Assessment of Quantum Threat to Bitcoin and Derived Cryptocurrencies Stephen Holmes, Liqun Chen

Total Page:16

File Type:pdf, Size:1020Kb

Assessment of Quantum Threat to Bitcoin and Derived Cryptocurrencies Stephen Holmes, Liqun Chen 1 Assessment of Quantum Threat To Bitcoin and Derived Cryptocurrencies Stephen Holmes, Liqun Chen University of Surrey Abstract—All cryptocurrencies are not the same. Today, they automate this approach making this almost invisible to users. share a common quantum vulnerability through use of non-quantum In order to keep the disclosure time of a valid address in a safe Elliptic Curve Digital Signature Algorithm (ECDSA) digital cryptocurrency blockchain as short as possible, a public key signatures yet they have very different risks of quantum attack. The risk of attack for a cryptocurrency depends on a number of identified can be hidden by using a cryptographic hash function or a factors such as the block interval time, the vulnerability to an attack pair of two hash functions, e.g. in bitcoin two hash functions that delays the time for an unprocessed transaction to be completed SHA256 and RIPEMD160 are used [3]. and the behaviour of a cryptocurrency user to increase the cost of The quantum attack that is a common threat to all ECDSA- a quantum computer attack. Shor’s algorithm can be used to break based cryptocurrencies can only be performed during the ECDSA signatures with a quantum computer. This research addresses the two questions: When will a quantum computer be powerful disclosure of a public key and signature to enable movement enough to execute Shor’s algorithm? How fast would a quantum of cryptocurrency funds. A window of opportunity exists until computer need to be to break a specific cryptocurrency? In this paper the unprocessed transaction is included in a block. we observe that by benchmarking the speed of circuits and the time ISO are currently developing a technical report for for quantum addition on quantum computers we can determine when blockchain security - Blockchain and distributed ledger tech- there is a potential threat to a specific cryptocurrency. nologies Security risks, threats and vulnerabilities [4], A cur- Keywords—digital signatures, quantum computing, cryptocur- rent proposed approach from Homoliak, Ivan & Venugopalan, rency, bitcoin, altcoin, ECDSA Sarad & Hum, Qingze & Reijsbergen, Daniel & Schumi, I.I NTRODUCTION Richard & Szalachowski, Pawel [5]. The Security Reference Architecture for Blockchains: Towards a Standardized Model HE bitcoin white paper was published in 2008 [1] and for Studying Vulnerabilities, Threats, and Defenses presents a T since that time, bitcoin and alternative currencies have Security Reference Architecture (SRA) for blockchain which grown in value and volume. Bitcoin and cryptocurrency sys- introduces a threat-risk model that is based on the template of tems provide a new means for multiple mutually distrusting ISO/IEC 15408 [6]. Using this stacked model of the security and remote parties to transact through a protocol that enforces reference architecture, focus is on the replicated state machine a level of trust between parties because of the immutability of layer and specifically transactions. the protocol and consensus mechanism. Bitcoin and altcoins The wide adoption of ECDSA for blockchain signature derived from bitcoin architecture current value is over 100 schemes is understandable given the proven security against billion USD. todays computers and the efficiency of the signature scheme Underpinning bitcoin and alternative cryptocurrencies are (time to execute and storage space required for keys and a series of cryptographic technologies used to secure bit- signatures). This gives rise to the primary question of this coin and alternative cryptocurrencies. With the advent of a research - How can we measure quantum computing advances future quantum computer many underpinning cryptographic regardless of the technology they are built from to assess protocols become susceptible to attack by the development the threat to bitcoin and derived cryptocurrencies? What of a sufficiently large quantum computer. More specifically, quantum computer performance indicators can give advanced digital signature schemes, for example ECDSA [2], used in warning of the threat to the ECDSA signature scheme in a cryptocurrencies are not quantum resistant. cryptocurrency implementation? This research is focused on the assessing the potential mechanisms for attack that are possible by a quantum com- II.C ONTRIBUTIONS puter to break digital signatures used in bitcoin and derived HIS paper is organised as follows: An overview of cryptocurrencies (altcoins). T related work on bitcoin and cryptocurrency vulnerability A public key of such a digital signature scheme is used to quantum computer attack. Analysis and review of possible as an address of an amount of cryptocurrency funds. The combined attacks to delay the time to process an unpro- corresponding private key(s) indicates the ownership of the cessed transaction. Review of estimating quantum computing funds. This research highlights that if the public key has resources to solve ECDLP using implementation of Shor’s been