Bitcoin is a digital currency created in 2009. It follows the ideas set out in a white paper by the mysterious Satoshi Nakamoto, whose true identity has yet to be verified. Bitcoin offers the promise of lower transaction fees than traditional online payment mechanisms and is operated by a decentralized authority, unlike government-issued currencies.
No one knows. Not conclusively, at any rate. Satoshi Nakamoto is the name associated with the person or group of people who released the original Bitcoin white paper in 2008 and worked on the original Bitcoin software that was released in 2009. The Bitcoin protocol requires users to enter a birthday upon signup, and we know that an individual named Satoshi Nakamoto registered and put down April 5 as a birth date. And that's about it.
On 6 August 2010, a major vulnerability in the bitcoin protocol was spotted. Transactions weren't properly verified before they were included in the transaction log or blockchain, which let users bypass bitcoin's economic restrictions and create an indefinite number of bitcoins. On 15 August, the vulnerability was exploited; over 184 billion bitcoins were generated in a transaction, and sent to two addresses on the network. Within hours, the transaction was spotted and erased from the transaction log after the bug was fixed and the network forked to an updated version of the bitcoin protocol. This was the only major security flaw found and exploited in bitcoin's history.
The simplest way to approach the model would be to look at the current worldwide value of all mediums of exchange and of all stores of value comparable to bitcoin, and calculate the value of bitcoin's projected percentage. The predominant medium of exchange is government backed money, and for our model we will focus solely on them. The money supply is often thought of as broken into different buckets, M0, M1, M2, and M3. M0 refers to currency in circulation. M1 is M0 plus demand deposits like checking accounts. M2 is M1 plus savings accounts and small time deposits (known as certificates of deposit in the US). M3 is M2 plus large time deposits and money market funds. Since M0 and M1 are readily accessible for use in commerce, we will consider these two buckets as medium of exchange, whereas M2 and M3 will be considered as money being used as a store of value.
The bitcoin blockchain is a public ledger that records bitcoin transactions. It is implemented as a chain of blocks, each block containing a hash of the previous block up to the genesis block[a] of the chain. A network of communicating nodes running bitcoin software maintains the blockchain.:215–219 Transactions of the form payer X sends Y bitcoins to payee Z are broadcast to this network using readily available software applications.
Bitcoin mining is the process through which bitcoins are released to come into circulation. Basically, it involves solving a computationally difficult puzzle to discover a new block, which is added to the blockchain, and receiving a reward in the form of few bitcoins. The block reward was 50 new bitcoins in 2009; it decreases every four years. As more and more bitcoins are created, the difficulty of the mining process – that is, the amount of computing power involved – increases. The mining difficulty began at 1.0 with Bitcoin's debut back in 2009; at the end of the year, it was only 1.18. As of April 2017, the mining difficulty is over 4.24 billion. Once, an ordinary desktop computer sufficed for the mining process; now, to combat the difficulty level, miners must use faster hardware like Application-Specific Integrated Circuits (ASIC), more advanced processing units like Graphic Processing Units (GPUs), etc.
After a certain amount of transactions have been verified by a miner, they will receive newly minted bitcoins for their work and thus new bitcoins will be added into circulation, while the number of bitcoins in circulations are now in the multi-millions range, the maximum amount of bitcoins that can ever be created is capped at 21 million. The creation rate is automatically halved every few years as more bitcoins are added into circulation, whilst this system is modeled after gold, mining difficulty is always increasing and makes finding new bitcoins more rare as the number of available bitcoins reaches the 21 million cap.
In late August 2012, an operation titled Bitcoin Savings and Trust was shut down by the owner, leaving around US$5.6 million in bitcoin-based debts; this led to allegations that the operation was a Ponzi scheme. In September 2012, the U.S. Securities and Exchange Commission had reportedly started an investigation on the case.
Volatility. This very reason many speculators are attracted to Bitcoin is the same reason many potential users are hesitant to get involved. Users that look at Bitcoin as a speculative investment option are essentially gambling on the process, and the future price of Bitcoin is largely unknown. There are estimates that Bitcoin will both be worth pennies in a few years, while some predict that a single bitcoin will be worth $500k in three years. As new investors continue to invest and the market cap grows, Bitcoin’s price could become more stable.
Computing power is often bundled together or "pooled" to reduce variance in miner income. Individual mining rigs often have to wait for long periods to confirm a block of transactions and receive payment. In a pool, all participating miners get paid every time a participating server solves a block. This payment depends on the amount of work an individual miner contributed to help find that block.
Lightweight clients consult full clients to send and receive transactions without requiring a local copy of the entire blockchain (see simplified payment verification – SPV). This makes lightweight clients much faster to set up and allows them to be used on low-power, low-bandwidth devices such as smartphones. When using a lightweight wallet, however, the user must trust the server to a certain degree, as it can report faulty values back to the user. Lightweight clients follow the longest blockchain and do not ensure it is valid, requiring trust in miners.
Nobody owns the Bitcoin network much like no one owns the technology behind email or the Internet. Bitcoin transactions are verified by Bitcoin miners which has an entire industry and Bitcoin cloud mining options. While developers are improving the software they cannot force a change in the Bitcoin protocol because all users are free to choose what software and version they use.
On 3 March 2014, Flexcoin announced it was closing its doors because of a hack attack that took place the day before. In a statement that once occupied their homepage, they announced on 3 March 2014 that "As Flexcoin does not have the resources, assets, or otherwise to come back from this loss [the hack], we are closing our doors immediately." Users can no longer log into the site.
To heighten financial privacy, a new bitcoin address can be generated for each transaction. For example, hierarchical deterministic wallets generate pseudorandom "rolling addresses" for every transaction from a single seed, while only requiring a single passphrase to be remembered to recover all corresponding private keys. Researchers at Stanford and Concordia universities have also shown that bitcoin exchanges and other entities can prove assets, liabilities, and solvency without revealing their addresses using zero-knowledge proofs. "Bulletproofs," a version of Confidential Transactions proposed by Greg Maxwell, have been tested by Professor Dan Boneh of Stanford. Other solutions such Merkelized Abstract Syntax Trees (MAST), pay-to-script-hash (P2SH) with MERKLE-BRANCH-VERIFY, and "Tail Call Execution Semantics", have also been proposed to support private smart contracts.
^ Jump up to: a b c d "Statement of Jennifer Shasky Calvery, Director Financial Crimes Enforcement Network United States Department of the Treasury Before the United States Senate Committee on Banking, Housing, and Urban Affairs Subcommittee on National Security and International Trade and Finance Subcommittee on Economic Policy" (PDF). fincen.gov. Financial Crimes Enforcement Network. 19 November 2013. Archived (PDF) from the original on 9 October 2016. Retrieved 1 June 2014.