It is Kuding tea
The English name is Leaf of Chinese Holly, leaf of Broadleaf Holly, which is an evergreen tree of the Kuding tea species in the genus Ilex of the family Ilex, commonly known as tea pod or Fuding tea. , Gaolu tea, mainly distributed in Southwest China (Sichuan, Chongqing, Guizhou, Hunan, Hubei) and South China (Jiangxi, Guangdong, Fujian, Hainan) and other places, is a pure natural health drink.
Kuding tea contains more than 200 ingredients such as Kuding saponin, amino acids, vitamin C, polyphenols, flavonoids, caffeine, and protein. The finished tea has a bitter aroma and then is sweet and cool. It has many functions such as clearing heat and relieving heat, improving eyesight and improving intelligence, producing body fluids and quenching thirst, diuresis and strengthening the heart, soothing the throat and relieving cough, lowering blood pressure and losing weight, suppressing and preventing cancer, anti-aging, activating blood vessels, etc. It is known as "health tea", "beauty tea", "weight loss tea", "hypertension tea", "longevity tea" and other reputations. Kuding tea bags, Kuding tea granules, Kuding tea lozenges, compound Kuding tea, etc. Expanded content:
Teach you a way to prevent the leakage of identity information:
Be careful to fill in your true personal information when registering on some small websites or unknown websites. Due to weak security measures, some small websites are easily attacked by hackers, which leads to the leakage of information of registered users of the website. At the same time, these small websites have imperfect staff management systems, which may cause staff to leak user information to criminals.
Regularly check for Trojan viruses on mobile phones and computers. Mobile phones and computers may be infected with Trojan viruses during use. These Trojans will send the information in the mobile phone or computer to the location specified by the author. Therefore, we need to regularly use security tools to check and kill viruses on mobile phones and computers in parallel. At the same time, we must develop good Internet habits: do not install software from unknown sources, do not open dangerous links, and do not browse illegal websites.
Be careful when uploading photos of your ID card. When uploading your ID card, add text indicating the purpose of the photo. When retrieving passwords, authenticating payment tools, or applying for credit cards online, we are required to upload ID photos. We must be cautious and adhere to the principle of "if you can't upload it, don't upload it." When uploading photos, you must add text indicating the purpose of the photo. Watermark, at the same time, the watermark should overlap with the text on the ID card to a certain extent, and should not be entirely in the blank space.