Last Updated: September 22, 2023
Bitcoin is a purely digital peer-to-peer electronic cash system that enables online payments without the intervention of any middlemen or trusted third-party. This is achieved by solving the double-spend problem with a cryptographic system of digital signatures.
Bitcoin operates on a blockchain, a public ledger of transactions that is maintained by a network of computers distributed around the world. The network timestamps transactions by hashing them into an ongoing chain of hash-based Proof-of-work, forming a record that cannot be altered without redoing the Proof-of-work chain and becoming the longest chain. The longest chain serves as proof of the sequence of events that have been witnessed by the network. These transactions are verified and recorded by network nodes in a cryptographically verifiable manner. Every time a new block is added to the public ledger, new bitcoins are created through a process called mining.
Every node on the network will always adopt the longest chain of blocks they receive as the “official” version on the blockchain.
If someone wanted to rewrite the history of transactions, they would need to rebuild a longer chain of blocks to create a new longest chain for other nodes to start building on top of. However, this is only possible if that Miner manages to have more computer processing power than the rest of the network combined.
For example, if someone sent you one bitcoin one year ago, the only way to erase that transaction would be to try to rewrite Bitcoin’s history since then, which would require using more energy than Bitcoin used over the entire year since that transaction was first recorded. That would take so long that, by the time it was done, there would likely be another year or more of records to try to catch up with. This process would also be extremely expensive because of the required energy costs. Not only that, but it might be even physically impossible given how much energy that would require.
The idea was originally conceptualized in the Bitcoin whitepaper, written by the pseudonymous author Satoshi Nakamoto in 2008. The whitepaper outlines a vision for a decentralized digital currency that operates independently of traditional financial institutions and provides greater control and privacy to users. In this system, a maximum of 21 million bitcoins can be mined. This ensures that the value of Bitcoin is not subject to inflation or arbitrary decisions made by governments or financial institutions.
The Bitcoin network operates as a Proof of Work (PoW) blockchain, where powerful nodes solve complex mathematical problems and earn newly created bitcoins as a reward for keeping the network secure. Through this algorithm, the nodes participating in the network can achieve consensus and prevent fraudulent transactions without the intervention of any trusted third party.
Bitcoin’s hash rate measures the rate of solving the mathematical problem involved in mining transactions, as well as the difficulty changes that take place as more miners enter the network. When more miners enter the market, the difficulty increases to ensure that the number of bitcoins produced remains the same
Bitcoin, is the name of the protocol, a peer-to-peer network, whereas the bitcoin currency is the first application of this innovative distributed computing technology. In fact, Bitcoin represents the culmination of decades of research in cryptography and distributed systems. The protocol introduced four key innovations:
“As an additional firewall, a new key pair should be used for each transaction to keep them from being linked to a common owner. Some linking is still unavoidable with multi-input transactions, which necessarily reveal that their inputs were owned by the same owner. The risk is that if the owner of a key is revealed, linking could reveal other transactions that belonged to the same owner.” – Satoshi Nakamoto
Bitcoin is a distributed peer-to-peer system where there is no “central server” or point of control. Units of bitcoin are created through a mining process that involves competing against other miners to find solutions to a mathematical problem while processing transactions. Anyone in the network can operate as a Miner in order to verify and record transactions on Bitcoin’s public ledger. On average, regardless of how many miners are participating, every 10 minutes a Miner can validate the transactions that have taken place in the last 10 minutes and, for doing so, will be rewarded with newly created bitcoin. Essentially, this permissionless participation in the mining process ensures that the issuance of new currency units is decentralized.
The Bitcoin protocol includes built-in algorithms that regulate the mining function across the network. This is achieved with a difficulty adjustment mechanism. In order to mine Bitcoin, a Miner must first download and run Bitcoin mining software on their computer or specialized mining hardware called ASICs. This software/hardware is then used to solve complex mathematical problems known as “hashes.” These hashes involve taking a block of Bitcoin transactions and creating a unique digital fingerprint, known as a hash, that meets certain criteria.
The hash must start with a certain number of zeros to be considered valid. This makes the process of mining more difficult and competitive, while also ensuring that new blocks are created at a predictable rate.
The requirement for a hash to start with a certain number of zeros also means that miners must keep trying different combinations of transactions and nonces until they find a hash that meets the criteria. Since this process involves trial and error, it is essentially a random process that requires a significant amount of computational power.
When a Miner successfully solves a hash, they broadcast it to the network, and the other nodes on the network verify that the solution is correct. Once the solution is verified, the Miner is rewarded with a certain amount of bitcoins in addition to transaction fees.
In order for a Bitcoin block to be considered valid, its hash must be below a certain target value. This target value is set by the Bitcoin network and is adjusted regularly to maintain an average block creation time of around 10 minutes.
The difficulty of solving these hashes is adjusted regularly in order to maintain a consistent rate of block creation, which is currently around 10 minutes per block. The difficulty adjustment is based on the total computing power of the network, known as the hash rate. If the hash rate increases, the difficulty of the problems increases, and if the hash rate decreases, the difficulty decreases. This ensures that blocks are created at a consistent rate, regardless of the total computing power of the network.
If the difficulty of the hash were too low, blocks would be created too quickly, which could lead to inflation and other issues. On the other hand, if the difficulty were too high, the mining process would become prohibitively difficult, making it difficult for new miners to enter the market.
The invention of Bitcoin is also a practical solution to a problem in distributed computing, known as the “Byzantine Generals’ Problem.”
The game theory analogy to the Byzantine Generals’ Problem is that several generals have surrounded Byzantium and they must coordinate and reach a collective decision of when to attack. If all generals attack at the same time, they will win, but if they attack at different times, they will lose. However, the generals have no secure communication channels with one another. Any messages they attempt to send or receive may end up being intercepted.
Only decentralized systems face the Byzantine Generals problem, as they have no reliable source of information as well as no way to verify the information they receive from other members of the network.
This is not the case in centralized systems, where an authority is trusted to publish true information and prevent false or fraudulent information from being spread throughout the network.
For example, in the traditional financial system, banks are trusted to show clients their balances and transaction histories in an honest manner. If a bank attempted to lie or defraud their customers, a central bank or government would then be trusted to rectify such breach of trust. However, centralized systems don’t solve the Byzantine Generals problem, since truth cannot be achieved in a trustless manner. Instead, centralized solutions make the tradeoff of sacrificing trustlessness for efficiency and choose to overlook the underlying problem.
In the context of money, the Byzantine Generals Problem can be related to the problem of achieving consensus in a distributed network like the Bitcoin network. In a decentralized system like Bitcoin, all nodes need to agree on the current state of the network, including which transactions are valid and which blocks have been added to the blockchain.
However, in a decentralized network, there may be some nodes that are not trustworthy or may behave in a malicious manner, just like the traitorous generals in the Byzantine Generals Problem. These nodes could attempt to send conflicting or invalid information to other nodes, disrupting the network and potentially causing problems like double-spending.
Bitcoin solves this problem by forcing nodes to keep all the transactions they receive in memory before writing them to a file. Next, following a series of 10-minute intervals, a random node on the network will add the transactions from their memory on to the file.
This updated file is then shared with the network, and the rest of the nodes will be able to accept the transactions in the updated file as “correct”, removing any conflicting transactions from their memory. This way, no double-spend transactions will ever be written to the file, and all nodes will be able to update their files in agreement with each other.
To add new blocks to the blockchain, the Bitcoin network uses a PoW consensus mechanism that requires nodes in the network to perform computationally intensive calculations. This ensures that all nodes in the network are incentivized to act in the best interest of the network, which prevents malicious nodes from dominating the network.
The double-spend problem is a potential issue in digital currency systems, including Bitcoin, where a user attempts to spend the same digital currency more than once.
“When there are multiple double-spent versions of the same transaction, one and only one will become valid.” – Satoshi Nakamoto
Digital objects, like computer files, are easy to duplicate. While this makes digital devices very simple and useful for the average user, costless duplication is not a desirable trait in money. For instance, it would not be desirable to have a monetary system that allowed anyone to duplicate their money at will.
In traditional paper currency or physical cash transactions, double-spending is not a problem. The reason for that is because once a physical currency is handed over, the recipient has the physical money, and the giver cannot spend it again. However, in digital currency systems, it is possible for a user to create a digital copy of their currency and attempt to spend the same currency multiple times.
No single part of Bitcoin can be removed without destroying the whole. Without the blockchain, there wouldn’t be a decentralized way to check for double-spending. Without the Block Reward halving, the bitcoin supply would expand indefinitely. Without the difficulty adjustment, the mining algorithm wouldn’t have cryptanalytic stability, making it trivial for miners to produce bitcoin more quickly.
To prevent double-spending in Bitcoin, the network uses a distributed ledger, which is the blockchain. When a transaction is initiated, it is broadcasted to all nodes on the network, and miners work to validate and add the transaction to the ledger. Once a transaction is added to the blockchain, it is considered confirmed, and the currency units associated with the transaction are no longer available for spending. If the user attempts to spend the same bitcoin again, the network will reject the transaction, because the transaction’s input has already been spent and recorded on the blockchain. In other words, the blockchain serves as a record of all past transactions, making it impossible to double-spend the same Bitcoin.
While the blockchain is effective in preventing double-spending, it is still possible for a user to attempt to double-spend in a so-called “51% attack,” where a malicious node or group of nodes control more than 51% of the network’s computing power. This gives them the ability to modify the blockchain’s history and double-spend. However, this type of attack is incredibly difficult and costly to execute. For that reason, this is generally not considered a significant risk to the Bitcoin network.
The supply of bitcoin is determined by a low and deterministic inflation rate that trends towards zero over time. This is achieved via an encoded mechanism that halves Bitcoin’s mining rewards roughly every 4 years.
When Bitcoin first launched, the Block Reward was 50 BTC per block. However, the protocol is designed to cut the Block Reward in half every 210,000 blocks, which occurs approximately every four years. This way, after 34 halvings, the total supply of bitcoin will cease growing and rest at just below 21 million BTC.
The last new bitcoin will be mined sometime around the year 2140.
Bitcoin operates using a distributed ledger, the blockchain. The blockchain is a public ledger that records all Bitcoin transactions in chronological order and that is maintained by a network of nodes that validate and confirm transactions.
Once a transaction is confirmed and added to the blockchain, it is considered final and cannot be reversed or altered. This provides a high degree of security and transparency, as all Bitcoin transactions are publicly visible on the blockchain and can be traced back to their origin.
The Bitcoin blockchain is a decentralized, public ledger that records all transactions ever made on the Bitcoin network. It is maintained by a network of computers that run the Bitcoin software and validate transactions by solving complex mathematical puzzles.
Each block in the blockchain contains a record of several transactions that have been verified by the network. Once a block is added to the chain, it cannot be modified or deleted. This means that the entire history of transactions on the Bitcoin network is stored permanently and publicly, making it transparent and immutable.
The blockchain acts as a data structure that can be saved as a flat file or database. It is made up of a series of blocks that are linked together using cryptographic hashes. Each block contains a hash (generated using SHA256) of the previous block (known as the parent block), along with a timestamp and a set of transactions.
The hash of each block is unique, and changing any part of a block would require changing the hash of that block as well as all subsequent blocks. This makes it extremely difficult to modify or tamper with the blockchain.
Although a block has just one parent, it can temporarily have multiple children. Each of the children refers to the same block as its parent and contains the same (parent) hash in the “previous block hash” field. Multiple children arise during a blockchain “fork”. This describes a temporary situation that occurs when different blocks are discovered almost simultaneously by different miners. Eventually, only one child block becomes part of the blockchain and the “fork” is resolved (the longest chain wins).
Even though a block may have more than one child, each block can have only one parent. This is because a block has one single “previous block hash” field referencing its single parent.
A block is a data structure that aggregates transactions for inclusion in the public ledger. Blocks are made up of a header (containing metadata), followed by a long list of transactions that make up the bulk of its size. The block header is up to 80 bytes in size, while the average transaction is 400 bytes and the average block contains more than 1,900 transactions.
Blocks are mainly identified by either the block hash or the block height.
The term current block height is also used to indicate the size of the blockchain in blocks at any given time.
The block header consists of 3 sets of block metadata:
Transactions are the most important part of the Bitcoin system. Everything else is designed to ensure that transactions can be created, propagated, validated, and finally added to the global ledger of transactions (the blockchain).
Bitcoin transactions tell the network that the owner of some bitcoin value has authorized the transfer of that value to another owner. The new owner can now spend the bitcoin by creating another transaction that authorizes the transfer to another owner, and so on, in a chain of ownership.
In Bitcoin, a transaction input is a reference to a previous unspent output (UTXO) that a user wants to spend. In other words, the input of a transaction is the source of the funds that the user wants to use in the transaction. To spend those funds, the user must provide a valid digital signature that proves they are the rightful owner of the UTXO (Unspent transaction output).
“A block header with no transactions would be about 80 bytes. If we suppose blocks are generated every 10 minutes, 80 bytes * 6 * 24 * 365 = 4.2MB per year. With computer systems typically selling with 2GB of RAM as of 2008, and Moore’s Law predicting current growth of 1.2GB per year, storage should not be a problem even if the block headers must be kept in memory.” – Satoshi Nakamoto
One analogy for thinking about blockchains is that they are a storage facility for safe deposit boxes. These deposit boxes are called outputs, which are just containers that hold various amounts of bitcoin. When you make a Bitcoin transaction, you are selecting some outputs and unlocking them, then creating new outputs and putting new locks on them.
Following this analogy, when you are sending bitcoins to someone, you are actually placing an amount of bitcoins into a new safe deposit box, and putting a lock on it so that only the person that you are sending the bitcoins to can unlock it.
When a transaction is created, it typically has one or more inputs and one or more outputs. Each output specifies the destination address and the amount of bitcoins to be sent to that address. The total value of the inputs must be equal to or greater than the total value of the outputs, otherwise, the transaction will be rejected by the network.
“Bitcoin addresses you generate are kept forever. A Bitcoin address must be kept to show ownership of anything sent to it. If you were able to delete a Bitcoin address and someone sent to it, the money would be lost. They’re only about 500 bytes.” – Satoshi Nakamoto
When the transaction is broadcast to the network, it is validated and confirmed by miners who add it to the blockchain. Once confirmed, the transaction outputs become new UTXOs that can be used as inputs in future transactions.
In some cases, a transaction may include an output that references both an address of the new owner and the address of the current owner. This is typically done for two reasons:
If you spend $5 in a store but use a $20 bill to pay for the item, you expect to receive $15 in change. The same concept applies to bitcoin transaction inputs. If you purchased an item that costs 5 bitcoin but only had a 20 bitcoin input to use, your wallet would create a single transaction that sends two outputs, one output of 5 bitcoin to the store owner and one output of 15 bitcoin back to yourself as change (less any applicable transaction fee).
The change address does not have to be the same address as that of the input and for privacy reasons is often a new address from the owner’s wallet.
Finally, when a transaction gets mined on to the blockchain, the outputs that were used up (spent) cannot be used in another transactions, and the newly created outputs will be available to be moved on in a future transaction.
The most common form of a transaction is a simple payment from one address to another, which often includes some “change” returned to the original owner. This type of transaction has one input and two outputs.
This represents the real-world equivalent of exchanging a pile of coins and currency notes for a single larger note.
Another common form of transaction is a batched transaction that distributes one input to multiple outputs. This is helpful for saving transaction funds or distributing funds to multiple recipients.
Each block in the blockchain contains a summary of all transactions in the block in a data structure called merkle tree, which serves the purpose of verifying and summarizing the integrity of large data sets with a series of cryptographic hashes.
A Merkle tree is a data structure in which each leaf node represents a single piece of data, in this case, a transaction. The non-leaf nodes represent a hash of the data in their child nodes. The root of the tree, also known as the Merkle root, is a hash of the hash values of all the transactions in the block.
By including the Merkle root in the block header, Bitcoin nodes can efficiently verify that a transaction is included in a block without having to download and validate all the transactions in the block. This is known as a Merkle proof. The Merkle proof only requires the branch of the Merkle tree that contains the transaction, the Merkle root of the block, and the intermediate hashes on the path from the transaction to the Merkle root.
In Bitcoin, it is common to have several hundreds to more than a thousand transactions in a single block, which are summarized by producing just 32 bytes of data as the single merkle root.
To prove that a specific transaction is included in a block, a node only needs to produce log~2~(N) 32-byte hashes, constituting an authentication path or merkle path that connects the specific transaction to the root of the tree.
This is especially important as the number of transactions increases, because the base-2 logarithm of the number of transactions increases much more slowly.
Bitcoin mining is the process of adding new transactions to the Bitcoin blockchain by solving complex mathematical equations. Miners compete to solve these equations, and the first Miner to solve the equation and validate the transaction is rewarded with a certain amount of new bitcoins.
The purpose of mining is not the creation of new bitcoin. That’s the incentive system. Mining is the mechanism by which bitcoin’s security is decentralized.
The mathematical equations that miners solve are called “hashes”, and they are created by taking the transaction data and running it through a cryptographic algorithm called SHA-256. Miners do this using specialized computer hardware known as Application-Specific Integrated Circuits (ASICs) that allow them to perform these calculations at a high speed.
In other words, PoW is the bridge between the digital & the physical.
When a Miner successfully solves a hash, they create a new block of transactions and add it to the existing blockchain. This block is then verified by other nodes on the network, and if it is found to be valid, it is added to the blockchain and the Miner is rewarded with a certain number of new bitcoins as well as any transaction fees associated with the transactions in the block.
Under the hood, PoW mining converts kinetic energy (electricity) into a ledger block. A mining machine repeatedly performs hash operations until it solves a cryptographic puzzle. All hash operations are thrown away except for the one hash that solves it. This one hash, which itself takes very little energy to compute, is a direct representation of the huge ball of energy that was required to produce it. This is the “proof” that the block was minted. In order to rewrite the block, an attacker later would be forced to spend a roughly equivalent number of hash operations as all the hash operations that were originally required.
Satoshi realized that the only real-world asset that can be linked to a computer system in a trustless manner is energy. Everything else, whether it is gold, paper certificates, real estate… introduces a trusted third party because of the inherent disconnect between the digital and the physical world.
Proof of Work is an attempt to solve the Oracle problem. By using energy and physics as the base truth, there is no need to make sure that digital and the real-world physical representation of assets remains up-to-date and in sync.
Reverting takes an equivalent number of hash operations, not an equivalent amount of energy. That is because the hash is only a representation of the energy used, not the energy itself. Over time, this representation of energy becomes less & less accurate — as improved hardware becomes more efficient.
The mining process is designed to be difficult and resource-intensive in order to prevent fraudulent activity and ensure the security of the Bitcoin network. The difficulty of the mining process is adjusted regularly by the network to ensure that blocks are added to the blockchain at a consistent rate of approximately one every 10 minutes.
Miners are responsible for validating transactions and including them on the global ledger. On average, a new block is validated every 10 minutes. When these transactions become part of a block that has been added to the blockchain, they are said to be “confirmed”.
However, since different nodes may have different versions of the blockchain, it’s possible for multiple blocks to be mined simultaneously, each containing a different set of transactions. In this case, the network follows the longest chain, which is the chain containing the most Proof of Work.
The number of confirmations a transaction has refers to the number of blocks added to the blockchain after the block containing that transaction. Each additional block added to the chain after the transaction increases the level of security and decreases the risk of a transaction being reversed or double-spent.
In general, six confirmations are considered sufficient to ensure that a transaction is final and irreversible, although some merchants and exchanges may require more or less depending on their risk tolerance.
The transaction pool or mempool is a collection of unconfirmed Bitcoin transactions that have been broadcast to the network and that are waiting to be included in a block by a Miner.
When a Bitcoin transaction is created and broadcast to the network, it is relayed between nodes until it reaches a Miner who will include it in a block. Before the transaction can be included in a block by a Miner, it needs to be validated to ensure that it follows the rules of consensus. When this happens, the Miner can include it in the next block it mines. However, if the transaction is invalid (insufficient fees, double-spend…), the Miner will reject the transaction and it will remain in the mempool until it is either updated and rebroadcasted, or eventually dropped.
Since the size of each block is limited, not all transactions can be included in the next block. Therefore, transactions that pay higher fees are more likely to be included in the next block, as miners have an incentive to prioritize transactions that offer a higher fee per byte. This competition for block space can lead to temporary spikes in transaction fees during times of high network usage.
Bitcoin Core is the open-source software that powers the Bitcoin network. It is maintained by a group of developers and is designed to be a Full Node implementation of the Bitcoin protocol, meaning that it stores a full copy of the blockchain and can independently verify all transactions on the network.
Rather than a focal point of command and control for the development of Bitcoin, the Bitcoin core repository is the technical communication platform.
From an adversarial perspective, GitHub can not be trusted. Any number of GitHub employees could use their administrative privileges to inject code into the repository without consent from the maintainers. However, Bitcoin Core has a continuous integration system that performs checks of trusted PGP keys that must sign every merge commit. This makes it unlikely that a GitHub attacker would also be able to compromise the PGP key of a Bitcoin Core maintainer.
All upgrades proposed by Bitcoin Core developers are peer-reviewed to ensure that they conform with the ethos of Bitcoin and are free of bugs. Once these requests are reviewed, maintainers implement them on the Bitcoin Core repository.
There are no barriers to entry and anyone can become a Bitcoin Core contributor. Anyone can get started by offering code, reviews of code, or other types of contributions such as text translations.
Contrary to Ethereum, Bitcoin did not raise a crowdsale. Its infrastructure and open source software signals that the protocol should be neutral and that its development should be entirely financed by for-profit or government entities.
While the core developers of Bitcoin are volunteers, there are also companies and organizations that support Bitcoin development financially. These companies and organizations may donate funds to support specific development initiatives, provide funding for conferences and events, or offer other forms of support to the development community.
When the Bitcoin Foundation launched, a grants program funded developers based on an annual budget during 2012 and 2014.
In 2014, some of the Bitcoin developers founded a venture-backed for-profit company called Blockstream, whose developers and employees made significant contributions to Bitcoin’s open source code. In that same year, Chaincode Labs was co-founded by Alex Morcos and Suhas Daftuar as a non-profit Bitcoin research and development center. MIT’s DCI (Digital Currency Initiative) also was a significant contributor.
Moving forward to 2019, the diversity of funding sources improved significantly, with businesses and centralized exchanges starting to be more active.
Some of the companies and organizations that have provided financial support for Bitcoin development include the Bitcoin Foundation, Blockstream, Chaincode Labs, Bitmain, the Human Rights Foundation (HRF) and many others. For instance, Brink was founded in 2020 with the goal of supporting Bitcoin protocol development and the organization runs a year-long fellowship program as well as a developer grant problem. Since then, it has joined Chaincode and the MIT DCI as the major funders.
