为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

区块链说白了,区块链小白

发布时间:2023-12-06-05:50:00 来源:网络 区块链知识 区块   帽子

区块链说白了,区块链小白


请查看相关英文文档

❶ I can’t forget, the group of people who lived the most tiring lives in 2018

There are many turmoils in the world, and the boat may be lost.

For some industries, companies and public figures in the industry, 2018 was quite uncomfortable. They were placed at the forefront of public opinion and placed at the critical point of life and death.

This year, Bitcoin plummeted and P2P platforms exploded, causing heavy losses to investors;

This year, public figures in the industry continued to receive negative news, and were even involved in "peach scandals" "Haunted.

With the arrival of 2019, I hope that more companies and more people will be able to make steady progress and enjoy success in the world.

The "leeks" were almost cut off after the Bitcoin crash

Killing style

Crazy magic stick method

"The Legend of the Condor Heroes" The martial arts in the game are extremely powerful and can cause huge damage. The encrypted digital currency bubble burst, dragging small miners, currency buyers, and related startups into the bubble, and no one was spared.

One thought is heaven, the other thought is hell.

On December 17, 2017, the moment when the price of the Bitcoin trading platform Bitstamp was fixed at $19,664, it was a shot that was replayed by countless people. A year later, on December 17, 2018, the price of Bitcoin was only $3,700, after previously falling below $3,200.

Guo Yu’s (pseudonym) small mine cannot be sold. In mid-2017, he spent more than 300,000 yuan to buy 30 mining machines and "joined" the Bitcoin mining army. However, the good times only lasted half a year. At the beginning of 2018, the price of Bitcoin began to decline. On June 24, Bitcoin fell below 6,000 US dollars. This is a recognized "life and death line" for mining farms. Below it, miners will have to pay electricity bills. Neither can afford it. Guo Yu pressed the "off button", but he still had a glimmer of hope. Maybe one day Bitcoin would come back to life and the mine could continue to operate. Until recently, when Bitcoin fell below $3,200, it was completely "in the cold". However, the mining machines that were so popular at the time are now no longer interested.

The prospect of Bitmain’s listing is unclear. On September 26, Bitmain officially disclosed its prospectus on the Hong Kong Stock Exchange. In 2018, when Bitcoin has been on a downward trend, it is obviously not a good time for the world's largest Bitcoin mining equipment supplier to go public. Three months have passed, and the Hong Kong Stock Exchange has not given a hearing time. There are still three months until the listing application expires. The so-called "invalidation" means that the company failed to pass the hearing within the 6-month effective review period after submitting the listing materials. Judging from the prospectus information, 90% of its revenue still comes from the mining machine business.

When there are more and more mine owners like Guo Yu, whether the mining machine business can support Bitmain’s valuation, whether it is appropriate to go public, and the sustainability of the business after the listing are all heavily concerned. question mark. The latest "rumor" is that the Hong Kong Stock ExchangeIt is believed that it would be premature for any cryptocurrency trading platform or business related to the industry to raise funds through an IPO in Hong Kong until an appropriate regulatory framework is in place.

Aunt Peng lost all her coins. As an active "lead dancer" in the square, Aunt Peng has been at the forefront of trends since she was young. In 2017, Aunt Peng started speculating in coins. Because Bitcoin was too expensive, she bought those "altcoins." Although domestic ICOs are banned, there are still many unknown projects in the QQ group. Aunt Peng mingled among them and bought a bunch of various coins. Unknowingly, she invested hundreds of thousands in them. At one time, the book value exceeded two million, but After the “bloodbath” in 2018, only tens of thousands of yuan and a lot of “dead coins” with no trading volume were realized.

What is the bubble bigger than "Bitcoin"? Other cryptocurrencies.

Gustave Le Bon analyzed group psychology in this way in "The Crowd": Highly intelligent people with independent opinions will lose their ability to think once they join a group and become impulsive, impatient, fanatical, and extreme , completely controlled by the unconscious, losing moral judgment, but gaining great power. "Blockchain leek" is the most suitable annotation for the mob in 2018. Those "big guys" who shouted for everyone to get on the bus at the beginning of 2018 quietly got off the bus. Bitcointalk statistics show that 4 years ago, the number of address accounts with more than 100,000 Bitcoins in the world was 70, and now there are only 5 left. indivual. As of the first half of 2018, there have been more than 1,000 failed blockchain ICO projects. After the craze, there are only feathers left.

Ten years after its birth, Bitcoin has fallen from the altar of belief. Every penny of currency prices pushed up by speculative mania, and every hard fork led by a certain mining machine manufacturer, are departures from Satoshi Nakamoto's ideals of "freedom, equality, decentralization" and "borderless currency equality" , the original intention of "changing the world", to put it bluntly, is the belief in "one coin, one villa".

However, after the bubble bursts, the power of Bitcoin, especially the blockchain, cannot be underestimated.

The future of mankind has the possibility of a turning point after the emergence of artificial intelligence. The biggest difference brought by algorithms is that data will become the only element in understanding and managing the world. Even so-called human rationality will still It may be mastered by algorithms. This is the "data hegemony" mentioned by Harari in "A Brief History of Today", and blockchain is an important means for ensuring data security and cannot be tampered with.

It is foreseeable that in the remaining 80 years of the 21st century, peer-to-peer blockchain networks and cryptocurrencies such as Bitcoin will still impact the traditional monetary system, and the Bitcoin "bubble" may It will be blown up again, and whether you accept it or not, it has reserved its own place in the history books.

Internet Finance’s thunderous escape has left the trillion-dollar market “cool”

Killing Style

Thousands of Spiders and Thousands of Poisonous Hands

An extremely dangerous martial art that causes practitioners unbearable pain and brings great harm to themselves. Whether it is P2P or cash loans, the mutual finance industry has continued to have problems in 2018. After experiencing the initial brutal growth, it was even more injured in 2018.

In the second half of 2017, China's Internet financial industry was in full swing. Four mutual financial companies even landed on the US stock market within a month. Later, more mutual financial companies expressed their intention to go to the US for IPOs. It seems that going public is as easy as strolling through your own back garden. Unfortunately, the good times did not last long.

In May 2018, the online loan boom began, and platforms fell one after another like dominoes. In June, 13 problematic platforms were exposed. Qianbao.com, Yatang Finance, Tang Xiaoseng, and Lianbi Finance were exposed one after another, and panic spread. By the end of August, there were 264 platforms that had experienced thunderstorms, lost contact, or gone missing.

The thunderstorm has had a huge impact on the P2P online lending industry. Mutual financial associations in various places have made intensive voices, requiring all P2P platforms to communicate well with platform lenders and effectively protect the legitimate rights and interests of lenders. At the same time, in view of the fact that some borrowers took advantage of the situation and deliberately failed to repay when due, taking the opportunity to escape their repayment obligations, the Office of the Leading Group for the Special Rectification of Internet Financial Risks (hereinafter referred to as the Special Rectification Office of Mutual Finance) issued a special document requesting the platform to remove P2P "laoguai" After reporting the credit report, he later issued a document stating that he would severely crack down on online loan platforms that maliciously withdraw, arrest fugitives, and strictly prohibit new online loan institutions.

According to statistics from Wangdaizhijia, as of the end of November 2018, the cumulative number of closures and problematic platforms in the online lending industry reached 5,245. The cumulative number of investors involved in the problematic platforms in history was approximately 2.009 million, involving loans. The balance is approximately 161.25 billion yuan.

In just one year, P2P online lending has changed from an innovative model to a "street rat". There are many reasons, such as: the platform's poor risk control capabilities and the incomplete mutual finance legal system, resulting in high overdue risks on the platform. ; The platform develops illegally, and investors are not qualified investors that should be matched.

The chaos in the industry has caused the mutual fund-related Chinese concept stocks that have been rushing to be listed to perform poorly in the capital market. When P2P risks broke out in 2018, the stock prices of many P2P companies collectively "dive". In the past 10 trading days in July 2018, the market value of mutual financial companies listed in the United States evaporated by more than US$3.2 billion. According to incomplete statistics, by mid-December, 9 of the 13 mutual financial companies listed in the United States had fallen below the issue price, and the stock prices of many of them had fallen by more than 70% compared with the beginning of the year.

