When Notices Become Law: What Does the Draft Network Crime Prevention Law Mean for the Crypto World?

marsbitPublicado em 2026-02-03Última atualização em 2026-02-03

Resumo

The draft "Cyber Crime Prevention Law" released by Chinese authorities on January 31, 2026, marks a significant shift from previous regulatory notices to formal legislation, fundamentally altering the legal landscape for cryptocurrency activities in China. Unlike earlier policies focused on financial risks, this law adopts a criminal governance approach, specifically targeting three core areas: OTC transactions, technical development, and public node operations. Key provisions include Article 26, which redefines "knowledge" in OTC trading, making it easier to prosecute those involved in transferring illicit funds using virtual currencies. Articles 19 and 31 extend liability to those providing technical support, such as developers or promoters, with Article 2 asserting extraterritorial jurisdiction over overseas entities serving Chinese users. Additionally, Article 40 requires blockchain nodes to monitor and block illegal activities, challenging the feasibility of permissionless networks. Legal experts note that while penalties may start with fines, severe cases could lead to criminal charges. The law reflects a broader trend from administrative bans to criminal regulation, emphasizing compliance through strict KYC, AML controls, and geo-blocking for Chinese users. For the crypto industry, this law establishes compliance as a critical survival threshold rather than an optional measure.

On January 31, 2026, amid severe market volatility due to liquidity pressures, the Ministry of Public Security, in conjunction with relevant departments, drafted the "Network Crime Prevention Law (Draft for Comments)" and officially solicited public opinions.

Searching for "Network Crime Prevention Law" on X (Twitter), you will find very little discussion. Given the diminishing marginal effects of multiple ministries' notices over the past few years, most reactions are: "Is this just the same old story?" or "It's already banned anyway, what more can they do?"

This is an extremely dangerous misjudgment. The elevation from a "ministry notice" to a "national law" signifies that the regulatory logic has evolved from preventing financial risks to precise criminal governance. Biteye believes this could very well be the most impactful legislation for the Web3 ecosystem in mainland China in recent years.

A careful study of these sixty-eight draft articles reveals that it no longer dwells on macro concepts like "financial risks" or "illegal fundraising." Instead, it acts like a scalpel, precisely targeting three core lifelines of the crypto world's operations: OTC capital flows, technical development, and public chain node operation.

This article by Biteye provides an in-depth analysis:

  1. Key Legal Provisions

  2. Legal Expert Interpretation

  3. Compliance Actions Practitioners Need to Start Taking

I. Compared to Previous Ministry Notices, It Shatters Three Foundations

1️⃣OTC Dilemma: Redefining "Knowing"

In the past, OTC merchants (U merchants) often used "I was only trading, I didn't know the source of the funds" as a defense. Legally, it was often classified as illegal business operations or the crime of assisting information network criminal activities, with a relatively high threshold for conviction.

However, the new bill Article 26, Paragraph 3 makes a clear redefinition:

"No individual or organization may, knowing that funds are proceeds of others' illegal or criminal activities, conduct the following fund transfer, payment settlement, or other acts... using virtual currency or other network virtual property to provide fund transfer services for others."

Although the word "knowing" is retained here, in judicial practice, the scope of认定 (determining) "knowing" is being extremely broadened. If your transaction price is abnormal, you use encrypted chat software to evade supervision, or you fail to perform extremely strict KYC reviews, you may be presumed to "know."

This is no longer a simple "prohibition of trading," but formally brings virtual currencies like USDT into the regulatory scope of fund flows for network crimes. For the OTC industry, this means compliance costs will be infinitely heightened. It's no longer a question of whether it's easy to do, but whether it can be done at all.

2️⃣Long-Arm Jurisdiction and "Collective Punishment" Mechanisms

The crypto world has always believed that "code is law, technology is innocent." But the new bill's Article 19 and Article 31 deliver a fatal blow to this belief:

"[One] shall not, knowing that others are using the network to commit illegal or criminal acts, provide them with... development and operation maintenance, advertising promotion, application packaging... and other support and assistance."

More concerning is the provision on "long-arm jurisdiction" in Article 2:

"Citizens of the People's Republic of China outside the territory of China, as well as overseas organizations and individuals that provide services to users within the territory of the People's Republic of China, who commit acts in violation of this Law... shall be investigated for legal responsibility according to law."

Biteye consulted Sharon (@sharonxmeng618), a financial compliance lawyer at AllBright Law Offices (锦天城), regarding this provision: "Many clauses in the draft Network Crime Prevention Law stipulate administrative obligations. Generally, one would first face administrative penalties such as orders to correct, confiscation of illegal gains, and fines. Only in serious circumstances (e.g., involving huge amounts of fraud funds, not only providing signatures but also participating in operations) does it escalate to the criminal level.

