China Brings Law to Categorize Crypto Passwords Ahead of CBDC Launch
- The PBoC is set to initiate the trial of digital yuan with its partners.

As the bell of a new year stroke, China implemented a new law governing the cryptographic passwords.
This law came into effect ahead of the launch of the People’s Bank of China-backed digital currency, which is expected to hit the market this year.
Reported by the local news outlet China Money Network, the new law has categorized crypto passwords into three distinct types - core passwords, common passwords, and commercial passwords.
The government of the country will strictly regulate the core passwords and the common passwords, while with the third category of passwords, it will nurture the use of digital currency in the commercial sectors.
The Chinese government introduced a bill of this recently implemented law in October last year, which was passed in the same month.
Bejing's push to adopt Blockchain Blockchain Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the world’s first cryptocurrency.In particular, bundles of transaction data, called “blocks”, are added to the ledger in a chronological fashion, forming a “chain.” These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called “nodes.” These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchain’s ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others. Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the world’s first cryptocurrency.In particular, bundles of transaction data, called “blocks”, are added to the ledger in a chronological fashion, forming a “chain.” These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called “nodes.” These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchain’s ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others. Read this Term technology
The new law is expected to strengthen the base of cryptographic technology as the country is mulling to adopt blockchain technology in many sectors.
Moreover, the central bank is also working on its central bank digital currency (CBDC), and though the launch was anticipated for late last year, it was delayed until 2020. Without any official details, multiple officials from the monetary regulator came out to tease about the upcoming currency, stating that the digital version of the yuan will be centralized and controlled by the central bank.
PBoC is gearing up to start a trial of its digital currency soon, along with some hand-picked partners from the banking and technology industry.
When launched, the digital yuan will be the first central bank-backed cryptocurrency. Though multiple island nations like the Marshall Islands also launched and developed their own digital currency, they mostly fall under the category of stablecoins rather than a CBDC.
As the bell of a new year stroke, China implemented a new law governing the cryptographic passwords.
This law came into effect ahead of the launch of the People’s Bank of China-backed digital currency, which is expected to hit the market this year.
Reported by the local news outlet China Money Network, the new law has categorized crypto passwords into three distinct types - core passwords, common passwords, and commercial passwords.
The government of the country will strictly regulate the core passwords and the common passwords, while with the third category of passwords, it will nurture the use of digital currency in the commercial sectors.
The Chinese government introduced a bill of this recently implemented law in October last year, which was passed in the same month.
Bejing's push to adopt Blockchain Blockchain Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the world’s first cryptocurrency.In particular, bundles of transaction data, called “blocks”, are added to the ledger in a chronological fashion, forming a “chain.” These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called “nodes.” These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchain’s ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others. Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the world’s first cryptocurrency.In particular, bundles of transaction data, called “blocks”, are added to the ledger in a chronological fashion, forming a “chain.” These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called “nodes.” These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchain’s ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others. Read this Term technology
The new law is expected to strengthen the base of cryptographic technology as the country is mulling to adopt blockchain technology in many sectors.
Moreover, the central bank is also working on its central bank digital currency (CBDC), and though the launch was anticipated for late last year, it was delayed until 2020. Without any official details, multiple officials from the monetary regulator came out to tease about the upcoming currency, stating that the digital version of the yuan will be centralized and controlled by the central bank.
PBoC is gearing up to start a trial of its digital currency soon, along with some hand-picked partners from the banking and technology industry.
When launched, the digital yuan will be the first central bank-backed cryptocurrency. Though multiple island nations like the Marshall Islands also launched and developed their own digital currency, they mostly fall under the category of stablecoins rather than a CBDC.