立即捐款

比特幣是什麼?

比特幣是什麼?

圖片來源

中國央行正加強控制網上的非銀行業務(註一)的交易,推出以公司形式成立一網上平臺,並強制所有網上支付需要在明年8月前加入(註四)。

旅美經濟學者何清漣表示:「這是清理影子銀行系統的舉措,目標在全國那近30家由國企及民企資本大鱷控制的金融平臺,這些金融平臺幾乎拿到了整套金融業務全牌照,業務流量太大,出了不少問題。這不是針對普通消費者的措施,應該影響不是很大。」

中国人民银行有專題討論,表示:「與集中支付體系相比……比特幣,交易時只改變帳戶數量資訊,沒有發生實質上的區塊鏈交易移動,因此不管哪類交易情況下部分網路癱瘓也不影響整個系統運行,在資料傳遞和記帳登記上穩定性高於雙中心的架構。(註三)」

美國財政部認為,比特幣被用作支持恐怖主義和洗黑錢(註5)。

比特幣由中本聰先生在2008年的一篇只有九頁的論文建立理論基礎,並在2009年建立比特幣網絡。他的文章雖然有中譯本

但直譯法仍然不能避免過於技術性,不利一般性認識。本文嘗試以筆者理解後,再添加其他來源知識,希望讀者對比特幣有一個初步認識。應該注意,當中的中文並非嚴格翻譯,必然有錯漏。

Abstract.

A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone.

摘要

點對點的電子現金讓人們直接進行支付活動而無須經過金融機構。電子簽名方式可解決同一筆錢被多重支付的問題,但其缺點是仍然要經過第三方作保證。比特幣方案解決了這限制。

比特幣運用時間戳記(timestamp)、雜湊(hash)和「基於雜湊的工作量證明」(hash-based-proof-work)組成的一條鏈(chain)。這條鍵紀錄了之前的所有交易,偽造者要重頭組成同樣長度的鏈,付出同樣多的電腦資源,因而並不化算。

這條鍵被由掘金者以「基於雜湊的工作量證明」方法制成,由閒散在各地的義務個人電腦(也稱之為節點,nodes)保存。目前全球在每一時段約有一萬至7千個自由參與的節點。最長的鍵就是最有公信用的鍵。基本上,每一個節點在驗證比特幣交易的真偽上是每一電腦一票的。節點可自由聯網或離開。

1. Introduction

Commerce on the Internet has come to rely almost exclusively on financial institutions serving as trusted third parties to process electronic payments. While the system works well enough for most transactions, it still suffers from the inherent weaknesses of the trust based model. Completely non-reversible transactions are not really possible, since financial institutions cannot avoid mediating disputes. The cost of mediation increases transaction costs, limiting the minimum practical transaction size and cutting off the possibility for small casual transactions, and there is a broader cost in the loss of ability to make non-reversible payments for nonreversible services. With the possibility of reversal, the need for trust spreads. Merchants must be wary of their customers, hassling them for more information than they would otherwise need. A certain percentage of fraud is accepted as unavoidable. These costs and payment uncertainties can be avoided in person by using physical currency, but no mechanism exists to make payments over a communications channel without a trusted party. What is needed is an electronic payment system based on cryptographic proof instead of trust, allowing any two willing parties to transact directly with each other without the need for a trusted third party. Transactions that are computationally impractical to reverse would protect sellers from fraud, and routine escrow mechanisms could easily be implemented to protect buyers. In this paper, we propose a solution to the double-spending problem using a peer-to-peer distributed timestamp server to generate computational proof of the chronological order of transactions. The system is secure as long as honest nodes collectively control more CPU power than any cooperating group of attacker nodes.

