Position: Home page » Ethereum » Has Ethereum been attacked by hackers

Has Ethereum been attacked by hackers

Publish: 2021-04-26 19:11:05
1.

at present, the vast majority of digital currency transactions are concted in exchanges. Among the numerous exchanges, bitfinex, binance, okex and so on are well-known

However, bitcoin and other digital currencies, as decentralized assets, have to be traded in a centralized exchange, which seems to have hidden contradictions and dangers

1. Problems and challenges of stock exchanges=“ //www.yuanxue365.com/en/img_fd039245d688d43fdf16c83b761ed21b0ff43bbf ">

in February 2014, Mt. GOx, the world's largest bitcoin exchange at that time, was stolen 850000 bitcoins, and the price of bitcoin suffered a" cliff "crash on that day. Later, it was revealed that Mt. GOx was in fact a thief, and only 7000 bitcoins were actually stolen

in August 2016, bitfinex, the largest U.S. dollar bitcoin trading platform, suffered a security vulnerability, resulting in the theft of 120000 bitcoins, which was worth $65 million at that time. If converted into the price in December 2017, it would be worth nearly $2 billion

on December 19, 2017, South Korea's youbit exchange was attacked by hackers and lost 4000 bitcoins, and the exchange declared bankruptcy

on December 21, 2017, the Ukrainian liqui exchange was stolen 60000 bitcoins, and the unit price of bitcoin plummeted by US $2000

in 2018, such a drama will only continue

in addition to the threat of hackers, traditional exchanges also have some inherent shortcomings, such as lack of supervision and inefficiency. The security of the exchange for investors can only rely on its own credit, and the cost of running is very low. The stock exchange is regulated at the national level, but there is no such sword of Damocles on the top of the digital currency exchange. Moreover, in an exchange, the same order can only be submitted to one exchange. After the user places an order, the funds used for the transaction will be frozen and can only wait for the completion or cancellation of the transaction. These are undoubtedly inefficient

All in all, the problems of exchanges are the problems of centralization

2. Decentralization of exchanges=“ //www.yuanxue365.com/en/img_86d6277f9e2f070889a173c9e224b899a801f257 ">

(1) the progress of the exchange itself

the upgrade of security means is various. At present, the best use is cold wallet, that is, to keep the digital currency in the offline U disk. At the end of 2017, when the YouTube exchange was attacked, 75% of its assets were withdrawn into the cold purse in time to avoid greater losses. However, it seems to be a helpless way to protect the online assets by offline means. Of course, there should be many other methods, which will not be repeated here

(2) the representative of cross ledger transaction is ripple network, and the operating company is ripple labs, which is a semi centralized system. Ripple is a decentralized clearing agreement. In order to solve the high cost and delay of inter-bank clearing, its base currency is XRP. Ripple network can connect all kinds of assets, such as US dollar, RMB, Japanese yen, bitcoin, etc. to its own network. In this system, U.S. dollars or bitcoin can be converted into reborn currency, and then reborn currency can circulate freely in the network, just as a highway is built between various assets. Due to the support of major banking institutions, the reborn currency achieved nearly 300 times growth in 2017

(3) decentralized exchange

some teams try to use blockchain technology to build a decentralized exchange. This kind of decentralized exchange, to some extent, is an extension of cross ledger trading

bitshares is the most representative of early rising projects. It builds a blockchain development platform with servers scattered all over the world. Even if some of them are attacked, the system will not collapse. Anyone can transfer money and borrow money freely on this platform, and can also quickly build a centralized exchange based on this platform. In order to ensure stable value, bitstocks also require three times of digital assets as collateral. At present, bitstocks are running fairly well

later, with the development of Ethereum and smart contract, the x x protocol came into being. This is an open protocol running in the Ethereum blockchain and a decentralized exchange in the Ethereum ecosystem. The agreement has attracted many investors. At present, it has completed financing and started to build open source software tools and infrastructure. Of course, there are many competitors. Ether Delta, IDEX and oasis DEX are trying to provide similar functions. Moreover, it is a smart contract system based on Ethereum, which only supports erc20 token. If other smart contract public chains start to rise, the demand will be reced

in addition, there are some teams that are entering, such as the domestic road seal agreement, looping (LRC) in English. They adopted a design similar to the X protocol, and also introced a fast payment function similar to the lightning network. It is characterized by trying to match multiple exchanges, the user's order can be broadcast to multiple exchanges, and completed by different exchanges. Moreover, the user can still use the account funds after placing an order, and the user's behavior of transferring part or all of the funds is equivalent to partial or total cancellation. To some extent, it improves the breadth and timeliness of the transaction. However, this system seems to have damaged the "power" of the existing exchanges. Whether we can persuade everyone to play together will be a difficult problem

