Bitcoin protocol: Difference between revisions

Content deleted Content added
Tialla (talk | contribs)
m Reverted 2 edits by 91.139.176.129 (talk) to last revision by David Gerard (TW)
Bender the Bot (talk | contribs)
m Race attack: HTTP to HTTPS for Cornell University
 
(352 intermediate revisions by more than 100 users not shown)
Line 1:
{{Short description|Rules that govern the functioning of Bitcoin}}
{{Use dmy dates|date=January 2015}}
{{Use dmy dates|date=November 2021}}
<!-- The following contents might be taken from the Satoshi Whitepaper which was released under a free, compatible license, the MIT license. It is compatible with Wikipedia and the Creative Commons licensing, and can be reproduced as followed. See the MIT License for details: http://opensource.org/licenses/mit-license.php
-->
 
{{broader|Bitcoin}}
[[File:Bitcoin Transaction Visual.svg|thumb|A diagram of a bitcoin transfer]]
[[File:BTC number of transactions per month.png|thumb|Number of bitcoin transactions per month (logarithmic scale)<ref name="Blockchain.info">{{cite web |url = https://blockchain.info/charts |title = Charts |accessdate = 2 November 2014 |publisher = [[Blockchain.info]] |url-status = live |archiveurl = https://web.archive.org/web/20141103020741/http://blockchain.info/charts |archivedate = 3 November 2014 |df = dmy-all }}</ref>]]
 
The '''bitcoin protocol''' is the [[Communication protocol|set of rules]] that govern the functioning of [[bitcoin]]. Its key components and principles are: a [[peer-to-peer]] decentralized network with no central oversight; the [[blockchain]] technology, a public [[ledger]] that records all bitcoin transactions; [[Mining (cryptocurrency)|mining]] and [[proof of work]], the process to create new bitcoins and verify transactions; and cryptographic security.
The '''bitcoin network''' is a [[peer-to-peer]] [[payment network]] that operates on a [[cryptographic protocol]]. Users send and receive [[bitcoin]]s, the units of currency, by broadcasting digitally signed messages to the network using bitcoin [[cryptocurrency wallet]] software. Transactions are recorded into a distributed, replicated public [[database]] known as the [[Blockchain (database)|blockchain]], with consensus achieved by a [[proof-of-work]] system called ''mining''. [[Satoshi Nakamoto]], the designer of bitcoin claimed that design and coding of bitcoin began in 2007. The project was released in 2009 as [[open source software]].
 
Users broadcast [[digital signature|cryptographically signed]] messages to the network using bitcoin [[cryptocurrency wallet]] software. These messages are proposed transactions, changes to be made in the ledger. Each node has a copy of the ledger's entire transaction history. If a transaction violates the rules of the bitcoin protocol, it is ignored, as transactions only occur when the entire network reaches a consensus that they should take place. This "full network consensus" is achieved when each node on the network verifies the results of a [[proof-of-work]] operation called ''mining''. Mining packages groups of transactions into blocks, and produces a [[Hash function|hash code]] that follows the rules of the bitcoin protocol. Creating this hash requires expensive [[energy]], but a network node can verify the hash is valid using very little energy. If a miner proposes a block to the network, and its hash is valid, the block and its ledger changes are added to the blockchain, and the network moves on to yet unprocessed transactions. In case there is a dispute, then the longest chain is considered to be correct. A new block is created every 10 minutes, on average.
The network requires minimal structure to share transactions. An [[ad hoc]] decentralized network of volunteers is sufficient. Messages are broadcast on a [[Best-effort delivery|best effort]] basis, and nodes can leave and rejoin the network at will. Upon reconnection, a node downloads and verifies new blocks from other nodes to complete its local copy of the blockchain.<ref name="whitepaper">{{cite web |last= Nakamoto |first= Satoshi |title= Bitcoin: A Peer-to-Peer Electronic Cash System |url= http://bitcoin.org/bitcoin.pdf |accessdate = 20 December 2012 |date= 24 May 2009}}</ref><ref name=UCPaper>{{cite journal
|title=Bitter to Better&nbsp;– how to make Bitcoin a better currency
|journal=Financial Cryptography and Data Security
|url=http://crypto.stanford.edu/~xb/fc12/bitcoin.pdf
|publisher=[[Springer Publishing]]
|year=2012
|author1=Barber, Simon |author2=Boyen, Xavier |author3=Shi, Elaine |author4=Uzun, Ersin |lastauthoramp=yes }}</ref>
 
Changes to the bitcoin protocol require consensus among the network participants. The bitcoin protocol has inspired the creation of numerous other digital currencies and blockchain-based technologies, making it a foundational technology in the field of [[Cryptocurrency|cryptocurrencies]].
==Transactions==
[[File:An actual Bitcoin transaction from the Kraken cryptocurrency exchange to a hardware LedgerWallet.jpg|thumb|An actual bitcoin transaction including the fee from a webbased cryptocurrency exchange to a hardware wallet.]]
[[File:blockchain.svg|thumb|110px|left|The best chain {{colorbox|black}} consists of the longest series of transaction records from the genesis block {{colorbox|#448e73}} to the current block or record. Orphaned records {{colorbox|#9865c3}} exist outside of the best chain.]]
 
==Blockchain==
A bitcoin is defined by a sequence of [[digital signature|digitally signed]] transactions that began with the bitcoin's creation, as a block reward. The owner of a bitcoin transfers it by digitally signing it over to the next owner using a bitcoin transaction, much like endorsing a traditional [[Cheque|bank check]]. A payee can examine each previous transaction to verify the chain of ownership. Unlike traditional check endorsements, bitcoin transactions are irreversible, which eliminates risk of [[chargeback fraud]].
[[Blockchain]] technology is a decentralized and secure digital ledger that records transactions across a network of computers. It ensures transparency, immutability, and tamper resistance, making data manipulation difficult. Blockchain is the underlying technology for cryptocurrencies like bitcoin and has applications beyond finance, such as supply chain management and smart contracts.<ref>{{Cite web |last=Hut |first=Moody |title=What is Blockchain Technology and How Does it Work |date=18 December 2023 |url=https://moodyhut.com/blockchain-technology/ }}</ref>
 
===Transactions===
Although it is possible to handle bitcoins individually, it would be unwieldy to require a separate transaction for every bitcoin in a transaction. Transactions are therefore allowed to contain multiple inputs and outputs, allowing bitcoins to be split and combined. Common transactions will have either a single input from a larger previous transaction or multiple inputs combining smaller amounts, and one or two outputs: one for the payment, and one returning the change, if any, to the sender. Any difference between the total input and output amounts of a transaction goes to miners as a transaction fee.<ref name="whitepaper"/>
[[File:blockchain.svg|thumb|110px|The best chain {{color box|black}} consists of the longest series of transaction records from the genesis block {{color box|#448e73}} to the current block or record. Orphaned records {{color box|#9865c3}} exist outside of the best chain.]]
 