The continued downturn in concept stocks in the mutual finance industry has prompted many listed platforms to resort to buybacks of equity, including Qudian, Hexindai, Paipaidai, Yirendai, and Xinerfu wait.

The repurchase plan of the mutual financial platform may boost investor confidence in the short term, but in the long run, the fundamental way out for the mutual financial industry is to develop in compliance with regulations.

Nowadays, many platforms are undergoing transformation, "shifting" to fields such as large-amount installments, online installment shopping malls, and offline consumer finance. However, there are still chaos among them, such as hidden charges, chaotic credit reporting, and even illegal activities. Molecules use it as a tool for cashing out. For the platform, only by not forgetting the past can we better face the future.

In the cold winter of capital, both entrepreneurs and investors are “poor pockets”

Killing style

Boundless falling wood

Linghu Chong’s martial arts moves, Countless fallen trees danced together with the shadow of the sword into a strong whirlwind, and everything that swept through was desolate. This year, both entrepreneurs and investors are in a situation of lack of money, and there is no place to talk about it.

In 2018, a capital winter, all investment institutions chose the "cash is king" strategy. The macro market was short of money, and the market segments were also short of money. Most start-up companies are in a state of "insufficient balance". Entrepreneurs at the end of the food chain may be the group of people who have the hardest time in 2018. Everyone is trapped in a vicious circle: they are poor and busy, and the busier they are, the "poorer" they become.

In the final analysis, blindly chasing trends and insufficient "self-generating ability" are the reasons why most start-up companies fail. At the beginning of the year, the hottest topic was blockchain. Blockchain games, blockchain media, and even blockchain hotpot restaurants were all starting to catch fire. However, this bubble burst too quickly. Deloitte investigated the world’s largest social programming and code There are nearly 86,000 blockchain projects on the hosting website Github, and only about 5% of them are alive today. Naked swimmers in the blockchain circle have appeared one after another due to setups to run away and internal strife, and countless companies have died. Immediately afterwards, P2P thunderstorms, long-term rental apartments exploded, online education mergers and acquisitions, Internet home decoration reshuffle, shared bicycles encountered difficulties and other events occurred, and the entrepreneurial trend became a "life and death critical".

However, life is not easy for investment institutions. In the past, they had "full pockets", but they encountered difficulties in raising funds in 2018 because LPs (limited partners) also lacked money. People and major shareholders were eventually liquidated due to equity pledges. In 2018, the A-share market was filled with such stories.

According to statistics from Zero2IPO Research Center, the total amount of funds raised in China's equity investment market in the first half of 2018 was approximately 380 billion, a year-on-year decrease of 55.8%, almost halved.

Why was the fundraising environment so difficult in 2018? P2P has set off a thunderstorm like dominoes. It is difficult to register private equity funds. The entire investment market is like a deflated rubber ball. It has lost confidence and has begun to advocate "cash is king". Looking further, China has not formed a long-term LP market. Currently, LPs are mainly composed of private enterprises and individuals, and the increasing downward pressure on the economy has a great impact on it. The general environment of the capital market is that it is difficult to exit, the yield is low, and the principal invested a few years ago cannot be recovered.

Investment institutions began to seek longer-termMoney, including social security funds, pension funds, insurance funds and other funds, can tolerate a longer investment period and exit period.

Those companies that once ran wild in the spring chose to practice behind closed doors in the winter. The auspicious snow heralded a good year, and the pests and bubbles were frozen in the long cold winter.

From November 5 to 10, 2018, the first China International Import Expo was held in Shanghai. The establishment of the Science and Technology Innovation Edition and the implementation of the pilot registration system brought a hint of spring to Chinese technology companies in the cold winter. .

This year, the structure of the supply side has quietly changed. The 2C economy is ebbing, while the 2B economy is rising. Looking at Internet giants, Tencent, Alibaba, Internet and other companies fully embrace 2B and participate in smart cities, smart manufacturing, etc.

The money held by investors has moved away from business model innovation and towards hard-core technology, which also points the way for entrepreneurs.

It is most appropriate to say goodbye to this winter with the words of Xiao Longnu in "The Legend of the Condor Heroes". "When these snowflakes fall, they are so white and beautiful. When the sun comes out in a few days, every snowflake will disappear. Next winter, there will be many more snowflakes, but they are no longer the snowflakes of 2018. ."

Liu Qiangdong's "fatal encounter" and JD.com "adding insult to injury"

Killing Style

Ice Soul Silver Needle

Li Mochou It is a hidden weapon. The needle body is very beautiful, with carved patterns and exquisite craftsmanship, but it is extremely poisonous. Liu Qiangdong failed to control himself in the face of beautiful women, which ultimately ruined his reputation and hurt his family and JD.com.

However, the harm caused by the affair to Liu Qiangdong’s family and JD.com is real. Liu Qiangdong's image as an inspirational entrepreneur and his emotional life with his milk tea sister have given JD.com a lot of help in brand promotion and marketing. Perhaps affected by this incident, Liu Qiangdong did not appear at the first China International Import Expo, the World Artificial Intelligence Conference, or the Tianjin Davos Forum. Liu Qiangdong was also included in the list of "100 Outstanding Private Entrepreneurs in the 40 Years of Reform and Opening Up." Nameless.

Liu Qiangdong and JD.com are closely tied together, and both will suffer if one loses. JD.com’s 2017 annual report shows that as of February 28, 2018, Liu Qiangdong held 15.5% of the equity of JD.com Group and had 79.5% of the voting rights.

The damage caused by the Liu Qiangdong incident to JD.com is obviously reflected in the stock price. Since the incident on August 31, JD.com’s stock price has been falling. From August 31 to December 21, JD.com’s share price fell by 32.7%, and its market value evaporated by US$16.2 billion, or approximately RMB 111.7 billion, resulting in heavy losses.

Judging from the numbers, JD.com’s third quarter financial report is still eye-catching. But there are many worries behind it: for the first time in nine consecutive quarters, the quarterly revenue growth has been below 30%; the number of active users has declined sequentially for the first time since its listing., as of September 30, 2018, the number of active users of JD.com in the past 12 months was 305.2 million, 8.6 million less than the previous quarter.

For a platform company, user loss is a fatal blow. While JD.com is losing active users, the active users of new and old competitors are increasing rapidly. During the same period, Alibaba’s active users reached 601 million, an increase of 25 million from the previous quarter. As a new rival, Pinduoduo has been deeply involved in public opinion in 2018, but its number of active buyers has grown rapidly. According to Pinduoduo’s third quarter financial report, its number of active buyers has reached 385.5 million, a year-on-year increase of 144%, with an increase of 4,200. Ten thousand.

In terms of user scale, JD.com is not only far behind its old rival Alibaba, but also surpassed by its new rival Pinduoduo. Moreover, from the perspective of market value, the gap between Pinduoduo and JD.com is not large. As of December 21, Eastern Time, JD.com’s market value was US$30.498 billion, and Pinduoduo’s was US$23.408 billion. Pinduoduo is catching up with JD.com, and the "J" written after JD.com's efforts to write BAT is gradually blurring.

Competition in the Internet world is no longer just competition between companies, platforms and platforms, ecosystems and ecosystems. The image of corporate leaders also indirectly affects the development of the company.

Of course, JD.com still has something to be praised for. In the past two years, JD.com has allowed the public to see the shadow of a technology company in artificial intelligence and robotic automation technologies. Its X division, which focuses on smart logistics, and its Y division, which focuses on smart supply chain, are also helping JD.com build its advantages. Although continued investment in technology will lower JD.com's profits, if you look at Amazon's model, you will find the charm of a truly technology-driven world-class Internet company.

The safety of online ride-hailing must be eliminated before the "life-threatening" can go ashore

Killing style

Seven Injury Fist

Seven Injury Fist It is extremely powerful, but if it is used by someone who has not yet reached the level of internal strength, it will cause great harm to oneself. To practice Seven Injury Boxing well, one must have a very high level of internal strength. The same is true for online ride-hailing. Only by ensuring the safety of drivers and passengers can healthy development be achieved.

If you were to ask who has not ordered an online ride-hailing service, I’m afraid no one would raise their hand; if you were to ask what are the requirements for online ride-hailing services, I’m afraid everyone would put “safety” first .