引言

現行電子支付(如支付寶等)需要第三方作中介。雖然它普遍被使用,但它仍然存有信託制度的既有問題,例如第三方的作弊問題。中介費用高增加了交易成本,限制了小額交易的可能性。交易商有可能索取不必要的個人資料。現鈔交易可以免除上述毛病,但電子支付仍然解決不了。本文提出的數學方法令交易紀錄無法偽造,因此可給交易雙方信心。在這裡,只要有足夠的義務節點,偽幣不會存在。

2. Transactions

We define an electronic coin as a chain of digital signatures. Each owner transfers the coin to the next by digitally signing a hash of the previous transaction and the public key of the next owner and adding these to the end of the coin. A payee can verify the signatures to verify the chain of ownership. The problem of course is the payee can't verify that one of the owners did not double-spend the coin. A common solution is to introduce a trusted central authority, or mint, that checks every transaction for double spending. After each transaction, the coin must be returned to the mint to issue a new coin, and only coins issued directly from the mint are trusted not to be double-spent. The problem with this solution is that the fate of the entire money system depends on the company running the mint, with every transaction having to go through them, just like a bank. We need a way for the payee to know that the previous owners did not sign any earlier transactions. For our purposes, the earliest transaction is the one that counts, so we don't care about later attempts to double-spend. The only way to confirm the absence of a transaction is to be aware of all transactions. In the mint based model, the mint was aware of all transactions and decided which arrived first. To accomplish this without a trusted party, transactions must be publicly announced [1], and we need a system for participants to agree on a single history of the order in which they were received. The payee needs proof that at the time of each transaction, the majority of nodes agreed it was the first received.

比特幣交易

電子貨幣是一連串的電子簽署。電子貨幣持有人在支付時,首先電子確認,再將其確認加密在這批電子貨幣上。收款人會得到一條公眾鑰匙,作一定數量的電子貨幣的持有人身份。收款人可在過往紀錄上查冊。問題是,收款人如何保證這批電子貨幣在同一時間沒有被支付多次呢?以第三方(鑄幣廠模式)的解決方法是,金融機構先從支付者收回這批電子貨幣,然後發行新的電子貨幣給收款人。

這方法的缺點是過份依賴第三方,讓它擁有央行的權力。我們需要找出一個方法,讓收款人在不需要第三方的情況下,確知貨幣沒有被重複支付。在我們的方法裡,只需要確保第一次支付沒有被濫用就可以了。我們要知道所有的交易紀錄。第三方模式知道所有交易,因此它知道早來遲來的交易。

我們的方法是不經第三方的,所以我們需要將所有交易公開透明,參與者需要認同一條交易時間序列(區塊鍵)。若作為公證的節點以大比數確認了最長的區塊鍵時,收款人就可以以此來保證交易成功,他沒有收到偽幣。

3. Timestamp Server

The solution we propose begins with a timestamp server. A timestamp server works by taking a hash of a block of items to be timestamped and widely publishing the hash, such as in a newspaper or Usenet post [2-5]. The timestamp proves that the data must have existed at the time, obviously, in order to get into the hash. Each timestamp includes the previous timestamp in its hash, forming a chain, with each additional timestamp reinforcing the ones before it

時間戳伺服器

中本聰在2008年建議設立一個時間戳伺服器。它為每一個區聯塊打上時間戳,以證明該區聯塊何時產生。每一時間戳包括其之前的時間戳,連成一條鍵。現在,掘金者取代了時間戳伺服器功能,為區聯塊打上時間戳。

4. Proof-of-Work

To implement a distributed timestamp server on a peer-to-peer basis, we will need to use a proof -of- work system similar to Adam Back's Hashcash [6], rather than newspaper or Usenet posts. The proof-of-work involves scanning for a value that when hashed, such as with SHA-256, the hash begins with a number of zero bits. The average work required is exponential in the number of zero bits required and can be verified by executing a single hash. For our timestamp network, we implement the proof-of-work by incrementing a nonce in the block until a value is found that gives the block's hash the required zero bits. Once the CPU effort has been expended to make it satisfy the proof-of-work, the block cannot be changed without redoing the work. As later blocks are chained after it, the work to change the block would include redoing all the blocks after it. The proof-of-work also solves the problem of determining representation in majority decision making. If the majority were based on one-IP-address-one-vote, it could be subverted by anyone able to allocate many IPs. Proof-of-work is essentially one-CPU-one-vote. The majority decision is represented by the longest chain, which has the greatest proof-of-work effort invested in it. If a majority of CPU power is controlled by honest nodes, the honest chain will grow the fastest and outpace any competing chains. To modify a past block, an attacker would have to redo the proof-of-work of the block and all blocks after it and then catch up with and surpass the work of the honest nodes. We will show later that the probability of a slower attacker catching up diminishes exponentially as subsequent blocks are added. To compensate for increasing hardware speed and varying interest in running nodes over time, the proof-of-work difficulty is determined by a moving average targeting an average number of blocks per hour. If they're generated too fast, the difficulty increases..

