A supermarket in Beijing accepts virtual currency
According to the news on February 10, 2018, on September 4, 2017, seven ministries and commissions of the people's Republic of China issued the notice on preventing the financing risk of token issuance, which regulates the issuance of tokens. In the notice, the nature of all kinds of tokens and "virtual currency" is clearly defined: it is not issued by the monetary authority, and it has no monetary attributes such as legal compensation and mandatory, It does not have the same legal status as currency and cannot and should not be used as currency in the market. Nevertheless, it is undeniable that all kinds of "virtual currency" still have a certain property value and are part of the property of the holder. So, how to identify the nature of the theft of such tokens
In order to protect the legitimate rights and interests of "virtual token" holders, the author intends to discuss such issues through a relevant news report and relevant casesstealing bitcoin
recently, a news report said that Haidian police in Beijing cracked a case of destroying computer information system. The suspect Zhong used his administrator's authority to modify the company's computer applications and steal 100 bitcoins. Before he could sell the stolen money, Zhong was arrested by the police. At present, Zhong was detained for the crime of destroying computer information system
it can be seen from the report that the police detained the perpetrator for stealing bitcoin on suspicion of damaging the computer information system. The crime of destroying the computer information system stipulated in Article 286 of the criminal law of our country refers to the act of deleting, modifying, adding or interfering with the functions of the computer information system in violation of the provisions of the state, resulting in the abnormal operation of the computer information system and serious consequences, or deleting, modifying or interfering with the data and application programs stored, processed or transmitted in the computer information system Modifying or adding operations with serious consequences, or deliberately making or spreading destructive programs such as computer viruses, which affect the normal operation of the computer system with serious consequences
In the author's opinion, this crime is one of the crimes of impairing social management order in Chapter 6 of the criminal law, that is, the legal interest protected by this crime is actually the public order of our society, not the property interests of the digital currency holders, which in fact denies the property value of digital currency, It is only protected as a data or system function in a computer system. The author thinks that there is some irrationality in this wayfirst of all, in the notice on the prevention of bitcoin risk issued in 2013, it is mentioned that bitcoin is not a real currency because it is not issued by the monetary authority and does not have such monetary attributes as legal compensation and compulsion. Bitcoin has four main characteristics: no centralized issuers, limited amount, no geographical restrictions and anonymity. Because it belongs to a specific virtual commodity in nature The notice also clearly mentioned that bitcoin does not have the same legal status as currency and should not be used as currency in the market. However, as a virtual commodity, the property value behind bitcoin cannot be ignored
Secondly, Article 127 of the general provisions of the civil law, which came into effect on October 1 last year, stipulates that if the law has provisions on the protection of data and network virtual property, such provisions shall prevail. Although only the protection of the network virtual property has made the principle provisions, but it can not be denied that this shows our country's attitude towards the protection of the network virtual property. Although there is no special law for the protection of data and network virtual property in China, from the perspective of the general provisions of civil law, it is predicted that there will be relevant legislation in the futurefinally, from the relevant cases, we can also see the recognition of the property attribute of virtual currency such as bitcoin in China's judicial practice. In April and may 2013, Liu premeditated to set up a bitcoin trading platform, so he recruited Jin and Huang (both sentenced) to jointly set up a "bitcoin" trading platform. During this period, Liu, Huang, Jin, Jin and the defendant he, in addition to other acts of directly stealing customers' funds, also frequently cashed RMB by selling customers' bitcoins, and transferred 120 bitcoins from the website. Finally, the court convicted and punished the defendant for fraud, and the bitcoin transferred by the defendant was also included in the property loss of the victim. Therefore, from the judicial cases, we can also get the recognition of the property attributes of virtual currency such as bitcoin
based on the above reasons, the author thinks that it may be unreasonable to regulate the theft of virtual currency only as the crime of damaging computer information system. We should face up to the hidden property value and consider the application of the crime of infringing property in China's criminal law. Only in this way can we effectively protect the legitimate rights and property of digital currency holders in China