These organizations may have a vested interest in the success of Bitcoin and its ecosystem. For them, providing financial support for development is seen as a way to contribute to the growth and sustainability of the project.
Assuming 1,000 developers receiving Google’s average $150,000 to $200,000 annual compensation, about $150M to $200M would be required every year to fund development in the entire Bitcoin ecosystem.
According to a report by New York Digital Investment Group (NYDG), a Bitcoin-focused investment firm, the ongoing maintenance work is being carried out by roughly 40 to 60 active developers every month.
The majority of development work is focused on maintenance and small bug fixes, rather than software upgrades such as Taproot, which are more infrequent but resource-heavy.
With an estimated cost of $200M per year to keep Bitcoin’s code maintained and functioning, the community is worried that the future of Bitcoin’s development is excessively reliant on donations.
Public Key cryptography is a key component of the Bitcoin protocol. It allows users to securely send and receive bitcoins without the need for a trusted third party.
In the context of Bitcoin, each user has a Public Key and a Private Key. The Public Key is a unique identifier that is publicly known and can be used to receive bitcoins, while the Private Key is a secret that is known only to the owner and is used to sign transactions that spend those bitcoins.
Every wallet contains a set of key pairs, where each key pair consists of a Private Key and a Public Key.
In ECC, a Private Key is a randomly chosen number, and a Public Key is derived from it using mathematical operations on an elliptic curve. To generate a Bitcoin Public Key from a Private Key, the Private Key is first multiplied by a fixed point on the elliptic curve. The resulting point on the curve is the Public Key, which is a pair of x and y coordinates. These coordinates are used to create a Bitcoin address through a one-way cryptographic hash function.
The strength of ECC comes from the fact that it is difficult to compute the Private Key from the Public Key, making it very secure. In fact, the security of Bitcoin relies on the fact that it is practically impossible to compute the Private Key from the Public Key.
Once the Public Key is generated, a one-way cryptographic hash function is applied to it, resulting in a unique Bitcoin address that is associated with that Public Key.
To derive a Bitcoin address from a Public Key in Bitcoin’s elliptic curve cryptography system, the following steps are taken:
When a user sends bitcoins to another user, they create a transaction that specifies the amount to be sent and the Public Key of the recipient. This transaction is then signed with the sender’s Private Key, which proves that they are the rightful owner of the bitcoins being spent.
Next, the transaction is broadcasted to the Bitcoin network, where it is verified by other nodes and miners. The recipient can then use their Private Key to unlock the bitcoins and spend them as they see fit.
“SHA-256 is very strong. It’s not like the incremental step from MD5 to SHA1. It can last several decades unless there’s some massive breakthrough attack.” – Satoshi Nakamoto
When two parts of the network are following different branches of the blockchain for a short period of time, the blockchain is experiencing a soft fork. This is a natural process that will self-correct when the network reconverges to a common blockchain after which subsequent blocks will be mined.
However, there is another scenario in which blockchains can diverge into two different chains. This is the result of upgrades or changes in the consensus rules of the blockchain and that result in a hard fork where the network does not reconverge onto a single chain.
Hard forks can be used to change the rules of consensus, but they require coordination between all participants in the system. Any nodes that do not upgrade to the new consensus rules are unable to participate in the consensus mechanism and are forced onto a separate chain at the moment of the hard fork.
For software developers, the term “fork” has a different meaning. This occurs when a group of developers choose to follow a different software roadmap and start working on a competing implementation of an open source project.
While a software fork is a necessary precondition, it is not in itself sufficient for a hard fork to occur. For a hard fork to occur, the competing implementation must be adopted and the new rules activated, by miners, wallets, and intermediary nodes.
The Bitcoin forks of 2017 were a result of a disagreement among the Bitcoin community about how to scale the Bitcoin network. At the time, the Bitcoin network was experiencing congestion and slow transaction processing times due to a limit on the size of each block in the blockchain. This block size limit had been set at 1 MB since the early days of Bitcoin.
Satoshi Nakamoto never publicly specified why he added a block size limit to the Bitcoin protocol. It has been speculated that he intended it to be an anti-spam measure, to prevent an attacker from overloading the Bitcoin network with artificially large Bitcoin blocks full of bogus transactions. Some have also speculated that he intended for it to be a temporary measure, but it is unclear how temporary or under what conditions he foresaw the block size limit being increased or lifted. The code itself that enforces the block size limit certainly wasn’t temporary.
Some members of the Bitcoin community believed that the block size limit should be increased in order to allow more transactions to be processed per block and to alleviate congestion on the network. However, others believed that increasing the block size would result in centralization of the network, as only the largest and most powerful miners would be able to process the larger blocks.
This disagreement led to a split in the Bitcoin community, with two factions emerging: those who supported increasing the block size, known as Bitcoin Cash (BCH), and those who did not, known as Bitcoin Core (BTC).
In May 2015, Gavin Andressen and Mike Hearn suggested raising the block size limit to 20 MB, which marked the initial effort to increase the limit. However, after consulting with miners, they decided to lower the proposed limit to 8 MB. This was because allowing block sizes larger than 1 MB would have given significant benefits to the largest Chinese miners and pools. It’s worth noting that subsequent improvements were implemented, making the use of 8 MB block sizes secure.
In 2016, during the Hong Kong roundtable consensus, a roadmap was established, which involved implementing SegWit (See section on SegWit) first and then increasing the block size by 2 MB later. However, some individuals believed that the agreement was null and void only a few days after it had been reached. The situation became a protracted stalemate due to Bitcoin Core’s refusal to support a block size increase and miners’ refusal to implement SegWit without being guaranteed a block size increase.
Supports of the small-blocks camp, being upset that the miners did not activate SegWit, proposed the User Activated Soft Fork strategy (USAF), a mechanism in which the activation time of a blockchain soft fork is enforced by the full nodes, which are commonly referred to as economic majority. If someone were to activate the USAF feature in their Bitcoin Core, they would disregard blocks from miners who do not support SegWit. In the event that less than half of the miners were to support UASF, the network would divide into two separate networks: a UASF network and a non-UASF network that would have different perspectives on the history of transactions.
Jeff Garzik and a group of individuals proposed the SegWit2X compromise due to the protracted stalemate and the looming threat of the upcoming UASF catastrophe. Essentially, the SegWit2X compromise was a revival of the Hong Kong roundtable agreement. As a backup plan in case the UASF disaster materialized or the SegWit2X initiative failed for any other reason, the BitcoinABC project was created. However, surprisingly, it split off as a new cryptocurrency called “Bitcoin Cash” on August 1st.
On August 1, 2017, a group of Bitcoin users and miners implemented a hard fork of the Bitcoin blockchain, creating a new cryptocurrency called Bitcoin Cash. The main difference between Bitcoin Cash and Bitcoin was the larger block size limit of 8 MB for Bitcoin Cash, which allowed for faster and cheaper transactions.
A Bitcoin sidechain is an independent blockchain that can securely transfer bitcoins internal and from/to the Bitcoin network without the need to support its own native token.
The first concept of a sidechain was published in an academic paper in 2014 by Adam Back, the inventor of HashCash and current CEO of Blockstream. In this paper, the authors noted that Bitcoin’s infrastructure was facing trade-offs between decentralization and scalability. As a solution, the paper proposed a new technology, pegged sidechains. This would enable bitcoins and other assets to be transferred between multiple blockchains.
Sidechains are separate networks that connect to another blockchain called the parent blockchain or mainnet. These secondary blockchains have their own consensus protocols as well as the ability to transfer assets to and from the parent chain. To facilitate the back and forth transfer of assets, a two-way peg is required (a tunnel that goes in both directions). Through this mechanism, the assets are not actually transferred. Instead, the assets are locked on the parent chain while the equivalent amount is unlocked in the sidechain.
A series of Smart Contracts are responsible for making sure that the assets are locked and released in a non-fraudulent mainnet. Once a transaction has occurred, a smart contract will notify the parent chain about the event. After that, an off-chain process will relay the transaction information to a smart contract on the sidechain to verify the transaction.
Since they are independent blockchains, sidechains are responsible for maintaining their own security. That is, a sidechain’s security is not derived from the blockchain it is connected to.
Bitcoin sidechains require their own set of miners as well. A large pool of diverse miners is critical for the security and decentralization of their system. However, growing a new mining ecosystem is not trivial, since miners have no incentive whatsoever to start participating on a new chain when they have access to more lucrative opportunities by mining on other chains.
Bitcoin NFTs (Non-Fungible Tokens), are a type of token on the Bitcoin blockchain that represent unique digital assets. These tokens are distinct from regular bitcoin (BTC) and are used to represent one-of-a-kind items such as digital art, collectibles, and even virtual real estate.
Although bitcoins are fungible, they can be marked to be distinguished from other bitcoins.
Unlike regular bitcoin, which is fungible and interchangeable, each bitcoin NFT is unique and can hold significant value depending on the rarity and demand of the underlying asset it represents. NFTs on the Bitcoin blockchain are typically created using protocols such as Counterparty or Omni, which enable the creation of custom tokens with unique properties and features. While the use of Bitcoin for NFTs is less popular than other blockchains like Ethereum, the network still provides a secure and established infrastructure for creating and trading NFTs.
The first NFT collection ever released on Bitcoin was “Rare Pepes”.
One popular open-source protocol built on Bitcoin and that allowed users to represent and manipulate immutable digital assets on top of Bitcoin transactions was Colored Coins. This represented the first stop towards the adoption of NFTs built on top of the Bitcoin network. By using a small amount of Bitcoin as a marker, users could “color” it to represent a specific asset, such as a stock, bond, commodity, or even a real-world asset like a house or a car. This process allowed users to transfer ownership of the underlying asset using Bitcoin’s secure and decentralized network.
A recent example of Bitcoin programmability on Bitcoin is the Bitcoin Ordinals protocol. Through Ordinals, sats are assigned a number in the order they are mined, allowing for exact tracking and verification. Even if a sat moves to a different wallet, its ordinal number stays the same.
Sats, or Satoshis, are the smallest unit of account for bitcoin. A satoshi represents a hundred-millionth of a bitcoin; that is 0.00000001 BTC.
NFTs can also be built on Stacks, which is a Bitcoin layer that brings Smart Contracts and decentralized applications to the Bitcoin network. Stacks uses a Proof-of-Transfer (PoX) consensus mechanism that connects Stack’s blocks with Bticoin’s blocks by reusing its PoW mechanism. This ensures that every block’s history is resolved and secured by Bitcoin. NFTs powered by Stacks are written in Clarity – the protocol’s novel smart contract language.
The idea of digital cash has a long and rich history. Most notably, a collective known as the cypherpunks wrote at length about digital anonymous cash, how such systems might be realized, and the societal implications of strong cryptography in general. Satoshi Nakamoto published the bitcoin whitepaper on October 31 2008, created the bitcoin genesis block on January 4 2009, and released the bitcoin code on January 8 2009.
Up to this day, the identity of the original creator of Bitcoin has not been revealed. The whitepaper and other early writings by Nakamoto suggest that Bitcoin was created in response to a need for a decentralized, trustless digital currency that could operate without the need for a central authority, such as a government or financial institution.
Bitcoin was created in the context of a growing interest in cryptography, decentralized systems, and digital currencies in the early 2000s. There had been earlier attempts to create digital currencies, such as e-gold and Liberty Reserve, but these systems were centralized and subject to government regulation and intervention.
The development of Bitcoin can also be seen as a response to the 2008 financial crisis, which caused widespread distrust of traditional financial institutions and a growing interest in alternative financial systems. The financial crisis highlighted the fragility of centralized financial systems and the potential for corruption and manipulation. As a result, the idea of a digital currency that could provide greater security, privacy, and control to users was appealing to many people.
“If you don’t believe it or don’t get it, I don’t have the time to try to convince you” – Satoshi Nakamoto
Bitcoin was invented in 2008 with the publication of the whitepaper, titled “Bitcoin: A Peer-to-Peer Electronic Cash System“. Nakamoto’s writings suggest that Bitcoin was intended to address some of the challenges of existing digital currency systems, such as the risk of double-spending and the potential for centralization. By creating a decentralized, trustless system based on cryptography and Proof-of-work, Bitcoin offered a new approach to digital currency that was resistant to fraud and manipulation.
In his writings, Nakamoto acknowledged the work of several researchers and projects that had influenced his thinking about digital currencies and decentralized systems, such as Wei DAI’s b-money, Adam Back’s Hashcash, or Nick Szabo’s bit gold.
Satoshi had been actively involved in the development of Bitcoin from its inception in 2008 until early 2011, during which time he communicated frequently with the Bitcoin community and worked on improving the Bitcoin protocol.
In April 2011, the pseudonymous creator of Bitcoin, disappeared from the public eye. Satoshi sent an email to one of the Bitcoin core developers, saying that he had “moved on to other things” and that Bitcoin was in good hands with the community. He subsequently stopped posting on forums and communicating with the community, and his true identity and whereabouts remain unknown.
Since then, there have been many theories and rumors about Satoshi’s true identity and why he disappeared. Some speculate that he wanted to maintain his anonymity, while others believe that he may have been pressured by legal or government entities to step away from the project.
Despite his disappearance, Satoshi’s contributions to the development of Bitcoin and the broader cryptocurrency industry are widely recognized, and his ideas and innovations continue to shape the direction of the industry today.
By building Bitcoin, Satoshi was able to build upon technologies and protocols that were invented more than 50 years ago. While 50 years might be a long time in technology, the art of cryptography is way more ancient than that, dating back as far as 1900.
“The root problem with conventional currency is all the trust that is required to make it work. The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust” – Satoshi Nakamoto
In his famous article, “On the Origins of Money“, Carl Menger explains that the origin of money is not through social or legal means, but rather it emerges naturally through the market. Menger argues that money is not created by the state or any other authority, but rather it is a result of the spontaneous interactions of individuals in the market.
He further explains that money emerged as a result of individuals seeking to trade their goods and services for other goods and services, but found it difficult to find others who have what they need and need what they have. Therefore, they eventually started to trade their goods and services for an intermediary commodity that was widely accepted and could easily be traded for any other good or service. This intermediary commodity eventually became money and was widely accepted in trade.
According to this theory, Menger states that money is not created by the state or any other authority, but rather it emerges naturally as a result of market interactions, and its value is derived from its usefulness in facilitating trade.
David Chaum was a computer scientist and cryptographer whose inspiration for Satoshi came from his paper titled “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms“. This piece is considered to be a groundbreaking work in the field of cryptography and electronic privacy, and laid the foundation for the development of anonymous communication technologies such as Tor and cryptocurrencies like Bitcoin.
The paper introduces the concept of a digital signature, which allows the sender to encrypt a message and authenticate their identity, without revealing their actual identity to the recipient or anyone else. This would be possible with a system that could anonymize messages by routing them through a series of servers in a random order. The paper also discusses the concept of digital pseudonyms, which allow individuals to maintain multiple, anonymous identities online.
David Chaum came up with the idea of eCash in 1982, when he suggested the idea of using digital signatures to prove ownership, a principle that is still used in Bitcoin today.
DigiCash was an electronic payment system created by David Chaum in the early 1990s. The system was based on a technology called “blind signatures,” which allowed for secure and anonymous transactions.
This was one of the earliest attempts at creating a digital currency that allowed people to make payments online without having to reveal their identities or financial information. Digicash used digital tokens called “eCash,” which were similar to physical cash in that they could be transferred between parties without the need for a financial institution to facilitate the transaction.
While eCash was cryptographically and technologically interesting, it wasn’t a monetary innovation and ultimately failed because it was operated by a centralized entity: DigiCash Inc., the company founded by Chaum. DigiCash ultimately failed due to a lack of adoption and investment, but it paved the way for the development of other digital currencies, including Bitcoin. After three operational years, the company ended up going bankrupt.
The controversy surrounding the U.S. government’s stance on encryption began in the early 1990s when encryption technology started to become widely available to the public. At that time, the U.S. government viewed encryption as a threat to national security because it could be used by criminals and terrorists to hide their communications. As a result, the government tried to limit the use and development of encryption technology.
One of the most significant legal battles over encryption occurred in the 1990s when the government attempted to restrict the export of encryption software. This effort was challenged by a number of individuals and organizations, including Phil Zimmermann, the creator of the popular encryption software PGP.
Zimmermann decided to create PGP to make strong encryption accessible to everyone, with the hope that it would lead to a world where privacy is respected and protected.
For Zimmermann, the motivation for creating PGP was the importance of privacy and how it is threatened by government surveillance and censorship. Before PGP, online privacy was largely inaccessible to the general public due to the high cost and technical expertise required.
In the years that followed the invention of PGP, the U.S. government continued to push for restrictions on encryption technology, but these efforts were met with increasing resistance from the tech industry and civil liberties advocates. The debate came to a head in the aftermath of the September 11th terrorist attacks, when the government again sought to limit the use and development of encryption technology.
In recent years, there has been a growing recognition of the importance of strong encryption for protecting individual privacy and securing online communications. However, there continue to be debates over issues such as encryption backdoors, which would allow law enforcement agencies to access encrypted communications in certain circumstances. These debates highlight the ongoing tension between national security concerns and individual privacy rights.
It is not entirely clear if Satoshi Nakamoto was directly influenced by cypherpunks, but the cypherpunk movement and their ideas about privacy, cryptography, and decentralized systems were certainly influential in the broader context of the development of cryptocurrencies.
The word cypherpunk comes from the words cypher and cyberpunk (a genre of science fiction set in a lawless subculture of an oppressive society dominated by computer technology). The word is used to refer to activists that promote the wide use of strong crypto and privacy-enhancing technologies as a route to social and political change. The roots of the word are traced back to the works of David Chaum on anonymous digital cash and pseudonymous reputation systems.
Satoshi’s whitepaper on Bitcoin cited the need for a decentralized digital currency that could function without a central authority, and this idea of decentralization is a core principle of the cypherpunk movement. The use of cryptographic techniques to secure transactions and ensure privacy is also a key component of both cypherpunk philosophy and the Bitcoin protocol.
It is also worth noting that many early Bitcoin developers and supporters were themselves cypherpunks, and they brought their ideas and expertise to the development of the cryptocurrency. For example, Hal Finney, who was one of the first people to receive a Bitcoin transaction from Satoshi, was an active cypherpunk and a developer of various cryptographic systems.
After forming the group in 1992, Eric Hughes, Timothy C. May, and John Gilmore created the cypherpunk mailing list to discuss and share their ideas around cryptography, remailers, anonymity, digital cash, and privacy with a wider audience. Years later, Satoshi Nakamoto published the Bitcoin whitepaper on a similar mailing list: the cryptography mailing list.
The cypherpunk manifesto written by Eric Hughes in 1993 is the original political and philosophical statement behind the cypherpunk ideology. The term “cypherpunk” refers to a group of activists who advocate for strong cryptography and privacy-enhancing technologies as a means of promoting individual freedom and limiting government and corporate control. In this paper, Erich Hughes discussed the idea of digital cash, its relation to privacy, and its importance for a free society.
“Since we desire privacy, we must ensure that each party to a transaction have knowledge only of that which is directly necessary for that transaction. Since any information can be spoken of, we must ensure that we reveal as little as possible. In most cases personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am.”
The manifesto has been influential in the development of the modern internet and the growth of the privacy and security industries. It has also inspired the work of many activists and organizations who seek to promote digital freedom and individual autonomy in the face of government and corporate surveillance.
The core principles of the cypherpunk manifesto are:
Even though e-gold was not groundbreaking in terms of innovation in the field of cryptography, it was one of the first digital currencies that managed to gain traction before the 2000s. Although others existed before its inception in 1996, e-gold is considered to be the first successful digital currency that became popular enough to have some merchant adoption.
Unlike traditional digital currencies, which were backed by government-issued fiat currencies, e-gold was backed by physical gold held in a Vault. Users could exchange their e-gold for physical gold at any time, or use it to make purchases online.
Besides the e-gold tokens backed by gold, other precious e-metals could be acquired: e-silver, e-platinum, and e-palladium.
One of the key features of e-gold was its anonymity. Transactions were conducted using pseudonyms rather than real names, making it difficult for authorities to trace the source or destination of funds. This also made e-gold attractive to criminals, who used it for money laundering and other illegal activities. The irreversibility of the transfers also made e-gold an indispensable tool for money launderers, identity thieves, fraudulent “financial” investors, and purchasers of child pornography.
At its peak, e-gold reached 5M users and processed transfers of value in the order of $2B. Similar to eCash, its demise turned out to be the fact that it was run as a centralized service offered by a company: Gold & Silver Reserve Inc. By 2006, e-gold’s corporate governance realized that the website was being used for illegal activities and began blocking accounts. Soon after, it was targeted by the U.S government, who filed a lawsuit claiming that the company was running an unlicensed money transmitting business. In 2007, the U.S. government mandated e-gold to block several accounts with the argument that e-gold was not doing enough to prevent illegal activity by not having a mechanism in place that stopped fraudulent users from just creating new accounts and transferring funds to these new accounts.
Money transmitting businesses are required under U.S. law to receive a license, which also comes with keeping certain legal information on the users that create accounts.
Hal Finney’s essay, “Digital Cash & privacy” explores the concept of digital cash and the potential impact it could have on society. This article offers an early exploration of the possibilities and challenges of digital cash, which would later become a key inspiration for the creation of Bitcoin.
In the essay, Finney argues that digital cash has the potential to be more private and secure than physical cash, as it can be authenticated and verified without the need for physical exchanges. He also discusses the potential for anonymous transactions, which he believes would have significant benefits for individuals’ privacy and freedom.
In 1998, Wei DAI proposed a digital currency system called “b-money” that used a Proof-of-work scheme to prevent double-spending and achieve consensus. DAI’s proposal introduced many of the core concepts that later became key features of Bitcoin, such as Proof-of-work, public-key cryptography, and decentralized consensus.
This was one of the earliest known attempts to create a decentralized digital currency system. Each user would have a Public Key and a Private Key, similar to Bitcoin’s public-key cryptography. Users would then be able to generate new coins by solving a cryptographic puzzle, similar to Bitcoin’s Proof-of-work system. Next, these newly created coins would be broadcast to the network and added to a public ledger.
One key difference between b-money and Bitcoin was that b-money did not have a fixed supply of coins. Instead, new coins would be created in response to demand, based on a predetermined algorithm that took into account the rate of coin creation and the number of users on the network.