At present, there is still a long way to go for the construction of decentralized exchange. In 3-5 years, traditional exchange will still be the main battlefield of digital currency

However, in the future, it is worth looking forward to let the decentralized digital currency get rid of the shackles of centralization

2. 100m bandwidth has little to do with the connected computer
because the connected computers are controlled by the policy settings of the router
the most important thing is to allocate your bandwidth reasonably. In theory, if you download resources from a computer in your network segment, if your router does not allocate bandwidth, it may cause the computers in the whole network segment to get stuck on the Internet
if the distribution is reasonable and the router is powerful, then 200 computers can be easily handled.
3. 178 payment said that it was attacked by hackers, and everyone felt that it was money running away. Now, most of the correct answers to the following questions about 178 payment are strongly recommended. 183 payment's domain names are extremely similar. I feel that they have changed their names and continue to cheat people. What else do I say about more than 1000 yuan above? He has never seen online financial statements in a week, and never answered them Stuffy
4.

According to a foreign media report on December 13, Beijing time, the world's largest bitcoin trading market, headquartered in Hong Kong,

"these bitcoin trading markets cross national boundaries, and there may be major transactions on systems and platforms outside the United States." "Without your knowledge, your investment funds may soon flow overseas," sec chairman Clayton said on Monday. As a result, this risk may be magnified, including that market regulators, such as the SEC, may not be able to effectively track down these bad actors or recover funds. "

this warning has at least been reflected to a certain extent in the bitcoin futures market. On Tuesday, the trading volume of bitcoin futures contract on CBOE futures exchange fell sharply, which is the second day of listing of the futures

5. I don't know where the landlord said that he was attacked by hackers, but it's not impossible. Although blockchain is very popular at present, there is no absolute security for anything, even bitcoin
6. unable! Without network, the computer becomes a stand-alone machine
I hope I can help you, thank you
7. Real hackers will not do anything harmful to the national computer network. Only the so-called novices. I've learned to steal numbers
or intrusion. The junk software in And it was developed by someone else.)
this reply. Personally, it's not targeted. Hope to adopt
8. There are no more than two reasons for hackers to attack P2P websites: one is unfair competition, that is, competitors invade each other's websites, leading to the outflow of users; Second, in order to ask for money from the attacked website and collect "protection fee"
to a certain extent, P2P instry is the instry closest to money on the Internet, and it is highly sought after by capital, which is an important factor that attracts the attention of hackers. The purpose of hackers is to blackmail by attacking the system, with the amount ranging from several hundred to several hundred thousand yuan. Many P2P websites are afraid of business losses and "spend money to eliminate disaster", and even some P2P platforms are closed down e to hacker raids
data show that there are more than 1400 online lending platforms in China, of which more than 80% have been attacked by hackers to varying degrees. Professional network security companies have concted security testing and evaluation on nearly 400 platforms. The testing results show that 65% of the online lending platforms have security vulnerabilities, and 35% of them have serious high-risk vulnerabilities, which may lead to information leakage and data compilation of investors or borrowers. But generally speaking, as long as the major platforms, like the financing easy platform, do enough preventive measures, they can well defend against the malicious attacks of hackers
the online loan center reminds you that the following six points must be done well to prevent hacker attacks:
1. If the budget is sufficient, mainstream hardware firewalls can be purchased to prevent attacks
2. Anti attack related services provided by third party service providers can be used
3. If you have the ability to build a distributed system, you can deploy your business in multiple computer rooms and disperse the access to each area
4. By using the IPtable firewall service of the system and configuring the enhanced security policy, external attacks can also be prevented to a certain extent
5. The IDC traffic cleaning service can be used to clean the illegal attack traffic in the network traffic
6. Third party CDN services can be purchased to disperse the access pressure
I hope the answers will be accepted. Thank you very much.
9. At 11:37 p.m. on September 12, the network issued a statement, saying that it suffered the largest unidentified hacker attack in history on the afternoon of September 12, and that the network search service broke down for nearly 30 minutes across the country. At present, the network has asked the public security organs to intervene to assist in the investigation

however, contrary to the network's view that "large-scale attacks should be carefully planned by the organization", trail is quite young. It is a technical expert with many years of hacking experience, but it does not belong to any company at present. On weekdays, it occasionally programs software for others and lives a freelance life. The attacks are committed by its own "brothers" with several hackers