The network requires minimal structure to share transactions. An [[ad hoc]] decentralized network of volunteers is sufficient. Messages are broadcast on a [[Best-effort delivery|best-effort]] basis, and nodes can leave and rejoin the network at will. Upon reconnection, a node downloads and verifies new blocks from other nodes to complete its local copy of the blockchain.<ref name="whitepaper">{{cite web |last=Nakamoto |first=Satoshi |date=24 May 2009 |title=Bitcoin: A Peer-to-Peer Electronic Cash System |url=http://bitcoin.org/bitcoin.pdf |url-status=dead |archive-url=https://web.archive.org/web/20100704213649/https://bitcoin.org/bitcoin.pdf |archive-date=4 July 2010 |access-date=20 December 2012}}</ref><ref name=UCPaper>{{cite book
|chapter=Bitter to Better&nbsp;– how to make Bitcoin a better currency
|title=Financial Cryptography and Data Security
|chapter-url=http://crypto.stanford.edu/~xb/fc12/bitcoin.pdf
|publisher=[[Springer Publishing]]
|year=2012
|author1=Barber, Simon |author2=Boyen, Xavier |author3=Shi, Elaine |author3-link= Elaine Shi |author4=Uzun, Ersin |series=Lecture Notes in Computer Science
|volume=7397
|pages=399–414
|name-list-style=amp |doi=10.1007/978-3-642-32946-3_29
|isbn=978-3-642-32945-6
}}</ref>
 
==Mining==
[[File:AustrianBitCoinMiningRig.jpg|thumb|[[GPU]]-based mining rig, 2012]]
[[File:Lancelot-AHut FPGA8 basedMedicine bitcoinHat miningbox board1.jpg|thumb|LancelotA [[FPGA]]-basedbitcoin mining boardfarm, 20132018]]
Bitcoin uses a proof-of-work system or a proof-or-transaction to form a distributed timestamp server as a [[Proof-of-work system|peer-to-peer network]].<ref name=UCPaper /> This work is often called ''bitcoin mining''. During mining, practically all of the computing power of the bitcoin network is used to solve cryptographic tasks, which is proof of work. Their purpose is to ensure that the generation of valid blocks involves a certain amount of effort so that subsequent modification of the blockchain, such as in the 51% attack scenario, can be practically ruled out. Because of the difficulty, miners form "[[Mining pool|mining pools]]" to get payouts despite these high power requirements, costly hardware deployments, and hardware under control. As a result of the Chinese ban on bitcoin mining in 2021, the United States currently holds the largest share of bitcoin mining pools.<ref>{{Cite web |last=Sigalos |first=MacKenzie |date=2021-06-15 |title=China is kicking out more than half the world's bitcoin miners – and a whole lot of them could be headed to Texas |url=https://www.cnbc.com/2021/06/15/chinas-bitcoin-miner-exodus-.html |access-date=2023-12-05 |website=CNBC |language=en}}</ref><ref>{{Cite web |title=Cambridge Bitcoin Electricity Consumption Index (CBECI) |url=https://ccaf.io/cbnsi/cbeci/mining_map |access-date=2023-12-05 |website=ccaf.io |language=en}}</ref>
To form a distributed timestamp server as a peer-to-peer network, bitcoin uses a [[proof-of-work system]].<ref name=UCPaper /> This work is often called ''bitcoin mining''. The signature is discovered rather than provided by knowledge. This process is [[Energy intensity|energy intensive]].<ref name="minbitsup">{{Cite news |url=https://www.forbes.com/sites/peterdetwiler/2016/07/21/mining-bitcoins-is-a-surprisingly-energy-intensive-endeavor/ |title=Mining Bitcoins Is A Surprisingly Energy-Intensive Endeavor |author=Peter Kelly-Detwiler |accessdate=7 January 2017 |date=21 July 2016 |work=Forbes }}</ref> Electricity can consume more than 90% of operating costs for miners.{{citation needed|date=May 2019}} A data center in China, planned mostly for bitcoin mining, is expected to require up to 135 [[Watt#Megawatt|megawatt]]s of power.<ref name="mibi">{{cite web |url=http://www.energymatters.com.au/renewable-news/mining-bitcoin-solar-em5737/ |title=Mining Bitcoin With Wind And Solar Power |date=7 November 2016 |work=Energy Matters |accessdate=7 January 2017 }}</ref>
 
Requiring a proof of work to accept a new block to the blockchain was [[Satoshi Nakamoto]]'s key innovation. The mining process involves identifying a block that, when hashed twice with [[SHA-256]], yields a number smaller than the given difficulty target. While the average work required increases in inverse proportion to the difficulty target, a hash can always be verified by executing a single round of double SHA-256.
 
For the bitcoin timestamp network, a valid proof of work is found by incrementing a [[Cryptographic nonce|nonce]] until a value is found that gives the block's hash the required number of leading zero bits. Once the [[hash function|hashing]] has produced a valid result, the block cannot be changed without redoing the work. As later blocks are chained after it, the work to change the block would include redoing the work for each subsequent block. If there is a deviation in consensus then a [[Fork (blockchain)|blockchain fork]] can occur.
 
Majority consensus in bitcoin is represented by the longest chain, which required the greatest amount of effort to produce. If a majority of computing power is controlled by honest nodes, the honest chain will grow fastest and outpace any competing chains. To modify a past block, an attacker would have to redo the proof-of-work of that block and all blocks after it and then surpass the work of the honest nodes. The probability of a slower attacker catching up diminishes exponentially as subsequent blocks are added.<ref name=UCPaper />
[[File:History of Bitcoin difficulty.svg|thumb|Mining difficulty has increased significantly.]]
To compensate for increasing hardware speed and varying interest in running nodes over time, the difficulty of finding a valid hash is adjusted roughly every two weeks. If blocks are generated too quickly, the difficulty increases and more hashes are required to make a block and to generate new bitcoins.<ref name=UCPaper />
 
