Risk control measures of digital currency
very large
in the field of blockchain and virtual currency, such cases of losses caused by the security of exchanges occur frequently, causing great economic losses to users. The security experts of Juhui ggfx also gave a hint: there are still many loopholes in the current digital currency trading platform, for example, the most common are the following six kinds:
the first kind: denial of service attack
denial of service attack is the most important attack against the digital currency trading platform at present. Through denial of service attack, the attacker makes the trading platform unable to access normally, Because users can not accurately distinguish the degree of attack, it often causes panic asset transfer, which brings some loss
the second kind: phishing
even the best technical measures at present can not make the digital currency trading platform avoid phishing attacks. Some hackers and outlaws can confuse digital currency investors by means of fake domain names or fake pages, while ordinary investors can't identify the authenticity, so it's easy to cause asset losses
the third: Hot wallet protection
many digital currency trading platforms use a single private key to protect the hot wallet. If hackers can access a single private key, they can crack the hot wallet related to the private key. For example, in the attack on yapizon of Seoul stock exchange in 2017, the attackers stole hot wallets from the trading platform twice in a year, resulting in a total loss of nearly 50% of the assets of the trading platform and eventually leading to the bankruptcy of the trading platform
Fourth: internal attack
e to the lack of perfect risk isolation measures or ineffective supervision on the authority of employees, the digital currency trading platform also has employees' self-monitoring and stealing, and some employees with operating authority of the platform use internal trust to seek ill gotten gains for themselves. For example, in 2016, the event of employees stealing bitcoin on shapeshift caused a total loss of US $230000 to the trading platform by stealing and reselling sensitive information to others
the fifth: software vulnerability
the software vulnerability of digital currency trading platform includes single sign on vulnerability, OAuth protocol vulnerability, etc. At present, all countries have laws requiring banks or other financial institutions to implement information security measures to protect customers' deposits. However, e to the fact that the blockchain field is still in its infancy, there is a lack of such specifications for encrypting digital assets. Therefore, it is not accidental that many trading platforms have a large number of loopholes in the absence of security constraints
sixth: transaction malleability
Technical supporters of blockchain often think that blockchain transactions are highly secure because they are recorded on records that are said to be unchangeable, but each transaction needs to have a corresponding signature, and the records can be temporarily forged before the final confirmation of the transaction. Mt. GOx, which once accounted for 80% of the world's total transactions, was hacked to submit code changes to the public ledger before the initial transaction was released, resulting in a loss of 473 million US dollars< br /> 160;
but not all virtual currencies are illegal, and many of them are excellent, such as bitcoin, Ruitai coin, Laite coin and other mainstream digital cryptocurrencies.
The contract transaction of digital currency is not safe. There are still many loopholes in the digital currency trading platform, for example, the most common are the following six kinds:
1. Denial of service attack
denial of service attack is the most important attack against the digital currency trading platform at present. Through denial of service attack, the attacker makes the trading platform unable to access normally, Because users can not accurately distinguish the degree of attack, it often causes panic asset transfer, which brings some loss
2. Phishing incident
even the best technical measures at present can not make the digital currency trading platform avoid phishing attacks. Some hackers and criminals can confuse digital currency investors by means of fake domain names or fake pages, while ordinary investors can't identify the authenticity, so it's easy to cause asset losses
Many digital currency trading platforms use a single private key to protect the hot wallet. If hackers can access a single private key, they can crack the hot wallet related to the private key. For example, in the attack on yapizon of Seoul stock exchange in 2017, the attackers stole hot wallets from the trading platform twice in a year, resulting in a total loss of nearly 50% of the assets of the trading platform and eventually leading to the bankruptcy of the trading platform Fourth, e to the lack of perfect risk isolation measures, or ineffective supervision on the rights of employees, some employees who have the operation rights of the platform use internal trust to seek unjust wealth for themselves. For example, in 2016, the event of employees stealing bitcoin on shapeshift caused a total loss of US $230000 to the trading platform by stealing and reselling sensitive information to others Fifth, the software vulnerability of digital currency trading platform includes single sign on vulnerability, OAuth protocol vulnerability and so on. At present, all countries have laws requiring banks or other financial institutions to implement information security measures to protect customers' deposits. However, e to the fact that the blockchain field is still in its infancy, there is a lack of such specifications for encrypting digital assets. Therefore, it is not accidental that many trading platforms have a large number of loopholes in the absence of security constraints 6. Transaction malleability the technical supporters of blockchain often think that blockchain transactions are highly secure because they are recorded on records that are said to be unchangeable, but each transaction needs to have a corresponding signature, and the records can be forged temporarily before the final confirmation of the transaction
