Trending February 2024 # Binance Strives In Its Continuous Efforts To Secure The Crypto Space # Suggested March 2024 # Top 11 Popular

You are reading the article Binance Strives In Its Continuous Efforts To Secure The Crypto Space updated in February 2024 on the website Daihoichemgio.com. We hope that the information we have shared is helpful to you. If you find the content interesting and meaningful, please share it with your friends and continue to follow and support us for the latest updates. Suggested March 2024 Binance Strives In Its Continuous Efforts To Secure The Crypto Space

In 2023, a pandemic-driven shift in investment prospects sparked a surge in investor interest in cryptocurrencies. However, the craze was not without its drawbacks as the number of frauds and scams associated with it increased too. 

Hacks, scams, and ransomware attacks cost the crypto industry billions of dollars last year, with major projects falling prey to the frauds of malicious attackers. 

Authorities are catching up slowly but surely, and the need for experienced individuals capable of monitoring, tracking down, and decimating such illicit activities has become a necessity in the crypto space. 

Binance, the world’s leading blockchain ecosystem and cryptocurrency infrastructure provider, is on the leading edge of securing crypto for everyone. As an organization, Binance is investing significantly in its capabilities, especially on the security and investigations front. 

Binance strengthens security

Binance made a significant step forward in security assurance by bringing in Aron Akbiyikian as the Director of Audit and Investigations. 

Notably, Aron joins Binance with a wealth of experience. He is an expert in criminal investigations and has worked on high-profile cases, including the ‘Welcome2Video’ case where he played an instrumental role in taking down the crypto-funded child porn ring. He also has extensive experience investigating and helping to prevent criminals from using blockchain when he was at TRM Labs and Chainalysis. 

Focusing on identifying criminals seeking to exploit Binance’s platform and monitoring their activities across the blockchain sector, Aron will assist law enforcement authorities around the world in taking them down. His work helps to create a safer environment for all users within Binance and the larger crypto industry.

The platform also bolstered its Audit and Investigation team through the appointment of Nils Andersen-Röed from Europol as another Director of Audit and Investigations. 

During his time as the Project Leader of the Dark Web Unit of the Dutch National Police, Nils oversaw the takeover and takedown of ‘Hansa Market’ and ‘Alphabay’ which were the biggest black markets for drugs operating in the dark web. This global operation gathered a huge amount of information regarding illicit trades which was shared with other law enforcement agencies. It led to many arrests around the globe and contributed greatly to cleaning up the crypto industry.

At Europol, Nils was a specialist on the Dark Web team. He is using his expertise to conduct internal and external investigations at Binance, with the purpose of detecting criminals attempting to commit crimes on Binance’s platforms and protecting its users’ funds.

Anti-Money Laundering program

Binance has appointed Greg Monahan as the Global Money Laundering Reporting Officer, to expand the international anti-money laundering program and investigation programs.

With nearly 30 years of credited government service, a majority of which as a US Treasury Criminal Investigator responsible for tax, money laundering and other related financial crime investigations, Greg has led complex international investigations that have resulted in the takedown of some of the world’s most notorious cybercriminals and terrorist groups.

Binance has always emphasized the need for regulations to facilitate mass adoption of crypto across the globe. They believe regulatory licenses are required to integrate crypto with traditional financial systems, banks, payment services to give authorities more clarity about the activities in the space.

Crypto adoption is probably around 2% now. Let’s go get the other 98% onboard.

— CZ 🔶 Binance (@cz_binance) July 30, 2023

Greg will work on aligning the platform’s interests with that of the regulatory bodies by strengthening the organization’s relations with law enforcement bodies worldwide. This will be a massive step to curb money laundering activities in the crypto sphere. 

Taking down fraudsters

The platform is determined to restrain unlawful activities by cybercriminals and has brought in Tigran Gambaryan as the VP of Global Intelligence and Investigations. 

