Bitcoin Is Bad For The Environment

Tesla has stopped accepting Bitcoin as payment for its cars out of concern that it will contribute to greater consumption of fossil fuels, according to a statement CEO Elon Musk. “Cryptocurrency is a good idea on many levels and we believe it has a promising future, but this cannot come a great cost to the environment,” say Musk on Twitter.

Bitcoin mining is a process of creating a new coin that involves using computers to solve complex mathematical algorithms or puzzles. The cryptocurrencies are based on a decentralised network that need to be mined. Bitcoin mining is metaphorical, but the results can be just as destructive as the real thing.

The software that mines bitcoin is designed to take on average about 10 minutes for those on the network to solve the complex program and process a block.The process ends up using a massive amount of electricity as giant and powerful systems are used by miners to mine blocks and verify transactions.

The vast majority of Bitcoin’s energy consumption happens during the mining process. As a reward for their services, miners receive newly created bitcoins along with transaction processing fees.

The emergence of cryptocurrency into the mainstream is very important for the world of finance. It’s also a big deal for the world in the case of the dominant form of cryptocurrency, Bitcoin.Bitcoin has recently surged in value. In April, 2020, a coin was worth about seven thousand dollars; today, it’s worth more than fifty-five thousand. As the cost of investing in bitcoin have increased, so has the profit in mining it. 

According to the Cambridge Bitcoin Electricity Consumption Index, bitcoin-mining operations worldwide use energy at about the annual domestic electricity consumption of the entire nation of Sweden, and it is responsible for roughly a million times more carbon emissions than a single Visa transaction. 

As the world desperately needs to cut carbon emissions, it doesn’t make sense to be devoting a Sweden’s worth of electricity to a virtual currency.

Mining is the process by which bitcoin is both created and accounted for. Instead of being cleared by, say, a bank, bitcoin transactions are recorded by a decentralised network, a blockchain. It’s unclear exactly who dreamt up bitcoin, so no one knows what this person (or persons) was thinking when the mining protocols were first established. 

Elon Musk:        LiveMint:       New Yorker:     The Verge:       Cambridge University Judd:      Image: Unsplash

You Might Also Read: 

Standing On The Cryptocurrency Frontier:

 

« The Role Of Enterprise Architecture In Cyber Defence
Ireland’s Health Service Won't Pay Ransom »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Spanish National Cybersecurity Institute (INCIBE)

Spanish National Cybersecurity Institute (INCIBE)

INCIBE undertakes research, service delivery and coordination for building cybersecurity at the national and international levels.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

Rewertz

Rewertz

Rewterz is a cyber security company based out of Dubai, serving customers in UAE, Oman, Qatar, Bahrain, Saudi Arabia, and Pakistan.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Unit21

Unit21

Unit21 helps protect businesses against adversaries through a simple API and dashboard for detecting and managing money laundering, fraud, and other sophisticated risks across multiple industries.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

ReasonLabs

ReasonLabs

ReasonLabs have created a next-generation anti-virus that is enterprise grade, yet accessible to any personal device around the world.

Seemplicity

Seemplicity

Seemplicity revolutionizes the way security teams work by automating, optimizing and scaling all risk reduction workflows in one workspace.

Phronesis Security

Phronesis Security

Phronesis Security is committed to delivering world-class cyber security consulting with a tangible social and environmental impact.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.

Twinstate Technologies

Twinstate Technologies

Twinstate Technologies specializes in cybersecurity, proactive IT, and hosted and on-premise voice solutions.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.

Ark Technology Consultants

Ark Technology Consultants

Ark Technology Consultants is a unique IT Services Firm which blends technology solutions with consultative insight around governance and process management.

ThreatView by Turaco Labs

ThreatView by Turaco Labs

ThreatView combines extensive experience in digital forensics with advanced analytics and threat detection capabilities to protect eCommerce websites.