Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
China Slams Bitcoins: What's Next?
Newest First  |  Oldest First  |  Threaded View
Ariella
Ariella,
User Rank: Apprentice
12/8/2013 | 9:03:50 AM
Re:value of bitcoins
@virsiingh211 even at $680, it is still over quadruple what it was this past summer, so anyone who bought it back then still has a most impressive return on the investment. 
virsingh211
virsingh211,
User Rank: Apprentice
12/8/2013 | 1:32:23 AM
Re:value of bitcoins
I would not say threat to democracy but yes its increasing popularity has made Bitcoin, a kind of universal currency due to which China think that this can disturb image of natural currency. Also due to this act of China Bitcoin Price Index has dropped i.e. now the price of each bitcoin is just about $680.
samicksha
samicksha,
User Rank: Apprentice
12/7/2013 | 11:37:26 PM
Re:value of bitcoins
I dont understand why but is it that China feels, Bitcoin is threat to democracy, on other part Baidu (local serach engine) has stopped accepting Bitcoins, is it time for Google to join the Market.
Ariella
Ariella,
User Rank: Apprentice
12/7/2013 | 6:47:04 PM
Re:value of bitcoins
I'm surprised that Greenspan would assert, "It has to have intrinsic value. You have to really stretch your imagination to infer what the intrinsic value of Bitcoin is. I haven't been able to do it. Maybe somebody else can." The basic definition of money is that it is a medium of exchange, a meaure of value, and a store of value. Intrinsic value has nothing to do with it. 
StephenR243
StephenR243,
User Rank: Apprentice
12/7/2013 | 3:13:03 PM
Securing BITCOINS
Well of course BITCOINS can be secured.  Diamond Circle offers a complete solution for obtaining and disposing of them.  Like any financial system security controls are essential and the methods of ensuring control require a form of centralisation from a trusted authority.

The decision by the Chinese Government is responsible because it seeks to force parties like ours to put in the right types of controls such as identifying and recording transactions.  Excluding the Banking system means that costs will be lower for our Merchants that accept Bitcoins for trade and exchange.

Our NFC readers allow our merchants to charge customers in Bitcoins, and to provide Bitcoin ATMs that can be used to issue new wallet tags as well as top up and withdraw funds from Bitcoin accounts.

The NFC tags can be affixed to the back of a mobile phone and are used to store the owner's Bitcoin balance and their private key. They are encoded using our proprietary technology which prevents a 'man in the middle' attack — where vital data is stolen or manipulated during transfer.

Merchants can then use a standard NFC reader attached to a PC to read a tag's balance and transfer the cost of a purchase from a customer's Bitcoin tag to their own account.

The software will automatically adjust the amount of Bitcoins the customer pays For example, if a coffee costs $3.50, the system works out how much $3.50 is in Bitcoins immediately and in your currency.

The NFC reader can also be used to load credit onto a tag. In this scenario a consumer may present their cash or credit card to a merchant, who transfers bitcoin to the consumer's tag.

The Bitcoin ATMs are designed to be installed in shopping centres as standalone units, enabling users to purchase NFC tags pre-loaded with their choice of Bitcoin balance as well as top up the balance on their existing tag by tapping it to the machine. The ATMs will accept payment for Bitcoins via debit or credit card and will also allow customers to withdraw Bitcoins stored on their NFC tag in the form of a cashier's cheque.

By using NFC devices which are low cost and flexible, we are able to offer users a simple and safe way of storing and transacting Bitcoin. In the case of a lost or stolen tag our web portal can be used by a consumer to cancel and transfer the balance to another tag.  The readers can be used at home also. 

Using Banking Level Security means that the issue of loss is negated.  It is unfortunate that Banks are excluded from this process, however non-banking organisations like ours are able to offer innovations which make dealing with bitcoins safe and secure. 

http://products.diamondcircle.net/collections/investors/products/diamond-circle-stock

 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file