The In-Depth Guide to Bitcoin That Won’t Leave You Frustrated
Most people do not understand the concept and process of Bitcoin. Our extensive guide dives into the nitty-gritty in an easy-to-understand manner that won't leave you confused or frustrated. Share
- How Bitcoin Came to Be
- The Bitcoin Protocol
- How to Use Bitcoin
- How to Make Money from Cryptocurrency
- Is Bitcoin Legal?
- The Dark Side of Bitcoin
- Other Implementations of Blockchain
Have you heard of Bitcoin?
It’s almost a rhetorical question at this point, since Bitcoin is rapidly gaining popularity and is endlessly discussed in the media. However, that doesn’t mean everyone understands what it is.
In fact, most people don’t, mainly due to the technical nature of the underlying technology, which can be really intimidating.
Our aim in this guide is to explain the nitty gritty concepts relating to blockchain and Bitcoin in an easy-to-grasp manner. This is going to be a long guide, so we broke it down into digestible sections.
The concept of Bitcoin and blockchain includes a lot of specific terms. For quick definitions, you can reference this glossary.
1. How Bitcoin Came to Be
A. Who Invented Bitcoin?
Bitcoin was invented by an anonymous person under the pseudonym Satoshi Nakamoto. In October 2008, he published a paper and circulated it throughout the cryptographic community.
In 2009, Nakamoto completed the code for the Bitcoin software and also invited other people from the open source community to contribute to it.
He mined the first block himself on January 3, 2009. As per the public records of his Bitcoin addresses, he currently owns an amount of Bitcoin worth over $19 billion – making him the 44th richest person in the world.
But no one really knows who Satoshi Nakamoto is. There have been many investigations by journalists, and it’s been speculated that he is various students or celebrities, but nothing has yet been proven. It may sound ridiculous, but some have even claimed that Satoshi Nakamoto is a time traveler from the future.
What isn’t up for debate is that by inventing Bitcoin, Satoshi Nakamoto has revolutionized the concept of money, solving many of the problems that occur with the use of traditional currency.
B. The Problem with Traditional Currency
We all know how to withdraw cash from an ATM and how to buy a pack of gum. But how many of us actually know why these transactions work? Why does everyone accept that these metal discs and strips of paper have any value?
Well, traditionally, currency was bound to some physical commodity, like gold. So, for instance, in the year 1900, gold was worth $20.67 per ounce. That meant that the U.S. government was only allowed to mint $20.67 worth of currency if it had an ounce of gold in the reserves to back it up. It also meant that any holder of U.S. currency could go to the government and exchange it for its equivalent worth in gold.
In the US, this system ended in 1971, when the American dollar became a fiat currency – meaning it has no intrinsic value. In recent decades, all the world’s major currencies have been converted to the fiat system.
In these cases, the value of the currency is determined by supply and demand, and is sustained by the people’s trust in the economy. While this allows the government to promote economic stability through the control aspects of the economy like credit supply, liquidity, and interest rates, it could also lead to the government printing more money than it should – causing hyperinflation.
Another problem with fiat currencies is that the fact that the system is centralized means it requires a lot of regulation. In other words, every transaction needs to be facilitated by a financial body – e.g. a credit card company or a bank – in order to make sure it’s carried out correctly. That’s why when you go to an ATM that doesn’t belong to your bank, or when you transfer money from your account to a friend’s, you often pay a fee.
You can read more about decentralized currency in this article.
C. Bitcoin Solves the Problems of Centralized Currencies
Bitcoin aims to solve the problems associated with fiat currencies.
Using Bitcoin, you can transfer funds to anyone within seconds and with minimal transaction fees. This is possible because the Bitcoin system is decentralized.
In essence, Bitcoin is a distributed decentralized ledger on which all financial transactions are recorded. This ledger is implemented through a technology known as blockchain. Each block on the blockchain represents a series of transactions. Once enough transactions have been carried out, the block is completed and cannot be altered.
