Snowden Says Bitcoin Is Not Private

Speaking at a decentralised Internet conference, NSA whistleblower Edward Snowden has warned that Bitcoin’s public ledger is a “long-lasting flaw” that has large implications for the overall privacy of the cryptocurrency. 

Bitcoin is built on a piece of technology called the blockchain, which is a record of transactions that’s available to view by anyone. It’s also decentralised, meaning that its data is held in multiple locations all around the world, without being in the control of one single organisation.

Although Bitcoin has gained a reputation as an anonymous means of purchasing illegal goods on the dark net, the public ledger means that it’s actually possible for anyone to view the transactions that are taking place, even if the blockchain doesn’t tell you who each of its digital wallets belongs to.

Snowden believes this could be a godsend for any governments that are looking to outlaw the crypto-currency. The ability to trace transactions means a law enforcement agency could, in theory, track a Bitcoin transaction that’s gone to a wallet known to be used for illegal activities, and follow the transactions until they end up at an exchange like Coinbase. Once the money is exchanged into a real world currency, the identity of its owner could be revealed.

The Privacy Question
Snowden, as reported by Coindesk, says that these privacy concerns are a far bigger danger to Bitcoin than the transaction limit, which governs how many transactions the network can process at a time.

“Everybody is focused on the transaction rate limitations of bitcoin being its central flaw, and that is a major one…the much larger structural flaw, the long-lasting flaw, is its public ledger,” Snowden said, adding that he doesn’t think “Bitcoin will last forever”.

That’s not to say the transaction limit isn’t a problem. In recent months the popularity of Bitcoin has put a strain on the network as a result of this transaction limit, meaning that even online criminals are moving away from the currency.

Although there are methods of increasing the privacy of transactions on the blockchain (such as by using cryptocurrency tumblers) Snowden instead sees more promise in cryptocurrencies built from the ground up to prioritise privacy, such as Zcash.

Trusted Reviews

You Might Also Read: 

Bitcoin Exchanges Under Siege:

Crypto-Mining Is A Growing Epidemic:

 

« Google Launches An Initiative To Tackle Fake News
Staying One Step Ahead Of The Cyber Spies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Omerta

Omerta

Omerta is a global security technology and services company. We advise, consult, design, build, mitigate, protect, manage, provide and train to protect from increasing cyber threats.

Oxygen Forensics

Oxygen Forensics

Oxygen Forensics offer the most advanced forensic data examination tools for mobile devices and cloud services.

Alarum Technologies

Alarum Technologies

Alarum Technologies (formerly Safe-T) is a global provider of cyber security and privacy solutions to consumers and enterprises.

ManTech International

ManTech International

ManTech provides comprehensive, integrated cyber security support, which includes computer and network design, implementation, and operations.

tietoEVRY

tietoEVRY

TietoEVRY creates digital advantage for businesses and society. We are a leading digital services and software company with local presence and global capabilities.

Ubisecure

Ubisecure

Ubisecure provide Identity & Access Management solutions.

Lightship Security

Lightship Security

Lightship Security is an accredited Common Criteria and FIPS 140-2 IT security testing laboratory that specializes in test conformance automation solutions and IT product security certifications.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

HARMAN International

HARMAN International

HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

Armexa

Armexa

Armexa is a leading provider of advanced industrial cybersecurity solutions that protect your critical OT and ICS infrastructure against ever-changing threats.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

Fireblocks

Fireblocks

Fireblocks is a digital asset security platform that helps financial institutions protect digital assets from theft or hackers.

Globesecure Technologies

Globesecure Technologies

Globesecure Technologies is a networks and cyber security company. We are here to resolve business security challenges and secure the digital transformation journey of our clients.

IT Voice

IT Voice

IT Voice specializes in Managed IT and VoIP solutions. Our focus is simplifying the technology so our customers can stay focused on what they do best.