===Difficulty and mining pools===
{{Further|Mining pool}}
Bitcoin mining is a competitive endeavor. An "[[arms race]]" has been observed through the various hashing technologies that have been used to mine bitcoins: basic [[Central processing unit|CPUs]], high-end [[Graphics processing unit|GPUs]] common in many [[gaming computer]]s, [[Field-programmable gate array|FPGA]]<nowiki/>s and [[Application-specific integrated circuit|ASICs]] all have been used, each reducing the profitability of the less-specialized technology. Bitcoin-specific ASICs are now the primary method of mining bitcoin and have surpassed GPU speed by as much as 300-fold. The difficulty within the mining process involves self-adjusting to the network's accumulated mining power. As bitcoins have become more difficult to mine, computer hardware manufacturing companies have seen an increase in sales of high-end ASIC products.<ref>{{cite web|date=4 January 2014 |url=http://www.taipeitimes.com/News/biz/archives/2014/01/04/2003580449 |title=Bitcoin boom benefiting TSMC: report |publisher=Taipei Times}}</ref>
{{multiple image
|total_width=480
|image1=Minage de crypto-monnaie (2).jpg
|caption1=Early bitcoin miners [[General-purpose computing on graphics processing units|used GPUs for mining]], as they were better suited to the [[proof-of-work]] algorithm than [[central processing unit|CPUs]].<ref>{{cite web |title=Bitcoin mania is hurting PC gamers by pushing up GPU prices |date=30 January 2018 |url=https://www.theverge.com/2018/1/30/16949550/bitcoin-graphics-cards-pc-prices-surge |url-status=live |archive-url=https://web.archive.org/web/20180202070911/https://www.theverge.com/2018/1/30/16949550/bitcoin-graphics-cards-pc-prices-surge |archive-date=2 February 2018 |access-date=2 February 2018}}</ref>
|image2=USB Erupter.jpg
|caption2=Later amateurs mined bitcoins with specialized [[Field-programmable gate array|FPGA]] and [[Application-specific integrated circuit|ASIC]] chips. The chips pictured have become obsolete due to increasing difficulty.
|image3=Cryptocurrency Mining Farm.jpg
|caption3=Today, bitcoin mining companies [[Data center|dedicate facilities]] to housing and operating large amounts of high-performance mining hardware.<ref name="worldoil">{{cite web |date=26 January 2018 |title=Cryptocurrency mining operation launched by Iron Bridge Resources |url=http://www.worldoil.com/news/2018/1/26/cryptocurrency-mining-operation-launched-by-iron-bridge-resources |url-status=live |archive-url=https://web.archive.org/web/20180130091353/http://www.worldoil.com/news/2018/1/26/cryptocurrency-mining-operation-launched-by-iron-bridge-resources |archive-date=30 January 2018 |website=World Oil}}</ref>
}}
[[File:Bitcoin mining pools by ___location (country) – Mining pool distributions of Bitcoin blockchain.webp|thumb|The largest Bitcoin mining pools as of April 2020 by nation in which the pools are based]]
 
Bitcoin mining is a competitive endeavor. An "[[arms race]]" has been observed through the various hashing technologies that have been used to mine bitcoins: basic [[central processing unit]]s (CPUs), high-end [[graphics processing unit]]s (GPUs), [[field-programmable gate array]]s (FPGAs) and [[application-specific integrated circuit]]s (ASICs) all have been used, each reducing the profitability of the less-specialized technology. Bitcoin-specific ASICs are now the primary method of mining bitcoin and have surpassed GPU speed by as much as 300-fold. The difficulty of the mining process is periodically adjusted to the mining power active on the network. As bitcoins have become more difficult to mine, computer hardware manufacturing companies have seen an increase in sales of high-end ASIC products.<ref>{{cite news|date=4 January 2014 |url=http://www.taipeitimes.com/News/biz/archives/2014/01/04/2003580449 |title=Bitcoin boom benefiting TSMC: report |newspaper=Taipei Times}}</ref>
Computing power is often bundled together or [[mining pool|"pooled"]] to reduce variance in miner income. Individual mining rigs often have to wait for long periods to confirm a block of transactions and receive payment. In a pool, all participating miners get paid every time a participating server solves a block. This payment depends on the amount of work an individual miner contributed to help find that block.<ref name=Techcrunch12>{{cite web|last=Biggs|first=John|title=How To Mine Bitcoins|url=https://techcrunch.com/2013/04/08/how-to-mine-bitcoins/|publisher=Techcrunch|date=8 April 2013 }}</ref>
Computing power is often bundled together or "[[Mining pool|pooled]]" to reduce variance in miner income. Individual mining rigs often have to wait for long periods to confirm a block of transactions and receive payment. In a pool, all participating miners get paid every time a participating server solves a block. This payment depends on the amount of work an individual miner contributed to help find that block, and the payment system used by the pool.<ref>{{cite book|last1=Rosenfeld|first1=Meni|title=Analysis of Bitcoin Pooled Mining Reward Systems|date=November 17, 2011|arxiv=1112.4980|bibcode=2011arXiv1112.4980R}}</ref>
 
=== Environmental effects ===
Bitcoin [[data center]]s prefer to keep a low profile, are dispersed around the world and tend to cluster around the availability of cheap electricity.{{citation needed|date=May 2019}}
{{excerpt|Environmental effects of Bitcoin}}
 
=== Energy consumption ===
In 2013, Mark Gimein estimated electricity consumption to be about 40.9 megawatts (982 megawatt-hours a day).<ref>{{cite news |url=https://www.bloomberg.com/news/articles/2013-04-12/virtual-bitcoin-mining-is-a-real-world-environmental-disaster |title=Virtual Bitcoin Mining Is a Real-World Environmental Disaster |publisher=Bloomberg LP |work=Bloomberg Business |date=13 April 2013 |accessdate=22 April 2015 |author=Gimein, Mark}}</ref> In 2014, Hass McCook estimated 80.7 megawatts (80,666&nbsp;kW). {{as of|2015}}, ''The Economist'' estimated that even if all miners used modern facilities, the combined electricity consumption would be 166.7 megawatts (1.46 terawatt-hours per year).<ref name=ec1305>{{cite news |title=The magic of mining |url=https://www.economist.com/news/business/21638124-minting-digital-currency-has-become-big-ruthlessly-competitive-business-magic |accessdate=13 January 2015 |work=[[The Economist]] |date=13 January 2015}}</ref>
 
To lower the costs, bitcoin miners have set up in places like [[Iceland]] where [[geothermal energy]] is cheap and cooling [[Arctic]] air is free.<ref name="dh150613">{{cite news|last1=O'Brien|first1=Matt|title=The scam called Bitcoin|url=http://www.dailyherald.com/article/20150613/business/150619551/|accessdate=20 September 2016|work=Daily Herald|date=13 June 2015}}</ref> Chinese bitcoin miners are known to use [[hydroelectric power]] in [[Tibet]] to reduce electricity costs.<ref name="verge20171221">{{cite news |last1 = Potenza |first1 = Alessandra |title = Can renewable power offset bitcoin's massive energy demands? |url = https://www.theverge.com/2017/12/21/16806772/bitcoin-cryptocurrency-energy-consumption-renewables-climate-change |accessdate = 12 January 2018 |work = TheVerge News |date = 21 December 2017 |url-status = live |archiveurl = https://web.archive.org/web/20180112155940/https://www.theverge.com/2017/12/21/16806772/bitcoin-cryptocurrency-energy-consumption-renewables-climate-change |archivedate = 12 January 2018 }}</ref>
 
===Process===
[[File:Avalon-An ASIC base bitcoin machine.jpg|thumb|right|Avalon [[Application-specific integrated circuits|ASIC]]-based mining machine]]
A rough overview of the process to mine bitcoins involves:<ref name=UCPaper />
 
# New transactions are broadcast to all nodes.
# Each miner node collects new transactions into a block.
# Each miner node works on finding a proof-of-work code for its block.
# When a node finds a proof-of-work, it broadcasts the block to all nodes.
# Receiving nodes validate the transactions it holds and accept only if all are valid.
# Nodes express their acceptance by moving to work on the next block, incorporating the hash of the accepted block.
 