Since the birth of online ride-hailing 6 years ago, high subsidies and convenience have been its labels, but what followed was the brutal growth of online ride-hailing. With the introduction of various policies, online ride-hailing in 2018 is no longer as crazy as before and has entered a period of stable development. If the two murders of ride-hailing passengers had not occurred on the Didi platform, perhaps the online ride-hailing market in 2018 could be described as "calm".

In the early morning of May 6, 2018, Li Mouzhu, a 21-year-old flight attendant of Yunnan Xiangpeng Airlines, took a flight in Zhengzhou Airport Area, Henan Province.He was killed on his way to Zhengzhou Railway Station on Didi Hitchhiker. Three months later, a similar incident happened again. On August 24, a girl from Wenzhou, Zhejiang Province was killed while riding a Didi ride-hailing service.

In comparison, being killed is a small probability event, but once it happens, it is a devastating blow to the victim and his family. Some passengers said that they are now inseparable from online ride-hailing, so they must take appropriate precautions, such as confirming the license plate number, not talking too much with the driver, calling family and friends during the drive until they get off the car, and even more exaggeratedly, taking it with them Carry an alarm.

These two incidents were a heavy blow not only to Didi, the company involved, but also to the entire online ride-hailing market. Didi is the first to bear the brunt of self-examination and external scrutiny. In addition to the launch of various functions such as one-click alarm and full audio/video recording, Didi has also made "tremendous" adjustments to its structure, including upgrading its safety management system and establishing a chief executive officer. The position of Travel Safety Officer, etc.

As a lesson for the future, platforms such as Dida Hitchhiker have also adjusted their safety rules, such as stopping taking orders late at night; Meituan Taxi has added a new "Safety Center" entrance; Cao Cao has added special cars One-touch alarm device; Shouqi Car Hailing has launched similar safety functions. Even Xiangdao Travel, which has just joined the online ride-hailing "battle", one of its selling points is safety, including in-depth investigation of the driver's background, double CPS inspection, SOS alarm mechanism for both drivers and passengers, etc.

After the security incident, services and subsidies were all in vain. Any industry will inevitably experience pain. The key lies in how to make timely adjustments in the face of pain.

The initial requirements for entering the online ride-hailing industry were low, and the review and inspection were not strict, which directly led to major challenges in safety issues, and it was difficult to protect consumer rights. The rapid expansion in the early stage concealed the hidden safety risks behind it.

No matter what personalized services the platform can provide, as long as security is not in place, everything will be in vain.

Safety is always the lifeline of online ride-hailing, and it is also the competitive point of the online ride-hailing market. Whoever is safer wins.

The shared bicycle crisis looks forward to rebirth in the defeat

Killing style

Wedding dress magic skill

This kind of skill is too violent, so practice Later, when you want to achieve a breakthrough, you need to dissipate all your original skills and practice again. The same is true for shared bicycles. Only by rapidly expanding and providing good services can we truly solve the problem of the last mile of travel for users.

The shared bicycle industry, represented by ofo and Mobike, was once the darling of capital. However, due to the lack of sufficient "self-generation" capabilities and the disorderly expansion in the early stage, both ofo and Mobai ushered in the "darkest moment" in 2018. In the end, Mobike gave up its independent operation and "sold" Meituan for US$2.7 billion; ofo, which insisted on independent development, continued to struggle painfully on the edge of death.

Ofo is seriously short of money, and everyone knows that ofo is now like a trapped beast, struggling to survive. In the second quarter of 2018, ofo and Mobike embarked on different development paths. Mobike was acquired by Meituan for US$2.7 billion, while ofo rejected a potential acquisition offer from Didi.

Ofo once tried to monetize advertising, but it failed to close the funding hole. In June 2018, media reported that Ofo owed 1.5 billion yuan. Then, ofo's negative news came intensively: large-scale layoffs at the headquarters, resignation of senior executives, lawsuits from suppliers for hundreds of millions of yuan in arrears, and "empty buildings" in offices in many places. Since November, the difficulty of refunding deposits has become the focus of major media reports. Ofo, which had no one to take over, became a "hot potato". On November 23, ofo announced its cooperation with PPmoney, but it encountered a lightning shutdown. At present, ofo's crisis situation will be difficult to overcome without financial backers.

The emergence of shared bicycles has solved the last mile problem for users. However, in the 1.0 era of "crazy money burning", fueled by capital, shared bicycles grew wildly, but failed to find a suitable business model. The company was unable to "build its own blood", which eventually led to the crisis.

At present, the "mass base" of shared bicycles is still there. According to statistics from the Ministry of Transport, the number of shared bicycles nationwide is still more than 10 million people every day. It can be seen from this that the market demand is huge, which will also help the entire shared bicycle industry enter the 2.0 era, focusing on service, focusing on experience, and developing steadily and orderly.

Unmanned convenience stores collapsed and left?

Killing Style

Lingbo Micro Step

This kind of footwork, taking a step, is closely related to internal force, and it is by no means a simple step. This is the case with unmanned convenience stores. They are at the forefront, but if there is no internal strength, it will cause the danger of self-expansion.

In 2017, unmanned retail hit the spotlight, with smart containers, unmanned shelves, and unmanned convenience stores emerging one after another.

The cost of unmanned convenience stores is not low. It usually takes more than a year for an unmanned convenience store to recover the cost of implementation. In 2018, unmanned convenience stores are likely to become the "pig" that cannot fly.

"We are ready for large-scale mass production. The target of 5,000 units a year is a reasonable plan based on our own operating conditions. It seems a bit conservative now." In July 2017, Bingo Box CEO Chen Zilin announced an ambitious goal of opening 5,000 boxes within a year. However, as the deadline approaches in July 2018, the number of Bingo Box stores in 40 cities across the country is only about 400. Temporary suspension of operations due to high temperatures, door-to-door inspections by urban management on suspicion of illegal construction, and store withdrawals have all affected Bingo Box. The fruit box speeds up the pace of setting up points.

The same embarrassing situation has also appeared in other brands of unmanned convenience stores. The first unmanned convenience store launched by Easy HomeLidian Yishi Box EATBOX opened in Beijing Century Jinyuan Shopping Center, but media reported that the store was empty when passing by in early 2018; in January, the Shanghai Tianyaoqiao Road store that had been open for more than three months was also confirmed to be closed. In August 2018, Neighbor Convenience Store, the "dark horse" among unmanned convenience stores, suffered a thunderstorm due to the P2P platform Shanlin Financial behind it, and its bank accounts were frozen. All 168 stores were closed overnight.

Taking advantage of the trend and taking off, the unmanned convenience stores that were so hotly speculated by capital actually ended up being "unmanned".

As early as the end of 2017, Mao Shengbo, a partner of Panda Capital, voiced opposition to the "speculative obsession" concentrated on unmanned convenience stores. "This trend is wrong, and we will not invest in it."

Taking cashier services as an example, unmanned convenience stores can be divided into two categories based on different identification technologies: RFID (commonly known as electronic tags) and those based on visual analysis, with the latter having a higher threshold. Using RFID to replace labor, the cost of a tag is 3 to 7 cents, but the average cashier cost of completing a product manually is only 7 cents, and the cost advantage is immediately obvious. Moreover, VC (venture capital) prefers entrepreneurial projects that have a large market scale and can quickly explode and form a large scale in a short period of time. Convenience stores pay attention to scale effects, and only if they are very large can they follow a specific route.

Whether unmanned convenience stores are a real demand or a false proposition, but unmanned convenience stores with no queues and self-service checkout still hit the pain points of traditional convenience stores. For investment institutions, time is their enemy. Opening up a new city means opening up a complete and new supply chain ecosystem. If the revenue cannot keep up, vicious negative cash flow will occur.

Who will save the "streaking" hotel data?

Killing style

Xuan Ming Divine Palm

Xuan Ming is the god of the north in mythology, giving people a dark and cold feeling, Crane Pen Weng and Deer Staff Ke's palm technique is also extremely yin-cold, and the cold poison left in his body can only be driven away by the pure yang and extremely strong Nine-Yang Magic. The frequent "theft" of information is also a "cancer" that remains in the hotel industry. What can be done to get rid of it?

In 2018, there were constant security scandals in the hotel industry, from Huazhu, InterContinental, and Hilton, until near the end of the year, Marriott International, the “leader” in the hotel industry, reported on its official website that 500 million user information was leaked. It indicates that the database security of the entire hotel industry is facing a comprehensive collapse.

