The semi-anonymous nature of cryptocurrency transactions makes them well-suited for a host of nefarious activities, such as money laundering and tax evasion. However, cryptocurrency advocates often value the anonymity highly. Some cryptocurrencies are more private than others. Bitcoin, for instance, is a relatively poor choice for conducting illegal business online, and forensic analysis of bitcoin transactions has led authorities to arrest and prosecute criminals. More privacy-oriented coins do exist, such as Dash, ZCash, or Monero, which are far more difficult to trace.


^ "Bitcoin: The Cryptoanarchists' Answer to Cash". IEEE Spectrum. Archived from the original on 4 June 2012. Around the same time, Nick Szabo, a computer scientist who now blogs about law and the history of money, was one of the first to imagine a new digital currency from the ground up. Although many consider his scheme, which he calls "bit gold", to be a precursor to Bitcoin


Properties of cryptocurrencies gave them popularity in applications such as a safe haven in banking crises and means of payment, which also led to the cryptocurrency use in controversial settings in the form of online black markets, such as Silk Road.[66] The original Silk Road was shut down in October 2013 and there have been two more versions in use since then. In the year following the initial shutdown of Silk Road, the number of prominent dark markets increased from four to twelve, while the amount of drug listings increased from 18,000 to 32,000.[66]
In cryptocurrency networks, mining is a validation of transactions. For this effort, successful miners obtain new cryptocurrency as a reward. The reward decreases transaction fees by creating a complementary incentive to contribute to the processing power of the network. The rate of generating hashes, which validate any transaction, has been increased by the use of specialized machines such as FPGAs and ASICs running complex hashing algorithms like SHA-256 and Scrypt.[30] This arms race for cheaper-yet-efficient machines has been on since the day the first cryptocurrency, bitcoin, was introduced in 2009.[30] With more people venturing into the world of virtual currency, generating hashes for this validation has become far more complex over the years, with miners having to invest large sums of money on employing multiple high performance ASICs. Thus the value of the currency obtained for finding a hash often does not justify the amount of money spent on setting up the machines, the cooling facilities to overcome the enormous amount of heat they produce, and the electricity required to run them.[30][31]


Basically, cryptocurrencies are entries about token in decentralized consensus-databases. They are called CRYPTOcurrencies because the consensus-keeping process is secured by strong cryptography. Cryptocurrencies are built on cryptography. They are not secured by people or by trust, but by math. It is more probable that an asteroid falls on your house than that a bitcoin address is compromised. 

MetaTrader的4 cryptocurrency

The one and only, the first and most famous cryptocurrency. Bitcoin serves as a digital gold standard in the whole cryptocurrency-industry, is used as a global means of payment and is the de-facto currency of cyber-crime like darknet markets or ransomware. After seven years in existence, Bitcoin‘s price has increased from zero to more than 650 Dollar, and its transaction volume reached more than 200.000 daily transactions.


Though karma rules still apply, moderation is less stringent on this thread than on the rest of the sub. Therefore, consider all information posted here with several liberal heaps of salt, and always cross check any information you may read on this thread with known sources. Any trade information posted in this open thread may be highly misleading, and could be an attempt to manipulate new readers by known "pump and dump (PnD) groups" for their own profit. BEWARE of such practices and exercise utmost caution before acting on any trade tip mentioned here.


比特币与莱特币都采用了区块链技术,且都有51%攻击的问题。它们采用区块链技术,所有历史记录按照时间先后顺序,打包成一个个单独的区块,再把这些单独的区块链接在一起形成一个总账本 [5]  。这些区块内除了包含交易记录外,还包含新发行的莱特币和交易的手续费,这两笔钱支付给挖矿的矿工作为酬劳。无论谁挖到该区块,那么该区块内含有的新发行的莱特币和交易的手续费这两笔钱都归挖到者,以鼓励矿工积极参与结算。区块链技术容易产生51%攻击的问题:无论任何组织甚至个人,只要掌控某一种基于区块链原理的虚拟货币的全部运算能力的51%,这个人或组织就能够任意操纵该虚拟货币的所有交易。如果区块链只认运算能力最大者,谁的运算能力最大,谁就能抢到下一个区块,如果某个个人或组织掌控了全部运算能力的51%,那就意味着没人比他运算能力更强,故而他就可以随意操纵。所以,对于基于区块链原理的虚拟货币,参与挖矿的越多就越健壮,运算能力越分散就越健壮;挖坑者越少越脆弱,运算能力越集中就越脆弱,矿池越集中也就越脆弱 [1]  。

Central to the appeal and function of Bitcoin is the blockchain technology it uses to store an online ledger of all the transactions that have ever been conducted using bitcoins, providing a data structure for this ledger that is exposed to a limited threat from hackers and can be copied across all computers running Bitcoin software. Every new block generated must be verified by the ledgers of each user on the market, making it almost impossible to forge transaction histories. Many experts see this blockchain as having important uses in technologies such as online voting and crowdfunding, and major financial institutions such as JPMorgan Chase see potential in cryptocurrencies to lower transaction costs by making payment processing more efficient. However, because cryptocurrencies are virtual and do not have a central repository, a digital cryptocurrency balance can be wiped out by a computer crash if a backup copy of the holdings does not exist, or if somebody simply loses their private keys. At the same time, there is no central authority, government, or corporation that has access to your funds or your personal information. 

0X cryptocurrency reddit的

“Brave’s goal to reconnect users with creators and advertisers in order to fix the broken online ad system is now complete with the new Brave wallet, and we’re thrilled to have partnered with Uphold for this crucial development,” said Brendan Eich, CEO and co-founder of Brave. “The Brave browser offers unmatched speed, privacy, and most importantly an integrated wallet that rewards users and supports content creators, removing intermediaries that thrive on surveillance and fraud.”
In February 2019, Coinbase announced that it had acquired "blockchain intelligence platform" Neutrino, an Italy-based startup, for an undisclosed price.[33] The acquisition raised concern among some Coinbase users[34] based on Neutrino founders' connection to the Hacking Team, which has been accused of providing internet surveillance technology to governments with poor human rights records.[35] On March 4, 2019, Coinbase CEO Brian Armstrong said his company "did not properly evaluate" the deal from a due diligence perspective and thus any Neutrino staff who previously worked at Hacking Team "will transition out of Coinbase."[36]


1) Controlled supply: Most cryptocurrencies limit the supply of the tokens. In Bitcoin, the supply decreases in time and will reach its final number sometime around the year 2140. All cryptocurrencies control the supply of the token by a schedule written in the code. This means the monetary supply of a cryptocurrency in every given moment in the future can roughly be calculated today. There is no surprise.


In April 2019, a UK corporate filing stated that Coinbase's non-U.S. revenue grew 20% to €153 million (U.S.$173 million) in 2018 resulting in a net profit of €6.6 million.[37] Coinbase UK CEO Zeeshan Feroz said the company's non-U.S. operations accounted for nearly one-third of the company's overall revenue and Reuters estimated that the company's global revenue totaled "around $520 million" in 2018.[38]


Over 98% of cryptocurrency is stored securely offline and the rest is protected by industry-leading online security. Your account is also subject to the same scrupulous safety standards, including multi-stage verification and bank-level security. You can even lock the app with a passcode, or remotely disable your phone’s access to the app if it gets lost or stolen. 


2) Pseudonymous: Neither transactions nor accounts are connected to real-world identities. You receive Bitcoins on so-called addresses, which are randomly seeming chains of around 30 characters. While it is usually possible to analyze the transaction flow, it is not necessarily possible to connect the real world identity of users with those addresses.