disclosed or if it has been used for more than one algorithm [7]. Assessment of the quantum computer capacity transaction, allowing it to be recorded for later quantum attack, required to execute Shor’s algorithm, taking into account the mitigation is simply to move funds to a new address. circuit size and error rates on a quantum computer. A new Most currently supported wallet software can be configured to proposed approach to assess unprocessed transaction time window for each cryptocurrency and derive quantum computer revealed in the presence of a quantum computer the address speed of execution required to meet this time window. The is no longer safe and thus should never be used again. While impact of noise and error rates on quantum computers and an always using fresh addresses is already the suggested practice examination of quantum computers capabilities today. in Bitcoin, in practice this is not always followed. Any address The key discovery from this paper is that not all cryptocur- that has bitcoin and for which the public key has been revealed rencies have the same timing attack vulnerabilities. A con- is completely insecure. sequence of this is that for some cryptocurrencies migration B. Processed transactions from ECDSA to quantum safe signatures may be possible to delay until a quantum computer is approaching the capacity If a transaction is made from an address which has not and performance required to pose a threat. been spent from before, and this transaction is placed on A further discovery is that cryptocurrency user behaviour the blockchain with several blocks following it, then this can significantly impact the cost of a quantum adversary transaction is reasonably secure against quantum attacks. The attack. The migration to one time use addresses is a practical private key could be derived from the published public key, protection that prevents a slow quantum computer attack on but as the address has already been spent this would have a disclosed public key. A further protection is to move to to be combined with out-hashing the network to perform a multi-signature addresses. Where n is the number of signatures double spending attack. Even with a quantum computer a required to unlock an address. In the case of Bitcoin, this double spending attack is unlikely once the transaction has enables up to n of 20 signatures to be required to unlock many blocks following it. an address. Making the quantum adversary solve n ECDSA C. Unprocessed transactions private keys from the public keys disclosed in the unprocessed After a transaction has been broadcast to the network, but transaction. Increasing the quantum computing requirement before it is placed on the blockchain it is at risk from a by n times within the same unprocessed transaction window. quantum attack. If the secret key can be derived from the Paying a significantly higher fee than the current average broadcast public key before the transaction is placed on the transaction fee increases the cost to a quantum adversary blockchain, then an attacker could use this secret key to in executing a denial of processing valid transactions attack. broadcast a new transaction from the same address to his own Reducing the amount of cryptocurrency in any one account by address. If the attacker then ensures that this new transaction spreading currency to multiple accounts, reduces the risk and is placed on the blockchain first, then he can effectively steal attractiveness of an attack. all the bitcoin behind the original address. This can stave off a quantum computer attack. However, The mitigation to protect against reusing an address is this is at the expense of usability and reliance on user oper- simple. However, in practice this will need to be achieved ational discipline. Enabling a cryptocurrency to decide when through either programatic wallet rules or disciplined changes to implement countermeasures such as moving to accepting in user behaviour. This makes every address a one-time use only multi-signature transactions or implementing new means address (receiving and sending). Currently for bitcoin this to reduce the unprocessed transaction time. stands at around 48.6% as of August 2020. Analysis of today’s The quantification of the unprocessed transaction time win- bitcoin wallet addresses shows that there are currently 2476 dow by cryptocurrency and the quantification of the number wallet addresses with bitcoin funds worth over 10 million US and depth of gates required to run Shor’s algorithm enables dollars. Yet, despite the advice to only use an address once (to a benchmarking of quantum computer capabilities required to prevent recording of public key by rogue miner, or intercepting meet or exceed this window and hence a risk assessment of across the network). Only 81 of these addresses only have quantum capability to make a successful attack on a specific one transaction. The remaining 2395 addresses have multiple cryptocurrency. This simple measurement can give advanced transactions meaning that the public key can be recorded and warning that a cryptocurrency may be at risk regardless of broken at leisure by a quantum computer adversary to generate quantum computing technology.
