Hacking of the Bitcoin Ledger by Breaking the Encryption


Many people still talk about Bitcoin getting hacked. This is a major misunderstanding. The distributed architecture and the cryptographic hashing system make the Bitcoin ledger extraordinarily secure. Indeed, the system’s resilience to hacking is one of its major selling points. The Bitcoin ledger itself appears never to have been hacked. The hacks and consumer losses that people talk about are actually due to mishandling of private keys. The private key (password) is what provides secure access to your bitcoins. Fundamentally, bitcoins are bearer assets, so if you lose the key, you lose the asset.


Fortunately, you can handle Bitcoin securely if you know what you’re doing. Moreover, there are numerous companies and organizations currently developing better systems for management of private keys. This means that in the future people will have access to a menu of options for securing their bitcoins that range from self-managed deep cold storage to hybrid solutions involving trusted third parties.


Related to the perceived risk of a hack of the blockchain is the risk of a “back door” weakness purposefully written into the software. This is extraordinarily unlikely because Bitcoin has already existed for a decade as open-source software “in the wild.” Anyone in the world who has Internet access can audit the code, and probably tens of thousands of people have done so. This intense level of scrutiny makes hiding malicious code nearly impossible, especially since the Bitcoin software is so simple compared to many modern software programs. Bitcoin’s software started with just a few thousand lines of codes, and the most common Bitcoin Core implementation is still only around a hundred thousand lines.¹⁵⁰ For comparison, Microsoft Windows has tens of millions of lines.¹⁵¹


Prior to launching the network, Bitcoin’s creator(s) would have known that mining and maintaining the operation of the network in its infancy would likely fall primarily to him/her/them, which would result in the accumulation of a significant number of bitcoins. It is believed that the founder(s) of Bitcoin owns a significant number of bitcoins, worth billions of dollars at current prices as a result of mining in the early years when the rate of issuance of new bitcoins was higher. It seems very unlikely that Bitcoin’s creator would risk destroying a multi-billion-dollar fortune by destroying confidence in Bitcoin. He/she/they would have realized that creating a durable and secure network would be far more profitable than creating one with a security hole and attempting to “exit scam” the system—even if the founder(s) thought he/she/they could sneak it past the thousands of programmers crawling all over the open-source code. This logic assumes that the founder(s) is/are even still alive today. There is a contingent within the Bitcoin community that believes the founder(s) died years ago, and it is possible that the founder(s)’ bitcoins are lost forever along with the private keys that control them.


The cryptographic tools used in Bitcoin (primarily SHA-256 and ECDSA described in Chapter 7) have been used and field-tested for decades. They are therefore believed to be secure. However, they have not been mathematically proven to be unsolvable (other than by brute force computation). It’s therefore theoretically possible that they could be broken by new mathematical solutions or computational techniques not yet invented.


Quantum computers, which have recently made it off the drawing board and into the laboratory in recent years, could eventually become capable of breaking Bitcoin’s encryption, especially ECDSA. But thus far the history of cryptography has demonstrated that the encoders have been able to stay ahead of the codebreakers by developing better encryption techniques. It seems likely this will continue to be true since “quantum-resistant” encryption techniques are currently under development to meet the challenge of the quantum computers. However, if the Bitcoin network were to implement a stronger form of encryption in response to a new technique (quantum computing or otherwise) for breaking Bitcoin’s security, such an implementation might require the network to “hard fork” to a new version. This would require the network node operators to upgrade to the new version, and such an event could be disruptive.

Why Buy Bitcoin: Investing Today in the Money of Tomorrow
coverpage.xhtml
chapter0000.html
chapter0001.html
chapter0002.html
chapter0003.html
chapter0004.html
chapter0005.html
chapter0006.html
chapter0007.html
chapter0008.html
chapter0009.html
chapter0010.html
chapter0011.html
chapter0012.html
chapter0013.html
chapter0014.html
chapter0015.html
chapter0016.html
chapter0017.html
chapter0018.html
chapter0019.html
chapter0020.html
chapter0021.html
chapter0022.html
chapter0023.html
chapter0024.html
chapter0025.html
chapter0026.html
chapter0027.html
chapter0028.html
chapter0029.html
chapter0030.html
chapter0031.html
chapter0032.html
chapter0033.html
chapter0034.html
chapter0035.html
chapter0036.html
chapter0037.html
chapter0038.html
chapter0039.html
chapter0040.html
chapter0041.html
chapter0042.html
chapter0043.html
chapter0044.html
chapter0045.html
chapter0046.html
chapter0047.html
chapter0048.html
chapter0049.html
chapter0050.html
chapter0051.html
chapter0052.html
chapter0053.html
chapter0054.html
chapter0055.html
chapter0056.html
chapter0057.html
chapter0058.html
chapter0059.html
chapter0060.html
chapter0061.html
chapter0062.html
chapter0063.html
chapter0064.html
chapter0065.html
chapter0066.html
chapter0067.html
chapter0068.html
chapter0069.html
chapter0070.html
chapter0071.html
chapter0072.html
chapter0073.html
chapter0074.html
chapter0075.html
chapter0076.html
chapter0077.html
chapter0078.html
chapter0079.html
chapter0080.html
chapter0081.html
chapter0082.html
chapter0083.html
chapter0084.html
chapter0085.html
chapter0086.html
chapter0087.html
chapter0088.html
chapter0089.html
chapter0090.html
chapter0091.html
chapter0092.html
chapter0093.html
chapter0094.html
chapter0095.html
chapter0096.html
chapter0097.html
chapter0098.html
chapter0099.html
chapter0100.html
chapter0101.html
chapter0102.html
chapter0103.html
chapter0104.html
chapter0105.html
chapter0106.html
chapter0107.html
chapter0108.html
chapter0109.html