Is 360 blockchain OK
1.
blockchain information: mainly collects and publishes market information, blockchain technology, project analysis, etc., providing information, exchange, investment and financing services for entrepreneurs and investors<
2.
digital currency exchange: build a global digital currency trading platform to provide asset management, legal currency trading and currency exchange services for traders<
3.
computing power service: computing power can be simply understood as the computing power of mining machine. Mining machine is the computer used to earn digital currency. This kind of computer generally has professional mining chips and mostly works in the way of burning graphics card
the entrepreneurial direction of blockchain technology is far more than that. The above three directions show that there are leading enterprises at all levels. The concept of ranking Chinese blockchain companies is too big, and we need to understand the details of the instry to distinguish them.
- the following data sources and scores are from the in depth analysis report on business model innovation and investment opportunities of China's blockchain instry published by foresight Instry Research Institute
< H2 > - original title: Analysis on the current situation and development trend of China's blockchain instry in 2019, widely applied and accelerating the construction of Digital China; Midstream blockchain application and technical servicesapplication fields of downstream blockchain. The upstream hardware, technology and infrastructure mainly provide the necessary hardware, technology and infrastructure support for blockchain application. The hardware equipment includes mining machinery, ore pool, chip manufacturer, etc; General technologies include distributed storage, decentralized transaction, data service, distributed computing and other related technologies
the downstream application fields include the combination of application blockchain technology and existing instries, mainly including financial instry, logistics instry, right protection, medical health, instrial energy and many other fields. As an emerging technology, blockchain has many downstream application fields and great development potential
the application and service of midstream blockchain includes the construction of infrastructure platform and the provision of technical service support. The construction of infrastructure platform is divided into general infrastructure chain and vertical domain infrastructure chain; Technical service support includes technical support and service support. Similar to upstream technology, technical support is responsible for providing buyers with a series of technical support based on blockchain procts, such as blockchain security protection; Service support includes a series of services such as digital asset trading place, digital asset storage, media community, etc
analysis of instrial chain of blockchain instry
1. Bubi blockchain company, which is engaged in the underlying technical services and instry solutions of blockchain. That is to say, an underlying blockchain is built, and an adaptation layer is built on it, so that enterprises can quickly establish commercial applications. The underlying blockchain is self-developed. The consensus mechanism is pbft, TPS is 5000 transactions per second, UnionPay is 2000 transactions per second, and bitcoin is 7 transactions per second. Of course, different underlying architectures lead to different performance, because Bubi's commercial blockchain pays more attention to performance. At present, Bubi is mainly used in digital assets, supply chain finance, supply chain traceability, public notary and other fields< 2. Bumeng blockchain. Theoretically, bumeng should be regarded as the proct line of Bubi, but Bubi is mainly engaged in the private chain, while bumeng is an alliance chain. So separately, bumeng is Bubi's layout in digital assets. The underlying technology is Bubi blockchain, but it encapsulates the blockchain according to the scene and provides API interface for enterprises. Enterprises issue their own assets on it. According to the characteristics of blockchain, they can freely circulate their assets. At present, some enterprises such as sunshine insurance, Qianxiang finance, crowdsourcing, Haohuo, etc. have joined in, and the assets in them include insurance policies, integral points, and so on Financial procts and so on. Finally, it is estimated that this platform will break through the barriers between assets, and the end users can freely use and transfer these assets. This is an interesting way for the blockchain instry, because it has both the opening of public chain and the security of private chain
Third, only chain, which is a commodity ID management cloud platform based on blockchain technology, provides enterprise users with commodity asset management, tracing, anti-counterfeiting verification, new supply chain management, etc. in the form of baas. Simple understanding is that only chain has done the content of "supply chain traceability" of Bubi blockchain
four, concentric mutual aid, concentric mutual aid is a mutual aid security platform, put some mutual insurance related information into the blockchain, and users can apply to become nodes, participate in bookkeeping, and maintain their own data
5. Xiaoyi is a decentralized network protocol based on blockchain technology, which digitizes the assets and interests of the real world, and carries out financial business such as registration and issuance, transfer transaction, clearing and delivery through point-to-point network
these five blockchain companies are probably well-known in China, and I personally recommend bumeng
first, bumeng uses the underlying technology of Bubi blockchain, which is very promising in the instry. It has the largest number of landing applications in China. Enterprises can not only use the blockchain technology at low cost (just call the interface, it seems that it is free), but also use the resources inside. Think about being on the same chain with many enterprises and docking resources in the future, User transformation should not be easy
Second, Weilian and Tongxin Huzhu focus on one field, and do not provide underlying technology and instry solutions. That is to say, if you are in this instry or can be used in the upstream and downstream of this instry, you can not be used in other fields. Take mutual security field as an example, zhongtuobang and zebra Club both choose bumeng. Of course, if it is an investment, you can consider it
Third, Xiaoyi, why not recommend Xiaoyi, because Xiaoyi is an open source project, and we all know the domestic business environment, especially when the instry is just beginning to develop, and the domestic market is different from that of foreign countries, Xiaoyi has gone through two rounds of ICO, which will be a great worry in the future operation, and at present, Xiaoyi has not been applied in practice, We have made a Fada platform, which has not been used by any company yet (guess it may be related to the factors of open source, who dares to open their data completely). Of course, the open attitude of Xiaoyi is worth encouraging. Although I guess the advantages and disadvantages of the code are well understood by peers, it is not clear
Fourth, why is there no recommendation for Bubby? Bubby has raised 30 million yuan a while ago, because Bubby is more open and has more resources. Of course, if the business requires high privacy, it can also choose Bubby blockchain
finally, for all my hard work, choose me!