===Mined bitcoins===
[[File:Bitcoinpaymentverification.png|thumb|left|Diagram showing how bitcoin transactions are verified]]
By convention, the first transaction in a block is a special transaction that produces new bitcoins owned by the creator of the block. This is the incentive for nodes to support the network.<ref name="whitepaper" /> It provides thea way to move new bitcoins into circulation. The reward for mining halves every 210,000 blocks. It started at 50 bitcoin, dropped to 25 in late 2012, anddropped again to 12.5 on the summer of 2016, and to 6.25 bitcoin in 20162020. The most recent halving, which occurred on 20 April 2024 at 12:09am UTC (with block number 840,000), reduced the block reward to 3.125 bitcoins.<ref>{{Cite web |last=Macheel |first=Tanaya |date=2024-04-20 |title=The Bitcoin network completes the fourth-ever 'halving' of rewards to miners |url=https://www.cnbc.com/2024/04/19/bitcoin-network-completes-fourth-ever-halving-of-rewards-to-miners.html |access-date=2024-04-20 |website=CNBC |language=en}}</ref><ref>{{Cite web |title=So, Bitcoin Halving Is Done. What Happened and What's Next? |url=https://www.investopedia.com/bitcoin-halving-2024-what-next-8636072 |access-date=2024-04-20 |website=Investopedia |language=en}}</ref> The next halving is expected to occur in 2028, when the block reward will fall to 1.625 bitcoins.<ref>{{cite web | url=https://coinpedia.org/beginners-guide/what-is-bitcoin-halving/ | title=Bitcoin Halving 2024: Why It Matters & What to Expect | date=6 June 2023 }}</ref><ref>{{cite web | url=https://markets.businessinsider.com/news/currencies/bitcoin-halving-event-cryptocurrency-new-all-time-high-halvening-explained-2024-3 | title=Bitcoin is about to undergo another 'halving' event. Here's why that could send its price soaring }}</ref> This halving process is programmed to continue fora maximum of 64 times before new coin creation ceases.<ref name="antonopoulos-2017">
{{cite book
 
| last1 = Antonopoulos | first1 = Andreas M
== Security ==
| title = Mastering bitcoin: programming the open blockchain
Various potential attacks on the bitcoin network and its use as a payment system, real or theoretical, have been considered. The bitcoin protocol includes several features that protect it against some of those attacks, such as unauthorized spending, double spending, forging bitcoins, and tampering with the blockchain. Other attacks, such as theft of private keys, require due care by users.<ref name=quantitative>{{cite web |title=Quantitative Analysis of the Full Bitcoin Transaction Graph |url=http://eprint.iacr.org/2012/584.pdf |publisher=Cryptology ePrint Archive |accessdate=18 October 2012 |author=Ron Dorit |author2=Adi Shamir |year=2012}}</ref><ref name="primer">{{cite web |url=http://mercatus.org/sites/default/files/Brito_BitcoinPrimer.pdf |title=Bitcoin: A Primer for Policymakers |publisher=George Mason University |work=Mercatus Center |year=2013 |accessdate=22 October 2013 |author1=Jerry Brito |author2=Andrea Castillo |lastauthoramp=yes}}</ref>
| date = 1 July 2017
 
| edition = 2nd
=== Unauthorized spending ===
| publisher = O'Reilly Media
Unauthorized spending is mitigated by bitcoin's implementation of public-private key cryptography. For example; when Alice sends a bitcoin to Bob, Bob becomes the new owner of the bitcoin. Eve observing the transaction might want to spend the bitcoin Bob just received, but she cannot sign the transaction without the knowledge of Bob's private key.<ref name="primer" />
| ___location = Sebastopol, California, USA
 
| oclc = 953432201
=== Double spending ===
| isbn = 978-1-4919-5438-6
A specific problem that an internet payment system must solve is [[double-spending]], whereby a user pays the same coin to two or more different recipients. An example of such a problem would be if Eve sent a bitcoin to Alice and later sent the same bitcoin to Bob. The bitcoin network guards against double-spending by recording all bitcoin transfers in a ledger (the blockchain) that is visible to all users, and ensuring for all transferred bitcoins that they haven't been previously spent.<ref name="primer" />{{rp|4}}
| pages = 239
 
}}
=== Race attack ===
</ref>
If Eve offers to pay Alice a bitcoin in exchange for goods and signs a corresponding transaction, it is still possible that she also creates a different transaction at the same time sending the same bitcoin to Bob. By the rules, the network accepts only one of the transactions. This is called a [[Race condition|race attack]], since there is a race which transaction will be accepted first. Alice can reduce the risk of race attack stipulating that she will not deliver the goods until Eve's payment to Alice appears in the blockchain.<ref name="cornell4220">{{cite web |url=http://blogs.cornell.edu/info4220/2013/03/29/bitcoin-and-the-double-spending-problem/ |title=Bitcoin and the Double-spending Problem |publisher=Cornell University |date=29 March 2013 |accessdate=22 October 2014 |author=Erik Bonadonna}}</ref>
 
A variant race attack (which has been called a Finney attack by reference to Hal Finney) requires the participation of a miner. Instead of sending both payment requests (to pay Bob and Alice with the same coins) to the network, Eve issues only Alice's payment request to the network, while the accomplice tries to mine a block that includes the payment to Bob instead of Alice. There is a positive probability that the rogue miner will succeed before the network, in which case the payment to Alice will be rejected. As with the plain race attack, Alice can reduce the risk of a Finney attack by waiting for the payment to be included in the blockchain.<ref name="cr248">{{cite journal |title=Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin |url=http://eprint.iacr.org/2012/248.pdf |last1=Karame |first1=Ghassan O. |last2=Androulaki |first2=Elli |last3=Capkun |first3=Srdjan |publisher=International Association for Cryptologic Research |year=2012 |accessdate=22 October 2014}}</ref>
 
=== History modification ===
Each block that is added to the blockchain, starting with the block containing a given transaction, is called a confirmation of that transaction. Ideally, merchants and services that receive payment in bitcoin should wait for at least one confirmation to be distributed over the network, before assuming that the payment was done. The more confirmations that the merchant waits for, the more difficult it is for an attacker to successfully reverse the transaction in a blockchain—unless the attacker controls more than half the total network power, in which case it is called a 51% attack.<ref name="51%">{{cite news |author1=Michael J. Casey |author2=Paul Vigna |title=Short-Term Fixes To Avert "51% Attack" |url=https://blogs.wsj.com/moneybeat/2014/06/16/bitbeat-a-51-attack-what-is-it-and-could-it-happen/ |accessdate=30 June 2014 |work=Money Beat |publisher=Wall Street Journal |date=16 June 2014}}</ref>
 
