Bitcoin - It's Uncomplicated

Bitcoin is an online digital currency, also known as a crypto currency. Anyone with a computer and a credit card can acquire them, simply by exchanging a regular currency for Bitcoins online. However, unlike conventional forms of money transferred via a bank, transactions with Bitcoin are transferred directly from person-to-person. The transactions are still verified, recorded in a public ledger known as a block chain. This is a database processed (or ‘mined’) by members of the Bitcoin community who use their computers to process a blockchain that records all the transactions that have taken place with the currency. With this information, it is possible to find out how much value of the currency belonged to each Bitcoin holder at any point in the history of the currency. 

Unlike currencies run by a government’s central bank, there is a limited number of Bitcoins – 21 million to be precise. If the value of one bitcoin is too high for a particular transaction, individual Bitcoins can be divided into smaller parts, making it possible to buy or sell something for a half or a tenth of a Bitcoin. The 21 million limit prevents actions such as quantitative easing taking place – where money is printed and put into a financial system. Although a useful tool for reducing national debt, quantitative easing also devalues a currency, which is bad news for potential investors. 

However, Bitcoin is by no means a stable currency. Bitcoin’s value shot up in late 2013. However, since then, the value of the currency has fluctuated dramatically. At present, digital currencies such as Bitcoin therefore represent an exciting, albeit highly risky, opportunity for investors. 

Security issues have also threatened the viability of Bitcoin. The code that processes a Bitcoin transaction has previously been altered, to make it appear as if already processed transactions were unprocessed. This resulted in a second payment being made in a new form of online fraud. This had severe implications for Mt. Gox, a Bitcoin exchange based in Tokyo. In 2014, as a result of the fraud, Mt. Gox was unable to pay out legitimate withdrawals. Mt. Gox subsequently suspended trading, closed its website and exchange service, and filed for bankruptcy. Whilst Bitcoin’s independence from government central banks is often seen as a good thing, it also means that institutions are unlikely to enjoy the security blanket of a government bailout in emergency situations. As Mt. Gox customers have learned the hard way, in the eyes of governments, Bitcoin financial institutions are by no means too big to fail. 

This does not mean that governments are unconcerned about Bitcoin. Digital currencies such as Bitcoin present two sets of challenges for government officials. First, digital currencies often have an emphasis on libertarian free-market values. As they are not processed by any bank, and entirely managed by a peer-to-peer network outside the control of state institutions, there remain challenges on how governments can regulate and tax this new form of currency. Second, Bitcoin’s distance from state institutions makes it an attractive form of payment for criminal activity. The currency is regularly used on illegal online markets that sell illicit drugs, weapons, stolen data and hacking tools. Law enforcement agencies also face fresh challenges in detecting the money laundering of digital currencies. 

It should be acknowledged that Bitcoin is one of a number of emerging online currencies. This raises questions about how online currencies will compete with one another and distinguish themselves from the crowd. Certain digital currencies may seek to separate themselves by being more secure, reliable or convenient than their competitors. With digital currencies having previously proved volatile and at times insecure, perhaps the challenge for all digital currencies is to establish themselves in what is a highly uncertain market. 

Jamie Collier: http://www.cybersecurityrelations.com

 

« Malware: Banks, Customers and ATMs All Under Fire
What is 'safe harbour' the EU Declared Invalid? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

CANVAS Consortium

CANVAS Consortium

The CANVAS Consortium aims to unify technology developers with legal and ethical scholar and social scientists to approach the challenges of cybersecurity.

Zanasi & Partners

Zanasi & Partners

Zanasi & Partners is a security research and advisory company active in the EU and MENA areas. Services focus on technology solutions.

Carson & SAINT

Carson & SAINT

Carson & SAINT is an award-winning consulting firm with deep experience in cybersecurity technology, software, and management consulting.

Bright Machines

Bright Machines

Bright Machines delivers intelligent, software-defined manufacturing by bringing together our flexible factory robots with intelligent software, production data and machine learning.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

RCMP National Cybercrime Coordination Unit (NC3)

RCMP National Cybercrime Coordination Unit (NC3)

As set out in the Government of Canada's National Cyber Security Strategy, the RCMP has established the National Cybercrime Coordination Unit (NC3).

Crypsis

Crypsis

Crypsis was built based on a shared vision of creating a more secure digital world by providing the highest quality incident response, risk management, and digital forensic services.

Rimini Street

Rimini Street

Rimini Street is a global provider of enterprise software support products and services, and the leading third-party support provider for Oracle and SAP software products.

Match Systems

Match Systems

Match Systems provides blockchain investigations, KYC, KYT, AML, Due Diligence and compliance services.

Cybersecurity Dubai

Cybersecurity Dubai

Protect your business from cyber-attacks with Cybersecurity Dubai, your partner in online security solutions.

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.

Cyabra

Cyabra

Cyabra is leading the fight against disinformation. Our AI shields companies and the public sector by uncovering malicious actors, bot networks, and GenAI content.

Ryan Financial Lines

Ryan Financial Lines

Ryan Financial Lines Cyber provides risk transfer solutions for complex cyber and technology exposures, globally.

RELIANOID

RELIANOID

RELIANOID is an application delivery controller and load balancing system that ensures high performance and security of IT services on a massive scale.

GrayHats

GrayHats

GrayHats is a platform-based cybersecurity company devoted to delivering comprehensive, scalable, and proactive protection for businesses in an ever-evolving threat landscape.