In 1998, Nick Szabo proposed a digital currency system called “bit gold”, that used a Proof-of-work scheme to create new coins and secure the network. Szabo’s proposal also introduced the concept of Smart Contracts, which later became an important feature of Ethereum and other blockchain platforms.
At the core of the bit gold system was a Proof-of-work algorithm that required users to solve a cryptographic puzzle in order to create new coins. This Proof-of-work process also served to validate transactions and prevent double-spending, similar to how it works in Bitcoin.
Bit gold also introduced the concept of a “blockchain,” which was a public ledger of all transactions that had occurred on the network. Each block in the blockchain contained a list of transactions, along with a reference to the previous block in the chain. This made the system resistant to tampering and provided a transparent record of all transactions.
In addition to its use as a currency, bit gold also included a system for creating and enforcing Smart Contracts. This allowed users to create contracts that would execute automatically based on predetermined conditions, without the need for intermediaries or trusted third parties.
In 2002, Adam Back introduced a system called “Hashcash” that used a Proof-of-work algorithm to limit email spam. Nakamoto used a similar Proof-of-work algorithm in Bitcoin to prevent double-spending and achieve consensus.
Hashcash was designed to limit email spam and denial-of-service attacks. This was achieved by requiring users to solve a computational puzzle in order to send an email or request to a server. With this system, the idea was to create a small computational cost for sending an email or request. This would make it impractical for spammers or attackers to send large volumes of messages.
Hashcash works by requiring the sender to include a special header in the email or request that contains a value that satisfies a cryptographic puzzle. This puzzle involves finding a hash value that meets certain criteria, such as having a certain number of leading zeros. As a result, the puzzle is designed to be computationally difficult, so that it takes a certain amount of time and processing power to solve it.
The sender of the email or request must spend a certain amount of processing power to solve the puzzle and find a hash value that meets the criteria. This processing power is known as a “Proof-of-work,” and it serves as a kind of digital stamp that verifies that the sender has spent a certain amount of resources to send the message. Once the message is sent, the recipient can use this Proof-of-work to verify that the sender is legitimate and that the message is not spam or an attack.
RPOW stands for Reusable Proof of Work, and was pioneered by Hal Finnery in 2004, who found a way to make the Proof-of-work tokens from Adam Back’s hashcash reusable.
The system would receive hashcash as a PoW token, and in exchange create RSA-signed tokens called reusable Proof-of-work (RPOW) tokens. These RPOW tokens could then be transferred from person to person and exchanged for new RPOWs at each step. In this framework, each RPOW token can only be used once, but since it gives birth to a new one, it is as though the same token can be handed from person to person.
With RPOW, a user can create RPOW tokens via the RPOW client software, twitch takes a Proof-of-work string as generated by the Hashcash software invented by Adam Back. This string is signed by the user’s Private Key and subsequently registered by a RPOW server, which records that this token belongs to the user’s Private Key. The user can then pass that token on to someone else by signing a transfer order to another user’s Public Key.
Hal Finney’s implementation was a practical solution to the double-spend problem. Since PoW tokens themselves are just hashes (bits of information) that can be double spent, they are not a good representation of money. However, with the concept of RPOW servers, Hal Finney introduced central, but trust-minimized authorities that can cryptographically determine a chain of ownership.
RPOW also introduced a series of rules:
Similar to Hashcash, RPOW was one of the systems that was actually implemented. However, probably due to the effort required to run RPOW servers, as well as the lack of incentives to do so, Finney’s reusable Proof-of-work tokens never gained traction and the project was eventually discontinued.
The Bitcoin network started in 2009, based on a reference implementation published by Nakamoto and since revised by many other programmers.
The phrase “running Bitcoin” typically refers to the act of running a Bitcoin node or client on a computer or server. At that time, Bitcoin was still an experimental technology, and only a small number of individuals were actively using and developing it. To participate in the network, users had to run a Bitcoin client or node, which would download and store a copy of the blockchain and allow the user to send and receive Bitcoin transactions.
The steps to run a network as follows:
“Once the latest transaction in a coin is buried under enough blocks, the spent transactions before it can be discarded to save disk space. To facilitate this without breaking the block’s hash, transactions are hashed in a Merkle Tree, with only the root included in the block’s hash. Old blocks can then be compacted by stubbing off branches of the tree. The interior hashes do not need to be stored.” – Satoshi Nakamoto
Segregated Witness (segwit) is an upgrade and soft fork to the consensus rules of the network that was activated on Bitcoin’s mainnet on August 1st, 2017. The main purpose of SegWit was to increase the transaction capacity of the Bitcoin network by removing the signature data, also known as the witness data, from the main part of the transaction, thus reducing the size of the transaction.
In a Bitcoin transaction, there are two parts: the transaction data, which includes information about the sender, the recipient, and the amount of Bitcoin being transferred, and the signature data, which proves that the transaction is legitimate and was authorized by the owner of the Bitcoin being spent.
With SegWit, the signature data was separated from the transaction data and moved to a new data structure called the “witness“. This helps to free up space in the Bitcoin blocks, which can then be used to include more transactions. This architectural change had noticeable effects on the security, scalability, and performance of the network.
Some of the most notable features introduced by the upgrade include:
Taproot was a protocol upgrade that aimed to enhance the network’s privacy, security, and flexibility. It was the most important network upgrade since the activation of Segwit in 2017. Even though it was not as controversial as SegWit, this introduced significant improvements to the protocol. The Taproot upgrade was fully activated on the protocol on November 14, 2021.
The upgrade proposed a new transaction format that would allow users to combine multiple conditions for spending their bitcoin in one single transaction. This reduces the transactions’ size and cost.
One of the most significant features of the Taproot upgrade is its ability to hide the details of a transaction’s smart contract execution by combining multiple conditions into a single hash. This enhances user privacy by making it harder to determine the exact details of a transaction, such as the type of smart contract being executed or the specific conditions required for spending the funds. To achieve that, the Taproot upgrade allowed for multiple and complex signatures to be aggregated and verified together, rather than individually.
Taproot also has benefits for Bitcoin’s network scalability by allowing for more complex Smart Contracts without increasing the size of the transaction. By reducing the size of transactions, it can increase the network’s capacity and reduce transaction fees.
“I anticipate there will never be more than 100K nodes, probably less. It will reach an equilibrium where it’s not worth it for more nodes to join in. The rest will be lightweight clients, which could be millions.” – Satoshi Nakamoto
The main change was the implementation of Schnorr signatures. These signatures are considered more secure than ECDSA (Elliptic Curve Digital Signature Algorithm). Specifically, they are resistant to certain types of attacks, such as side-channel attacks and multisignature attackers.
Schnorr signatures are also more efficient in terms of computation and storage requirements and can be used to enable more private transactions.
Unlike traditional currencies, bitcoin is entirely digital. In a sense, it is the perfect form for transferring value on the internet. It is a fast, secure, and borderless way for buying and selling goods, transferring money to other people or organizations, or extending lines of credit.
Bitcoin is a distributed peer-to-peer system where there are no physical or even digital coins per se. Instead, these coins are implied in transactions that transfer value from a sender to a recipient. To participate in the network, users hold keys that allow them to prove ownership of bitcoin and sign transactions to transfer and spend their bitcoin. These keys are stored in a digital wallet under the custody of the user.
Since Bitcoin is a protocol, users need a client application that allows them to interact and communicate with the Bitcoin system. The most used and common way to interface is with a Bitcoin wallet.
When a user wants to send Bitcoin, they use their Bitcoin wallet to create a transaction and broadcast it to the Bitcoin network. When a user wants to receive Bitcoin, they provide their Bitcoin wallet address to the sender.
Bitcoin wallets use Public Key cryptography to secure network transactions. Each wallet has a Public Key and a Private Key. The Public Key is used to receive bitcoin, while the Private Key is used to sign transactions and send bitcoin. To remain secure, users should always keep full control and ownership of their Private Key.
There are several types of Bitcoin wallets, including desktop wallets, mobile wallets, web wallets, and hardware wallets. Each type of wallet has its own advantages and disadvantages. For that reason, choosing a wallet is highly subjective and depends on the use and user expertise.
The word “wallet” can be used to describe different things in Bitcoin. At a high level, a wallet is an application that serves as the interface that allows users to interact with the protocol in order to access their funds, manage their keys and address, track their balances, create and sign transactions… More narrowly, Bitcoin developers often use the word “wallet” to refer to the data structure that is used to store and manage a user’s keys.
A distinction can also be made between wallets based on whether the keys they contain are related to each other or not.
Modern Bitcoin wallets provide users with a mnemonic or seed phrase. This consists of 12-24 English words, selected randomly by the software, and used as the basis for the keys that are generated by the wallet. This phrase can be used by users to restore all the transactions and funds in their wallet in the case of an event such as a lost mobile or hardware device, a software bug, memory corruption…
The BIP-39 standard defines a set of 2048 words, each represented by a unique 11-bit number. To generate a seed phrase, a random sequence of words is selected from the list of 2048 words.
The number of words selected determines the strength of the seed phrase. For example, a 12-word seed phrase provides 128 bits of entropy, which is considered secure for most purposes.
In Bitcoin, a multisig or multi-signature address is a Bitcoin address that requires multiple signatures in order to spend the funds associated with it.
In order to create a multisig address, multiple public keys are required, along with a set number of required signatures. For example, a 2-of-3 multisig address would require three public keys and two of those keys to sign off on a transaction in order for it to be valid.
Multisigs in Bitcoin are implemented using a type of script called Pay-to-Script-Hash (P2SH) that enables the creation of more complex transactions than the standard Pay-to-Public-Key-Hash (P2PKH) script. P2SH allows a transaction to be locked to a specific script, and that script can be a multisig script that requires multiple signatures to spend the funds.
While a multisig transaction does involve the use of a script, it is not considered a smart contract in the traditional sense. Smart Contracts typically involve more complex logic and can execute more than one transaction based on certain conditions. Multisigs are generally considered to be a basic type of script that allows for increased security and control over funds.
Bitcoin nodes are the backbone of the Bitcoin network. They are computers that run Bitcoin software and help to verify transactions and maintain the integrity of the network by enforcing the rules of consensus. These nodes store a copy of the blockchain and communicate with each other through the Bitcoin protocol. By running a node, users are capable of verifying bitcoin balances without relying on a trusted third party.
When a new transaction is initiated, nodes on the network validate the transaction by checking its authenticity, ensuring that the sender has sufficient funds, and verifying that the transaction adheres to the rules of the Bitcoin protocol. Also, when a new block is added to the blockchain, nodes validate the block to ensure that it adheres to the consensus rules. If a block is found to be invalid, nodes on the network will reject it, ensuring that only valid blocks are added to the blockchain.
There are several different types of nodes on the Bitcoin network:
Because all nodes check, no miners can cheat the system. If all nodes didn’t check you’d have to rely on the ones that do check.
Bitcoin’s value is derived from its use as a decentralized digital currency. The network is not backed by any physical asset or government. Instead, it has some attributes that are usually associated with money: unit of account, medium of exchange, and store of value.
“The price of any commodity tends to gravitate toward the production cost. If the price is below cost, then production slows down. If the price is above cost, profit can be made by generating and selling more. At the same time, the increased production would increase the difficulty, pushing the cost of generating towards the price.” – Satoshi Nakamoto
Some people argue that Bitcoin has intrinsic value due to the energy and resources required for mining and securing the network, while others argue that its value is purely extrinsic and derived from market demand. Ultimately, Bitcoin’s value is determined by the collective perception and trust of its users, as well as its potential to disrupt traditional financial systems.
The article “Shelling Out: The Origins of Money” by Nick Szabo discusses the concept of money and its origins. Szabo argues that money is a social construct that emerged from a need for trust and cooperation between individuals. He believes that money originated from the use of shells as a medium of exchange, and over time, evolved into more sophisticated forms of currency such as gold and paper money.
Bitcoin is designed to be a scarce asset. Only a maximum limit of 21 million bitcoins will ever exist. This scarcity creates a sense of scarcity value, similar to other valuable assets like gold.
Dictionaries usually define scarcity as ‘a situation in which something is not easy to find or get’, and ‘a lack of something’.
Bitcoin is the only asset in the universe that has a mathematical scarcity. Elements like gold are naturally scarce on Earth; however, there are trillions of dollars worth of gold floating around on asteroids in our solar system that may one day be accessible to humans, significantly inflating the gold supply.
As demand for bitcoin increases while the supply of available units remains fixed, the scarcity of the asset contributes to its perceived value.
The principle of supply and demand suggests that when the supply of a particular asset is limited, while the demand for that asset is high, the price of that asset will increase.
“A rational market price for something that is expected to increase in value will already reflect the present value of the expected future increases. In your head, you do a probability estimate balancing the odds that it keeps increasing.” – Satoshi Nakamoto
Nick Szabo quotes
“What do antiques, time, and gold have in common? They are costly, due either to their original cost or the improbability of their history, and it is difficult to spoof this costliness. [..] There are some problems involved with implementing unforgeable costliness on a computer. If such problems can be overcome, we can achieve bit gold.” — Szabo in a 2005 blog post titled “Antique times, gold and bit gold“
“Precious metals and collectibles have an unforgeable scarcity due to the costliness of their creation. This once provided money the value of which was largely independent of any trusted third party. [..][but] you can’t pay online with metal. Thus, it would be very nice if there were a protocol whereby unforgeably costly bits could be created online with minimal dependence on trusted third parties, and then securely stored, transferred, and assayed with similar minimal trust. Bit gold.” — Szabo in a 2005 blog post titled “Bit gold”.
Bitcoin is not controlled by any central authority or government. By operating on a decentralized network of nodes that collectively validate and record transactions, Bitcoin provides users with benefits such as:
“Governments are good at cutting off the heads of centrally controlled networks like Napster, but pure p2p networks like Gnutella and Tor seem to be holding their own.” -– Satoshi Nakamoto.
As a transparent and public ledger that records all transactions on the network, anyone can view and audit the current and past states of the network. This offers benefits such as:
“Banks must be trusted to hold our money and transfer it electronically, but they lend it out in waves of credit bubbles with barely a fraction in reserve. We have to trust them with our privacy, and trust them not to let identity thieves drain our accounts. Their massive overhead costs make micropayments impossible.” – Satoshi Nakamoto
Unlike traditional forms of currency, which are often subject to restrictions and regulations when being moved across borders, Bitcoin can be sent to anyone, anywhere, at any time, with relatively low transaction fees.
This is enhanced by the fact that it can be stored in digital wallets on various devices, such as smartphones, laptops, and hardware wallets. This means that users can carry their Bitcoin with them wherever they go, without the need for physical cash or cards.
The divisibility of bitcoin makes it a practical and versatile form of currency. Bitcoin can be divided into very small units, with the smallest unit of a bitcoin being a Satoshi (0.00000001 BTC). This level of divisibility allows for precise and accurate transactions, even for very small amounts.
Divisibility is also important because it enables the currency to be used for a wide range of transactions, from small purchases to large-scale investments. It also makes it possible for Bitcoin to be used in situations where traditional forms of currency may not be practical or possible, such as micropayments, online purchases, and cross-border transactions.
Bitcoin transactions are secured by the use of cryptography and a decentralized network of nodes that validate and confirm transactions. This makes it difficult to counterfeit or double-spend bitcoins, making them more secure than traditional forms of payment.
Bitcoin has a number of practical uses, such as being used as a means of payment or as a store of value.
It can be used to purchase goods and services, send money internationally, and invest in as an asset.
Additionally, its decentralization and anonymity can be appealing to those who value privacy and independence from centralized financial institutions.
It is also extremely difficult to censor bitcoin transactions. Anyone with an internet connection and that agrees to pay the network’s fee, has freedom to transact with anyone on the network.
Block rewards are critical to incentivizing miners in the early years, but as the Block Reward shrinks in size, miners will need to draw revenue from transaction fees. These rewards are the incentive for miners to use processing power in order to try and add a new block of transactions onto the blockchain.
The Block Reward is the combination of the block subsidy and all transaction fees paid by transactions in a specific block.
The block subsidy is the amount of newly created bitcoin in each block. This amount is halved every 210,000 years (roughly 4 years).
Miners receive transaction fees in addition to block rewards for processing network transactions. Because of this, the profitability of mining is also impacted by the level of transaction fees, which may change depending on network activity and other elements.
Mining revenue is calculated by multiplying the amount of bitcoins that have been mined by the market price of BTC. As a result, the amount of revenue made by a cryptocurrency mining business fluctuates based on the price of BTC, the difficulty of the mining process, the price of electricity, and the effectiveness of the mining equipment being utilized.
In terms of mining, competition has increased as more miners have entered the market, making it more challenging and less viable for individual miners to produce income. As a result, large mining corporations have grown increasingly popular as a result, as they can take advantage of economies of scale to lower costs and boost profitability. These mining pools operate using specialized mining hardware in order to improve their performance.
Mining pools aggregate pool members’ hashes and submit successful Proof of Work to the network. The rewards are distributed to contributing miners proportionally to the amount of work performed.
At the same time, governments from all over the world are becoming more interested in regulating the cryptocurrency market and mining operations, especially due to environmental concerns. Some nations have embraced cryptocurrency mining and made advantageous regulatory settings for miners, while others have taken a more antagonistic attitude, restricting or even prohibiting mining operations.
The chart shows an estimate of how many hashes per second bitcoin miners are performing on the network.
Estimate = difficulty * 232 / time.
The bitcoin network has a global block difficulty that adjusts every 2016 blocks (~2 weeks) based on a target time of 10 minutes per block. As difficulty increases, more hashpower must be added to have the same statistical chance of finding a block. The time between bitcoin blocks can vary dramatically if there is a large increase or decrease in hashpower within this 2 week period.
The HODL waves show the amount of bitcoin in circulation grouped into different age bands (each band is represented with a different color). The chart shows the total supply of bitcoin in the market at any given time by normalizing the supply distribution.
This visualization highlights what different market participants are doing with their bitcoin. For example, sharp increases in lower age coins being held indicate that a lot of older bitcoins are being sold by people who have held them for a long time, and are now being bought up most likely by new participants in the market.
The stock-to-flow model is a price forecasting tool. It creates a line on the chart above that shows an estimated price level based on the number of bitcoins available in the market relative to the amount being produced (mined) each year. The score on the stock to flow line is the forecasted price for bitcoin at that particular time.
As the amount of bitcoins to be mined decreases over time, the stock to flow number (s2f ratio) increases, due to the decreasing supply available on the market. That is why this model is forecasting that the price of Bitcoin will increase in the future.
Note that the stock-to-flow model treats Bitcoin as being comparable to commodities and precious metals such as gold, silver, or platinum. These are known as ‘store of value’ commodities because they retain value over long time frames due to their relative scarcity.
The Pi Cycle Top Indicator has historically been effective in picking out the timing of market cycle highs. It uses the 111 day moving average (111DMA) and a newly created multiple of the 350 day moving average, the 350DMA x 2.
For the past three market cycles, when the 111DMA moves up and crosses the 350DMA x 2 we see that it coincides with the price of Bitcoin peaking.
This indicator attempts to predict the point where the price of BTC will peak before pulling back.
The Pi Cycle Top is useful to indicate when the market is very overheated (so overheated that the shorter term moving average, which is the 111 day moving average, has reached a x2 multiple of the 350 day moving average). Historically it has proved advantageous to sell Bitcoin at this time in Bitcoin’s price cycles.
The fear and greed index identifies the extent to which the market is becoming overly fearful or overly greedy.
The idea is that when the market is generally overly fearful, it may indicate that Bitcoin is cheap/undervalued at that time and could present a good buying opportunity. The reverse also applies, meaning that when the Fear and Greed Index is signaling market participants are extremely greedy, it may indicate the price of Bitcoin is too high above its intrinsic value and it could be a good time to sell.
The chart below shows the number of days in Bitcoin’s traded history where holding Bitcoin has been profitable relative to today’s price.
This indicator demonstrates how Bitcoin price has accelerated over its lifetime as it becomes adopted by more and more people around the world.
The MVRV Z-Score is a bitcoin chart that uses blockchain analysis to identify periods where Bitcoin is extremely over or undervalued relative to its ‘fair value’.
To do that, it uses 3 metrics:
The MVRV Z-score has historically been very effective in identifying periods where market value is moving unusually high above the realized value. These periods are highlighted by the z-score (red line) entering the pink box and indicating the top of market cycles.
This indicator also shows when the market value is far below the realized value, which is highlighted by the z-score entering the green box.
The average amount of bitcoin held by addresses ranges from 0.000001 to 0.1 bitcoin.
There are only 5,577 addresses with a significant amount of Bitcoin amounting to around $10 million.
Of the top 10 biggest BTC wallets, 4 are linked to known entities such as Binance and BitFinex, while the rest are anonymous.
It can be seen that despite regulation uncertainties and difficulties, the majority of Bitcoin nodes are still from the United States, amounting to 29.99%. Germany has roughly half of the nodes compared to the United States at 13.56%, with the rest of the other countries presenting single digit percentages.
In the Bitcoin network, fees are paid to incentivize miners to include transactions in the blocks they mine. Miners prioritize transactions with higher fees since they earn more money for their efforts. As a result, fees are not fixed and can vary depending on the number of transactions waiting to be processed and the amount of competition for block space.
When creating a Bitcoin transaction, the sender can specify a fee they are willing to pay in satoshis per byte (sat/B). The higher the fee, the faster the transaction is likely to be confirmed. If the fee is too low, the transaction may not be confirmed for a long time or may never be confirmed at all.
Wallets often have a feature that automatically calculates an appropriate fee based on the current network conditions. Some wallets may allow users to manually set the fee.
Note that higher fees do not necessarily guarantee faster confirmations, as there may be other factors at play such as network congestion or low hash rate.
Miners usually exert sell pressure on the market by selling the block rewards to cover their high operating costs. When these rewards are cut in half, sell pressure may also decrease, yielding a price rise.
Before the advent of specialized bitcoin mining software, early miners used their personal computers and were able to generate a profit. As a result, the equipment and operating costs were negligible. Over time, more professional bitcoin mining centers emerged to provide users with more computing power. In 2013, a China-based computer hardware manufacturer called Canaan Creative released the first set of ASIC (Application-specific integrated circuits) for bitcoin mining. As individuals started competing against more powerful mining rigs with more computing power, the mining profits started getting slashed by the growing expenses for computing equipment, higher energy costs, and the continued difficulty for mining.
Nowadays, Bitcoin mining remains a profitable activity for some individuals and corporations. Mining equipment is accessed more easily, although its costs vary from a few hundred dollars up to about $10,000. To remain competitive, these businesses try to lower their energy requirements, thus bringing down their overall costs.
