Here Comes China’s Crypto-Currency

Another fledgling crypto-currency is looking to make its mark. Unlike Bitcoin, which just soared past the price of gold, and other altcoins, this crypto-currency has the backing of an entire nation. 

The Chinese government is busy converting its national currency, the Renminbi (RMB), to a digital currency. It could rollout as early as this year and may point to decreased need for credit information in the country.

One does not simply convert paper money into ones and zeros on a distributed ledger, so how will this work?

Working closely with China’s Ministry of Finance, the People's Bank of China (PBOC) could roll-out its blockchain-based currency, and end the paper-based RMB, through two methods. 

The PBOC could transact directly with the country’s banks, making the banks responsible for transactions with businesses and consumers. Or, the PBOC could go directly to the public and banks with its digital currency, managing all technology and services. It’s more than a logistics problem, though. Domestically, China must deal with adoption. 

While most China’s population is online, it is far from 100%. A digital currency will require that all its citizens have access. Internationally, it appears as if China is acting alone, which is fine, if it doesn’t plan any transactions with its crypto-currency outside its borders, but that is not the case.

As global trade with China continues apace, such an overhaul of its currency could send global commerce and foreign-currency exchange into a state of disruption. For the greater information industry, this means both threats and opportunities.

In terms of threats to the information industry, there may be less need for credit information in China. If all consumers and businesses are transacting via crypto-currency, they can only transact with money that they have. 

On the up side, tax and accounting settlements will be instant, and third party screening for risk and compliance will be greatly enhanced, given visibility of transactions and apparently addressing money laundering, bribery, corruption, and terrorist funding.

China’s centralised control of innovation policies has enabled the country to develop and test numerous fintech solutions at a mind-boggling pace. The UK and US may be great innovators in fintech and social media, but China, with its non-existent privacy acts, may perfect them sooner.

OutSellInc:

Bitcoin Surges As China Battles Capital Flight:

What Happened To The Blockchain Revolution?:

The Future Of Cash (£):

HSBC Appoints A Technology Advisory Board:

 

 

 

 

« Hackers Threaten To Attack Israel's Cyber Infrastructure
WikiLeaks Will Share CIA's Hacking Secrets »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CLUSIL

CLUSIL

CLUSIL is an association for the information security industry in Luxembourg.

maCERT

maCERT

maCERT is the national Computer Emergency Response Team for Morocco.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

Wibu-Systems

Wibu-Systems

Wibu-Systems is a leading provider of solutions for the Digital Rights Management (DRM) and anti-piracy industry.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

The Open Group

The Open Group

The Open Group: Leading the development of open, vendor-neutral IT standards and certifications.

Aptiv

Aptiv

Aptiv is a global technology company that develops safer, greener and more connected solutions enabling the future of mobility.

Rhino Security Labs

Rhino Security Labs

Rhino Security Labs is a top penetration testing and security assessment firm, with a focus on cloud pentesting, network pentesting, web application pentesting, and phishing.

Trustify

Trustify

Trustify is a Managed Security Service Provider offering a suite of world-class Cyber Risk Management services.

Coveware

Coveware

Coveware helps businesses remediate ransomware. We help companies recover after files have been encrypted, and our analytic, monitoring and alerting tools help companies prevent ransomware incidents.

Mainstream Technologies

Mainstream Technologies

Mainstream Technologies is an information technology services firm specializing in custom software development, managed IT services, cybersecurity services and hosting.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

Nothreat

Nothreat

Nothreat has revolutionized how businesses like yours protect themselves from damaging cyber attacks. Our tech learns and adapts in real time, protecting clients from even zero-day attacks.

Leapfrog Services

Leapfrog Services

Leapfrog offers outsourced managed IT + cybersecurity services that are scalable, aligned, and fit easily into your business model.