2. Stops: old market, Xiaoma crossing, Kehua crossing, Qianqing, Yaqian, Yangxunqiao crossing, huamucheng, Binjiang campus, hupaolu zoo, yanggongdi, Shuguang Road, Huanglong tourism distribution center
Third, put the vehicle into operation. In the first phase, 10 high-end air-conditioned vehicles were put into use in Shaoxing County and Hangzhou
you can also take a bus from Keqiao to Hangzhou east bus station, and then take bus 317 to Binjiang
Bitcoin (bitcoin: bitcoin) is a kind of network virtual currency, which can buy real-life goods. It is characterized by decentralization, anonymity, and can only be used in the digital world. It does not belong to any country or financial institution, and is not subject to geographical restrictions. It can be exchanged anywhere in the world. Therefore, it is used as a money laundering tool by some criminals. In 2013, the U.S. government recognized the legal status of bitcoin, making the price of bitcoin soar. In China, on November 19, 2013, a bitcoin was equivalent to 6989 yuan
on January 7, 2014, Taobao announced that it would ban the sale of Internet virtual currencies such as bitcoin and lightcoin from January 14. On February 26, 2014, Democratic Senator Joe Manchin of West Virginia issued an open letter to several regulatory departments of the federal government of the United States, hoping that relevant institutions would pay attention to the status quo of bitcoin encouraging illegal activities and disrupting the financial order, and demanded that actions be taken as soon as possible to completely ban the electronic currency. On January 11, 2017), the Shanghai headquarters of the people's Bank of China and the Shanghai Municipal Finance Office carried out on-site inspection of bitcoin China, focusing on whether the enterprise carried out credit, payment, exchange and other related businesses without permission or license; Implementation of anti money laundering system; Fund security risks, etc. On January 12, 2017, the business management department of the people's Bank of China also entered the trading platforms such as "fire coin net" and "currency bank" in Beijing
on May 12, 2017, a global outbreak of bitcoin virus madly attacked public and commercial systems! Nearly 74 countries in the world have been seriously attacked
from August 1, 2017, global bitcoin trading platform will suspend recharge and withdrawal services. Bitcoin China digital asset trading platform will stop new user registration on September 14, and all trading businesses will be stopped on September 30
just look at it. However, there are few reports on virtual currency, most of which are fraud. In the mainstream currency circle, it is often called digital currency. Digital currency is often reported. Recently, European crowdfunding is crowdfunding for the journey to the West.
Beijing's Chaoyang District issued a document banning any venue from hosting virtual currency promotion activities, the daily said on August 23. Fengtai District Financial Office of the coordination section of the relevant people confirmed to the financial Associated Press, Beijing to the area of shopping malls, office buildings, hotels and other places, issued a red headed document, asked not to undertake any virtual currency promotion and propaganda activities“ According to the unified requirements of Beijing Municipality, all district financial offices have issued notices to relevant units and streets in the early stage
previously, it was reported that the office of the leading group for financial risk prevention and control in Chaoyang District issued a red headed document to the shopping malls, office buildings, hotels and other places under its jurisdiction, requiring that it should not undertake any virtual currency promotion and propaganda activities
The second type is the special currency issued by the portal website or instant messaging tool service provider to purchase the services in the website. The most widely used is Tencent's q-coin, which can be used to purchase membership, QQ show and other value-added services. There is no exchange relationship between these virtual currencies and legal currencies, and they can only be obtained and used in the online communitythe third kind of virtual currency on the Internet
such as bitcoin (BTC), Wright money (LTC), etc. bitcoin is an electronic currency proced by open-source P2P software. Some people also translate bitcoin as "bitcoin", which is a kind of network virtual currency. It is mainly used for Internet financial investment, and can also be directly used in daily life as a new currency. These virtual currencies can be exchanged with legal tender, and can also be used to purchase virtual and real goods or services
1) efficient and scalable performance
borderless system realizes over 100000 times / s batch transfer
high performance blockchain technology is necessary for cryptocurrency and smart contract platform, and can provide a solution that may replace the existing financial platform for the instry. In order to be able to process more transactions per second than visa and MasterCard, unbounded redesign starts from the bottom. Through the share authorization mechanism, the unbounded network can confirm more than 100000 transfer transactions in an average of one second
