You are on page 1of 121

Bitcoin

Contents

1 Overview 1
1.1 Bitcoin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.1 Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.2 Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.3 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1.4 Economics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1.5 Legal status, tax and regulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.1.6 Criminal activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.1.7 In academia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.1.8 In art, entertainment, and media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.1.9 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.1.10 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.1.11 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2 History of Bitcoin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.2.1 Pre-history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.2.2 Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.2.3 Growth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.2.4 Prices and value history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.2.5 Satoshi Nakamoto . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.2.6 The fork of March 2013 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.2.7 Regulatory issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.2.8 Theft and exchange shutdowns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.2.9 Taxation and regulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.2.10 Sports sponsorship . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.2.11 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.2.12 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
1.3 Legality of bitcoin by country . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
1.3.1 Detail by union . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
1.3.2 Detail by country or territory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
1.3.3 Footnotes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.3.4 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.3.5 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

i
ii CONTENTS

1.3.6 Websites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

2 People 32
2.1 Satoshi Nakamoto . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.1.1 Development of bitcoin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.1.2 Characteristics and identity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.1.3 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.1.4 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.2 Hal Finney . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.2.1 Early life and education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.2.2 Career . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.2.3 Bitcoin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.2.4 Private life, illness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.2.5 Death . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.2.6 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.2.7 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
2.3 Gavin Andresen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
2.3.1 Career . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
2.3.2 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
2.3.3 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
2.3.4 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.4 Nick Szabo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.4.1 Bit gold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.4.2 Bitcoin speculation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.4.3 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.4.4 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.5 Winklevoss twins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.5.1 Early life and education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.5.2 ConnectU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.5.3 Bitcoin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.5.4 Popular culture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.5.5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.6 Mark Karpels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
2.6.1 Early life and education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
2.6.2 Career . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
2.6.3 Arrest and prosecution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
2.6.4 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
2.6.5 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

3 Organizations 45
3.1 Bitcoin Foundation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
3.1.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
CONTENTS iii

3.1.2 Leadership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
3.1.3 Awards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
3.1.4 Criticism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
3.1.5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3.1.6 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

4 Technologies 48
4.1 Bitcoin network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
4.1.1 Transactions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
4.1.2 Mining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
4.1.3 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
4.1.4 Payment verication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
4.1.5 Data in the blockchain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
4.1.6 Criminal activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
4.1.7 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4.1.8 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4.2 Cryptocurrency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
4.2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
4.2.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
4.2.3 Legality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.2.4 Timestamping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
4.2.5 Economics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
4.2.6 List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
4.2.7 Academic studies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
4.2.8 Criticism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
4.2.9 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
4.2.10 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
4.2.11 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
4.2.12 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
4.3 Elliptic Curve Digital Signature Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
4.3.1 Key and signature-size comparison to DSA . . . . . . . . . . . . . . . . . . . . . . . . . . 65
4.3.2 Signature generation algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
4.3.3 Signature verication algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
4.3.4 Correctness of the algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
4.3.5 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.3.6 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.3.7 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.3.8 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.3.9 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
4.4 Peer-to-peer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
4.4.1 Historical development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
4.4.2 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
iv CONTENTS

4.4.3 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
4.4.4 Social implications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
4.4.5 Political implications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
4.4.6 Current research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
4.4.7 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
4.4.8 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
4.4.9 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
4.5 Proof-of-work system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
4.5.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
4.5.2 Variants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
4.5.3 List of proof-of-work functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
4.5.4 Reusable proof-of-work as e-money . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
4.5.5 Useful proof-of-work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
4.5.6 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
4.5.7 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
4.5.8 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
4.5.9 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
4.6 SHA-2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
4.6.1 Hash standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
4.6.2 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
4.6.3 Cryptanalysis and validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
4.6.4 Test vectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
4.6.5 Pseudocode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
4.6.6 Comparison of SHA functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
4.6.7 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
4.6.8 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
4.6.9 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

5 Exchanges 85
5.1 ANX (Hong Kong company) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
5.1.1 Company Growth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
5.1.2 Major Products and Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
5.1.3 Acquisitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
5.1.4 Agreements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
5.1.5 Awards and Recognitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
5.1.6 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
5.2 BitInstant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
5.2.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
5.2.2 Criticism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
5.2.3 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
5.3 Bitstamp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
5.3.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
CONTENTS v

5.3.2 Service disruptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89


5.3.3 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
5.3.4 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
5.3.5 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
5.4 BTC-e . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
5.4.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
5.4.2 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
5.5 BTC China . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
5.5.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
5.5.2 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
5.5.3 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
5.6 Buttercoin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
5.6.1 Funding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
5.6.2 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
5.6.3 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
5.7 Coinbase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
5.7.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
5.7.2 Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
5.7.3 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
5.7.4 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
5.8 Huobi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
5.8.1 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
5.9 ItBit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
5.9.1 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
5.10 LocalBitcoins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
5.10.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
5.10.2 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
5.10.3 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.11 Mt. Gox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.11.1 Founding (2006-10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.11.2 Security breach and invalid addresses (2011) . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.11.3 Processor of most of worlds bitcoin trades; issues (2013) . . . . . . . . . . . . . . . . . . 96
5.11.4 Withdrawals halted; trading suspended; bitcoin missing (2014) . . . . . . . . . . . . . . . 97
5.11.5 Bankruptcy; Stolen bitcoin (201416) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
5.11.6 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
5.11.7 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
5.11.8 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
5.12 OKCoin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
5.12.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
5.12.2 Controversy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
5.12.3 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
vi CONTENTS

6 Text and image sources, contributors, and licenses 102


6.1 Text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
6.2 Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
6.3 Content license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Chapter 1

