Position: Home page » Bitcoin » Bitcoin won't hack

Bitcoin won't hack

Publish: 2021-05-24 19:53:22
1. You can introce bitcoin on the Internet. The characteristics of bitcoin can explain your problem. Many criminals launder money through bitcoin. You can focus on points 2 and 4
1. Complete decentralization, without issuing institutions, it is impossible to manipulate the number of issues. Its distribution and circulation are realized through open-source P2P algorithm
2. Anonymity, tax exemption and supervision free
3. Robustness. Bitcoin is completely dependent on P2P network and has no distribution center, so it cannot be shut down externally. Bitcoin price may fluctuate and collapse, and many governments may declare it illegal, but bitcoin and its huge P2P network will not disappear
4. Borderless and cross-border. Cross border remittance will go through layers of exchange control agencies, and the transaction records will be recorded by many parties. But if you trade with bitcoin, enter the digital address directly, click the mouse and wait for the P2P network to confirm the transaction, a lot of money will pass. It does not go through any regulatory agencies and will not leave any cross-border transaction records
5. It is difficult for the cat to survive. Because bitcoin algorithm is completely open source, anyone can download the source code, modify some parameters, recompile, and create a new P2P currency. But these counterfeit currencies are fragile and vulnerable to 51% attacks. Any indivial or organization, as long as it controls 51% of the computing power of a P2P currency network, can manipulate transactions and currency value at will, which will be a devastating blow to P2P currency. Many Shanzhai coins die in this link. The bitcoin network is robust enough. If you want to control 51% of the computing power of the bitcoin network, the number of CPUs / GPUs required will be astronomical.
2.

Recently, a kind of malicious software that locks up computers is spreading rapidly all over the world. At present, tens of thousands of computers in nearly 100 countries and regions have been attacked. The hackers locked the files in the computer and demanded to pay the equivalent of $300 in bitcoin to unlock the files“ "Bitcoin virus", a virus sweeping the world, suddenly brushed the screen last night. A number of campus networks in Zhejiang Province have encountered similar attacks. Among them, bitcoin, as one of the new payment means, is used by hackers as a payment tool for blackmail

after the regulatory storm in January and February and the big rise and fall behind, bitcoin once again appeared a wave of sluggish market in March: from about 8000 to less than 7000. However, since then, bitcoin ushered in a wave of soaring prices

according to the currency bank's market, the "bull market" of bitcoin started in April. From the price of one bitcoin to 7000 yuan in early April, it rocketed through the threshold of 10000 yuan to one bitcoin

on May 10, the market software showed that the price of bitcoin successfully broke through the 10000 mark, up to 10245. However, since February this year, when the domestic regulatory authorities asked to suspend the withdrawal of bitcoin, there has been a "price gap" between the domestic and foreign bitcoin prices: the foreign bitcoin price was as high as US $1779 / piece, equivalent to about RMB 12275 / piece, and there is a gap of about 2000 yuan between the domestic and foreign bitcoin prices

behind the sharp rise in prices, there is a sharp fall in trading volume. According to public data, the trading volume of fire coin on May 9 was less than 15000 pieces, 40% less than the previous peak day, and 0.3% of the single day trading volume when it reached a new high on January 5 at the beginning of the year

3. Why do you give him the money? If the system doesn't have any important files, reload the system. Do you know how much a bitcoin costs
remember to back up important files next time for a rainy day
and now the virus has been cracked, just follow the process. You give money to help the tyrant
we are 15pb information security ecation, using hacker means to prevent hackers. If you are interested, you can learn about it
4.

at present, the vast majority of digital currency transactions are concted in exchanges. Among the numerous exchanges, bitfinex, binance, okex and so on are well-known

However, bitcoin and other digital currencies, as decentralized assets, have to be traded in a centralized exchange, which seems to have hidden contradictions and dangers

1. Problems and challenges of stock exchanges=“ //www.yuanxue365.com/en/img_fd039245d688d43fdf16c83b761ed21b0ff43bbf ">

in February 2014, Mt. GOx, the world's largest bitcoin exchange at that time, was stolen 850000 bitcoins, and the price of bitcoin suffered a" cliff "crash on that day. Later, it was revealed that Mt. GOx was in fact a thief, and only 7000 bitcoins were actually stolen

in August 2016, bitfinex, the largest U.S. dollar bitcoin trading platform, suffered a security vulnerability, resulting in the theft of 120000 bitcoins, which was worth $65 million at that time. If converted into the price in December 2017, it would be worth nearly $2 billion

on December 19, 2017, South Korea's youbit exchange was attacked by hackers and lost 4000 bitcoins, and the exchange declared bankruptcy

on December 21, 2017, the Ukrainian liqui exchange was stolen 60000 bitcoins, and the unit price of bitcoin plummeted by US $2000

in 2018, such a drama will only continue

in addition to the threat of hackers, traditional exchanges also have some inherent shortcomings, such as lack of supervision and inefficiency. The security of the exchange for investors can only rely on its own credit, and the cost of running is very low. The stock exchange is regulated at the national level, but there is no such sword of Damocles on the top of the digital currency exchange. Moreover, in an exchange, the same order can only be submitted to one exchange. After the user places an order, the funds used for the transaction will be frozen and can only wait for the completion or cancellation of the transaction. These are undoubtedly inefficient