overview of borderless system architecture. The Lmax can process up to 6 million transactions per second. The key point of unbounded learning from its technology, As follows:
A) put everything in memory
b) put the core business logic in a single thread
C) put the encryption algorithm operation (hash and signature) outside the core business logic
d) divide the verification operation into state independent and state dependent checking
e) use an object-oriented data model
by following these simple rules, Unbounded can process 100000 transfers per second without disruptive optimization. If there is further optimization work, unbounded can achieve the performance similar to that of Lmax exchange (i.e. 6 million times per second). It should be noted that unbounded performance is highly dependent on one of the compatible transaction protocols. If you want to use business logic to run on a virtual machine that operates encryption algorithm and calls all objects with hash identifier, it is impossible to achieve the same level of performance. Blockchain is inherently single threaded, and the performance of single core CPU is one of the most scarce and difficult to expand. Unbounded technical logic can make the single thread execution highly efficient
endorsement of core business of borderless system
blockchain is a global account book that determines to modify a shared global state transaction. The orders contained in these transactions can change the validity of other transactions. For example, you cannot withdraw money from your bank account before the deposit of your check takes effect. You can't know if a transaction is valid until all previous transactions that can affect a particular account are processed. If two unrelated accounts do not share any common dependency, theoretically, the transactions between the two accounts can be processed at the same time. In fact, it's tricky to identify which transactions are truly independent on a smart contract driven ledger with arbitration conditions. The only way to ensure that the two transactions are truly independent is by maintaining a completely separate ledger and then transferring value between them on a regular basis. If we want to use this kind of performance tradeoff to compare, it can be like the relationship between non-uniform memory access (NUMA) and uniform memory access (UMA). In fact, the consistent memory access architecture is easier for developers to design, and the cost is lower. Inconsistent memory access architecture is usually used as a last resort when building supercomputers and large computer clusters. The computer instry has graally realized that it is not as easy to achieve performance expansion through parallel computing as it was in the early days. After all, the most important thing to do at that time was to increase the frequency of the processor. It is for this reason that processor designers are trying to improve the performance of single thread before trying to use multi thread settings. When multithreading is not enough, and only in this way, cluster computing will be considered
many people in the cryptocurrency instry try to solve the problem of scalability by cluster computing before exploring what can be achieved by a single core of a computer technically
2) Lmax disruptor decomposer technology
Lmax decomposer provides a learning example of what can be achieved on a single thread. Lmax is a trading platform for end customers with the goal of becoming the fastest exchange in the world. They have been very generous in publishing what they have learned<
overview of Lmax architecture:
business logic processor is where all sequential transactions and order matching occur. It is a single thread that can process millions of orders per second. This architecture can be easily used in the field of cryptocurrency and blockchain design. The role of the input resolver is to collect orders from many users from different sources and assign them to a certain order. When the order is assigned to them, they are copied, recorded and broadcast to many rendant business logic processors. The input resolver is highly parallel and can be easily sub contracted into a computer cluster system. When the business logic processor has finished processing the input, an output resolver is responsible for informing those who care about the result. This is also a highly parallel task. Finally, by using a single threaded sample processor and Java virtual machine in the business logic processor, Lmax can execute 6 million transactions per second. If Lmax can achieve this goal, then cryptocurrency and smart contract platform do not need to consider the cluster network solution under the condition of less than 10 transactions per second. High performance blockchain