The hotel industry involves a large amount of data, but its level of informatization is weak. In recent years, it has frequently become the hardest hit area by hackers.

In February 2015, according to the report submitted by the vulnerability box white hat, a large amount of guest booking information of the well-known hotel chains Orange, Jinjiang Inn, Super 8, and Pudding, as well as high-end hotels Marriott, Starwood, and Intercontinental, were leaked. Some hotel chains can even cancel orders and change user registration passwords at will; 2015In November 2016, Hilton and Starwood Group announced that their payment processing systems were attacked by unknown hackers; in January 2016, Excelle Group's payment card data leakage affected 250 hotels in about 50 countries around the world; in April 2017, More than 1,000 InterContinental Hotels Group hotels suffered payment card information leaks...

Unfortunately, in 2018, the data security crisis in the hotel industry was not contained. On August 28, Huazhu Hotel Group’s hotels involved 500 million user information for sale on the “dark web”; in December, Marriott International Group proactively reported a 4-year-old data leak involving 500 million user data. This incident The case remains unresolved.

Most domestic hotels do not take information security seriously. Many domestic hotel system maintenance is completed by outsourced personnel, and they often have direct access to the database, and their intentional or unintentional operations will be compromised. The damage caused to data and the hotel's internal security defense capabilities are low. Once an attack occurs, it can easily lead to a complete loss of control.

An insider in the hotel industry is also very helpless about this. In his opinion, this is related to the fact that the hotel industry has many external interfaces and complex business. "Due to business needs, the domestic hotel industry has a large number of internal connections. Network interfaces, for security reasons, also set up identity authentication levels for important interfaces. However, the procedures of this security system are cumbersome and have an impact on the operational efficiency of the IT system. Therefore, in actual operation, it is difficult to fully roll out. This is also This leaves more attack opportunities for hackers." Between efficiency and security, the hotel industry at home and abroad is facing torture.

In May 2018, the European Union officially implemented the General Data Protection Regulation (GDPR). The GDPR is known as the most stringent personal data protection regulation in history. It includes internal EU companies and companies doing business in the EU. Multinational enterprises and overseas enterprises that provide business services to EU citizens have regulations on data collection, data protection and data application. GDPR stipulates that the company involved must report a data breach within 72 hours, otherwise it will face a fine of up to 4% of the company's total global revenue last year. The reason why Marriott disclosed this large-scale user data leak this year is related to the introduction of this regulation. If Marriott's total revenue last year was more than 17 billion US dollars, Marriott would face a huge fine of up to 680 million US dollars.

2018 is the first year that the European Union’s General Data Protection Regulation is officially implemented. Under the pressure, can it bring about a change in the Internet data security protection crisis led by the hotel industry? I hope so!

Authors: Hao Junhui, Wu Yuxin, Sun Yan, Pan Shaoying, Li Danqi, Li Yunkun, Zhang Weiwei

Pictures: Tu Chong, Internet

❷ Zhengruozhe can be listed in 2022

Can Zhengruozhe be launched in 2022? According to relevant information, Jiangxi Zhengduozhe Network Technology Co., Ltd. is a military enterprise independently selected by the Chinese People’s Liberation Army.It is a high-tech company initiated and established by Colonel Li Weihong in 2018. The core team members come from master's degree students from well-known universities such as Qingyou University, Huazhong University of Science and Technology, and Jiehaoshan University of Information Engineering. Most of their work resumes are in well-known companies in the industry such as Huawei, BYD, and ZTE. They have more than 10 years of technology and R&D management experience, and have independently developed technologies and invention patents. Therefore, the leaders are qualified to go public and can be officially listed in 2022. .

❸ SAFEIS Security Report: A summary of the top ten stolen incidents in the history of encryption and response strategies

The 2008 global financial crisis broke out due to various shortcomings of the centralized world and then swept the world. In order to To eliminate these drawbacks, Satoshi Nakamoto created the Bitcoin network, and the blockchain was born.

In order to improve the security of the entire network and transactions, the blockchain uses distributed nodes and cryptography, and all records on the chain are open, transparent and cannot be tampered with. In recent years, blockchain has achieved long-term development and formed a huge encryption ecosystem.

However, since the advent of blockchain, cryptocurrency scams have occurred frequently and have become more and more serious, and cryptocurrency cannot provide sufficient security for users’ funds. Additionally, cryptocurrencies can be transferred anonymously, leading to major attacks and thefts in the crypto industry.

The following will analyze and analyze the top ten cryptocurrency theft incidents in the history of encryption, as well as six practical strategies to prevent the theft of crypto assets.


1. Mt. Gox theft

The Mt. Gox theft remains the largest cryptocurrency theft in history. Between 2011 and 2014, more than 850,000 Bitcoins were stolen.

Mt. Gox claimed that the main cause of the loss was due to a potential vulnerability in the Bitcoin network - transaction malleability, which changes transactions by changing the digital signature used to generate the transaction. Unique identifier process.

In September 2011, MtGox's account private key was leaked, but the company did not use any auditing technology to discover vulnerabilities and prevent security incidents. In addition, because MtGox regularly reused Bitcoin addresses that had leaked private keys, the loss of stolen funds continued to expand. By mid-2013, the exchange had been hacked to steal 630,000 Bitcoins.

Many exchanges use both cold wallets and hot wallets to store and transfer assets. Once the exchange's server is hacked, hackers can steal the encrypted assets in the hot wallet.

2. Linode theft incident

The main business of the encrypted network asset custody company Linode is to custody the encrypted assets of Bitcoin exchanges and giant whales. Unfortunately,Unfortunately, these custodial crypto assets were stored in hot wallets, and even more unfortunately, Linode was hacked in June 2011.

This resulted in more than 50,000 Bitcoins being stolen, and Linode's customers suffered heavy losses. Among them, Bitcoinia, Bitcoin.cx and Gavin Andresen lost 43,000, 3,000 and 5,000 Bitcoins respectively.

3. BitFloor theft incident

In May 2012, hackers attacked BitFloor and stole 24,000 Bitcoins. All this was due to the fact that the wallet key backup was not encrypted, which led to the attack. The attacker easily obtained the wallet key and then stole huge amounts of crypto assets.

After the theft, BitFloor creator Roman Shtylman decided to shut down the exchange.

4. Bitfinex theft incident

Using multi-signature accounts cannot completely prevent security incidents from occurring, as evidenced by the theft of nearly 120,000 huge Bitcoin assets from Bitfinex. .

In June 2022, 20 million OP tokens were stolen due to improper use of multi-signature accounts.

5. Coincheck theft

Japan-based Coincheck had $530 million worth of NEM (XEM) tokens stolen in January 2018.

Coincheck later revealed that due to personnel negligence at the time, hackers were able to easily access their systems, and because the funds were stored in hot wallets and lacked security measures, the hackers were able to successfully steal huge amounts of crypto assets.

6. KuCoin theft incident

KuCoin announced in September 2020 that hackers had stolen a large amount of Ethereum (ETH), BTC, Litecoin (LTC), Ripple ( Cryptoassets such as XRP ), Stellar Lumens ( XLM ), Tron ( TRX ), and USDT.

The North Korean hacker group Lazarus Group is accused of being the instigator of the KuCoin theft, which caused a loss of $275 million. Fortunately, the exchange recovered approximately $270 million in stolen assets.

7. Poly Network theft

The Poly Network theft is one of the most serious cryptocurrency thefts in history, 2021 8In March, a hacker known as "Mr. White Hat" exploited a vulnerability in the DeFi platform Poly Network network and successfully stole approximately $600 million worth of crypto assets on the Poly Network.

What is strange about the Poly Network theft incident is that since the theft incident, "Mr. White Hat" not only maintained an open dialogue with Poly Network officials, but also returned all stolen crypto assets a week later . The "white hat" received a $500,000 bonus and a job opportunity as a senior security officer at Poly Network.

8. Cream Finance theft incident

In October 2021, a security incident occurred at Cream Finance, and hackers stole crypto assets worth US$130 million. This is Cream Finance’s third cryptocurrency theft this year, with hackers stealing $37 million in crypto assets in February 2021 and $19 million in August 2021.

