Bitcoin Surges As China Battles Capital Flight

Exploding bitcoin trade in China has sparked concerns the crypto-currency offers an easy route around foreign exchange controls.

That misreads how this market is functioning. Chinese investors would be daft to use such a volatile tool to hedge against a depreciating yuan, and the market is too small and unbalanced to channel capital flight.

When bitcoin crossed $1,000 per coin in 2013, thanks to surging Chinese interest, anxious officials stopped financial institutions from trading in bitcoin and made it difficult to fund accounts. That helped knock the global bitcoin price back down to $340.

Investors are understandably worried about a fresh crackdown, after central bank officials met the major local bitcoin exchanges on Friday; bitcoin prices shed 12 percent in reaction.

And superficially, the case for another purge looks more urgent. China is busy battling capital flight, making it harder for firms and individuals to convert yuan, and intervened to crush yuan short-sellers last week. Why spare bitcoin? After all, once a Chinese person owns bitcoin, they can swap it anonymously for dollars.

Fortunately for Beijing, it is not that simple. Using bitcoin, which routinely moves 10 percent in a day, as a hedge against a weakening but far less volatile yuan is dangerous, even if the ultimate goal is to use the bitcoin to buy dollars or euros.

Consider too, that Chinese exchanges now host 97 percent of global transactions, worth $143 billion in December 2016. There was only $1.1 billion in dollar-based volumes during the same period. That mismatch makes it hard for Chinese investors to swap bitcoin for hard currency at will.

As bitcoin prices rose on the back of global uncertainty, a herd of Chinese investors leapt aboard.

This was speculation, not flight.

There’s still little sign Chinese people are converting bitcoin to dollars en masse. Instead they trade amongst themselves under the watchful eye of Beijing. That is no crisis for the Chinese government. But it is a nightmare for those who hoped bitcoin would liberate commerce from the tyranny of central banks.

BreakingViews:       Bitcoin Just Isn’t Anonymous Enough:     Cybercrime Isn't The Reason Why Cash Remains King:

 

« Smart City Technology Is Growing
Fear Factor: Pushing Up Cyber Insurance Costs »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

StickyMinds

StickyMinds

StickyMinds is the web's first interactive testing community exclusively engaged in improving software quality throughout the software development lifecycle.

American International Group (AIG)

American International Group (AIG)

AIG, is an American multinational insurance corporation. Commercial services include cyber risk insurance.

CybelAngel

CybelAngel

CybelAngel is a leading digital risk protection platform that detects and resolves external threats before these wreak havoc.

Huntsman Security

Huntsman Security

Huntsman Security provides technology to enable real-time security monitoring and immediate visibility of advanced threats and compliance issues.

SafenSoft (SnS)

SafenSoft (SnS)

SafenSoft delivers high-efficiency, low-impact proactive protection against malware, insider threats, and confidential data leakage.

National Center for Manufacturing Sciences (NCMS) - USA

National Center for Manufacturing Sciences (NCMS) - USA

NCMS is a cross-industry technology development consortium, dedicated to improving the competitiveness of the US industrial base. Strategic initiatives include industrial cyber security.

HCL Technologies

HCL Technologies

HCL offer an integrated portfolio of products, solutions and services built around Digital, IoT, Cloud, Automation, Cybersecurity, Analytics, Infrastructure Management and Engineering Services.

World Congress on Industrial Control Systems Security (WCICSS)

World Congress on Industrial Control Systems Security (WCICSS)

The World Congress on Industrial Control Systems Security (WCICSS) is focused on emerging trends in protection of industrial control systems.

Conduent

Conduent

Conduent delivers mission-critical technology services and solutions on behalf of businesses and governments. Solution areas include digital risk and compliance.

AUREA Technology

AUREA Technology

The photon counter SPD_OEM_NIR from AUREA Technology is designed for quantum key distribution at telecom wavelengths.

Servian

Servian

Servian is one of Australia's leading IT consultancies, with expertise in cloud, data, machine learning, DevOps and cybersecurity.

BlockAPT

BlockAPT

BlockAPT, empowering you with an advanced, intelligent cyber defence platform. We protect our customers digital assets by unifying operational technologies against advanced persistent threats.

OneLayer

OneLayer

OneLayer provide enterprise grade security dedicated for private LTE/5G networks. We ensure that the best IoT security toolkit is implemented in your cellular environment.

MS Tech Solutions

MS Tech Solutions

MS Tech Solutions is a Jamaican-based, multinational consulting company that specializes in the architecture, implementation and management of key network and Information technologies.

Digital Encode

Digital Encode

Digital Encode is a leading consulting and integration firm that specializes in the design, management, and security of business-critical networks, telecommunications, and IT infrastructures.

Attaxion

Attaxion

Attaxion is an External Attack Surface Management (EASM) Platform. We offer attack surface management solutions with #1 asset coverage and laser-focused, actionable intelligence.