of theft or fraud. This situation may be affected by the announcement on preventing the financing risk of token issuance issued by seven ministries and commissions on September 4, 2017 (hereinafter referred to as the announcement). Generally speaking, fraud and other crimes of infringing property rights have the starting point of "large amount" According to the interpretation of the Supreme People's Court on Several Issues concerning the specific application of law in the trial of fraud cases, indivials who defraud public or private property of more than 2000 yuan belong to "large amount". However, the announcement clearly pointed out that "any so-called token financing trading platform shall not provide pricing, information intermediary and other services for token or virtual currency." Therefore, it is difficult for the public security organs to recognize the price of virtual currency displayed on the trading platform, and to estimate the value of virtual currency when the victims encounter virtual currency fraud, so as to determine whether the case meets the filing standard.
2.

There is an essential difference between Ethereum and bitcoin. What is the difference? Bitcoin defines a set of currency system, while Ethereum focuses on building a main chain (which can be understood as a road) to allow a large number of blockchain applications to run on this road

from this point of view, Ethereum's application scenarios are more extensive, which is why we say that Ethereum marks a simple monetary system in the era of blockchain

1.0, and a transformation to other instries and application scenarios in the era of blockchain 2.0

however, there is no perfect thing in the world. Although Ethereum has expanded the application scope of blockchain in all walks of life and improved the speed of transaction processing, it also has some disputes and doubts

first, the solution to the lack of scalability of Ethereum: slicing technology and lightning network

the bottom design of Ethereum, the biggest problem is that Ethereum has only one chain and no side chain, which means that all programs have to run on this chain equally, consuming resources and causing system congestion. Just like last year's very popular Ethereum game "encryption cat", when this game was very popular, it once caused Ethereum network paralysis

to improve the processing capacity, Ethereum proposes two ways: shard and lightning network. Let's introce these two technologies respectively

(1) fragmentation technology

vitalik buterin, founder of Ethereum, believes that the reason why mainstream blockchain networks such as bitcoin process transactions very slowly is that every miner has to process every transaction in the whole network, which is actually very inefficient. The idea of fragmentation technology is: a transaction does not need to be processed by all nodes in the whole network, as long as some nodes (miners) in the network are allowed to process it. Therefore, Ethereum network is divided into many pieces. At the same time, each piece can handle different transactions. In this way, the network performance will be greatly improved

however, the slicing technology is also controversial. As we all know, the important idea of blockchain technology is decentralization. Only when the whole network witnesses (processes) the same transaction can it have the highest authority. The Ethereum slicing technology is similar to the group witness, not all nodes witness together. In this way, it will lose the absolute "decentralization" attribute, and can only achieve the purpose of high performance by sacrificing certain characteristics of decentralization

(2) lightning network

lightning network uses the way of transaction under the chain. What does that mean? It means: when the participants of lightning network transfer money to each other, they do not need to confirm the transaction through the main chain of Ethereum, but create a payment channel between the participants and complete it under the chain

however, lightning network is not separated from the main chain. Before establishing a payment channel, you need to use the assets on the main chain as collateral to generate a balance proof, which indicates that you can transfer the corresponding balance. In the case that both parties of the transaction hold the balance certificate, both parties can make unlimited number of transfers under the chain through the payment channel

only when the off chain transaction is completed and the assets need to be transferred back to the chain, the balance change information of the main chain account will be registered on the Ethereum main chain, and no matter how many transactions occur ring this period, there will be no record on the main chain

another real benefit of lightning network is that it can save the cost of miners for you. At present, when we trade on the main chain of Ethereum, we need to consume gas and pay for miners. Once we move the transaction to the lower chain, we can save this part of the cost

Of course, lightning network is not perfect. When using the lightning network, the assets on the main chain should be used as collateral; And this part of assets as collateral can not be used before the user completes the transaction under the chain. This also determines that lightning trading is only suitable for small transactions

the above is the problem of insufficient scalability of Ethereum, as well as the two main solutions: fragmentation technology and lightning network

