Bitcoin's Forked: Chief Scientist Launches Alternative

Cryptocurrency Bitcoin is facing civil war, with two high-profile developers announcing plans to split the code that underpins the network.

Known as a “fork”, the new version of bitcoin (dubbed Bitcoin XT) would support more transactions per hour, at the cost of increasing the amount of memory required to hold a full database of all the bitcoin transactions throughout history, known as the blockchain.

It is backed by Mike Hearn and Gavin Andresen, two of the most senior developers involved in the bitcoin project. Both are involved in the Bitcoin Foundation, the non-profit group that oversees the currency’s development: Hearn is the former chair of the foundation’s law and policy committee, while Andresen is the chief scientist of the foundation.

In a post on the bitcoin developer mailing list, Hearn said that he felt a fork was the only option for solving the deadlock within the community: “I feel sad that it’s come to this, but there is no other way. The Bitcoin Core project has drifted so far from the principles myself and many others feel are important, that a fork is the only way to fix things.”

The key difference between Bitcoin XT and the other version of bitcoin, known as Bitcoin Core, is size of the blocks into which transactions get grouped every 10 minutes. Core supports a maximum block size of 1mb, which XT increases to 8mb. Hearn, and the other supporters of XT, argue that that increase is necessary if the currency is to continue growing.

“As Bitcoin spreads via word of mouth, we will reach the limit of the current system some time next year, or by 2017 at the absolute latest,” Hearn writes. “So it is now time to raise the limit, or remove it entirely.”

Those who oppose the change do so for a variety of reasons. Some argue that it’s a simple sticking-plaster solution, and that the actual fix should be far more wide-ranging (one such proposal being the “lightning network” upgrade); they worry that removing the most pressing need for an upgrade will also lessen he chance of that wide-ranging fix.

Others simply oppose changing anything from the initial bitcoin proposal presented by Satoshi Nakamoto in 2009, and argue that any major change should come in the form of a whole new currency, or “alt coin”, rather than an update to bitcoin itself. One opponent, posting to the bitcoin-dev mailing list, even claimed to be (alleged Bitcoin founder) Satoshi Nakamoto himself.

“The developers of this pretender-Bitcoin claim to be following my original vision, but nothing could be further from the truth,” they wrote. “When I designed Bitcoin, I designed it in such a way as to make future modifications to the consensus rules difficult without near unanimous agreement. Bitcoin was designed to be protected from the influence of charismatic leaders, even if their name is Gavin Andresen, Barack Obama, or Satoshi Nakamoto. Nearly everyone has to agree on a change, and they have to do it without being forced or pressured into it. By doing a fork in this way, these developers are violating the ‘original vision’ they claim to honour.”

The poster’s claim to be Nakamoto was widely derided, since the message wasn’t cryptographically signed, and so could have come from anyone. Nonetheless, Hearn – who says that the message “could be from anyone” – argues the fake Nakamoto’s input proves a point.

“There’s an interesting thing here – what if Satoshi did come back and weigh in? Let’s imagine he turned up and said he’d rethought, and Bitcoin was a bad idea. Should everyone just give up and walk away? Or accept that people’s ideas do change. My article quotes Satoshi a lot, but that’s not to imply he’s some sort of god or absent dictator.

In the short term, Hearn argues that most bitcoin users can safely ignore the debate. Unless they are “mining” – running the software that verifies bitcoin transactions – bitcoin users effectively have no vote in which one of the competing proposals becomes the future of bitcoin, while the software they use to make payments in the currency will likely support the biggest of the two networks.

“Almost all users run wallets that will just automatically follow whatever the final decision is. It’s not something they need worry about,” he says.

“Except, of course, in a high-level sense: if they bought bitcoins in the hope that it one day takes off and becomes really big, then they should keep an eye on things. If the big-blocks side doesn’t win out then the chances of going mainstream look much worse, and they may wish to rethink their investment.”

The worst-case scenario for the currency is that both Bitcoin XT and Bitcoin core continue to exist alongside each other for a long period of time, with neither fully seizing the mantle of the true heir to Nakamoto’s vision. In such a situation, the currency’s uncertain future could prove permanently damaging to its prospects.

But even if the change goes through relatively quickly, some inattentive users could find themselves out of pocket. Once the block sizes increase (which won’t happen until January 2016, and then only if 75% of the miners have switched to Bitcoin XT), the two versions of bitcoin will be incompatible. Transactions made on one version of bitcoin would not be reflected on the other, essentially rendering null any attempts to spend bitcoin on the “losing” fork after that date.

Guardian

 

« Third of UK Finance Logins Risk Client Data
IBM’s $1 Billion Revenue Target For Cloud In 2016 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Gamma

Gamma

Gamma is a leading provider of Unified Communications as a Service (UCaaS) into the UK, Dutch, Spanish and German business markets.

IntelliGO Networks

IntelliGO Networks

IntelliGO Networks is a cybersecurity company focused on Managed Detection and Response (MDR).

Wibu-Systems

Wibu-Systems

Wibu-Systems is a leading provider of solutions for the Digital Rights Management (DRM) and anti-piracy industry.

Berwick Partners

Berwick Partners

Berwick Partners’ Cyber Security Practice is a leading recruiter of senior management positions in this field; we have an exceptional understanding of the constantly changing Cyber landscape.

IronNet Cybersecurity

IronNet Cybersecurity

IronNet’s product and services provide enterprise-wide security management and visibility of your network, users and assets.

Cyberens

Cyberens

Cyberens provide cybersecurity consulting services in IT sectors relating to defense and space, banking, industrial control systems and IoT.

BioConnect

BioConnect

BioConnect provide biometric access control solutions to verify a person’s identity across physical, IOT and digital applications.

H3Secure

H3Secure

H3 Secure focuses on Secure Data Erasure Solutions, Mobile Device Diagnostics and Information Technology Security Consulting.

YL Ventures

YL Ventures

YL Ventures funds and supports brilliant Israeli tech entrepreneurs from seed to lead.

StateRAMP

StateRAMP

StateRAMP reduces risk from unsecure cloud solutions and protects data by providing State and local governments a standardized approach for verifying and monitoring security postures.

Appsian Security

Appsian Security

Appsian provides powerful solutions that help organizations take control of their business critical data and financial transactions.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.

Allot

Allot

Allot are a global provider of leading innovative network intelligence and security solutions for Service Providers and Enterprises worldwide.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

Mediatech

Mediatech

Mediatech, specialized in managed Cybersecurity and Cloud services, a single point of contact for your company's IT and infrastructure.

Skillfield

Skillfield

Skillfield is a Melbourne based Cyber Security and Data Services consultancy and professional services company.