A brief introduction to Bitcoin

Bitcoin is a cryptocurrency that uses public-key cryptography. In public key cryptography, there are two keys used for secret communication between sender and receiver. Both the receiver and sender have their own unique public and private keys.

  • A public key is known to everybody. This key is used to send and receive funds from someone. It can be taken as a digital address of an individual.
  • A private key is private to the person. All the users have their individual private key which is only known by them. This key is utilized by the owner of the account to spend money. Someone unable to verify themselves with their private key will not be able to spend the money in their account.
Bitcoin was released in 2009 as an open source software by a person or group of people known as Satoshi Nakamoto. Bitcoin’s white paper (a proposal paper) was published by Nakamoto in 2008 on Bitcoin website. The purpose of developing this cryptocurrency was to eliminate the dependency of a centralized organization or bank. Therefore, Bitcoin is a decentralized peer-to-peer payment system which means people can transfer money to each other directly without going to a bank or a centralized authority. To completely understand, how Bitcoin payment system works, it is crucial to understand an important technology known as Blockchain.


bitcoin

Threats to cryptocurrencies

Losing money forever

Cryptocurrencies being digital assets create a concern of losing money forever. In November 2017, a curious Ethereum software developer became the sole owner of multisignature wallets accidently while fixing a security flaw in Ethereum code. Multisignature wallets are the wallets which require more than one users’ signatures to transfer funds. To fix the bug the developer deleted the code locking the multisignature wallets permanently causing loss of $300m. A hard fork is being considered to resolve the issue. A hard fork is an update in the version of protocol to fix any security flaws, adding new functionality or reversing transactions. A hard fork makes previous valid blocks or transactions invalid or vice versa. After a hard fork has been implemented all the nodes need to update the software, nodes running old software protocol are not accepted.

How cryptocurrencies are stolen and ways to avoid it

There are number of stories of cryptocurrencies being hacked which causes a security concern to its users. For instance, in December 2017, a Bitcoin mining service NiceHash was hacked resulting $62m loss. However, the cryptocurrencies are very secure to use. The reason of these hacks are human negligibility and ignorance not many people knowing how cryptocurrencies are used. As discussed earlier the cryptocurrencies rely on public and private keys and it is almost impossible for a hacker to hack someone’s private key of their digital wallet.
There are two ways of buying cryptocurrencies

1. Making a wallet where private key is protected by the owner.
2. Creating an account with a third party like CoinBase. The third party takes care of private key and owner takes care of their login details only.

Stealing account password

The only way a wallet can be hacked is that the hacker tricks the wallet owner to reveal their login details or breaks into owner’s email account, resets account password and impersonates to the third party as the owner of the account.
--> This can be avoided by enabling the two-factor authentication.

Private key is revealed by owner

An owner reveals their private key. In a famous example, somebody showed their private key on TV and lost all their money because a hacker saw the key and emptied the wallet immediately. --> It can be avoided by never disclosing private key to anyone, keeping the key written on a paper and kept safe offline.

Hacker impersonates as a company

Hacker will make fake websites of legitimate companies and ask people to transfer funds which are sent to hacker wallet. Once the money has been transferred, it cannot be recovered.
--> This can be avoided by checking the wallet address before transferring funds.

Relying on an insecure third party

A wallet should be opened only with a trusted service. If trusted third party is not secure like NiceHash, money is never safe.

The Exit Scam

This is a scam where a company provides services of trade or exchange and vanishes with all the user’s funds or pretends to be hacked. In reality, the owners of the company do exit scam and vanish with people’s money.
--> To avoid this as mentioned above a wallet should be created only with a trusted company.
In essence, it is unfair to blame cryptocurrencies for these hacks. Cryptocurrencies are quite safe to use if user knows how to manage their digital money.

user

Author

Iqra Bakhtiyaar

Contact me

IB279@live.mdx.ac.uk

Supervisor

Supervisor

Prof. Raja Nagarajan