In order to compete against big mining centers, individuals can join mining pools, where a group of miners will work together and share the rewards. Even though the overall reward decreases when it is distributed between multiple participants, the combined mining power means that mining pools stand a much greater chance of adding the next block to the chain.
The costs associated with participating in Bitcoin mining can be broken down into the following categories:
View a higher resolution version of this map.
When evaluating a bitcoin Miner’s total cost of production relative to their competitors it is important to consider whether or not the company owns its own infrastructure or relies on a hosting provider through co-location.
If a Miner largely operates machines through co-location then it will likely have lower depreciation expense than a company that owns its own infrastructure and thus has to depreciate it. Over time, as miners’ margins decrease, vertically integrated miners will have better cost to mine since they have longer-term control over power costs.
Diving into one of the earliest backups of Bitcoin’s code shows that the supply was effectively set at 21M BTC. Bitcoin’s codebase does not contain any checks that BTC’s supply does not exceed 21M. Instead, the software checks that each block doesn’t claim more than the prescribed number.
The mining of block 600,000 was celebrated by the community as a milestone towards the end of the inflation process for Bitcoin. Applying the supply formula to get supply value at block 600,000 on October 19, 2019 gives 18M BTC.
However, Pieter Wuille, Bitcoin Core developer, mentioned that the actual supply as of block 600,002 was 17,999,854.82192702 BTC. As a result, there was a shortage of BTC, which can be attributed to the following reasons:
Bitcoin’s ledger is made of a set of “unspent outputs” otherwise referred to as the Unspent Transaction Outputs set, or UTXO set. Summing up those outputs’ BTC values give you the Bitcoin supply as seen by a Full Node. For example, Bitcoin’s first block, the genesis of its history, contains a transaction minting 50 BTC.
However, this transaction’s 50 BTC output isn’t included in the UTXO set. It’s still unclear whether it was an oversight or done on purpose. The result is that those 50 BTC are not present in Bitcoin’s ledger, even if they are visible in a transaction included in the main chain.
Another oversight from Bitcoin’s designer is the handling of duplicate transactions. While at first glance, it doesn’t seem possible for them to occur (as they contain digital signatures and references to previous transactions which makes them unique), it is still possible to create duplicate transactions.
The easiest transactions to duplicate are the coinbase transactions, which are the first transactions of every block and allow the Miner to claim their Block Reward (the company Coinbase is named after these coinbase transactions), because they do not contain digital signatures or references to previous transactions. If a Miner were to create a coinbase transaction paying out the exact same amount of BTC to the same addresses and with the same extra nonce (a small space of the coinbase transaction used to help mining), the transaction would be identical.
Coinbase transactions are a special type of transaction that signal the creation of new currency units as part of the block rewards process. In other words, each coinbase transaction is responsible for transmitting the newly minted coins to the Miner who has resolved the block. Thus, the total base value of a transaction coinbase, contains only and exclusively new currencies that have never been in the blockchain.
This happened twice in Bitcoin’s early history:
In each case, the second time the transaction was included, its outputs overwrote the previous ones. The result is that the two overwritten outputs are not in the UTXO set. Those 100 BTC are not in Bitcoin’s ledger. While appearing like an innocuous oversight, Russell O’Connor identified this as an attack vector back in 2012. Leveraging duplicate transactions, an attacker could remove other user’s past transactions from the ledger.
In response to this, BIP-30 was introduced in 2012 to forbid new duplicate transactions to be included until the older transaction’s outputs are all spent. However, the handling of the existing duplicates was not changed and they still remain in the chain to this day.
Later in 2012, BIP-34 also made duplicating coinbases much more difficult as they now had to include the height of the block they are part of.
Another set of provably lost coins is linked to the verification of coinbase transactions by full nodes.
The Bitcoin protocol mandates that the Miner of a valid block can credit themselves with a protocol-defined reward plus the fees from the transactions included in that block. Each Full Node checks that miners don’t try to claim more than they are allowed. However, they do not care if the Miner claims less than their share.
Obviously, claiming less than their allotted reward would not be rational behavior from miners, but it has happened a surprisingly large number of times. The first time it occurred was at block 124,724 in May 2011 and the last time thus far at height 564,959 in late February 2019.
The most notable cases are listed in this table:
|Block Height||Unclaimed BTC|
Broadly, this behavior happened in 3 distinct episodes, totaling 1,221 anomalies. The following chart shows the number of blocks that did not claim their full reward, bucketed by 1000 blocks:
One very intense episode occurred around height 162,000. Another more prolonged one occurred from 180,000 to 230,000 and a last one around block 530,000.
According to Bitcointalk user midnightmagic, the first instance was done on purpose as a tribute to Satoshi Nakamoto, on a suggestion of Bitcoin developer Matt Corallo. For the other cases, given the amounts lost by some miners, they are most likely attributable to bugs in the software used by miners to create the coin generation transaction.
There’s a special type of Bitcoin transaction output called OP_RETURN. They allow users to embed data in the blockchain (up to 80 bytes per output at the moment) without bloating the UTXO set (those outputs do not get added to the UTXO set − they are considered provably unspendable).
While the great majority of such outputs are created with a value of 0 satoshis, some aren’t. As of block 600,000, there were 3.723039 BTC sent to OP_RETURN outputs, making them unspendable forever, and not part of Bitcoin’s supply.
Prior to the standardization of OP_RETURN outputs, there was no easily accessible, provable way to burn Bitcoin. As a result, users resorted to “bogus addresses”, which is an address that does not have a known Private Key.
When creating a Bitcoin address, the process usually starts from a known Private Key, that is then transformed to derive the Public Key address it corresponds to. This process makes it very difficult to generate custom “vanity prefixes” (i.e. vanity public keys) − you basically have to “mine” private keys to find ones whose address starts with the desired prefix.
However, in the case of bogus addresses, there’s no desire to ever actually spend from the address, so there’s no need to know what the Private Key is. Therefore the bogus address can start with any prefix (if it can be written using the Base58 alphabet). However, the last characters will be random (by design, the last characters of an address are a checksum to prevent typos).
While it is impossible to draft a complete list of bogus addresses, we can list some notable ones:
|1BitcoinEaterAddressDontSendf59kuE||13.22477678||Well known bogus address|
|1111111111111111114oLvT2||69.10002337||Smallest address possible|
Just those 3 addresses account for 2213.19538012 BTC lost as of block 600,000.
In theory, those coins are not lost forever − someone could find a Private Key for them. However, the only known way to find a Private Key given only an address is to randomly guess until you find the right combination (i.e. through bruteforce). In practice, the chance of that happening in the lifetime of our universe is pretty slim.
Beneath the beautiful veneers of today’s wallets, there are critical pieces of code responsible for crafting, signing and broadcasting our transactions to the Bitcoin network. Nowadays, it’s rare to find debilitating bugs in them, but that wasn’t always the case.
In November 2011, MtGox fell victim to a bug in this part of their software. They sent 2609.36304319 BTC to a bogus script, with no known way to spend it. The bogus script was what would happen if you tried to send money to an “empty” Public Key with software not programmed to detect that this is not desirable.
There have been other similar bugs in other assets that rendered coins unspendable, most notably in Ethereum with the Parity self-destruct issue (513k ETH lost).
Another source of lost coins are the ones that haven’t moved in many years. As it’s impossible to know whether their owners still have the keys or don’t, they are often called “zombie coins”, neither alive nor dead. With this category, we leave the domain of quasi-certainty about whether the coins are truly lost.
To stay conservative in our estimate, we’ll only count coins last touched before Bitcoin was traded on the first exchanges (July 2010). The rationale is simple: people that acquired Bitcoins before they could be traded away had less of an incentive to back up their wallets as the perceived value of Bitcoins (at the time) was very low.
At block 600,000, there were 1,496,907.88000 BTC last touched prior to July 2010. According to various estimates, Satoshi Nakamoto purportedly owns more than half of those coins due to their status as the dominant Miner for most of Bitcoin’s very early history.
The last time coins last touched prior to July 2010 were moved was in July 2019, when 150 BTC were spent.
Overall, since the 2013 bull run, those coins have been very rarely spent. Given the price appreciation from 2013 to now, either the owners of those coins are very long-term oriented holders, or they don’t have access to these coins.
There’s one final category of coins that could be considered lost, or at least out of circulation for the time being: known stolen coins. Until the advent of better mixing solutions (which is effectively similar to money laundering, making it much more difficult to follow the money trail), they will be difficult to insert back into circulation, especially for very large amounts.
There’s been many major hacks and thefts over Bitcoin’s history, but two jump to mind as “out of circulation” – the 2011 theft of 80k BTC from MtGox and the 2016 theft of 120k BTC from Bitfinex.
In March 2011, 79,956 BTC were withdrawn from MtGox’s wallet, and have not been touched to this day. As of today, it’s the 6th richest address.
The reason why this haul (worth $73k at the time it was stolen, $700M today) was never spent is unknown. Most likely, the thief is unable to access the Private Key.
In August 2016, Bitfinex lost 119,756 BTC to a hack. To this day, very few of these stolen coins have been moved and only 22 BTC were recovered. As of block 600,000, the addresses where the stolen coins were sent to still held 117,091.31922097 BTC.
Bitcoin governance refers to the mechanisms and processes through which changes to the Bitcoin protocol are proposed, debated, and implemented. Unlike traditional forms of governance, such as centralized decision-making by a government or corporation, Bitcoin governance is meant to be decentralized and relies on the consensus of its users.
There is no central authority that governs the Bitcoin network, so changes to the protocol are proposed and discussed by the community of users and developers. Changes are implemented through a process known as a “soft fork” or a “hard fork”, which requires a majority of users to adopt the new protocol rules.
Bitcoin is also based on the principles of open source software development, where anyone can contribute to the codebase and propose changes. However, due to the decentralized nature of the Bitcoin community, governance can be challenging and often contentious, as different groups may have conflicting interests and ideas about how the protocol should evolve.
The Bitcoin governance process maintains a set of verification rules. At a high level, this long set of verification rules covers syntax, data structures, resource usage limits, sanity checks, time locking, reconciliation with the memory pool and main branch, the coinbase reward and fee calculation, and block header verification. Most of these rules were inherited from Satoshi Nakamoto, although some have been added or amended to address bugs and denial-of-service vulnerabilities.
When a researcher has discovered a solution to a problem, they share their proposed changes with other protocol developers, either in the form of an email to the bitcoin-dev mailing list, a formal white paper, and/or a Bitcoin Improvement Proposal (BIP).
In the Bitcoin network, proposals are executed through a process called “rough consensus.” This means that proposals are discussed and debated among the community of developers, miners, and users until a general agreement is reached on the direction to take. There is no formal voting process, but proposals that are generally agreed upon are implemented by developers who create and release new versions of the Bitcoin software.
Changes to the Bitcoin protocol are proposed in the form of “Bitcoin Improvement Proposals” (BIPs), which are submitted to the community for discussion and review. If a proposal gains enough support and is deemed to be technically feasible and beneficial for the network, it may be implemented in a new version of the software. However, the implementation of a proposal ultimately depends on whether the community adopts the new version of the software or not.
While there is no central authority governing Bitcoin, there are various organizations and individuals that have significant influence on the network. These include developers who contribute to the core Bitcoin software, mining pools that collectively control a significant portion of the network’s hash power, and exchanges and other businesses that provide services to Bitcoin users.
The security model of Bitcoin is based on the decentralized network of nodes and miners, as well as the underlying cryptographic protocols used to secure the system.
In terms of the network, Bitcoin relies on a decentralized system of nodes and miners to validate transactions and maintain the integrity of the blockchain. Nodes are responsible for relaying transactions and blocks to each other, and verifying their validity, while miners are responsible for adding new blocks to the blockchain through the process of mining. The decentralized nature of the network means that there is no single point of failure or control, and no single entity can manipulate the system without consensus from the network.
However, there are some other risks that have an impact on Bitcoin’s integrity:
The core principle in Bitcoin is decentralization, and this has important implications for security. As a permissionless and censorship-resistant system, Bitcoin pushes the responsibility and control of the network to the users. Because security of the network is based on Proof-of-work, not access control, the network can be open and no encryption is required for network traffic.
Contrary to payment networks that have to be secured end-to-end in order to ensure that no intermediaries can compromise the payment traffic, Bitcoin is dramatically different. A bitcoin transaction authorizes only a specific value to a specific recipient and cannot be forged or modified. It does not reveal any private information, such as the identities of the parties, and cannot be used to authorize additional payments. Therefore, a bitcoin payment network does not need to be encrypted or protected from eavesdropping. In fact, you can broadcast bitcoin transactions over an open public channel, such as unsecured WiFi or Bluetooth, with no loss of security.
The architecture of Bitcoin is very different from traditional software systems from a security point of view. In traditional systems, the security architecture is built upon a concept called the root of trust. As these systems become more complex, they are more likely to contain errors, which makes them more vulnerable to security compromises. The root of the trust concept ensures that most of the trust is placed within the least complex part of the system. However, this is not the case in Bitcoin. Bitcoin’s consensus mechanism creates a trusted public ledger that is completely decentralized. Ultimately, the only thing that should be explicitly trusted is its fully validated blockchain
Nevertheless, Bitcoin is not immune to security risks, such as:
The rules of consensus and the cryptography used by Bitcoin have been working since inception, which is a good indication that the concept and software architecture are well designed. However, minor security flaws have been found and fixed over time in various software implementations. Like any other form of software, the security of Bitcoin software depends on the speed with which problems are found and fixed. The more such issues are discovered, the more Bitcoin is gaining maturity.
There are often misconceptions about thefts and security breaches that have impacted exchanges or businesses. None of these events involve Bitcoin itself being hacked, nor reveal any inherent flaws in the protocol; just like a bank robbery doesn’t mean that the US dollar is compromised.
The computational power behind the bitcoin blockchain can be explained as a function of the difficulty adjustment and rate of release of the blocks. This metric is a good insight into the security behind the Bitcoin blockchain. The higher the hash-rate, the more secure the network is.
The value overflow incident that occurred on August 15, 2010 was caused by a software bug that allowed a Miner to create a block with an invalid transaction. Due to this bug, a Miner managed to create 184 billion bitcoins, which was far beyond the maximum limit of 21 million bitcoins set by the Bitcoin protocol. This caused the Bitcoin network to reject the block and temporarily halt the creation of new blocks, leading to a brief period of uncertainty and concern among Bitcoin users.
To resolve the incident, the Bitcoin community agreed to a soft fork that would change the software code to fix the bug and restore the integrity of the blockchain. Within 5 hours of the discovery, a new version of the client was published. This version contained a soft-forking change to the consensus rules that rejected output value overflow transactions (as well as any transaction that paid more than 21 million bitcoins in an output for any reason).
Although many unpatched nodes continued to build on the “bad” block chain, the “good” block chain overtook it at a block height of 74691, at which point all nodes accepted the “good” blockchain as the authoritative source of Bitcoin transaction history.
The bad transaction no longer exists for people using the longest chain. Therefore, the bitcoins created by it do not exist either.
A critical vulnerability was discovered in the Bitcoin-Qt versions 0.5 through 0.6 on Windows, which could allow attackers to crash the process and possibly execute remote code. Bitcoin users were advised to upgrade to version 0.5.3.1 or 0.6rc4 to address the vulnerability. The vulnerability did not affect the command-line bitcoin daemon, Mac, or Linux versions of Bitcoin-Qt, or versions prior to 0.5.
A denial-of-service vulnerability that affected all versions of Bitcoin and Bitcoin-Qt. It was reported and fixed. An attacker could isolate a victim’s node and cause the creation of blockchain forks.
As a result, the latest version 0.6.2 has been released and users are strongly advised to upgrade. Backports for older releases, including 0.5.5 and 0.4.6, are also available for those who cannot upgrade to version 0.6.2.
Bitcoin users were advised to upgrade to version 0.8.0 or later, install an up-to-date “backport” release, or modify a file and restart bitcoin before May 15, 2013. Failure to do so could result in being out of sync with the rest of the Bitcoin network, making it impossible to receive bitcoins, and risking being the victim of a “double-spend” attack. A recommendation was made to upgrade to version 0.8.1 before the 15th of May to avoid any issues. Solo miners or mining pool operators were provided with notes on how to upgrade safely.
If you cannot upgrade to any of the above, you can still avoid the problem. Create a file called DB_CONFIG in the bitcoin data directory, containing this line: set_lk_max_locks 537000
The Android component responsible for generating secure random numbers has critical weaknesses, rendering all Android wallets generated to date vulnerable to theft. Bitcoin Wallet, blockchain.info wallet, BitcoinSpinner and Mycelium Wallet are among the affected apps. Updates have been prepared for these apps to address the vulnerability, and key rotation is necessary to re-secure existing wallets.
If unable to update the Android app, users can send their bitcoins to a Bitcoin wallet on their computer until the app can be updated.
Bitcoin Core software versions 0.9.0 and earlier are affected by a bug in the OpenSSL library that can disclose memory to remote attackers. The bug is known as Heartbleed and more information can be found at
. Users are urged to upgrade to version 0.9.1 of Bitcoin Core, which is linked with OpenSSL version 1.0.1g. If using official binaries, users can check the OpenSSL version in the Debug window of the Bitcoin Core GUI. Self-compiled versions and Ubuntu PPA users should update their system’s OpenSSL. Android version 4.1.1 is also vulnerable to Heartbleed, and users of Bitcoin Wallet on an Android phone should upgrade to version 3.45 or higher.
A planned upgrade in 2015 affected the confirmation scores of Bitcoin transactions received after 2015-07-15 12:00 UTC for certain software users. Users should be aware of the following:
Miners are advised to switch to a pool that properly validates blocks or switch to Bitcoin Core 0.10.2 if solo mining.
Users could either:
It was recommended to upgrade to a version of Bitcoin Core at least 0.10.3 or 0.11.1. These versions upgraded the library to a non-vulnerable version, as well as disabled UPnP by default to prevent this problem in the future.
Versions before 1.9.20151008 of the miniupnpc library are vulnerable to a buffer overflow in the XML parser during initial network discovery. The vulnerable code triggers at startup of Bitcoin Core if UPnP is enabled. Details of the vulnerability can be found here.
Releases starting from 0.10.3 and 0.11.1, and the upcoming 0.12.0 still shipped with a patched version of the library, but no longer enabled the functionality by default.
With UPnP turned off, the node will still connect to 8 other peers on the Bitcoin network in order to receive new blocks and transactions. However, it will not accept incoming connections from other peers unless the user manually enables port forwarding on their router. In order to do that, please follow these instructions.
Bitcoin.org has warned that state-sponsored attackers may target the binaries for the upcoming Bitcoin Core releases, and that they do not have the technical resources to defend against such attacks. Bitcoin.org has repeatedly asked the Bitcoin community, especially the Chinese community, to exercise caution when downloading binaries from their website. If the community does not take necessary precautions, downloading malicious software could lead to the loss of all coins, or participation in attacks against the Bitcoin network. The website has stated that Chinese services such as pools and exchanges may be most at risk due to the origin of the attackers.
The hashes of Bitcoin Core binaries are cryptographically signed with the key belonging to Bitcoin Core maintainer Wladimir J. van der Laan. Additional signatures from other developers can be found in the github signatures repository.
It was strongly recommended that users download Wladimir’s key from multiple sources in addition to Bitcoin.org for comparison purposes. For example, users can cross reference Bitcoin.org’s copy with the bitcoin-dev mailing list where Wladimir signed a message containing the key’s fingerprint (01EA5486DE18A882D4C2684590C8019E36C2E964), but are strongly encouraged to seek out other sources as well in order to make sure users are verifying download with the correct key. Furthermore, it was recommended that verifying downloads using signatures from multiple developers using the github signatures repository.
It is always a best practice to securely verify multiple signatures and hashes before running any Bitcoin Core binaries. This is the safest and most secure way to ensure that the binaries users are running are the same ones created by the Core Developers.
In 2017, several prominent businesses such as Coinbase, Xapo, and BitPay, agreed to adopt and implement a hard fork of Bitcoin, scheduled for November, which was not supported by the majority of users and developers. This agreement led to the creation of an alternative currency (altcoin) which is incompatible with Bitcoin, BCH or Bitcoin Cash. The signatories of this agreement believed that the new altcoin would eventually become Bitcoin, which turned out to be a wrong assumption. Users were advised not to store BTC on these services as their BTC may be renamed or replaced entirely with the new altcoin. The recommended way to protect BTC is to download the latest version of Bitcoin Core and transfer out any BTC stored on the signatory services. Users who don’t want to install Bitcoin Core are advised to use wallets like GreenAddress, Electrum or TREZOR, but avoid making transactions until well after the hard fork.
A new release, version 0.16.3, was made available for download on bitcoin.org. Users were advised to update their nodes as soon as possible due to a severe bug that was fixed in this release. However, stored funds were never at risk, even if the bug had been fully exploited. Nonetheless, there was a small possibility of a chain split, which could cause confirmed transactions with less than 200 confirmations to be reversed. Users were advised to avoid this risk by updating to version 0.16.3 and verifying the authenticity of the download with GPG using the signing key and release signatures.
Below is a summary of the required action items:
More information: CVE-2018-17144 Full Disclosure
The first bitcoin was mined on January 3, 2009, by a pseudonymous author known as “Satoshi Nakamoto”. The pseudonym was already a familiar name among cryptography enthusiasts like computer scientists and hackers long before the Bitcoin boom.
Three years after publishing the Bitcoin whitepaper and mining the Genesis block, Nakamoto sent an email to another Bitcoin developer on April 23, 2011, saying that he had “moved on to other things,” and that the cryptocurrency’s future was “in good hands.” Since then, there has been no communication from Nakamoto’s previously known email addresses.To this day, the identity of the person or group of people behind the whitepaper and the actual software is still unknown. Bitcoin remains open-source and no one has the power to own or control it in its entirety.
Over the years, a few individuals have been suspected of being the man behind the elusive pseudonym. Even though Nakamoto’s name is Japanese, and he stated in 2012 that he was a man living in Japan, most of the speculation has involved software and cryptography experts in the United States or Europe.
Nakamoto stated that work on the writing of the code for Bitcoin began in 2007. Months later, on August 18, 2008, he or a colleague registered the domain name bitcoin.org. On October 31 of the same year, Nakamoto published a white paper on the cryptography mailing list at metzdowd.com, describing a digital cryptocurrency, titled “Bitcoin: A Peer-to-Peer Electronic Cash System”. On January 9, 2009, the version 0.1 of the Bitcoin software was released, marking the beginning of the genesis block of bitcoin (block number 0), which had a reward of 50 bitcoins.
