Summary of digital currency security
Yin Zhentao, deputy director of the law and Finance Research Office of the Financial Research Institute of the Chinese Academy of Social Sciences, said that digital currency faces two risks. The first is the technical level. Digital currency relies on blockchain technology and a system, which will make it suffer from security impact, such as hacker attacks on computer systems. We have seen many practical problems in this process
Zhao Zhanzhan, a special researcher of intellectual property research center of China University of political science and law, believes that digital currency has anonymity, quickness and irrevocability. In addition, bitcoin and other digital currencies have high circulation in the world, so many criminals use digital currency as a new money laundering channel. Moreover, there are many different ways to realize money laundering through digital currency. Generally speaking, the probability of new money laundering being found and investigated is lower than before. Many countries have no effective means and technology to combat money laundering through digital currency. These factors lead to criminals prefer this way of money laundering
digital currency is a kind of unregulated and digital currency, which is usually issued and managed by developers and accepted and used by members of specific virtual communities. The European Banking authority defines virtual currency as a digital representation of value, which is not issued by the central bank or authorities, nor linked with legal currency. However, because it is accepted by the public, it can be used as a means of payment, or it can be transferred, stored or traded in electronic form
according to the notice on preventing the financing risk of token issuance, there is no approved digital currency trading platform in China. According to China's digital currency regulatory framework, investors have the freedom to participate in digital currency transactions at their own risk
warm tips: the above information is for reference only. Before investing, it is recommended that you first understand the risks existing in the project, and understand the investors, investment institutions, chain activity and other information of the project, rather than blindly investing or mistakenly entering the capital market. Investment is risky, so we should be cautious when entering the market
response time: December 11, 2020. Please refer to the official website of Ping An Bank for the latest business changes
[Ping An Bank I know] want to know more? Come and see "Ping An Bank I know" ~
https://b.pingan.com.cn/paim/iknow/index.html
bitcoin can exist only because both sides of the transaction recognize its transaction value, so anyone can design virtual currency independently. Ars technica, for example, announced this week that it would create its own cryptocurrency, arscoin[ 2]
Cohen believes that the main threat to digital cryptocurrency is how to keep it safely, and the loss of mt.gox bitcoin once again highlights this problem. Recently, the US Congress has also launched a debate on digital cryptocurrency. Some members believe that the supervision of the bitcoin should be strengthened to avoid risks. Another congressman, Jared polis, believes that the US dollar has similar defects to bitcoin, so if bitcoin is banned, then the US dollar note should also be banned[ 2]
digital currency has a short history of development in the world, but it develops rapidly. Many countries are trying to sum up experiences and lessons through official or non-governmental efforts.
With the advent of digital currency, the encryption algorithm of currency is becoming more and more important. What are the types of passwords
classical cipher types mainly include transposition cipher and rearrangement of alphabetic order messages. For example, "Hello world" becomes "ehlol owrdl"
Diffie Hellman and RSA algorithms have been widely used except for the first public example of high quality public key algorithms. Other asymmetric key algorithms include Cramer schup cryptosystem, ElGamal encryption and various elliptic curve techniquessome well-known cryptosystems include RSA encryption, Schnorr Signature, El Gamal encryption, PGP and so on. More complex password systems include e-cash system, signcryption system, etc. Now more cryptosystems include interactive proof systems, such as zero knowledge proof, which is used for secret sharing
for a long time, information collection and law enforcement agencies have been interested in cryptography. The importance of secret communication is self-evident. Because cryptography promotes privacy protection, it also attracts great interest of cryptography supporters. Therefore, there is a history of controversial legal issues around cryptography, especially since the emergence of cheap computers makes it possible to widely use high-quality cryptography
nowadays, cryptocurrency transactions are semi anonymous, which makes them very suitable for a series of illegal activities, such as money laundering and tax evasion. However, the proponents of cryptocurrency often attach great importance to the anonymity of digital currency and think that it can protect the privacy of users. Some cryptocurrencies are more private than others
Cryptocurrency is a new type of digital asset, which is based on the network distributed on a large number of computers. This decentralized structure enables them to exist outside the control of the government and central authorities. The term "cryptocurrency" also comes from the encryption technology used to protect the networkblockchain is an organization method to ensure the integrity of digital currency transaction data, and it is an important part of many cryptocurrencies. Many experts believe that blockchain and related technologies will subvert many instries, including finance and law. Cryptocurrencies have been criticized for many reasons, including their use for illegal activities, exchange rate fluctuations and the vulnerability of the infrastructure that underpins them. However, digital currency is also praised for its portability, divisibility, anti inflation and transparency
The contract transaction of digital currency is not safe. There are still many loopholes in the digital currency trading platform, for example, the most common ones are as follows:
1. Denial of service attack
denial of service attack is the most important attack against the digital currency trading platform at present. Through the denial of service attack, the attacker makes the trading platform unable to access normally, while the user cannot accurately distinguish the attack degree, It often leads to panic asset transfer, which brings some loss