Using this public ledger, Bitcoin aims to solve a number of problems:
- Decentralization: The most important feature of Bitcoin is that it’s decentralized, meaning it is not controlled by a single authority or person. The code for the software is open-sourced and maintained by volunteers. The system is run by an open network of computers spread around the world. Whoever wants to participate can pitch in and start contributing.
- Anonymity: Unlike traditional financial systems, the Bitcoin software doesn’t need to know who you really are. Your identity is your Bitcoin address. Your ability to carry out financial transactions depends only on whether you have sufficient funds in your account.
- Immutability: The Bitcoin network and the underlying blockchain are immutable. That means, once a transaction is done, it cannot be reversed. This ensures that a person to whom money was sent actually receives it. One might think that this would be problematic for ecommerce, where the buyer needs to be protected. However, even with Bitcoin, this can be achieved with escrow accounts.
- Limited supply: Traditional fiat currencies have unlimited supply, since reserve banks can mint as much money as they want. However, the number of Bitcoin that can ever be produced is capped at 21 million. The value of the currency is determined by demand and the perceived benefit that people see in it.
Now, let’s take a deep dive to understand how the underlying technology of Bitcoin works. In order to do this, we will look at the problems associated with building a decentralized currency system and see how the Bitcoin system solves them.
2. The Bitcoin Protocol
A. Bitcoin Authenticates the User with a Digital Signature
When you go to a bank to perform a transaction, it needs you to authenticate yourself. You may do this with your driver’s license, social security card, or your handwritten signature. In any case, these mechanisms are in place so that it is only you who are allowed to withdraw or transfer money that you own. If someone tries to impersonate you, he would be caught (hopefully).
As has been explained above, Bitcoin utilizes a public ledger, on which everyone records their transactions. But what’s to keep people from adding fraudulent transactions that benefit them? For instance, Bob could simply add to the ledger that Alice sent him money.
In order to prevent this, transactions are broadcast to the network along with a digital signature.
A digital signature ensures two things:
- The message has been sent by the designated sender.
- The message has not been tampered with.
This digital signature is created using a hashing algorithm and asymmetric encryption.
Hashing is the use of an algorithm that irreversibly converts an input into a unique output of a fixed length. The hashing algorithm used by Bitcoin is SHA256, which means the output – also known as a hash, or digest – is 256 binary digits (i.e. zeros and ones).
You can think of hashing as a mathematical technique by which you can convert an input value into an output value very quickly. However, when given an output value, it is practically impossible to figure out the input value that was used to get the corresponding result.
One way to conceptualize this is metaphorically, with the input being flour, sugar, eggs, etc. and the output being a cake. The algorithm is the oven that turns the raw ingredients into the finished product. Once you have the cake, it’s impossible to turn it back into the raw ingredients. It’s also impossible to determine exactly what the raw ingredients were and how much of each was used.
In order to create a digital signature, the message broadcast to the network first needs to be hashed. Then, the hash needs to be encrypted.
As mentioned above, the type of encryption employed by Bitcoin is known as asymmetric encryption – a type of encryption that utilizes what are known as public and private keys.
The way this works is that each person has a public and private key that correspond with one another. While both the public and private key can be used to encrypt a message, in order to decrypt it, the other must be used. In other words, if you encrypt with a public key, it must be decrypted with a private key, and vice versa.
The private key belongs to one person and no one else has access to it. In contrast, you can give anyone your public key. So say Alice wants to send Bob a private message. Alice encrypts the message using Bob’s public key that he gave her. Because Bob is the only one with his private key, he’s the only one who can decrypt it. If Bob wants to send Alice a private message, he encrypts it using her public key, and only she can decrypt it using her private key.
With Bitcoin, the aim isn’t to send a private message – remember, the ledger is public. Nevertheless, asymmetric encryption still serves the purpose of ensuring that the message was actually sent by the person you think it is, and that it hasn’t been tampered with.
So let’s say Alice wants to send Bob one Bitcoin. In order to do so she broadcasts two things to the network:
- A message (containing the details of the transaction). The transaction is unencrypted and contains the link to previous transactions. It also contains input and output values which helps in determining whether there are enough funds for the transaction to be considered valid.