工作量證明

點對點的分佈式時間戳伺服器運用了『工作量證明』技巧。『工作量證明』以數學方式(hash)將交易紀錄制作成一串256位的數字。它以一堆零作開始。這串256位的數字的開始零越多,則需要電腦資源越多。時間戳伺服器需要一條加密鑰匙推算出一條足夠難度的256位數字(即足夠零起始的數字系列)。這是電腦資源的比併。若想改動一個區塊,其之前的工作必需重新運算。隨著區塊越堆越多,作弊越來越難。現在的『工作量證明』主要由交易商或集團式掘金者完成。他們將全球每約十分鐘的交易(約數千條)的交易加密成一個區塊,放在鍵的最頂項。全球的節點義工紀錄了這條最長的鍵,並見證成為可信的比特幣交易。累積起來的龐大的已付出的電腦資源令偽幣鑄造者無利可圖。

5. Network

The steps to run the network are as follows:
1) New transactions are broadcast to all nodes.
2) Each node collects new transactions into a block.
3) Each node works on finding a difficult proof-of-work for its block.
4) When a node finds a proof-of-work, it broadcasts the block to all nodes.
5) Nodes accept the block only if all transactions in it are valid and not already spent.
6) Nodes express their acceptance of the block by working on creating the next block in the chain, using the hash of the accepted block as the previous hash.

Nodes always consider the longest chain to be the correct one and will keep working on extending it. If two nodes broadcast different versions of the next block simultaneously, some nodes may receive one or the other first. In that case, they work on the first one they received, but save the other branch in case it becomes longer. The tie will be broken when the next proof-of- work is found and one branch becomes longer; the nodes that were working on the other branch will then switch to the longer one.
比特幣網絡

比特幣網絡的運作方式如下:

1)新的交易會向通知所有節點義工。
2)每個節點將新的交易紀錄到一個區塊中。
3)每個節點各自尋找一個複雜(即最可信)的「工作量證明」。
4)當一個節點滿足於某個「工作量證明」時,它將這「驗證」廣播到所有節點。
5)只當區塊中的所有交易都有效並且沒有重複支付時,節點才接受該區塊。
6)當節點接受一個區塊後,它們會在它之上建立另一個區塊,連成一條鍵,並將之前的區塊的「指纹」紀錄在新區塊內。

節點若在相近的一段很短時間內收到兩個「工作量證明」,它們會將其保留一段時間,以便比較出最長的分支,接納其為最新的區塊鍵。

6. Incentive

By convention, the first transaction in a block is a special transaction that starts a new coin owned by the creator of the block. This adds an incentive for nodes to support the network, and provides a way to initially distribute coins into circulation, since there is no central authority to issue them.

The steady addition of a constant of amount of new coins is analogous to gold miners expending resources to add gold to circulation. In our case, it is CPU time and electricity that is expended. The incentive can also be funded with transaction fees. If the output value of a transaction is less than its input value, the difference is a transaction fee that is added to the incentive value of the block containing the transaction. Once a predetermined number of coins have entered circulation, the incentive can transition entirely to transaction fees and be completely inflation free. The incentive may help encourage nodes to stay honest. If a greedy attacker is able to assemble more CPU power than all the honest nodes, he would have to choose between using it to defraud people by stealing back his payments, or using it to generate new coins. He ought to find it more profitable to play by the rules, such rules that favour him with more new coins than everyone else combined, than to undermine the system and the validity of his own wealth.