Recommended publications
  • Linking Wallets and Deanonymizing Transactions in the Ripple Network
    Proceedings on Privacy Enhancing Technologies ; 2016 (4):436–453 Pedro Moreno-Sanchez*, Muhammad Bilal Zafar, and Aniket Kate* Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network Abstract: The decentralized I owe you (IOU) transac- 1 Introduction tion network Ripple is gaining prominence as a fast, low- cost and efficient method for performing same and cross- In recent years, we have observed a rather unexpected currency payments. Ripple keeps track of IOU credit its growth of IOU transaction networks such as Ripple [36, users have granted to their business partners or friends, 40]. Its pseudonymous nature, ability to perform multi- and settles transactions between two connected Ripple currency transactions across the globe in a matter of wallets by appropriately changing credit values on the seconds, and potential to monetize everything [15] re- connecting paths. Similar to cryptocurrencies such as gardless of jurisdiction have been pivotal to their suc- Bitcoin, while the ownership of the wallets is implicitly cess so far. In a transaction network [54, 55, 59] such as pseudonymous in Ripple, IOU credit links and transac- Ripple [10], users express trust in each other in terms tion flows between wallets are publicly available in an on- of I Owe You (IOU) credit they are willing to extend line ledger. In this paper, we present the first thorough each other. This online approach allows transactions in study that analyzes this globally visible log and charac- fiat money, cryptocurrencies (e.g., bitcoin1) and user- terizes the privacy issues with the current Ripple net- defined currencies, and improves on some of the cur- work.
    [Show full text]
  • Dani Brunstein Intel Israel November 2014 Agenda
    Dani Brunstein Intel Israel November 2014 Agenda Mutual Introduction, Target and Disclaimer Quick intro on cryptocurrencies and Bitcoin Rate of global acceptance Understanding the Why Disruptive Market On purpose: The technology behind First overview Bitcoin in Israel and the Academy then technicalities Friendly directives • This is a non technical, mostly an informative presentation • Lots to cover – feel free to ask, but we will take discussions offline Quick Intro Dani Brunstein, MSc in Comp. Science, Technion Software Engineer at Microprocessor Design Automation in Intel Israel mailto: [email protected] Special thanks to • Kosta Zertsekel - organizer of the Haifa Meetup Group (actual hands-on experience with bitcoin code) • Shaul Kfir – Bits of Gold • Dr. Orna Agmon Ben-Yehuda - Haifux organizer • Prof. Eli Ben-Sasson – Technion CryptoCurrency research How many of you “know anything on Bitcoins” ? How many of you own Bitcoins ? Target and Disclaimer Target 1. Educate you 2. Getting you excited and involved Disclaimer I am NOT advising you ANYTHING! I am NOT representing any company or group This lecture is given without warranty. The author makes no representation or warranty, either express or implied, with respect to the content, its quality, accuracy or fitness. Therefore the author shell have no liability with respect to any loss, or damage caused directly or indirectly by this lecture. What are Crypto Currencies ? Bitcoin is the first practical solution for peer-to-peer ownership transfer with no trusted third party involved
    [Show full text]
  • Blocksci: Design and Applications of a Blockchain Analysis Platform
    BlockSci: Design and applications of a blockchain analysis platform Harry Kalodner Steven Goldfeder Alishah Chator [email protected] [email protected] [email protected] Princeton University Princeton University Johns Hopkins University Malte Möser Arvind Narayanan [email protected] [email protected] Princeton University Princeton University ABSTRACT to partition eectively. In fact, we conjecture that the use of a tra- Analysis of blockchain data is useful for both scientic research ditional, distributed transactional database for blockchain analysis and commercial applications. We present BlockSci, an open-source has innite COST [5], in the sense that no level of parallelism can software platform for blockchain analysis. BlockSci is versatile in outperform an optimized single-threaded implementation. its support for dierent blockchains and analysis tasks. It incorpo- BlockSci comes with batteries included. First, it is not limited rates an in-memory, analytical (rather than transactional) database, to Bitcoin: a parsing step converts a variety of blockchains into making it several hundred times faster than existing tools. We a common, compact format. Currently supported blockchains in- describe BlockSci’s design and present four analyses that illustrate clude Bitcoin, Litecoin, Namecoin, and Zcash (Section 2.1). Smart its capabilities. contract platforms such as Ethereum are outside our scope. Second, This is a working paper that accompanies the rst public release BlockSci includes a library of useful analytic and visualization tools, of BlockSci, available at github.com/citp/BlockSci. We seek input such as identifying special transactions (e.g., CoinJoin) and linking from the community to further develop the software and explore addresses to each other based on well-known heuristics (Section other potential applications.