Overview

1.1 Bitcoin Small amounts of bitcoin used as alternative units are mil-
libitcoin (mBTC),[1] microbitcoin (BTC, sometimes re-
Bitcoin is a worldwide cryptocurrency and digital ferred to as bit), and satoshi. Named in homage to bit-
payment system[13]:3 invented by an unknown program- coins creator, a satoshi is the smallest amount within bit-
mer, or a group of programmers, under the name Satoshi coin representing 0.00000001 bitcoin, one hundred mil-
Nakamoto.[14] It was released as open-source software in lionth of a bitcoin.[3] A millibitcoin equals to 0.001 bit-
2009.[15] coin, one thousandth of a bitcoin.[29] One microbitcoin
equals to 0.000001 bitcoin, one millionth of a bitcoin.
The system is peer-to-peer, and transactions take place
between users directly, without an intermediary.[13]:4
These transactions are veried by network nodes 1.1.2 Design
and recorded in a public distributed ledger called a
blockchain. Since the system works without a central Blockchain
repository or single administrator, bitcoin is called the
rst decentralized digital currency.[13]:1[16] For a broader coverage related to this topic, see
Besides being created as a reward for mining, bitcoin can Blockchain.
be exchanged for other currencies,[17] products, and ser- The blockchain is a public ledger that records bit-
vices in legal or black markets.[18][19]
50,500,000

As of February 2015, over 100,000 merchants and ven- 45,500,000

dors accepted bitcoin as payment.[20] According to re- 40,500,000

35,500,000
search produced by Cambridge University in 2017, there
30,500,000
are 2.9 to 5.8 million unique users using a cryptocurrency 25,500,000
wallet, most of them using bitcoin.[21] 20,500,000

15,500,000

10,500,000

1.1.1 Terminology 5,500,000

500,000
2011 2012 2013 2014 2015 2016 2017
[22]
The word bitcoin occurred in the white paper that de-
ned bitcoin published on 31 October 2008.[23] It is a Number of unspent transaction outputs
compound of the words bit and coin.[24] The white paper
frequently uses the shorter coin.[22] coin transactions.[30] A novel solution accomplishes this
There is no uniform convention for bitcoin capitalization. without any trusted central authority: maintenance of
Some sources use Bitcoin, capitalized, to refer to the tech- the blockchain is performed by a network of communi-
[13]
nology and network and bitcoin, lowercase, to refer to cating nodes running bitcoin software. Transactions
the unit of account. [25]
The Wall Street Journal, [26]
The of the form payer X sends Y bitcoins to payee Z are
Chronicle of Higher Education, [27]
and the Oxford En- broadcast to this network using readily available software
[31]
glish Dictionary [24]
advocate use of lowercase bitcoin in applications. Network nodes can validate transactions,
all cases, a convention which this article follows. add them to their copy of the ledger, and then broadcast
these ledger additions to other nodes. The blockchain is
a distributed database to achieve independent verica-
Units tion of the chain of ownership of any and every bitcoin
amount, each network node stores its own copy of the
The unit of account of the bitcoin system is bitcoin. blockchain.[32] Approximately six times per hour, a new
As of 2014, symbols used to represent bitcoin are group of accepted transactions, a block, is created, added
BTC,[note 1] XBT,[note 2] and (U+20BF, ).[note 3][28]:2 to the blockchain, and quickly published to all nodes.

1
2 CHAPTER 1. OVERVIEW

This allows bitcoin software to determine when a partic- 1,000,000,000,000

ular bitcoin amount has been spent, which is necessary 10,000,000,000

in order to prevent double-spending in an environment


100,000,000
without central oversight. Whereas a conventional ledger
records the transfers of actual bills or promissory notes 1,000,000

that exist apart from it, the blockchain is the only place 10,000
that bitcoins can be said to exist in the form of unspent
outputs of transactions.[9]:ch. 5 100

1
2009 2010 2011 2012 2013 2014 2015 2016 2017

Transactions
Semi-log plot of relative mining diculty.[note 4][33]
See also: Bitcoin network
Transactions are dened using a Forth-like scripting
Each block contains a cryptographic hash of the previous
block,[30] using the SHA-256 hashing algorithm,[9]:ch. 7
which links it to the previous block,[30] thus giving the
blockchain its name.
In order to be accepted by the rest of the network, a
new block must contain a so-called proof-of-work.[30] The
proof-of-work requires miners to nd a number called a
nonce, such that when the block content is hashed along
with the nonce, the result is numerically smaller than the
networks diculty target.[9]:ch. 8 This proof is easy for
any node in the network to verify, but extremely time-
Number of bitcoin transactions per month (logarithmic scale) [33] consuming to generate, as for a secure cryptographic
hash, miners must try many dierent nonce values (usu-
[9]:ch. 8
language. [9]:ch. 5
A valid transaction must have one or ally the sequence of tested values is 0, 1, 2, 3, ... )
more inputs. [34]
Every input must be an unspent output before meeting the diculty target.
of a previous transaction. The transaction must carry the Every 2016 blocks (approximately 14 days at roughly 10
digital signature of every input owner. The use of mul- min per block), the diculty target is adjusted based on
tiple inputs corresponds to the use of multiple coins in the networks recent performance, with the aim of keep-
a cash transaction. A transaction can also have multi- ing the average time between new blocks at ten minutes.
ple outputs, allowing one to make multiple payments in In this way the system automatically adapts to the total
one go. A transaction output can be specied as an ar- amount of mining power on the network.[9]:ch. 8
bitrary multiple of satoshi. As in a cash transaction, the
Between 1 March 2014 and 1 March 2015, the aver-
sum of inputs (coins used to pay) can exceed the intended
age number of nonces miners had to try before creat-
sum of payments. In such a case, an additional output is
ing a new block increased from 16.4 quintillion to 200.5
used, returning the change back to the payer.[34] Any in-
quintillion.[36]
put satoshis not accounted for in the transaction outputs
become the transaction fee.[34] The proof-of-work system, alongside the chaining of
blocks, makes modications of the blockchain extremely
hard, as an attacker must modify all subsequent blocks
Transaction fees in order for the modications of one block to be
accepted.[37] As new blocks are mined all the time, the
Paying a transaction fee is optional.[34] Miners can choose diculty of modifying a block increases as time passes
which transactions to process[34] and prioritize those that and the number of subsequent blocks (also called conr-
pay higher fees. Fees are based on the storage size of the mations of the given block) increases.[30]
transaction generated, which in turn is dependent on the
number of inputs used to create the transaction. Further-
more, priority is given to older unspent inputs.[9]:ch. 8
Supply

Mining The successful miner nding the new block is rewarded


with newly created bitcoins and transaction fees.[38] As of
[note 5]
Mining is a record-keeping service. Miners keep the 9 July 2016,[39] the reward amounted to 12.5 newly cre-
blockchain consistent, complete, and unalterable by re- ated bitcoins per block added to the blockchain. To claim
peatedly verifying and collecting newly broadcast trans- the reward, a special transaction called a coinbase is in-
actions into a new group of transactions called a block.[30] cluded with the processed payments.[9]:ch. 8 All bitcoins in
1.1. BITCOIN 3

18,000,000

16,000,000

14,000,000

12,000,000

10,000,000

8,000,000

6,000,000

4,000,000

2,000,000

0
2009 2010 2011 2012 2013 2014 2015 2016 2017

Bitcoin paper wallet generated at bitaddress.org


Total bitcoins in circulation.[33]

existence have been created in such coinbase transactions.