Furthermore, there is a 'cost-effectiveness' issue with long-arm jurisdiction: Although Chinese criminal law has the principles of personal/territorial jurisdiction, in cross-border practice, unless it involves major cases (like the PlusToken level) or national security, the cost of跨国抓捕 (cross-border arrest) for programmers overseas is extremely high."

3️⃣Public Chain Governance: A One-Sided Challenge to Decentralization

This bill will also affect the public chain ecosystem in mainland China. Article 40, Item 9 requires nodes or institutions providing blockchain services to possess the ability to "monitor, block, and handle" illegal information and payment settlements.

Those who understand technology know that a truly decentralized public chain (Permissionless Blockchain) cannot achieve single-point "blocking."

This essentially presents an unsolvable dilemma for Web3 projects within China: either you become a "consortium chain" (pseudo-chain) with backdoors and censorship power, or you are illegal because you cannot fulfill the "blocking" obligation.

II. Echoes of History: From "9.4" to "2.1"

To understand the magnitude of this impact, we need to extend the timeline and compare three milestones in Chinese crypto regulation:

  • 2013/2017 (9.4): "Announcement", Defensive Phase. The focus was on "preventing risks," prohibiting ICOs. Back then, the regulatory purpose was "don't let ordinary people lose money."

  • 2021 (9.24): "Notice", Clearance Phase. The focus was on "illegal financial activities," clearing out mining. The regulatory purpose was "the crypto world must not disrupt financial order."

  • 2026 (Network Crime Prevention Law): "Law", Governance Phase. The focus is on "network crimes related to the crypto world."

In the first two phases, the regulatory departments were the central bank and the National Development and Reform Commission. As the competent authorities, their focus was on their own business areas, namely "money" and "matters". But this time, the lead is the Ministry of Public Security. They manage "crime" and "people".

Sharon (@sharonxmeng618), the financial compliance lawyer from AllBright Law Offices, interpreted it this way: "In recent years, both crypto-driven crimes (e.g., using crypto assets for money laundering, fraud) and crypto-native crimes (e.g., hacker attacks, Rug pulls) have shown a high incidence. This series of legislative actions is an inevitable response from regulators to upgrade from 'administrative prohibition' to 'criminal regulation' for such new types of crimes."

Final Words: 2026 is a Year of Rule Rebuilding for the Crypto World

The plunge on February 1st might just be a stress response from the market to liquidity tightening. The charts will eventually recover, the red bars will eventually turn green. But when the legal scalpel cuts into code and capital, compliance is no longer an option; it is a prerequisite for survival.

Advice from Lawyer Sharon: "The crime of assisting information network criminal activities has shown a trend of an expanding scope of打击 (crackdown) in recent years' judicial practice. Against this background, it is not recommended that Web3 practitioners and entrepreneurs regard 'technological neutrality' as a legal immunity. Instead, they need to make clear separations in related businesses, for example, strictly implement KYC, substantially block domestic user IPs; establish anti-money laundering risk control; avoid participating in token market-making and rebate promotion for high-risk projects."

In this new era, for practitioners and investors within mainland China, "compliance" is no longer a slogan, but a red line between life and death.

Perguntas relacionadas

QWhat is the 'Network Crime Prevention Law (Draft for Comments)' and why is it significant for China's crypto ecosystem?

AThe 'Network Crime Prevention Law (Draft for Comments)' is a proposed law drafted by the Ministry of Public Security and other relevant departments, officially released for public comment on January 31, 2026. It is highly significant because it elevates crypto regulation from administrative notices to national law, shifting the focus from preventing financial risks to precise criminal governance. This represents a fundamental and far-reaching legislative change for the Web3 ecosystem in mainland China, directly targeting core operations like OTC capital flows, technical development, and public chain node operations.

QHow does the draft law change the regulatory landscape for OTC (Over-The-Counter) trading and the 'knowingly' standard?

AThe draft law, specifically in its Article 26, Clause 3, states that individuals and organizations must not 'knowingly' engage in capital transfer or payment settlement for funds obtained from illegal activities, including services using virtual currencies. While it retains the 'knowingly' requirement, the judicial interpretation of this term is being vastly expanded. Factors like abnormal trading prices, use of encrypted communication software to evade supervision, or failure to implement extremely strict KYC reviews can now be used to presume 'knowledge,' dramatically increasing compliance costs and existential risks for OTC businesses.

QWhat are the implications of the law's 'long-arm jurisdiction' and 'implicated mechanism' for overseas developers and service providers?

AArticle 2 of the draft establishes a 'long-arm jurisdiction' clause, allowing China to pursue legal liability against overseas Chinese citizens and foreign organizations/individuals providing services to users within China. Furthermore, Articles 19 and 31 create an 'implicated mechanism,' making it illegal to 'knowingly provide support and help' such as development, operation, maintenance, or advertising for others committing cyber crimes. While practical cross-border enforcement may be limited to major cases' due to high judicial costs, this legally obligates even overseas entities serving Chinese users and removes the 'technology is neutral' defense.