Second, there are loopholes in Ethereum's smart contract and the infamous Dao event

Ethereum's smart contract is very powerful, but there are loopholes in any code. The biggest controversy of Ethereum's smart contract lies in the so-called loopholes, that is, security issues. According to relevant research, 34200 (about 3%) of the nearly 1 million smart contracts based on Ethereum contain security vulnerabilities, which will allow hackers to steal eth, freeze assets or delete contracts, such as the infamous Dao incident

(1) what does Dao mean

before introcing the Dao event, let's first introce what Dao is. Dao is the abbreviation of decentralized

autonomous organization, which can be understood as decentralized autonomous organization. From the perspective of Ethereum, Dao is a kind of contract or a combination of contracts on the blockchain, which is used to replace the government's review and complex intermediate proceres, so as to achieve an efficient and decentralized trust system. Therefore, Dao is not a specific organization, that is to say, there can be many Dao, all kinds of Dao

(2) the infamous Dao event

however, when we talk about Dao now, we basically refer to the Dao event, that is, the infamous hacker attack event we just mentioned. As we know, the English word "the" refers to "the Dao event". The Dao event

refers to "the Dao event", because we just said that Dao is not a specific organization, there can be many Dao, all kinds of Dao

in 2016, slock.it, a German company focusing on "smart locks", launched the Dao project on Ethereum in order to realize decentralized physical exchange (such as apartments and ships). Since April 30, 2016, the financing window has been open for 28 days

unexpectedly, this Dao project is very popular. It raised more than US $100 million in just half a month. By the end of the whole financing period, it raised a total of US $150 million. Therefore, it has become the largest crowdfunding project in history. However, it didn't last long. In June, hackers took advantage of the loopholes in the smart contract to successfully transfer more than 3.6 million Ethernet coins and put them into a Dao sub organization, which has the same structure as the Dao. At that time, the price of Ethernet currency fell directly from more than $20 to less than $13

this event shows that there are loopholes in smart contracts, and once the loopholes are exploited by hackers, the consequences will be very serious. This is why many people criticize Ethereum and say that its smart contract is not smart

to solve this problem, many foreign companies begin to provide code audit services in order to solve the vulnerability problem of smart contract. From a technical point of view, some teams are currently testing smart contracts. Most of these teams are led by professors from Harvard, Stanford and Yale, and some of them have obtained investment from leading institutions

in addition to the problems of insufficient expansibility and loopholes in smart contracts, the controversy over Ethereum lies in the POS consensus mechanism it pursues, that is, the proof of equity mechanism. Under the proof of equity mechanism, if anyone holds more money and holds it for a longer time, he will get more "rights" (interests) and have the opportunity to get bookkeeping power, Bookkeeping can also be rewarded. In this way, it is easy to create the oligarchic advantage of "the stronger the stronger"

Another problem is the chaos of ICO. ICO is a common way to raise funds for blockchain projects, which we can understand as pre-sale. The outbreak of ICO projects on Ethereum has caused illegal activities such as fund allocation and money fraud under the banner of ICO, which has caused security risks to social and financial stability

3. Ethereum blockchain has exposed three major problems, and its founder vitalik buterin has been unable to interpret them for a long time. The first is the low performance and TPS of Ethereum blockchain as a whole; The second is that resources are not isolated. The event of cryptokitties virtual cat once occupied 20% of the traffic of the whole Ethereum, which directly caused Ethereum network users unable to carry out timely transactions, which is the biggest pain point of resources not isolated; The third problem lies in the embodiment of Ethereum's governance structure. As a decentralized distributed ledger, the founder team of Ethereum has dominated its network development in the past. The over centralized governance mode has led to the bifurcation of eth, etc and ETF in Ethereum, and the Ethereum community is now in a state of fragmented governance. In the view of Ma Haobo, founder and CEO of "aelf", all kinds of disadvantages of Ethereum are unacceptable. Therefore, the positioning of "aelf" is born for the next generation of decentralized underlying computing platform of Ethereum, which focuses on solving the problems of insufficient performance, non isolation of resources and governance structure of Ethereum.
4. Network is not good, you log in again to see, if still not, you can try to restart the phone.
5. Report to the police immediately. There is no doubt that if the police find the fraudster, they will recover the money and confiscate the property of the fraudster, and you will have a way to get your money back.
6. About the current account of nmsa digital currency is locked, you can consult the relevant staff
7.

