Skip to main content

Q/A Cryptocurrencies - is it Legal , or Not ?




The Law Article codes on this date vary from one country to another, in Morocco it is not legal to carry out transactions according to the following regulations of 2017.
According to Wikipedia : 

On November 20, 2017, Morocco's foreign exchange office declares that transactions carried out via virtual currencies constitute a violation of foreign exchange regulations, subject to sanctions and fines.

The Library of Congress (LOC) conducts periodic reviews of countries' stances on Bitcoin and cryptocurrencies, 

In November 2021 identified 103 countries whose governments directed their financial regulatory agencies to develop regulations and priorities for financial institutions regarding cryptocurrencies and their use in AML & CFT.

The L.O.C also identified many countries that allow cryptocurrencies to be used.

Several other countries allow Bitcoin to be used in transactions and have developed forms of regulation. Some examples are:

- USA
- United Kingdom
- Israel
- Australia
- Canada
- The European Union
- Japan
- Iceland
- Denmark
- Germany
- Mexico
- Spain
- France

Countries - with Implicit Bans

The Library of Congress identified 42 countries with implicit bans on certain cryptocurrency uses in its November 2021 update. Some of the countries it lists are:

- Maldives
- Vietnam
 -Bahrain
- Libya
 - Central African Republic
- Burundi
- Cameroon
- Macao
- Gabon
- Georgia
- Guyana
 -Kuwait
- Lesotho
- Zimbabwe

Countries - Absolute Bans

- Morocco
- Iraq
- Qatar
- Egypt
- China
- Tunisia
- Nepal
- Bangladesh
- Algeria



#DRVX92

Comments

Popular posts from this blog

Navigating the CCNA 2024 Update.

  Greetings fellow network enthusiasts and aspiring IT professionals! As the technology landscape continues to evolve, so does the CCNA certification, the industry-standard credential for networking professionals. With an anticipated update in late 2024, it's time to gear up and prepare for the changes that lie ahead. Understanding the Driving Forces: The CCNA 2024 update reflects the ever-changing nature of networking technologies and industry standards. Cisco, recognizing this dynamic environment, is incorporating key trends and advancements into the exam to ensure that certified professionals possess the skills and knowledge required for success in today's complex networking environments. Anticipated Exam Changes: While the official exam blueprint is yet to be released, Cisco has provided some insights into the anticipated changes. Here's a sneak peek into what you can expect: Cloud and Cybersecurity Focus: The updated exam will place a greater em...

Nmap for beginners - "Read Disclaimer First"

/!\/!\ Disclaimer /!\/!\ Nmap is a powerful network scanner that can be used for a variety of purposes. It is a valuable tool for network administrators, security professionals, and penetration testers, so any illegal use leaves traces in the server logs where the tests were made, you will be charged for serious legal consequences , in other words , you will break the law. DO NOT USE IT RANDOMLY OR WITHTOUT PERMISSION. What is Nmap? Nmap is a free and open-source network scanner that is used to discover hosts and services on a network, as well as to audit the security of a network developed concept & software near 1997 BUT ... unfortunately you will continue in 2023 to use it in order to test the unsecured platforms and old databases. How does Nmap work? Nmap uses a variety of techniques to scan a network, including: TCP SYN scanning: This is the most common type of Nmap scan. It works by sending a TCP SYN packet to a target port. If the port is open, the target will r...

The Overlooked Security Risk of Browser Extensions

Hope everyone's having a secure week! I wanted to bring up something that I think often flies under  the radar in our discussions about broader security threats: browser extensions. We all use them, right? Ad blockers, password managers, productivity tools, even those fun little theme enhancers. They add so much functionality to our browsing experience. But have you ever really stopped to consider the level of access you're granting these seemingly innocuous little programs? Think about it: Access to Your Data: Many extensions request permissions to read and change data on websites you visit. This can include sensitive information like login credentials, financial details, personal messages, and browsing history. Potential for Malware: Malicious actors can and do create seemingly legitimate extensions that are actually designed to steal data, inject ads, or even take over your browser. Sometimes, even legitimate extensions can be compromised through updates or vulnerabilities....