Position: Home page » Currency » Digital currency Hard Wallet pass

Digital currency Hard Wallet pass

Publish: 2021-05-24 21:14:07
1.

1、 Different definitions:

1. virtual currency:

virtual currency refers to non real currency

digital currency:

digital currency is an alternative currency in the form of electronic currency. Both digital gold coin and cryptocurrency belong to digiccy

3. Cryptocurrency:

cryptocurrency is a kind of transaction medium that uses cryptography principles to ensure transaction security and control the creation of transaction units

4. Token (token):

a kind of article whose shape and size are similar to currency, but the scope of use is limited and has no currency effect, and its token is the homonym of token in English

Second, the characteristics are different:

1; It can also be said that virtual currency is personalized currency. In another way, it can also be called information currency

2. Digital currency:

is an unregulated and digital currency, which is usually issued and managed by developers and accepted and used by members of specific virtual communities

Cryptocurrency:

cryptocurrency is based on the decentralized consensus mechanism, which is opposite to the banking and financial system relying on the centralized regulatory system

4. Token (token):

usually needs to be exchanged for money, used in shops, playgrounds, mass transportation and other places, as a voucher to use services and exchange goods


extended data

at present, digital currency is more like an investment proct, because it lacks a strong guarantee agency to maintain its price stability, and its role as a value measure has not yet appeared, so it can not be used as a means of payment. As an investment proct, digital currency cannot develop without trading platform, operating company and investment company

digital currency is a double-edged sword. On the one hand, the blockchain technology it relies on has been decentralized and can be used in other fields except digital currency, which is one of the reasons why bitcoin is popular; On the other hand, if digital currency is widely used by the public as a kind of currency, it will have a huge impact on the effectiveness of monetary policy, financial infrastructure, financial market and financial stability

2.

Bitcoin is a scam

because bitcoin is a kind of virtual currency, most of which are unregulated and bypass the traditional banking system. Its sharp rise worries regulators around the world. Jamie Dimon, JPMorgan's president, described bitcoin as & quot; A scam & quot;. Because compared with bitcoin, it's not real, it's going to end in the end

virtual currency similar to bitcoin is based on blockchain technology. It is a kind of accounting technology using anonymous computer network operation. No government or central bank has endorsed bitcoin. Therefore, no one can support the value of bitcoin

extended information:

pyramid selling is to absorb and allocate funds by developing the relationship between the upper and lower line. In the bitcoin investment market, the elderly and new people do not have the time advantage, nor do they rely on high profits to pull down the line. In the face of market fluctuations, no one can guarantee that they will make money, and the elderly can not force them to get income from pulling new people

bitcoin or other digital currency does not belong to any person or organization. It is an uncontrolled and decentralized program. The code is fully developed, and the total amount cannot be modified or destroyed