- A digital signature (i.e., the hashed message that she’s encrypted with her private key)
Bob then authenticates the transaction by:
- Applying the hash algorithm to the message. This leaves him with Hash A.
- Decrypting the digital signature Alice created using Alice’s public key. This leaves him with Hash B.
Since both hashes were derived from the same message, they should be the same. If they are, it proves that the message wasn’t tampered with. And since Bob was able to decrypt the hashed message using Alice’s public key, and Alice is the only one with access to her private key, it also ensures that the message came from her.
B. How Bitcoin Stores Information
Another potential problem with a decentralized network like Bitcoin is storage.
Where can we store everyone’s balances and their transaction histories?
In conventional centralized systems, there are dedicated servers owned and maintained by financial institutions, such as banks, that store all the data. Although this data is supposed to be highly secure and confidential, in recent years, there have been several instances of hackers gaining access to this information.
In the Bitcoin system, there is no single authority that controls the data. Instead, all the information is public.
Bitcoin does this by employing a peer-to-peer distributed network. The data is distributed across thousands of participating computers, known as nodes, that are connected via the internet. Each node has access to the ledger (or blockchain), which gets updated every time a new transaction (or block) gets added.
These transactions are carried out according to a set of rules, known as the Bitcoin protocol.
C. How Transactions are Carried Out
Suppose Alice wants to send one Bitcoin to Bob.
First, we need to verify that Alice really owns at least one Bitcoin. In the blockchain network, there is no single entry where you can see how much currency a person owns. Instead, the balance is derived by calculating all previous transactions, known as the transaction chain.
When you first download the Bitcoin software, you receive a complete copy of the transaction chain (which is why downloading can take up to 24 hours). Once you have the transaction chain, it’s easy to determine Alice’s current balance.
Once it is verified that Alice owns enough Bitcoin to make the transaction, the next step is to broadcast the transaction message. This message contains the sender’s and receiver’s addresses, the amount being transferred, and a digital signature created by the sender. When broadcasted publicly, any node in the network can relay the message and pick it up for execution.
Before it is executed, the transaction is added to a pool of unconfirmed transactions, known as a mempool (i.e. memory pool). From there, it is picked up by miners.
Miners are basically the mediators who validate transactions. (This will be explained in more detail below.) Once the transaction is validated, the miner adds it to the newest block. A block has a fixed size, so after a certain number of transactions, a new block must be created. The current block is linked to the previous block, forming a blockchain.
But who decides which transactions should next be added to the latest block?
Typically, miners are free to pick or leave whichever transactions they wish. To incentivize them to choose yours, you can pay them a small part of the transaction. This, however, should not be viewed as necessary, since miners have another incentive to make blocks, known as a block reward.
Whenever a new block is added to the chain, the miner who submits it is rewarded with new Bitcoin. The exact amount has changed over time and decreases as the network grows. Block rewards are the system’s natural way of minting new money.
When the transaction becomes a part of the blockchain, it is officially executed.
D. How Blocks are Validated
Above we discussed how newly verified transactions are added to a block, which is then added to the existing blockchain. But how do we know that the new transactions are legitimate?
Miners must perform a proof-of-work.
Essentially, proof-of-work is the concept according to which the most trusted version of the ledger is the one that’s had the most computational work put into it. Proof-of-work requires that data be difficult and time consuming to create but easy and fast to validate.
This is done using the hashing technique discussed in the section on digital signatures. As you recall, a hash is created by performing an algorithm on an input in order to create an output of a fixed length.
Here, miners must solve a mathematical puzzle in order to add their block to the existing blockchain, and this puzzle takes some time to solve. Specifically, this puzzle is to guess an input that will result in a hash that begins with a certain number of zeros.
Here’s how it works:
Say a miner is working on a block. At the top of this block is the hash of the last block on the blockchain. Beneath that are all the transactions that miner has picked up. Beneath that, the miner adds a number, called a nonce. Then he performs a hash algorithm on the entire block.