“The nature of Bitcoin is such that once version 0.1 was released, the core design was set in stone for the rest of its lifetime” – Satoshi Nakamoto
Embedded in the transaction of the Genesis block is the text: “The Times 03/Jan/2009 Chancellor on brink of second bailout for banks”, citing a headline in the UK newspaper The Times published on that date.
Nakamoto continued to collaborate with other developers on the bitcoin software until mid-2010, making all modifications to the source code himself. He then gave control of the source code repository and network alert key to Gavin Andresen, and transferred several related domains to various prominent members of the bitcoin community.
In 2014, Newsweek journalist Leah Mcgrath Goodman published an article titled “The face behind Bitcoin”. This was an attempt to reveal Nakamoto’s identity. The journalist identified Dorian Nakamoto as the elusive Bitcoin creator.
This cited similarities between the two Nakamotos, including mathematical skill, Japanese descent and political leanings. At the time, Dorian Satoshi Nakamoto was a 64 years old living in Temple, California. Despite his expertise on computer engineering, Dorian denied any involvement with Bitcoin and dismissed any published quotes as a mere misinterpretation on the reporter’s part.
Later, Satoshi Nakamoto confirmed on an online Bitcoin forum that they are not Dorian Nakamoto — putting an end to the rumors.
Adam Back is a British computer scientist and cryptographer. He is best known as the creator of Hashcash, a Proof-of-work system used to prevent spam and denial-of-service attacks, which was proposed in 1997 and later served as an inspiration for Bitcoin’s mining mechanism.
He is a classic cypherpunk and advocate for encryption technologies. Adam Back stands out for his expertise on distributed systems and mastery of C++. He was also one of the first two people to receive an email from Satoshi Nakamoto, although these emails have never been made public. This is the reason why many suspect that Adam could be Satoshi. Other reasons point to the British idioms used by both Satoshi and Adam as well as his writing style and C++ proficiency.
Nevertheless, Back only appeared in the BitcoinTalk in 2013, where he introduced himself and stated that does not own any bitcoin.
Back has denied being Nakamoto but remains a vocal advocate for privacy and has spoken out against government surveillance and the erosion of civil liberties. He is also known for his research on distributed systems, writing several papers and articles on the subject.
However, there are counter arguments against Adam being Satoshi. Despite being referenced in the Bitcoin white paper, Adam did not show much interest or have strong opinions about Bitcoin. He remained largely uninvolved until the first bull cycle in 2013, when he suddenly appeared and introduced himself on BitcoinTalk. While he claims to have no ownership of Bitcoin at that time, his writing style suggests an attempt to take some credit for Bitcoin’s success by applying lessons learned from Hashcash.
Hal Finney is often associated with the figure of Satoshi Nakamoto. He was a programmer and prominent cryptographer who also became one of the first people to receive and work with Bitcoin software when it was first released in 2009. On January 12, 2009, he received their first bitcoin transaction with a value of 10 BTC from Satoshi Nakamoto himself.
Finney was one of the first people to respond to Satoshi’s post on the cypherpunks mailing list and one of the first to download and run bitcoin software. There is also speculation that he might also have been the second Miner on the network.
Hal Finney lived in the same town and was a close neighbor of Dorian Nakamoto, which further added to the speculation that he may have been Bitcoin’s creator. Some have even theorized that Finney may have been a ghostwriter on behalf of Nakamoto, or that he simply used his neighbor Dorian’s identity as a “drop” or “patsy whose personal information is used to hide online exploits”.
Most reports use a 1993 forum post as evidence that Hal Finney was aware of how a technology based on cryptocurrency could be built. This concept is explained using trading cards as an analogy, similar to the modern principle of NFTs.
In March 2013, Finney posted on a Bitcoin forum, BitcoinTalk, a publication called “Bitcoin and me (Hal Finney)”, where he states that he was essentially paralyzed and mentions that amyotrophic lateral sclerosis (ALS) disease was causing his ability to code to be slower but that he would continue coding and working on an experimental software called bcflick, which was used to strengthen the security of Bitcoin wallets.
Finney was a well-known and frequently cited cryptographer. Hal Finney was even hired by Phil Zimmerman to work on PGP, where he coded up the benchmark PGP 2.0 implementation. He had won notable challenges to break Netscape’s SSL encryption as well. This goes against the commonly accepted fact that Satoshi was an amateur cryptographer
Satoshi had a peculiar coding style in C++, which is an object-oriented programming language built as an extension of the C programming language. C uses similar rules, but is ultimately a more rigid language used for system applications and low-level programming applications. However, Hal Finney was a C programmer with limited experience in C++, and his contributions to Bitcoin were mostly weighted towards security and auditing what Satoshi had already written.
Hal Finney played an important role as an auditor of the code.
Contrary to Satoshi, Hal Finney did not seem too favorable to the idea of competitive mining and excessive emissions either.
In that regard, Satoshi’s response alluded to the libertarian ideology of the code behind Bitcoin.
This is also reinforced by Satoshi’s advocacy for Bitcoin to move into server farms with specialized hardware. In that regard, Satoshi envisioned the need for the industrialization of nodes and hashing power.
Finney also seemed to be in contradiction with such an industrialization process due to the environmental impact of large scale mining operations.
During the last year of his life, Hal Finney’s family received anonymous calls demanding an extortion fee of 1,000 bitcoin. They became victims of swatting.
Swatting is a hoax where the perpetrator calls up emergency dispatch using a spoofed telephone number and pretends to have committed a crime in the hopes of provoking an armed police response to the victim’s home.
Hal Finney died in 2014 at the age of 58 due to amyotrophic lateral sclerosis.
In December 2013, blogger Sky Grey linked Nick Szabo to the Bitcoin whitepaper using an approach that he described as stylometric analysis. Szabo was the original creator of bit gold, one of the precursors of Bitcoin. He is also known to have been interested in the use of pseudonyms in the 1990s.
Szabo has a peculiar style of commenting code that was brought up on Reddit multiple times to point out similarities with Satoshi’s style.
Szabo was a computer scientist that also showed proficiency in C++ coding. Bit Gold shared some similarities with Bitcoin as well, since it used p2p networking to enable a financial network for transactions
Stylometry is the application of the study of linguistic style, usually applied to written language and used to attribute authorship to anonymous or disputed writers.
I a May 2011 article, Szabo stated about the Bitcoin creator: “Myself, Wei DAI, and Hal Finney were the only people I know of who liked the idea (or in DAI’s case his related idea) enough to pursue it to any significant extent until Nakamoto (assuming Nakamoto is not really Finney or DAI).”
Craig Wright is an Australian computer scientist who, in 2016, auto-proclaimed himself as Satoshi Nakamoto. However, up until today, he has not proved to be the owner of the private keys that would link his identity to any of Satoshi’s wallets.
Wright has publicly stated that he chose the family name “Nakamoto” in honor of the Japanese philosopher Tominaga Nakamoto (1715-1746), whom Wright learned about from his Japanese martial arts instructor, and the accompanying given name “Satoshi” after the Pokémon character Satoshi, because his name was anglicized as “Ash”, and thus “Satoshi” represents the current financial system that must be burned into ash in order to make way for cryptocurrency.
More specifically, on December 8, 2015, Wired published an article noting that Craig Wright “either invented bitcoin or is a brilliant hoaxer who very badly wants us to believe he did”. At that time, Craig took down his Twitter account and neither he nor his ex-wife responded to press inquiries. That same day, Gizmodo published a story with evidence supposedly obtained by a hacker who broke into Wright’s email accounts, claiming that Satoshi Nakamoto was a joint pseudonym for Craig Steven Wright and computer forensics analyst David Kleiman, who died in 2013. This claim was supported by Jon Matonis (former director of the Bitcoin Foundation), and bitcoin developer Gavin Andresen.
A number of prominent Bitcoin community members still remained unconvinced by the reports and raised the possibility that the evidence provided was an elaborate hoax. In May 2019, Wright started using English libel law to sue people who denied he was the inventor of Bitcoin and who called him a fraud. In that same year, he also registered US copyright for the bitcoin white paper and the code for Bitcoin 0.1, although the United States Copyright Office issued a press release clarifying that Craig was not officially recognized as Satoshi Nakamoto, as they primarily work to determine whether a work is eligible for copyright and do not investigate legal ownership, which, if disputed, is determined by US courts.
Paul Solotshi Calder Le Roux was born in South Africa and worked as a software developer before moving to the United States in 2007, where he founded a digital pharmaceutical company which was used to manufacture and distribute prescription drugs to customers all over the world. He also created several offshore companies which he used to launder money from his criminal activities and is the creator of the encryption software E4M and he is also speculated to be one of the creators of TrueCrypt.
There is not full evidence to prove that Le Roux was one of the men behind TrueCrypt. However, E4M was a predecessor to it. In fact, TrueCrypt was developed by a team of anonymous engineers who chose to give their work away for free. To this day, no one has identified anyone as the original creators.
Evan Ratliff wrote a book about Paul Le Roux called The Mastermind.
In early 2011, Satoshi vanished from the public eye to focus on other endeavors. At roughly the same time, Le Roux moved away from his software development career and became a leader of a criminal cartel. During this period, he faced setbacks with his unlawful global pharmaceutical enterprise, RX Limited, when the US government and the DEA imposed restrictions on its distribution.
The fact that Le Roux had to go into hiding at the same time as Satoshi’s disappearance suggests another striking similarity between the two.
The first evidence linking Paul Le Roux to Satoshi Nakamoto comes from his own words. In an email sent to a friend in 2008, just one month before the Bitcoin whitepaper was published, Le Roux wrote, “I’ve been working on a new form of electronic money. It’s a bit like BitCoin, but much more advanced.” The first counterargument is that Le Roux was only referring to a concept, and not necessarily to the idea of Bitcoin that we know today. Also, despite his background as computer scientist and cryptographer, it is worth noting that Le Roux is not a native English speaker, which raises some doubts as to whether or not he was the author of the original whitepaper.
Other speculative theories refer to fact patterns associated with dates. For example, in March 2012, the DEA (Drug Enforcement Association) raided one of Le Roux’s businesses in Oskosh Wisconsin . One month later, in April 2012, Satoshi sent his last email.
In September 2012, Le Roux was arrested in Liberia and, since then not a single sat belonging to Satoshi has moved.
In much recent time, during the Kleiman v Craight Wright trial and its filing, a motion for a protective order and the filing had a significant number of redactions. However, there was one unredacted footnote in Wright’s filing called “Document 187,” which was the URL to Paul Le Roux’s Wikipedia page, which led to the suspicion that Le Roux was possibly Bitcoin’s creator and somehow Wright obtained access to the criminal’s hard drives.
However, there are some counter-arguments against Le Roux being Satoshi, which are that the email he sent to his friend was sent a month before the release of the first Bitcoin whitepaper, indicating that he may have been referring to a different concept rather than the Bitcoin we know today.
Secondly, Le Roux is currently serving a long prison sentence, and if he were indeed the creator of Bitcoin, he would have had reasons to conceal his identity to avoid arrest.
Lastly, the Bitcoin whitepaper was written in English, which is not Le Roux’s native language. This raises questions about his ability to produce such a sophisticated document.
In a 2011 article in The New Yorker, Joshua Davis claimed to have narrowed down the identity of Nakamoto to a number of possible individuals, being Michael Clear and subsequently Dr. Vili Lehdonvirta.
Clear was a young graduate student in cryptography at Trinity College in Dublin. He was also recognized as the best undergraduate in computer science at Trinity in 2008. He was then employed by Allied Irish Banks in 2009 to enhance its currency-trading software, and he co-wrote an academic paper on peer-to-peer technology. The paper used British spelling, and it was evident that Clear had a good grasp of economics, cryptography, and peer-to-peer networks.
Clear had been programming computers since he was ten and he could code in a variety of languages, including C++, the language of bitcoin.
While Clear had denied that he was Satoshi, he had identified Dr. Vili Lehdonvirta as a possible suspect.
Lehdonvirta was a Finnish researcher at the Helsinki Institute for Information Technology, had previously worked as a video game programmer and was currently researching virtual currencies. Clear believed that Lehdonvirta would be a good match for Nakamoto.
However, he had no background in cryptography and limited C++ programming skills.
In an 2011 article, by Fast Company, written by Adam L. Penenberg, he had discovered a patent application titled “Updating And Distributing Encryption Keys Invention”, for a “system and method for providing secure communications”, filed on August 15 2008, which was 3 days before the domain bitcoin.org was registered. The patent was filed by Neal King, Vladimir Oksman and Charles Bry, with numerous patent applications over the years.
All 3 are also listed on multiple patent applications related to encryption, nodes and networks.
Another coincidence was that the Bitcoin.org domain was registered by a Finnish provider based in Helsinki, which Bry had traveled to six months prior.
However, all 3 have denied being Satoshi, with King offering the most detailed response, in that the technical topics between his patent application and Bitcoin, “are very different, excepting that both relate to authentication to some extent.” He claims he “had never heard of Bitcoin until this question came up,” and had to look up Bitcoin on Wikipedia, concluding that, “It’s not a very good idea: Nakamoto’s algorithm is a solution in search of a problem.”
On May 18 2013, Ted Nelson, an American pioneer of information technology, philosopher, and sociologist, posted a Youtube Video containing his speculation on the identity of Satoshi.
He speculated that Mochizuki, a research professor of Mathematics at Kyoto University, was Satoshi.
Mochizkui had published a proof of an important conjecture of Mathematics, the ABC conjecture in August 2012. This included a vast new system of mathematical structures that nobody had heard of, including inter-universal Tyco Miller theory and Roubini IDEs, which has been described as a “beguilingly simple number theory problem that had stumped mathematicians for decades”.
He also had a number of impressive accomplishments and accolades such as proving Grothendieck’s conjecture on anabelian geometry in 1996, and being invited to speak at the International Congress of Mathematicians.
Mochizuki was also the class salutatorian at Princeton (ranked before the Valedictorian), which meant that he had to have a good grasp of the English language too.
However, counter-arguments against Mochizuki being Satoshi is the fact that he has a glaring lack of known background in computers, coding, and cypherpunk ethos and knowledge.
In a 2013 article, by Vice, written by Alec Liu, it was speculated that either Gavin Andresen or Jed McCaleb could be Satoshi.
Andresen, who is the lead developer of the Bitcoin project, also holds the position of chief scientist on the board of the Bitcoin Foundation, and is considered by many to be the equivalent of Linux’s Linus Torvalds.
However, Andresen has denied being Satoshi, saying he has a different coding style than Satoshi does.
Jed McCaleb is a UC Berkeley dropout and co-founded Mt. Gox. McCaleb also founded eDonkey in 2000, one of the largest (and technically revered) peer-to-peer file-sharing networks at the time. He would go on to develop Ripple, what he believes to be an improved iteration of the Bitcoin concept that addresses some of these flaws.
Upon the internet’s public release in the early 1990s, Hal Finney was aware that cyberspace presented not only exciting new possibilities but also potential risks. With the shift towards digital communication, there was a risk of anyone’s conversations being monitored. This was a threat to people’s privacy and human freedom. This was particularly true for financial transactions, as money was also becoming digitized. Consequently, anonymous payments could eventually become obsolete in a world that was rapidly digitizing.
In a 1993 essay, Finney had explained, “Dossiers could be built up which would track the spending patterns of each of us. Already, when I order something over the phone or electronically using my Visa card, a record is kept of exactly how much I spent and where I spent it. As time goes on, more transactions may be done in this way, and the net result could be a great loss of privacy.”
Similar to physical currency such as banknotes and coins that one carries in their pocket, Finney believed that the internet required an untraceable form of money that could facilitate anonymous transactions.
Indeed, having foreseen many of the same problems as Finney, cryptographer David Chaum had come up with a design for digital cash, called eCash. Finney soon found himself promoting Chaum’s project to his fellow Extropians (a group of cypherpunks), at one point authoring a seven-page explainer for Extropy, the magazine at the heart of the movement.
During the same period in 1992, Finney was invited by Timothy May to join a group of tech-savvy and privacy-focused individuals in the Bay Area. The group, which included Eric Hughes, a former employee of DigiCash, was made up of hackers, computer scientists, and cryptographers who sought to enhance online privacy by harnessing the power of cryptography. They named themselves the Cypherpunks and focused on creating and distributing software as their main tool. Their motto became “Cypherpunks write code.”
Finney was a skilled programmer who was instrumental in the Cypherpunks’ early successes. He helped develop the first remailer and was a significant contributor to PGP. He also organized a contest to break Netscape’s SSL encryption. However, Finney’s main interest was always digital cash, and he reviewed electronic cash proposals on the Cypherpunk mailing list. He focused on privacy features and was always available to offer his insights on digital cash.
Adam Back proposed Hashcash in 1997, which introduced the “Proof-of-work” system as a solution to counter spam. This system presented the potential for a new type of unbacked digital cash. Nick Szabo and Wei DAI also developed digital cash proposals based on Proof of Work, but they were never implemented due to some weaknesses. In the meantime, DigiCash, a company focused on digital cash, filed for bankruptcy. By the early 2000s, the Cypherpunk movement dissolved, and the dream of digital cash seemed to fade away.
In 2004, Finney proposed a digital currency system called Reusable Proofs of Work (RPOW) that used Hashcash’s Proof-of-work system for currency generation. Unlike Szabo and DAI, who didn’t implement their digital cash proposals into software, Finney coded an RPOW prototype and advertised it on a website featuring an RPOW logo in comic book style.
Finney created a prototype for his digital currency system RPOW, which used a Proof-of-work system for currency generation. However, for the system to work without trust, Finney hosted the RPOW server on a secure hardware component, the IBM 4758, which allowed for “trusted computing.” This prevented Finney from cheating by adjusting the RPOW software and ensured users did not have to trust the server operator.
And thus, RPOW was born.
David Chaum, a computer science professor at Berkeley University, designed tools to realize digital privacy, including privacy-preserving technologies like Tor, which he first published in 1981, Chaum’s paper “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms”. In addition, he wanted to design a privacy-preserving digital currency.
In 1982, Chaum had already designed a solution for an anonymous payment system for the internet, which he published in his paper “Blind signatures for untraceable payments.” At the heart of Chaum’s digital money system lies his innovation of “blind signatures.” Public Key cryptography uses key pairs consisting of a Public Key and a Private Key. Alice can sign data by combining it with her Private Key, generating a signature that can be checked against her Public Key by Bob or anyone else. A blind signature adds another step by having Bob scramble the data with a random number, creating a seemingly random string of numbers that Alice can sign without knowing the original data. The resulting blind signature can be checked against Alice’s Public Key and the scrambled data, as well as the original, unscrambled data.
Chaum used blind signatures to create a digital money system, eCash. In this system, Alice Bank is a regular bank, and Bob wants to buy something from Carol. Bob creates digital banknotes by himself and sends them to Alice Bank. Alice Bank then blind signs each scrambled banknote, and sends them back to Bob. Bob can now use the original unscrambled banknotes to pay Carol by simply sending them to her. As Carol receives the banknotes, she should forward them to Alice Bank. Alice Bank checks that she indeed blind signed each of the banknotes and that the same banknotes haven’t already been deposited by someone else to ensure they haven’t been double-spent. This solution provides privacy in payments, and it was new in digital form.
In 1990, David Chaum founded DigiCash in Amsterdam, specializing in digital money and payment systems, including the flagship project eCash. DigiCash’s eCash system allowed for private digital payments and was the company’s most significant project.
In the mid-1990s, eCash, the digital cash system developed by DigiCash, gained interest from major banks and corporations, including Deutsche Bank, Credit Suisse, Visa, and Microsoft. However, despite the attention, DigiCash struggled to secure lucrative deals, and by 1996, it had new leadership and moved its headquarters from Amsterdam to Silicon Valley. Despite these changes, eCash failed to catch on with the public, and the project did not receive a significant push from the banks that were experimenting with the technology. Ultimately, DigiCash failed to achieve its full potential.
Despite the failure of DigiCash and eCash, David Chaum’s work inspired a group of cypherpunks, including DigiCash contributors like Nick Szabo and Zooko Wilcox-O’Hearn. This group proposed alternative digital currency systems throughout the 1990s and early 2000s, with the dream of electronic cash still alive. In 2008, Satoshi Nakamoto proposed Bitcoin to be the de-facto successor of the cypherpunk mailing list, about 10 years after DigiCash’s demise.
In 1997, Adam Back, a British cryptographer and contributor to the Cypherpunks mailing list, proposed a “partial hash collision based postage scheme” for emails, which he called Hashcash. This proposal did not receive much attention initially, but it introduced the concept of Proof of Work, which would later become the foundation for cryptocurrencies such as Bitcoin.
It started in the early 1990s, with the rise of email leading to the problem of spam. To solve this problem, Dr. Cynthia Dwork and Dr. Moni Naor proposed a system in their 1992 white paper “Pricing via Processing or Combatting Junk Mail.” This solution was called “Proof of Work” and required users to show that their computer performed work, proving that they spent real-world resources. However, this proposal never gained much traction outside of a small circle of computer scientists.
Then, the Cypherpunks, a group of privacy activists with a libertarian bent, started to organize through a mailing list around the same time that Dwork and Naor published their white paper. They utilized the science of cryptography to work toward their goals of privacy-enhancing technologies. Back, who was a frequent contributor to the Cypherpunks mailing list and was involved in various discussions related to privacy, cryptography, and libertarianism, started to establish himself as one of the more active participants. He was particularly interested in developing electronic cash systems that could provide greater privacy and anonymity for users.
However, Back was not aware of Dwork and Naor’s Proof-of-work proposal, but he had similar ideas to counter spam and discussed them on the Cypherpunks mailing list. Back suggested that using PGP encryption would add some overhead to the spammer, making it difficult for them to encrypt many messages per second. Back’s contributions to the mailing list and his work on electronic cash systems would eventually lead to the development of Hashcash and the Proof of Work system, which would become the basis for the mining process used in cryptocurrencies like Bitcoin.
By 1997, when the Cypherpunks mailing list had grown to thousands of subscribers, Back submitted his Hashcash proposal.
Hashcash was a Proof-of-work system proposed to counter spam and abuse of anonymous remailers. It used hashing, a cryptographic technique that takes data and turns it into a seemingly random number, to formalize the metadata of an email as a protocol, which includes adding a random number called a nonce. The metadata, along with the nonce, is then hashed, and the binary version of the hash must start with a predetermined number of zeroes for it to be considered “valid.” The sender must keep trying different nonces until they find a valid combination, which requires computational resources, making it a Proof-of-work system. Hashcash is more random than Dwork and Naor’s proposal, as it allows for slower computers to find a correct solution faster some of the time, unlike the puzzle-based solution proposed by Dwork and Naor.
