Bitcoin receive payments26 comments
Bitcoin wallet printer
Users' identities would be shielded by pseudonyms. Records would be completely decentralized. And no one would be in charge—not governments, not banks, not even Nakamoto.
Yet the idea caught on. Today, there are some Some of this growth is attributable to criminals taking advantage of the anonymity for drug trafficking and worse. But the system is also drawing interest from financial institutions such as JP Morgan Chase, which think it could streamline their internal payment processing and cut international transaction costs.
It has inspired the creation of some other cryptocurrencies. What fascinates academics and entrepreneurs alike is the innovation at Bitcoin's core. Known as the block chain, it serves as the official online ledger of every Bitcoin transaction, dating back to the beginning. It is also the data structure that allows those records to be updated with minimal risk of hacking or tampering—even though the block chain is copied across the entire network of computers running Bitcoin software, and the owners of those computers do not necessarily know or trust one another.
Many people see this block-chain architecture as the template for a host of other applications, including self-enforcing contracts and secure systems for online voting and crowdfunding. This is the goal of Ethereum, a block-chain-based system launched in July by the non-profit Ethereum Foundation, based in Baar, Switzerland.
Several shortcomings have become apparent in Bitcoin's implementation of the block-chain idea. Security, for example, is far from perfect: Cryptocurrency firms and researchers are attacking the problem with tools such as game theory and advanced cryptographic methods. Academic interest in cryptocurrencies and their predecessors goes back at least two decades, with much of the early work spearheaded by cryptographer David Chaum.
So in he founded one of the earliest digital currencies, DigiCash, which offered users anonymity through cryptographic protocols of his own devising. DigiCash went bankrupt in —partly because it had a centralized organization akin to a traditional bank, yet never managed to fit in with the financial industry and its regulations.
But aspects of its philosophy re-emerged ten years later in Nakamoto's design for Bitcoin. That design also incorporated crowdsourcing and peer-to-peer networking—both of which help to avoid centralized control. Anyone is welcome to participate: Users' computers form a network in which each machine is home to one constantly updated copy of the block chain.
Nakamoto's central challenge with this wide-open system was the need to make sure that no one could find a way to rewrite the ledger and spend the same bitcoins twice—in effect, stealing bitcoins. His solution was to turn the addition of new transactions to the ledger into a competition: Mining starts with incoming Bitcoin transactions, which are continuously broadcast to every computer on the network. These are collected by 'miners'—the groups or individuals who choose to participate—who start competing for the right to bundle transactions into a new block.
The winner is the first to broadcast a 'proof of work'—a solution showing that he or she has solved an otherwise meaningless mathematical puzzle that involves encrypted data from the previous block, and lots of computerized trial and error. The winning block is broadcast through the Bitcoin network and added to the block chain, with the proof of work providing an all but unbreakable link. The block chain is currently almost , blocks long. In principle, this competition keeps the block chain secure because the puzzle is too hard for any one miner to solve every time.
This means that no one will ever gain access to the encrypted links in the block chain and the ability to rewrite the ledger. Mining is also a way to steadily increase the bitcoin supply: Nakamoto's design controls the supply increase by automatically adjusting the difficulty of the puzzle so that a new block is added roughly every ten minutes. In addition, the reward for creating a block decreases by half roughly every four years. The goal is to limit the supply to a maximum of 21 million bitcoins.
The network cannot determine the value of bitcoins relative to standard currencies, or real-world goods and services. That has been left to market forces , with people trading bitcoins on online exchanges. Puzzle solutions It did not take long for the problems with Bitcoin to become apparent. For example, because users are allowed to mask their identity with pseudonyms, the currency is perfect for screening criminal activity.
That was behind the success of the online black market Silk Road, which the FBI shut down in ; its founder was sentenced to life in prison in May this year. But Bitcoin also had a key role in funding the whistle-blowing website WikiLeaks—an outcome that some would call beneficial.
