Feeds

China bans virtual cash for real-world trade

Peer-to-peer transactions only

Intelligent flash storage arrays

Officials in China are banning use of virtual money to buy real-world goods and services.

Under new regulations released jointly by the Ministry of Commerce and the Ministry of Culture, virtual currency can now only be used for virtual goods and services that are provided by the issuer of the virtual currency.

Several sites are reporting the news as targeting China's online gold-farming market, but there is no indication that selling virtual currency is being forbidden.

The new regulations do define prepaid cards for video games - but according to the Ministry of Commerce, the rules are to limit the impact of virtual money on the country's real financial system.

Those caught using virtual money for gambling will also be punished by public security authorities, the Ministry said. The Ministry of Culture added it will step up supervision of of money laundering using virtual money and "other illegal online activities."

Virtual money has been fingered as a source of under-the-table payments, laundering, theft and fraud by China's government. In particular are "QQ coins" issued by Tencent.com, one of the country's top internet community operators with over 220 million users.

China's government-run media outlet Xinhua explains in a 2006 report that QQ coins were originally intended to be used to buy Tencent.com services such as electronic greeting cards, avatars, virtual game chips, and Tencent software. But many users began trading the currency amongst themselves and in exchange for other goods and services - and more worrying for China's government - real yuan.

The practice had apparently become so widespread and publicized, some regulatory officials began worrying it could challenge the legitimate currency of China. Xinhua claims trade in virtual currency exceeded several billion yuan last year and increases at an average rate of 15 to 20 per cent annually.

The occasional real-world slaying over virtual goods couldn't have helped either.

In a statement following the decree, Tencent said it supported the new rule and would work with authorities to combat online crimes. ®

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.