    [Show full text]
  • Merged Mining: Curse Or Cure?
    Merged Mining: Curse or Cure? Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios Voyiatzis, Edgar Weippl SBA Research, Vienna, Austria (firstletterfirstname)(lastname)@sba-research.org Abstract: Merged mining refers to the concept of mining more than one cryp- tocurrency without necessitating additional proof-of-work effort. Although merged mining has been adopted by a number of cryptocurrencies already, to this date lit- tle is known about the effects and implications. We shed light on this topic area by performing a comprehensive analysis of merged mining in practice. As part of this analysis, we present a block attribution scheme for mining pools to assist in the evaluation of mining centralization. Our findings disclose that mining pools in merge-mined cryptocurrencies have operated at the edge of, and even beyond, the security guarantees offered by the underlying Nakamoto consensus for ex- tended periods. We discuss the implications and security considerations for these cryptocurrencies and the mining ecosystem as a whole, and link our findings to the intended effects of merged mining. 1 Introduction The topic of merged mining has received little attention from the scientific community, despite having been actively employed by a number of cryptocurrencies for several years. New and emerging cryptocurrencies such as Rootstock continue to consider and expand on the concept of merged mining in their designs to this day [19]. Merged min- ing refers to the process of searching for proof-of-work (PoW) solutions for multiple cryptocurrencies concurrently without requiring additional computational resources. The rationale behind merged mining lies in leveraging on the computational power of different cryptocurrencies by bundling their resources instead of having them stand in direct competition, and also to serve as a bootstrapping mechanism for small and fledgling networks [27, 33].
    [Show full text]
  • Decentralized Reputation Model and Trust Framework Blockchain and Smart Contracts
    IT 18 062 Examensarbete 30 hp December 2018 Decentralized Reputation Model and Trust Framework Blockchain and Smart contracts Sujata Tamang Institutionen för informationsteknologi Department of Information Technology Abstract Decentralized Reputation Model and Trust Framework: Blockchain and Smart contracts Sujata Tamang Teknisk- naturvetenskaplig fakultet UTH-enheten Blockchain technology is being researched in diverse domains for its ability to provide distributed, decentralized and time-stamped Besöksadress: transactions. It is attributed to by its fault-tolerant and zero- Ångströmlaboratoriet Lägerhyddsvägen 1 downtime characteristics with methods to ensure records of immutable Hus 4, Plan 0 data such that its modification is computationally infeasible. Trust frameworks and reputation models of an online interaction system are Postadress: responsible for providing enough information (e.g., in the form of Box 536 751 21 Uppsala trust score) to infer the trustworthiness of interacting entities. The risk of failure or probability of success when interacting with an Telefon: entity relies on the information provided by the reputation system. 018 – 471 30 03 Thus, it is crucial to have an accurate, reliable and immutable trust Telefax: score assigned by the reputation system. The centralized nature of 018 – 471 30 00 current trust systems, however, leaves the valuable information as such prone to both external and internal attacks. This master's thesis Hemsida: project, therefore, studies the use of blockchain technology as an http://www.teknat.uu.se/student infrastructure for an online interaction system that can guarantee a reliable and immutable trust score. It proposes a system of smart contracts that specify the logic for interactions and models trust among pseudonymous identities of the system.
