cfemale

Advertisement

01

Supervision of community cryptocurrency -Part 3

Advertisement

02
Most Liked

The influence of artificial intelligence assistants -Part 4

The influence of artificial intelligence assistants -Part 2

Risks brought by artificial intelligence assistants -Part 2

Problems in the Revised FATF Standard 1

03
Popular Posts
  • Data Market - Part 3
    Consumer can gain spillover effect and benefit from the transaction, yet they seldom realize it.
  • FATF: Strengthening the supervision of global virtual assets (III)
    The country can supervise virtual asset service providers to authorize licenses and be monitored by national competent authorities to prevent risks associated with virtual asset financial activities.
  • FATF: Strengthening the supervision of global virtual assets (I)
    The Financial Action Task Force focuses on protecting the global financial system from money laundering, terrorism financing, and proliferation financing of weapons of mass destruction.
  • Exclusive contract law for data transmission (V)
    The theory of information barriers assumes that information barriers are hard to overcome and consumers impose restrictions on the use of data transmission, which in fact are not true.
  • Exclusive contract law for data transmission (IV)
    It is possible to terminate or breach of contract, but every action comes with consequences, which may need to bear the damages that one has caused.
  • Four channels through which GSC influences financial stability
    Mainly introduce four channels through which GCS affects financial stability, they respectively are: use GCS as a general value store, widely used for payment, risk exposure of financial institutions and confidence coefficient magnification.
  • FSB: Address the risks caused by global stable coin projects
    Mainly introduce that the FSB is actively building a regulatory framework for global stable coin to prevent its impact on financial stability, and finally describe relevant suggestions of FSB, which includes the regulatory intensity, what kind of cooperation and coordination mechanism should be established and regulatory principles and so on.
  • The definition and design path of CBDC
    CBDC is a new form of currency. Different from cryptocurrency, it has all the basic functions of currency and may have more functions in the future. Considering some of its challenges, the Bank of England is still discussing with the government whether to issue CBDC
  • Data Marts (2)
    Introduce the cost of handing over the data when the transferor is as the data subject and user respectively, and then put forward that it is necessary to restrict the transferee in order to achieve the purpose of mutual benefit, and describe the positive impact on the transferor in detail at the same time.
  • Data Marts (1)
    Firstly, mainly talk about the composition of participants in the data mart and how well the subjects know about it. Then talk about how to make the data mart mutually beneficial, and finally introduce two reasons why the transferor’s cost is low.
  • Impact of Bitcoin Halving 2
    Bitcoin halving is an “inevitably” event and in theory, it should not affect the price of Bitcoin.
  • Why is There a Bitcoin Halving Mechanism?
    This article introduces the two reasons why the Bitcoin halving mechanism exists.
  • Virtual currency brokers: the supervision on cryptocurrency platform (1)
    Mainly introduce the current situation of cryptocurrency market, how to own cryptocurrency, how to transfer cryptocurrency, the role of cryptocurrency wallet provider in cryptocurrency transfer, and the services that cryptocurrency exchange can provide.
  • Build a better data economy model
    First introduce some information about digital footprints, which enables companies to grasp a series of data including human health, travel and so on. Then introduce the positive role of personal data in the development of companies and the response to COVID-19, and finally mention some negative issues about the flow of data around the world.
  • Potential risks of quantum computation (2)
    Introduce that under three different cryptographic algorithms, the risks of quantum computation are different—symmetric keys and hash functions are still relatively safe, while asymmetric keys has a large risk coefficient and are facing elimination.

Advertisement

Privacy Policy | Terms of Use

Copyright 2021.All rights Reserved.

Contact us at : [email protected]