=== Deanonymisation of clients ===
[[Deanonymisation]] is a strategy in data mining in which anonymous data is cross-referenced with other sources of data to re-identify the anonymous data source. Along with transaction graph analysis, which may reveal connections between bitcoin addresses (pseudonyms),<ref name=quantitative /><ref name=reid>{{cite journal |last1=Reid |first1=Fergal |last2=Harrigan |first2=Martin |title=An Analysis of Anonymity in the Bitcoin System |journal=Security and Privacy in Social Networks |date=2013 |pages=197–223}}</ref> there is a possible attack<ref name=dep2p>{{cite journal |last1=Biryukov |first1=Alex |last2=Khovratovich |first2=Dmitry |last3=Pustogarov |first3=Ivan |title=Deanonymisation of clients in Bitcoin P2P network |journal=ACM Conference on Computer and Communications Security |date=2014 |url=http://orbilu.uni.lu/handle/10993/18679|arxiv=1405.7418 }}</ref> which links a user's pseudonym to its [[IP address]]. If the peer is using [[Tor (anonymity network)|Tor]], the attack includes a method to separate the peer from the Tor network, forcing them to use their real IP address for any further transactions. The attack makes use of bitcoin mechanisms of relaying peer addresses and anti-[[DoS]] protection. The cost of the attack on the full bitcoin network is under €1500 per month.<ref name="dep2p" />
 
==Payment verification==
{{main|Online transaction processing}}
Each miner can choose which transactions are included in or exempted from a block.<ref name="bmg">{{Cite journal |last=Houy |first=N. |date=2016 |title=The Bitcoin Mining Game |journal=Ledger |volume=1 |issue=0 |pages=53–68 |doi=10.5195/ledger.2016.13 |url= http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/13/59 |accessdateaccess-date=14 January 2017 |doi-access=free }}</ref> A greater number of transactions in a block does not equate to greater computational power required to solve that block.<ref name="bmg"/>
 
As noted in Nakamoto's whitepaper, it is possible to verify bitcoin payments without running a full network node (simplified payment verification, SPV). A user only needs a copy of the block headers of the longest chain, which are available by querying network nodes until it is apparent that the longest chain has been obtained; then, get the [[Merkle tree]] branch linking the transaction to its block. Linking the transaction to a place in the chain demonstrates that a network node has accepted it, and blocks added after it further establish the confirmation.<ref name="whitepaper" />
Upon receiving a new transaction a node must validate it: in particular, verify that none of the transaction's inputs have been previously spent. To carry out that check, the node needs to access the blockchain. Any user who does not trust his network neighbors, should keep a full local copy of the blockchain, so that any input can be verified.
 
== Protocol features ==
As noted in Nakamoto's whitepaper, it is possible to verify bitcoin payments without running a full network node (simplified payment verification, SPV). A user only needs a copy of the block headers of the longest chain, which are available by querying network nodes until it is apparent that the longest chain has been obtained. Then, get the Merkle branch linking the transaction to its block. Linking the transaction to a place in the chain demonstrates that a network node has accepted it, and blocks added after it further establish the confirmation.<ref name="whitepaper" />
 
=== Security ===
== Data in the blockchain ==
Various potential attacks on the bitcoin network and its use as a payment system, real or theoretical, have been considered. The bitcoin protocol includes several features that protect it against some of those attacks, such as unauthorized spending, double spending, forging bitcoins, and tampering with the blockchain. Other attacks, such as theft of private keys, require due care by users.<ref name=quantitative>{{cite web |title=Quantitative Analysis of the Full Bitcoin Transaction Graph |url=http://eprint.iacr.org/2012/584.pdf |publisher=Cryptology ePrint Archive |access-date=18 October 2012 |author=Ron Dorit |author2=Adi Shamir |year=2012}}</ref><ref name="primer">{{cite web |url=http://mercatus.org/sites/default/files/Brito_BitcoinPrimer.pdf |title=Bitcoin: A Primer for Policymakers |publisher=George Mason University |work=Mercatus Center |year=2013 |access-date=22 October 2013 |author1=Jerry Brito |author2=Andrea Castillo |name-list-style=amp |archive-date=21 September 2013 |archive-url=https://web.archive.org/web/20130921060724/http://mercatus.org/sites/default/files/Brito_BitcoinPrimer.pdf |url-status=dead }}</ref>
While it is possible to store any digital file in the blockchain, the larger the transaction size, the larger any associated fees become. Various items have been embedded, including URLs to child pornography, an [[ASCII art]] image of [[Ben Bernanke]], material from the [[United States diplomatic cables leak|Wikileaks cables]], prayers from bitcoin miners, and the original bitcoin whitepaper.<ref name=BlockSpam>{{cite news |title=How porn links and Ben Bernanke snuck into Bitcoin's code |url=http://money.cnn.com/2013/05/02/technology/security/bitcoin-porn/ |website=CNN Money |publisher=CNN |date=2 May 2013}}</ref>
 
==== Unauthorized spending ====
== Alleged criminal activity ==
Unauthorized spending is mitigated by bitcoin's implementation of public-private key cryptography. For example, when Alice sends a bitcoin to Bob, Bob becomes the new owner of the bitcoin. Eve, observing the transaction, might want to spend the bitcoin Bob just received, but she cannot sign the transaction without the knowledge of Bob's private key.<ref name="primer" />
{{Broader|Cryptocurrency and security}}
The use of bitcoin by criminals has attracted the attention of financial regulators, legislative bodies, law enforcement, and the media.<ref name="Lavin, Tim">{{cite news |url=http://www.bloombergview.com/articles/2013-08-08/did-the-sec-just-validate-bitcoin-no- |title=The SEC Shows Why Bitcoin Is Doomed |publisher=Bloomberg LP |work=bloomberg.com |date=8 August 2013 |accessdate=20 October 2013 |author=Lavin, Tim}}</ref> The FBI prepared an intelligence assessment,<ref name="fbi_report">{{cite news |url=https://www.wired.com/images_blogs/threatlevel/2012/05/Bitcoin-FBI.pdf |title=Bitcoins Virtual Currency: Unique Features Present Challenges for Deterring Illicit Activity |publisher=FBI |work=Cyber Intelligence Section and Criminal Intelligence Section |date=24 April 2012 |accessdate=2 November 2014}}</ref> the SEC has issued a pointed warning about investment schemes using virtual currencies,<ref name="Lavin, Tim" /> and the U.S. Senate held a hearing on virtual currencies in November 2013.<ref name="USoff">{{cite news |url=https://www.washingtonpost.com/news/the-switch/wp/2013/11/21/heres-how-bitcoin-charmed-washington/ |title=Here's how Bitcoin charmed Washington |date=21 November 2013 |first=Timothy B. |last=Lee |work=The Washington Post |accessdate=10 October 2016}}</ref>
 
==== Double spending ====
Several news outlets have asserted that the popularity of bitcoins hinges on the ability to use them to purchase illegal goods.<ref name=Monetarists>{{cite news |url=http://www.economist.com/node/21563752 |title=Monetarists Anonymous |publisher=The Economist Newspaper Limited |work=The Economist |date=29 September 2012 |accessdate=21 October 2013}}</ref><ref>{{cite web |url=https://www.theguardian.com/world/2013/mar/22/silk-road-online-drug-marketplace |title=Silk Road: the online drug marketplace that officials seem powerless to stop |publisher=Guardian News and Media Limited |work=theguardian.com |date=22 March 2013 |accessdate=20 October 2013 |author=Ball, James}}</ref> In 2014, researchers at the University of Kentucky found "robust evidence that computer programming enthusiasts and illegal activity drive interest in bitcoin, and find limited or no support for political and investment motives."<ref name=uok>{{cite journal |ssrn=2518603 |title=Characteristics of Bitcoin Users: An Analysis of Google Search Data |author1=Matthew Graham Wilson |author2=Aaron Yelowitz |lastauthoramp=yes |journal=Social Science Research Network |date=November 2014 |volume=Working Papers Series}}</ref>
A specific problem that an internet payment system must solve is [[double-spending]], whereby a user pays the same coin to two or more different recipients. An example of such a problem would be if Eve sent a bitcoin to Alice and later sent the same bitcoin to Bob. The bitcoin network guards against double-spending by recording all bitcoin transfers in a ledger (the blockchain) that is visible to all users, and ensuring for all transferred bitcoins that they have not been previously spent.<ref name="primer" />{{rp|4}}
 