The bitcoin protocol species that the reward for adding
a block will be halved every 210,000 blocks (approxi-
mately every four years). Eventually, the reward will de-
crease to zero, and the limit of 21 million bitcoins[note 6]
will be reached c. 2140; the record keeping will then be
rewarded by transaction fees solely.[40]
In other words, bitcoins inventor Nakamoto set a
monetary policy based on articial scarcity at bitcoins
inception that there would only ever be 21 million bit- Trezor hardware wallet
coins in total. Their numbers are being released roughly
every ten minutes and the rate at which they are gener-
ated would drop by half every four years until all were in nect to the network and allow spending bitcoins in addi-
circulation.[41] tion to holding the credentials that prove ownership.[45]
Software wallets can be split further in two categories:
full clients and lightweight clients.
Wallets
Full clients verify transactions directly on a local
See also: Digital wallet copy of the blockchain (over 110 GB as of May
A wallet stores the information necessary to transact 2017[46] ), or a subset of the blockchain (around 2
GB[47] ). Because of its size and complexity, the en-
tire blockchain is not suitable for all computing de-
vices.
Lightweight clients on the other hand consult a
full client to send and receive transactions with-
out requiring a local copy of the entire blockchain
(see simplied payment verication SPV). This
makes lightweight clients much faster to set up
and allows them to be used on low-power, low-
bandwidth devices such as smartphones. When
using a lightweight wallet however, the user must
Electrum bitcoin wallet trust the server to a certain degree. When using a
lightweight client, the server can not steal bitcoins,
bitcoins. While wallets are often described as a place to but it can report faulty values back to the user. With
hold[42] or store bitcoins,[43] due to the nature of the sys- both types of software wallets, the users are re-
tem, bitcoins are inseparable from the blockchain trans- sponsible for keeping their private keys in a secure
action ledger. A better way to describe a wallet is some- place.[48]
thing that stores the digital credentials for your bit-
coin holdings[43] and allows one to access (and spend) Besides software wallets, Internet services called online
them. Bitcoin uses public-key cryptography, in which wallets oer similar functionality but may be easier to
two cryptographic keys, one public and one private, are use. In this case, credentials to access funds are stored
generated.[44] At its most basic, a wallet is a collection of
with the online wallet provider rather than on the users
these keys. hardware.[49][50] As a result, the user must have complete
There are several types of wallets. Software wallets con- trust in the wallet provider. A malicious provider or a
4 CHAPTER 1. OVERVIEW

breach in server security may cause entrusted bitcoins to Decentralization


be stolen. An example of such security breach occurred
with Mt. Gox in 2011.[51] Bitcoin creator Satoshi Nakamoto designed bitcoin not to
need a central authority.[22] Per sources such as the aca-
Physical wallets store the credentials necessary to spend
demic Mercatus Center,[13] U.S. Treasury,[10] Reuters,[16]
bitcoins oine.[43] Examples combine a novelty coin with
The Washington Post,[19] The Daily Herald,[60] The New
these credentials printed on metal.[52] Others are simply
Yorker,[61] and others, bitcoin is decentralized.
paper printouts. Another type of wallet called a hard-
ware wallet keeps credentials oine while facilitating
transactions.[53] Privacy

Bitcoin is pseudonymous, meaning that funds are not tied


Reference implementation to real-world entities but rather bitcoin addresses. Own-
ers of bitcoin addresses are not explicitly identied, but
The rst wallet program was released in 2009 by Satoshi all transactions on the blockchain are public. In addi-
Nakamoto as open-source code.[15] Sometimes referred tion, transactions can be linked to individuals and compa-
to as the Satoshi client, this is also known as the nies through idioms of use (e.g., transactions that spend
reference client because it serves to dene the bitcoin pro- coins from multiple inputs indicate that the inputs may
tocol and acts as a standard for other implementations.[45] have a common owner) and corroborating public trans-
In version 0.5 the client moved from the wxWidgets user action data with known information on owners of cer-
interface toolkit to Qt, and the whole bundle was re- tain addresses.[62] Additionally, bitcoin exchanges, where
ferred to as Bitcoin-Qt.[45] After the release of version bitcoins are traded for traditional currencies, may be re-
0.9, the software bundle was renamed Bitcoin Core to quired by law to collect personal information.[63]
distinguish itself from the network.[54][55] Today, other
To heighten nancial privacy, a new bitcoin address can
forks of Bitcoin Core exist such as Bitcoin XT, Bitcoin
[56][57] [58] be generated for each transaction.[64] For example, hi-
Classic, Bitcoin Unlimited, and Parity Bitcoin.
erarchical deterministic wallets generate pseudorandom
rolling addresses for every transaction from a single
Ownership seed, while only requiring a single passphrase to be re-
membered to recover all corresponding private keys.[65]
Additionally, mixing and CoinJoin services aggregate
multiple users coins and output them to fresh addresses
Transaction Transaction Transaction
to increase privacy.[66] Researchers at Stanford University
Owner 1's
Public key
Owner 2's
Public key
Owner 3's
Public key
and Concordia University have also shown that bitcoin
exchanges and other entities can prove assets, liabilities,
Hash Hash Hash and solvency without revealing their addresses using zero-
knowledge proofs.[67]
Owner 0's Owner 1's Owner 2's
Signature Signature Signature According to Dan Blystone, Ultimately, bitcoin resem-
bles cash as much as it does credit cards.[68]
Owner 1's Owner 2's Owner 3's
Private Key Private Key Private Key
Fungibility