As mentioned above, his goal is to get a hash that begins with a certain number of zeros. If you recall, if the input changes even slightly, it will result in a completely different output. That means that in order to get the right number of zeros, the miner needs a very specific number at the bottom. So how does the miner know which number to put there?
He has no choice but to randomly guess different numbers until he gets the right hash. Whichever miner manages to do this first gets his block added to the blockchain.
According to the Bitcoin protocol, this whole process should take about 10 minutes. Because there are constantly new miners with different amounts of computing power, the number of zeros required will periodically change.
This process not only allows new blocks to be added to the chain. It also performs another very important function – it ensures the security and integrity of the entire system.
How does it do that?
Well, because each block contains the hash of the last block as its header, even one change to one character in any of the transactions would lead not only to a change in that block’s hash – but to every single block in the chain.
That means that if someone wants to alter a transaction, they would have to recalculate every single block that came before, which would require an impossible amount of computing power. It also means that each time a new block is added, the blockchain gets more secure.
E. How Proof-of-Work Prevents Double Spending
Suppose Alice has an online shop that accepts Bitcoin payments. Bob comes to her website and places an order for an iPhone. If Bob chooses Bitcoin as the payment option, Alice would, of course, wait for the payment confirmation before sending the iPhone.
But because of the way blockchain works, Bob could try to defraud Alice by initiating two transaction messages with the same signature – one in which he sends the money to the Alice, and another in which he sends it to himself at a different address.
Once Alice sees the transaction message sending her the money, she would ship the product. However, if the transaction in which Bob sends himself the money makes it onto the blockchain before the legitimate transaction, then that’s the one that’s going to go through – so Bob ends up getting his iPhone for free.
This makes it seem like if Alice were smart, she wouldn’t send the iPhone right after the transaction was broadcast; instead, she would wait until it’s on the blockchain.
But actually, not even that is good enough.
This is because occasionally, more than one block is added at a time, creating a fork in the chain. In these instances, the next miner who finishes a block can choose which branch he wants to add to. Pretty quickly one branch will become longer than the other. When this happens the shorter branch is dumped, and all the transactions on it are shunted back to the mempool.
Because of this, it is recommended to wait for at least six blocks to be added to the chain before considering a transaction complete. The transactions that have been recently added to the blockchain are sometimes referred to as hot transactions.
From this we again see how proof-of-work – i.e., doing more computational work – secures transactions.
But let’s take a look at another hypothetical: What if Bob managed to create two branches, with one block containing the legitimate transaction, and the other the fraudulent one? And he added to the fraudulent one at the same rate other miners added to the legitimate one. Alice, seeing the branch with the legitimate transaction grow, would get a false sense of security, leading her to send the iPhone. Eventually, however, Bob could make his chain longer, sending the legitimate transaction back to the mempool. Because it has the same signature as the fraudulent transaction, if it gets picked up again, it will be considered invalid.
It’s an interesting hypothetical, and in theory it could work.
But in reality, it’s impossible.
This is because it takes computational power and time to solve and add a block. Even with an incredibly powerful processor, in order to pull of this stunt Bob would need to control more than half CPU on the Bitcoin network. That’s why this concept is sometimes referred to as a 51% attack.
In reality, the branch with the legitimate transaction would end up longer, and the fraudulent transaction would get dumped back in the mempool. By the time it gets picked up by another miner, because the signature was already used in the legitimate transaction, it would be considered invalid.
All that said, even if Bob did somehow manage to gain control of the network, the amount of time and resources it would take to cheat the system just isn’t worth it. He would earn more Bitcoin simply mining according to the rules.
3. How to Use Bitcoin
There are numerous ways you can use Bitcoin, but all basically involve the same process. There are three steps to using Bitcoin: acquiring Bitcoin, managing your wallet, and trading Bitcoin for goods and services. Let’s look at the steps one by one:
A. Acquiring Bitcoin
Besides mining Bitcoin (which we discuss in Section 2), you can simply purchase it. This can be done through an online exchange, or by making an Over The Counter (OTC) transaction.