to build a high-performance blockchain, we need to use the same technology as Lmax. Here are a few things that must be done: put everything in memory, avoid synchronization primitives (locking, atomic operations), and avoid unnecessary calculations on business logic processors. Because memory is designed to be highly parallel, it's getting cheaper. The amount of data needed to track everyone's account balance and permissions on the Internet can be stored in less than 1TB of ram, which can be purchased for less than $15000, and can be installed on the commercialized (high-end) server motherboard. Before the system was adopted by 3 billion people, this kind of hardware would be seen in ordinary desktop computers. The real bottleneck is not the demand of memory capacity, but the demand of bandwidth. In the case of 1 million transactions per second and 256 bytes per transaction, the network will need 256MB of data per second, that is, 1GBIT / s bandwidth. Such bandwidth is not common on ordinary desktop computers. However, such bandwidth is only a little bit of the 100Gbit / s bandwidth of the second generation Internet. The second-generation Internet is available to more than 210 U.S. ecational institutions, 70 companies and 45 non-profit and government agencies
in other words, blockchain technology can easily keep everything in memory, and if properly designed, it can be extended to support millions of transfers per second
3) allocate ID and avoid hash calculation
in a single threaded system, processor cycle is a scarce resource that needs to be reserved. Traditional blockchain design uses hash calculation based on encryption algorithm to generate a unique global ID system, so as to ensure that there will be no collision statistically. The problem with these hashes is that they consume more and more memory and processor cycles. Compared with a direct array index, this method will significantly take up more processor time to find the records of an account. For example, 64 bit integers are easier to compare and operate than 160 bit IDs. A larger hash ID mechanism means less space in the CPU cache and more memory is needed. In the modern operating system, the ram which is not often accessed will be compressed, but the hash identifier is a random number, which cannot be compressed. The model blockchain gives us a way to assign unique IDs around the world. These IDS will not conflict with each other. Therefore, it completely avoids using the identifier based on hash algorithm like bitcoin address to refer to an account, balance or license
4) remove signature verification from the business logic processor
all transactions in the cryptocurrency network depend on the use of encryption algorithm signature to verify permissions. In most cases, the requested permissions can be changed by the results of other transactions. This means that in the business logic processor, permissions need to be defined as a case that has nothing to do with the calculation of encryption algorithm
to achieve this goal, all public keys need to be assigned a unique and irreplaceable ID. After the ID is assigned, the input resolver can verify whether the provided signature matches the specified ID. When the transaction arrives at the business logic processor, you just need to check the ID
the same technology can remove prerequisite checking on objects with irreplaceable static IDs
5) designing transactions for static verification
for transactions, there are many features that can be statically checked without referring to the current global state. These checks include parameter range checking, input de rendancy and array sorting. In general, there are a lot of checks that can be done if the transaction contains data that it "assumes" is global. After these checks are executed, the business logic processor has to make sure that these assumptions are correct. The process is to check the modification timestamp of an object reference related to the transaction signature time
6) smart contract
many blockchains are integrating a common scripting language to define all operations. These designs ultimately define the business logic processor as a virtual machine, and all transactions are defined as scripts run by the virtual machine. This solution has a single threaded performance limit on a real processor, and the problem is exacerbated by forcing everything to be executed through a virtual processor. A virtual processor will always be slower than a real processor even if it uses JIT, but the computing speed is not the only problem of this "everything is a script" scheme. When the transaction is defined at such a low level, it means that the static check and encryption algorithm operation will still be included in the business logic processing, which will also rece the overall throughput. A script engine should never ask to perform a signature checking request for an encryption algorithm, even if the request is implemented through a native mechanism
according to the course we learned from Lmax, we know that a virtual machine designed for blockchain should consider single thread performance. This means that compiler optimization should be implemented at the beginning, and the most commonly used smart contracts should be natively supported by blockchain, while only those rarely used and customized contracts will run on a virtual machine. These custom contracts are designed with performance in mind, which means that the virtual machine should limit the range of memory that can be accessed to a level that can be placed on the processor cache
7) object oriented data schema
in memory