Recently, Vulcan team of 360 company found a series of high-risk security vulnerabilities in EOS, a blockchain platform. It is verified that some of the vulnerabilities can remotely execute arbitrary code on EOS nodes, that is, they can directly control and take over all nodes running on EOS through remote attacks
In the early morning of May 29, 360 reported this kind of vulnerability to EOS official for the first time, and assisted it to repair the security risks. The person in charge of the EOS network said that the EOS network will not be officially launched until these problems are fixed
EOS super node attack: the virtual currency transaction is completely controlled
in the attack, the attacker will construct and publish a smart contract containing malicious code, and the EOS super node will execute the malicious contract and trigger the security vulnerability. The attacker then uses the super node to pack the malicious contract into a new block, resulting in the remote control of all nodes in the network (alternative super node, exchange recharge withdrawal node, digital currency wallet server node, etc.)
because the system of the node has been completely controlled, the attacker can "do whatever he wants", such as stealing the key of the EOS super node and controlling the virtual currency transaction of the EOS network; Obtain other financial and privacy data in the participating node system of EOS network, such as digital currency in the exchange, user key stored in the wallet, key user information and privacy data, etc
What's more, an attacker can turn a node in the EOS network into a member of a botnet, launch a network attack, or become a free "miner" to extract other digital currency
source: Science and Technology News
1. According to different scenarios, design systems and attribution, blockchain is generally divided into three categories: public chain (public service), private chain (focusing on the application of an enterprise or instry) and alliance chain (generally belonging to an instry or a supply chain)
2. It is basically divided into three kinds of applications:
blockchain applications of well-known enterprises: (Netease blockchain cat (game), thunderbolt chain customer, storm's cool broadcast cloud (BFC points), Renren's social rrcoin, Meitu's e-commerce + blockchain, 360's router, cheetah and other well-known enterprises)
start up companies based on blockchain (Ethernet wallet, Babbitt, fire coin)<
social public applications (the bank has set up a research and development laboratory)
current market situation and development of blockchain:
currently, blockchain applications in the market still focus on issuing "token", realizing "point management"
, pet games, etc., with relatively single functions, and the data of blockchain related apps is even less, and more of them are financial apps.
originally, every job change means unknown. Sometimes when we stay in a position for a long time, it's easy to think that we know enough, but in fact, what you know is what you contact. If you think about the rapid development of society and the endless emergence of new things, it is impossible for us to know everything we meet. But one thing we can confirm is that we are always learning new things. On the other hand, we are always growing up
if the company is willing to give you the opportunity to know, explore and grow, then I think that no matter what instry you are working in, such a company is worthy of your trying, giving yourself an opportunity as well as giving the company an opportunity
finally, I want to say to you: come on, I hope everything goes well with you.
It was reported on May 29 that recently, Vulcan team of 360 company found a series of high-risk security vulnerabilities in EOS, a blockchain platform. It is verified that some of the vulnerabilities can remotely execute arbitrary code on EOS nodes, that is, they can directly control and take over all nodes running on EOS through remote attacks
the hidden dangers of blockchain network security need to be paid attention to
EOS is a new blockchain platform known as "blockchain 3.0". At present, its token market value is as high as 69 billion yuan, ranking fifth in the global market value
in the blockchain network and digital currency system, nodes, wallets, mines, exchanges and smart contracts all have many attack surfaces. 360 security team has found and exposed several serious security vulnerabilities for digital currency nodes, wallets, mines and smart contracts
this time, the 360 security team found a series of new security vulnerabilities in the smart contract virtual machine of EOS platform, which is a series of unprecedented security risks. No security researchers have found such problems before. This type of security problem not only affects EOS, but also may affect other types of blockchain platforms and virtual currency applications
360 expressed the hope that through the discovery and disclosure of this vulnerability, the blockchain instry and security peers will pay more attention to the security of such issues, and jointly enhance the security of the blockchain network
content source: surging news