==== BlackRace marketsattack ====
If Eve offers to pay Alice a bitcoin in exchange for goods and signs a corresponding transaction, it is still possible that she also creates a different transaction at the same time sending the same bitcoin to Bob. By the rules, the network accepts only one of the transactions. This is called a [[Race condition|race attack]], since there is a race between the recipients to accept the transaction first. Alice can reduce the risk of race attack stipulating that she will not deliver the goods until Eve's payment to Alice appears in the blockchain.<ref name="cornell4220">{{cite web |url=https://blogs.cornell.edu/info4220/2013/03/29/bitcoin-and-the-double-spending-problem/ |title=Bitcoin and the Double-spending Problem |publisher=Cornell University |date=29 March 2013 |access-date=22 October 2014 |author=Erik Bonadonna}}</ref>
{{Main|Darknet market}}
A [[Carnegie Mellon University|CMU]] researcher estimated that in 2012, 4.5% to 9% of all transactions on all exchanges in the world were for drug trades on a single [[dark web]] drugs market, [[Silk Road (marketplace)|Silk Road]].<ref name="cmacademic">{{cite conference |url=http://www.andrew.cmu.edu/user/nicolasc/publications/Christin-WWW13.pdf |title=Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace |publisher=Carnegie Mellon INI/CyLab |accessdate=22 October 2013 |author=Christin, Nicolas |year=2013 |page=8 |quote=we suggest to compare the estimated total volume of Silk Road transactions with the estimated total volume of transactions at all Bitcoin exchanges (including Mt.Gox, but not limited to it). The latter corresponds to the amount of money entering and leaving the Bitcoin network, and statistics for it are readily available... approximately 1,335,580 BTC were exchanged on Silk Road... approximately 29,553,384 BTC were traded in Bitcoin exchanges over the same period... The only conclusion we can draw from this comparison is that Silk Road-related trades could plausibly correspond to 4.5% to 9% of all exchange trades}}</ref> Child pornography,<ref name="notonly" /> murder-for-hire services,<ref>{{cite web |url=http://www.thedailybeast.com/articles/2013/10/17/hitman-network-says-it-accepts-bitcoins-to-murder-for-hire.html |title=Hitman Network Says It Accepts Bitcoins to Murder for Hire |publisher=[[The Daily Beast Company LLC]] |work=The Daily Beast |date=17 October 2013 |accessdate=17 February 2015 |author=Lake, Eli}}</ref> and weapons<ref>{{cite news |url=http://www.huffingtonpost.com/2013/04/15/bitcoin-guns_n_3070828.html |title=How Bitcoin Sales Of Guns Could Undermine New Rules |publisher=TheHuffingtonPost.com, Inc. |work=huffingtonpost.com |date=15 April 2013 |accessdate=20 October 2013 |author=Smith, Gerry}}</ref> are also allegedly available on black market sites that sell in bitcoin. Due to the anonymous nature and the lack of central control on these markets, it is hard to know whether the services are real or just trying to take the bitcoins.<ref>{{citation |url=https://www.forbes.com/sites/alexknapp/2015/01/19/faking-murders-and-stealing-bitcoin-why-the-silk-road-is-the-strangest-crime-story-of-the-decade/ |accessdate=2 January 2016 |title=Faking Murders And Stealing Bitcoin: Why The Silk Road Is The Strangest Crime Story Of The Decade |date=19 January 2015 |work=Forbes |last1=Alex |first1=Knapp}}</ref>
 
A variant race attack (which has been called a Finney attack by reference to Hal Finney) requires the participation of a miner. Instead of sending both payment requests (to pay Bob and Alice with the same coins) to the network, Eve issues only Alice's payment request to the network, while the accomplice tries to mine a block that includes the payment to Bob instead of Alice. There is a positive probability that the rogue miner will succeed before the network, in which case the payment to Alice will be rejected. As with the plain race attack, Alice can reduce the risk of a Finney attack by waiting for the payment to be included in the blockchain.<ref>{{cite journal |title=Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin |url=http://eprint.iacr.org/2012/248.pdf |last1=Karame |first1=Ghassan O. |last2=Androulaki |first2=Elli |last3=Capkun |first3=Srdjan |publisher=International Association for Cryptologic Research |website=iacr.org |year=2012 |access-date=22 October 2014}}</ref>
Several deep web black markets have been shut by authorities. In October 2013 Silk Road was shut down by U.S. law enforcement<ref name=Greenberg>{{cite news |url=https://www.forbes.com/sites/andygreenberg/2013/10/25/fbi-says-its-seized-20-million-in-bitcoins-from-ross-ulbricht-alleged-owner-of-silk-road/ |title=FBI Says It's Seized $28.5 Million In Bitcoins From Ross Ulbricht, Alleged Owner Of Silk Road |author=Andy Greenberg |publisher=Forbes.com |format=blog |date=23 October 2013 |accessdate=24 November 2013}}</ref><ref name="Kelion, Leo">{{cite news |url=https://www.bbc.co.uk/news/technology-26158012 |title=Five arrested in Utopia dark net marketplace crackdown |publisher=BBC |work=bbc.co.uk |date=12 February 2014 |accessdate=13 February 2014 |author=Kelion, Leo}}</ref><ref>{{cite news |publisher=The Guardian |title=Bitcoin price plummets after Silk Road closure |author=Alex Hern |quote=Digital currency loses quarter of value after arrest of Ross Ulbricht, who is accused of running online drugs marketplace |date=3 October 2013 |url=https://www.theguardian.com/technology/2013/oct/03/bitcoin-price-silk-road-ulbricht-value |accessdate=31 October 2014}}</ref> leading to a short-term decrease in the value of bitcoin.<ref>{{cite news |url=https://www.wired.com/2013/10/bitcoin-market-drops-600-million-on-silk-road-bust/ |title=Bitcoin Values Plummet $500M, Then Recover, After Silk Road Bust |author=Robert McMillan |date=2 October 2013 |publisher=Wired |accessdate=31 October 2014}}</ref> In 2015, the founder of the site was sentenced to life in prison.<ref>{{cite web |url=https://www.bbc.com/news/world-us-canada-32941060 |title=Silk Road drug website founder Ross Ulbricht jailed |publisher=BBC |work=BBC News |date=29 May 2015 |accessdate=30 May 2015}}</ref> Alternative sites were soon available, and in early 2014 the [[Australian Broadcasting Corporation]] reported that the closure of Silk Road had little impact on the number of Australians selling drugs online, which had actually increased.<ref>{{cite news |url=http://www.abc.net.au/news/2014-03-31/online-drug-trade-soaring-experts-say/5354930 |publisher=ABC News |title=Silk Road closure fails to dampen illegal drug sales online, experts say |author=Katie Silver |date=31 March 2014 |accessdate=31 October 2014}}</ref> In early 2014, Dutch authorities closed Utopia, an online illegal goods market, and seized 900 bitcoins.<ref>{{cite news |url=https://www.independent.co.uk/life-style/gadgets-and-tech/utopia-no-more-drug-marketplace-seen-as-the-next-silk-road-shut-down-by-dutch-police-9126063.html |title=Utopia no more: Drug marketplace seen as the next Silk Road shut down by Dutch police |publisher=independent.co.uk |work=The Independent |date=13 February 2014 |accessdate=8 November 2014 |author=Sophie Murray-Morris |___location=London}}</ref> In late 2014, a joint police operation saw European and American authorities seize bitcoins and close 400 deep web sites including the illicit goods market Silk Road 2.0.<ref>{{cite web |url=https://www.bbc.com/news/technology-29950946 |title=Huge raid to shut down 400-plus dark net sites |publisher=BBC |work=bbc.com |date=7 November 2014 |accessdate=8 November 2014 |author=Wakefield, Jane}}</ref> Law enforcement activity has resulted in several convictions. In December 2014, Charlie Shrem was sentenced to two years in prison for indirectly helping to send $1 million to the Silk Road drugs site,<ref name="TR20141209">{{cite news |author1=Nate Raymond |title=Bitcoin backer gets two years prison for illicit transfers |url=https://www.reuters.com/article/2014/12/19/us-usa-crime-bitcoin-idUSKBN0JX2CW20141219 |accessdate=20 December 2014 |work=Reuters |publisher=Thompson Reuters |date=19 December 2014}}</ref> and in February 2015, its founder, [[Ross Ulbricht]], was convicted on drugs charges and faces a life sentence.<ref>{{cite web |url=https://www.bbc.com/news/world-us-canada-31134938 |title=Ross Ulbricht: Silk Road creator convicted on drugs charges |publisher=BBC |date=5 February 2015 |accessdate=17 February 2015}}</ref>
 