    [Show full text]
  • Impossibility of Full Decentralization in Permissionless Blockchains
    Impossibility of Full Decentralization in Permissionless Blockchains Yujin Kwon*, Jian Liuy, Minjeong Kim*, Dawn Songy, Yongdae Kim* *KAIST {dbwls8724,mjkim9394,yongdaek}@kaist.ac.kr yUC Berkeley [email protected],[email protected] ABSTRACT between achieving good decentralization in the consensus protocol Bitcoin uses the proof-of-work (PoW) mechanism where nodes earn and not relying on a TTP exists. rewards in return for the use of their computing resources. Although this incentive system has attracted many participants, power has, CCS CONCEPTS at the same time, been significantly biased towards a few nodes, • Security and privacy → Economics of security and privacy; called mining pools. In addition, poor decentralization appears not Distributed systems security; only in PoW-based coins but also in coins that adopt proof-of-stake (PoS) and delegated proof-of-stake (DPoS) mechanisms. KEYWORDS In this paper, we address the issue of centralization in the consen- Blockchain; Consensus Protocol; Decentralization sus protocol. To this end, we first define ¹m; ε; δº-decentralization as a state satisfying that 1) there are at least m participants running 1 INTRODUCTION a node, and 2) the ratio between the total resource power of nodes Traditional currencies have a centralized structure, and thus there run by the richest and the δ-th percentile participants is less than exist several problems such as a single point of failure and corrup- or equal to 1 + ε. Therefore, when m is sufficiently large, and ε and tion. For example, the global financial crisis in 2008 was aggravated δ are 0, ¹m; ε; δº-decentralization represents full decentralization, by the flawed policies of banks that eventually led to many bank which is an ideal state.
    [Show full text]
  • TITLE PAGE Bitcoin and Stock Markets. Are They Connected? Evidence from Asean Emerging Economies Abdollah Ah Mand*1, Hassanudin
    Bitcoin and Stock Markets: Are They Connected? Evidence from Asean Emerging Economies Abdollah Ah Mand ( [email protected] ) Sunway University Hassanudin Mohd Thas Thaker Sunway University Research Keywords: Cryptocurrencies, bitcoin, stock market, emerging economies Posted Date: May 12th, 2020 DOI: https://doi.org/10.21203/rs.3.rs-25524/v1 License: This work is licensed under a Creative Commons Attribution 4.0 International License. Read Full License TITLE PAGE Bitcoin and Stock Markets. Are they Connected? Evidence from Asean Emerging Economies Abdollah Ah Mand*1, Hassanudin Mohd Thas Thaker2 Email of corresponding author: [email protected] 1,2 Sunway University, Malaysia Abstract Background: Cryptocurrencies, especially Bitcoin, has become popular for investors in recent years. The volatility of bitcoin and time horizon are the center point for investment decisions. However, attention is not often drawn to the relationship between bitcoin and equity indices. This study investigates the volatility and time frequency domain of bitcoin among five Asean countries through a rich database which covers daily data from July 2010 until April 2019. Methods: Advanced econometrics and Wavelets Cross-Coherence Spectrograms, this study investigates the existence of long run association between bitcoin and the studied market indices. M-GARCH analysis is been employed to investigate the unconditional volatility of market indices and Bitcoin. Results: The findings present the long run association with positive (Philippines) and negative (Japan, Korea, Singapore, Hong Kong) relations. Moreover, only one market (KOREA) shows a short run association with bitcoin. The M- GARCH analysis reveals, most of the selected Asean countries have a low unconditional volatility with bitcoin.