Simplied chain of ownership.[22] In reality, a transaction can Wallets and similar software technically handle all bit-
have more than one input and more than one output. coins as equivalent, establishing the basic level of
fungibility. Researchers have pointed out that the his-
Ownership of bitcoins implies that a user can spend bit- tory of each bitcoin is registered and publicly available in
coins associated with a specic address. To do so, a payer the blockchain ledger, and that some users may refuse to
must digitally sign the transaction using the correspond- accept bitcoins coming from controversial transactions,
ing private key. Without knowledge of the private key, which would harm bitcoins fungibility.[69] Projects such
the transaction cannot be signed and bitcoins cannot be as CryptoNote, Zerocoin, and Dark Wallet aim to address
spent. The network veries the signature using the public these privacy and fungibility issues.[70][71]
key.[9]:ch. 5
If the private key is lost, the bitcoin network will not rec- Governance
ognize any other evidence of ownership;[13] the coins are
then unusable, and eectively lost. For example, in 2013 Bitcoin was initially led by Satoshi Nakamoto. Nakamoto
one user claimed to have lost 7,500 bitcoins, worth $7.5 stepped back in 2010 and handed the network alert key
million at the time, when he accidentally discarded a hard to Gavin Andresen.[72] Andresen stated he subsequently
drive containing his private key.[59] sought to decentralize control stating: As soon as Satoshi
1.1. BITCOIN 5

stepped back and threw the project onto my shoulders, the reins to developer Gavin Andresen, who then became
one of the rst things I did was try to decentralize that. the bitcoin lead developer at the Bitcoin Foundation, the
So, if I get hit by a bus, it would be clear that the project 'anarchic' bitcoin communitys closest thing to an ocial
would go on.[72] This left opportunity for controversy to public face.[88]
develop over the future development path of bitcoin. The The value of the rst bitcoin transactions were negotiated
reference implementation of the bitcoin protocol called by individuals on the bitcointalk forums with one notable
Bitcoin Core obtained competing versions that propose transaction of 10,000 BTC used to indirectly purchase
to solve various governance and blocksize debates; as of two pizzas delivered by Papa Johns.[80]
July 2016, the alternatives were called Bitcoin XT, Bit-
coin Classic, and Bitcoin Unlimited.[73] On 6 August 2010, a major vulnerability in the bitcoin
protocol was spotted. Transactions were not properly ver-
ied before they were included in the blockchain, which
Scalability let users bypass bitcoins economic restrictions and create
an indenite number of bitcoins.[89][90] On 15 August,
Main article: Bitcoin scalability problem the vulnerability was exploited; over 184 billion bitcoins
were generated in a transaction, and sent to two addresses
The blocks in the blockchain are limited to one megabyte on the network. Within hours, the transaction was spot-
in size, which has created problems for bitcoin transac- ted and erased from the transaction log after the bug was
tion processing, such as increasing transaction fees and xed and the network forked to an updated version of the
delayed processing of transactions that cannot be t into a bitcoin protocol.[91][89][90]
block.[74] Contenders to solve the scalability problem are Per Fortune, on 1 August 2017 bitcoin split into two dig-
referred to as Bitcoin Cash,[75] Bitcoin Classic,[76] Bitcoin ital currencies, the classic bitcoin (BTC) and the Bitcoin
Unlimited,[77] and SegWit2x.[78] On 21 July 2017 miners Cash (BCH).[75]
locked-in a software upgrade referred to as Bitcoin Im-
provement Proposal (BIP) 91, meaning that the contro-
versial Segregated Witness upgrade will activate at block 1.1.4 Economics
# 477,120.[79]
Main article: Economics of bitcoin
1.1.3 History
Main article: History of bitcoin Classication

Bitcoin was created[15] by Satoshi Nakamoto,[14] who Bitcoin is a digital asset[92] designed by its inven-
published the invention[15] on 31 October 2008 to a tor, Satoshi Nakamoto, to work as a currency.[22][93]
cryptography mailing list[23] in a research paper called It is commonly referred to with terms like digi-
Bitcoin: A Peer-to-Peer Electronic Cash System.[22] tal currency,[13]:1 digital cash,[94] virtual currency,[3]
Nakamoto implemented bitcoin as open source code and electronic currency,[25] or cryptocurrency.[95]
released in January 2009.[15] The identity of Nakamoto The question whether bitcoin is a currency or not is still
remains unknown, though many have claimed to know disputed.[95] Bitcoins have three useful qualities in a cur-
it.[14] rency, according to The Economist in January 2015: they
In January 2009, the bitcoin network came into existence are hard to earn, limited in supply and easy to verify.[96]
with the release of the rst open source bitcoin client and Economists dene money as a store of value, a medium
the issuance of the rst bitcoins,[80][81][82][83] with Satoshi of exchange, and a unit of account and agree that bit-
Nakamoto mining the rst block of bitcoins ever (known coin has some way to go to meet all these criteria.[97] It
as the genesis block), which had a reward of 50 bitcoins. does best as a medium of exchange; as of February 2015
the number of merchants accepting bitcoin had passed
One of the rst supporters, adopters, contributor to bit-
100,000.[20] As of March 2014, the bitcoin market suf-
coin and receiver of the rst bitcoin transaction was
fered from volatility, limiting the ability of bitcoin to act
programmer Hal Finney. Finney downloaded the bit-
as a stable store of value, and retailers accepting bitcoin
coin software the day it was released, and received
use other currencies as their principal unit of account.[97]
10 bitcoins from Nakamoto in the worlds rst bitcoin
transaction.[84][85] Other early supporters were Wei Dai,
creator of bitcoin predecessor b-money, and Nick Szabo, General use
creator of bitcoin predecessor bit gold.[86]
In the early days, Nakamoto is estimated to have mined According to research produced by Cambridge Univer-
1 million bitcoins.[87] Before disappearing from any in- sity there were between 2.9 million and 5.8 million unique
volvement in bitcoin, Nakamoto in a sense handed over users using a cryptocurrency wallet, as of 2017, most of
6 CHAPTER 1. OVERVIEW

