Keep away from virtual currency and protect capital security
According to the news on February 10, 2018, on September 4, 2017, seven ministries and commissions of the people's Republic of China issued the notice on preventing the financing risk of token issuance, which regulates the issuance of tokens. In the notice, the nature of all kinds of tokens and "virtual currency" is clearly defined: it is not issued by the monetary authority, and it has no monetary attributes such as legal compensation and mandatory, It does not have the same legal status as currency and cannot and should not be used as currency in the market. Nevertheless, it is undeniable that all kinds of "virtual currency" still have a certain property value and are part of the property of the holder. So, how to identify the nature of the theft of such tokens
In order to protect the legitimate rights and interests of "virtual token" holders, the author intends to discuss such issues through a relevant news report and relevant casesstealing bitcoin
recently, a news report said that Haidian police in Beijing cracked a case of destroying computer information system. The suspect Zhong used his administrator's authority to modify the company's computer applications and steal 100 bitcoins. Before he could sell the stolen money, Zhong was arrested by the police. At present, Zhong was detained for the crime of destroying computer information system
it can be seen from the report that the police detained the perpetrator for stealing bitcoin on suspicion of damaging the computer information system. The crime of destroying the computer information system stipulated in Article 286 of the criminal law of our country refers to the act of deleting, modifying, adding or interfering with the functions of the computer information system in violation of the provisions of the state, resulting in the abnormal operation of the computer information system and serious consequences, or deleting, modifying or interfering with the data and application programs stored, processed or transmitted in the computer information system Modifying or adding operations with serious consequences, or deliberately making or spreading destructive programs such as computer viruses, which affect the normal operation of the computer system with serious consequences
In the author's opinion, this crime is one of the crimes of impairing social management order in Chapter 6 of the criminal law, that is, the legal interest protected by this crime is actually the public order of our society, not the property interests of the digital currency holders, which in fact denies the property value of digital currency, It is only protected as a data or system function in a computer system. The author thinks that there is some irrationality in this wayfirst of all, in the notice on the prevention of bitcoin risk issued in 2013, it is mentioned that bitcoin is not a real currency because it is not issued by the monetary authority and does not have such monetary attributes as legal compensation and compulsion. Bitcoin has four main characteristics: no centralized issuers, limited amount, no geographical restrictions and anonymity. Because it belongs to a specific virtual commodity in nature The notice also clearly mentioned that bitcoin does not have the same legal status as currency and should not be used as currency in the market. However, as a virtual commodity, the property value behind bitcoin cannot be ignored
Secondly, Article 127 of the general provisions of the civil law, which came into effect on October 1 last year, stipulates that if the law has provisions on the protection of data and network virtual property, such provisions shall prevail. Although only the protection of the network virtual property has made the principle provisions, but it can not be denied that this shows our country's attitude towards the protection of the network virtual property. Although there is no special law for the protection of data and network virtual property in China, from the perspective of the general provisions of civil law, it is predicted that there will be relevant legislation in the futurefinally, from the relevant cases, we can also see the recognition of the property attribute of virtual currency such as bitcoin in China's judicial practice. In April and may 2013, Liu premeditated to set up a bitcoin trading platform, so he recruited Jin and Huang (both sentenced) to jointly set up a "bitcoin" trading platform. During this period, Liu, Huang, Jin, Jin and the defendant he, in addition to other acts of directly stealing customers' funds, also frequently cashed RMB by selling customers' bitcoins, and transferred 120 bitcoins from the website. Finally, the court convicted and punished the defendant for fraud, and the bitcoin transferred by the defendant was also included in the property loss of the victim. Therefore, from the judicial cases, we can also get the recognition of the property attributes of virtual currency such as bitcoin
based on the above reasons, the author thinks that it may be unreasonable to regulate the theft of virtual currency only as the crime of damaging computer information system. We should face up to the hidden property value and consider the application of the crime of infringing property in China's criminal law. Only in this way can we effectively protect the legitimate rights and property of digital currency holders in China
2. When the transaction amount is in the game, take a screenshot of the transaction process, and note that the ID number of the transaction should be consistent with the ID number of the buyer
3. If the buyer refuses to pay with the game currency, then pass the screenshot to Taobao company, and there will be a notarized ruling.