OTC transactions are trades made with another individual – generally via a broker who manages negotiations. This is the favored method for those seeking to buy very large sums of Bitcoin (i.e. in the hundreds of thousands or millions of dollars worth). This is because exchanges don’t have the liquidity to facilitate such large transactions.
Although OTC trades aren’t regulated like exchanges, a reputable broker will ensure that no fraud occurs. Some high profile brokers include China-based Richfund, New York’s Genesis Global Trading, and London-based Bitstocks.
For the ordinary Bitcoin user, exchanges, such as Coinbase, Coinmama, or itBit are the safest and easiest way to procure Bitcoin. In order to avoid foreign exchange fees, it is best to buy from an exchange in your country, which will typically be directly integrated with local banks.
Exchanges are extremely easy to navigate. You just go to the website and follow the sign-up instructions, and you can get started buying Bitcoin right away.
What’s important to note is that most exchanges require personal information such as your name, email, and phone number. And obviously, if you’re using your credit card to buy Bitcoin, or are doing so via a bank transfer, it will have that information too.
If you choose to use an exchange, this point in the process – when you buy or sell Bitcoin – is when you can lose your anonymity.
B. Managing Your Wallet
On the Bitcoin network, owning Bitcoin simply means having an address and private key. As we discussed above, this private key allows you to encrypt digital signatures.
Without a private key, you have no access to your Bitcoin and no way of proving that it belongs to you, so you should keep it in as secure a place as possible.
You receive a private key when you are issued a Bitcoin address. The key is a 256-bit length of data, which can also be represented alphanumerically. For example, people sometimes use it in hexadecimal form – meaning 64 characters in the range of 0-9 or A-F. The most common option is to use the Wallet Import Format (WIF), which is 51 alphanumeric characters, the first of which is always the number 5.
Here’s an example of a WIF private key:
Losing your private key is like losing your Bitcoin. If you lose your private key, you cannot recover your Bitcoin. Similarly, if someone else gets a hold of your private key, then he or she can withdraw all your Bitcoin.
So, how do you protect your private keys and your coins?
One option is to store your coins offline. Storing your coins and private key on a USB drive ensures that attackers and hackers cannot steal your information. However, if you lose that drive – or if someone manages to physically steal it – you’re out of luck.
Another option is to store your Bitcoin with a third-party provider – or client – that offers a Bitcoin wallet. This is a type of software that stores the addresses and key pairs for all your Bitcoin transactions.
However, the growing number of attacks these days targeting the crypto exchanges have made it slightly unsafe to store your keys with them. The recommended approach is to store your keys offline.
C. Making Transactions Using Bitcoin
Making transactions using Bitcoin is very simple. If you have a specific person to whom you want to send money, you just need their Bitcoin address, which you can enter into your Bitcoin client. If the person you are sending money to uses the same client as you, often all you need to do is enter the email address to which they linked their account.
Online businesses that accept Bitcoin usually have a button that you click that will automatically bring you to your wallet, allowing you to make the payment from there. For wallets installed on mobile devices, they often provide a QR code you can scan with your phone.
4. How to Make Money from Cryptocurrency
Blockchain technology is completely new and there are plenty of opportunities to monetize it. There are basically two ways from you can do that – through mining and investing.
A. Become a Miner
Mining is a slow but safe method of earning money from Bitcoin and other cryptocurrencies. As you recall, miners are the people on the network who validate transactions in exchange for a reward. In the case of Bitcoin, there are two types of rewards – one that is received for adding a new block, and the other for picking up a particular transaction.
Different cryptocurrencies have different mechanisms for paying miners; some may only pay for transaction fees, while others incentivize them using various other means.
You can participate in the mining process by donating CPU to the network. Because CPU requires electricity, it’s important to consider how your earnings from mining will compare to the costs you will incur. This will depend on the country you’re in and how cheap the electricity is there. The extremely low cost of electricity in China is the reason why the majority of the miner network resides there.