報酬

按慣例,區塊中的第一個交易創造者(交易商,或掘金者,在這裡兩者大致是同一種東西)可以得到一個新的硬幣。這是它的報酬,同時也增加比特幣進入流通。

新的硬幣數量的不斷增加與淘金者不斷增添黃金進入流通相似。在我們這種情況下,黃金就這是CPU時間和耗電量。交易商若成功制作並被接納一個區塊時,可賺取12.5個比特幣(隨周期減半,註6)和交易費。

交易商賺取交易差額,或它可以豁免交易費。當一定數量的硬幣進入流通後,交易商可以收取全部費用,比特幣是沒有通貨膨脹現象的。

獎勵有助於鼓勵節點誠實。如果一個貪婪的攻擊者能夠組裝比所有誠實節點更多的CPU電源,他可以選擇用它來產生新的硬幣,這會比來用它來竊取別人的硬幣更佳。這樣的規則有利於他獲得更多的新硬幣,而不是破壞系統和自己的財富。

7. Reclaiming Disk Space

Once the latest transaction in a coin is buried under enough blocks, the spent transactions before it can be discarded to save disk space. To facilitate this without breaking the block's hash, transactions are hashed in a Merkle Tree [7][2][5], with only the root included in the block's hash. Old blocks can then be compacted by stubbing off branches of the tree. The interior hashes do not need to be stored. A block header with no transactions would be about 80 bytes. If we suppose blocks are generated every 10 minutes, 80 bytes * 6 * 24 * 365 = 4.2MB per year. With computer systems typically selling with 2GB of RAM as of 2008, and Moore's Law predicting current growth of 1.2GB per year, storage should not be a problem even if the block headers must be kept in memory.
節省儲存空間

當區塊鍵建到某一長度時,其之前的區塊可以刪去以節省空間又不降低其完整性。這裡用上了一種數學樹的同步數據一致性的算法。由於區塊鍵的增長速度低於儲存芯片的增長速度。預計電腦不會因為區塊鍵的增長而無法運作。

8. Simplified Payment Verification

It is possible to verify payments without running a full network node. A user only needs to keep a copy of the block headers of the longest proof-of-work chain, which he can get by querying network nodes until he's convinced he has the longest chain, and obtain the Merkle branch linking the transaction to the block it's timestamped in. He can't check the transaction for himself, but by linking it to a place in the chain, he can see that a network node has accepted it, and blocks added after it further confirm the network has accepted it. As such, the verification is reliable as long as honest nodes control the network, but is more vulnerable if the network is overpowered by an attacker. While network nodes can verify transactions for themselves, the simplified method can be fooled by an attacker's fabricated transactions for as long as the attacker can continue to overpower the network. One strategy to protect against this would be to accept alerts from network nodes when they detect an invalid block, prompting the user's software to download the full block and alerted transactions to confirm the inconsistency. Businesses that receive frequent payments will probably still want to run their own nodes for more independent security and quicker verification.

簡化交收核算

核實交易是否成功,用者不需要在其電腦上運行整固節點程式。這需要每月諮詢。他不能自行查冊交易詳情,但他可以了解其他節點是否接受了這一區塊。由於區塊鍵的安全性是建基於大多數節點為誠實,其保安措施為:當某個節點發現可疑區塊時,它會向其他節點發預警。

9. Combining and Splitting Value

Although it would be possible to handle coins individually, it would be unwieldy to make a separate transaction for every cent in a transfer. To allow value to be split and combined, transactions contain multiple inputs and outputs. Normally there will be either a single input from a larger previous transaction or multiple inputs combining smaller amounts, and at most two outputs: one for the payment, and one returning the change, if any, back to the sender. It should be noted that fan-out, where a transaction depends on several transactions, and those transactions depend on many more, is not a problem here. There is never the need to extract a complete standalone copy of a transaction's history.