Tigran is a former special agent of the Cyber Crimes Unit in Washington, D.C., and has led several multi-billion dollar cyber investigations, including the ‘Silk Road’ corruption investigations, ‘BTC-e bitcoin exchange’, and the’ Mt. Gox’ hack. 

Mt. Gox, the most popular Bitcoin exchange at the time, responsible for almost 80% of all exchange operations on the network, filed for bankruptcy in 2014. It claimed hackers stole the equivalent of $460 million from its online coffers. 

The news rocked the Bitcoin world as crypto enthusiasts lost huge amounts of money. The work and investigative findings of Tigran were monumental in retrieving millions of dollars of lost funds which brought back users’ trust in the currency.

With Tigran on the team, Binance will continue to focus on internal and external investigations to prevent threats and financial losses while closely complying with law enforcement agencies and regulators around the world to take down cybercriminals. 

Sustained measures for cyber-security 

Binance CEO Changpeng Zhao (CZ) said:

 “We have always held Binance to the highest standard to safeguard our users’ interests, and to that end, we are always expanding our capabilities to make Binance and the wider industry a safe place for all participants.” 

Binance is taking a huge leap forward in enforcing crypto security and propelling the platform to become the safest crypto ecosystem by strengthening an already strong team of security specialists.

For more information on Binance, please check out their official website.

You're reading Binance Strives In Its Continuous Efforts To Secure The Crypto Space

What Is Ci/Cd? Continuous Integration And Continuous Delivery

What is Continuous Integration (CI)?

Continuous Integration is a software development method where team members integrate their work at least once a day. In this method, every integration is checked by an automated build to detect errors. This concept was first introduced over two decades ago to avoid “integration hell,” which happens when integration is put off till the end of a project.

In Continuous Integration after a code commit, the software is built and tested immediately. In a large project with many developers, commits are made many times during a day. With each commit code is built and tested. If the test is passed, build is tested for deployment. If the deployment is a success, the code is pushed to Production. This commit, build, test, and deploy is a continuous process, and hence the name continuous integration/deployment.

In this CI tutorial, you will learn:

What is Continuous Delivery (CD)?

Continuous Delivery is a software engineering method in which a team develops software products in a short cycle. It ensures that software can be easily released at any time. The main aim of continuous delivery is to build, test, and release software with good speed and frequency. It helps you to reduce the cost, time, and risk of delivering changes by allowing for frequent updates in production.

What is the difference between CI and CD?

CI vs CD : Continuous Integration (CI) is an approach of testing each change to codebase automatically, whereas Continuous Delivery (CD) is an approach to obtain changes of new features, configuration, and bug fixes.

Development without CI vs. Development with CI

Here are key differences between development using CI or without CI:

Development without CI Development with CI

Lots of Bugs Fewer bugs

Infrequent commits Regular commits

Infrequent and slow releases Regular working releases

Difficult integration Easy and Effective Integration

Testing happens late Continuous Integration testing happens early and often.

Issue raised are harder to fix Find and fix problems faster and more efficiently.

Poor project visibility Better project visibility

Difference between Compilation and Continuous Integration

Activities in Continuous Integration

While compilation only compiles a code, CI does the following activities

DB integration:

Ensure DB and code in sync

Automated creation of DB and test data.

Code Inspection:

Ensures a healthy codebase

Identifies problems early and applies best practices

Automated Deployment:

Allows you to release product anytime

Continually demo-able state and it is works on any machine

Document generation:

Ensure documentation is current

Removes burned from the developer

Produces build reports and metrics

Compilation:

Compilation is the process the computer takes to convert a high-level programming language code into a machine language that the computer able to understand. It ensures a code compiler on every target platform.

When do I build?

At every check-in

Every time a dependency changes

What steps are in continuous integration?

CI process

Ideally, the build should come from the command line and should not depend on an integrated development environment (IDE).

The build should happen continuously using a dedicated Cl server, not a cron job.

CI built should be triggered on every check-in and not just at midnight

The build should provide immediate feedback and Require no developer effort

Identify key metrics and track them visually. More importantly, act on them immediately

What do you need to conduct CI process?