However, it was not widely adopted despite being implemented in Apache’s open-source SpamAssassin platform and Microsoft’s “email postmark” format. Despite that, Hashcash introduced a new concept of virtual scarcity without relying on a central party, which is a prerequisite for money. Despite not functioning as a full-fledged cash, Hashcash served as a basis for research in the digital-money realm, leading to several notable digital-money proposals that followed.
Ultimately, of course, Proof of Work became a cornerstone for Bitcoin, with Hashcash as one of the few citations in the Bitcoin white paper.
Wei DAI always had an interest in philosophy and politics. He was inspired by the writings of Timothy May, a “founding father” of the Cypherpunk movement, while studying computer science in the 1990s. He was particularly drawn to the crypto-anarchy ideology espoused by May, which held that cryptography and software could better provide and safeguard political and economic freedom than any system of government.
In the mid-1990s, he actively participated in the Cypherpunks mailing list, engaging in discussions about various topics such as digital reputation systems, privacy, and anonymity. He made a number of proposals, including trusted timestamping and a secure file-sharing system, which established him as a prolific contributor to the Cypherpunk community, despite his anonymity.
In November 1998, after graduating from university, DAI announced an idea that would make him famous: “efficient cooperation requires a medium of exchange (money) and a way to enforce contracts.” He proposed a protocol that would allow untraceable pseudonymous entities to cooperate with each other more efficiently by providing them with a medium of exchange and a method of enforcing contracts. He named his proposal “B-Money” and hoped it would make crypto-anarchy a practical possibility.
DAI proposed two alternative solutions to traditional digital money systems which use a central ledger. In the first solution, all participants maintain separate copies of the same ledger consisting of public keys with amounts attached to them, preventing any single entity from blocking transactions while offering a level of privacy to users. This decentralized approach is intended to avoid government regulation and control.
However, he realized that his first b-money solution was impractical as it did not solve the double-spending problem. The issue was that it made heavy use of an anonymous broadcast channel that was synchronous and unjammable. Thus, DAI came up with a second b-money solution that consisted of two types of users: regular users and servers. Only servers, linked through a Usenet-style broadcast network, would maintain the b-money ledgers. This consisted of a system where servers maintained the ledgers, while regular users transacted. This proposal resembles what would be called a proof-of-stake system today.
DAI also added an early version of a smart contract solution, which involved depositing funds in a special account without a dispute resolution system encoded. Instead, in case of disputes, different users or servers could adjust their ledgers differently, leaving the state of ledgers on the network out of consensus.
Eventually, did not expect b-money to take off in a big way and was disillusioned with crypto-anarchy by the time he finished writing up the proposal. Nonetheless, b-money was an important precursor to the development of blockchain and cryptocurrencies and eventually ended up as the first reference in the Bitcoin white paper.
Nick Szabo was born in 1965 in the United States to Hungarian parents who had fled the Soviet regime after World War II. He grew up in the state of Washington and later moved to California. In the 1990s, Szabo became involved in the Cypherpunk movement, attending in-person meetings in the Bay Area organized by its founding members, including Timothy May and Eric Hughes. Szabo’s interests in cryptography and digital currency would lead him to create his own digital currency, which he called “bit gold.”
Like the other Cypherpunks, Szabo was concerned with the receding guarantees of privacy in an upcoming digital age and took action to stem the tide where he could, but also went beyond that. He was also interested in developing digital forms of money that could operate without the need for central authorities. He was a vocal opponent of the Clipper chip, which was proposed in the 1990s as a way for law enforcement to have access to encrypted communications. Szabo argued that the chip would undermine privacy and security, and he worked to raise awareness of the issue among the general public. Ultimately, the Clipper chip was not widely adopted due in part to the efforts of Szabo and others in the Cypherpunk community.
Szabo realized that in order for Smart Contracts to be effective, they needed a native cryptocurrency that could be used to incentivize participants to follow through with their obligations. This would create a system of self-enforcing contracts that could operate independently of any government or central authority. He called this hypothetical currency “bit gold.” The idea was that each bit of this currency would be created through a process of solving complex mathematical problems, similar to how gold is mined from the earth. But Smart Contracts were only part of the puzzle. The second tool Szabo needed in order to realize his “Galt’s Gulch” was possibly even more important: money.
Szabo believed that money was a crucial component for the creation of a stateless, non-violent society. He saw money as a means to enable trade and cooperation without relying on any centralized authority or intermediary. In his essay “Shelling Out: The Origins of Money,” Szabo explained how the use of money has been embedded in human nature, and he identified the qualities that make certain objects better suited to serve as money than others. He also showed interest in free banking, a monetary system in which private banks issue their own currency, not tied to any particular state, and let the free market decide which currency to use.
Indeed, the risks associated with centralized systems would become a recurring theme in Szabo’s work. As he continued to develop his ideas around Smart Contracts and decentralized systems, he became increasingly convinced that centralized authorities represented a point of vulnerability that could be exploited by both external and internal actors. In contrast, he believed that decentralized systems, where trust was distributed across the network rather than concentrated in the hands of a few individuals or organizations, represented a more secure and robust way of organizing human affairs.
Szabo wanted to create a new form of money that did not depend on trust in any third party, and he sought to create a digital gold that was both digital and scarce, with its value accurately approximated by simple observations or measurements.
Eventually, Szabo created Bit Gold in 1998, but he described it publicly in 2005. Bit Gold was a proposed digital money scheme that consisted of a combination of solutions, some of which resembled previous electronic cash concepts. The central property of Bit Gold was Proof of Work, which required computing power to produce unforgeable proofs of work. This represented the unforgeable costliness that he was looking for in a digital currency.
In the 2000s, Szabo earned a law degree to better understand the legal and contractual implications of his ideas for the online world. He also began publishing his ideas on his blog, “Unenumerated,” which covers a wide range of topics. In 2008, Szabo returned to the idea of Bit Gold and began working on a first implementation of the concept.
However, the idea of bit gold was never fully realized, but it laid the foundation for the development of Bitcoin, which was created over a decade later.
The Bitcoin Core development team controls code changes into Bitcoin Core’s GitHub repository. However, the development process is open-source, and anyone can participate by proposing changes or commenting on proposed changes. Changes are reviewed by the core developers, and if they are deemed appropriate, they are merged into the codebase. The process is transparent and open to the public, with discussions and decisions taking place on various communication channels, such as mailing lists, GitHub, and IRC. Ultimately, the community of Bitcoin users and miners decides whether to adopt any changes to the codebase through a process of social consensus.
In terms of corporate structure, there is no no particular concept of “Bitcoin core developers” in the sense of privileged people. Open source prompts a meritocracy where developers earn trust from the community over time. The hierarchical roles are only in place for practical purposes, in order to ensure a proper release cycle and code review process.
Bitcoin core contributors: https://github.com/bitcoin/bitcoin/graphs/contributors
Bitcon core is an open-source project and anyone is welcome to contribute towards its development, whether it is in the form of peer reviews, testing, or patches.
Whether a pull request is merged into Bitcoin Core is a decision that will be made by the maintainers of the project. They will take into consideration if a patch is in line with the general principles of the project, if it meets the minimum standards for inclusion, and will judge the general consensus of contributors.
As a rule of thumb, all pull requests must:
Patches and upgrades that can change Bitcoin consensus rules are considerably more involved, since they affect the entire ecosystem and must be preceded by extensive mailing list discussions as well as a numbered BIP (Bitcoin Improvement Proposals).
Anyone may participate in the peer review process by engaging in discussions and comments on ongoing pull requests. Typically, reviewers will review the code for errors, suggest improvements, as well as test out the change set and provide feedback on the technical merits of the patch.
In general, if a code review does not warrant the review effort that is required, the pull request is likely to be rejected. In that case, it is up to the author to convince reviewers about why those changes are relevant and should be added to the codebase.
The first review is known as a conceptual review, where the reviewer leaves one of the following comments:
All NACKs must include a rationale explaining why the change is not worthwhile.
After the conceptual review, an actual code review takes place, which is followed by a description explaining how the reviewer has proceeded to do the review. Project maintainers also reserve the right to weigh the opinions of peer reviewers. These maintainers are developers and reputable members in the Bitcoin community who have demonstrated clear domain expertise and experience.
As most reviewers are themselves developers working on their own projects, the review process can be quite lengthy and might even take several months. There might be a number of reasons for it:
Coding conventions: https://github.com/bitcoin/bitcoin/blob/master/doc/developer-notes.md
Bitcoin core PR Review Club weekly meeting:
Repository for GUI-related issues: https://github.com/bitcoin-core/gui
“Being open source means anyone can independently review the code. If it was closed source, nobody could verify the security. I think it is essential for a program of this nature to be open source” – Satoshi Nakamoto
In section 11 of the Bitcoin whitepaper, Satoshi Nakamoto explained that an honest mining majority will always outrun a dishonest minority. According to this statement, this would ensure that transactions are practically irreversible once they have sufficient confirmations. This would solve the classic double-spend problem.
However, as first explained by the Israeli mathematician Meni Rosenfeld back in 2012, Satoshi made some simplified assumptions. For example, while Bitcoin mining is a random process, Satoshis did not fully consider that honest miners can be just as lucky as dishonest miners. Cyril Grunspan, mathematician at École Supérieure d’Ingénieurs Léonard de Vinci, and Ricardo Pérez-Marco, mathematician at the French National Center for Scientific Research, iterated over the original research by Meni Rosenfeld and published a new paper that corrected Satoshi’s mistake.
Satoshi had made a wrong assumption: that honest miners use exactly as much time to find a block as they would on average. This is only a rough approximation of reality, since the time used by honest miners to mine a block is not deterministic and, therefore, the distribution of the number of blocks that could be mined by an attacker would follow a negative binomial distribution instead of the assumed Poisson law.
In other words, the Bitcoin whitepaper assumes that two factors are needed to estimate how irreversible a transaction is. Satoshi rightly assumed that the share of total hash power available to the attacker is one factor. This explains that, as an attacker controls more hash powers, more confirmations are needed. He also rightly assumed that the number of confirmations is another factor: the more confirmations a transaction has, the more secure it is. However, Grunspan and Perez-Marco came up with a third factor: the deviation from the average mining time, which can be described as how lucky honest miners are in finding blocks. If they are very lucky, and find blocks faster than the average, their chain will probably be further ahead; the attacker will have had less time to secretly mine an alternative chain. On the other hand, if the honest miners are unlucky and find blocks slower than the average, they will probably be less far ahead and the attacker will have had more time to mine an alternative chain.
The figure above shows the probability of a successful double spend, as a function of the attacker’s hahrate for different values of the number of confirmations (in logarithmic scale).
Despite this breakthrough, the basic premise of the whitepaper still holds up. Bitcoin works as intended. This piece of research showed that the probability of double spends drops exponentially to zero as the honest mining majority finds more blocks. In other words, it becomes increasingly difficult for minority attackers to catch up and overtake the honest majority.
The outcome is that the security assumptions stated in the original whitepaper needed to be tweaked a bit. Rather than just accounting for the amount of hash power an attacker has and the number of blocks the attacker is behind, the deviation from the average mining time needs to be accounted for as well. This information could be relevant for monitoring risk.
As an example, if a merchant always waits for six confirmations before sending his goods to a customer, that means that, on average, they are comfortable with a level risk that is 60 minutes on average. But sometimes he’ll have to wait for two hours before six blocks are found. If that happens, the double-spend risk is also higher. So for the same level of security, he’ll actually have to wait for a seventh confirmation. While if the confirmations come in much faster, he should be fine even with five confirmations.
“Satoshi was a genius, but he was not a mathematician” – Grunspan
The definition of a cypherpunk tends to vary based on whom you ask, but the generally accepted definition of a cypherpunk is anyone who uses strong cryptography in an effort to enact social or political change. The cypherpunks first came to prominence via the cypherpunks mailing list in the ‘90s. Their philosophy is best described by The Crypto Anarchist Manifesto, by Timothy C. May.
Bitcoin is a cypherpunk’s dream. It represented a working form of digital cash that many cypherpunks had failed to create in the past. Bitcoin changed the view of what is technically possible in the world today, and it did so at a time when the philosophies of the cypherpunks were starting to die off.
In Bitcoin’s first block, Satoshi included the headline “The Times 03/Jan/2009 Chancellor on brink of second bailout for banks”, possibly as a timestamp for the launch of the network, but also as a commentary on Bitcoin’s role in the economy.
The Bitcoin Pizza Day is a celebratory day on May 22nd, which marks the first real-world transaction involving bitcoin. On May 22nd, 2010, a man named Laszlo Hanyecz paid 10,000 bitcoins for two pizzas from Papa John’s (~$41). This transaction is now recognized as the first real-world purchase using Bitcoin as a currency, and has since become a celebrated event within the cryptocurrency community.
This happened when Bitcoin was only a year old and trading for less than a penny. However, up until that day, no one had ever spent bitcoin on anything. At the time, Satoshi was still active on Bitcointalk, where he communicated and shared notes with other enthusiasts.
Although Laszlo’s popularity is largely attributed to this anecdote, he is an active developer with large contributions to the field of GPU mining. His contributions include building and deploying the first macOS Bitcoin Core release.
“A trade happens because both parties think they’re getting a good deal. I felt like I was beating the internet, getting free food. I was like, ‘Man, I got these GPUs linked together, now I’m going to mine twice as fast. I’m just going to be eating free food; I’ll never have to buy food again.”
The first halving in Bitcoin’s history occurred on November 28, 2012, when the Block Reward was reduced from 50 BTC to 25 BTC. The event was significant because it marked the first time the reward for mining a block was cut in half, which had an impact on the supply and inflation rate of Bitcoin. However, this was a relatively small event in the grand scheme of Bitcoin’s history.
In March 2013, a software bug caused a fork in the blockchain, resulting in two separate versions of the Bitcoin software running at the same time. The bug was the result of a coding oversight for the upgrade of the Bitcoin software from version 0.7 to 0.8. For 6 hours, two versions of the Bitcoin ledger existed simultaneously. This led to temporary confusion and a drop in the Bitcoin price of about 24%. 25 transactions were created in an erroneous chain that was later abandoned when developers decided to switch back to version 0.7. Bitcoin developers contacted major exchanges and mining pools and made the switch back to the old version. The bug was quickly fixed and the blockchain was reverted to a single version with the help of the majority of the Bitcoin community.
Even if developers had not intervened, the 2013 fork would have probably resolved on its own, when more and more miners moved to version 0.8.
MtGox was a Bitcoin exchange based in Tokyo, Japan, that was launched in 2010. It quickly became one of the largest Bitcoin exchanges, handling over 70% of all Bitcoin transactions in 2013. However, in 2014, MtGox filed for bankruptcy after approximately 850,000 Bitcoins (worth around $450 million at the time) were stolen or lost from the exchange.
The founding story took place between 2006 and 2010. In late 2006, Jed McCaleb aspired to build a website for users of the Magic The Gathering Online tradable card game, to let them trade “Magic: The Gathering Online” cards like stocks. One year later, in 2007, he purchased the domain name mtgox.com, short for “Magic: The Gathering Online Exchange”. The service went live for approximately until Jed moved on to work on other projects, having decided that pursuing this business was not worth his time. However, in 2010, McCaleb found out about Bitcoin on Slashdot and decided that the Bitcoin community needed an exchange for trading Bitcoin and regular currencies.
McCaleb started running the exchange until he sold the exchange to Mark Karpeles in March 2011. At the time, Mt. Gox was plagued with security issues that would become its downfall. The 2011 hack came just a few months after Mark Karpelès purchased the exchange. The hacker, upon access, artificially altered the nominal value of Bitcoin all the way down to one cent and then transferred 2,000 BTC from Mt. Gox customer accounts onto the exchange. These Bitcoins were sold, and in the brief moment that Bitcoin appeared to be worth a single penny, 650 were purchased.
The 2011 hack was a brief but severe setback for Mt. Gox, but the exchange put in new security measures and stabilized, becoming the largest exchange by 2013. These security measures, however, weren’t enough and it is believed that there was an ongoing theft that was the result of a long-running hack or series of hacks that allowed the attacker(s) to slowly siphon off large amounts of Bitcoin over time.
The loss of these funds severely affected the price of Bitcoin at the time and caused a great deal of controversy and speculation within the cryptocurrency community. In early February of 2014, Mt. Gox stopped Bitcoin withdrawals. A few weeks later, all trading was stopped.
After filing for bankruptcy, MtGox’s assets were seized by a Japanese court, and its CEO, Mark Karpeles, was arrested and charged with embezzlement and fraud. The bankruptcy proceedings and the investigation into the theft of the Bitcoins from MtGox lasted several years and affected the trust and reputation of Bitcoin as a whole.
The Silk Road case was groundbreaking, as it was one of the first large-scale cases involving Bitcoin and dark web marketplaces. It highlighted the challenges that law enforcement agencies face when trying to investigate and prosecute illegal activities on the Internet.
Silk Road has been a fixture in Bitcoin’s history since the currency first caught the attention of mainstream media. It was an online marketplace for goods where users could transact in a permissionless manner using Bitcoin. The website had an Ebay-like interface, and allowed for buying and selling drugs, pirated digital goods, weapons, books on topics such as computer hacking and drug manufacture, counterfeits and forgeries, fake passports, and government IDs… Payments were facilitated by an escrow system that mixed all incoming and outgoing coins in order to obscure their origin. This granted its users complete anonymity, on top of the fact that the website was hosted and operated as a “hidden service” on the Tor network, also known as the “dark web”. Silk Road was run by a user who was known to others only as “Dread Pirate Roberts”.
The Tor network, also known as The Onion Router, is a free and open-source software designed to enable anonymous communication online. The network is composed of volunteers who operate servers and relays, and its main purpose is to protect users’ privacy and security by preventing anyone from tracking their online activity, including their location and the websites they visit.
Tor works by encrypting and routing internet traffic through a series of relays, making it difficult for anyone to identify the original source of the data. This makes Tor a popular tool for whistleblowers, journalists, activists, and others who need to protect their online identity and communications.
Tor attracted different profiles of users for different reasons. Some were looking for a safe and convenient way to buy and sell illegal items, others were looking for cheaper goods, and others would be simply following an ideological belief, particularly around libertarianism and the belief that the government should not control the freedom of Internet users.
Silk Road first truly broke into the public eye on June 1, 2011, when an article on gawker.com made a detailed review of the service. A few days later, the US government caught on, and senators Charles Schumer and Joe Manchin called for the website to be shut down immediately, proclaiming that “Never before has a website so brazenly peddled illegal drugs online” and “by cracking down on the website immediately, we can help stop these drugs from flooding our streets.”
One of the factors contributing to Silk Road’s cohesive community and initial success was the high level of trust. Scams are a serious problem on the darknet because of the anonymity of the participants and the fact that going to the police for help necessarily implies confessing to a crime. At the time, Silk Road was one of the few places that attempted to counteract this with a reputation system and a built-in escrow service.
The default way of making transactions in Silk Road is that the buyer sends his funds not to the seller directly but to the escrow system. When this happens, the system notifies the seller that it has received and is holding the funds. Once the buyer receives the product, he notifies the escrow system that the transaction was successful, and the seller gets his money.
One major controversy among the service’s users is that of morality. There have been instances of people putting up images that constitute child pornography in some jurisdictions but are acceptable in others. There have also been requests for credit card skimming devices, which were not allowed under “Silk Road law”, but which some people believed were no more immoral than counterfeits and drugs. Weapons were another concern. In such cases, Dread Pirate Roberts eventually resolved that particular issue with the middle-of-the-road option of banning them from Silk Road itself but allowing them on a specifically designed sister site called “The Armory”. Services such as theft and contract killing were banned from Silk Road and The Armory entirely, although some Silk Road users would point buyers interested in such goods to a competing site with no moral restrictions at all, Black Market Reloaded.
“Bitcoin would be convenient for people who don’t have a credit card or don’t want to use the cards they have, either don’t want the spouse to see it on the bill or don’t trust giving their number to “porn guys”, or afraid of recurring billing.“ – Satoshi Nakamoto
In May 2013, Silk Road was taken down for a short period of time as a result of a sustained DDoS attack. One month later, it was reported that the DEA had seized 11.02 bitcoins, worth $814 at the time, which the media suspected was a result of a honeypot. The FBI claimed that the real IP address of the Silk Road server was found via data leaked directly from the site’s CAPTCHA and that it was located in Reykjavík, Iceland.
Dread Pirate Roberts was arrested on October 2 2013 in Glen Park Library, a branch of San Francisco’s public library. The person behind the pseudonymous username, Ross Ulbricht, was indicted on charges of money laundering, computer hacking, conspiracy to traffic narcotics, and attempting to have 6 people killed. Even though prosecutors alleged that Ulbricht had paid $730,000 to others to commit the murders, none of the murders actually occurred. Ultimately, Ross was not prosecuted for any of the alleged murder attempts.
The FBI seized 26,000 bitcoins from accounts on Silk Road, worth approximately $3.6 million at the time. The FBI would hold the bitcoins until Ulbricht’s trial finished, after which the bitcoins would be liquidated. Days later, the FBI reported that it had seized 144,000 bitcoins belonging to Ulbricht, worth $28.5 million at the time. One year later, the U.S. Marshals Service sold 29,657 bitcoins in 10 blocks in an online auction, estimated to be worth $18 million. Another 144,342 bitcoins which had been found on Ulbricht’s computer were kept (roughly $87 million). Famous venture capital investor Tim Draper bought the bitcoins at the auction with an estimated worth of $17 million, to lend them to a bitcoin start-up called Vaurum which is working in developing economies of emerging markets.
Ulbricht’s trial began on 13 January 2015 in a federal court in Manhattan, where he admitted being the founder of Silk Road but that he had transferred control of the site to other people soon after he founded it. The jury ended up convicting Ulbrich of charges such as engaging in a continuing criminal enterprise, narcotics trafficking, money laundering, and computer hacking.
Two federal agents, DEA agent Carl Mark Force IV and Secret Service agent Shaun W. Bridges, were also arrested and convicted for corruption and stealing bitcoin during the Silk Road investigation. Force had used an alias and stolen bitcoins from Ross, while Bridges had stolen additional bitcoins from Silk Road during the investigation. Both agents were sentenced to prison for their crimes. Additionally, two former agents who had worked on the investigation, Chris Tarbell and Andrew Jones, went on to work for private companies offering cryptocurrency-related services.