Other factors that will contribute to your calculation are the hash power of your hardware and the current price of Bitcoin.
For more serious miners, there is specialized hardware available with high hash rates that will give the miner better odds of solving a block. An ASIC (Application Specific Integrated Circuit) is the general term used for such a device. With the combination of an ASIC and cheap electricity, you could find it profitable to get into the mining business.
You can either be an individual miner or you can be a part of group of miners who share CPU. The latter is known as a mining pool, and is generally a good idea for those without a lot of hardware. In a mining pool, members are paid in proportion to the amount of CPU power they contribute. For Bitcoin mining, the following pools are well known:
- Bitfury – based in Georgia
- BTC.com – based in China
- Slush – based in the Czech Republic
For other cryptocurrencies, you’ll need to research which pools are worth joining. Generally, pools are created as soon as a currency starts gaining traction.
B. Invest in Cryptocurrency
Direct investment is a quick but risky way of making money from cryptocurrencies. If you do not have the time or resources for mining, you can simply purchase the cryptocurrency from an exchange. Bitcoin has shown astonishing returns over the past few years, and has caught the attention of all sorts of investors.
While you can purchase crypto coins any time, there is a special time period when the opportunity for profit (and loss) is at its highest.
This is during the ICO (Initial Coin Offering). For those familiar with equity investing, you can say that it’s similar to an IPO (Initial Public Offering).
ICO is an event at which crypto coins are first introduced to the world and have not yet been valued. At that time potential investors assess the project and decide whether to invest in it. If the project is implemented and gains traction, the value of the coins rise, earning them a profit.
Let us look at some interesting stories where people bought Bitcoin and were shocked later on.
- In 2009 a Norwegian student researching encryption bought 5,000 BTC for around $27, and then totally forgot about it. Four years later, when the media brought Bitcoin into the limelight, he remembered his purchase and was surprised to find that it was worth over $886,000. Half he sold in order to purchase a luxury home in a posh area of Oslo, and the rest is worth $28 million as per today’s exchange rate.
- On May 22, 2010, computer programmer Laszlo Hanyecz bought two pizzas using Bitcoin. He paid around 10,000 BTC which at that time was only worth $41. However, at the current exchange rate, those Bitcoin are worth more than $67 million, making them the most expensive pizzas ever purchased. In an interview, Laszlo stated that since the Bitcoin barely had any value back then, he was excited that he was able to buy anything with it.
- James Howell, an IT engineer from Newport started mining Bitcoin using his laptop in 2009. He collected over 7,500 Bitcoin and then stopped. Later, he sold his laptop on eBay, but before doing so removed the hard disk where his Bitcoin private keys were stored. He kept the hard disk in a drawer hoping to cash out the Bitcoin when their value increased. But a few years later, during some house cleaning, the hard disk was thrown out by mistake. As per today’s exchange rate, the lost Bitcoin are worth over $85 million. James wanted to carry out a search operation at the landfill – an expensive and complex task – but due to environmental concerns and the possibility of hazardous gases leaking out, the operation was not carried out.
Even with all these stories of vast increases in Bitcoin’s worth, however, investors should bear in mind that the value of cryptocurrencies can fluctuate wildly. For example, over the past six months, Bitcoin has increased and decreased dramatically.
Cryptocurrencies in general are highly volatile. Just because the value of Bitcoin has increased tremendously in the past does not guarantee that it will continue to do so in future.
Our advice is to not invest more than you can afford to lose. DO NOT shell out all or a major chunk of your hard earned money hoping great returns. You may get lucky, but it is not worth the risk of losing it all if the price takes a significant dip. You can see the latest Bitcoin exchange rates on our Bitcoin calculator.
5. Is Bitcoin Legal?
With the rising popularity of Bitcoin, cryptocurrencies in general have caught the attention of government and financial regulatory bodies. Unlike counterfeit fiat currency, which is illegal, in most countries Bitcoin itself is legal.