==== History modification ====
Some black market sites may seek to steal bitcoins from customers. The bitcoin community branded one site, Sheep Marketplace, as a scam when it prevented withdrawals and shut down after an alleged bitcoins theft.<ref name="techienews">{{cite web |url=http://www.techienews.co.uk/973470/silk-road-like-sheep-marketplace-scams-users-39k-bitcoins-worth-40-million-stolen/ |title=Silk Road-like Sheep Marketplace scams users; over 39k Bitcoins worth $40 million stolen |author=Ravi Mandalia |publisher=Techie News |date=1 December 2013 |accessdate=2 December 2013}}</ref> In a separate case, escrow accounts with bitcoins belonging to patrons of a different black market were hacked in early 2014.<ref name="silk2">{{cite news |url=https://www.bbc.co.uk/news/technology-26187725 |title=Silk Road 2 loses $2.7m in bitcoins in alleged hack |work=BBC News |date=14 February 2014 |accessdate=15 February 2014}}</ref>
Each block that is added to the blockchain, starting with the block containing a given transaction, is called a confirmation of that transaction. Ideally, merchants and services that receive payment in bitcoin should wait for at least a few confirmations to be distributed over the network before assuming that the payment was done. The more confirmations that the merchant waits for, the more difficult it is for an attacker to successfully reverse the transaction—unless the attacker controls more than half the total network power, in which case it is called a 51% attack, or a majority attack.<ref name="51%">{{cite news |author1=Michael J. Casey |author2=Paul Vigna |title=Short-Term Fixes To Avert "51% Attack" |url=https://blogs.wsj.com/moneybeat/2014/06/16/bitbeat-a-51-attack-what-is-it-and-could-it-happen/ |access-date=30 June 2014 |work=Money Beat |publisher=Wall Street Journal |date=16 June 2014}}</ref>
Although more difficult for attackers of a smaller size, there may be financial incentives that make history modification attacks profitable.<ref>{{cite book |url=https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00016 |last1=Bar-Zur|first1=Roi |last2=Abu-Hanna |first2=Ameer |last3=Eyal |first3=Ittay |last4=Tamar |first4=Aviv |title=2023 IEEE Symposium on Security and Privacy (SP) |publisher=IEEE Computer Society |year=2023 |doi=10.1109/SP46215.2023 |isbn=978-1-6654-9336-9 |access-date=15 May 2023}}</ref>
 
=== Scalability ===
According to the [[Internet Watch Foundation]], a UK-based charity, bitcoin is used to purchase child pornography, and almost 200 such websites accept it as payment. Bitcoin isn't the sole way to purchase child pornography online, as Troels Oertling, head of the cybercrime unit at [[Europol]], states, "[[Ukash]] and [[paysafecard]]... have [also] been used to pay for such material." However, the Internet Watch Foundation lists around 30 sites that exclusively accept bitcoins.<ref name=notonly>{{cite news |url=https://www.bloomberg.com/news/articles/2014-10-09/bitcoin-payments-by-pedophiles-frustrate-child-porn-fight |title=Bitcoin Payments by Pedophiles Frustrate Child Porn Fight |publisher=Bloomberg LP |work=BloombergBusiness |date=10 October 2014 |accessdate=16 February 2015 |author=Schweizer, Kristen}}</ref> Some of these sites have shut down, such as a deep web [[crowdfunding]] website that aimed to fund the creation of new child porn.<ref>{{Cite news |url=http://www.deepdotweb.com/2014/11/09/as-drug-markets-are-seized-pedophiles-launch-a-crowdfunding-site/ |title=While Markets Get Seized: Pedophiles Launch a Crowdfunding Site |access-date=19 February 2015 |archive-url=https://web.archive.org/web/20150208050521/http://www.deepdotweb.com/2014/11/09/as-drug-markets-are-seized-pedophiles-launch-a-crowdfunding-site/ |archive-date=8 February 2015 |url-status=dead }}</ref>{{better source|date=September 2015}} Furthermore, hyperlinks to child porn websites have been added to the blockchain as arbitrary data can be included when a transaction is made.<ref>{{cite web |url=http://www.dailydot.com/business/bitcoin-child-porn-transaction-code/ |title=If you own Bitcoin, you also own links to child porn |work=The Daily Dot |date=7 May 2013 |accessdate=16 February 2015 |author=Hopkins, Curt}}</ref><ref>{{cite web |url=http://eandt.theiet.org/magazine/2015/02/in-blocks-we-trust.cfm |title=As Bitcoin slides, the Blockchain grows |publisher=IET Engineering and Technology Magazine |last=Bradbury |first=Danny |archive-url=https://web.archive.org/web/20160830144934/http://eandt.theiet.org/magazine/2015/02/in-blocks-we-trust.cfm |archive-date=30 August 2016 |url-status=dead }}</ref>
{{excerpt|Bitcoin scalability problem}}
 