This theft was accomplished through a flash loan attack. The attacker used MakerDAO’s DAI to generate a large number of yUSD tokens, and also used the yUSD price oracle to complete the flash loan attack.

9. BadgerDAO theft incident

In December 2021, a hacker successfully stole assets from multiple cryptocurrency wallets on the DeFi project BadgerDAO.

This incident is related to phishing when malicious scripts are injected into a website's user interface via Cloudflare. Hackers stole $130 million using application programming interface (API) keys. The API keys were created without the knowledge or permission of Badger engineers and were used to regularly inject malicious code into a small subset of its clients.

However, approximately $9 million in crypto assets was recovered because the hackers failed to withdraw funds from Badger in time.

10. Bitmart theft

In December 2021, Bitmart’s hot wallet was hacked and approximately US$200 million in crypto assets were stolen. The study found that approximately $100 million in crypto assets was stolen and transferred through the Ethereum network, and nearly $100 million was stolen and transferred through the Binance Smart Chain network.

This theft incident involved more than 20 tokens, including mainstream currencies such as Bitcoin, and a considerable number of altcoins.


The best way to protect crypto assets is to pay attention to the encryption protection of wallets and secure private key storage, as well as conduct in-depth research and identification of projects on the market to avoid stepping into the trap of attackers.

Due to the non-tampering and irreversibility of the blockchain, once the wallet private key is leaked, the theft of crypto assets is inevitable and cannot be recovered.

Six practical strategies to prevent theft of crypto assets:

1. Use cold wallets

Unlike hot wallets, cold wallets are not connected to the Internet and therefore cannot will be subject to cyber attacks. Storing private keys in cold wallets can effectively protect crypto assets.

2. Use secure networks

When trading or conducting crypto transactions, only use secure networks and avoid public Wi-Fi networks.

3. Spread funds across multiple wallets

Don’t put all your eggs in the same basket. This saying is very true in both the financial and crypto fields.

Distribute crypto assets to multiple different wallets to minimize losses in the event of an attack.

4. Improve the security of personal devices

Ensure that personal devices have the latest security software installed to protect against newly discovered vulnerabilities and network attacks, and enable firewalls to improve device security. , to prevent hackers from attacking through device system security vulnerabilities.

5. Set strong passwords and change them regularly

When talking about security, we cannot underestimate the importance of strong passwords. Many people use the same passwords across multiple devices, apps, social media accounts, and crypto wallets, significantly increasing the chances of crypto assets being stolen.

To prevent theft, you need to establish a strong password with a high security level for your wallet account. This strong password needs to be unique and develop the habit of changing it regularly. Additionally, opting for two-factor authentication (2FA) or multi-factor authentication (MFA) can improve security.

6. Beware of Phishing Attacks

Phishing scams via malvertising and emails are rampant in the cryptocurrency world. Be extremely careful when conducting crypto transactions and avoid clicking on any suspicious and unknown links.

You should always check and verify relevant information about crypto investment and the URL of the website, especially when the information is very tempting and unreasonable, for example, the project official communicates privately through channels such as Didcord. Of course, Security incidents involving the project owner Didcord being attacked occur frequently. At this time, the malicious link may be in the public channel rather than the private chat interface. In this case, it is particularly important to check and verify the authenticity of information related to crypto investment through multiple channels. Got it!


SAFEIS is an internationally renowned innovative blockchain ecological security service platform. It is built based on multiple core technologies such as data, intelligence, network security, and graph computing. It has complete data processing and accurate traceability capabilities, and its service targets include many well-known companies around the world. Companies and projects.

"Making the blockchain more secure" is a glorious mission, and we will fulfill our glorious mission and continue our new journey.

❹ The relationship between Huashun Xin’an and White Hat Exchange

is the same company.
Zhao Wu, who founded White Hat Hui, took off his hat. He stood on the stage at the launch of his own blockchain security report without wearing his iconic peaked cap. Even the guests he invited in the circle had to calm down before they recognized him. A month ago, Zhao Wu also took off the "hat" of "White Hat Hui". He registered a company called "Huashun Xin'an" and accepted tens of millions of investments from Danhua Capital, but "White Hat Hui" "It did not disappear and became a technology research institute under Huashun Xin'an. Some fields have different understandings of "white hat" groups. In order to avoid this "illusion of distrust" and allow the company to go further, Zhao Wu simply made the above move.
Beijing Huashun Xin'an Technology Co., Ltd. is an Internet security company focusing on secure big data and cyberspace mapping. It is mainly engaged in technology and product research and development in the field of network information security, providing technical support for national network security, and serving governments and enterprises. Provide users with better network information security protection services.

❺ When will Zhengduozhe Technology be launched?

Zhengduozhe Technology has not yet been launched. The specific listing time is determined based on the company's strength, but the company's chairman currently stated that Zhengruozhe has been aiming to go public, bearing the hardships, sweat, self-improvement and hard work of Zhengruozhe's people.
1. Matters related to Zhengduozhe Technology Company
Zhengduozhe Technology Company is an industry in Jiangxi. In the past three years, Zhengduozhe Technology has successively obtained overseas operation licenses certified by the Ministry of Foreign Affairs and national value-added telecommunications business operations. License and National Computer Software Copyright Registration Certificate. He was elected as the executive director of Jiangxi Blockchain Industry Association and a "white hat" member of the Filecon security team. His turnover increased five times. This proves that the company is a company with great potential and worthy of trust. Those who are at the helm respond to the country’s call and are committed to building a new infrastructure for the digital economy. In the good atmosphere for the development of digital economy and big data in the Yiyang New District Big Data Industrial Park, Zhengduozhe Technology will continue to strengthen scientific and technological research, expand the market scale, and unswervingly establish a more standardized and efficient enterprise management and operation mechanism.
2. Is Zhengduozhe Technology lPFS reliable?
1.IPFS was proposed by Protocol Labs in 2014, referred to as Interplanetary File System, and aims to create a network transfer protocol for persistent and distributed storage and sharing of files. It targets the current Internet transfer protocol HTTP .
2. The Filecoin project was also initiated by Protocol Labs, which conducted the largest financing at that time in 2017. therefore, the authenticity of the project is beyond doubt.
3. Recently, the price of FIL has experienced a surge, and the currency price has increased five or six times in a short period of time. Moreover, there are many days when the 24-hour transaction volume far exceeds Bitcoin’s transaction volume, and there are also days when it exceeds the combined transaction volume of Bitcoin and Ethereum.
4. It proves that more and more people are optimistic about this project, and then others are also involved.
To sum up, Zhengduozhe Technology is a very good company, and its products and services are relatively good. The company is an industry in Jiangxi and has always aimed to go public, so the potential is very good , and it is worthy of everyone's trust. IPFS of Zhengduozhe Technology is also relatively reliable, and many people are very optimistic about it.