However, due to the anonymous and unregulated nature of Bitcoin, many governments have placed restrictions on its use. Some worry that Bitcoin and other cryptocurrencies will lead to a loss of the government’s financial control.
Most countries do not have clear laws regarding the use of cryptocurrencies, so people are often confused as to its status. Therefore, it is best to check your country’s rules regarding Bitcoin’s legality, and to keep in mind that these laws are subject to change.
It is totally illegal to hold Bitcoin in Algeria, Columbia, Nepal, Bangladesh, and several other countries. In contrast, in the United States, Bitcoin is not only legal, but is considered a commodity by the CFTC (Commodity Futures Trading Commission). Regarding taxes, the rules are similar to any other asset.
In many countries, such as India, Bitcoin falls into a grey area, wherein the government has not declared it illegal, but does discourage its use by issuing warnings against it.
What should not need to be stated is that you should not use Bitcoin to buy or sell items or services that are illegal. If a type of transaction is illegal using fiat currency, it is also illegal using Bitcoin or, for that matter, any other cryptocurrency.
6. The Dark Side of Bitcoin
Though Bitcoin has many advantages – which we have discussed at length – some government warnings against it are not entirely unfounded.
That is because there are criminal elements that seek to take advantage of all the excitement and media hype surrounding Bitcoin. For instance, there are cyber criminals who launch Ponzi schemes promising astronomical returns on investments. Only after their money has disappeared do people realize they were duped. Many governments are therefore running awareness campaigns advising people to stay skeptical and invest cautiously.
There are also many other ways cryptocurrency is misused:
- Because of the anonymity and ease of transfer of Bitcoin, terrorist groups have tried fundraising on social media sites using their Bitcoin addresses. While this has not been very successful in the past, there is no guarantee that the terrorists won’t at some point succeed.However, it’s worth noting that one’s anonymity is restricted to the blockchain network. Once Bitcoin is converted to some other currency, one’s identity and transactions can be tracked via your IP address. And because every transaction on the blockchain is public, it’s very easy to track the movement of funds.
- On May 12, 2017, a huge ransomware outbreak, known as the Wannacry attack, occurred around the world. This malware took control of the victims’ computers and demanded money in exchange for relinquishing it.While the ransomware used was not new, one of the distinguishing features of this attack was that the money was demanded in the form of Bitcoin. This incident obviously brought Bitcoin a lot of bad publicity. To understand more about ransomware and malware, check out this article.
- There are many online scams that have led to people having their Bitcoin stolen. Typical online banking has several layers of protection, such as a password, two factor authentication, OTP, etc. But in case of Bitcoin, one only needs to get a hold of a private key in order to completely empty someone’s wallet. Fraudsters steal these keys from people’s computers with keyloggers, Trojan horse hacks, and phishing attacks.Therefore, it’s important to protect your Bitcoin wallet as vigilantly as you would hard cash. Another type of scam is known to be carried out by certain online sellers: They advertise a product with a huge discount, and only accept Bitcoin as payment. Once the buyer pays, the seller ships a very poor quality product – or worse, nothing at all. And since Bitcoin payments are irreversible, there’s no option for recourse.
- Another category of scam involves an ICO. Since the cryptocurrency market is highly unregulated, some people deliberately launch fraudulent blockchain projects. They promise some breakthrough innovation and convince investors to contribute capital. But instead of actually developing the project, they simply declare it unsuccessful and take all the invested money for themselves.Since it’s easy to declare bankruptcy, and investing always involves the potential for loss, there is very little that can be done to protect those who back these projects. There are many legitimate ICOs as well, but it can be difficult to differentiate between those and fraudulent ones. So if you do consider investing in a new blockchain project, it’s important to perform due diligence before opening up your wallet.
7. Other Implementations of Blockchain
Bitcoin was the first, and remains the most major implementation of blockchain. However, since then, people have come up with various other ways of using the system.