It's a scam

in recent years, the investment of virtual currency is rising quietly, and the criminals follow the upsurge and use the investment of virtual currency to cheat. Recently, the police received a number of reports through & quot; Pro & quot; App trading virtual currency fraud alarm

in such fraud, criminals lure victims to download & quot; Pro & quot; App, claiming that the purchase of virtual currency can obtain high profits, in order to lure the victim to invest and recharge, defraud money

1. On August 11, 2020, Jiang Yifeng called the police and said: a netizen recommended the "fire coin Pro" app to him to buy virtual currency, saying that he could make money. He believed that he could download the app to complete the registration, and recharged 3000 yuan on the platform. After making money, he recharged 50000 yuan, but he found that he could not withdraw money and realized that he was cheated

2. On August 6, 2020, Wang called the police and said: a netizen said that he could take him as a sideline to make money and let him download the "fire coin Pro" app to recharge and purchase virtual currency. He operated according to the other party's prompts and recharged a total of 130000 yuan. After that, he was unable to withdraw cash and found cheated

3. On August 5, 2020, Zhu reported to the police that he had purchased 248600 yuan of "Ethereum" virtual currency for investment in the "fire coin Pro" app under the introction of the staff of a company. Now he found that all the "Ethereum" virtual currencies stored on the website had been cleared and he realized that he had been cheated

extended data

in 2019, there will be a large number of users online to denounce the hot money contract. Generally speaking, doubts are mainly focused on the following three points:

first, technical problems such as downtime happen coincidentally with market fluctuations, resulting in economic losses for users

Second, by setting an unreasonable margin rate to blow up the position in advance, we can achieve the goal of zero allocation every week

thirdly, the attitude of fire coin staff towards user complaints is that they do not reply, move out of the group, delete comments and blacklist

8. Etheric density gems can control the kind of things you absorb.
9. If there is no upload or download bad resources, call the network center of our school and ask for unsealing
inode smart client is a Windows based multi service access client software designed and developed by H3C. It provides 802.1x, portal, VPN and other authentication methods. It can network with H3C Ethernet switches, routers, VPN gateways and other network devices to achieve user authentication for broadband access, VPN access and wireless access. It is used to verify the identity of user terminals, and to provide a platform for user authentication According to the requirements of enterprise access security policy, the main body of security status evaluation and security policy implementation can realize role / identity based permissions and security control.
10. Now try this
the following article from yingzhengtianxia forum
anti P2P terminator (farewell to traffic control) simplified special edition
e to the recent popularity of the cracked version of P2P terminator on the Internet, it has been abused by many people, resulting in many people's slow network speed, unable to access the Internet normally and suffering from traffic control. After downloading and decompressing, there will be two applications WinPcap_ 3_ 0 and ap2pover; Execute WinPcap first_ 3_ 0, and then run ap2pover, select the type of network card you are using, and then click kill P2P terminator. Ha ha, that's the end. You have said goodbye to the control of P2P terminator on your traffic, I hope this software can help all friends who love learning but suffer from traffic control ~ ~

Download:

the following article is from Feifan forum
in the face of LAN users abusing network law enforcement officers, P2P terminators and other network management software cracking methods
summarize network law enforcement officers, P2P terminator and other network management software use ARP deception prevention method

first of all, after BT and Xunlei are upgraded, this software will seal them. That is to say, BT download speed is likely to become 0. The solution is to set it.
change BT to permanent trust this program. Also, do not record the record of this program. Xunlei should also set it.