100,000,000,000
payment for e-commerce and may emerge as a serious
competitor to traditional money-transfer providers.[110]
10,000,000,000 In June 2014, the rst bank that converts deposits in cur-
rencies instantly to bitcoin without any fees was opened
1,000,000,000 in Boston.[111]

100,000,000

10,000,000 As an investment
2010 2011 2012 2013 2014 2015 2016

Liquidity (estimated, USD/year, logarithmic scale).[33]Some Argentinians have bought bitcoins to protect their
savings against high ination or the possibility that gov-
ernments could conscate savings accounts.[63] During
them using bitcoin. The number of users has grown sig- the 20122013 Cypriot nancial crisis, bitcoin purchases
nicantly since 2013, when there were 300,000 to 1.3 in Cyprus rose due to fears that savings accounts would
million users.[21] be conscated or taxed.[112]
The Winklevoss twins have invested into bitcoins. In
Acceptance by merchants 2013 The Washington Post claimed that they owned 1%
of all the bitcoins in existence at the time.[113]
In 2015, the number of merchants accepting bitcoin ex- Other methods of investment are bitcoin funds. The
ceeded 100,000.[20] Instead of 23% typically imposed rst regulated bitcoin fund was established in Jersey in
by credit card processors, merchants accepting bitcoins July 2014 and approved by the Jersey Financial Services
often pay fees in the range from 0% to less than 2%.[98] Commission.[114] Forbes started publishing arguments in
Firms that accepted payments in bitcoin as of December favor of investing in December 2015.[115]
2014 included PayPal,[99] Microsoft,[100] Dell,[101] and
Newegg.[102] In 2013 and 2014, the European Banking Author-
ity[116] and the Financial Industry Regulatory Author-
ity (FINRA), a United States self-regulatory organiza-
Payment service providers tion,[117] warned that investing in bitcoins carries signif-
icant risks. Forbes named bitcoin the best investment of
Merchants accepting bitcoin ordinarily use the services 2013.[118] In 2014, Bloomberg named bitcoin one of its
of bitcoin payment service providers such as BitPay or worst investments of the year.[119] In 2015, bitcoin topped
Coinbase. When a customer pays in bitcoin, the payment Bloombergs currency tables.[120]
service provider accepts the bitcoin on behalf of the mer-
According to Bloomberg, in 2013 there were about 250
chant, converts it to the local currency, and sends the ob-
bitcoin wallets with more than $1 million worth of bit-
tained amount to merchants bank account, charging a fee
[103] coins. The number of bitcoin millionaires is uncertain as
for the service.
people can have more than one wallet.[121]

Financial institutions

Bitcoin companies have had diculty opening traditional Venture capital


bank accounts because lenders have been leery of bit-
coins links to illicit activity.[104] According to Antonio
Venture capitalists, such as Peter Thiel's Founders Fund,
Gallippi, a co-founder of BitPay, banks are scared to which invested US$3 million in BitPay, do not purchase
deal with bitcoin companies, even if they really want bitcoins themselves, instead funding bitcoin infrastruc-
to.[105] In 2014, the National Australia Bank closed ac-
ture like companies that provide payment systems to mer-
counts of businesses with ties to bitcoin,[106] and HSBC
chants, exchanges, wallet services, etc.[122] In 2012, an
refused to serve a hedge fund with links to bitcoin.[107]
incubator for bitcoin-focused start-ups was founded by
Australian banks in general have been reported as clos-Adam Draper, with nancing help from his father, ven-
ing down bank accounts of operators of businesses in- ture capitalist Tim Draper, one of the largest bitcoin hold-
volving the currency;[108] this has become the subject of
ers after winning an auction of 30,000 bitcoins,[123] at
an investigation by the Australian Competition and Con-the time called 'mystery buyer'.[124] The companys goal
sumer Commission.[108] Nonetheless, Australian banks is to fund 100 bitcoin businesses within 23 years with
have keenly adopted the blockchain technology on which $10,000 to $20,000 for a 6% stake.[123] Investors also in-
bitcoin is based.[109] vest in bitcoin mining.[125] According to a 2015 study by
In a 2013 report, Bank of America Merrill Lynch stated Paolo Tasca, bitcoin startups raised almost $1 billion in
that we believe bitcoin can become a major means of three years (Q1 2012 Q1 2015).[126]
1.1. BITCOIN 7

10,000.00 350%
work. This is a form of Metcalfes law and suggests that
1,000.00 300% the network was demonstrating network eects propor-
100.00
250% tional to its level of user adoption.[141]
200%
10.00
150%
1.00
100%
1.1.5 Legal status, tax and regulation
0.10 50%
Main article: Legality of bitcoin by country or territory
0.01 0%
2010 2011 2012 2013 2014 2015
Price Volatility
The legal status of bitcoin varies substantially from coun-
try to country and is still undened or changing in many
Price[note 7] (left vertical axis, logarithmic scale) and
of them. While some countries have explicitly allowed its
volatility[note 8] (right vertical axis).[33]
use and trade, others have banned or restricted it. Regu-
lations and bans that apply to bitcoin probably extend to
similar cryptocurrency systems.[142]
Price and volatility