3. A secure and reliable digital wallet should be designed from at least five dimensions:
1. Security risk of running environment
the core file of encrypted digital currency Wallet - private key / mnemonics is stored on the terminal device, whether it is PC or mobile terminal, if the terminal device appears unsafe phenomenon, There is a very high security risk for the private key / mnemonic
at the beginning of design, a secure digital wallet can avoid the possibility of private key / mnemonics being stolen e to the running environment. The security problems of the running environment on the terminal mainly include virus software, operating system vulnerabilities and hardware vulnerabilities
2. The security risk of network transmission
the security of network transmission is more reflected in the ability to resist man in the middle attack. Man in the middle attack means that the attacker creates independent contact with both ends of the communication and exchanges the data they receive, so that both ends of the communication think that they are talking directly with each other through a private connection, but in fact the whole conversation is completely controlled by the attacker
although most digital wallet applications use the HTTPS protocol to communicate with the server, the man in the middle attack method is to get the content of the HTTPS protocol by installing a digital certificate in the user terminal
a secure digital wallet needs to be able to scan the legality of all the digital certificates in the terminal, check the proxy settings in the network transmission process, and ensure the security of the basic network communication environment
in the development of digital wallet, whether to use two-way verification for communication verification at the network transmission level is also an important criterion to measure the security of a digital wallet application
3. The security risk of file storage mode
for the private key / mnemonics of digital wallet, the storage mode of terminal device also needs to be paid attention to in the security design. The access right of private key / mnemonic file directory, the form of private key / mnemonic file storage and the design of encryption algorithm all need to be strictly designed
when we analyze the security of several mainstream digital wallets, we find that even the well-known digital wallets are random in the storage of private key / mnemonic words. There are both plaintext storage and encrypted storage, but the decryption key is fixed in the code, which can not play any role in security defense
4. The security risk of the application itself
the security risk of the application itself mainly focuses on the security defense of the application installation package itself
whether the application installation package has the ability of anti tampering is a very core technical ability. In addition, memory security, anti debugging ability, life cycle management of private key / mnemonics, security of debugging log and security of development process also need to be enhanced
5. Security risk of data backup
if the mobile application can be backed up, it can use the machine with more powerful computing performance to brutally crack the private key / mnemonics. For example, if android:allowBackup Property is set to allow backup, then the backup mechanism of the system can be used to back up the application data files, and the private key / mnemonics of the encrypted digital currency will be backed up to the external media, which breaks the security boundary design of the operating system from another direction
for the majority of users, the security of digital wallet also means the security of wealth, so we must be careful when choosing digital wallet
I have used several wallets such as coin letter socoin and coinplus
in terms of personal experience, socoin and coinplus are very simple and easy to use. They are not only decentralized multi-functional cross chain digital currency wallets with social functions, but also integrate Multi Chain multi currency wallets, payment and settlement platform, currency trading platform, social groups, information market and other functions, which can meet almost all your needs for digital currency in one stop.
4. The original meaning of token is "token, signaling". Before Ethernet became the common protocol of LAN, IBM once pushed a LAN protocol, called token ring network. Each node in the network passes a token in turn, and only the node that gets the token can communicate. This token is actually a kind of right, or proof of rights and interests. With the popularity of the concept of blockchain and the emergence of Ethereum and its erc20 standard, anyone can issue a custom token based on Ethereum. It is a common practice that token is used as ICO in the market, so "token" is widely translated as "token" and accepted by people. However, token can represent any rights and interests, and proof is not limited to currency, so it is wrong to translate token into token. Token is a negotiable certificate of encrypted digital rights and interests.
5. Blockchain is the underlying technology of digital currency, and digital currency is the carrier of blockchain. Therefore, Singapore saiailin agricultural data alliance Co., Ltd. released bgaa, a digital currency with the full name of global agricultural ledger. We join the global agricultural association as an alliance chain, store the agricultural information in the global agricultural ledger bgaa, and form the bgaa token. So as to realize the automatic link of non-human mechanized data, broadcast consensus of the whole network, and achieve the information can not be tampered with
bgaa has not been listed in any exchange and has not been included in any platform, so we should pay attention to the risk of trading
6. It should be the digital currency coin purse appearance patent, it should be the design of a purse appearance.
7. Digital secret refers to others, one is virtual money on the network
8. Safe and reliable digital wallet should be designed from at least five dimensions:
1. Security risk of running environment
the core file of encrypted digital currency Wallet - private key / mnemonics is stored on the terminal device, whether it is PC or mobile terminal, if the terminal device appears unsafe phenomenon, it has a very high security risk for private key / mnemonics
at the beginning of design, a secure digital wallet can avoid the possibility of private key / mnemonics being stolen e to the running environment. The security problems of the running environment on the terminal mainly include virus software, operating system vulnerabilities and hardware vulnerabilities
2. The security risk of network transmission
the security of network transmission is more reflected in the ability to resist man in the middle attack. Man in the middle attack means that the attacker creates independent contact with both ends of the communication and exchanges the data they receive, so that both ends of the communication think that they are talking directly with each other through a private connection, but in fact the whole conversation is completely controlled by the attacker
although most digital wallet applications use the HTTPS protocol to communicate with the server, the man in the middle attack method is to get the content of the HTTPS protocol by installing a digital certificate in the user terminal
a secure digital wallet needs to be able to scan the legality of all the digital certificates in the terminal, check the proxy settings in the network transmission process, and ensure the security of the basic network communication environment
in the development of digital wallet, whether to use two-way verification for communication verification at the network transmission level is also an important criterion to measure the security of a digital wallet application
3. The security risk of file storage mode
for the private key / mnemonics of digital wallet, the storage mode of terminal device also needs to be paid attention to in the security design. The access right of private key / mnemonic file directory, the form of private key / mnemonic file storage and the design of encryption algorithm all need to be strictly designed
when we analyze the security of several mainstream digital wallets, we find that even the well-known digital wallets are random in the storage of private key / mnemonic words. There are both plaintext storage and encrypted storage, but the decryption key is fixed in the code, which can not play any role in security defense
4. The security risk of the application itself
the security risk of the application itself mainly focuses on the security defense of the application installation package itself
whether the application installation package has the ability of anti tampering is a very core technical ability. In addition, memory security, anti debugging ability, life cycle management of private key / mnemonics, security of debugging log and security of development process also need to be enhanced
5. Security risk of data backup
if the mobile application can be backed up, it can use the machine with more powerful computing performance to brutally crack the private key / mnemonics. For example, if android:allowBackup Property is set to allow backup, then the backup mechanism of the system can be used to back up the application data files, and the private key / mnemonics of the encrypted digital currency will be backed up to the external media, which breaks the security boundary design of the operating system from another direction
for the majority of users, the security of digital wallet also means the security of wealth, so we must be careful when choosing digital wallet.
9. Btok is a kind of digital currency existing in the Internet
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750