比特幣的整合和拆細

為了方便支付,比特幣可以整合和拆細。其方法是將交易分為多個輸入和輪出。通常地,一筆大交易只有一個輸出口,一堆細交易則由多個輸入點整合。它會將找找贖退回給付款者。比特幣可以解決複雜交易。它不需要知道完整的交易歷史。

10. Privacy

The traditional banking model achieves a level of privacy by limiting access to information to the parties involved and the trusted third party. The necessity to announce all transactions publicly precludes this method, but privacy can still be maintained by breaking the flow of information in another place: by keeping public keys anonymous. The public can see that someone is sending an amount to someone else, but without information linking the transaction to anyone. This is similar to the level of information released by stock exchanges, where the time and size of individual trades, the "tape", is made public, but without telling who the parties were. As an additional firewall, a new key pair should be used for each transaction to keep them from being linked to a common owner. Some linking is still unavoidable with multi-input transactions, which necessarily reveal that their inputs were owned by the same owner. The risk is that if the owner of a key is revealed, linking could reveal other transactions that belonged to the same owner.

私隱

傳統交易中介如銀行會保障客人的一定私隱,但比特幣公開了所有交易歷史。比特幣的保障私隱的方法是將資料分拆,收起公開鑰匙。在比特幣中,公眾獲悉每筆交易的流量、時間等,但不會知道交易者的身份。這和證券市場的作法相若。進一步,在每次交易裡,一套新的鑰匙交給比持幣持有人,令人們無法將該人的其他交易連繫跟蹤。它還有一些私隱隱患的,若持有人的鑰匙被別人得悉,他的交易有可能被別人查到。

Calculations

We consider the scenario of an attacker trying to generate an alternate chain faster than the honest chain. Even if this is accomplished, it does not throw the system open to arbitrary changes, such as creating value out of thin air or taking money that never belonged to the attacker. Nodes are not going to accept an invalid transaction as payment, and honest nodes will never accept a block containing them. An attacker can only try to change one of his own transactions to take back money he recently spent. The race between the honest chain and an attacker chain can be characterized as a Binomial Random Walk. The success event is the honest chain being extended by one block, increasing its lead by +1, and the failure event is the attacker's chain being extended by one block, reducing the gap by -1. The probability of an attacker catching up from a given deficit is analogous to a Gambler's Ruin problem. Suppose a gambler with unlimited credit starts at a deficit and plays potentially an infinite number of trials to try to reach breakeven. We can calculate the probability he ever reaches breakeven, or that an attacker ever catches up with the honest chain, as follows [8]: p = probability an honest node finds the next block q = probability the attacker finds the next block qz = probability the attacker will ever catch up from z blocks behind qz={ 1 if p≤q q/ pz if pq} 6 Identities Transactions Trusted Third Party Counterparty Public Identities Transactions Public New Privacy Model Traditional Privacy Model Given our assumption that p > q, the probability drops exponentially as the number of blocks the attacker has to catch up with increases. With the odds against him, if he doesn't make a lucky lunge forward early on, his chances become vanishingly small as he falls further behind. We now consider how long the recipient of a new transaction needs to wait before being sufficiently certain the sender can't change the transaction. We assume the sender is an attacker who wants to make the recipient believe he paid him for a while, then switch it to pay back to himself after some time has passed. The receiver will be alerted when that happens, but the sender hopes it will be too late. The receiver generates a new key pair and gives the public key to the sender shortly before signing. This prevents the sender from preparing a chain of blocks ahead of time by working on it continuously until he is lucky enough to get far enough ahead, then executing the transaction at that moment. Once the transaction is sent, the dishonest sender starts working in secret on a parallel chain containing an alternate version of his transaction. The recipient waits until the transaction has been added to a block and z blocks have been linked after it. He doesn't know the exact amount of progress the attacker has made, but assuming the honest blocks took the average expected time per block, the attacker's potential progress will be a Poisson distribution with expected value: =z q p To get the probability the attacker could still catch up now, we multiply the Poisson density for each amount of progress he could have made by------。
數學方法