One way people have used blockchain is to create variations on Bitcoin. These often advertise themselves as better or enhanced versions of Bitcoin, and are collectively known as altcoins. Some of the major altcoins are:
- Litecoin: Litecoin launched in 2011 and varies only slightly from the Bitcoin system. One difference is that it takes less time to generate blocks. Compared to the 10 minutes it takes Bitcoin, Litecoin generates a block every 2.5 minutes. This means that transactions are verified more quickly. Another difference is the hashing algorithm used. Bitcoin uses SHA256 for the proof-of-work algorithm, whereas Litecoin uses scrypt. One feature of scrypt is that it’s harder to create optimized CPU or GPU hardware to solve the puzzle faster, making the system more fair for miners. That said, today there do exist ASICS that can be used to mine Litecoin.
- Zcash: Zcash was recently launched in 2016. Like Bitcoin it provides secure transactions over a distributed ledger. However, Zcash is different from Bitcoin in that it uses a different proof-of-work algorithm (called zk-SNARK) and employs a different privacy strategy. In the Bitcoin system, the sender, receiver, and the amount of money being transferred are all public, whereas with Zcash they can remain private and shielded. By the end of 2017, Zcash had already crossed a one billion dollar market cap.
- Dogecoin: Dogecoin was actually launched as a joke in response to what some perceive as cryptocurrency mania. Its logo is a coin bearing the face of the dog known from the popular Doge internet meme. It is a complete replica of Bitcoin and offers no differentiation or enhancement, primarily because it was not meant to be taken seriously. Initially the value of the coin was extremely low. However, its value shot up significantly and it began taking on serious investors – recently reaching a two billion dollar market cap. The creators, unhappy with the fact that the coin had become the very thing it was meant to mock, eventually removed themselves from the project. Finally, the value decreased significantly when Ryan Kennedy, the owner of a Dogecoin exchange called Moolah, was arrested for fraud. However, starting in January 2018, the valuation started increasing again.
B. Non-currency implementations
As mentioned above, the blockchain system is applicable to more than cryptocurrencies. There are many other novel ideas based on the construct that are worth billions of dollars.
- Ethereum: Ethereum is to applications what Bitcoin is to currency. It provides an infrastructure for apps to run without a central server. Like Bitcoin, it depends on nodes across the internet. In this case, the nodes provide the CPU necessary for an app to run. In order to prevent abuse and to eliminate low quality apps, Ethereum requires that applications spend a currency called ether. The code developed in the Ethereum network is run by a software called the Ethereum virtual machine. Developers use smart contracts to develop the application, which are executed automatically whenever specified conditions are met. For example, one smart contract could be to automatically ship a product once payment is received. Ethereum apps are called DAPs (decentralized applications), and hundreds of them have already been successfully launched. Examples are apps that deal with digital signatures, prediction software, electric car charging management, and online gambling sites.
- Ripple: While Bitcoin is intended for the public, Ripple is meant for banks and payment networks. Currently, banks employ the protocol SWIFT (Society for Worldwide Interbank Financial Telecommunication), which requires the involvement of intermediaries. This, plus fluctuations in currency exchange rates often leads to transactions being delayed. Ripple enables financial institutions to transfer, settle, remit, and exchange payments in real time without incurring large costs. Although it has yet to be officially adopted, many banks have already began using Ripple in trial phases. One important difference between Ripple and Bitcoin is that not everyone is allowed to join the network. The computers need to identify themselves and need permission to take part. In that sense, it is not truly decentralized or public.
As we have seen, there are some negative aspects of Bitcoin, and these should be addressed. However, that doesn’t mean we should abandon it altogether. Blockchain is a true innovation capable of solving innumerable problems. It is up to us to be wise and use it appropriately.
You are exposing yourself to the websites you visit!
Your IP Address:
Your Internet Provider:
The information above can be used to track you, target you for ads, and monitor what you do online.
VPNs can help you hide this information from websites so that you are protected at all times. We recommend NordVPN — the #1 VPN out of over 350 providers we've tested. It has military-grade encryption and privacy features that will ensure your digital security, plus — it's currently offering 68% off.