Skip to main content

SC allows trade in cryptocurrency, quashes RBI curb

The Supreme Court on Wednesday struck down the curb on cryptocurrency trade in India. “SC rules curb on crypto currency trade illegal,” the report said while adding that the order lifted ban on trading in virtual currency, cryptocurrency and bitcoins. 

Bitcoin, the most valued cryptocurrency in the world, was down 0.39 per cent at $8,815. The market cap of the currency stood at $161 billion. 

“It’s a very positive sign that has come through, something that we have been waiting for and expecting for two years now. Most of the infrastructure and bits and pieces towards the cryptocurrency was already built out over the last few years,” said Benson Samuel, Director Of Technology at Tokenyz Ventures. 

Samuel sees many of the companies that shut their operations due to RBI’s circular coming back in the business. “We should see a lot of them restarting and a lot more activity happening around this space,” he added. 

The Reserve Bank of India had virtually banned cryptocurrency trading in India as in a circular issued on April 6, 2018, it directed that all entities regulated by it shall not deal in virtual currencies or provide services for facilitating any person or entity in dealing with or settling those. 

Regulated entities that were already providing such services were told to exit the relationship within three months. 

The RBI had earlier issued circulars cautioning users, holders and traders of virtual currencies, including bitcoins, regarding various risks associated in dealing with such virtual currencies. The April 6 circular was later challenged in the top court. 

The Internet and Mobile Association of India, representing various cryptocurrency exchanges, had argued that trading in cryptocurrencies in the absence of a law banning those was a “legitimate” business activity under the Constitution. The RBI could not have denied them access to banking channels to carry on such business, it said. 

The central bank defended in the Supreme Court its 2018 circular insisting that it had always been consistent in its opposition to allowing any other payments systems and undermining the integrity of the banking system. 

It argued that though there was no formal ban on cryptocurrencies under any law in existence in India, it had consistently been warning all those dealing with virtual currencies of the risks inherent in them. 

Comments

Popular posts from this blog

List Of Sql Infected Sites-HACKEREAD

SQL injection  is a  code injection  technique, used to  attack  data-driven applications, in which malicious  SQL  statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).  SQL injection must exploit a  security vulnerability  in an application's software, for example, when user input is either incorrectly filtered for  string literal   escape characters  embedded in SQL statements or user input is not  strongly typed  and unexpectedly executed. SQL injection is mostly known as an attack  vector  for websites but can be used to attack any type of SQL database. List of SQL Infected sites:  http://www.genhound.co.uk/source.php?id=477 http://www.lcoastpress.com/journal.php?id=8 http://www.travellers-tales.co.uk/travelJournal.php?id=42 http://www.arrowvalves.co.uk/content.php?id=8 http://www.reaplasrack.co.uk/content.php?id=129 http://www.arrowval...

Google dork list for XSS (Cross- site scripting)-2020

GOOGLE DORK LIST FOR Cross-site scripting -2020 Google Dorks  its also known as google query ,List “Google Hacking” is mainly referred to pull the sensitive information from Google using advanced search terms that help users to search the index of a specific website, specific file type and some interesting information from unsecured Websites. Google Dorks list  2020 can uncover some incredible information such as email addresses and lists, login credentials, sensitive files, website vulnerabilities, and even financial information (e.g. payment card data). Here you can see an example to understand how  Google Darks   password  used by hackers to gain sensitive information from specific websites. You can also use for Exploit DB site to give you according to you Search state. https://www.exploit-db.com/ “ inurl: domain/ ” “ additional dorks A hacker would simply use in the desired parameters as follows: inurl = the URL of a site you want...

Popular Android Zombie game phish users to steal Gmail credentials

The app made its way to Google Play Store was also found phishing users for Facebook credentials. Scary Granny ZOMBY Mod: The Horror Game 2019 is the latest game on Google Play Store that is condemned by the digital security fraternity for sneakily stealing personal data from unsuspecting users. The game, which has been downloaded for over 50,000 times, was available for Android devices making Android users its primary target. The malicious app attempts to collect sensitive information such as Facebook and Gmail login credentials. The malicious activities of Scary Granny ZOMBY Mod were detected by the mobile security firm Wandera. The company found out that the app asks users to enter their Gmail or other Google account credentials, which are then used for collecting private data of the user by hijacking the account –  All of this happens, unsurprisingly, without alerting the user. Gmail phishing page on the supposed gaming app (Screenshot: Wandera) Rese...