QHow does the draft law challenge the operation of permissionless public blockchains within China?

AArticle 40, Clause 9 of the draft requires entities or nodes providing blockchain services to possess the capability to 'monitor, block, and handle' illegal information and payment settlements. This presents an unsolvable dilemma for permissionless public blockchains operating in China, as their decentralized nature inherently prevents any single point of control or 'blocking' capability. The law effectively forces projects to choose between becoming permissioned (managed) chains with backdoors and censorship capabilities or being deemed illegal for failing to meet these obligations.

QAccording to the legal expert cited, what practical steps should Web3从业者 (practitioners) take for compliance?

AAccording to financial compliance lawyer Sharon from AllBright Law, Web3 practitioners should not rely on 'technology neutrality' as a legal exemption. Key recommended compliance steps include: strictly implementing KYC procedures, substantively blocking IP addresses from mainland China, establishing anti-money laundering (AML) risk control systems, and avoiding participation in high-risk activities such as token market-making and rebate promotions for dubious projects. The focus is on proactive risk mitigation and clear separation from any potentially illicit activities.

Leituras Relacionadas

Cook's Curtain Call and Ternus Takes the Helm: The Disruption and Reboot of Apple's 4 Trillion Dollar Empire

Tim Cook has officially announced he will step down as CEO of Apple in September, transitioning to executive chairman after a 15-year tenure during which he grew the company’s market value from around $350 billion to nearly $4 trillion. He will be succeeded by John Ternus, a 50-year-old hardware engineering veteran who has been groomed for the role through increasing public visibility and internal responsibility. Ternus’s appointment signals a strategic shift toward hardware and engineering leadership, with Johny Srouji—head of Apple Silicon—taking on an expanded role as Chief Hardware Officer. This consolidation aims to strengthen Apple’s core technological capabilities. However, Cook’s departure highlights a significant unresolved issue: Apple’s delayed and fragmented approach to artificial intelligence. Despite early efforts, such as hiring John Giannandrea from Google in 2018, Apple’s AI initiatives—particularly around Siri—have struggled with internal restructuring and reliance on external partnerships, including with Google. The transition comes at a critical moment as Apple faces paradigm shifts with the rise of artificial general intelligence (ASI). The company’s closed ecosystem of hardware, software, and services—once a major advantage—now presents challenges in adapting to an AI-centric world where intelligence may matter more than the device itself. Ternus must quickly articulate a clear AI strategy, possibly starting at WWDC, to reassure markets and redefine Apple’s role in a new technological era. His task is not only to maintain Apple’s operational excellence but also to reinvigorate its capacity to innovate and lead in the age of AI.

marsbitHá 2h

Cook's Curtain Call and Ternus Takes the Helm: The Disruption and Reboot of Apple's 4 Trillion Dollar Empire

marsbitHá 2h

Trading

Spot
Futuros

Artigos em Destaque

Como comprar T

Bem-vindo à HTX.com!Tornámos a compra de Threshold Network Token (T) simples e conveniente.Segue o nosso guia passo a passo para iniciar a tua jornada no mundo das criptos.Passo 1: cria a tua conta HTXUtiliza o teu e-mail ou número de telefone para te inscreveres numa conta gratuita na HTX.Desfruta de um processo de inscrição sem complicações e desbloqueia todas as funcionalidades.Obter a minha contaPasso 2: vai para Comprar Cripto e escolhe o teu método de pagamentoCartão de crédito/débito: usa o teu visa ou mastercard para comprar Threshold Network Token (T) instantaneamente.Saldo: usa os fundos da tua conta HTX para transacionar sem problemas.Terceiros: adicionamos métodos de pagamento populares, como Google Pay e Apple Pay, para aumentar a conveniência.P2P: transaciona diretamente com outros utilizadores na HTX.Mercado de balcão (OTC): oferecemos serviços personalizados e taxas de câmbio competitivas para os traders.Passo 3: armazena teu Threshold Network Token (T)Depois de comprar o teu Threshold Network Token (T), armazena-o na tua conta HTX.Alternativamente, podes enviá-lo para outro lugar através de transferência blockchain ou usá-lo para transacionar outras criptomoedas.Passo 4: transaciona Threshold Network Token (T)Transaciona facilmente Threshold Network Token (T) no mercado à vista da HTX.Acede simplesmente à tua conta, seleciona o teu par de trading, executa as tuas transações e monitoriza em tempo real.Oferecemos uma experiência de fácil utilização tanto para principiantes como para traders experientes.

376 Visualizações TotaisPublicado em {updateTime}Atualizado em 2025.03.21

Como comprar T

Discussões

Bem-vindo à Comunidade HTX. Aqui, pode manter-se informado sobre os mais recentes desenvolvimentos da plataforma e obter acesso a análises profissionais de mercado. As opiniões dos utilizadores sobre o preço de T (T) são apresentadas abaixo.

活动图片