Here, are the key elements which you need to perform the entire CI process:

Version Control System (VCS): It offers a reliable method to centralize and preserve changes made to your project over time.

Virtual Machine: You should have a spare server or at least one virtual machine to build your system.

Hosted CI Tool Solutions: To avoid servers or virtual machines, you should go for hosted CI tool solutions. This tool helps in the maintenance of the whole process and offers easier scalability.

Tools: If you select a self-hosted variant, you will need to install one of the many CI tools like Jenkins, TeamCity, Bamboo, GitLab, etc.

How Continuous integration work?

You are surely aware of the old phone Nokia. Nokia used to implement a procedure called nightly build. After multiple commits from diverse developers during the day, the software built every night. Since the software was built only once in a day, it’s a huge pain to isolate, identify, and fix the errors in a large codebase.

Later, they adopted the Continuous Integration approach. The software was built and tested as soon as a developer committed code. If any error is detected, the respective developer can quickly fix the defect.

Example of Continuous Integration

Features of CI

Here, are important features and benefits of Continuous Integration:

Allows you to maintain just a single source repository

You can test the clone of the production CI environment

The built environment should be close to the production environment.

The complete process of build and testing and deployment should be visible to all the stack holders.

Why Use CI?

Here are important reasons for using Continuous Integration:

Helps you to build better quality software

CI process helps to scale up headcount and delivery output of engineering teams.

CI allows software developers to work independently on features in parallel.

Helps you to conduct repeatable testing

Increase visibility enabling greater communication

Helps develop a potentially shippable product for fully automated build

Helps you to reduced risks by making deployment faster and more predictable

immediate feedback when issue arrives

Avoid last-minute confusion at release date and timing

Best practices of using CI Systems

Here, are some important best practices while implementing

Commit Early and Commit Often never Commit Broken Code

Fix build failures immediately

Act on metrics

Build-in every target environment Create artifacts from every build

The build of the software need to be carried out in a manner so that it can be automated

Do not depend on an IDE

Build and test everything when it changes

The database schema counts as everything

Helps you to find out key metrics and track them visually

Check-in often and early

Stronger source code control

Continuous integration is running unit tests whenever you commit code

Automate the build and test everyone

Keep the build fast with automated deployment

Here, are cons/drawbacks of Continuous Integration process:

Initial setup time and training is required to get acquainted with Cl server

Development of suitable test procedures is essential

Well-developed test-suite required many resources for Cl server

Conversion of familiar processes

Requires additional servers and environments

Waiting times may occur when multiple developers want to integrate their code around the same time

Tools for CI process

Here, are some most essential CI/CD tools:

Jenkins:

Jenkins is an open-source continuous integration software. It is written using the Java programming language. It facilitates real-time testing and reporting on isolated changes in a more massive codebase. This software helps developers to quickly find and solve defects in their codebase & automate testing of their builds.

Bamboo:

Bamboo is a continuous integration build server that performs – automatic build, test, and releases in a single place. It works seamlessly with JIRA software and Bitbucket. Bamboo supports many languages and technologies such as CodeDeply, Ducker, Git, SVN, Mercurial, AWS, and Amazon S3 buckets.

TeamCity:

TeamCity is a Continuous Integration server that supports many powerful features. It maintains a CI server healthy and stable even when no builds are running. It provides better code quality for any project

Summary:

Continuous Integration definition: Continuous integration is a software development method where members of the team can integrate their work at least once a day

CI/CD meaning combination of Continuous Integration and Continuous Delivery or Continuous Deployment.

Development without CI creates lots of bugs whereas Development with CI offers Fewer bugs

Important activities of Continuous Integration are 1) DB integration, 2) Code Inspection, 3) Automated Deployment, Document generation, and Compilation.

The build should happen continuously using a dedicated Cl server, not a cron job.