In his letter to the judge before his sentencing, Ulbricht admitted that he had committed his actions through libertarian idealism, but also acknowledged that he made a “terrible mistake” that “ruined his life”. May 29, 2015, he was sentenced to five concurrent sentences, including two life imprisonments without parole and was ordered to forfeit $183 million.
Wikileaks is a non-profit organization that was founded in 2006 by Julian Assange. The Australian editor and cypherpunk activist founded Wikileaks with the main purpose to publish classified and sensitive information from anonymous sources. This would promote transparency and hold governments and other organizations accountable for their actions.
Four years later, Wikileaks became well-known for publishing a large number of classified U.S. government documents, including diplomatic cables and military records, that were leaked by former U.S. Army intelligence analyst Chelsea Manning. The release of these documents caused controversy and raised questions about government secrecy and the role of whistleblowers.
In response to the publication of the classified documents, various payment processors and financial institutions, including Visa, Mastercard, PayPal, and Bank of America, cut off their services to Wikileaks. This made it difficult for the organization to receive donations and continue its operations. This is where Bitcoin comes in as a censorship-resistant alternative for fundraising and donations. Since then, bitcoin has become associated with Wikileaks and other organizations that have faced financial censorship or government pressure to shut down their operations.
“Overnight practically, PayPal, Visa, Mastercard, they just shut off WikiLeaks from 97% of its revenue which came through (donations via the platforms). And how was it done? It was done completely extralegally. It was a phone call from a few senators in the U.S. to these companies, and they just shut it off.” – Stella Assange
One of the latest posts of Satoshi Nakamoto in 2010 made a direct reference to the emerging story of Wikileaks:
“The project needs to grow gradually so the software can be strengthened along the way. I make this appeal to WikiLeaks not to try to use Bitcoin. Bitcoin is a small beta community in its infancy. You would not stand to get more than pocket change, and the heat you would bring would likely destroy us at this stage.” – Satoshi Nakamoto
“ It would have been nice to get this attention in any other context. WikiLeaks has kicked the hornet’s nest, and the swarm is headed towards us.” – Satoshi Nakamoto
After reading these comments, Assange confirmed that the WikiLeaks team had looked into the matter and that they agreed with Nakamoto. As a result, they decided against accepting bitcoin donations at such an early date, giving the cryptocurrency more time to mature and establish itself as an alternative method of payment.
“Bitcoin is an extremely important innovation, but not in the way most people think. Bitcoin’s real innovation is a globally verifiable proof publishing at a certain time. The whole system is built on that concept and many other systems can also be built on it. The blockchain nails down history, breaking Orwell’s dictum of ‘He who controls the present controls the past and he who controls the past controls the future.” – Julian Assange
In the United States, the first Bitcoin ETF was approved in October 2021, allowing investors to gain exposure to Bitcoin through a regulated financial instrument traded on a major stock exchange. Prior to that, some countries such as Canada and Europe had already approved Bitcoin ETFs.
The first Bitcoin ETF was approved for trading on the Toronto Stock Exchange on February 18, 2021. This represented the most significant level of adoption of cryptocurrencies by the traditional banking and finance system to date.
In 2013, Bitcoin Core contributor Gregory Maxwell introduced the idea of CoinJoin as a solution to the poor privacy of Bitcoin transactions. However, it wasn’t until August of that year that he launched a multi-signature escrow bounty fund to incentivize the development of a practical CoinJoin tool. Shortly thereafter, Bitcoin developer Amir Taaki and programmer Martin quickly built an early version of a CoinJoin mixing tool, which allowed users to contribute a fixed amount of Bitcoin and create a transaction returning the same amount of funds back to each of them.
By merging multiple transactions into a single transaction, it becomes unclear which address belongs to which user, breaking the multiple-input heuristic which is often used for blockchain analysis. This improves privacy for both individuals and businesses who use Bitcoin.
This simple tool was just the beginning, as Taaki and a small group of like-minded Bitcoiners started a crowdfunding project to realize a privacy-focused wallet with a CoinJoin mixer built in. The project raised over $50,000 from more than 1,000 donors around the world and the team met in Milan to design the wallet with a group of programmers. However, the project attracted controversy as it was promoted as a money laundering tool, with the name “Dark Wallet” referring to the FBI’s warning that strong encryption could make the internet “go dark”.
In 2014, unSystem released Dark Wallet’s first alpha software, a user-friendly Chrome extension featuring several privacy tools, including stealth addresses and hierarchical deterministic wallets. The wallet also included a CoinJoin tool that allowed users to merge transactions and gain privacy. Dark Wallet’s alpha release attracted mainstream media attention and was even noticed by the Islamic State, who showed interest in using the wallet to hide their tracks. Despite this, the unSystem team continued to develop the wallet without concern.
Development of the Dark Wallet continued throughout 2014, with the alpha 8 version released in 2015. The wallet featured several privacy tools, including stealth addresses and a CoinJoin tool. However, funds were running low, and the project’s public face, Taaki, left to fight in Syria. The lead developer, Martin, also disappeared, causing development to stall. Nevertheless, the project served as an inspiration for other privacy-focused developers, and the unSystem group emphasized Bitcoin’s anti-establishment roots and created a first-generation set of Bitcoin privacy tools.
Then, Chris Belcher designed JoinMarket, a CoinJoin application, after realizing that few users offered their coins to be mixed in the Dark Wallet alpha release. Two other privacy-focused wallets, Samourai Wallet and a project by privacy researcher Adam Ficsór, also included various privacy tools. Samourai Wallet and Ficsór’s project announced in mid-2017 that they were working on a mixing tool inspired by Maxwell’s original CoinJoin post, which would let dozens of users mix their coins at once.
CoinJoin has become a standard privacy tool and is being used by Samourai Wallet’s “Whirlpool,” Wasabi Wallet, and JoinMarket. Advancements in techniques such as PayJoin, SNICKER, and Knapsack mixing are expected to further enhance the potential of CoinJoin. Taaki, the face of the Dark Wallet project, has reunited with its lead developer Martin and has set up an academy in Barcelona to inspire the creation of projects that promote privacy and autonomy, which may include a revival of Dark Wallet.
A CoinJoin is a trustless method for combining multiple Bitcoin payments from multiple spenders into a single transaction. This makes it more difficult for outside parties to determine which spender paid which recipient or recipients. Unlike many other privacy solutions, CoinJoin transactions do not require a modification to the Bitcoin protocol.
In Bitcoin, each input is an output from a past transaction, and the protocol makes sure that the inputs exist and are spendable, and that the sum of the output values is less than or equal to the sum of the input values (any excess represents fees that are paid to miners).
In the illustration above, the second transaction spends coins which are assigned to two outputs. To understand CoinJoins, we start off by negating the assumption that both outputs belong to the same party. Usage in a single transaction does not prove common control, and this is what makes CoinJoin possible: the signatures inside a single transaction are completely independent of each other. This means that it’s possible for Bitcoin users to agree on a set of inputs to spend, and a set of outputs to pay to, and then to individually and separately sign a transaction and later merge their signatures. The resulting transaction is not valid and will not be accepted by the network until all signatures are provided.
As a more practical example, when you want to make a payment, you could find someone else who also wants to make a payment and make a joint payment together. Doing so will not significantly increase your level of privacy,, but it can make your transaction smaller and easier on the network (lower in fees). From the outside, such a transaction is indistinguishable from a transaction created through conventional use.
Example of a 2-party CoinJoin transaction: https://chain.localbitcoins.com/tx/c38aac9910f327700e0f199972eed8ea7c6b1920e965f9cb48a92973e7325046
Example of a 3-party CoinJoin transaction: https://chain.localbitcoins.com/tx/92a78def188053081187b847b267f0bfabf28368e9a7a642780ce46a78f551ba
There are some considerations that users must account for:
After performing a CoinJoin, it is recommended to be aware of future spending habits:
While mixing can be done through a server-based model or a decentralized model, the main issue with the server-based model is that the server controller can access the participants’ data, while the decentralized model lacks liquidity. JoinMarket is a marketplace for CoinJoin transactions that allows users to offer spots for a small fee or buy access to CoinJoin transactions. Samourai Wallet also offers a CoinJoin imitation feature to throw off blockchain analysis.
CoinJoin can mix inputs and outputs effectively, but it may not be enough to protect privacy if the amounts being sent and received are revealing. If the amounts of inputs and outputs are easily connected, it can still be possible to trace transactions.
For example, If one input sends 4.9 bitcoins, another input sends 2.7 bitcoins and a third input sends 0.8 bitcoins, while one output receives 4.9 bitcoins, one receives 2.7 bitcoins and a third receives 0.8 bitcoins, then it’s simple to connect inputs to outputs.
Another risk associated with CoinJoin transactions is the possibility of Sybil attacks where seemingly multiple participants can be controlled by a single entity monitoring the transaction. There is no easy solution to this problem, but as more genuine users mix their coins, the possibility of successful Sybil attacks decreases.
Lastly, CoinJoin is still not widely adopted by wallets and the available implementations like JoinMarket require special software and fees. Therefore, it is still a hassle for users to use it.
Bitcoin is not entirely anonymous since Bitcoin addresses can be linked to real-world identities. Analyzing the public blockchain, monitoring the unencrypted peer-to-peer network, and complying with KYC or AML regulations can provide insights into who is using Bitcoin and for what purposes.
To enhance privacy, it is possible to hide the amount of bitcoins transacted. An early version of this concept then referred to as “bitcoins with homomorphic value,” was first proposed in 2013 by hashcash inventor and current Blockstream president Dr. Adam Back. The idea was later picked up by Bitcoin Core and Blockstream developers Gregory Maxwell and Dr. Pieter Wuille and Blockstream mathematician Andrew Poelstra. This eventually led to the implementation of Confidential Transactions in Blockstream’s testnet-sidechain, Alpha.
Confidential Transactions use cryptographic techniques like Borromean ring signatures and Pedersen commitment schemes to hide transaction amounts from anyone except the sender and receiver. However, masked amounts can still be used for certain types of calculations without being revealed. This allows nodes to verify that no bitcoins were created without knowing the actual amount sent. The mining fee is always visible, but other amounts can be made visible if desired.
It can also be implemented in Bitcoin through a soft fork, with upgraded and non-upgraded nodes staying in sync by using an “anyone-can-spend” address as an intermediate step. Old nodes would see this as a regular address, while new nodes would recognize it as part of a Confidential Transaction and require the correct signature. As long as most nodes follow the new rules, the bitcoins on the anyone-can-spend address would be secure.
An “anyone-can-spend” address to cloak transaction amounts is also used by Confident Transactions. New nodes recognize this as a Confidential Transaction, but old nodes see it as a zero-bitcoin transaction. This doesn’t cause issues because bitcoins received through a Confidential Transaction can only be spent in the same way and are temporarily locked up in the anyone-can-spend address. To spend them normally, they must first be sent back to the anyone-can-spend address. As a result, the anyone-can-spend address acts as a cloaking device and makes subsequent transactions invisible to all nodes until the bitcoins are sent back to the address.
Confidential Transactions can help mask the amounts in Bitcoin transactions, but they are not a complete solution for privacy. One potential weakness is that the sending and receiving addresses are still visible. To obfuscate where the bitcoins really went, false negatives can be created and Confidential Transactions can be combined with CoinJoin. Also, Confidential Transactions are only effective if widely used, but they are quite resource-heavy and cost significantly more than typical transactions. The large size of Confidential Transactions also poses a challenge for scalability and decentralization.
However, keeping scalability in mind, Blockstream has been focused on making Confidential Transactions as efficient as possible. When Confidential Transactions is combined with CoinJoin, it becomes much more difficult to censor transactions as a Miner because there is more difficulty associated with identifying the individuals behind specific transactions.
Finally, not everyone agrees that Bitcoin should be more private or fungible, which could complicate any potential soft forks to implement these changes.
Bitcoin is not a protocol optimized for privacy. The only privacy that exists in Bitcoin comes from pseudonymous addresses, which are fragile and easily compromised through reuse, “taint” analysis, tracking payments, IP address monitoring nodes, web-spidering, and many other mechanisms.
“Bitcoin is still very new and has not been independently analyzed. If you’re serious about privacy, TOR is an advisable precaution.” – Satoshi Nakamoto.
The Bitcoin blockchain is completely public and anyone can go to a block explorer and look up any transaction, analyze it, and start building a picture of an entity’s spending habits. This is exactly what blockchain analytics firms do. Using a series of assumptions, they can cluster transactions together to follow the movements of a given entity across the chain.
CoinJoins are one of the most effective privacy tools. The way these transactions are constructed makes it very difficult to know exactly which transaction output belongs to which of their input owners. A proper CoinJoin implementation completely breaks all deterministic links with the coins’ pre-CoinJoin history. At best, anyone can look at the transaction and hypothesize with a series of plausible scenarios, but they can never be 100% sure.
There have been multiple upgrades to Bitcoin that have improved overall privacy.
The Segregated Witness upgrade in 2017 made performing advanced scripting updates to the Bitcoin codebase significantly easier. The upgrade improved Bitcoin users’ transaction privacy by enabling future updates such as the addition of Schnorr Signatures and support for sidechains.
Schnorr signatures are a method of signing Bitcoin transactions that was recently added to Taproot as part of an upgrade. Unlike ECDSA signatures, Schnorr signatures allow for the consolidation of multiple signatures into a single one, enhancing privacy and making multi-signature and smart contract transactions more accessible and affordable. They not only improve transaction privacy but also facilitate scaling by reducing the size of multi-signature transactions.
Taproot is a 2021 upgrade to the Bitcoin Core codebase with the goal of improving transaction privacy while reducing the amount of data required to complete sophisticated sidechain transactions, resulting in significant fee reductions. Additionally, the privacy benefit will be extended to apps that make use of time-locked contracts, such as CoinSwap, which combines Bitcoin transactions to obscure the origin and destination of the transaction.
Similar to this is how the Lightning Network, a second-layer network for aggregating off-chain transactions, operates. Taproot will encrypt these applications. Taproot combines Schnorr signatures with Merkelized Abstract Syntax Trees (MAST) — a technique for concealing a smart contract’s unexecuted branches. It enhances privacy and scalability by removing data from the blockchain.
Taproot enhances the privacy of transactions on sidechain protocols such as the Lightning Network, CoinSwap, multi-signature, and Smart Contracts by making them appear identical to standard single-signature on-chain transactions.
Lightning Network Privacy Enhancements
Lightning Network is an off-chain transaction solution. Its security approach is almost identical to that of on-chain Bitcoin transactions.
Lightning Network transactions are fast and cost-effective compared to on-chain transactions. Two-way payment channels are created between nodes and transactions are routed through these channels. Transactions can also be routed through intermediary nodes, allowing for indirect connections between nodes. These transactions occur off-chain and are not broadcasted to all network nodes or recorded in a public blockchain, providing greater privacy and protection against adversarial attacks. The Lightning protocol uses onion routing to conceal the identity of intermediate nodes and prevent them from discovering the length or position of the route.
In Bitcoin, it is recommended for users to avoid reusing their wallet addresses. Also, it is a good practice to keep your Bitcoin separated from one another. This process is called segregation and can be achieved with wallets that support a feature known as coin control. For example, if you are holding 1 BTC split between two UTXOs of 0.5 BTC and you want to transfer 0.6 BTC, this transaction would result in your wallet combining those 2 UTXOs together in order to create an output that pays 0.6 BTC and you would be left with a change of 0.4 BTC (minus fees). However, we could imagine a hypothetical scenario where one of your 0.5 BTC was a change output from a blacklisted service, and the person you are transferring the funds to is a regulated entity that is actively performing on-chain analysis. In that scenario, they could refuse access to their service, block your account, or report your identity to the authorities.
The only tradeoff that comes with labeling your UTXOs and practicing coin control is the minimal extra overhead and steps required to do so. If you do not label and specify which UTXOs you want to spend in a transaction, your wallet will automatically do it for you
In Bitcoin, if you are not running your own node to verify your transactions, then you are trusting someone else’s node and abiding by their rules, which could be allowing false transactions to hit your wallet, leading you to believe you are receiving Bitcoin when in reality you are not.
From a privacy perspective, trusting someone else’s node means that they can see every transaction you send, every transaction you receive, all of your balances and, in some cases, even the addresses in your wallet.
Bitcoin is a financial system that operates independently from traditional banking. It allows users to hold money without relying on a third party, putting the responsibility of asset security and accessibility on the user. Setting up a Bitcoin account on a home computer is simple and quick, allowing users to create unlimited distinct accounts. To protect privacy, it is recommended to create a unique Bitcoin address for each payment received, and have various wallets available for different purposes. Decoupling individual transactions is crucial to maintaining privacy, as individuals sending money do not know about additional Bitcoin addresses or their use.
This is an established method for severing the transaction graph. Additionally, “tumblers” or “washers” are used to refer to them. A user sends bitcoins to a mixing service, which in exchange for a fee sends the user different bitcoins. Theoretically, a party observing the blockchain would be unable to connect incoming and outgoing transactions.
TumbleBit is a 2016 anonymous payment protocol that is backward compatible with the current state of the Bitcoin protocol. TumbleBit allows parties to conduct transactions through an untrusted tumbler. Nobody knows who paid who during the TumbleBit epoch, not even the Tumbler. This is accomplished via a cryptographic mechanism in which the server facilitates the exchange of private digital signatures.
Anyone interested in privacy or Bitcoin will find the protocol extremely interesting. Because hundreds of users can perform this concurrently, transaction anonymity is maintained, as a large number of transactions (> 500) can be settled on the blockchain using only two transactions.
CoinSwap is a non-custodial privacy technique for Bitcoin based on the concept of atomic swaps. CoinSwaps may appear to be identical to any other blockchain transaction. They make it possible for bitcoins to teleport undetectably to any other address on the blockchain. Non-CoinSwap transactions would benefit, as a large-scale blockchain analyst, such as one employed by a transaction surveillance company, can never be certain that ordinary transactions are not CoinSwaps. Additionally, they occupy a small amount of block space relative to the amount of privacy they provide.
CoinSwaps necessitate a high degree of interaction between the parties involved, which can make designing this type of system challenging while avoiding denial-of-service attacks. Additionally, they have aliveness and non-censorship requirements, which means that the entities participating must always have unrestricted access to the Bitcoin network; if the internet goes down for days or weeks, half-completed CoinSwaps may result in the theft of one party’s funds.
CoinJoin is a simple protocol that enables strangers to pool their transactions. As the transaction will contain the inputs and outputs of multiple users, this helps conceal the destination address to which a single user sends data. Coinjoin transactions are a subset of Bitcoin transactions in which multiple individuals or entities collaborate to create a single transaction that incorporates all of their inputs. It accomplishes this by violating the heuristic of common input ownership and utilizing Bitcoin’s inherent fungibility within transactions.
This technique has been possible since the inception of Bitcoin and cannot be blocked except in the same way that any other Bitcoin transaction can be blocked. By looking at a transaction, it is impossible to determine for certain whether it is a CoinJoin or not. CoinJoins are non-custodial in nature, as they can be conducted without one party stealing another party’s bitcoins.
The Nakamoto effect, or Cantillon Effect 2.0 refers to the disruptive impact that the introduction of Bitcoin can have on the global economy. This is a testament to how decentralized systems could reshape the world, such that those who live closer to a fixed supply immutable monetary policy such as Bitcoin can receive value creation benefits in a Bitcoin world, rather than being rewarded for privilege, status, or geography.
In this context, Bitcoin is a response to the Cantillon Effect, which describes the fact that new fiat money is created at almost zero cost and given to specific parties, usually banks. When this happens, a series of privileged players, mostly banks, have an opportunity to spend this money on goods and assets whose price has not yet reflected the increase In the money supply. This allows them to buy goods at a discounted rate. As the new money flows from central banks to private banks to investors to ordinary citizens, prices gradually begin to reflect the increase In the money supply. However, by the time ordinary citizens experience the increased money supply, they will be buying goods at higher prices. As a result, the flow of new money through the economy is beneficial to parties that receive the funds first, and less beneficial to those that receive it later on.
The Cantillon Effect occurs when the central bank pumps money into the economy in order to reinflate asset prices during a period of debt deflation (and subsequent recession). Despite the central bank’s efforts, the beneficiaries of freshly produced money will often spend it on commodities and other associated assets rather than fighting the ongoing deflationary trend in debt markets.
The Nakamoto effect is a theory that has been posed as an alternative to the traditional central banking system. In Bitcoin, every ‘miner’ on the network has an equal shot at earning a reward of newly-created bitcoins every 10 minutes
The story of fiat began in the 17th century, with the debut of paper money on the modern world scene. Initially, this paper money was backed by some form of commodity money, like gold or silver. Carrying and holding paper was simply more reliable and far more convenient than holding the actual precious metals that backed them. Over time, however, the government or bank in charge of printing the money issued more paper than it had metal to back it. Whether or not this was the “right” thing to do is a matter of debate, but once the devaluation process began, it inevitably spiraled, with more and more bills being issued at less and less value.
Gold is cumbersome to use as a medium of exchange. And while it is true that you can store a large amount of value in a relatively small package of gold, it isn’t very practical. This is the reason why the term coinage was invented. This would make it possible to mint coins in lower denominations that are more portable and interchangeable. However, the first episodes of currency debasement under this system date back to the fall of the Roman Empire. Caesar decided to start clipping coins. They would take a clip out of the sides of the coins (figure 5) and melt down these snippets into freshly minted coins while expecting people to maintain the belief that their purchasing power hadn’t diminished. Then they started diluting the mix of metals in the coinage further and again expected the citizens not to notice/care.
Soldiers demanded far higher wages as the quality of the coins diminished.
“Banks must be trusted to hold our money and transfer it electronically, but they lend it out in waves of credit bubbles with barely a fraction in reserve. We have to trust them with our privacy, trust them not to let identity thieves drain our accounts. Their massive overhead costs make micropayments impossible.” – Satoshi Nakamoto
For instance, a study of fiat currencies in the 20th century found that there were 56 episodes of hyperinflation. Another study found that the average life expectancy for a fiat currency is 27 years: 20 percent failed through hyperinflation (37 currencies experience hyperinflation in the 20th century), 21 percent were destroyed by war, 12 percent were destroyed by independence, 24 percent were monetarily reformed, and only 23 percent are still in circulation.
Of those that remain in circulation, all have lost huge amounts of their original value as measured in commodity money like gold or silver. Founded in 1694, the British pound Sterling is the oldest fiat currency in existence. At the ripe old age of 325 years, it must be considered a highly successful fiat currency. Yet, the British pound was originally defined as 12 ounces of silver, so it’s worth today is about half of 1 percent of its original value.