    [Show full text]
  • Blockchain-Based Address Alias System
    Article Blockchain-Based Address Alias System Norbert Bodziony , Paweł Jemioło * , Krzysztof Kluza and Marek R. Ogiela AGH University of Science and Technology, Faculty of Electrical Engineering, Automatics, Computer Science and Biomedical Engineering, al. A. Mickiewicza 30, 30-059 Krakow, Poland; [email protected] (N.B.); [email protected] (K.K.); [email protected] (M.R.O.) * Correspondence: [email protected] Abstract: In recent years, blockchains systems have seen massive adoption in retail and enterprise environments. Cryptocurrencies become more widely adopted, and many online businesses have decided to add the most popular ones, like Bitcoin or Ethereum, next to Visa or Mastercard payments. Due to the decentralized nature of blockchain-based systems, there is no possible way to revert confirmed transactions. It may result in losses caused by human error or poor design of the user interface. We created a cryptocurrency wallet with a full on-chain solution for aliasing accounts and tokens to improve user experience and avoid unnecessary errors. The aliasing system consists of a number of smart contracts deployed on top of the blockchain network that give the ability to register aliases to accounts and tokens and use them instead of opaque addresses. Our solution shows how performant modern blockchains are and presents a way of building fully decentralized applications that can compete with centralized ones in terms of performance. Keywords: blockchain; cryptocurrency; wallet; aliasing system; Solana Citation: Bodziony, N.; Jemioło, P.; 1. Introduction Kluza, K.; Ogiela, M.R. Blockchain- Blockchain [1,2] space is one of the most rapidly growing ecosystems right now.
    [Show full text]
  • Popping the Bitcoin Bubble: an Application of Log-Periodic Power Law Modeling to Digital Currency
    Popping the Bitcoin Bubble: An application of log-periodic power law modeling to digital currency Alec MacDonell University of Notre Dame April 1, 2014 Abstract The year 2013 witnessed a remarkable increase in public interest and awareness of digital currencies such as Bitcoin. Hailed by some as the currency of the future, these “cryptocurrencies” have gained notoriety for their use in online black markets, but have yet to gain widespread acceptance. Given their novelty and lack of central regulating authorities, digital currencies experience high volatility and uncertainty regarding value. Taking Bitcoin as a representative example, this paper first uses autoregressive moving average (ARMA) functions to explain trading values, then applies log-periodic power law (LPPL) models in an attempt to predict crashes. The results of ARMA modeling show that Bitcoin values react to the CBOE Volatility Index, suggesting that a primary force currently driving Bitcoin values is speculation by investors looking outside traditional markets. In addition, the LPPL models accurately predict ex-ante the crash that occurred in December 2013, making LPPL models a potentially valuable tool for understanding bubble behavior in digital currencies. *I would like to thank Steven Lugauer for advising me during the research and writing of this paper. His instruction and guidance has been invaluable. Table of Contents 3 Introduction 6 Background 8 Data and ARMA Model Construction 17 Financial Bubbles 20 The LPPL Model 26 Application to December 2013 Bitcoin Crash 29 Conclusions 33 References 2 1 Introduction Traditional instruction in economics teaches that currency takes one of two forms – commodity money or fiat money.
    [Show full text]
  • New Kids on the Blocks: an Analysis of Modern Blockchains
    New kids on the block: an analysis of modern blockchains Luke Anderson∗, Ralph Holz∗, Alexander Ponomarev†, Paul Rimba†, Ingo Weber† ∗University of Sydney, Sydney, Australia †Data61/CSIRO, Sydney, Australia ∗{l.anderson,ralph.holz}@sydney.edu.au †fi[email protected] ABSTRACT a network of untrusted nodes. A majority of these nodes Half a decade after Bitcoin became the first widely used need to act faithfully to the respective blockchain pro- cryptocurrency, blockchains are receiving considerable in- tocol in order to secure the operation of the blockchain terest from industry and the research community. Modern as a whole. blockchains feature services such as name registration and Bitcoin’s asset is the Bitcoin currency (BTC) and the smart contracts. Some employ new forms of consensus, such trusted centralised entity it attempts to replace is the as proof-of-stake instead of proof-of-work. However, these traditional bank. Newer blockchains provide more intri- blockchains are so far relatively poorly investigated, despite cate features, such as Namecoin’s attempt at providing the fact that they move considerable assets. In this paper, we decentralised name registration, or Ethereum’s globally explore three representative, modern blockchains—Ethereum, distributed Ethereum Virtual Machine that allows ex- Namecoin, and Peercoin. Our focus is on the features that ecuting code in the form of so-called smart contracts set them apart from the pure currency use case of Bitcoin. on the Ethereum network. Perceptions of blockchains We investigate the blockchains’ activity in terms of trans- are varied, with opinions ranging from highly sceptical actions and usage patterns, identifying some curiosities in to enthusiastic.