讓我們想像有盜幣者想攻擊區塊鍵,就算他有能力比誠實的區塊鍵的生長速度更快,誠實大多數的節點仍然不會接受它制做出的區塊鍵,節點會分辨出虛構出來的交易。

盜幣者唯一的方法是運用詐騙手法,收回自己剛剛支付的比特幣。但在這個速度競賽中,盜幣者的成功機會很低。

12. Conclusion

We have proposed a system for electronic transactions without relying on trust. We started with the usual framework of coins made from digital signatures, which provides strong control of ownership, but is incomplete without a way to prevent double-spending. To solve this, we proposed a peer-to-peer network using proof-of-work to record a public history of transactions that quickly becomes computationally impractical for an attacker to change if honest nodes control a majority of CPU power. The network is robust in its unstructured simplicity. Nodes work all at once with little coordination. They do not need to be identified, since messages are not routed to any particular place and only need to be delivered on a best effort basis. Nodes can leave and rejoin the network at will, accepting the proof-of-work chain as proof of what happened while they were gone. They vote with their CPU power, expressing their acceptance of valid blocks by working on extending them and rejecting invalid blocks by refusing to work on them. Any needed rules and incentives can be enforced with this consensus mechanism

結論

比特幣解決了電子支付在沒有第三方保證的雙重支付問題。解決的方法是在點對點網絡上運用“工作量證明”來紀錄所有比特幣交易。在攻防戰中,盜幣者很快被誠實的節點打破。比特幣網絡簡單實用,節點共同協作但不用高度統一。節點作為義工,不用表露身份,因為交易訊息不是指向特定地點,而且,只有最好的區塊被傳播出去。節點可以隨時加入或退出。它們是一節點一票,不會接受偽造區塊鍵。它們在共識之下生存。

附錄

註一

中國人民銀行公告第17號〔2016〕
根據《非金融機構支付服務管理辦法》(中國人民銀行令〔2010〕第2號發佈)、《中國人民銀行關於〈支付業務許可證〉續展工作的通知》(銀髮〔2015〕358號),中國人民銀行對27家非銀行支付機構(以下簡稱支付機構)《支付業務許可證》續展申請作出決定(見附件)。現將有關事項公告如下:

一、本次《支付業務許可證》續展有效期為五年,截止日期為2021年5月2日。
二、為整合業務資源,發揮規模效應,提高監管效率,本次續展對擬合併《支付業務許可證》的支付機構,相應調整其業務範圍。
被合併支付機構應於公告之日起6個月內完成支付業務承接工作。中國人民銀行將在業務承接工作完成後,辦理相關《支付業務許可證》的註銷、換發事宜。
三、因部分支付機構存在業務嚴重違規、業務停滯萎縮或主動申請終止業務類型等情形,本次續展調減其業務範圍。相關機構應於公告之日起6個月內按要求有序停止開展相關支付業務。
四、中國人民銀行將繼續依法、審慎開展《支付業務許可證》續展工作。對於長期未實質開展支付業務的支付機構,中國人民銀行將依法採取取消相關業務種類、註銷《支付業務許可證》等監管措施;對於存在嚴重違法違規行為的支付機構,將嚴格依據相關法律法規予以查處,以保障支付服務市場規範有序發展。

中國人民銀行
2016年8月11日

附件:27 家非銀行支付機構《支付業務許可證》續展

註二

人民銀行發佈《非銀行支付機構網路支付業務管理辦法》
中央政府門戶網站 2015-12-28 21:51 來源: 人民銀行網站

中國人民銀行公告〔2015〕第43號
為規範非銀行支付機構網路支付業務,防範支付風險,保護當事人合法權益,中國人民銀行制定了《非銀行支付機構網路支付業務管理辦法》,現予發佈實施。