All in all, the problems of exchanges are the problems of centralization

2. Decentralization of exchanges=“ //www.yuanxue365.com/en/img_86d6277f9e2f070889a173c9e224b899a801f257 ">

(1) the progress of the exchange itself

the upgrade of security means is various. At present, the best use is cold wallet, that is, to keep the digital currency in the offline U disk. At the end of 2017, when the YouTube exchange was attacked, 75% of its assets were withdrawn into the cold purse in time to avoid greater losses. However, it seems to be a helpless way to protect the online assets by offline means. Of course, there should be many other methods, which will not be repeated here

(2) the representative of cross ledger transaction is ripple network, and the operating company is ripple labs, which is a semi centralized system. Ripple is a decentralized clearing agreement. In order to solve the high cost and delay of inter-bank clearing, its base currency is XRP. Ripple network can connect all kinds of assets, such as US dollar, RMB, Japanese yen, bitcoin, etc. to its own network. In this system, U.S. dollars or bitcoin can be converted into reborn currency, and then reborn currency can circulate freely in the network, just as a highway is built between various assets. Due to the support of major banking institutions, the reborn currency achieved nearly 300 times growth in 2017

(3) decentralized exchange

some teams try to use blockchain technology to build a decentralized exchange. This kind of decentralized exchange, to some extent, is an extension of cross ledger trading

bitshares is the most representative of early rising projects. It builds a blockchain development platform with servers scattered all over the world. Even if some of them are attacked, the system will not collapse. Anyone can transfer money and borrow money freely on this platform, and can also quickly build a centralized exchange based on this platform. In order to ensure stable value, bitstocks also require three times of digital assets as collateral. At present, bitstocks are running fairly well

later, with the development of Ethereum and smart contract, the x x protocol came into being. This is an open protocol running in the Ethereum blockchain and a decentralized exchange in the Ethereum ecosystem. The agreement has attracted many investors. At present, it has completed financing and started to build open source software tools and infrastructure. Of course, there are many competitors. Ether Delta, IDEX and oasis DEX are trying to provide similar functions. Moreover, it is a smart contract system based on Ethereum, which only supports erc20 token. If other smart contract public chains start to rise, the demand will be reced

in addition, there are some teams that are entering, such as the domestic road seal agreement, looping (LRC) in English. They adopted a design similar to the X protocol, and also introced a fast payment function similar to the lightning network. It is characterized by trying to match multiple exchanges, the user's order can be broadcast to multiple exchanges, and completed by different exchanges. Moreover, the user can still use the account funds after placing an order, and the user's behavior of transferring part or all of the funds is equivalent to partial or total cancellation. To some extent, it improves the breadth and timeliness of the transaction. However, this system seems to have damaged the "power" of the existing exchanges. Whether we can persuade everyone to play together will be a difficult problem

At present, there is still a long way to go for the construction of decentralized exchange. In 3-5 years, traditional exchange will still be the main battlefield of digital currency

However, in the future, it is worth looking forward to let the decentralized digital currency get rid of the shackles of centralization

5. No, there are several reasons why bitcoin was stolen
1. A stolen bitcoin can't be retrieved, and if it's lost, it's lost.
2. Bitcoin has transaction records, but the address is hidden, and you can't find an indivial.
3. Every bitcoin has a key, and only if you have this key can you be admitted to own bitcoin. However, if bitcoin is stolen or lost, your bitcoin will disappear completely
therefore, the theft of bitcoin does not belong to cracking, it may be e to internal personnel.
6. Bitcoin cold wallet is a kind of bitcoin storage method that user account and personal key are stored separately
Hot wallets usually refer to bitcoin online wallets, where the user's personal account and password information are all stored on a network platform; Website platform provides security for users
coin pack is a professional website platform providing bitcoin wallet service, which has two storage modes: cold wallet and hot wallet; Overall, the user evaluation is good.
7. At present, there is an unpopular way to use bug to get your character into the wall, so that you won't be attacked by monsters, but you can't get out. If you insist on going to three-layer mining, the best way is to form a team to go down mining together
8. Bitcoin, as a kind of P2P currency, is based on specific algorithms and a large number of calculations. Hacker attacks on bitcoin have not stopped since 2009. Hackers usually attack bitcoin trading platform, and then steal a lot of bitcoin, causing huge losses. So the general platform in the website protection have to work hard, just like before the domestic fire coin network used anti-D protection to ensure the safety of the website. Once attacked, the loss is unimaginable.
9. Bitcoin can only be cracked by computing power, but the cost of cracking is too high. So no one is going to crack it.
10. According to the analysis of 360 security center, the campus network blackmail virus was spread by the "eternal blue" hacker weapon leaked by NSA“ "Eternal blue" can remotely attack the 445 port (file sharing) of windows. If the system does not install the Microsoft patch in March this year, it does not need any user operation. As long as it turns on the Internet, "eternal blue" can execute any code in the computer and implant malicious programs such as blackmail virus.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750