There is no evidence to steal virtual currency
According to the news on February 10, 2018, on September 4, 2017, seven ministries and commissions of the people's Republic of China issued the notice on preventing the financing risk of token issuance, which regulates the issuance of tokens. In the notice, the nature of all kinds of tokens and "virtual currency" is clearly defined: it is not issued by the monetary authority, and it has no monetary attributes such as legal compensation and mandatory, It does not have the same legal status as currency and cannot and should not be used as currency in the market. Nevertheless, it is undeniable that all kinds of "virtual currency" still have a certain property value and are part of the property of the holder. So, how to identify the nature of the theft of such tokens
In order to protect the legitimate rights and interests of "virtual token" holders, the author intends to discuss such issues through a relevant news report and relevant casesstealing bitcoin
recently, a news report said that Haidian police in Beijing cracked a case of destroying computer information system. The suspect Zhong used his administrator's authority to modify the company's computer applications and steal 100 bitcoins. Before he could sell the stolen money, Zhong was arrested by the police. At present, Zhong was detained for the crime of destroying computer information system
it can be seen from the report that the police detained the perpetrator for stealing bitcoin on suspicion of damaging the computer information system. The crime of destroying the computer information system stipulated in Article 286 of the criminal law of our country refers to the act of deleting, modifying, adding or interfering with the functions of the computer information system in violation of the provisions of the state, resulting in the abnormal operation of the computer information system and serious consequences, or deleting, modifying or interfering with the data and application programs stored, processed or transmitted in the computer information system Modifying or adding operations with serious consequences, or deliberately making or spreading destructive programs such as computer viruses, which affect the normal operation of the computer system with serious consequences
In the author's opinion, this crime is one of the crimes of impairing social management order in Chapter 6 of the criminal law, that is, the legal interest protected by this crime is actually the public order of our society, not the property interests of the digital currency holders, which in fact denies the property value of digital currency, It is only protected as a data or system function in a computer system. The author thinks that there is some irrationality in this wayfirst of all, in the notice on the prevention of bitcoin risk issued in 2013, it is mentioned that bitcoin is not a real currency because it is not issued by the monetary authority and does not have such monetary attributes as legal compensation and compulsion. Bitcoin has four main characteristics: no centralized issuers, limited amount, no geographical restrictions and anonymity. Because it belongs to a specific virtual commodity in nature The notice also clearly mentioned that bitcoin does not have the same legal status as currency and should not be used as currency in the market. However, as a virtual commodity, the property value behind bitcoin cannot be ignored
Secondly, Article 127 of the general provisions of the civil law, which came into effect on October 1 last year, stipulates that if the law has provisions on the protection of data and network virtual property, such provisions shall prevail. Although only the protection of the network virtual property has made the principle provisions, but it can not be denied that this shows our country's attitude towards the protection of the network virtual property. Although there is no special law for the protection of data and network virtual property in China, from the perspective of the general provisions of civil law, it is predicted that there will be relevant legislation in the futurefinally, from the relevant cases, we can also see the recognition of the property attribute of virtual currency such as bitcoin in China's judicial practice. In April and may 2013, Liu premeditated to set up a bitcoin trading platform, so he recruited Jin and Huang (both sentenced) to jointly set up a "bitcoin" trading platform. During this period, Liu, Huang, Jin, Jin and the defendant he, in addition to other acts of directly stealing customers' funds, also frequently cashed RMB by selling customers' bitcoins, and transferred 120 bitcoins from the website. Finally, the court convicted and punished the defendant for fraud, and the bitcoin transferred by the defendant was also included in the property loss of the victim. Therefore, from the judicial cases, we can also get the recognition of the property attributes of virtual currency such as bitcoin
based on the above reasons, the author thinks that it may be unreasonable to regulate the theft of virtual currency only as the crime of damaging computer information system. We should face up to the hidden property value and consider the application of the crime of infringing property in China's criminal law. Only in this way can we effectively protect the legitimate rights and property of digital currency holders in China
the most popular team of Dahan coin Ruide in the market
learned from the Xi'an Municipal Public Security Bureau's opening branch recently that the "3. 30" network hacker theft virtual currency case was broken down nearly half a year, and 3 suspect suspects were all arrested. The initial investigation found that the gang involved in the case reached 600 million yuan. p>
on March 30, 2018, the economic development branch of Xi'an Public Security Bureau received an alarm from the victim Zhang, claiming that his personal computer was suspected to have been illegally intruded, and a large number of virtual currencies such as bitcoin and Ethereum were looted, with a market value of over 100 million yuan. The Municipal Public Security Bureau quickly set up a special group to carry out the detection work P>
has been examined by the 3 suspects as hacker. Many illegal gains have been obtained through illegal invasion, control of company's enterprise and personal network system, and the amount of suspect involved has reached 600 million yuan. At present, the case is still under further investigation
in the form of game fraud, game account theft, etc
Rtx3080 was launched on September 24, and the time for lifting the ban has yet to be determined
There will be multiple versions of rtx3080, including 10g and 20g versions. The core specifications are the same. Rtx3080ti has 24g video memory, which is amazing. Rtx3080 will be 20% ahead of rtx2080ti. The specification of rtx3080 identified by gpu-z is unknown, and the maximum limit frequency is 2.1GHz, but it is not acceleration frequency. In fact, rtx20 series is also similar
the gddr6x video memory with matching frequency of 4750mhz has a capacity of 10Gb. The total bandwidth is 760gb / s, which is 53% higher than that of rtx2080super
{rrrrrrr}
extended data:
precautions:
the power consumption of rtx30 Series graphics card is greatly improved, reaching more than 300W, which means higher requirements for power supply
Generally speaking, power consumption = graphics card power consumption + CPU power consumption + other hardware power consumption (60w-120w, depending on the number and total power consumption of other hardware, note that TDP is not equal to power consumption) The frequency of 4266mhz is 16% higher than 3200mhz. Although memory is very important to improve the performance of graphics card, the influence of memory on performance can not be ignored
bus line: Metro Line 2, the whole journey is about 28.5km
1. Take Metro Line 2 from Hongqiao Railway Station, pass 17 stations, and reach Longyang Road Station
2. Walk about 930m to Shanghai New International Expo Center