According to Mark T. Williams, as of 2014, bitcoin 1.1.6 Criminal activity


has volatility seven times greater than gold, eight times
greater than the S&P 500, and 18 times greater than the See also: Bitcoin network Criminal activity
U.S. dollar.[127] According to Forbes, there are uses where
volatility does not matter, such as online gambling, tip-
ping, and international remittances.[128] The use of bitcoin by criminals has attracted the at-
tention of nancial regulators, legislative bodies, law
The price of bitcoins has gone through various cycles enforcement, and the media.[143] The FBI prepared
of appreciation and depreciation referred to by some as an intelligence assessment,[144] the SEC has issued a
bubbles and busts.[129][130] In 2011, the value of one bit- pointed warning about investment schemes using virtual
coin rapidly rose from about US$0.30 to US$32 before currencies,[143] and the U.S. Senate held a hearing on vir-
returning to US$2.[131] In the latter half of 2012 and tual currencies in November 2013.[19]
during the 201213 Cypriot nancial crisis, the bitcoin
price began to rise,[132] reaching a high of US$266 on 10 Several news outlets have asserted that the popularity of
April 2013, before crashing to around US$50.[133] On 29 bitcoins hinges on the ability to use them to purchase il-
[93][145]
November 2013, the cost of one bitcoin rose to a peak legal goods. In 2014, researchers at the University
of US$1,242. [134]
In 2014, the price fell sharply, and as of Kentucky found robust evidence that computer pro-
of April remained depressed at little more than half 2013 gramming enthusiasts and illegal activity drive interest in
prices. As of August 2014 it was under US$600. [135]
In bitcoin, and nd limited or no support for political and
[146]
January 2015, noting that the bitcoin price had dropped investment motives.
to its lowest level since spring 2013 around US$224
The New York Times suggested that "[w]ith no signs of a
1.1.7 In academia
rally in the ong, the industry is bracing for the eects
of a prolonged decline in prices. In particular, bitcoin
Journals
mining companies, which are essential to the currencys
underlying technology, are ashing warning signs.[136] Main article: Ledger (journal)
Also in January 2015, Business Insider reported that deep
web drug dealers were freaking out as they lost prots
through being unable to convert bitcoin revenue to cash In September 2015, the establishment of the peer-
quickly enough as the price declined and that there was reviewed academic journal Ledger (ISSN 2379-5980)
a danger that dealers selling reserves to stay in business was announced. It will cover studies of cryptocurren-
might force the bitcoin price down further.[137] cies and related technologies, and is published by the
University of Pittsburgh.[147][148] The journal encourages
According to The Wall Street Journal, as of April 2016, authors to digitally sign a le hash of submitted pa-
bitcoin is starting to look slightly more stable than pers, which will then be timestamped into the bitcoin
gold.[138] On 3 March 2017, the price of a bitcoin sur- blockchain. Authors are also asked to include a personal
passed the market value of an ounce of gold for the rst bitcoin address in the rst page of their papers.[149][150]
time as its price surged to an all-time high.[139][140] A
study in Electronic Commerce Research and Applications,
going back through the networks historical data, showed Other
the value of the bitcoin network as measured by the price
of bitcoins, to be roughly proportional to the square of In the fall of 2014, undergraduate students at the
the number of daily unique users participating on the net- Massachusetts Institute of Technology (MIT) each re-
8 CHAPTER 1. OVERVIEW

ceived bitcoins worth $100 to better understand this [5] It is misleading to think that there is an analogy between
emerging technology. The bitcoins were not provided gold mining and bitcoin mining. The fact is that gold min-
by MIT but rather the MIT Bitcoin Club, a student-run ers are rewarded for producing gold, while bitcoin min-
club.[151][152] ers are not rewarded for producing bitcoins; they are re-
warded for their record-keeping services.[35]
In 2016, Stanford University launched a lab course on
building bitcoin-enabled applications.[153] [6] The exact number is 20,999,999.9769 bitcoins.[9]:ch. 8

[7] The price of 1 bitcoin in U.S. dollars.

1.1.8 In art, entertainment, and media [8] Volatility is calculated on a yearly basis.

Films
1.1.11 References
The documentary lm, The Rise and Rise of Bitcoin (late
[1] Siluk, Shirley (2 June 2013). June 2 M Day promotes
2014), features interviews with people who use bitcoin,
millibitcoin as unit of choice. CoinDesk. Archived from
such as a computer programmer and a drug dealer.[154]
the original on 7 August 2017. Retrieved 25 May 2017.

[2] Garzik, Je (2 May 2014). BitPay, Bitcoin, and where


Music to put that decimal point. Archived from the original on
17 November 2015. Retrieved 20 November 2015.
Several lighthearted songs celebrating bitcoin have been
released.[155] [3] Jason Mick (12 June 2011). Cracking the Bitcoin: Dig-
ging Into a $131M USD Virtual Currency. Daily Tech.
Archived from the original on 20 January 2013. Retrieved
Literature 30 September 2012.

[4] Nermin Hajdarbegovic (7 October 2014). Bitcoin Foun-


In Charles Stross' science ction novel, Neptunes Brood dation to Standardise Bitcoin Symbol and Code Next
(2013), a modication of bitcoin is used as the universal Year. CoinDesk. Archived from the original on 5 Jan-
interstellar payment system.[156] uary 2015. Retrieved 28 January 2015.

[5] Romain Dillet (9 August 2013). Bitcoin Ticker Available


1.1.9 See also On Bloomberg Terminal For Employees. TechCrunch.
Archived from the original on 1 November 2014. Re-
trieved 2 November 2014.
Alternative currency
[6] Bitcoin Composite Quote (XBT)". CNN Money. CNN.
Base58 Archived from the original on 27 October 2014. Re-
trieved 2 November 2014.
Crypto-anarchism
[7] XBT Bitcoin. xe.com. Archived from the original on
Digital asset 2 November 2014. Retrieved 2 November 2014.
List of bitcoin companies [8] Unicode 10.0.0. Unicode Consortium. 20 June 2017.
Archived from the original on 20 June 2017. Retrieved
List of bitcoin organizations 20 June 2017.

[9] Andreas M. Antonopoulos (April 2014). Mastering Bit-


1.1.10 Notes coin. Unlocking Digital Crypto-Currencies. O'Reilly Me-
dia. ISBN 978-1-4493-7404-4.
[1] As of 2014, BTC is a commonly used code.[4] It does not
conform to ISO 4217 as BT is the country code of Bhutan, [10] Statement of Jennifer Shasky Calvery, Director Finan-
and ISO 4217 requires the rst letter used in global com- cial Crimes Enforcement Network United States Depart-
modities to be 'X'. ment of the Treasury Before the United States Senate
Committee on Banking, Housing, and Urban Aairs Sub-
[2] As of 2014, XBT, a code that conforms to ISO 4217 committee on National Security and International Trade
though is not ocially part of it, is used by Bloomberg and Finance Subcommittee on Economic Policy (PDF).
L.P.,[5] CNNMoney,[6] and xe.com.[7] ncen.gov. Financial Crimes Enforcement Network. 19
November 2013. Archived (PDF) from the original on 9
[3] The symbol was encoded in Unicode version 10.0 at posi- October 2016. Retrieved 1 June 2014.
tion U+20BF ( ) in the Currency Symbols block in June
2017.[8] [11] Empson, Rip (28 March 2013). Bitcoin: How An Un-
regulated, Decentralized Virtual Currency Just Became A
[4] Relative mining diculty is dened as the ratio of the dif- Billion Dollar Market. TechCrunch. AOL inc. Archived
culty target on 9 January 2009 to the current diculty from the original on 9 October 2016. Retrieved 8 October
target. 2016.
1.1. BITCOIN 9

[12] Ron Dorit; Adi Shamir (2012). Quantitative Analysis of [26] Vigna, Paul (3 March 2014). BitBeat: Is It Bitcoin, or
the Full Bitcoin Transaction Graph (PDF). Cryptology bitcoin? The Orthography of the Cryptography. WSJ.
ePrint Archive. Archived (PDF) from the original on 21 Archived from the original on 19 April 2014. Retrieved
October 2012. Retrieved 18 October 2012. 21 April 2014.