"recently, the negative news on the Internet has been increasing." "Trail and friends strongly attacked the Internet, especially after the outbreak of the" extreme incident "on September 7, when a software download website accused the Internet of deliberately pointing search results to another competing software download website on the Internet," the person familiar with the matter said

however, this is only the fuse of trail's determination to attack the network. Challenging technology to "Star" companies -- the spiritual opium of "hackers" in the Internet world is the key reason for the deep secret of trail< In fact, the network security problems of China's major websites are very common Seeker, a hacker, told reporters, "however, considering the possible legal consequences, we will not attack at will. When most websites are attacked, if the situation is not very serious, they will not be made public."

"we often exchange backdoor to show off our skills." He revealed that 40% of Chinese websites, including Sina, Sohu and Netease, have been hacked“ Some subdomain names of sina have also been hacked, but it is not easy for the public to know. " According to the above-mentioned people familiar with the situation, trail only used six successful forces to attack the network. Seeker is not surprised: "for high-tech hackers, the attack process is not as complicated as the public thinks." Mu (Muzi. Com)

it was an autumn afternoon, and trail was in an ordinary cabin in a city of China. It was going to use the denial of service (DOS) - reflective denial of service (DRDOS) - which was graally rising in 2004. It was very similar to the DDoS attack that Yahoo suffered in the "e-pearl Harbor Incident" in February 2002, But the attack effect is faster and more violent, and once the attack starts, the process is easier to stop

previously, trail had to prepare for two things: collecting servers of a large number of innocent users (they are called "broilers"); Ready to attack software. Another advantage of trail's choice of "reflective denial of service attack" is that it uses the method of "persuading and borrowing" to many innocent servers, which only wastes half an hour. If "distributed denial of service attack" is adopted, it is necessary to invade and control a large number of innocent servers, and install hacker programs to achieve the purpose of remote control, The cost of preparation is high

but the difficulty of trail lies in finding or writing attack software. Generally speaking, hacker software circulating on the network is only suitable for attacking websites with small traffic, but for some large websites, we need to have a deep understanding of network communication protocol and be able to design software with the ability to mobilize a large amount of data traffic. This kind of software written by hackers with high performance is usually only used in small groups within the hackers, and will not be widely disclosed

when everything is ready, the trail attack starts. Trail constantly simulates its IP address as the IP address of a large flow innocent server, and sends a large number of requests to the network. When the network responds to it, the response is not the IP address of trail, but the large flow innocent server. After such "n handshakes", a large number of innocent servers establish false connections with the network, and continue to impact the network. The result of this way is similar to that of blocking other calls by continuously dialing a company's phone, which leads to the paralysis of company communication.

the "SYN flooding" technology described by network CTO Liu Jianguo in response to the network blackout incident is a result symptom caused by "reflective denial of service attack"

half an hour after the trail starts the attack, if the network technician finds out in time, he will realize that the packets accessing the server are extremely huge, and different from the packets accessed by normal users. These IP addresses are even false - however, these addresses are like stacks of counterfeit banknotes, because the numbers are connected, which is very easy to identify

"trail uses" reflective denial of service attack ", which does not exclude other hackers working together to use" distributed denial of service attack. " "At present, trail has stopped attacking," the person familiar with the matter said

according to sharp winner, CEO of the anti hacker website "red guest alliance", the general way to counter "reflective denial of service attack" is to install hardware firewalls, or to adopt load balancing technology, that is, to divert the huge amount of IP access to each server. If hackers feel the resistance and continue to attack more fiercely, then the technical contest between hackers and hackers will really begin

"because hackers are familiar with the legal consequences, they often take corresponding preventive measures, such as hiding, camouflage and destroying the data that helps to find them, which will increase the difficulty of tracking hackers." Sharp winner said: "unlike" invasion ", once the" attack "stops, it's very difficult to find clues. It's especially difficult to find the command center that borrows all the machines."<

challenge technology to "Star" company

"in 2000, the representative of Internet application is portal, and Yahoo is the star of portal." Seeker, a hacker, said: "after the development of portal, e-commerce and other service fields, search engine companies, which control the entrance of user information retrieval, have become the most popular Internet companies in the world."