Important elements of CI are 1) Version Control System 2) Virtual Machine 3) Host CI Tool solutions 4) Tools

Continuous Integration system allows you to maintain just a single source repository

CI/CD process helps you to build better quality software

The most important best practices of Azure Continuous Integration process is to Commit Early and Commit Often never Commit Broken Code

The major drawback of the CICD pipeline process is that well-developed test-suite required many resources for Cl server

Jenkins, Bambook, and Team City are some useful AWS Continuous Integration tools.

.Org The Most Secure Domain?

Public Interest Registry (PIR) gTLD (generic top level domain) is perhaps best known as the non-profit registry for millions of organizations. It could also soon be known as a more secure domain space too, as .ORG adopts the DNSSEC (DNS Security Extensions), a set of extensions used to add an additional layer of security to the Domain Name System (DNS).

The move by .ORG to improve security for its DNS (which usually stands for Domain Name System, or Service or Server, the service that translates domain names into IP addresses) comes at a critical time for the world’s DNS infrastructure.

Security researcher Dan Kaminsky recently exposed a critical flaw in the DNS system, for which DNSSEC may well be the best long term solution for protecting the integrity of Internet and its traffic flow.

“The argument we’re trying to make is that there is a very real problem that DNSSEC solves and once we implement it within .org, it will be secure,” .ORG’s CEO Alexa Raad told chúng tôi ” There are other security issues, but DNSSEC solves a very specific problem which is highjacking traffic that could be unknown to the user.”

DNSSEC provides a form of signed verification for DNS information, which is intended to assure DNS authenticity. The Kaminsky flaw in DNS highlighted how without a form of DNS security a DNS server’s traffic could be highjacked in a cache poisoning attack redirecting users to arbitrary addresses without a users knowledge.

DNS vendors, including ISC, the lead sponsor behind the open source BIND DNS server, as well as Microsoft and others have patched their DNS implementation in order to make a potential cache poisoning attack more difficult to achieve.

Kaminsky, ISC and others have argued that DNSSEC is the best long term solution to solving the issue.

PIR first announced that it was launching an initiative to implement DNSSEC across .ORG in July several weeks after Kaminsky first disclosed his DNS flaw. Raad noted that the decision to move to DNSSEC was not a ‘knee jerk’ reaction to Kaminsky and that PIR had actually been involved in DNSSEC effort for the past two years. Radd argued that what Kaminsky’s disclosue did however was create awareness around the issue to give it the broader attention that it deserves.

That said just because PIR announced that .ORG was going to implement DNSSEC doesn’t mean that all of .ORG today is actually secured by DNSSEC today. In fact the road towards full adoption will take time and effort.

“Efforts are going really well, this is not a product launch but an iterative rollout,” Raad said. “We’re the first gTLD to implement DNSSEC and we are breaking it out into several phases, with the first phase being friends and family. So far we have been able to talk to a number of registrars that are interested a number of whom are large hosting vendors. ”

Raad added that she expects to have the friends and family phase completed by early 2009. After which the plan is to expand it further to bring in more registrars and registrants.

Mohan explained that with DNSSEC in place what will happen is a .org domain owner will first create a signature and then submit the signed domain to their registrar. The registrar then will have a secure interface that they can send into PIR. What PIR will do is it will marry the name server information with the security keys and in the DNS zone file that they publish, the zone file will have the key information provided right there.

“What that means is that all across the world when you send your key across, within seconds your domain name is validated and it will be propagated across PIR’s authoritative name servers,” Mohan said.

Getting all the various moving parts of the global DNS system to line up behind DNSSEC to date has been a challenge, though Raad noted that the Kaminsky flaw has made it easier with more awareness. Beyond awareness Raad added that there is also a technical challenge to face as well. In her view the development of applications and tools that enable all the participants to enable DNSSEC and to be able to test it and then offer it to customers is also an ongoing effort.

Though the initial rollout of DNSSEC at .ORG will not include all domain holders, Raad argued that they don’t have to have everyone participating, at least at the beginning. In her view PIR can take the lessons learned from the initial friends and family deployment and use them in an iterative model as the deployment expands.