It is difficult for society to work out a legal framework to differentiate between good and bad uses of this technology, says Arvind Narayanan, a computer scientist at Princeton University in New Jersey. Other issues surfaced with Bitcoin's mining procedure. As the currency has gained value, for example, mining competition has become fiercer, with increasingly specialized computers solving the puzzles ever faster. The rivalry has driven the establishment of large Bitcoin-mining centres in Iceland, where cooling for the computers is cheap.
According to one estimate from , Bitcoin miners collectively consumed as much power as the whole of Ireland. Working together Intensified Bitcoin mining has also led individual miners to pool their computational resources.
Last year, the largest mining pool, GHash. This would effectively give them control of the transaction ledger and allow them to spend the same bitcoins over and over again. This is not just a theoretical possibility. To reduce the threat from mining pools, some existing cryptocurrencies, such as Litecoin, use puzzles that call more on computer memory than on processing power—a shift that tends to make it more costly to build the kind of specialized computers that the pools favour.
Another approach, developed by IC3 co-director Elaine Shi and her collaborators, enlists a helpful kind of theft. Their supposition is that miners would not trust each other enough to form into pools if their fellow pool members could easily waltz off with the rewards without sharing. They have built a prototype of the algorithm, and are hoping to see it tested in Bitcoin and other cryptocurrencies.
Another problem is the profligate amount of electricity used in Bitcoin mining. To reduce wastage, researchers including Shi and Juels have proposed a currency called Permacoin. This would not save energy, but would at least put it to better use. The security of cryptocurrencies is another huge concern.
The many thefts of bitcoins do not result from the block-chain structure, says Narayanan, but from Bitcoin's use of standard digital-signature technology. In digital signatures, he explains, people have two numeric keys: But the security of that private key is only as good as the security of the machine that stores it, he says.
Security is such a concern for consumers that Narayanan thinks Bitcoin is unlikely to find widespread use. So his team is working on a better security scheme that splits private keys across several different devices, such as an individual's desktop computer and smartphone, and requires a certain proportion of the fragments to approve a payment. You'll hopefully notice the hack happened before they have the chance.
Other thefts have occurred because the private key needs to be combined with a random number to create a transaction signature. Some software—such as Bitcoin apps developed for Android smartphones—has generated random numbers improperly, making them easier to guess.
This has allowed hackers to steal somewhere between several thousand and several million dollars' worth of bitcoins, says Courtois, who has been investigating such vulnerabilities.
Into the ether The block chain is a remarkably powerful idea that could be applied to much more than just transaction records, says Gavin Wood, co-founder of Ethereum and chief technology officer of its foundation. One use might be to develop computerized, self-enforcing contracts that make a payment automatically when a task is complete.
Others might include voting systems, crowdfunding platforms, and even other cryptocurrencies. Wood says that Ethereum is best used in situations for which central control is a weakness—for example, when users do not necessarily trust one another. In , to make it easier to develop such applications, Wood and fellow programmer Vitalik Buterin devised a way to combine the block chain with a programming language. Ethereum raised 30, bitcoins through crowdfunding to commercialize this system.
To prevent the basic cryptography-related mistakes that have plagued Bitcoin, Ethereum has recruited academic experts to audit its protocol. Shi and Juels are looking for ways that Ethereum could be abused by criminals. Like Bitcoin, Ethereum is not under anyone's direct control, so it operates outside national laws, says Wood.
However, he adds that technologies such as music taping and the Internet were also considered extralegal at first, and seemed threatening to the status quo. Juels suspects that Bitcoin, at least, will not last as an independent, decentralized entity.
He points out how music streaming has moved from the decentralized model of peer-to-peer file-sharing service Napster to commercial operations such as Spotify and Apple Music. As soon as any new innovations come along, he suggests, Bitcoin can adopt them and retain its leading position. Whatever the future holds for Bitcoin, Narayanan emphasizes that the community of developers and academics behind it is unique.
Sign up for our email newsletter. Forget Flowers, Give Science. Get the perfect gift for mom Shop Now.