Snowden Says Bitcoin Is Not Private

Speaking at a decentralised Internet conference, NSA whistleblower Edward Snowden has warned that Bitcoin’s public ledger is a “long-lasting flaw” that has large implications for the overall privacy of the cryptocurrency. 

Bitcoin is built on a piece of technology called the blockchain, which is a record of transactions that’s available to view by anyone. It’s also decentralised, meaning that its data is held in multiple locations all around the world, without being in the control of one single organisation.

Although Bitcoin has gained a reputation as an anonymous means of purchasing illegal goods on the dark net, the public ledger means that it’s actually possible for anyone to view the transactions that are taking place, even if the blockchain doesn’t tell you who each of its digital wallets belongs to.

Snowden believes this could be a godsend for any governments that are looking to outlaw the crypto-currency. The ability to trace transactions means a law enforcement agency could, in theory, track a Bitcoin transaction that’s gone to a wallet known to be used for illegal activities, and follow the transactions until they end up at an exchange like Coinbase. Once the money is exchanged into a real world currency, the identity of its owner could be revealed.

The Privacy Question
Snowden, as reported by Coindesk, says that these privacy concerns are a far bigger danger to Bitcoin than the transaction limit, which governs how many transactions the network can process at a time.

“Everybody is focused on the transaction rate limitations of bitcoin being its central flaw, and that is a major one…the much larger structural flaw, the long-lasting flaw, is its public ledger,” Snowden said, adding that he doesn’t think “Bitcoin will last forever”.

That’s not to say the transaction limit isn’t a problem. In recent months the popularity of Bitcoin has put a strain on the network as a result of this transaction limit, meaning that even online criminals are moving away from the currency.

Although there are methods of increasing the privacy of transactions on the blockchain (such as by using cryptocurrency tumblers) Snowden instead sees more promise in cryptocurrencies built from the ground up to prioritise privacy, such as Zcash.

Trusted Reviews

You Might Also Read: 

Bitcoin Exchanges Under Siege:

Crypto-Mining Is A Growing Epidemic:

 

« Google Launches An Initiative To Tackle Fake News
Staying One Step Ahead Of The Cyber Spies »

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 4,000+ specialist service providers.

Ixia

Ixia

Ixia provides testing, visibility, and security solutions to strengthen applications across physical and virtual networks.

GovCERT.ch

GovCERT.ch

Computer Emergency Response Team of the Swiss Government.

Astra

Astra

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

Center for Applied Cybersecurity Research (CACR) - University of Indiana

Center for Applied Cybersecurity Research (CACR) - University of Indiana

CACR serves Indiana and the nation by tackling cyber risk in research and other unusual environments through agile, holistic, principle-based cybersecurity.

NewGens

NewGens

NewGens is a solution and service provider to banking institutions in the APAC region. Areas of expertise include cybersecurity, AML, fruad prevention, compliance and risk management.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.