Bitcoin's Forked: Chief Scientist Launches Alternative

Cryptocurrency Bitcoin is facing civil war, with two high-profile developers announcing plans to split the code that underpins the network.

Known as a “fork”, the new version of bitcoin (dubbed Bitcoin XT) would support more transactions per hour, at the cost of increasing the amount of memory required to hold a full database of all the bitcoin transactions throughout history, known as the blockchain.

It is backed by Mike Hearn and Gavin Andresen, two of the most senior developers involved in the bitcoin project. Both are involved in the Bitcoin Foundation, the non-profit group that oversees the currency’s development: Hearn is the former chair of the foundation’s law and policy committee, while Andresen is the chief scientist of the foundation.

In a post on the bitcoin developer mailing list, Hearn said that he felt a fork was the only option for solving the deadlock within the community: “I feel sad that it’s come to this, but there is no other way. The Bitcoin Core project has drifted so far from the principles myself and many others feel are important, that a fork is the only way to fix things.”

The key difference between Bitcoin XT and the other version of bitcoin, known as Bitcoin Core, is size of the blocks into which transactions get grouped every 10 minutes. Core supports a maximum block size of 1mb, which XT increases to 8mb. Hearn, and the other supporters of XT, argue that that increase is necessary if the currency is to continue growing.

“As Bitcoin spreads via word of mouth, we will reach the limit of the current system some time next year, or by 2017 at the absolute latest,” Hearn writes. “So it is now time to raise the limit, or remove it entirely.”

Those who oppose the change do so for a variety of reasons. Some argue that it’s a simple sticking-plaster solution, and that the actual fix should be far more wide-ranging (one such proposal being the “lightning network” upgrade); they worry that removing the most pressing need for an upgrade will also lessen he chance of that wide-ranging fix.

Others simply oppose changing anything from the initial bitcoin proposal presented by Satoshi Nakamoto in 2009, and argue that any major change should come in the form of a whole new currency, or “alt coin”, rather than an update to bitcoin itself. One opponent, posting to the bitcoin-dev mailing list, even claimed to be (alleged Bitcoin founder) Satoshi Nakamoto himself.

“The developers of this pretender-Bitcoin claim to be following my original vision, but nothing could be further from the truth,” they wrote. “When I designed Bitcoin, I designed it in such a way as to make future modifications to the consensus rules difficult without near unanimous agreement. Bitcoin was designed to be protected from the influence of charismatic leaders, even if their name is Gavin Andresen, Barack Obama, or Satoshi Nakamoto. Nearly everyone has to agree on a change, and they have to do it without being forced or pressured into it. By doing a fork in this way, these developers are violating the ‘original vision’ they claim to honour.”

The poster’s claim to be Nakamoto was widely derided, since the message wasn’t cryptographically signed, and so could have come from anyone. Nonetheless, Hearn – who says that the message “could be from anyone” – argues the fake Nakamoto’s input proves a point.

“There’s an interesting thing here – what if Satoshi did come back and weigh in? Let’s imagine he turned up and said he’d rethought, and Bitcoin was a bad idea. Should everyone just give up and walk away? Or accept that people’s ideas do change. My article quotes Satoshi a lot, but that’s not to imply he’s some sort of god or absent dictator.

In the short term, Hearn argues that most bitcoin users can safely ignore the debate. Unless they are “mining” – running the software that verifies bitcoin transactions – bitcoin users effectively have no vote in which one of the competing proposals becomes the future of bitcoin, while the software they use to make payments in the currency will likely support the biggest of the two networks.

“Almost all users run wallets that will just automatically follow whatever the final decision is. It’s not something they need worry about,” he says.

“Except, of course, in a high-level sense: if they bought bitcoins in the hope that it one day takes off and becomes really big, then they should keep an eye on things. If the big-blocks side doesn’t win out then the chances of going mainstream look much worse, and they may wish to rethink their investment.”

The worst-case scenario for the currency is that both Bitcoin XT and Bitcoin core continue to exist alongside each other for a long period of time, with neither fully seizing the mantle of the true heir to Nakamoto’s vision. In such a situation, the currency’s uncertain future could prove permanently damaging to its prospects.

But even if the change goes through relatively quickly, some inattentive users could find themselves out of pocket. Once the block sizes increase (which won’t happen until January 2016, and then only if 75% of the miners have switched to Bitcoin XT), the two versions of bitcoin will be incompatible. Transactions made on one version of bitcoin would not be reflected on the other, essentially rendering null any attempts to spend bitcoin on the “losing” fork after that date.

Guardian

 

« Third of UK Finance Logins Risk Client Data
IBM’s $1 Billion Revenue Target For Cloud In 2016 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Wisegate

Wisegate

Wisegate is a community of IT experts providing advisory services on all areas of IT including security.

Think Cyber Security (ThinkCyber)

Think Cyber Security (ThinkCyber)

ThinkCyber is a Tel Aviv-based Israeli company with a team of cybersecurity professionals who are experts in both information and operations technology.

CERT-PH

CERT-PH

CERT-PH is the National Computer Emergency Response Team and the highest body for cybersecurity related activities in the Philippines.

C2A Security

C2A Security

C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection.

URS Certification

URS Certification

United Registrar of Systems (URS Certification) is an independent certification body operating in more than 30 countries within the multinational URS Holdings.

Greensafe IT

Greensafe IT

Greensafe offer various onsite and offsite data erasure services, aimed at increasing data security whilst reducing any risk of data loss during transit.

CipherBlade

CipherBlade

CipherBlade specializes in blockchain forensics, data science and transaction tracking.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

AwareGO

AwareGO

AwareGO is a global provider of security awareness training content and solutions that help enterprises improve cybersecurity awareness in the workplace.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

Analog Devices Inc (ADI)

Analog Devices Inc (ADI)

Analog Devices is uniquely positioned to deliver security at the edge, where the data is born, because our sensor solutions convert the physical, analog world into the digital world.

Fusion Risk Management

Fusion Risk Management

Fusion Risk Management focuses on operational resilience encompassing business continuity, risk management, IT risk, and crisis and incident management.

Covenant Technologies

Covenant Technologies

Make Covenant Technologies the only choice for your IT and cybersecurity recruitment needs. We deliver quality candidates at the forefront of the cybersecurity and IT industry.

CyberloQ Technologies

CyberloQ Technologies

CyberloQ Secure is a cybersecurity solution that enables clients to implement highly robust Multi-Factor Authentication (MFA) that includes client-defined location-based geofencing constraints.

Francisco Partners

Francisco Partners

Francisco Partners provide capital, expertise, and support for growth-aspiring technology companies.