Bitcoin Is Bad For The Environment

Tesla has stopped accepting Bitcoin as payment for its cars out of concern that it will contribute to greater consumption of fossil fuels, according to a statement CEO Elon Musk. “Cryptocurrency is a good idea on many levels and we believe it has a promising future, but this cannot come a great cost to the environment,” say Musk on Twitter.

Bitcoin mining is a process of creating a new coin that involves using computers to solve complex mathematical algorithms or puzzles. The cryptocurrencies are based on a decentralised network that need to be mined. Bitcoin mining is metaphorical, but the results can be just as destructive as the real thing.

The software that mines bitcoin is designed to take on average about 10 minutes for those on the network to solve the complex program and process a block.The process ends up using a massive amount of electricity as giant and powerful systems are used by miners to mine blocks and verify transactions.

The vast majority of Bitcoin’s energy consumption happens during the mining process. As a reward for their services, miners receive newly created bitcoins along with transaction processing fees.

The emergence of cryptocurrency into the mainstream is very important for the world of finance. It’s also a big deal for the world in the case of the dominant form of cryptocurrency, Bitcoin.Bitcoin has recently surged in value. In April, 2020, a coin was worth about seven thousand dollars; today, it’s worth more than fifty-five thousand. As the cost of investing in bitcoin have increased, so has the profit in mining it. 

According to the Cambridge Bitcoin Electricity Consumption Index, bitcoin-mining operations worldwide use energy at about the annual domestic electricity consumption of the entire nation of Sweden, and it is responsible for roughly a million times more carbon emissions than a single Visa transaction. 

As the world desperately needs to cut carbon emissions, it doesn’t make sense to be devoting a Sweden’s worth of electricity to a virtual currency.

Mining is the process by which bitcoin is both created and accounted for. Instead of being cleared by, say, a bank, bitcoin transactions are recorded by a decentralised network, a blockchain. It’s unclear exactly who dreamt up bitcoin, so no one knows what this person (or persons) was thinking when the mining protocols were first established. 

Elon Musk:        LiveMint:       New Yorker:     The Verge:       Cambridge University Judd:      Image: Unsplash

You Might Also Read: 

Standing On The Cryptocurrency Frontier:

 

« The Role Of Enterprise Architecture In Cyber Defence
Ireland’s Health Service Won't Pay Ransom »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Encode

Encode

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services.

International Organization for Standardization (ISO)

International Organization for Standardization (ISO)

ISO is an independent, non-governmental international standards organization. The ISO/IEC 27001 is the standard for information security management systems.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

Seceon

Seceon

Seceon OTM, is a cyber security advanced threat management platform that visualizes, detects, and eliminates threats in real time.

Nucleon

Nucleon

Nucleon enables cybersecurity tools, organizations and software developers to become proactive by blocking threats before they become breaches.

TechRate

TechRate

Techrate is an analytics agency focused on blockchain technology and engineering. Or expertise includes security and technical audits of projects.

TAV Technologies

TAV Technologies

TAV Technologies is a provider of technology services to the aviation industry in areas including airport infrastructure systems, digital transformation and cybersecurity.

SoloKeys

SoloKeys

SoloKeys provides the first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.

Reflectiz

Reflectiz

Reflectiz empowers digital businesses to make all web applications safer by non-intrusively mitigating any website risks without a single line of code.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

Polygraph

Polygraph

Polygraph monitors the activities of click fraud gangs, including how they operate, who they target, the techniques they use, and how to detect their fraud.

Cyber Crucible

Cyber Crucible

Cyber Crucible is a cybersecurity Software as a Service company definitively removing the risk of data extortion from customer environments.

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.

DerSecur

DerSecur

DerSecur has been engaged in advanced technology activities in the field of Application Security since 2011. We offer R&D technology solutions in the field of SAST, DAST and SCA analysis.