[13] Jerry Brito & Andrea Castillo (2013). Bitcoin: A Primer [27] Metcalf, Allan (14 April 2014). The latest style. Lingua
for Policymakers (PDF). Mercatus Center. George Ma- Franca blog. The Chronicle of Higher Education (chron-
son University. Archived (PDF) from the original on 21 icle.com). Archived from the original on 16 April 2014.
September 2013. Retrieved 22 October 2013. Retrieved 19 April 2014.
[14] S., L. (2 November 2015). Who is Satoshi Nakamoto?".
[28] Regulation of Bitcoin in Selected Jurisdictions (PDF).
The Economist. The Economist Newspaper Limited.
The Law Library of Congress, Global Legal Research
Archived from the original on 21 August 2016. Retrieved
Center. January 2014. Archived (PDF) from the origi-
23 September 2016.
nal on 14 October 2014. Retrieved 26 August 2014.
[15] Davis, Joshua (10 October 2011). The Crypto-Currency:
Bitcoin and its mysterious inventor. The New Yorker. [29] Katie Pisa & Natasha Maguder (9 July 2014). Bitcoin
Archived from the original on 1 November 2014. Re- your way to a double espresso. cnn.com. CNN. Archived
trieved 31 October 2014. from the original on 18 June 2015. Retrieved 23 April
2015.
[16] Sagona-Stophel, Katherine. Bitcoin 101 white paper
(PDF). Thomson Reuters. Retrieved 20 November 2015. [30] The great chain of being sure about things. The
Economist. The Economist Newspaper Limited. 31 Oc-
[17] What is Bitcoin?". CNN Money. Archived from the tober 2015. Archived from the original on 3 July 2016.
original on 31 October 2015. Retrieved 16 November Retrieved 3 July 2016.
2015.
[31] Bitcoin Wallet. Investopedia. Archived from the origi-
[18] Natasha Lomas (16 September 2013). BitPay Passes
nal on 19 August 2016. Retrieved 28 June 2016.
10,000 Bitcoin-Accepting Merchants On Its Payment
Processing Network. Techcrunch. Techcrunch.com. [32] Sparkes, Matthew (9 June 2014). The coming digital an-
Archived from the original on 20 October 2013. Re- archy. The Telegraph. London: Telegraph Media Group
trieved 21 October 2013. Limited. Archived from the original on 23 January 2015.
[19] Lee, Timothy B. (21 November 2013). Heres how Bit- Retrieved 7 January 2015.
coin charmed Washington. The Washington Post. Re-
[33] Charts. Blockchain.info. Archived from the original on
trieved 10 October 2016.
3 November 2014. Retrieved 2 November 2014.
[20] Cuthbertson, Anthony (4 February 2015). Bitcoin now
accepted by 100,000 merchants worldwide. Interna- [34] Joshua A. Kroll; Ian C. Davey; Edward W. Felten (12
tional Business Times. IBTimes Co., Ltd. Archived from June 2013). The Economics of Bitcoin Mining, or Bit-
the original on 28 November 2015. Retrieved 20 Novem- coin in the Presence of Adversaries (PDF). The Twelfth
ber 2015. Workshop on the Economics of Information Security (WEIS
2013). Archived (PDF) from the original on 9 May 2016.
[21] Hileman, Garrick; Rauchs, Michel. Global Cryptocur- Retrieved 26 April 2016. A transaction fee is like a tip or
rency Benchmarking Study (PDF). Cambridge Univer- gratuity left for the miner.
sity. Archived (PDF) from the original on 10 April 2017.
Retrieved 14 April 2017. [35] Andolfatto, David (31 March 2014). Bitcoin and Be-
yond: The Possibilities and Pitfalls of Virtual Currencies
[22] Nakamoto, Satoshi (October 2008). Bitcoin: A Peer- (PDF). Dialogue with the Fed. Federal Reserve Bank of
to-Peer Electronic Cash System (PDF). bitcoin.org. St. Louis. Archived (PDF) from the original on 9 April
Archived (PDF) from the original on 20 March 2014. Re- 2014. Retrieved 16 April 2014.
trieved 28 April 2014.
[36] Diculty History (The ratio of all hashes over valid
[23] Vigna, Paul; Casey, Michael J. (January 2015). The Age
hashes is D x 4295032833, where D is the published Dif-
of Cryptocurrency: How Bitcoin and Digital Money Are
culty gure.). Blockchain.info. Archived from the orig-
Challenging the Global Economic Order (1 ed.). New
inal on 8 April 2015. Retrieved 26 March 2015.
York: St. Martins Press. ISBN 978-1-250-06563-6.

[24] bitcoin. OxfordDictionaries.com. Archived from the [37] Hampton, Nikolai (5 September 2016). Understanding
original on 2 January 2015. Retrieved 28 December 2014. the blockchain hype: Why much of it is nothing more than
snake oil and spin. Computerworld. IDG. Archived from
[25] Bustillos, Maria (2 April 2013). The Bitcoin Boom. the original on 6 September 2016. Retrieved 5 September
The New Yorker. Cond Nast. Archived from the original 2016.
on 27 July 2014. Retrieved 22 December 2013. Stan-
dards vary, but there seems to be a consensus forming [38] Ashlee Vance (14 November 2013). 2014 Outlook: Bit-
around Bitcoin, capitalized, for the system, the software, coin Mining Chips, a High-Tech Arms Race. Business-
and the network it runs on, and bitcoin, lowercase, for the week. Archived from the original on 21 November 2013.
currency itself. Retrieved 24 November 2013.
10 CHAPTER 1. OVERVIEW

[39] Block #420000. Blockchain.info. Archived from the [54] Bitcoin Core version 0.9.0 released. bitcoin.org.
original on 18 September 2016. Retrieved 11 September Archived from the original on 27 February 2015. Re-
2016. trieved 8 January 2015.

