Bitcoin - It's Uncomplicated

Bitcoin is an online digital currency, also known as a crypto currency. Anyone with a computer and a credit card can acquire them, simply by exchanging a regular currency for Bitcoins online. However, unlike conventional forms of money transferred via a bank, transactions with Bitcoin are transferred directly from person-to-person. The transactions are still verified, recorded in a public ledger known as a block chain. This is a database processed (or ‘mined’) by members of the Bitcoin community who use their computers to process a blockchain that records all the transactions that have taken place with the currency. With this information, it is possible to find out how much value of the currency belonged to each Bitcoin holder at any point in the history of the currency. 

Unlike currencies run by a government’s central bank, there is a limited number of Bitcoins – 21 million to be precise. If the value of one bitcoin is too high for a particular transaction, individual Bitcoins can be divided into smaller parts, making it possible to buy or sell something for a half or a tenth of a Bitcoin. The 21 million limit prevents actions such as quantitative easing taking place – where money is printed and put into a financial system. Although a useful tool for reducing national debt, quantitative easing also devalues a currency, which is bad news for potential investors. 

However, Bitcoin is by no means a stable currency. Bitcoin’s value shot up in late 2013. However, since then, the value of the currency has fluctuated dramatically. At present, digital currencies such as Bitcoin therefore represent an exciting, albeit highly risky, opportunity for investors. 

Security issues have also threatened the viability of Bitcoin. The code that processes a Bitcoin transaction has previously been altered, to make it appear as if already processed transactions were unprocessed. This resulted in a second payment being made in a new form of online fraud. This had severe implications for Mt. Gox, a Bitcoin exchange based in Tokyo. In 2014, as a result of the fraud, Mt. Gox was unable to pay out legitimate withdrawals. Mt. Gox subsequently suspended trading, closed its website and exchange service, and filed for bankruptcy. Whilst Bitcoin’s independence from government central banks is often seen as a good thing, it also means that institutions are unlikely to enjoy the security blanket of a government bailout in emergency situations. As Mt. Gox customers have learned the hard way, in the eyes of governments, Bitcoin financial institutions are by no means too big to fail. 

This does not mean that governments are unconcerned about Bitcoin. Digital currencies such as Bitcoin present two sets of challenges for government officials. First, digital currencies often have an emphasis on libertarian free-market values. As they are not processed by any bank, and entirely managed by a peer-to-peer network outside the control of state institutions, there remain challenges on how governments can regulate and tax this new form of currency. Second, Bitcoin’s distance from state institutions makes it an attractive form of payment for criminal activity. The currency is regularly used on illegal online markets that sell illicit drugs, weapons, stolen data and hacking tools. Law enforcement agencies also face fresh challenges in detecting the money laundering of digital currencies. 

It should be acknowledged that Bitcoin is one of a number of emerging online currencies. This raises questions about how online currencies will compete with one another and distinguish themselves from the crowd. Certain digital currencies may seek to separate themselves by being more secure, reliable or convenient than their competitors. With digital currencies having previously proved volatile and at times insecure, perhaps the challenge for all digital currencies is to establish themselves in what is a highly uncertain market. 

Jamie Collier: http://www.cybersecurityrelations.com

 

« Malware: Banks, Customers and ATMs All Under Fire
What is 'safe harbour' the EU Declared Invalid? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alan Boswell Group

Alan Boswell Group

We are a Group of Companies providing specialist Insurance Broking and Risk Management advice and services including Cyber Risk cover.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

Exeon Analytics

Exeon Analytics

Exeon Analytics is a Swiss cyber security company that is specialized in detecting hidden data breaches and advanced cyber attacks.

VaultOne

VaultOne

VaultOne is a next-generation security solution that addresses security issues from different domains (Password Manager, Secure Access, PAM, Identity Management) as a single, integrated solution.

MSPAlliance

MSPAlliance

MSPAlliance is the world’s largest industry association and certification body for cloud computing and managed service professionals.

Tactical Network Systems (TNS)

Tactical Network Systems (TNS)

Tactical Network Solutions helps you discover hidden attack vectors in IoT and connected devices before someone else does.

VikingCloud

VikingCloud

VikingCloud (formerly Sysnet Global Solutions) offers organizations an integrated cybersecurity and compliance solution to make informed, predictive, and cost-effective risk mitigation and prevention

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.

ICS

ICS

ICS is a leading provider of outsourced IT services, cybersecurity, communications, and distributed workforce solutions throughout the US.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.

Edgio

Edgio

Edgio provides unmatched speed, security, and simplicity at the edge through globally-scaled media and applications platforms.

National Cybersecurity Alliance

National Cybersecurity Alliance

The National Cybersecurity Alliance is a non-profit organization on a mission to create a more secure, interconnected world.

Serbus

Serbus

Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools.

Cenobe Cyber Security

Cenobe Cyber Security

Cenobe provides customized solutions to keep you ahead of potential threats and ensure the security of your organization's systems and data.

CYTUR

CYTUR

CYTUR provide trusted and secured maritime cybersecurity solutions to keep ships safe, protecting them, their crews, cargo and all stakeholders from maritime cyber threats.