since its birth in the 1960s and 1980s, the hacker community has evolved into four types: black hat (seeking benefits through injurious behaviors), "grey hat" (sometimes doing evil, sometimes doing good deeds), "white hat" (generally only interested in technology) and "red hat" (serving politics)

and no matter what kind of hackers are likely to be prompted by the desire to "challenge the technology of star companies". With the society's increasing dependence on computer networks, this behavior, which hackers call "the behavior that cannot be changed by the reason of the parties", has made many star websites face nightmares in history

the "e-pearl Harbor Incident" in February 2000 was the focus of such nightmares in the history of the Internet. On February 7, 8 and 9, hackers launched concentrated attacks on major websites in the United States, including Yahoo, Amazon, national discount agency website, Los Angeles Times website, which directly caused more than 1 billion US dollars of losses

Yahoo, the most secure website in the world, is one of the most unfortunate. Since February is the most active time of online shopping in a year, Yahoo's main revenue comes from online advertising. In the three hours after closing, 100 million pages should have been visited. Hacker attacks directly caused losses of up to a few million dollars to Yahoo

so far, the US Department of justice and the Federal Bureau of investigation have not yet grasped the clues about the "e-pearl Harbor Incident". They do not know who was behind the attack, how many computers were involved, the reason and address of the attack. But the FBI claims that those behind the scenes will be sentenced to five to 10 years in prison and demanded a fine of $250000 or double the victim's loss

dislike the Internet

according to the above-mentioned people familiar with the situation, a large number of negative news on the Internet recently triggered trail's aversion to the Internet, which directly led to trail's decision to attack. He stressed that the hacker culture advocates that indivials should have dignity in front of large organizations. If dignity is deprived, people should have the right to fight back. This is a very important part

on September 7, the search result link of "Tianji download" on the Internet unexpectedly pointed to the sky software station under the network, after experiencing such events as lightning layoffs, war of words with Sohu, and some former advertisers preparing to sue. Tianji made a public statement demanding an apology from the Internet, but the Internet insisted that Tianji's own technical mistakes were at fault< Robin Li CEO, Br />
, responded to her blog: "who has the final say in the Internet, justice or injustice? The answer is netizens. " He believes that if the Internet does the right thing, netizens will use the Internet more

9 14, the 2006 annual search report released by China Internet Network Information Center (CNNIC) seems to support Robin Li's confidence. According to the report, among the user preferred search engines, the network market share continues to rise, accounting for more than 60% of the user preferred market, and Google ranks second, with the preferred market share declining by 8% compared with the same period last year

"whether netizens support the use of the Internet is not the standard of network justice." Some analysts believe that the success of the network is e to its own innovation efforts, but whether an enterprise has sales depends on multiple premises. For example, if a large number of search results point to "pornography", "violence" and other information, it can not simply prove the success of the enterprise with the number of hits; Another example is that in the field of Chinese search, users have few choices, and the Internet is in a quasi oligopoly“ If the user's choice range is very small, there is no causal relationship between "increasing number of hits" and "network justice and injustice"<

according to the research of Prof. introna of London School of economics and Prof. Nissenbaum of Princeton University, the commercial search engine companies emphasize the easier access of some information because of bias or commercial interests, and ignore the interests of other websites, which has caused many people's worries

on February 7 this year, Google, which advocates "no competitive ranking" and "no evil", announced that it would take away BMW's "appearance rate" in the Internet search field as a "referee". However, as a monopolist in the global information search field, Google also faces pressure from anti Google organizations

"as a de facto monopolist in the Chinese market, the Internet often fails to deal with problems rudely, and it also needs to reflect on the search service itself and the main business model of its" competitive ranking. " The analyst said that information procts need to have the quality standard of "credibility". According to recent public reports, the "credibility" of the network is being questioned by some people with the increase of performance, which is also the reason for the emergence of similar anti network alliances

however, some analysts believe that while the network must ensure business fairness, the domestic environment should not be too harsh on the newly listed emerging aristocrat“ The way of hacker attack similar to trail can not be ignored
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750