Bitcoin Is Bad For The Environment

Tesla has stopped accepting Bitcoin as payment for its cars out of concern that it will contribute to greater consumption of fossil fuels, according to a statement CEO Elon Musk. “Cryptocurrency is a good idea on many levels and we believe it has a promising future, but this cannot come a great cost to the environment,” say Musk on Twitter.

Bitcoin mining is a process of creating a new coin that involves using computers to solve complex mathematical algorithms or puzzles. The cryptocurrencies are based on a decentralised network that need to be mined. Bitcoin mining is metaphorical, but the results can be just as destructive as the real thing.

The software that mines bitcoin is designed to take on average about 10 minutes for those on the network to solve the complex program and process a block.The process ends up using a massive amount of electricity as giant and powerful systems are used by miners to mine blocks and verify transactions.

The vast majority of Bitcoin’s energy consumption happens during the mining process. As a reward for their services, miners receive newly created bitcoins along with transaction processing fees.

The emergence of cryptocurrency into the mainstream is very important for the world of finance. It’s also a big deal for the world in the case of the dominant form of cryptocurrency, Bitcoin.Bitcoin has recently surged in value. In April, 2020, a coin was worth about seven thousand dollars; today, it’s worth more than fifty-five thousand. As the cost of investing in bitcoin have increased, so has the profit in mining it. 

According to the Cambridge Bitcoin Electricity Consumption Index, bitcoin-mining operations worldwide use energy at about the annual domestic electricity consumption of the entire nation of Sweden, and it is responsible for roughly a million times more carbon emissions than a single Visa transaction. 

As the world desperately needs to cut carbon emissions, it doesn’t make sense to be devoting a Sweden’s worth of electricity to a virtual currency.

Mining is the process by which bitcoin is both created and accounted for. Instead of being cleared by, say, a bank, bitcoin transactions are recorded by a decentralised network, a blockchain. It’s unclear exactly who dreamt up bitcoin, so no one knows what this person (or persons) was thinking when the mining protocols were first established. 

Elon Musk:        LiveMint:       New Yorker:     The Verge:       Cambridge University Judd:      Image: Unsplash

You Might Also Read: 

Standing On The Cryptocurrency Frontier:

 

« The Role Of Enterprise Architecture In Cyber Defence
Ireland’s Health Service Won't Pay Ransom »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TraceSecurity

TraceSecurity

TraceSecurity, a leading pioneer in cloud-based security solutions, provides IT governance, risk and compliance (GRC) management solutions.

Attivo Networks

Attivo Networks

Attivo Networks is an award winning provider of deception for in-network threat detection, attack forensic analysis, and continuous threat response.

ControlCase

ControlCase

ControlCase provide solutions that address all aspects of IT-GRCM (Governance, Risk Management and Compliance Management).

Nexthink

Nexthink

Using our solution, hundreds of IT departments effectively balance offering a productive and enjoyable end-user experience with making the right decisions to secure and transform the digital workplace

Uppsala Security

Uppsala Security

Uppsala Security built the first crowdsourced Threat Intelligence platform known as the Sentinel Protocol, which is powered by blockchain technology.

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

Carbonite

Carbonite

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

Industrial Defender

Industrial Defender

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint.

Cyber Command - Romania

Cyber Command - Romania

Cyber Command represents the military authority responsible for the development, protection and resilience of military IT networks and services that support the Romanian Force Structure.

AutoSec

AutoSec

AutoSec supports the FFI program Electronics, Software and Communication by dissemination and exploitation of the results of projects related to automotive cybersecurity.

Lab 1

Lab 1

Lab 1 turns criminal data breaches and attacks into insights. Get alerts of data breaches or ransomware attack incidents as they happen.

Phriendly Phishing

Phriendly Phishing

Phriendly Phishing offers phishing awareness training programs designed to ward off potential security threats and minimise the impact of cyber attacks.

Zyber 365

Zyber 365

Zyber 365 are providing a robust, decentralized, and cyber-secured operating system which adheres to the fundamental principles of environmental sustainability.

V2X

V2X

V2X delivers IT support, networking, and cybersecurity solutions that ensure optimal mission support and performance.

aFFirmFirst

aFFirmFirst

aFFirmFirst is a unique software solution offering a simple yet effective way for businesses to protect and control their online images and logo, as well as allowing one-click website verification.