    [Show full text]
  • Disruption in Digital Currency
    FinTech: Disruption in Digital Currency July 23, 2019 © 2019 Winston & Strawn LLP Today’s Webinar Presenters Danielle Williams Basil Godellas Cari Stinebower Partner Partner Partner Charlotte Chicago Washington, D.C. +1 704-350-7790 +1 312-558-7237 +1 202-282-5788 [email protected] [email protected] [email protected] © 2019 Winston & Strawn LLP 2 • More than 2300 crytpocurrencies • Over $290 Billion in market cap • Bitcoin represents more than 50% of the market cap © 2019 Winston & Strawn LLP 3 Cryptocurrency – 2008 to 2019 8/2008 1/2009 5/2010 6/2011 2/2011 2013 2/2014 7/2014 Domain name First Bitcoin Bitcoin used to buy 2 Mount Gox (online Bitcoin criticized First Bitcoin Mount Gox Dell and Newegg bitcoin.org is registered transaction pizzas from Papa Bitcoin exchange) is for Silk Road fork collapses accept Bitcoin John’s raided connection 10/2008 10/2009 8/2010 2/2011 6/2012 10/2013 8/2014 12/2014 the bitcoin designer, New Liberty Bitcoin is Litecoin, Namecoin, Coinbase is First Bitcoin ATM Microsoft accepts BitPay sponsors St. publishes whitepaper, Standard publishes hacked and Swiftcoin launch founded launched in Bitcoin for Xbox Petersburg Bowl “Bitcoin: A peer-to-peer first Bitcoin Vancouver transactions game Electronic Cash System exchange rate 2/2018 1/2014 7/2016 5/2016 7/2017 2017 2018 Lloyds Bank, Halifax, Bank 6/2019 Las Vegas hotels Uber accepts Bidorbuy, a South African Bitcoin forks Skandiabanken Samsung of Scotland, and MBNA Facebook accept Bitcoin Bitcoin in online market, accepts into BTC and recognizes
    [Show full text]
  • Melanie Swan
    Blockchain Blockchain Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. This book takes you beyond the currency (“Blockchain 1.0”) and smart contracts (“Blockchain 2.0”) to demonstrate how the blockchain is in position to become the fifth disruptive computing paradigm after mainframes, PCs, the Internet, and mobile/social networking. Author Melanie Swan, Founder of the Institute for Blockchain Studies, explains that the blockchain is essentially a public ledger with potential as a worldwide, decentralized record for the registration, inventory, and transfer of all assets—not just finances, but property and intangible assets such as votes, software, health data, and ideas. Topics include: ■ Concepts, features, and functionality of Bitcoin and the blockchain ■ Using the blockchain for automated tracking of all digital endeavors ■ Enabling censorship-resistant organizational models ■ Creating a decentralized digital repository to verify identity ■ Possibility of cheaper, more efficient services traditionally provided by nations ■ Blockchain for science: making better use of the data-mining network ■ Personal health record storage, including access to one’s own genomic data ■ Open access academic publishing on the blockchain Melanie Swan founded and participated in new markets startups GroupPurchase This book is part of an ongoing O’Reilly series. Mastering Bitcoin: Unlocking and Prosper, and developed virtual world digital asset valuation and accounting Digital Cryptocurrencies introduces Bitcoin and describes the technology principles for Deloitte. She is an instructor behind Bitcoin and the blockchain. Blockchain: Blueprint for a New at Singularity University and an Affiliate Blockchain Economy considers the theoretical, philosophical, and societal impact of Scholar at the Institute for Ethics and cryptocurrencies and blockchain technologies.
    [Show full text]