Is it illegal to sell bitcoin in wechat circle
It's not against the law to do bitcoin business, but don't use bitcoin to do illegal things
the following is the bitcoin risk notice issued by the central bank and other five ministries and commissions (bitcoin home has the full text):
the notice defines the nature of bitcoin, and holds that bitcoin is not issued by the monetary authority, has no monetary attributes such as legal compensation and mandatory, and is not a real currency. In terms of nature, bitcoin is a specific virtual commodity, which does not have the same legal status as currency and cannot and should not be used as currency in the market. However, bitcoin trading as a commodity trading behavior on the Internet, ordinary people have the freedom to participate at their own risk
It's not against the law to do bitcoin business, but don't use bitcoin to do illegal things
in China, the regulations on the administration of RMB prohibit the proction and sale of token tickets. Because there is no clear judicial interpretation of the definition of token ticket, if bitcoin is included in the "token ticket", the legal prospect of bitcoin in China will face uncertainty
the notice of the Ministry of culture and the Ministry of Commerce on strengthening the management of virtual currency of online games (Wen Shi Fa [2009] No. 20) on June 4, 2009 stated that the application scope of virtual currency of online games was defined for the first time, and the distinction between the current virtual currency of online games and the virtual props in the game was made; At the same time, the notice said that the "notice" stipulates that enterprises engaged in related services must be approved before they can operate
in China, some Taobao stores also began to accept the use of bitcoin, and the number of businesses will graally increase
in October 2013, the first bitcoin quarterly, one bit, was released
on October 15, 2013, the network accelerator service of the network announced its support for bitcoin
on October 26, 2013, btcmini reported that GBL was hacked
on October 31, 2013, Lei Teng, a famous Internet lawyer, proposed the event of "filing a case to investigate the closure of GBL bitcoin trading platform as soon as possible", analyzed the "value function" and "use function" of bitcoin, and bitcoin should be governed by relevant laws
on December 5, 2013, notice of the Ministry of instry and information technology of the people's Bank of China, China Banking Regulatory Commission, China Securities Regulatory Commission and China Insurance Regulatory Commission on preventing bitcoin risk: bitcoin is a specific virtual commodity
as a commodity trading behavior on the Internet, ordinary people have the freedom to participate in bitcoin trading at their own risk
on September 4, 2017, announcement of the people's Bank of China Central Network Information Office, Ministry of instry and information technology, State Administration for Instry and commerce, China Banking Regulatory Commission, China Securities Regulatory Commission and China Insurance Regulatory Commission on preventing the risk of token issuance financing: it is prohibited to engage in token issuance financing activities (ICO)
the trading platform shall not engage in the exchange business between legal tender and token, or virtual currency, or buy or sell token or virtual currency as a central counter party, or provide pricing, information intermediary and other services for token or virtual currency
on November 2, 2018, the people's Bank of China released the 12th topic of China financial stability report 2018, which talked about "encrypted assets"
{rrrrrrr}
extended information:
currency transaction
purchase method
< P > users can buy bitcoin, and at the same time, they can use computers to "mine" bitcoin according to algorithms. When users "mine" bitcoin, they need to search for 64 bit numbers by computer and then, by repeatedly solving mysteries, compete with other gold miners to provide the required numbers for the bitcoin network. If the user's computer successfully creates a set of numbers, it will get 25 bitcoins
e to the decentralized programming of bitcoin system, only 25 bitcoins can be obtained every 10 minutes, and by 2140, the upper limit of bitcoins in circulation will reach 21 million. In other words, bitcoin system is able to achieve self-sufficiency, resist inflation through coding, and prevent others from destroying these codes
source of reference: network bitcoin
a new form of rogue software CTB locker uses despicable means to send infected e-mail to the victim. Only when the victim opens it, the ward will invade the victim's personal computer and encrypt the victim's specific files (JPEG image is a popular target). If the victim wants to retrieve the files, he must pay a ransom in bitcoin. A user paid a ransom of three bitcoins in four days, about $700 (market value on Friday)
the email messages they send are usually hot topics, such as: what is bitcoin? Some of the victims were cheated by curiosity. At present, some users have been affected. This is part of the content intercepted on bitcoin home.
Second, program description of the mining dog
1. The mining dog has three files, prodogmine.exe, cgminer.bat and cmdeep.bat; Prodogmine.exe is the main program of the mining dog, and the two batch files are mining batch
2. Download the mining machine cgminer, the mining dog only supports cgminer, and the mining machine does not support guiminer http://kuai.xunlei.com/d/LRRLYZZLTEXH
3. Configure two mining batches. The configuration process of the two files is the same, The reason for putting two documents is to consider the main and standby ore pool; Open the cgminer.bat file in notepad with three lines as follows:
CD F: &; cgminer-2.11.3-win32
f:
cgminer -o http://btcguild.com : 8332 - U xxxxx - P xxxxx
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -; Cgminer-2.11.3-win32)
2) in the second line, enter the disk where the miner directory is located (that is, the drive letter in the path). For example, if my miner is placed in disk F, enter F:
3) in the third line, the miner's startup configuration, if you use http://btcguild.com Mine pool, as long as you modify the location of XXX, the user name is after - u, and the password is after - P, If you are in http://deepbit.net If you want to register, you should change - O to http://deepbit.net : 8332, note: - O - U - P should be separated by spaces
4) the configuration of cmdeep.bat file can be the same as cgminer.bat. Of course, you can also change it to another mine pool, such as one with http://btcguild.com : 8332 for one http://deepbit.net : 8332, the mining dog will call different files every time it restarts, so that if it is caused by the mining pool, it can automatically switch the mining pool< The interface of prodogmine.exe is as follows:
1) when the program starts, if the prompt "open library is normal", it means that there is no problem with the loading of the graphics card driver, and it can be used (this program is only for ATI graphics card, and other graphics cards are not tested)
2) judgment interval: the unit is Ms, The default value is 30 000, which is determined once every half a minute. You can not set it
3) click "start" to start mining batch processing automatically. If mining stops for half a minute, the program will restart mining
4) open to start: select this option to start monitoring automatically every time you start mining dog, This option can realize the function of starting mining (pull the shortcut key of exploration dog into the startup group of windows to realize the function of starting mining)
if the program is helpful to you, you may as well donate to me:
Chat tools can only be locked and encrypted, which is confidential. If the mobile phone is accidentally seen, you can click in to see the chat record. There is no privacy to speak of
now there are many ways to prevent the disclosure of personal information and privacy. Pay more attention to it. In the information age, a lot of privacy has been made public, and your privacy is very important
How can you protect your mobile phone? If you lose it or are taken by a friend, the privacy inside will be seen. At this time, privacy encryption is particularly important. Recently, Duoo cloud mobile phone has the function of device locking. When you log in with a small number in the cloud, you can put important photos, wechat, on the cloud mobile phone business, encrypt and lock them. I'm not afraid that people will see some content when they get their mobile phones