Bitcoin's Forked: Chief Scientist Launches Alternative

Cryptocurrency Bitcoin is facing civil war, with two high-profile developers announcing plans to split the code that underpins the network.

Known as a “fork”, the new version of bitcoin (dubbed Bitcoin XT) would support more transactions per hour, at the cost of increasing the amount of memory required to hold a full database of all the bitcoin transactions throughout history, known as the blockchain.

It is backed by Mike Hearn and Gavin Andresen, two of the most senior developers involved in the bitcoin project. Both are involved in the Bitcoin Foundation, the non-profit group that oversees the currency’s development: Hearn is the former chair of the foundation’s law and policy committee, while Andresen is the chief scientist of the foundation.

In a post on the bitcoin developer mailing list, Hearn said that he felt a fork was the only option for solving the deadlock within the community: “I feel sad that it’s come to this, but there is no other way. The Bitcoin Core project has drifted so far from the principles myself and many others feel are important, that a fork is the only way to fix things.”

The key difference between Bitcoin XT and the other version of bitcoin, known as Bitcoin Core, is size of the blocks into which transactions get grouped every 10 minutes. Core supports a maximum block size of 1mb, which XT increases to 8mb. Hearn, and the other supporters of XT, argue that that increase is necessary if the currency is to continue growing.

“As Bitcoin spreads via word of mouth, we will reach the limit of the current system some time next year, or by 2017 at the absolute latest,” Hearn writes. “So it is now time to raise the limit, or remove it entirely.”

Those who oppose the change do so for a variety of reasons. Some argue that it’s a simple sticking-plaster solution, and that the actual fix should be far more wide-ranging (one such proposal being the “lightning network” upgrade); they worry that removing the most pressing need for an upgrade will also lessen he chance of that wide-ranging fix.

Others simply oppose changing anything from the initial bitcoin proposal presented by Satoshi Nakamoto in 2009, and argue that any major change should come in the form of a whole new currency, or “alt coin”, rather than an update to bitcoin itself. One opponent, posting to the bitcoin-dev mailing list, even claimed to be (alleged Bitcoin founder) Satoshi Nakamoto himself.

“The developers of this pretender-Bitcoin claim to be following my original vision, but nothing could be further from the truth,” they wrote. “When I designed Bitcoin, I designed it in such a way as to make future modifications to the consensus rules difficult without near unanimous agreement. Bitcoin was designed to be protected from the influence of charismatic leaders, even if their name is Gavin Andresen, Barack Obama, or Satoshi Nakamoto. Nearly everyone has to agree on a change, and they have to do it without being forced or pressured into it. By doing a fork in this way, these developers are violating the ‘original vision’ they claim to honour.”

The poster’s claim to be Nakamoto was widely derided, since the message wasn’t cryptographically signed, and so could have come from anyone. Nonetheless, Hearn – who says that the message “could be from anyone” – argues the fake Nakamoto’s input proves a point.

“There’s an interesting thing here – what if Satoshi did come back and weigh in? Let’s imagine he turned up and said he’d rethought, and Bitcoin was a bad idea. Should everyone just give up and walk away? Or accept that people’s ideas do change. My article quotes Satoshi a lot, but that’s not to imply he’s some sort of god or absent dictator.

In the short term, Hearn argues that most bitcoin users can safely ignore the debate. Unless they are “mining” – running the software that verifies bitcoin transactions – bitcoin users effectively have no vote in which one of the competing proposals becomes the future of bitcoin, while the software they use to make payments in the currency will likely support the biggest of the two networks.

“Almost all users run wallets that will just automatically follow whatever the final decision is. It’s not something they need worry about,” he says.

“Except, of course, in a high-level sense: if they bought bitcoins in the hope that it one day takes off and becomes really big, then they should keep an eye on things. If the big-blocks side doesn’t win out then the chances of going mainstream look much worse, and they may wish to rethink their investment.”

The worst-case scenario for the currency is that both Bitcoin XT and Bitcoin core continue to exist alongside each other for a long period of time, with neither fully seizing the mantle of the true heir to Nakamoto’s vision. In such a situation, the currency’s uncertain future could prove permanently damaging to its prospects.

But even if the change goes through relatively quickly, some inattentive users could find themselves out of pocket. Once the block sizes increase (which won’t happen until January 2016, and then only if 75% of the miners have switched to Bitcoin XT), the two versions of bitcoin will be incompatible. Transactions made on one version of bitcoin would not be reflected on the other, essentially rendering null any attempts to spend bitcoin on the “losing” fork after that date.

Guardian

 

« Third of UK Finance Logins Risk Client Data
IBM’s $1 Billion Revenue Target For Cloud In 2016 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

InfoSec People

InfoSec People

InfoSec People is a boutique cyber and technology recruitment consultancy, built by genuine experts.

Radware

Radware

Radware is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

Netsparker

Netsparker

Netsparker provide a web application security scanner to automatically find security flaws in your websites, web applications and web services.

Resource Centre for Cyber Forensics (RCCF)

Resource Centre for Cyber Forensics (RCCF)

RCCF is a pioneering institute, pursuing research activities in the area of Cyber Forensics.

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer SIT is a research centre specialising in all areas of IT security.

SecureMe2

SecureMe2

SecureMe2 ‘s mission is to make organizations more responsive to digital threats by deploying smart technology in a highly accessible way.

Nakivo

Nakivo

NAKIVO is dedicated to delivering the ultimate backup, ransomware protection and disaster recovery solution for virtual, physical, cloud and SaaS environments.

Open Raven

Open Raven

Open Raven is the cloud native data security platform that prevents breaches driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

HARMAN International

HARMAN International

HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide.

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

Truesec

Truesec

TRUESEC has an exceptional mix of IT specialists. We are true experts in cyber security, advanced IT infrastructure and secure development.

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.

Allurity

Allurity

Allurity is a group of tech-enabled cybersecurity service providers, comprised of best-in-class experts with a common mission to enable a safe digital world.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.