“There are a lot of folks that are involved in the chain ultimately and nothing can be done in a day, Rome wasn’t build in a day” Raad said. “We think that the end result being a secure DNS is ultimately worth it because of all the applications that ride on the DNS infrastructure and will continue to. How do we get there from here? The smart way is an iterative process and then isolate where you can accelerate adoption. We feel that getting root signed is an important first step.”

VeriSign which manages the .COM registry is also exploring DNSSEC however in an interview with chúng tôi earlier this year, VeriSign CTO Ken Silva SSL (define) certificates play a key role in securing domain name information.

Mohan does not disagree that SSL is a good technology to have however in his view it solves a different problem then the one that DNSSEC will ultimately provide.

“SSL is the wrong hammer because this is not a nail,” Mohan stated.

This article was first published on chúng tôi

Mars Died Billions Of Years Ago, And Its Guts Are Still Spilling Into Space

The Red Planet is a dead planet, but it may not have always been that way. Rovers and satellites have found clear evidence that the dusty Martian plains once flowed with rivers, which pooled into giant lakes, and perhaps fed into a global ocean. Warm and wet, ancient Mars may have offered a comfy climate for any emerging microbes, much like Earth did.

How times have changed. Billions of years later, Earth remains a blue marble while Mars has become a dry husk of its former self. While most of the desiccation resulted from the calamitous loss of Mars’s atmosphere, the planet has kept some of its water. But even that meager supply is leaking away.

So how did Mars die? After repeatedly skimming the upper reaches of the Martian atmosphere with an orbiting probe, researchers have another piece of the puzzle—they discovered that H2O molecules are somehow slipping past a protective atmospheric barrier much more easily than predicted.

“This was unexpected,” says Shane Stone, a planetary chemist at the University of Arizona and an author of the recent research, which was published today in Science. “When water is destroyed, the destruction is close to the edge of the atmosphere and it can escape quite readily.”

In the early days of the solar system, baby Mars probably didn’t look so different from baby Earth. Both planets had molten cores of electrically charged metal. The metals churned with liquid currents, erecting magnetic barriers around the planets. These magnetic fields repelled both the solar wind and electrical assaults from frequent flares during the sun’s tumultuous youth, protecting planets’ the nascent atmospheres. Enveloped by thick layers of air, water streamed on both surfaces.

But Mars was too small to have a real shot at staying habitable in the long run. It cooled down faster than its larger sibling did. The core congealed. The protective magnetic barrier fell. And the sun blasted away much of the atmosphere. Most of the liquid water on the surface soon followed it into space. Reconstructing this three-billion-year history has been the main task of the Mars Atmosphere and Volatile EvolutioN (MAVEN) satellite, which has orbited the Red Planet since 2014.

Now new measurements from MAVEN have added new details to the most recent chapter in the Martian water exodus.

Since the late 1960s, planetary scientists had assumed that Mars’s surviving stores of H2O were relatively safe. Blocks of ice on or near the surface would steadily transform into molecules of water vapor, which would rise into the thin atmosphere until it got too cold and they condensed into clouds. The same barrier of chilly air—the “hygropause”—protects water on Earth by trapping it into clouds and preventing the hydrogen from floating away.

Then came MAVEN, which dips into the edge of the atmosphere with every orbit and directly samples the ions that come from Martian water. Reconstructing the original molecules, Stone and his colleagues were surprised to find that plenty of H2O was wafting about at more than 90 miles above the surface—way above the hygropause. Water that high up in the atmosphere is destined to be smashed into oxygen. The oxygen continues to break down, while the hydrogen is light enough to flit away from the planet forever.

By analyzing how the upper atmosphere’s water content changes over time, the team also uncovered two hints as to why Mars has such a lousy hygropause.

