Bitcoin - It's Uncomplicated

Bitcoin is an online digital currency, also known as a crypto currency. Anyone with a computer and a credit card can acquire them, simply by exchanging a regular currency for Bitcoins online. However, unlike conventional forms of money transferred via a bank, transactions with Bitcoin are transferred directly from person-to-person. The transactions are still verified, recorded in a public ledger known as a block chain. This is a database processed (or ‘mined’) by members of the Bitcoin community who use their computers to process a blockchain that records all the transactions that have taken place with the currency. With this information, it is possible to find out how much value of the currency belonged to each Bitcoin holder at any point in the history of the currency. 

Unlike currencies run by a government’s central bank, there is a limited number of Bitcoins – 21 million to be precise. If the value of one bitcoin is too high for a particular transaction, individual Bitcoins can be divided into smaller parts, making it possible to buy or sell something for a half or a tenth of a Bitcoin. The 21 million limit prevents actions such as quantitative easing taking place – where money is printed and put into a financial system. Although a useful tool for reducing national debt, quantitative easing also devalues a currency, which is bad news for potential investors. 

However, Bitcoin is by no means a stable currency. Bitcoin’s value shot up in late 2013. However, since then, the value of the currency has fluctuated dramatically. At present, digital currencies such as Bitcoin therefore represent an exciting, albeit highly risky, opportunity for investors. 

Security issues have also threatened the viability of Bitcoin. The code that processes a Bitcoin transaction has previously been altered, to make it appear as if already processed transactions were unprocessed. This resulted in a second payment being made in a new form of online fraud. This had severe implications for Mt. Gox, a Bitcoin exchange based in Tokyo. In 2014, as a result of the fraud, Mt. Gox was unable to pay out legitimate withdrawals. Mt. Gox subsequently suspended trading, closed its website and exchange service, and filed for bankruptcy. Whilst Bitcoin’s independence from government central banks is often seen as a good thing, it also means that institutions are unlikely to enjoy the security blanket of a government bailout in emergency situations. As Mt. Gox customers have learned the hard way, in the eyes of governments, Bitcoin financial institutions are by no means too big to fail. 

This does not mean that governments are unconcerned about Bitcoin. Digital currencies such as Bitcoin present two sets of challenges for government officials. First, digital currencies often have an emphasis on libertarian free-market values. As they are not processed by any bank, and entirely managed by a peer-to-peer network outside the control of state institutions, there remain challenges on how governments can regulate and tax this new form of currency. Second, Bitcoin’s distance from state institutions makes it an attractive form of payment for criminal activity. The currency is regularly used on illegal online markets that sell illicit drugs, weapons, stolen data and hacking tools. Law enforcement agencies also face fresh challenges in detecting the money laundering of digital currencies. 

It should be acknowledged that Bitcoin is one of a number of emerging online currencies. This raises questions about how online currencies will compete with one another and distinguish themselves from the crowd. Certain digital currencies may seek to separate themselves by being more secure, reliable or convenient than their competitors. With digital currencies having previously proved volatile and at times insecure, perhaps the challenge for all digital currencies is to establish themselves in what is a highly uncertain market. 

Jamie Collier: http://www.cybersecurityrelations.com

 

« Malware: Banks, Customers and ATMs All Under Fire
What is 'safe harbour' the EU Declared Invalid? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

Axial

Axial

Axial Systems is one of the UK’s leading solution providers and systems integrators in network, security and services.

FAMOC

FAMOC

FAMOC is an enterprise mobile management solution that delivers comprehensive security and management for applications, documents, email, and mobile devices.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

Lynx Technology Partners

Lynx Technology Partners

Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm.

MaskTech

MaskTech

MaskTech supplies highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

National Cyber Security Center (NCSC) - Hungary

National Cyber Security Center (NCSC) - Hungary

The National Cyber Security Center was established in 2015 by uniting the GovCERT-Hungary, National Electronic Information Security Authority (NEISA) and the Cyber Defence Management Authority (CDMA).

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

Sixgill

Sixgill

Sixgill, an IoT sensor platform company, builds the universal data service and smart process automation software allowing any organization to effectively govern its IoE assets.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

KrCERT/CC

KrCERT/CC

KrCERT/CC is the National Computer Emergency Response Team in Korea.

Charterhouse Voice & Data

Charterhouse Voice & Data

Charterhouse is your trusted technology partner - designing, provisioning and supporting the technology that underpins your operations including network security and data compliance.

Toothpic

Toothpic

ToothPic has invented, designed, developed and patented a solution to enable companies to turn every smartphone into a secure key for a user-friendly online authentication.

MDSec

MDSec

MDSec is a consultancy with a passion for information security. Our consultants specialise in application, mobile and hardware security and targeted red team attacks.

Maxxsure

Maxxsure

Maxxsure provides a platform for executive management, leveraging proprietary technology that identifies, measures, and scores a company’s cyber risks.

Avrem Technologies

Avrem Technologies

Avrem Technologies is a business IT and cybersecurity consulting firm. We design, implement, manage and monitor the networks, servers, computers and software that our clients rely on each day.