Bitcoin's Forked: Chief Scientist Launches Alternative

Cryptocurrency Bitcoin is facing civil war, with two high-profile developers announcing plans to split the code that underpins the network.

Known as a “fork”, the new version of bitcoin (dubbed Bitcoin XT) would support more transactions per hour, at the cost of increasing the amount of memory required to hold a full database of all the bitcoin transactions throughout history, known as the blockchain.

It is backed by Mike Hearn and Gavin Andresen, two of the most senior developers involved in the bitcoin project. Both are involved in the Bitcoin Foundation, the non-profit group that oversees the currency’s development: Hearn is the former chair of the foundation’s law and policy committee, while Andresen is the chief scientist of the foundation.

In a post on the bitcoin developer mailing list, Hearn said that he felt a fork was the only option for solving the deadlock within the community: “I feel sad that it’s come to this, but there is no other way. The Bitcoin Core project has drifted so far from the principles myself and many others feel are important, that a fork is the only way to fix things.”

The key difference between Bitcoin XT and the other version of bitcoin, known as Bitcoin Core, is size of the blocks into which transactions get grouped every 10 minutes. Core supports a maximum block size of 1mb, which XT increases to 8mb. Hearn, and the other supporters of XT, argue that that increase is necessary if the currency is to continue growing.

“As Bitcoin spreads via word of mouth, we will reach the limit of the current system some time next year, or by 2017 at the absolute latest,” Hearn writes. “So it is now time to raise the limit, or remove it entirely.”

Those who oppose the change do so for a variety of reasons. Some argue that it’s a simple sticking-plaster solution, and that the actual fix should be far more wide-ranging (one such proposal being the “lightning network” upgrade); they worry that removing the most pressing need for an upgrade will also lessen he chance of that wide-ranging fix.

Others simply oppose changing anything from the initial bitcoin proposal presented by Satoshi Nakamoto in 2009, and argue that any major change should come in the form of a whole new currency, or “alt coin”, rather than an update to bitcoin itself. One opponent, posting to the bitcoin-dev mailing list, even claimed to be (alleged Bitcoin founder) Satoshi Nakamoto himself.

“The developers of this pretender-Bitcoin claim to be following my original vision, but nothing could be further from the truth,” they wrote. “When I designed Bitcoin, I designed it in such a way as to make future modifications to the consensus rules difficult without near unanimous agreement. Bitcoin was designed to be protected from the influence of charismatic leaders, even if their name is Gavin Andresen, Barack Obama, or Satoshi Nakamoto. Nearly everyone has to agree on a change, and they have to do it without being forced or pressured into it. By doing a fork in this way, these developers are violating the ‘original vision’ they claim to honour.”

The poster’s claim to be Nakamoto was widely derided, since the message wasn’t cryptographically signed, and so could have come from anyone. Nonetheless, Hearn – who says that the message “could be from anyone” – argues the fake Nakamoto’s input proves a point.

“There’s an interesting thing here – what if Satoshi did come back and weigh in? Let’s imagine he turned up and said he’d rethought, and Bitcoin was a bad idea. Should everyone just give up and walk away? Or accept that people’s ideas do change. My article quotes Satoshi a lot, but that’s not to imply he’s some sort of god or absent dictator.

In the short term, Hearn argues that most bitcoin users can safely ignore the debate. Unless they are “mining” – running the software that verifies bitcoin transactions – bitcoin users effectively have no vote in which one of the competing proposals becomes the future of bitcoin, while the software they use to make payments in the currency will likely support the biggest of the two networks.

“Almost all users run wallets that will just automatically follow whatever the final decision is. It’s not something they need worry about,” he says.

“Except, of course, in a high-level sense: if they bought bitcoins in the hope that it one day takes off and becomes really big, then they should keep an eye on things. If the big-blocks side doesn’t win out then the chances of going mainstream look much worse, and they may wish to rethink their investment.”

The worst-case scenario for the currency is that both Bitcoin XT and Bitcoin core continue to exist alongside each other for a long period of time, with neither fully seizing the mantle of the true heir to Nakamoto’s vision. In such a situation, the currency’s uncertain future could prove permanently damaging to its prospects.

But even if the change goes through relatively quickly, some inattentive users could find themselves out of pocket. Once the block sizes increase (which won’t happen until January 2016, and then only if 75% of the miners have switched to Bitcoin XT), the two versions of bitcoin will be incompatible. Transactions made on one version of bitcoin would not be reflected on the other, essentially rendering null any attempts to spend bitcoin on the “losing” fork after that date.

Guardian

 

« Third of UK Finance Logins Risk Client Data
IBM’s $1 Billion Revenue Target For Cloud In 2016 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

Echelon

Echelon

Echelon Company is a provider of information security services specializing in certification of security software and hardware products in Russia.

Nethemba

Nethemba

Nethemba provide pentesting and security audits for networks and web applications. Other services include digital forensics, training and consultancy.

Praetorian

Praetorian

Praetorian is an offensive cybersecurity company whose mission is to prevent breaches before they occur.

LEXFO

LEXFO

LEXFO specializes in the security of information systems, assisting clients in protecting information assets using an offensive and innovative approach.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

Romanian Accreditation Association (RENAR)

Romanian Accreditation Association (RENAR)

RENAR is the national accreditation body for Romania. The directory of members provides details of organisations offering certification services for ISO 27001.

ditno

ditno

ditno uses machine learning to help you build a fully governed and micro-segmented network. Dramatically mitigate risk and prevent lateral movement across your organisation – all from one centralised

Otorio

Otorio

OTORIO delivers industrial cybersecurity and digital risk-management solutions and services. We help our customers to keep their revenue-generating operations resilient, efficient, and safe.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

Celera Networks

Celera Networks

Celera Networks is a managed services provider specializing in cybersecurity, cloud and managed IT services.

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

Cyber Risk International

Cyber Risk International

Cyber Risk International offer CyberPrism, a B2B SaaS solution that empowers businesses to perform a self-assessment of their cyber security program.

SecureWeb3

SecureWeb3

SecureWeb3 helps businesses and brands to secure their Web3 presence by offering a full suite of security services including training, consultancy & brand protection solutions.