Similarly, the U.S. dollar was taken off of the gold standard in 1971, when it was 1/35th an ounce of gold. By 2011, it had already lost 97 percent of its value.
One of the main ways in which this devaluation took place is that governments were forced to print money to finance wars. Once one government started doing this, it became a classic prisoner’s dilemma and others had to follow suit. It would be better for everyone if no one fired up the presses, but as soon as one ruler or government warmed them up, then everyone else had to keep up or they risked being conquered.
As a matter of fact, part of the reason why Germany lost World War I and suffered worse inflation of their currency than the Allies was that the German and Austrian bond market was much less developed than the French, English and American markets, which had access to far more capital. Unable to raise money through bond issuances, Germany was forced to print money faster than other powers to finance their war effort.
It’s also worth noting that, in a democratic society, politicians are often unwilling to raise taxes or balance the budget because of the expected voter anger. For them, inflation and the devaluation of the currency are preferable because they constitute a hidden tax. On top of that, the consequences of poor decisions about monetary policy can take decades to show up, while politicians’ terms only last a few years – kicking the can down the road to finance their constituents and the projects of their favorite donors is also a way for them to get re-elected.
Nations and central banks that issue fiat currencies have often historically run into issues ranging between runaway inflationary spells and deflationary debt collapses (e.g., global central bank QE programs were used to defeat this). In the vast majority of cases, government-sanctioned central bank policies ultimately favor inflationary price outcomes that mostly benefit and grow the size, power, and wealth of those entities which tend to be closest to fiat currency creation. Typically governments, central banks, large commercial banks, lobbying corporations, financiers… are the entities who have first access to fiat currency and credit.
Ultimately, all the reasons for devaluation boil down to mismatched incentives between the people in control of the monetary policy and the individuals holding the currency.
One of the fathers of modern central banking is John Law, whose theories warned that poorly managed monetary policies can end with a vanishing middle class, fiat currency hyperinflation, mass violence, political upheaval, and emerging strong-man military dictatorships.
Since abandoning the gold standard, the world has seen more and deeper bank crises than ever before.
Instead of decisions about the monetary system, like a bailout or quantitative easing, Satoshi envisioned Bitcoin as a more robust monetary system, with a more distributed power structure that would make it impossible for a single individual or small group of individuals to act unilaterally.
The Bitcoin standard
Bitcoin is gaining mainstream acceptance as a digital asset and means of exchange, with major companies like Microsoft, PayPal, and Starbucks accepting Bitcoin payments. Adoption is not limited to industrialized countries, as users based in the Middle East and North Africa received $566 billion in cryptocurrency, primarily Bitcoin and stablecoin remittances, in 2022. This demonstrates Bitcoin’s global appeal and utility and is a useful metric as places where technology is adopted most rapidly in areas where it is most necessary are a reliable way to evaluate the usefulness of that technology as a whole.
The financial services industry itself is experiencing significant changes due to technological innovation, regulatory changes, and the shifting of consumer needs. Blockchain technology, with its properties of immutability, fast transaction settlements, and decentralization, has the potential to enhance the operational efficiency of financial systems and form the basis for decentralized finance (DeFi). However, there are still several barriers that must be overcome for distributed ledger technology (DLT) to achieve more widespread adoption across different areas of finance. Some of the perceived barriers include
Despite these barriers, The Depository Trust and Clearing Corporation (DTCC) launched a permissioned blockchain network called “Project Ion” as an alternative settlement platform in August 2022. DTCC claims that the blockchain system can cover around 10% of the trading volumes processed by the firm’s classic settlement solutions. However, there is no clarity on when and if “Project Ion” will ultimately replace the current settlement systems in place at the DTCC.
The global FIAT money supply is estimated to be around $82.7 trillion. As a result, the importance of the medium of exchange in the financial services industry should not be overlooked. Bitcoin, during its peak in the 2021 bull cycle, had a market cap that surpassed many of the world’s largest currencies. However, this does not necessarily reflect its adoption as a medium of exchange, suggesting that Bitcoin is still in the early stages of adoption, with its most promising feature as a medium of exchange that does not rely on trusted third-party intermediaries, in the digital realm.
Decentralization has its pros and cons. According to a recent report, Bitcoin is the most decentralized digital asset based on various factors. The number of Bitcoin holders has become more globally distributed, and active addresses have continued to increase.
Bitcoin’s computing power was previously dominated by operators in China, but due to China’s ban on these activities, the US now holds the top spot at around 38%.
Increased decentralization leads to better security, which is important for any decentralized medium of exchange. Bitcoin has become more decentralized as the number of holders has become more globally distributed, resulting in better security. The central area of concern for Bitcoin is a 51% attack, where a single entity controls more than half of the computational power of the network. Despite a report from the Defense Advanced Research Projects Agency (DARPA) indicating that the likelihood of a 51% attack may not be as remote as many think, Bitcoin remains the most secure digital asset compared to others using the same hashing method in terms of the hash rate or computer power required to secure the network.
Bitcoin’s high degree of decentralization leads to lower network throughput, and transactions are added to a memory pool before being picked up by miners and added to newly minted blocks. However, the network’s throughput is relatively low at around 4.6 transactions per second, which is significantly lower than the 5,000 and 24,000 transactions per second processed by Mastercard and Visa, respectively. The fees for transactions on the Bitcoin network are also volatile and depend on network congestion.
A 2022 PYMNTS’ report indicates that 85% of firms with an annual income of at least $1 billion are adopting crypto payments, and merchant acceptance for Bitcoin increased by 60%. The COVID-19 pandemic has accelerated crypto adoption, and the rise of digital payments has made it easier for mainstream payment networks, such as Visa and Mastercard, to introduce crypto payments. Visa’s network processed over $2.5 billion in crypto transactions by Q2 2022, and crypto payments have become increasingly popular with the rise in the use of stablecoin payments. Crypto-linked debit cards have expanded the number of partnerships between crypto-native payment providers and traditional payment networks. The more people are aware of and understand cryptocurrencies, the more they will adopt it.
Major companies that accept or utilize Bitcoin are:
Countries may wish to support Bitcoin as a sovereign currency for the following reasons. They include boosting foreign investment, attracting tourism, lowering the cost of remittances, increasing access to financial services, and promoting education and awareness of digital assets. On the other hand, countries generally find it difficult to shift to using Bitcoin as a sovereign currency or even as a part of their treasury. One of the main challenges is the limited capacity to save, which means that Bitcoin cannot be used as a store of value. Additionally, Bitcoin adoption has negatively impacted sovereign credit ratings due to disapproval from international financial institutions. Finally, little or no access to capital makes it difficult for developing countries to weather the volatility of the crypto market.
El Salvador’s decision to make Bitcoin legal tender in September 2021 was seen as a major step towards Bitcoin’s mass adoption as a medium of exchange, but the country’s use of public funds to purchase Bitcoin and distribute it to citizens was not universally popular. Despite this, the move aimed to attract foreign investments and alleviate the burden of high commissions paid on remittances. However, key indicators suggest that Bitcoin’s adoption in the country is still minimal.
Despite being hailed as a historic move for Bitcoin adoption, El Salvador’s use of public funds to purchase Bitcoin and distribute it to citizens via the Chivo wallet application wasn’t universally popular. Data shows that adoption of Bitcoin in the country is minimal, with over 20% of respondents never installing the Chivo wallet and only less than 10% of the population using Bitcoin within the wallet after spending the $30 incentive.
El Salvador, however, continues with its Bitcoin program despite falling cryptocurrency prices, IMF warnings, and public discontent. The government has been purchasing 1 BTC per day since November 2022 and holds over 2,564 BTC, but is currently down by 44.5% on its Bitcoin holdings, resulting in an unrealized loss of over $49 million. However, as of March 2023, the total amount of BTC bought since El Salvador started its daily purchases of 1 BTC, along with its latest bulk purchase on July 1, 2022, has actually been profitable.
The Central African Republic has passed legislation to adopt Bitcoin as a legal tender in order to attract foreign investment, lower remittance costs, and increase financial inclusion. Despite the many benefits, the country faces challenges, including having a purely digital medium of exchange in a country with an 11% internet penetration rate. However, the adoption of digital assets can be beneficial to the country’s competitiveness in the long term.
Archives have been published in Bitcointalk.org about how Satoshi shared pieces of Bitcoin’s code with cypherpunks before the launch of Bitcoin. In them, Satoshi thought of Bitcoin as a “timechain” and not a “blockchain”.
Find below a section of notes in a copy of the pre-release source code of Bitcoin that Satoshi shared with a few reviewers before mining the Genesis block in January 2009. This copy was shared on Bitcointalk.org in 2013
Blockchain and cryptocurrency inherently belong together. While blockchain is a distributed decentralized database that stores an ever-increasing number of records, Satoshi’s notes suggest that Bitcoin was meant to be a timechain, not a blockchain.
Naming a technology by the right name not only helps to separate and point out its uniqueness, but it also helps other people with understanding.
The term timechain was coined by Satoshi himself to reference Bitcoin’s time-based hashing operation, whose function is to serve as a distributed clock that makes sure that bitcoins get mined every 10 minutes on average. Besides, the term timechain also denotes immutability, where the longer chain is sufficient to trace back the entire transaction history of the chain.
Over the past years, there has been a growing concern over the high energy consumption and carbon footprint associated with Bitcoin mining. This is because bitcoins are made using electricity partially generated by gas and coal-fired power plants.
With the electricity consumption of entire nations, and the international community’s much stronger commitment to intensify decarbonization efforts to tackle climate change, Bitcoin seems to jeopardize those efforts. This has sparked a heated debate between proponents and opponents regarding the necessity of regulatory intervention.
As of 2022, bitcoin mining is estimated to be responsible for 0.1% of world greenhouse gas emissions. Other environmental concerns are linked to the air pollution caused by coal-fired electricity generation, and the e-waste (disposal of electronic appliances) due to the short life expectancy of bitcoin-mining equipment.
One of the biggest Bitcoin myths is that the Proof of Work (PoW) consensus mechanism used in the Bitcoin network is detrimental to the environment. This claim is often based on the large amount of energy required to mine Bitcoin and the carbon emissions associated with this energy consumption.
The Cambridge Bitcoin Electricity Consumption Index (CBECI) was launched in July 2019 in response to the growing demand for reliable data-driven insights about Bitcoin’s electricity consumption. The index estimates that by mid-September 2022, approximately 199.65 MtCO2e (million tonnes of carbon dioxide equivalent) can be attributed to the Bitcoin network since its inception. To put things into perspective, 48.35 MtCO2e represents approximately 0.10% of global greenhouse gas emissions and is similar to that of countries such as Nepal (48.37 MtCO2e) and the Central African Republic (46.58 MtCO2e), or about half that of gold mining (100.4 MtCO2e).
The annual energy consumption of Bitcoin mining is around 133.68 TWh, which is equivalent to the energy consumption of a small country like Argentina. At the same time, the carbon footprint of Bitcoin mining is around 63.6 million tons of CO2 per year, which is similar to the carbon footprint of the entire country of New Zealand
It should be noted that about 92% of the emissions have occurred since 2018
It’s important to note that the energy consumption of the Bitcoin network is often overstated and that much of the energy used in Bitcoin mining comes from renewable sources. Additionally, Bitcoin miners are incentivized to use the cheapest sources of energy available, which often means using excess energy that would otherwise go to waste.
“The heat from your computer is not wasted if you need to heat your home.” – Satoshi Nakamoto
Furthermore, the energy consumption of traditional banking and financial systems is often overlooked when comparing the environmental impact of different payment systems. Bitcoin’s PoW consensus mechanism provides a secure and decentralized system for processing transactions without the need for intermediaries or central authorities, which can ultimately reduce the overall energy consumption and carbon footprint of the financial industry.
Climate damages for Bitcoin averaged 35% of its market value between 2016 and 2021. This share for Bitcoin was slightly less than the climate damages as a share of the market value of electricity produced by natural gas (46%) and gasoline produced from crude oil (41%), but more than those of beef production (33%) and gold mining (4%).
Proof-of-work (PoW) is the consensus mechanism that Bitcoin uses to regulate the creation of blocks and the state of the blockchain. Proof-of-work provides an objective way for all members of the Bitcoin network to agree on the state of the blockchain and all Bitcoin transactions.
Transactions are verified by miners. They are participants that use a great amount of resources to ensure the network continues to run securely and correctly. Among other tasks, miners create and validate blocks of transactions. But in order to compete for the right to validate the next block, they need to use highly specialized mining hardware to solve complex mathematical puzzles.
PoW forces miners to make trillions of numerical guesses in order to produce a valid block, and thanks to the difficulty adjustment, miners collectively find one block every 10 minutes on average.
The following are the advantages of PoW:
The following are the disadvantages of PoW:
proof-of-stake (PoS) is an alternative consensus mechanism to PoW, developed and used by a few alternative cryptocurrencies. In the PoW model, stakers—the PoS equivalent of miners—lock up funds in a special smart contract. Every time a new block is needed by the network, an algorithm grants a specific staker the opportunity to publish the next block.
The algorithm selects the staker via lottery, depending on each staker’s percentage of total staked funds. For example, if a single staker controls 30% of all funds staked on a given network, they have a 30% chance of mining the next block.
The following are the advantages of PoS:
The following are the disadvantages of PoS:
Summary of Differences
|Proof of Work (PoW)||proof of stake (PoS)|
|Who can mine/validate blocks?||The higher the computational power, the higher the probability of mining a block.||The more coins staked, the more likely you get to validate a new block|
|How is a block mined/validated?||Miners compete to solve complex mathematical puzzles using their computational resources.||Typically, the algorithm determines the winner randomly, taking into account the amount of coins staked.|
|Mining equipment||Professional mining hardware, such as ASIC, CPU, and GPU||Any computers or mobile devices with an internet connection|
|How are rewards distributed?||The first person to mine the block receives a Block Reward||Validators can receive a share of the transaction fees collected from the block they validated|
|How is the network secured||The greater the hash, the more secure the network||Staking locks crypto on the blockchain to secure the network|
It is often claimed by financial companies and fintech startups that Bitcoin would go away and that the blockchain technology behind the cryptocurrency could be implemented by traditional entities in the finance industry.
However, looking back at the origin story of Bitcoin as well as the cypherpunk inspiration and ethos behind its creation, it is clear that Bitcoin was not invented in order to help banks become more efficient.
The reason why Bitcoin has been able to stick around longer than things like Digicash and Egold is that it is powered by Proof of Work rather than trust in a centralized entity. Bitcoin’s greatest innovation is the fact that its payment processing technology and currency unit are the same thing and one cannot work without the other. This is the opposite of how things work, where payment processing technologies are controlled by corporations while currencies are backed by trust in centralized authority. As a result, there is no single point of failure to target. For true decentralization to exist, it is a requirement for the underlying token to be adopted and used to transact. This is also why the token is used to incentivize miners to secure the network.
With Bitcoin acting as the base layer, new digital cash systems, such as the Lightning Network, are able to be built without the risks of regulation or shutdown that were associated with the centralized systems of the past. This efficiency comes from the fact that it cannot be slowed down by regulatory pressures. As a matter of fact, if a blockchain can be easily controlled by regulators, then the reasoning behind using a blockchain in the first place becomes rather questionable because a centralized server will be more efficient than a distributed database.
The perception of Bitcoin’s insecurity stems from the frequent news and stories about hacks and scams involving Bitcoin exchanges and third-party services. None of these incidents reflect the security of the Bitcoin protocol itself.
The security of Bitcoin is based on its decentralized nature, which makes it difficult for any single actor to control the network, as well as the use of cryptography to secure transactions.
While individual users may fall victim to scams and hacks, the underlying Bitcoin protocol remains secure.
The key difference between Bitcoin and the traditional financial system comes down to personal responsibility. Most people are comfortable using platforms where transactions are reversible. In addition to the chances of having your credentials stolen and used for fraudulent purposes, online payment accounts are also subject to seizure, closure, and other types of financial censorship. For example, PayPal users have dealt with situations in which their funds have been seized or their accounts have been closed for a variety of reasons (e.g., Alex Jones, cam girls, Gab, WikiLeaks).
A Ponzi scheme is a fraudulent investment scheme where returns are paid to earlier investors using the capital of newer investors, without generating any real profits. However, Bitcoin is an open-source, decentralized digital currency that operates on a blockchain. It allows for peer-to-peer transactions without the need for intermediaries. As a result, the value of Bitcoin is determined by market demand and supply and not by any promises of returns.
One of the earliest criticisms of Bitcoin was that the underlying token in the system had no intrinsic value. This point was an area of heavy debate among libertarians and Austrian economists who had become interested in Bitcoin as a potential digital alternative to gold in the early stages of the crypto asset’s development. Much of the debate revolved around Austrian school economist Ludwig Von Mises’s regression theorem. The regression theorem aims to explain the origin and development of money. According to this theorem, a good can only become a widely accepted medium of exchange (i.e. money) if it has a pre-existing non-monetary use, as this provides the initial demand for it. In other words, money must have some practical use beyond being used as a medium of exchange. For example, gold has non-monetary uses in jewelry, electronics, and other industries, which helped establish it as a widely accepted form of money.
The concept of intrinsic value is subjective. Ultimately, all value can be determined by supply and demand. One thing can be deemed valuable because people believe it is so. Bitcoin, for example, has several properties that give it value, such as its scarcity, divisibility, and portability. Bitcoin’s value is not based on speculation alone, but on the fact that it provides a useful function as a decentralized and censorship-resistant digital currency.
Bitcoin’s core value proposition is that it is an uncontrolled, apolitical money. Because of that, some might infer that Bitcoin is only useful to people who want to get around various regulations imposed on the world’s financial systems and society more generally.
Bitcoin can be quite useful for criminals, much like physical cash. However, the permissionless nature of Bitcoin also enables other valuable use cases of this new technology. Cash, not Bitcoin, is still the preferred medium of exchange for illegal transactions. One reason for that is that Bitcoin’s public ledger makes it easy to track and trace illicit transactions, which makes it less attractive to criminals.
Traditional payment systems rely on the banking network to process transactions. Banks around the world are directly or indirectly connected to each other, and when a payment is initiated from a payer’s bank, it goes sequentially through various checking processes across a network of intermediaries. In contrast, the Bitcoin network is a peer-to-peer network of interconnected computers that verify and approve transactions while maintaining a ledger of all past transactions – the blockchain.
At the core of every transaction system lies a fundamental element of trust. This is handled differently based on whether the payment is done with cash, a credit card, or with bitcoin.
For example, with physical cash transactions, there is no intermediary. However, you still have to trust that you have not received a counterfeit banknote.
Card payments require processing from a payment network, such as VISA or Mastercard, as well as a banking network for authorization, clearing, and settlement. As a result, trust is generated by relying on reputable financial institutions that run a number of checks while the transaction is in progress.
For instance, the authorization stage verifies a customer’s identity as the owner of the funds and makes sure that there is enough balance. When the customer inserts a credit card into a terminal and enters the pin code, the following will occur:
This entire process happens within a few seconds. However, you can still walk out of the shop with your goods and the process will continue in the background.
The clearing process involves the exchange of transaction-related information that is used for the verification of the money debited from the customer’s bank and credited to the seller’s bank. At the end of every day, all approved transactions for the day are sent from the merchant to the merchant’s bank, which then transmits the details to the card network. The card network validates the information, sends the purchase information to customers’ banks, and finally sends reconciliation information to both the merchant’s and the customer’s banks.
Finally, settlements occur daily on an aggregated net basis, which involves the actual transfer of funds. The card network computes the net settlement position that the customer’s bank needs to pay to the merchant’s bank and sends that information to both banks, plus a new actor, the settlement bank. This settlement bank pays the merchant’s bank, and the customer’s bank pays the settlement bank. To finish the process, the merchant gets credited, and the customer gets debited.
In general, this entire process takes between 24 and 48 hours
As an alternative to the cumbersome and information-heavy process involved in traditional payment networks, Bitcoin transactions follow a very different path where there are no intermediaries.
The sender of a transaction only needs to specify the recipient’s Bitcoin address (similar to a bank account in a bank transfer) and the number of Bitcoins to send. Next, the sender wallet signs the transaction with the sender’s private keys to digitally sign the transaction and prove ownership of the funds. After that, a few nodes will receive the transaction and broadcast it to the network so that it can be independently verified by each of the nodes. Bitcoin miners will then gather transactions in a batch and begin trying to solve a computational problem in order to add the next block. When the block is added to the chain, all other nodes can easily check that the transactions have been included and that they cannot be reversed. The reason for that is that modifying the chain would require an extensive amount of computing power. As more blocks are added after the block containing your transaction, it becomes exponentially harder to modify that block by rewriting the chain. Finally, the merchant’s wallet will be able to confirm that the payment has been confirmed and that they are the owner of those bitcoins.
The completion time of this process varies depending on a variety of factors. On average, it takes 10 minutes to mine a Bitcoin block. It is recommended to wait at least 5 or 6 block confirmations to really consider a transaction effective (approximately 1 hour).
Bitcoin not only offers advantages in terms of anonymity, transparency, and independence from governments and central banks. When sending bitcoins to another party, it is a peer-to-peer transfer where there are no intermediaries. This is not the case in the traditional card payment system, which requires a minimum of four intermediaries, and often more.
Furthermore, Bitcoin is a distributed system that allows all components of the system to access and verify all transactions. This reduces the number of parties involved in a transaction and eliminates the need for third-party verification, which can speed up the transaction process. In addition to that, Bitcoin is a global system with an underlying set of rules that make fraud, manipulation, and errors almost impossible. As a matter of fact, in Bitcoin’s 10-year track record, no security flaw has ever been discovered and no one has found a way to change a signed transaction, or modify the blockchain.
While the original forum was created in November 2008, via Sourceforge, the new Bitcoin forum was launched by Satoshi in November 2009 and is still operating today. The forum was transferred to a new domain, Bitcointalk.org, on June 24, 2023. From the period of 2011 to 2024, Bitcointalk was the dominant venue for Bitcoin-related discussion.
Known hosts, owners, and associate names of the forum host include:
The main online venue for discussing Bitcoin appears to have shifted over the years. From the Bitcoin forum from 2010 to 2013, the subreddit from 2013 to 2017, and then finally onto Twitter. However, despite all the hiccups mentioned in this piece, the Bitcoin forum is still around and somewhat popular to this day.
Version 0.0 | APR. 6, 2023 – Initial Release
Version 0.1 | Sept. 22, 2023 – Added Section (Bitcoin Forum)