First, MAVEN detected an atmosphere that got drier in the winter and damper in the summer. Second, the spacecraft has been orbiting Mars for long enough to bear witness to a couple of regional dust storms, during which the water content jumped. The orbiter also happened to be operating during a dust storm in June of 2023 (a once-in-a-decade event so ferocious it killed the Opportunity rover), which caused moisture in the upper atmosphere to leap to roughly twenty times its normal levels.

These trends, Stone says, strongly suggest that Mars’s hygropause regularly breaks down because the atmosphere gets too warm, such as when the planet draws closer to the sun during the summer months, or when the atmosphere swirls with dust. Independent temperature readings from another spacecraft confirmed that the atmosphere’s wet periods line up with its relative heat waves.

While the Martian hygropause was never supposed to form a perfect seal, MAVEN’s measurements suggest that it leaks far more than predicted. Over the last billion years, seasonable warming, annual regional dust storms, and decadal superstorms have caused Mars to lose enough water that could cover the planet in a global ocean two feet deep, the researchers estimated. That’s just a few percent of the water Mars has lost over its entire history (which would be enough to flood the planet in an ocean many dozens to hundreds of feet deep), Stone says, but it’s the main way the planet continues to dry out today.

While the dehydration of Mars would have devastated any life clinging to its surface, terrestrial organisms can breathe easy knowing that we won’t suffer quite the same fate. Earth does constantly lose H2O to “atmospheric escape,” but at a rate that’s far too slow to be of any concern, according to Stone. Rather, our planet has one to two billion years left of being blue, after which a brighter sun will evaporate our oceans, cranking up the thermostat to a few hundred degrees.

Cheos– China’s New Eye In Space

Gaofen 2

The Gaofen 2 is shown here in this CCTV 13 news broadcast, while undergoing assembly. Judging by the personnel in the screen garb, the bottom surface of the satellite, which would hold the camera lens, has an area of between 3 to 4 square meters. That suggests that the camera lens would have an aperture (diameter) of 1 to 1.2 meters.

Gaofen 2 Launch

Gaofen 2 launched on August 19, 2014. The usage of the Long March 4 rocket suggests that the satellite’s weight is between 1-2 tons.

The Gaofen 2 was launched on August 19, 2014 by a LM-4B rocket and currently speeds past at an orbit 630km above the Earth’s surface. It has a resolution of up to 80 centimeters in panchromatic setting, and can instantly cover an area of up to 48km across. Resolution, in satellite imagery, is defined as the ability to distinguish between two objects (for example, a 3 meter resolution would allow one to identify two tanks parked side by side). In contrast, the U.S KH-11 Kennan Block IV spy satellites is widely believed to have an image resolution of about 10cm-15 cm, though it orbits at a much lower altitude and has a 2.4+ meter wide lens (images of the Gaofen 2 suggests it has a 1-1.2 meter wide lens). As a caveat, it is important to remember that China could have understated the actual imaging resolution of the Gaofen 2, with resolution below 80 cm classified only for military usage.

Beijing Airport Blown Up

Shown here is the Shanghai airport on the left, and the Beijing Olympic Stadium on the right. The Gaofen 2 provides a level of detail that not only can one distinguish smaller airliners like the Boeing 737 and Airbus 320 from larger Boeing 777 type jetliners, but also see the engine nacelles on the smaller airliners. This level of detail could be used to identify enemy warships and fighters for targeting.

However, a 80 cm resolution would be sufficient for a range of Chinese strategic intelligence needs, such as counting the number of Vietnamese fighters, tracking the location of a U.S. aircraft carrier, or monitoring Taiwanese tunnel construction activity. Most tellingly of the dual use nature of imaging satellites, it is operated by the State Administration of Science, Technology and Industry for National Defense; the State Administration says it plans to use the Gaofen 2 for civilian purposes of ” disaster relief, land use surveillance and mineral resource surveys”. Of course, just as the U.S. Defense Department purchases satellite imagery from vendors GeoEye and Digital Global, the PLA will probably have access to the Gaofen 2 if the need arises.

Say Cheese…or xiào yī xiào!