附件:非銀行支付機構網路支付業務管理辦法

註三

主管:中国人民银行 | 主办:中国支付清算协会 | 2017年第2期 总第23期

與集中支付體系相比,區塊鏈轉帳支付交易可以在雙方直接進行,不涉及中間機構,也可以通過支付服務商,如比特幣兌換主權貨幣通過交易平臺,這些交易平臺業務性質類似於銀行,提供帳戶既包含主權貨幣、比特幣,交易時只改變帳戶數量資訊,沒有發生實質上的區塊鏈交易移動,因此不管哪類交易情況下部分網路癱瘓也不影響整個系統運行,在資料傳遞和記帳登記上穩定性高於雙中心的架構。

註四

通知表示,人民銀行指導支付清算協會建設“非銀行支付機構網路清算平臺”(簡稱“網聯平臺”),主要處理支付機構發起的涉及銀行帳戶的網路支付業務。現就網路支付業務由支付機構與銀行直連模式遷移至網聯平臺處理有關事項通知如下:

一、自2018年6月30日起,支付機構受理的涉及銀行帳戶的網路支付業務全部通過網聯平臺處理。
二、各銀行和支付機構應於2017年10月15日前完成接入網聯平臺和業務遷移相關準備工作。
三、網聯平臺運營機構應制定實施計畫,組織各銀行和支付機構妥善做好接入工作,包括聯調測試、生產驗證、壓力測試和存量協定遷移等,並提供相關業務、技術支援。
四、各銀行和支付機構應高度重視,加強組織協調,按照計畫完成相關工作。指定專人負責工作對接,並於8月15日前將連絡人名單回饋人民銀行支付結算司。
五、請人民銀行各分支機搆支付結算處速將本通知轉發至轄區內各銀行和支付機構,指導並督促其認真做好接入網聯平臺和業務切量工作

註五

3. NEW PAYMENT SYSTEMS
As detailed in the National ML Risk Assessment, virtual currencies such as Bitcoin and other emerging payments technologies, while representing an opportunity for financial innovation, have attracted the attention of various criminal groups, and may be vulnerable to abuse by terrorist financiers. For example, the U.S. Secret Service has observed that criminals are looking for and finding virtual currencies that offer anonymity for both users and transactions; the ability to move illicit proceeds from one country to another quickly; low volatility, which results in lower exchange risk; widespread adoption in the criminal underground; and trustworthiness.282 In terms of TF risk, there has been some speculation about using virtual currency to transfer funds overseas. For example, a posting on a blog linked to ISIL has proposed using Bitcoin to fund global jihadist efforts.

註六

Bitcoin just experienced a major milestone in its short little lifespan. The reward for mining a block (a block = a ledger of transaction data) was just cut in half from 25 bitcoins to 12.5 bitcoins.

So, today was the second ever halving in the history of Bitcoin. The first halving (when the reward was cut from 50 to 25 bitcoins) was back in November of 2012, when the price was around $12 dollars.

註七

Minimum Requirements
Bitcoin Core full nodes have certain requirements. If you try running a node on weak hardware, it may work—but you’ll likely spend more time dealing with issues. If you can meet the following requirements, you’ll have an easy-to-use node.

Desktop or laptop hardware running recent versions of Windows, Mac OS X, or Linux.

145 gigabytes of free disk space
2 gigabytes of memory (RAM)
A broadband Internet connection with upload speeds of at least 400 kilobits (50 kilobytes) per second

An unmetered connection, a connection with high upload limits, or a connection you regularly monitor to ensure it doesn’t exceed its upload limits. It’s common for full nodes on high-speed connections to use 200 gigabytes upload or more a month. Download usage is around 20 gigabytes a month, plus around an additional 140 gigabytes the first time you start your node.

6 hours a day that your full node can be left running. (You can do other things with your computer while running a full node.) More hours would be better, and best of all would be if you can run your node continuously.

Note: many operating systems today (Windows, Mac, and Linux) enter a low-power mode after the screensaver activates, slowing or halting network traffic. This is often the default setting on laptops and on all Mac OS X laptops and desktops. Check your screensaver settings and disable automatic “sleep” or “suspend” options to ensure you support the network whenever your computer is running.