Bitcoin - It's Uncomplicated

Bitcoin is an online digital currency, also known as a crypto currency. Anyone with a computer and a credit card can acquire them, simply by exchanging a regular currency for Bitcoins online. However, unlike conventional forms of money transferred via a bank, transactions with Bitcoin are transferred directly from person-to-person. The transactions are still verified, recorded in a public ledger known as a block chain. This is a database processed (or ‘mined’) by members of the Bitcoin community who use their computers to process a blockchain that records all the transactions that have taken place with the currency. With this information, it is possible to find out how much value of the currency belonged to each Bitcoin holder at any point in the history of the currency. 

Unlike currencies run by a government’s central bank, there is a limited number of Bitcoins – 21 million to be precise. If the value of one bitcoin is too high for a particular transaction, individual Bitcoins can be divided into smaller parts, making it possible to buy or sell something for a half or a tenth of a Bitcoin. The 21 million limit prevents actions such as quantitative easing taking place – where money is printed and put into a financial system. Although a useful tool for reducing national debt, quantitative easing also devalues a currency, which is bad news for potential investors. 

However, Bitcoin is by no means a stable currency. Bitcoin’s value shot up in late 2013. However, since then, the value of the currency has fluctuated dramatically. At present, digital currencies such as Bitcoin therefore represent an exciting, albeit highly risky, opportunity for investors. 

Security issues have also threatened the viability of Bitcoin. The code that processes a Bitcoin transaction has previously been altered, to make it appear as if already processed transactions were unprocessed. This resulted in a second payment being made in a new form of online fraud. This had severe implications for Mt. Gox, a Bitcoin exchange based in Tokyo. In 2014, as a result of the fraud, Mt. Gox was unable to pay out legitimate withdrawals. Mt. Gox subsequently suspended trading, closed its website and exchange service, and filed for bankruptcy. Whilst Bitcoin’s independence from government central banks is often seen as a good thing, it also means that institutions are unlikely to enjoy the security blanket of a government bailout in emergency situations. As Mt. Gox customers have learned the hard way, in the eyes of governments, Bitcoin financial institutions are by no means too big to fail. 

This does not mean that governments are unconcerned about Bitcoin. Digital currencies such as Bitcoin present two sets of challenges for government officials. First, digital currencies often have an emphasis on libertarian free-market values. As they are not processed by any bank, and entirely managed by a peer-to-peer network outside the control of state institutions, there remain challenges on how governments can regulate and tax this new form of currency. Second, Bitcoin’s distance from state institutions makes it an attractive form of payment for criminal activity. The currency is regularly used on illegal online markets that sell illicit drugs, weapons, stolen data and hacking tools. Law enforcement agencies also face fresh challenges in detecting the money laundering of digital currencies. 

It should be acknowledged that Bitcoin is one of a number of emerging online currencies. This raises questions about how online currencies will compete with one another and distinguish themselves from the crowd. Certain digital currencies may seek to separate themselves by being more secure, reliable or convenient than their competitors. With digital currencies having previously proved volatile and at times insecure, perhaps the challenge for all digital currencies is to establish themselves in what is a highly uncertain market. 

Jamie Collier: http://www.cybersecurityrelations.com

 

« Malware: Banks, Customers and ATMs All Under Fire
What is 'safe harbour' the EU Declared Invalid? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Engage Black

Engage Black

Engage Black provides solutions for securing and protecting cryptographic keys, data at rest, and data in motion.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

Pryv

Pryv

Pryv is a Swissmade software for privacy, personal data collection, usage, sharing and storage.

SynerLeap

SynerLeap

SynerLeap is ABB's innovation growth hub. Our aim is to help startups accelerate and expand across industries, ranging from industrial automation and robotics to grid technologies and smart cities.

QI ANXIN Technology Group

QI ANXIN Technology Group

QI ANXIN specializes in serving the cybersecurity market by offering next generation enterprise-class cybersecurity products and services to government and businesses.

Elevate Security

Elevate Security

Elevate is the leading Security Behavior Platform, changing employee security habits while giving security teams unprecedented visibility.

SkyePoint Decisions

SkyePoint Decisions

SkyePoint Decisions is a leading Cybersecurity Architecture and Engineering, Critical Infrastructure and Operations, and Applications Development and Maintenance IT service provider.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

Cira Info Tech

Cira Info Tech

Cira InfoTech’s cyber security and network consulting and managed services deliver unmatched talented resources and capabilities required to design and build an agile and adaptive IT environment.

CyberHunter Solutions

CyberHunter Solutions

CyberHunter is a leading website security company that provides penetration testing, Network Vulnerability Assessments, cyber security consulting services to prevent cyber attacks.

Force Majeure

Force Majeure

Force Majeure specializes in cybersecurity, incident response, and digital forensics, with experience spanning more than a decade.

Dope Security

Dope Security

Dope Security is a fly-direct Secure Web Gateway that eliminates the data center stopover architecture required by legacy providers, instead performing security directly on the endpoint.

Gotham Security

Gotham Security

Gotham Security delivers high-quality penetration testing, malicious adversary simulation, compliance program development, and threat intelligence services.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

Buzz Cybersecurity

Buzz Cybersecurity

Buzz Cybersecurity systems and services are designed to proactively guard against common and uncommon cyber threats.

Trickest

Trickest

Trickest enables Enterprises, MSSPs, and Ethical Hackers to build automated offensive security workflows from prototype to production.