Bitcoin Is Bad For The Environment

Tesla has stopped accepting Bitcoin as payment for its cars out of concern that it will contribute to greater consumption of fossil fuels, according to a statement CEO Elon Musk. “Cryptocurrency is a good idea on many levels and we believe it has a promising future, but this cannot come a great cost to the environment,” say Musk on Twitter.

Bitcoin mining is a process of creating a new coin that involves using computers to solve complex mathematical algorithms or puzzles. The cryptocurrencies are based on a decentralised network that need to be mined. Bitcoin mining is metaphorical, but the results can be just as destructive as the real thing.

The software that mines bitcoin is designed to take on average about 10 minutes for those on the network to solve the complex program and process a block.The process ends up using a massive amount of electricity as giant and powerful systems are used by miners to mine blocks and verify transactions.

The vast majority of Bitcoin’s energy consumption happens during the mining process. As a reward for their services, miners receive newly created bitcoins along with transaction processing fees.

The emergence of cryptocurrency into the mainstream is very important for the world of finance. It’s also a big deal for the world in the case of the dominant form of cryptocurrency, Bitcoin.Bitcoin has recently surged in value. In April, 2020, a coin was worth about seven thousand dollars; today, it’s worth more than fifty-five thousand. As the cost of investing in bitcoin have increased, so has the profit in mining it. 

According to the Cambridge Bitcoin Electricity Consumption Index, bitcoin-mining operations worldwide use energy at about the annual domestic electricity consumption of the entire nation of Sweden, and it is responsible for roughly a million times more carbon emissions than a single Visa transaction. 

As the world desperately needs to cut carbon emissions, it doesn’t make sense to be devoting a Sweden’s worth of electricity to a virtual currency.

Mining is the process by which bitcoin is both created and accounted for. Instead of being cleared by, say, a bank, bitcoin transactions are recorded by a decentralised network, a blockchain. It’s unclear exactly who dreamt up bitcoin, so no one knows what this person (or persons) was thinking when the mining protocols were first established. 

Elon Musk:        LiveMint:       New Yorker:     The Verge:       Cambridge University Judd:      Image: Unsplash

You Might Also Read: 

Standing On The Cryptocurrency Frontier:

 

« The Role Of Enterprise Architecture In Cyber Defence
Ireland’s Health Service Won't Pay Ransom »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

SANS Institute

SANS Institute

SANS is the most trusted and by far the largest source for information security training and security certification in the world.

Encode

Encode

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services.

Hiscox

Hiscox

Hiscox offers cyber and data risks insurance to protect your business against the risks of holding data and using computer systems..

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

Beyond Security

Beyond Security

Beyond Security is a leader in automated vulnerability assessment and compliance solutions - enabling customers to accurately assess and manage security weaknesses in their networks and applications.

Luxembourg Office of Accreditation & Surveillance (OLAS)

Luxembourg Office of Accreditation & Surveillance (OLAS)

OLAS is the national accreditation body for Luxembourg. The directory of members provides details of organisations offering certification services for ISO 27001.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

Cyber Resilience

Cyber Resilience

Cyber Resilience offer an intensive program designed to help you create strategies to quickly become cyber resilient and to manage cyber risks in a measurable and predictable way.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

ArmorCode

ArmorCode

ArmorCode's intelligent application security platform gives us unified visibility into AppSec postures and automates complex DevSecOps workflows.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

Hushmesh

Hushmesh

Hushmesh is a start-up aimed at securing the world’s digital infrastructure by developing develop the Mesh, a global information space with automated security built in.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.

Bluerydge

Bluerydge

Bluerydge specialises in cyber security and technology, focusing on the delivery of innovative sovereign solutions through trusted, cleared and experienced professionals.

Fusion5

Fusion5

Fusion5 is a leading ANZ Business Services and IT Solutions provider. Our customers trust us to make their potential reality by providing advisory, IT project deployment, and managed services.