❻ What Internet technologies have good prospects of learning

1. Python
The artificial intelligence mentioned many times in government reports is written in Python language. In addition to the use of Python in artificial intelligence, Python can also be used in many fields, such as: data analysis, component integration, network services, image processing, numerical computing, scientific computing and many other fields.
At present, almost all large and medium-sized Internet companies in the industry are using Python, such as: Youtube, Dropbox, BT, Quora (foreign version of Zhihu), Douban, Zhihu, Google, Yahoo!, Facebook, NASA, Internet, Tencent , Autohome, Meituan, etc.
Currently, Zhejiang, Beijing and several other provinces and cities have decided to incorporate Python programming basics into information technology courses.
2. Big Data
With the booming development of the big data industry, big data involves the development of almost all industries. A series of policies issued by the country have accelerated the implementation of the big data industry.
In the "Intelligent Manufacturing Development Plan 2016-2020", it is clearly stated that before 2025, a "two-step" strategy will be implemented to promote intelligent manufacturing: "In the first step, by 2020, the development foundation and supporting capabilities of intelligent manufacturing will be obvious Enhancement, key areas of traditional manufacturing will basically realize digital manufacturing, and the intelligent transformation of key industries with conditions and foundation will make significant progress; in the second step, by 2025, the intelligent manufacturing support system will be basically established, and key industries will initially realize intelligent transformation." In the big data market segment, industry solutions account for up to 34.3%, which will play an important role in the development of the intelligent manufacturing industry.
3. Front-end development
In recent years, new technologies have continuously emerged in the front-end field, and old technologies have been constantly updated. With the continuous advancement of technology, the fields involved in front-end development are becoming wider and wider!
With the arrival of the 5G era, new development scenarios will emerge in the field of mobile Internet, including autonomous driving, Internet of Vehicles, Internet of Things, artificial intelligence, smart homes and wearable devices, which will bring a large number of front-end development needs.
According toRelevant data shows that the front-end development industry is one of the industries with higher average income. Taking Beijing front-end development engineers as an example, the average monthly salary of Beijing front-end engineers is as high as 19,820 yuan (data source: Zhongyou Ji).
4. Cloud Computing + Network Security
The cloud computing market is on the rise. Cloud services such as Network Cloud, Alibaba Cloud, and Tencent Cloud are emerging one after another. Internet giants are focusing their efforts, and Linux operation and maintenance engineers have made new developments. direction, at the same time, the U.S. cloud computing industry is highly developed.
With the rise of cloud computing, ubiquitous artificial intelligence, and big data analyzing the world, social life has become more and more convenient. However, without network security, there is no privacy, and all convenience will become a nightmare. Therefore, network security is particularly important. , in the future, white hat hackers will become the last line of defense to protect network security.
Nationally, there are an average of 13,005 job openings per day, and large and medium-sized companies continue to recruit. For many people, cloud computing and network security are good opportunities to join famous companies.
5. Java
While retaining the essence of the advantages of C++, Java also eliminates some redundant or difficult-to-understand features. It has the characteristics of powerful functions and ease of use. It is simple, object-oriented, Distribution, robustness, security, platform independence and portability, multi-threading, dynamics and other characteristics.
Java covers a wide range of fields. Desktop applications, Web applications, distributed systems and embedded system applications can all be written with it. Therefore, the demand for enterprise employment is also huge. Java engineers have become the most in demand software engineers in the world. Biggest job. At the same time, Java's development "money" prospects are very considerable, up to 800,000 per year.
6. Unity Game Development
At present, there is a huge gap in domestic game development talents, and the demand for mobile terminal talents is the most urgent. With the rapid development and maturation of the Internet, my country's game industry has shown a good trend of rapid and stable development and has a huge mass base. At the same time, a large number of game R&D personnel are also needed to boost the development of the game industry.
Data shows that my country’s current demand for mid- to senior-level game development engineers is more than 100,000, and many companies are facing the problem of not being able to recruit engineers.
7. Blockchain
Judging from the distribution of industry subdivisions, there are 7 industry application companies, mainly Internet companies (Alibaba, JD.com, Tencent) used in public welfare and product traceability. As well as innovative financial technology applications evolved by financial companies (Ping An, China Merchants Bank, Bank of China), such as supply chain finance, bills and transaction clearing.
Since blockchain can make information non-tamperable and eliminate the possibility of data falsification from the root, the financial industry, especially those with higher requirements for real data, will embrace blockchain more actively.
The Go language is now often used to build decentralized systems. The support of two super blockchain projects, Ethereum and Hyperledger, has allowed Go language has become the first choice for many blockchain projects!
8. Software testing
With the advent of the era of artificial intelligence, the IT industry has received more and more attention. Software testing is an indispensable part of controlling software quality, and its importance is evident.
According to industry statistics, there are currently 3 million to 4 million IT technical positions in China, of which there is a gap of at least 300,000 software testing talents. This number will continue to increase in the next 5-10 years.
9. Internet Marketing
The Sixth World Internet Conference released the "China Internet Development Report 2019". The report shows that as of June 2019, the number of Internet users in my country was 854 million, of which 225 million were rural Internet users. people, and the Internet penetration rate reached 61.2%.
People are becoming more and more dependent on the Internet. At this stage, Internet operations are following the trend, and the development prospects are very bright. Many Internet-operated companies have appeared in society, which undoubtedly increases the demand for Internet marketing. Talent needs.
Whether it is SEM bidding promotion, information flow advertising optimization, new media operation, market planning...as long as you master the skills in any of these fields, you can quickly find a suitable position in the Internet industry and get a good job. Get a satisfactory salary.
10. UI/UE Design
According to the latest statistics on UI designer recruitment, there are more than 400,000 job vacancies in China. As people's user experience of Internet products improves (that is, their requirements for product interaction and aesthetic appearance), the future UI will be the core focus of enterprise products.

❼ Taking stock of virtual currency (air currency) scams in 2021

2021 is an important year for the mainstreaming of cryptocurrencies. Popular cryptocurrencies such as Bitcoin, Ethereum and Dogecoin Wait, it’s been a great year after the memestock craze that happened in January. These cryptocurrencies are surging to new highs, attracting the attention of a large number of people who may not have been familiar with the industry before.

Still, cryptocurrency is unpredictable, it remains an incredibly volatile market, and it has an almost complete absence of laws and regulations to protect virtual currency investors. However, in the past year, there have been so many cryptocurrency novices jumping into this "half heaven, half hell" market to try their luck, and they and some scammers have formed the most unique and unique virtual currency market in 2021. The most shameless scam

Squid Game

What do you get when you turn the biggest and most popular TV show of the year, Squid Game, into a cryptocurrency?

The answer is that you will become the protagonist of one of the most "socially dead" scams of the year - Squid Game.

Squid Coin is an exclusive token of the game platform with the same name as Squid Game. The platform mimics televisionIn the six-round competition in the play, the prize money received by the final winner (the upper limit of the grand prize in the play is US$38.5 million, but this virtual currency project has no upper limit) will be distributed in the form of squid coins. However, players must first pay a preset price of squid coins to participate in each game. Some rounds also require users to purchase customized NFTs (non-fungible tokens, similar to game skins or props in this game) sold on the platform.

It is such a project that sounds like the sound of a sickle cutting leeks, but it has achieved great success. It is reported that the squid coins were sold out in less than 1 second during the pre-sale on October 20. When they were officially released on October 29, the 1-cent squid coins were sold to US$2.22 within 24 hours, a skyrocketing price. 2400%, and in the following weeks, the price of Squid Coin reached an astonishing US$2861.8 (approximately RMB 18,309), which caused CNBC, "Forbes", "Business Insider" and a series of other media to argue about Squid Coin. Report.

However, like most Ponzi schemes, the Squid Game virtual currency project will soon be unable to hold up after reaching a certain stage. When the currency price reached its peak, some investors complained that they could not sell their Squid coins on Pancakeswap, the only virtual currency platform that can trade this currency. This should have sounded the alarm to everyone, but everyone was still excited. Squidcoin got carried away and chose to believe the explanation of LinkedIn, the founder of Squidcoin, that the project deployed an innovative "anti-dumping technology" that would temporarily restrict people from selling Squidcoin when demand dropped.

However, it turns out that this is another "rug pulling" scam. On November 1, Eastern Time, Squid Coin suddenly crashed, falling from US$2,861 per coin to US$0.0007 within 5 minutes, a drop of 99.999976%. At this time, LinkedIn, the founder of Squid Coin, had redeemed the equivalent value of Binance Coin and transferred the funds.

SaveTheKids Coin

In 2021, the promotion of cryptocurrency by KOLs on American social media is a major feature of this year.

For example, Musk, who has recently sold a large number of Tesla shares and plans to resign as an "Internet celebrity", has repeatedly promoted Dogecoin on social media, and the scam mentioned today was also caused by Caused by KOL’s promotion and platform for cryptocurrency on social media platforms.

In early June 2021, 4 members of the Los Angeles e-sports organization FaZeClan, Kay, Teeqo, Jarvis, Nikan and YouTuber RiceGum, began to promote a cryptocurrency called "SaveTheKids". The project claimed that it would provide The children’s charity raises funds, which should be a win-win result for the project and the KOL, but this is another “rug pulling” scam.

When a developer creates an encryptedThis occurs when a currency attempts to flee with investors' funds. Shortly after the SaveTheKids token was officially launched, the cryptocurrency fell due to massive selling by those initial investors who held a majority of the tokens, rendering SaveTheKids worthless as soon as it was listed.

It may not look like a scam from here, but it has been noticed that FaZe’s Kay is particularly fond of promoting cryptocurrencies, and these cryptocurrencies have ended up in this way, like Coffeeezilla, SomeOrdinaryGamers and Barely Sociable , FaZe’s Kay are all promoting.