=== Money launderingPrivacy ===
==== Deanonymisation of clients ====
Bitcoins may not be ideal for money laundering, because all transactions are public.<ref name="FistfulPaper201308">{{cite news |url=http://www.pcworld.com/article/2047608/bitcoin-offers-privacy-as-long-as-you-dont-cash-out-or-spend-it.html |title=Bitcoin offers privacy-as long as you don't cash out or spend it |last=Kirk |first=Jeremy |date=28 August 2013 |work=PC World |accessdate=31 October 2014}}</ref> Authorities, including the [[European Banking Authority]]<ref name="ebawarn">{{cite web |url=http://www.eba.europa.eu/documents/10180/16136/EBA+Warning+on+Virtual+Currencies.pdf |archiveurl=https://web.archive.org/web/20131224121925/http://www.eba.europa.eu/documents/10180/16136/EBA+Warning+on+Virtual+Currencies.pdf |archivedate=24 December 2013 |title=Warning to consumers on virtual currencies |publisher=European Banking Authority |date=12 December 2013 |accessdate=23 December 2013 |url-status=dead |df=dmy }}</ref> the FBI,<ref name="fbi_report" /> and the [[Financial Action Task Force]] of the [[G7]]<ref name=fatf>{{cite web |url=http://www.fatf-gafi.org/media/fatf/documents/recommendations/Guidance-RBA-NPPS.pdf |title=Guidance for a Risk-Based Approach: Prepaid Cards, Mobile Payments and Internet-based Payment Services |work=Guidance for a risk-based approach |publisher=Financial Action Task Force (FATF) |accessdate=6 March 2014 |___location=Paris |page=47 |format=PDF |date=June 2013}}</ref> have expressed concerns that bitcoin may be used for money laundering. In early 2014, an operator of a U.S. bitcoin exchange, [[Charlie Shrem]], was arrested for money laundering.<ref name=vchair>{{cite news |url=https://www.bbc.co.uk/news/technology-25919482 |title=US makes Bitcoin exchange arrests after Silk Road closure |publisher=BBC |work=bbc.co.uk |date=27 January 2014 |accessdate=28 January 2014 |author=Lee, Dave}}</ref> Subsequently, he was sentenced to two years in prison for "aiding and abetting an unlicensed money transmitting business".<ref name="TR20141209" /> Alexander Vinnik, an alleged owner of BTC-e was arrested in Greece July 25 of 2017 on $4 billion money laundering charges for flouting anti-money laundering (AML) laws of the US. A report by the UK's [[HM Treasury|Treasury]] and [[Home Office]] named "UK national risk assessment of money laundering and terrorist financing" (2015 October) found that, of the twelve methods examined in the report, bitcoin carries the lowest risk of being used for money laundering, with the most common money laundering method being the banks.<ref>{{cite web |title=UK national risk assessment of money laundering and terrorist financing |url=https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/468210/UK_NRA_October_2015_final_web.pdf |publisher=UK HM Treasury and Home Office |accessdate=3 May 2016}}</ref>
[[Deanonymisation]] is a strategy in data mining in which anonymous data is cross-referenced with other sources of data to re-identify the anonymous data source. Along with transaction graph analysis, which may reveal connections between bitcoin addresses (pseudonyms),<ref name=quantitative /><ref name=reid>{{cite book |last1=Reid |first1=Fergal |last2=Harrigan |first2=Martin |chapter=An Analysis of Anonymity in the Bitcoin System |title=Security and Privacy in Social Networks |date=2013 |pages=197–223|___location=New York, NY |doi=10.1007/978-1-4614-4139-7_10 |isbn=978-1-4614-4138-0 |arxiv=1107.4524 }}</ref> there is a possible attack<ref name=dep2p>{{cite journal |last1=Biryukov |first1=Alex |last2=Khovratovich |first2=Dmitry |last3=Pustogarov |first3=Ivan |title=Deanonymisation of clients in Bitcoin P2P network |journal=ACM Conference on Computer and Communications Security |date=2014 |url=http://orbilu.uni.lu/handle/10993/18679 |arxiv=1405.7418 |bibcode=2014arXiv1405.7418B |isbn=9781450329576 |access-date=16 May 2017 |archive-date=22 May 2017 |archive-url=https://web.archive.org/web/20170522151641/http://orbilu.uni.lu/handle/10993/18679 |url-status=dead }}</ref> which links a user's pseudonym to its [[IP address]]. If the peer is using [[Tor (anonymity network)|Tor]], the attack includes a method to separate the peer from the Tor network, forcing them to use their real IP address for any further transactions. The cost of the attack on the full bitcoin network was estimated to be under €1500 per month, as of 2014.<ref name="dep2p" />
 
=== Ponzi scheme ===
In a [[Ponzi scheme]] using bitcoins, the Bitcoin Savings and Trust promised investors up to 7% weekly interest, and raised at least 700,000 bitcoins from 2011 to 2012.<ref name=secponzi /> In July 2013, the [[U.S. Securities and Exchange Commission]] charged the company and its founder in 2013 "with defrauding investors in a Ponzi scheme involving bitcoin".<ref name=secponzi>{{cite press release |url=https://www.sec.gov/News/PressRelease/Detail/PressRelease/1370539730583 |date=23 July 2013 |issue=2013-132 |title=SEC charges Texas man with running Bitcoin-denominated Ponzi scheme |publisher=US Securities and Exchange Commission |accessdate=7 March 2014}}</ref> In September 2014 the judge fined Bitcoin Savings & Trust and its owner $40 million.<ref>{{cite news |title=Bitcoin Savings & Trust Comes Up $40 Million Short On The Trust Part |url=https://www.forbes.com/sites/jayadkisson/2014/09/25/bitcoin-savings-trust-comes-up-40-million-short-on-the-trust-part |author=Jay Adkisson |date=25 September 2014 |accessdate=13 December 2014 |work=Forbes}}</ref>
 
== See also ==
 
* [[Lists of network protocols]]
{{Clear}}
*[[List of bitcoin organizations]]
*[[Economics of bitcoin|Economics of Bitcoin]]
{{-}}
 
==References==
{{Reflist|2}}
 
===Works cited===
* {{Cite journal |last1=de Vries |first1=Alex |last2=Gallersdörfer |first2=Ulrich |last3=Klaaßen |first3=Lena |last4=Stoll |first4=Christian |date=16 March 2022 |title=Revisiting Bitcoin's carbon footprint |journal=[[Joule (journal)|Joule]] |volume=6 |issue=3 |pages=498–502 |doi=10.1016/j.joule.2022.02.005 |s2cid=247143939 |issn=2542-4351|doi-access=free |bibcode=2022Joule...6..498D }}
 
{{Bitcoin|state=expanded}}
{{Cryptocurrencies}}
{{Portal bar|Economics|Free and open-source software|Internet}}
{{Authority control}}
 
[[Category:Bitcoin]]
[[Category:Blockchains]]