If bitcoin accounts are decentralized, so are hackers. Bitcoin, which uses blockchain technology, is not more secure than bank accounts. On the contrary, it is vulnerable to hackers. So, in the world of virtual currency, how to protect the security of account funds
Secret your private key address
the bitcoin address is the only information needed to define the distribution and transmission end of bitcoin. These addresses are generated anonymously by the user's wallet. Once the address is used, all the transaction history related to it will destroy the confidentiality of the address. Anyone can view the balance and all transactions at any address. Because users usually need to disclose their identity in order to receive services or goods, the bitcoin address cannot be completely anonymous. For these reasons, it is better to use bitcoin address only once, and users must be careful not to disclose the address
When replacing the computer, try to destroy the hard disk of the original computer. Don't save or publish the private key of bitcoin to the cloud, mailbox or collection. If a network administrator writes a regular expression to retrieve the text, he can find all the information and crack the user's account2. Stored in bitcoin wallet
many bitcoin exchanges have been attacked by hackers. If you use the wallet of bitcoin exchange, please use Google's "double authentication" to ensure security. During the development of virtual currency, there have been many cases of bitcoin exchange running away. The exchange owns the private key of the user's wallet, which is not a safe way to save bitcoin
bitcoin wallet has a wide range of customers, which is more secure than the wallet service of bitcoin exchange. No matter what kind of wallet you choose, you should choose a strong password. Don't use the same password as the registered email. At the same time, do not put eggs in the same basket, choose multiple storage ways to improve the security of assets
using the genuine system of bitcoin wallet, regularly updating security vulnerabilities and fixing bugs can improve security. Some studies have pointed out that IOS system is more secure than Android system, because the existing security vulnerabilities of Android system may be relatively easy to be attacked by hackers
3. The most common way to identify phishing sites is phishing sites. Hackers will create a domain name similar to bitcoin website, which may be sent to users through e-mail and other channels. Once users try to log on the website, hackers will record their login information
so be careful before clicking any link. Many browsers have the service of "phishing check". If you carefully identify the domain name of the website, you can identify the phishing website
4. Guard against Keylogger
in addition to phishing sites, the common attack method of hackers is Keylogger. Keyboarding is the easiest way to capture passwords. The deception of key recording software is very high, even the technical house may believe it. In short, a keyboard recorder is actually a script code. Once it is installed on the operating system of the target computer, it will record all the keystrokes on the keyboard and send them to hackers, mostly through FTP
the successful method of introcing Keylogger depends on many factors, including the operating system, the lifetime of keylogger and the anti infection level of target computer. Keyboard recorder is usually injected through web browser. The security vulnerability of the target machine depends on the type of browser it uses; Whether the operating system installed on the target machine is genuine, and whether the operating system is updated with the latest security vulnerabilities and bug fixes
5. Watch out for USB theft program
the software will retrieve your password and login credentials stored in the browser. Once FUD, some stealing programs can be very powerful. In most cases, a steal program is a. Bat file, which can be injected into the target machine online or driven by USB
6. Using proxy and VPN
proxy server and VPN can increase the security of your bitcoin wallet, although most people mistakenly believe that VPN makes them anonymous online. But in fact, VPN only improves the privacy of users. VPN can rece the possibility of hackers accessing the router to open the port, which also means that they are less likely to succeed
7. Encryption and backup wallet
wallet backup is essential to prevent losses caused by computer failure or human error. If a computer or mobile phone is lost, a backup wallet can help retrieve the bitcoin. At the same time to encrypt the online backup, any backup that can be accessed through the Internet should be encrypted
how to back up your wallet? First, close the bitcoin client, then select the backup wallet of the menu file in the main interface, and the wallet.dat file to other hard disk partition, mobile hard disk or U disk
it should be noted that the entire wallet should be backed up, not just the private key. Bitcoin wallet has many private keys for receiving transaction change. If only the private keys of visible bitcoin addresses are backed up, most of the funds may not be restored from the backup. Also, back up your wallet regularly to make sure that all recent bitcoin change addresses and newly created bitcoin addresses are included in the backup
Cold storageoffline wallet is called "cold storage", which is the safest way to save digital currency
cold storage is an offline wallet that is not connected to the network, that is, it will not be attacked by black horse and Trojan horse. However, because the operation is relatively complex and the price is relatively expensive, the price of offline wallet is more than 1000 yuan, which is suitable for users who have a lot of bitcoin and are ready to hold it for a long time
although the operation of cold storage is relatively complex, it is the safest storage method. At present, only cold storage has truly realized the inviolability of personal assets and is not subject to the supervision of others
if you want to know more about bitcoin information, please send me a private message and avoid detours
No. Virtual currency with good operation and investment will survive for a long time and will not go bankrupt in a few months, such as bitcoin and internet currency of Internet companies
there are various types of virtual currencies. The virtual currencies with high acceptance abroad are Facebook's f currency, online game second life's Linden currency, etc., while the representative virtual currencies in China are Tencent's Q currency, Sina's u currency, online currency, Shanda Yuanbao, etc
virtual currency is different from check and telegraphic transfer. The value that virtual currency can't realize can't be transferred by bank. At present, it can only circulate in the network world. Virtual currency is released by various network organizations, and there is no unified issuance and management standard
2. The special currency issued by the portal website or instant messaging service provider is used to purchase the services in the website the most widely used is Tencent's q-coin, which can be used to purchase value-added services such as membership and QQ show
3. Virtual currency on the Internet. For example, bitcoin, Wright currency, etc. bitcoin is an electronic currency proced by open-source P2P software. Some people also translate bitcoin as "bitcoin", which is a kind of network virtual currency. It is mainly used for Internet financial investment, and can also be directly used in daily life as a new currency