first of all, the following steps are taken This paper introces a super good firewall for you: outpost firewall, which can protect P2P terminators and other malicious software. The effect is super good. It can also find out which machine is in use in the local area network. This firewall has powerful functions, takes up less resources, and has a personal score of 5 stars. You can look it up on the Internet.

it's very depressing these days, Students in the same LAN often use P2P terminators to limit the traffic of users in the network, which makes everyone very angry. However, it's not easy to say that it's a classmate. Later, with the help of the search function of Feifan forum, we successfully solved this problem
in advance, I'm a rookie, but I also want to suggest Feiyou to the same extent as me, More use of Feifan's search function, it's really much faster than you post in the "help area" (in some aspects), and you can learn things by yourself
now I summarize my search information as follows, so that Feiyou who encounter the same problem can find a complete information in the future. At the same time, I would like to thank "zzswans" for his help

in fact, this kind of network management software uses ARP Spoofing to achieve the purpose
its principle is that the computer can not find the MAC address of the gateway
so what is ARP Spoofing
first of all, let's talk about what ARP is. ARP (address resolution protocol) is an address resolution protocol, which converts IP addresses into physical addresses. There are two ways to map from IP address to physical address: tabular and non tabular
arp is to resolve the address of the network layer (IP layer, which is equivalent to the third layer of OSI) to the MAC address of the data connection layer (MAC layer, which is equivalent to the second layer of OSI)
arp principle: if a machine a wants to send a message to host B, it will query the local ARP cache table and find the MAC address corresponding to B's IP address before data transmission. If not, broadcast a ARP request message (carrying IP address ia of host a -- physical address PA), and request host B with IP address IB to answer physical address Pb. All hosts including B receive ARP requests, but only host B recognizes its own IP address, so it sends back an ARP response message to host a. It contains the MAC address of B. after a receives the response from B, it will update the local ARP cache. Then, the MAC address is used to send data (the MAC address is attached by the network card). Therefore, the ARP table of local cache is the basis of local network circulation, and the cache is dynamic

arp protocol does not receive ARP response only after sending ARP request. When the computer receives the ARP response packet, it will update the local ARP cache and store the IP and MAC addresses in the ARP cache. Therefore, when a machine B in the LAN sends a forged ARP response to a, and if the response is forged by B impersonating C, that is, the IP address of C is forged, and the MAC address is forged, then when a receives the forged ARP response from B, it will update the local ARP cache, so that in a's opinion, the IP address of C has not changed, and its MAC address is not the original one. Because the LAN network circulation is not based on the IP address, but according to the MAC address for transmission. Therefore, the forged MAC address is changed to a nonexistent MAC address on a, which will cause the network to be blocked and a can't Ping C! This is a simple ARP spoofing<

solutions
to sum up, there are the following methods:

1. Use VLAN
as long as your PC and P2P terminator software are not in the same VLAN, they can't help you.

2. Use bidirectional IP / Mac binding
bind the MAC address of your exit router on PC. P2P terminator software can't cheat you by ARP, and naturally it can't control you, However, it's just that the MAC address of the route bound by PC
is not safe, because the P2P terminator software can cheat the route, so the best solution is to use PC. in other words, bind the MAC address of the route on PC
and bind the IP and MAC address of PC on the route. In this way, the route should support IP / Mac binding, For example, Hiper router.

3. Use IP / MAC address embezzlement + IP / Mac binding

simply change your own MAC address and IP address to the same IP and MAC as those running P2P terminator software, and see how they manage it. This is a way to lose both sides.
there should be some tips in the change, otherwise IP conflict will be reported, In this way, windows will not report IP conflicts (Windows stupid bar)). This step is not finished yet. You'd better bind the MAC address of the route on your PC, so it's useless for P2P terminators to cheat the route.

