• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

A Cryptocurrency Primer

August 24, 2018 By Marc Laliberte

By now you’ve probably heard of BitCoin and maybe even a few other cryptocurrencies. The cryptocurrency industry skyrocketed in popularity through the end of last year, fueling a surge that saw Bitcoin reach $20,000 per coin and several other altcoins (cryptocurrencies other than Bitcoin) reach their own all-time highs. While the markets may have cooled, the buzz around cryptocurrency and the blockchain technology that they are built on sure hasn’t.

Blockchain technology has many uses, from securing distribution of copyrighted material to collecting and trading digital cats. Its most popular use however, comes in the form of a distributed public ledger, or cryptocurrency as it is more commonly called.

The idea of a digital currency has been around for a long time. One of the issues holding it back however was a concept called “double spend” which means spending the same digital money twice. Generally, there aren’t any technical barriers that prevent you from copying a digital file like a document or an MP3. If your digital cryptocoin was simply a file on your computer, you could print your own money by copying that file over and over again. In 2009, an anonymous individual (or group of individuals) going by Satoshi Nakamoto released Bitcoin as a means to solve this double-spend problem.

Bitcoin in its simplest form is a distributed public ledger. But what do we mean by a distributed public ledger? Let’s start from back to front.

  • Ledger: The Bitcoin blockchain tracks transactions of digital “coins” between individuals. If Jimmy sends Sally a single Bitcoin, that transaction is announced in the Bitcoin network and, assuming it passes validation checks, is written permanently on to the ledger.
  • Public: Anyone can obtain their own copy of the ledger by setting up a “node.” Nodes are just computers or servers on the blockchain that are in charge of receiving transactions, validating them, and then adding them to the ledger. The process of validating and adding transactions is called “mining.”
  • Distributed: The ledger exists across thousands, even tens of thousands of nodes. Each of these nodes maintains their own copy of the ledger which is constantly synced to the network to ensure’s copy is identical.

Someone who buys a Bitcoin doesn’t receive a file or any other digital asset. Instead, the ledger simply notes that their account, or their “wallet” as it’s called, received a Bitcoin from another account. Most cryptocurrencies rely on asymmetric cryptography and a wallet is just another name for a public encryption key. A wallet owner can send their cryptocurrency by signing a transaction with their private key, which only they know. Blockchain nodes can validate the transaction with the associated public key to confirm the owner is indeed the one who sent it. Security comes from the fact that it is computationally hard (near-impossible with modern computers) to recover a private key knowing only the public key.

Bitcoin and other cryptocurrency wallets aren’t completely immune to attacks. Malware can steal your wallet’s private key and drain your funds if your password isn’t sufficiently strong. Phishing attacks are also just as effective in the world of cryptocurrency as they are elsewhere in life. Just this last February, attackers launched a convincing phishing attack using paid advertising which resulted in the theft of over $50 million in cryptocurrency. This is why most experts recommend using a “cold wallet”, a wallet that you generate on a computer or device that never accesses the internet, to store large amounts of cryptocurrency.

Cryptocurrencies are likely here to stay. Whether Bitcoin remains king is still yet to be seen though. Keep an eye out for our next article on the topic which dives in to three other alternative coins (altcoins) and how they differ from Bitcoin.

Share This:

Related

Filed Under: Editorial Articles, Featured

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • Here Come The Regulations
  • Successfully Prosecuting a Russian Hacker

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use