You may be interested in:

New Chinese Ballistic Missile Accidentally Pops up on Environmental Website

The Little Space Tug That Can

China Showcases Plans To Become The Leading Space Power

The wide diameter of the LM-5’s payload section, at over 5 meters, will be the largest for China’s space program. Such a large diameter would be useful for launching spy satellites, space station modules and interplanetary missions. Andreas Rupprecht, via China Defense Forum

Beidou 2/Compass

The Beidou 2/Compass navigation satellites will have 35 satellites once completed, with 5 in geosynchronous orbit, and 30 in middle earth orbit. With a military accuracy of 10cm, Beidou 2 can also communicate with users.

While NASA and private corporations such as SpaceX get much of the attention in the US, China is showing off its plans to become the leading space power via recent coverage on state media. A centerpiece project, Beidou 2, began in January 2024. Eventually 35 Beidou 2 satellites will form the next generation platforms for the Compass satellite navigation system that China is rapidly deploying into geosynchronous and medium earth orbit. Beidou 2 is more accurate than its predecessor, Beidou 1, with an accuracy of up to 10 centimeters for military subscribers like the Chinese and Pakistani militaries. While its American counterpart, GPS, is a transmit only system, Beidou users can use the satellite navigation system to send limited messages. Beidou 2 would provide Chinese missiles and robots with high accuracy, as well as giving Chinese soldiers a limited but universal coverage for communications.

Space Debris

China is finally setting up a Space Debris Monitoring and Application Center to track space debris and issue warnings to Chinese spacecraft; there were 30 near misses in 2014 for Chinese space assets alone. China hopes to eventually take a role in cleaning up the 500,000 large pieces of space debris, and the 100 million smaller ones.

China is also taking a major step in space debris management by launching a center to track such debris. While space debris isn’t nearly as sexy as spy or navigation satellites, it’s an important part of space operations. Space debris, of which there are 500,000 pieces large enough to be tracked, can severely damage or destroy satellites and spacecraft (a 1 square cm piece of debris travelling at 17,000 kph has as much kinetic energy as a hand grenade detonation). The new Space Debris Monitoring and Application Center, part of Chinese Space National Administration (China’s NASA equivalent), will focus in the near future on tracking space debris, especially the estimated 100 million pieces 1cm2 or smaller, but CNSA Secretary General Tian Yulong hopes for capabilities one day to neutralize and reduce the space debris menace. It’s a growing Chinese priority, given that China is the world’s third largest space launcher, and Mr. Tian noted that Chinese spacecraft and satellites had over 30 near misses with space debris in 2014.

LM-5 Payload

The wide diameter of the LM-5’s payload section, at over 5 meters, will be the largest for China’s space program. Such a large diameter would be useful for launching spy satellites, space station modules and interplanetary missions.

Future of Chinese Space Science

China’s space program, once it receives new technology like the LM-5 heavy rocket and electrical satellite propulsion, will aim for interplanetary missions in the 2023, including possible probes sent to Mars, Venus, asteroids, near solar observation and Jupiter.

With nearly 130 spacecraft and satellites in orbit, China has shot its way to global prominence in space, like so many terrestrial technological categories. And this is jus the start. Far off future Chinese space projects include a spate of missions to Mars and Jupiter, large space stations,130 ton payload super heavy “Moon rockets”, electrically propelled spacecraft and reusable launch systems.

Thanks to escobar at Sinodefence Forum.

You may also be interested in:

China’s Largest Ever Space Rocket Takes a Big Step Forward

Next Generation of Chinese Space Launch Vehicles Begins Its Long March (By Standing Up)

New, Better Chinese Spy Satellite Hits Orbit

Chinese Laser Zaps Space, for World Peace

CHEOS- China’s New Eye in Space

Update the detailed information about Binance Strives In Its Continuous Efforts To Secure The Crypto Space on the Daihoichemgio.com website. We hope the article's content will meet your needs, and we will regularly update the information to provide you with the fastest and most accurate information. Have a great day!