Snowden Says Bitcoin Is Not Private

Speaking at a decentralised Internet conference, NSA whistleblower Edward Snowden has warned that Bitcoin’s public ledger is a “long-lasting flaw” that has large implications for the overall privacy of the cryptocurrency. 

Bitcoin is built on a piece of technology called the blockchain, which is a record of transactions that’s available to view by anyone. It’s also decentralised, meaning that its data is held in multiple locations all around the world, without being in the control of one single organisation.

Although Bitcoin has gained a reputation as an anonymous means of purchasing illegal goods on the dark net, the public ledger means that it’s actually possible for anyone to view the transactions that are taking place, even if the blockchain doesn’t tell you who each of its digital wallets belongs to.

Snowden believes this could be a godsend for any governments that are looking to outlaw the crypto-currency. The ability to trace transactions means a law enforcement agency could, in theory, track a Bitcoin transaction that’s gone to a wallet known to be used for illegal activities, and follow the transactions until they end up at an exchange like Coinbase. Once the money is exchanged into a real world currency, the identity of its owner could be revealed.

The Privacy Question
Snowden, as reported by Coindesk, says that these privacy concerns are a far bigger danger to Bitcoin than the transaction limit, which governs how many transactions the network can process at a time.

“Everybody is focused on the transaction rate limitations of bitcoin being its central flaw, and that is a major one…the much larger structural flaw, the long-lasting flaw, is its public ledger,” Snowden said, adding that he doesn’t think “Bitcoin will last forever”.

That’s not to say the transaction limit isn’t a problem. In recent months the popularity of Bitcoin has put a strain on the network as a result of this transaction limit, meaning that even online criminals are moving away from the currency.

Although there are methods of increasing the privacy of transactions on the blockchain (such as by using cryptocurrency tumblers) Snowden instead sees more promise in cryptocurrencies built from the ground up to prioritise privacy, such as Zcash.

Trusted Reviews

You Might Also Read: 

Bitcoin Exchanges Under Siege:

Crypto-Mining Is A Growing Epidemic:

 

« Google Launches An Initiative To Tackle Fake News
Staying One Step Ahead Of The Cyber Spies »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

National Institute of Standards & Technology (NIST) - USA

National Institute of Standards & Technology (NIST) - USA

NIST is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Areas covered include IT and cybersecurity.

CyberOwl

CyberOwl

CyberOwl builds on cutting-edge research and combines decades of experience in developing, securing and operating large distributed systems.

SecureNinja

SecureNinja

SecureNinja provides professional training, certifications & professional services related to all facets of Information Technology and Cyber Security.

HvS Consulting

HvS Consulting

HvS Consulting is a specialist information security company offering a full range of services including IT security architecture, ISO 27001 audits, Pentesting, Security monitoring and Training.

MBL Technologies

MBL Technologies

MBL Technologies specializes in information assurance, enterprise security, privacy, and program/project management.

Steganos

Steganos

Steganos offers highly secure and easy to use software tools that protect and secure on and offline data.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

CYRail

CYRail

CYRail project will analyse threats targeting Railway infrastructures and develop innovative attack detection and alerting techniques.

INFRA Security & Vulnerability Scanner

INFRA Security & Vulnerability Scanner

INFRA is a powerful platform with an easy interface for any kind of Ethical Hacking, from corporate monitoring and VAPT (vulnerability assessments and penetration testing) to military intelligence.

CyberUK

CyberUK

CYBERUK is the UK government’s flagship cyber security event and the authoritative event for the UK’s cyber security community.

stackArmor

stackArmor

stackArmor specializes in compliance and security-focused solutions delivered using our Agile Cloud Transformation (ACT) methodology.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

ZINAD IT

ZINAD IT

ZINAD is an information security company offering state-of-the-art cybersecurity awareness products, solutions and services.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

Tsaaro Academy

Tsaaro Academy

Tsaaro Academy is a unique privacy certification training platform and here you earn a privacy certification CEH, CISM and DPO from India’s No.1 Privacy training platform.

Zeroday Ops

Zeroday Ops

At ZeroDay Ops, our vision is to democratize cybersecurity by making enterprise-grade vulnerability assessment accessible, continuous, and actionable for every organization in the digital world.