Cryptocurrency

What Is Bitcoin

Bitcoin[a] () is a cryptocurrency invented in 2008 by an unknown person or group of people using the name Satoshi Nakamoto[15] and started in 2009[16] when its implementation was released as open-source software.[7]:ch. 1

It is a decentralized digital currency without a central bank or single administrator that can be sent from user to user on the peer-to-peer bitcoin network without the need for intermediaries.[8] Transactions are verified by network nodes through cryptography and recorded in a public distributed ledger called a blockchain. Bitcoins are created as a reward for a process known as mining. They can be exchanged for other currencies, products, and services.[17] Research produced by University of Cambridge estimates that in 2017, there were 2.9 to 5.8 million unique users using a cryptocurrency wallet, most of them using bitcoin.[18]

Bitcoin has been praised and criticized. Critics noted its use in illegal transactions, the large amount of electricity used by miners, price volatility, and thefts from exchanges. Some economists, including several Nobel laureates, have characterized it as a speculative bubble. Bitcoin has also been used as an investment, although several regulatory agencies have issued investor alerts about bitcoin.[19][20]

 

Wallets

Electrum, a lightweight client

wallet stores the information necessary to transact bitcoins. While wallets are often described as a place to hold[109] or store bitcoins, due to the nature of the system, bitcoins are inseparable from the blockchain transaction ledger. A wallet is more correctly defined as something that “stores the digital credentials for your bitcoin holdings” and allows one to access (and spend) them.[7]:ch. 1, glossary Bitcoin uses public-key cryptography, in which two cryptographic keys, one public and one private, are generated.[110] At its most basic, a wallet is a collection of these keys.

There are several modes which wallets can operate in. They have an inverse relationship with regards to trustlessness and computational requirements.

  • Full clients verify transactions directly by downloading a full copy of the blockchain (over 150 GB as of January 2018).[111] They are the most secure and reliable way of using the network, as trust in external parties is not required. Full clients check the validity of mined blocks, preventing them from transacting on a chain that breaks or alters network rules.[7]:ch. 1 Because of its size and complexity, downloading and verifying the entire blockchain is not suitable for all computing devices.
  • Lightweight clients consult full clients to send and receive transactions without requiring a local copy of the entire blockchain (see simplified payment verification – SPV). This makes lightweight clients much faster to set up and allows them to be used on low-power, low-bandwidth devices such as smartphones. When using a lightweight wallet, however, the user must trust the server to a certain degree, as it can report faulty values back to the user. Lightweight clients follow the longest blockchain and do not ensure it is valid, requiring trust in miners.[112]

Third-party internet services called online wallets offer similar functionality but may be easier to use. In this case, credentials to access funds are stored with the online wallet provider rather than on the user’s hardware.[113] As a result, the user must have complete trust in the online wallet provider. A malicious provider or a breach in server security may cause entrusted bitcoins to be stolen. An example of such a security breach occurred with Mt. Gox in 2011.[114]

Physical wallets

A paper wallet with a banknote-like design. Both the private key and the address are visible in text form and as 2D barcodes.
A paper wallet with the address visible for adding or checking stored funds. The part of the page containing the private key is folded over and sealed.
A brass token with a private key hidden beneath a tamper-evident security hologram. A part of the address is visible through a transparent part of the hologram.
A hardware wallet peripheral which processes bitcoin payments without exposing any credentials to the computer.

Physical wallets store the credentials necessary to spend bitcoins offline and can be as simple as a paper printout of the private key:[7]:ch. 10 a paper wallet. A paper wallet is created with a keypair generated on a computer with no internet connection; the private key is written or printed onto the paper[h] and then erased from the computer. The paper wallet can then be stored in a safe physical location for later retrieval. Bitcoins stored using a paper wallet are said to be in cold storage.[115]:39

Cameron and Tyler Winklevoss, the founders of the Gemini Trust Co. exchange, reported that they had cut their paper wallets into pieces and stored them in envelopes distributed to safe deposit boxes across the United States.[116] Through this system, the theft of one envelope would neither allow the thief to steal any bitcoins nor deprive the rightful owners of their access to them.[117]

Physical wallets can also take the form of metal token coins[118] with a private key accessible under a security hologram in a recess struck on the reverse side.[119]:38 The security hologram self-destructs when removed from the token, showing that the private key has been accessed.[120] Originally, these tokens were struck in brass and other base metals, but later used precious metals as bitcoin grew in value and popularity.[119]:80 Coins with stored face value as high as ₿1000 have been struck in gold.[119]:102–104 The British Museum‘s coin collection includes four specimens from the earliest series[119]:83 of funded bitcoin tokens; one is currently on display in the museum’s money gallery.[121] In 2013, a Utahn manufacturer of these tokens was ordered by the Financial Crimes Enforcement Network (FinCEN) to register as a money services business before producing any more funded bitcoin tokens.[118][119]:80

Another type of physical wallet called a hardware wallet keeps credentials offline while facilitating transactions.[122] The hardware wallet acts as a computer peripheral and signs transactions as requested by the user, who must press a button on the wallet to confirm that they intended to make the transaction. Hardware wallets never expose their private keys, keeping bitcoins in cold storage even when used with computers that may be compromised by malware.[115]:42–45