Common protection actions, for example holograms and serial figures, are easily replicated by counterfeiters working with complex technologies, rendering them obsolete while in the fight versus counterfeiting.Electronic or virtual currencies that use cryptography for security. They work independently of a central financial institution.The lawful an