I don't think the above methods are suitable for my environment, so I adopted the following solution:
use look n stop firewall, Prevent ARP deception
1. Prevent network law enforcement officers from controlling
network law enforcement officers use ARP deception to achieve the purpose of control
arp protocol is used to analyze the corresponding relationship between IP and MAC, so the following methods can be used to resist the control of network law enforcement officers
if your machine is not ready to communicate with the machines in the LAN, you can use the following methods:
A. there is a "ARP: authorize all ARP packets" rule in the "Internet filtering", which is marked with a prohibition sign in front of the rule
B. by default, the gateway information is also prohibited by this rule. The way to deal with it is to put the MAC address of the gateway (usually the gateway is fixed) in the "target" area of this rule, select "not equal" in "Ethernet: Address" and fill in the MAC address of the gateway at that time; Put your Mac address in the "source" area and select "not equal" in "Ethernet: Address"
C. in the last "all other packet", modify the "target" area of this rule, select "not equal" in "Ethernet: Address", and fill FF: FF: FF: FF: FF: FF "in MAC address; Put your Mac address in the "source" area and select "not equal" in "Ethernet: Address". No other changes
in this way, network law enforcement officers can do nothing. This method is suitable for the case that it does not communicate with other machines in LAN and the gateway address is fixed
if your machine needs to communicate with the machine in the LAN, you only need to get rid of the control of the network law enforcement officer, then the following method is more simple and practical (this method has nothing to do with the firewall):
enter the command line state, run "ARP - s gateway IP gateway Mac". To get the MAC of the gateway, just Ping the gateway, and then use the ARP - a command to view it, Then we can get the corresponding IP and MAC of the gateway. This method should be more general and easy to operate when the gateway address is changeable. Just repeat "arp-s gateway IP gateway Mac". The function of this command is to create a static ARP parsing table<

in addition, I heard that the op firewall can also block it. I haven't tried it, so please have a try.

episode:
ring this period, I also used the network agent to find out who is using the P2P terminator. Through the detection,
I found that the host machine sent data to me through UDP port 137,
so I thought as a rookie, Use firewall to block this port
and then send all the people in the LAN to the blacklist,
prevent them from communicating with me
it seems that the purpose of preventing them from being controlled can also be achieved
here, according to zzswans Feiyou, ARP is not based on port, port is only in tcpip protocol, and there is no port concept in ARP protocol., So maybe this method won't work
but I think I've thought about it and gained experience, which is the most important
in addition, Feifan's friends are very good. If you ask them questions, they are very enthusiastic to help you and like the atmosphere of Feifan very much

because there is no way to recover too much text in SMS, re post it
articles from other forums

network law enforcement officer is a kind of network management software, which can be used to manage LAN and prohibit any machine in LAN from connecting to the network. For the network management, this function is naturally very good, but if someone else in the LAN also uses this function, it will be troublesome. Because this will lead to other people can not access the Internet, heavy will lead to the entire LAN paralysis. What's the solution? Please see the following moves and their principles

I. Introction to network law enforcement officer
we can run netrobocop.exe, the main program of network law enforcement officer, on any machine in the LAN. It can penetrate the firewall, monitor and record the online situation of the whole LAN users in real time, limit the IP and time period used by users when they are online, and kick illegal users off the LAN. The software is applicable to the LAN, and can not monitor or manage the machines outside the gateway or router. It is suitable for LAN administrators

in the network law enforcement officers, if you want to restrict a machine from accessing the Internet, just click & quot; Network card & quot; & quot; Permissions & quot;, Select the specified network card number or click the line of the network card in the user list and select & quot; Permissions & quot;, In the pop-up dialog box, you can limit the user's permissions. For unregistered network cards, you can limit them to go online in this way: as long as you set up all known users (Registration), you can prevent all unknown network cards from going online by changing the default permissions of network cards to forbid them to go online. Use these two functions to limit users' access to the Internet. Its principle is to send the attacked computer a Mac corresponding to a fake gateway IP address through ARP spoofing, so that it can not find the real MAC address of the gateway, so that it can be banned from surfing the Internet< The principle of ARP spoofing is that ARP Spoofing used by network law enforcement officers makes the attacked computer unable to access the Internet. The principle is that the computer cannot find the MAC address of the gateway. So what's ARP Cheating all about
first
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750