extended data:
rules of contract transaction
1. Transaction time
contract transaction is 7 * 24 hours transaction, which will be interrupted only ring the settlement or delivery period of 16:00 (UTC + 8) every Friday. In the last 10 minutes before delivery, the contract can only be closed, not opened
Transaction types are divided into two types, opening and closing. Opening and closing positions are divided into two directions: buying and selling:buying open long (bullish) refers to buying a certain number of contracts when users are bullish and bullish on the index. Carry out "buy open more" operation, match success will increase long position
selling pingo (multi order closing) refers to the selling contract that the user makes up for when he is no longer bullish on the future index, offsets with the current buying contract and exits the market. Carry on "sell flat much" operation, match after success, will rece long position
short selling (bearish) refers to the new sale of a certain number of certain contracts when the user is short or bearish on the index. Carry out the operation of "sell short" and increase the short position after successful matching
buy close (short single close) refers to the buy contract that the user will not be bearish on the future index market and make up for, offset with the current sell contract and exit the market. Carry out "buy short" operation, after matching successfully, short position will be reced
3. Order method
limit order: the user needs to specify the price and quantity of the order. Limit order can be used for opening and closing positions
order at opposite price: if you choose to order at opposite price, you can only enter the order quantity, not the order price. The system will read the latest competitor price at the moment of receiving the entrustment (if the user buys, the competitor price is the selling price of 1); If it is a sell, then the counter price is buy 1 price). Issue a price limit order for this counter price
4. Position
the user owns the position after opening and trading, and the positions in the same direction of the same contract will be merged. In a contract account, there can only be 6 positions at most, that is, multiple positions of current week contract, short positions of current week contract, multiple positions of next week contract, short positions of next week contract, multiple positions of quarterly contract and short positions of quarterly contract
5. Order restriction
the platform will restrict the number of single user's positions in a certain period of contract and the number of single open / close positions, so as to prevent users from manipulating the market
when the number of positions or entrustments of users is too large, the platform has the right to require users to take risk control measures, including but not limited to cancellation of orders, closing positions, etc. The platform has the right to adopt measures including but not limited to limiting the total number of positions, limiting the total number of consignments, limiting the opening of positions, withdrawing orders, forcibly closing positions, etc. for risk control
on the morning of February 25, 2014, Mt. GOx, the world's first exchange, stolen 744408 bitcoins in a major bitcoin theft case. According to the average price of bitcoin on the 28th day, it is equivalent to 475 million US dollars. Mt. GOx went bankrupt
on January 26, 2018, coincheck illegally removed about 260000 NEM holders at about 02:57 on that day, and then suspended some functions
on March 7, 2018, the world's second largest exchange, "coin on binance exchange". A large number of users' accounts were stolen. In the face of the hacker attack, this morning, coin an rolled back all abnormal transactions
the above lesson of xuelinlin tells us that no matter how big the exchange is, it can't guarantee the security of core assets and users' digital currency
next, I would like to say that it is safer to withdraw your digital currency to Epay blockchain wallet
Why do you say that< 1. Epay wallet adopts multiple encryption, offline cold storage
2. Bank and risk control system, anti money laundering system
3. Secured transactions are more secure, and it is the first encrypted digital wallet supporting secured transactions in the world
Epay wallet is a digital currency encrypted wallet developed by Epay global payment, and Epay global payment is the best payment channel of global cryptocurrency, The official partner of tether and the world's largest usdt charging platform account for more than 80% of the total usdt, and it is the first digital currency wallet in the world to support the top five legal currencies. Epay global payment was established in 2014 with a registered capital of 200 million yuan. Epay global payment integrates the latest blockchain technology and e-wallet to provide convenient and flexible e-payment, global bank wire transfer, payment gateway and other services for global users with a series of advantages such as diversified payment methods, low cost, high security and trust.
The contract transaction of digital currency is not safe. There are still many loopholes in the digital currency trading platform, for example, the most common ones are as follows:
1. Denial of service attack
denial of service attack is the most important attack against the digital currency trading platform at present. Through the denial of service attack, the attacker makes the trading platform unable to access normally, while the user cannot accurately distinguish the attack degree, It often leads to panic asset transfer, which brings some loss
Second, do not rule out your system problems, if the above still can not be solved, it is recommended that you pay attention to listen to whether the host will make a long or short sound when you start the machine, if so, there may be problems with other hardware, if not, it is recommended to re install the system
personally, I don't think one of them is more likely! Because I also have a computer like this!