Finally, in early July, the Los Angeles e-sports organization FaZeClan announced the results of a self-examination. Four members were suspected of crypto fraud, one member was expelled, and the other three members were directly suspended.

MILF Token

It would be remiss not to punish Adin Ross for promoting the MILF coin.

Ross is a popular Twitch media personality with millions of followers on the platform, but he himself is an out-and-out liar.

Ross’s usual tactic is to casually post on social media how much money he made on which projects. In the past, Ross promoted online casinos in this way, and because of this, he has been criticized in the past year; but in May of this year, Ross followed the trend of the times and entered the world of cryptocurrency. Started promoting a virtual currency called MILF coin.

As usual, Ross showed off the hundreds of thousands of dollars in rewards he received through MILF coins on social media to show his cumbersome process of purchasing the cryptocurrency. Just three weeks later, however, Ross's messaging changed dramatically when it came to the investment opportunity.

"By the way, the MILF Token I made some time ago is bullshit! I already told you not to buy that thing." Rose said with a smile during a live broadcast. "

As of press time, MILF coins have lost about 98% of their value compared to when Ross promoted them.

Meme Coin coins

Last year, if there were no fake Replies from Elon Musk's Twitter account You're unlikely to come across a tweet about a new Meme Coin initiative.

This year, fake press releases have taken this scam to the next level.< /p>

On two separate occasions in 2021, fake press releases from global retail companies deceived the media into publishing false news that the company would begin accepting cryptocurrency. In September, a fake press release announced , Walmart will start accepting Litecoin.Just a few months later, a fake press release claimed that Kroger would accept Bitcoin Cash as payment.

However, neither news is true. The fraudsters behind these false documents were able to successfully distribute this false news through large news distribution companies, where they were disseminated to mainstream news organizations and reported. As cryptocurrency advocates continue to seek validation and legitimacy for their young industry, scams claiming to provide this validation and legitimacy will continue to grow.

These actions have drawn criticism from former stockbroker Jordan Belfort (The Wolf of Wall Street), who in an interview with The Sun warned investors not to put money into the cryptocurrency Meme Coin like a dog Dogecoin (DOGE) and Shiba Inu (SHIB), because Shiba Inu and Dogecoin are worthless jokes.

Poly Network (a decentralized trading platform)

Among the virtual currency scams in 2021, Poly Network’s heist of the century must leave its name.

This summer, a hacker discovered a vulnerability in decentralized finance platform Poly Network that allowed them to transfer more than $600 million in virtual currency to their accounts.

However, it is difficult for such a large amount of money to disappear without guilt. In the following weeks, the hackers reached out to Poly Network and claimed that they had always intended to return the money. Poly Network is also very cooperative and even calls hackers "white hats" (righteous hackers), trying to find security flaws in the platform through them so that they can be fixed before evil actors appear.

In the end, fortunately, the hackers fulfilled their promise and transferred most of the cryptocurrency funds back to the platform, which prevented Poly Network and its platform users from suffering greater losses.

What benefit did the hacker gain from this? First, they escaped any possible repercussions for pulling off the largest cryptocurrency heist in history, and second, Poly Network also offered a $500,000 reward to the hackers who returned the funds, a combination of fame and fortune.

Africrypt (a virtual currency investment platform)

According to overseas media reports, in the middle of this year, Ameer Cajee and Raees Cajee, the founders of the South African cryptocurrency investment platform Africrypt, have confirmed that they have lost contact. Also missing were 69,000 BTC (currently worth approximately $2.3 billion). This incident may become the largest cryptocurrency scam in history.

It is reported that Africrypt is an encryption currency founded in 2019 by two South African brothers, 21-year-old Raees Cajee and 17-year-old Ameer Cajee.Coin investment platform, its target audience is high net worth individuals and celebrities.

Like any other scam, Africrypt also promises incredibly high returns to investors and even once claimed to offer 10% daily returns. The company is so good at targeting its victims that most investors view it as the secret key to financial freedom. It is this target market that has given Africrypt access to other wealthy investor circles in the past, with the average investment amount of its customers reaching $105,000, and some even as high as $1.4 million.

In fact, Africrypt was already planning to run away in April 2021. The Cajee brothers claimed that their investment company was hacked and all their clients’ accounts were leaked, and implored them not to take legal action. Action, because this would affect their recovery of cryptocurrency, and seven days before the escape, Africrypt employees could no longer access the system backend, and everyone gradually became anxious at this time. It later proved that everyone’s worries were not unnecessary, and the Cajee brothers finally disappeared from public view together with 69,000 BTC.

Lawyers representing investors claimed that as many as 69,000 BTC were stolen by the Cajee brothers. If this is true, Africrypt would be the largest cryptocurrency scam to date. However, Brandon Topham, head of the South African Financial Sector Conct Authority, said that legally, crypto assets do not belong to financial products, so the agency is currently prohibited from launching a formal investigation.

The stolen NFT

Jeff Nicholas’ story pales in comparison to the amount of money stolen through the other scams mentioned in this article, but it’s still worth it Mention it.

Nicholas is the owner of three NFTs (an ape, a cat, and a dog, a computer-generated piece of art), and he purchases these unforgeable tokens to prove ownership of the items they are connected to. .

Nicholas said that under the guise of providing technical support, the scammers purged NFT monkeys, cats, and dogs from Nicholas' wallet over the next hour. According to Nicholas, the total loss in this fraud was approximately 150 ETH, which is approximately US$480,000.

When the NFT was stolen for the first time, Nicholas tried to spread the news and notify others not to buy his stolen NF, and the platform OpenSea also locked Nicholas' assets immediately, but the scammer had already taken advantage of it. It is sold to the highest bidder, and although Nicholas still theoretically has a chance to get it back, he has to buy it back with real money.

Afterwards, although the blockchain showed that he no longer owned them, Nicholas claimed that these indisputable records on the blockchain were irrelevant and that he was the real owner. Nicholas finally This negates the basis upon which NFT advocates claim to confer any such value, namely trust.

There will be more new types of scams in the currency circle in the future. Everyone should pay attention to precautions and protect their assets. (End)

❽ What risks does the blockchain face that need to be addressed

Although the blockchain industry is experiencing rapid development driven by the influx of capital and talent, as a In emerging industries, frequent warnings about security vulnerabilities have triggered concerns about blockchain risks.

Yu Kequn, director of the National Information Technology Security Research Center, pointed out that the emergence of blockchain has brought a lot of expectations to people regarding issues such as privacy exposure, data leakage, information tampering, and online fraud. However, there are still many challenges in the security of blockchain.

Li Bin, assistant director of the China Information Security Evaluation Center, analyzed that the current blockchain is divided into three types: public chain, private chain, and alliance chain. No matter which type has different advantages in algorithms and protocols, There are security challenges in many aspects such as , usage, time limits and systems. What is particularly critical is that the current blockchain is still facing the 51% attack problem, that is, a node has the ability to successfully tamper and forge blockchain data by mastering more than 51% of the calculation examples in the entire network.

It is worth noting that in addition to the risk of external malicious attacks, the blockchain also faces the threat of its endogenous risks. Yu Kequn reminded that how to build a complete secure application system around the equipment, data, applications, encryption, authentication and permissions of the entire blockchain application system is an important issue that all parties must face.

Wu Jiazhi also analyzed that as an emerging industry, practitioners in the blockchain industry lack security awareness, resulting in the current blockchain-related software and hardware having a low security factor and a large number of security vulnerabilities. In addition, , there are many links in the entire blockchain ecosystem. In comparison, the relevant security practitioners are dispersed and it is difficult to form a joint force to solve the problem. Meeting the above challenges requires systematic solutions.

