Snowden Says Bitcoin Is Not Private

Speaking at a decentralised Internet conference, NSA whistleblower Edward Snowden has warned that Bitcoin’s public ledger is a “long-lasting flaw” that has large implications for the overall privacy of the cryptocurrency. 

Bitcoin is built on a piece of technology called the blockchain, which is a record of transactions that’s available to view by anyone. It’s also decentralised, meaning that its data is held in multiple locations all around the world, without being in the control of one single organisation.

Although Bitcoin has gained a reputation as an anonymous means of purchasing illegal goods on the dark net, the public ledger means that it’s actually possible for anyone to view the transactions that are taking place, even if the blockchain doesn’t tell you who each of its digital wallets belongs to.

Snowden believes this could be a godsend for any governments that are looking to outlaw the crypto-currency. The ability to trace transactions means a law enforcement agency could, in theory, track a Bitcoin transaction that’s gone to a wallet known to be used for illegal activities, and follow the transactions until they end up at an exchange like Coinbase. Once the money is exchanged into a real world currency, the identity of its owner could be revealed.

The Privacy Question
Snowden, as reported by Coindesk, says that these privacy concerns are a far bigger danger to Bitcoin than the transaction limit, which governs how many transactions the network can process at a time.

“Everybody is focused on the transaction rate limitations of bitcoin being its central flaw, and that is a major one…the much larger structural flaw, the long-lasting flaw, is its public ledger,” Snowden said, adding that he doesn’t think “Bitcoin will last forever”.

That’s not to say the transaction limit isn’t a problem. In recent months the popularity of Bitcoin has put a strain on the network as a result of this transaction limit, meaning that even online criminals are moving away from the currency.

Although there are methods of increasing the privacy of transactions on the blockchain (such as by using cryptocurrency tumblers) Snowden instead sees more promise in cryptocurrencies built from the ground up to prioritise privacy, such as Zcash.

Trusted Reviews

You Might Also Read: 

Bitcoin Exchanges Under Siege:

Crypto-Mining Is A Growing Epidemic:

 

« Google Launches An Initiative To Tackle Fake News
Staying One Step Ahead Of The Cyber Spies »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Malware.lu

Malware.lu

Malware.lu is a repository of malware and technical analysis. The goal of the project is to provide samples and technical analysis to security researchers.

Identiv

Identiv

Identiv is a global security technology company that establishes trust in the connected world, including premises, information and everyday items.

RSA Security

RSA Security

RSA provide cybersecurity products for Threat Detection and Response, Identity and Access Management, Governance, Risk and Compliance, and Fraud Prevention.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

Cyberlitica

Cyberlitica

Cyberlitica (formerly iPhish) provides a Workforce Threat Intelligence application that significantly augments companies’ cyber threat prevention efforts.

4Stop

4Stop

4Stop is a global KYC, compliance and anti-fraud risk management company.

Omnipotech

Omnipotech

Omnipotech is a complete managed service provider. From desktop to datacenter, all the technology support you need, under one umbrella.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Netstar

Netstar

Netstar is an IT Support company based in Central London providing fully managed IT Support, Cyber Security and Technology Consulting services.

Salus Cyber

Salus Cyber

Salus is a provider of world-class cyber security services, enabling our clients to identify and manage their cyber risks proactively and effectively.

Nerds On Site

Nerds On Site

Nerds On Site provide on-site & in-home IT and technical support, managed IT services, and cyber security through our collaborative team of highly-trained IT and Security professionals.

Reaktr.ai

Reaktr.ai

Reaktr.ai is founded on the vision of using AI as a catalyst to propel industries into a future where we redefine what's possible. Fortify your cybersecurity defense with our AI-powered platform.

Fairly AI

Fairly AI

Fairly AI is on a mission to democratize safe, secure, and compliant AI across the enterprise.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.

Treacle Technologies

Treacle Technologies

Treacle Technologies are a Cyber Security startup with a focus on Defensive Security.