Content source China News Service

❾ The digital currency community must use blockchain technology to self-supervise

The digital currency community must use blockchain technology to self-supervise Oversight
Self-policing of illegal actions taking place on the blockchain may soon become a necessity for the digital currency community.
Every day in the future, digital currency enthusiasts will likely have to spend time identifying illegal transactions to avoid these things from happening. The U.S. Treasury Department has made a decision that cannot be changed.
A few weeks ago, the U.S. Treasury Department quietly posted a supplement to its FAQs on the website of the Office of Foreign Assets Control (OFAC), the agency responsible for overseeing U.S. economic sanctions. Language in OFAC, plans to putThe ‘digital currency’ address is included on its list of Specially Designated Nationals and Blocked Persons (SDN).
This is going to be a big deal.
Banks and businesses of all types should check the SDN list to ensure they are not providing financial services to individuals, organizations and organizations designated as 'blocked' by the United States for involvement in terrorism, nuclear proliferation, theft, human rights abuses and other crimes. government.
Banks can legally freeze property they hold that is on OFAC's list and stop their transactions. If this is not done, the financial penalties may be more severe. Although most daily digital currency investors only know a little bit about the world subject to legal restrictions, operators of any form of financial business know that if you do not obey legal management, you may lose your business and property in an instant .
Never before has a specific digital currency address or property been listed on OFAC's list, although legal experts have understood for years that sending Bitcoin or other digital currencies to anyone on any of the SDN lists It would be illegal for Americans.
However, there is a big difference between closed funds in the financial world and those that can exist in the digital currency field. Peer-to-peer digital currency transactions cannot be blocked and regulated by third parties.
So an OFAC-designated digital currency fund is more likely to bring its external address for review rather than the designated fund itself.
Some experts in the digital currency industry believe that there will be a new era in the designation of digital currency funds; depending on their association with SDN addresses, a token is classified as clean, tainted, or It is an unknown era.
This may cause different price levels of coins on the same blockchain, with clean tokens being more expensive than those that are tainted or of unknown origin, and end the existence of digital currencies. There is substitutability.
The first is that we can expect that blockchain forensic tools will become increasingly valuable and more widely implemented, because digital currency transactions are designed to reduce the risk of users' transactions contaminating currencies.
It’s up to you
However, the most important part of a new era is the review of digital currency transaction addresses by financial institutions, which will be something the digital currency community itself will have to do: routinely block blocks Illegal transactions on the chain.
This is something the digital currency community doesn’t want to hear.
Digital currency experts often point to 'censorship resistance' as the most valuable feature of the technology, which allows anyone to store and send funds without any restrictions on government rights. In theory, this is a very powerful boost for freedom and democracy.
In practice, this technical capability is not extensible under the laws of most financial crime-related jurisdictions. While escaping the actions of a corrupt government is a worthy goal, the digital currency community should be aware that remaining protectedactions are morally unacceptable, yet there is growing evidence of criminals and terrorists taking advantage of community freedoms.
In recent years, anti-money laundering (AML) compliance experts have focused on the conduct of the blockchain industry, encouraging digital currency businesses to go beyond the 'know your customer' (KYC) due diligence required by traditional financial institutions, and through Altering data on the blockchain to perform Know Your Transaction (KYT) analysis.
There are a number of startups that specialize in this kind of blockchain forensic work, working with other law enforcement agencies and corporate clients of large banks to conduct digital currency transactions. The companies' analytics tools are effective in fighting crime, but many voices in the blockchain community have criticized the tools -- saying they anonymize financial transactions on the blockchain. --To destroy privacy. However, much of the information from blockchain forensics is not publicly available. Typically, a corporate or government client is required to access this data.
However, OFAC’s listing of digital currency addresses increases the risk of KYT analysis.
This will be important for everyone involved in digital currency transactions, allowing them to verify the ‘legitimacy’ of the addresses they touch.
Although it is likely that the number of designated addresses will start from the smallest (OFAC will not designate addresses lightly), even a small chance of violating sanctions will bring about a reduced risk of compliance, affecting the token buyers of the civilian community. .
An inadvertent transaction with a banned address, or an address that has been banned by a banned address, will be visible on the public blockchain ledger and may also taint the person's digital currency funds.
The only way to help daily users of digital currencies get out of SDN-affected blockchain platforms is to have real-time AML/KYT to gain insight into the flow of funds from various fund addresses. Judging from the current situation, blockchain analysis is only in silos and is only provided to financial companies and legal departments, so this method is simply impossible to implement.
Centralized AML
We need an open source platform where illegal activity is flagged and defamatory information is censored. We call it centralized AML on the blockchain.
I understand the need. As a researcher at a nonprofit national security think tank, I investigate incidents of digital currencies and illicit financing, such as Bitcoin terrorist financing in the Middle East. Our team used the free and public Blockchain Discovery website to analyze donations from these campaigns.
These tools are not as powerful as mechanisms like governments and banks that can use expensive specialized machine learning and algorithmic tools. Even through rigorous manual tracking and analysis of blockchain activity, I saw addresses that flagged transactions with terrorist funds, and there was no effective way to share my findings on the platform with everyday cryptocurrency users. You can see my 'marks' and evaluate them as best you canaccuracy and keep their addresses uncontaminated.
The industry can help solve the problem
Two years ago, I suggested that cryptocurrency experts should set up their own gatekeeper groups to look for malicious activity on the blockchain, akin to 'white hats' How hackers flag viruses is the same as other cyber threats. The Treasury Department’s plans make it the most important thing now for the digital currency community to establish advocacy for self-regulation.
In addition to aggregating OFAC’s blacklist, a public crowdsourced blockchain AML tool can address an illegal financial threat that directly affects digital currency users: digital currency heists. This would allow victims of extortion or exchange hacks to voluntarily list their extorted or stolen tokens.
While this will not transfer funds back to their legitimate owners, it will make it more difficult to move or steal coins and have long-term consequences for digital currency theft.
Of course, for an AML platform that can self-monitor, there must be a way to review the list, so that inaccurate and illegal information will not be sent out. Otherwise, such a tool could be misused to mistakenly tamper with addresses and then financially persecute innocent people. But implementing AML on a blockchain platform is a more technical way to solve the problem, rather than finding reasons to refuse to find a better way.
The first blockchain protocol, Bitcoin's breakthrough, was designed to decentralize methods to incentivize strangers to complete and affirm the authenticity of global public financial records.
Certainly, with all the attention, time, and money invested in a new product and service, those developing the technology should be able to devise ways to encourage retention of blocks. The chain is clean and untarnished.

❿ What do hackers need to learn

There are many things that hackers need to learn. The underlying ones include programming languages, operating system principles, computer hardware principles, and compilation principles. , network protocols, CPU instruction sets, and the next level up, application writing, server configuration, operation of various software, etc. There are many branches of hackers. Some are good at coding and writing programs, some are good at finding program vulnerabilities, some are good at reverse cracking, and some like to write Trojan viruses. For novices, they need to choose a branch to delve deeper into and become completely proficient in it in the end. In any field, one trick can be used everywhere. Learn one skill first and then expand horizontally to other fields





For programming languages, it is recommended to start with Learn scripting languages, such as JavaScript on the browser side, and PHP, ASP, JSP on the server side. I often have novice friends asking me which one should I learn better in so many fields of hacking. Judging from the current market prospects, it is better to learn network security. To be competitive, first of all, with the rapid development of Internet + and mobile Internet, network security has become aIt is something that is not taken seriously, and network security is better than the development field in terms of learning difficulty and employment salary. Network security can be subdivided into web security, mobile security, Internet of Things security, wireless security, blockchain and even Automobile safety, so you only need to choose one of the subdivisions, become proficient in it, and then expand to other fields. Just like me, I studied web security.

For those who want to learn web security How should my friends learn? First of all, you need to understand how the web works. You need to know how the browser sends your request to the server. The protocols between browsers operate. This requires you to understand HTML (Hypertext Editing Language) and CSS. , JavaScript, and the server-side PHP language. If you don’t understand these basic things, you will use some ready-made vulnerability tools to dig out and penetrate. Some copy-paste operations will not do you any good. If the vulnerability is repaired You can't do anything. A real hacker can discover vulnerabilities and fix them alone

The road to becoming a hacker is long. Only those who can endure loneliness can reach the riverside of their dreams. , if you encounter difficulties on the way to becoming a hacker and want to give up, you can encourage yourself in some other ways. Learning is an anti-human thing. If you encounter difficulties that cannot be solved for the time being, you might as well let it go. , you may naturally understand it as you accumulate knowledge over time. When you want to relax, you might as well find some hacker-themed movies to watch. Here I recommend a German movie, Who Am I? There is no absolute security. system, he will tell you that the biggest vulnerability in the world is people

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 36196 文章总数
  • 3637265访问次数
  • 3078建站天数