[40] Ritchie S. King; Sam Williams; David Yanofsky (17 De- [55] Metz, Cade (19 August 2015). The Bitcoin Schism
cember 2013). By reading this article, you're mining bit- Shows the Genius of Open Source. Wired. Cond Nast.
coins. qz.com. Atlantic Media Co. Archived from the Archived from the original on 30 June 2016. Retrieved 3
original on 17 December 2013. Retrieved 17 December July 2016.
2013.
[56] Vigna, Paul (17 January 2016). Is Bitcoin Breaking
[41] Shin, Laura (24 May 2016). Bitcoin Production Will Up?". The Wall Street Journal. Archived from the original
Drop By Half In July, How Will That Aect The Price?". on 20 August 2016. Retrieved 8 November 2016.
Forbes. Archived from the original on 23 July 2016. Re-
trieved 13 July 2016. [57] Bajpai, Prableen (26 October 2016). What Is Bitcoin
Unlimited?". Investopedia, LLC. Archived from the orig-
[42] Adam Serwer & Dana Liebelson (10 April 2013). inal on 9 November 2016. Retrieved 8 November 2016.
Bitcoin, Explained. motherjones.com. Mother Jones.
Archived from the original on 27 April 2014. Retrieved [58] Allison, Ian (28 April 2017). Ethereum co-founder Dr
26 April 2014. Gavin Wood and company release Parity Bitcoin. Inter-
national Business Times. Archived from the original on 28
[43] Villasenor, John (26 April 2014). Secure Bitcoin Stor- April 2017. Retrieved 28 April 2017.
age: A Q&A With Three Bitcoin Company CEOs.
forbes.com. Forbes. Archived from the original on 27 [59] Man Throws Away 7,500 Bitcoins, Now Worth $7.5 Mil-
April 2014. Retrieved 26 April 2014. lion. CBS DC. 29 November 2013. Archived from the
original on 15 January 2014. Retrieved 23 January 2014.
[44] Bitcoin: Bitcoin under pressure. The Economist. 30
November 2013. Archived from the original on 30 [60] O'Brien, Matt (13 June 2015). The scam called Bitcoin.
November 2013. Retrieved 30 November 2013. Daily Herald. Archived from the original on 20 Septem-
ber 2016. Retrieved 20 September 2016.
[45] Skudnov, Rostislav (2012). Bitcoin Clients (PDF) (Bach-
elors Thesis). Turku University of Applied Sciences. [61] Joshua Kopstein (12 December 2013). The Mission to
Archived (PDF) from the original on 18 January 2014. Decentralize the Internet. The New Yorker. Archived
Retrieved 16 January 2014. from the original on 31 December 2014. Retrieved 30 De-
cember 2014. The networks 'nodes users running the
[46] Blockchain Size. Blockchain.info. Archived from the
bitcoin software on their computers collectively check
original on 27 May 2017. Retrieved 28 May 2017.
the integrity of other nodes to ensure that no one spends
[47] Wallet Pruning in v0.12.0. bitcoin.org. Archived from the same coins twice. All transactions are published on a
the original on 8 January 2017. Retrieved 8 January 2017. shared public ledger, called the 'blockchain'.

[48] Gervais, Arthur; O. Karame, Ghassan; Gruber, Damian; [62] Simonite, Tom (5 September 2013). Mapping the Bit-
Capkun, Srdjan. On the Privacy Provisions of Bloom coin Economy Could Reveal Users Identities. MIT Tech-
Filters in Lightweight Bitcoin Clients (PDF). Archived nology Review. Retrieved 2 April 2014.
(PDF) from the original on 5 October 2016. Retrieved 3
[63] Lee, Timothy (21 August 2013). Five surprising facts
September 2016.
about Bitcoin. The Washington Post. Archived from the
[49] Jon Matonis (26 April 2012). Be Your Own Bank: Bit- original on 12 October 2013. Retrieved 2 April 2014.
coin Wallet for Apple. Forbes. Archived from the origi-
nal on 12 October 2014. Retrieved 17 November 2014. [64] McMillan, Robert (6 June 2013). How Bitcoin lets you
spy on careless companies. wired.co.uk. Conde Nast.
[50] Bill Barhydt (4 June 2014). 3 reasons Wall Street can't Archived from the original on 9 February 2014. Retrieved
stay away from bitcoin. NBCUniversal. Archived from 2 April 2014.
the original on 3 April 2015. Retrieved 2 April 2015.
[65] Potts, Jake (31 July 2015). Mastering Bitcoin Privacy.
[51] MtGox gives bankruptcy details. bbc.com. BBC. 4 Airbitz. Archived from the original on 10 August 2015.
March 2014. Archived from the original on 12 March Retrieved 23 February 2016.
2014. Retrieved 13 March 2014.
[66] Matonis, Jon (5 June 2013). The Politics Of Bitcoin
[52] Sta, Verge (13 December 2013). Casascius, maker of Mixing Services. forbes.com. Forbes. Archived from
shiny physical bitcoins, shut down by Treasury Depart- the original on 7 April 2014. Retrieved 2 April 2014.
ment. The Verge. Archived from the original on 10 Jan-
uary 2014. Retrieved 10 January 2014. [67] Gaby G. Dagher, Benedikt Bnz, Joseph Bonneau, Jeremy
Clark and Dan Boneh (26 October 2015). Provisions:
[53] Eric Mu (15 October 2014). Meet Trezor, A Bitcoin Privacy-preserving proofs of solvency for Bitcoin ex-
Safe That Fits Into Your Pocket. Forbes Asia. Forbes. changes (PDF). International Association for Crypto-
Archived from the original on 24 October 2014. Re- logic Research. Archived (PDF) from the original on 10
trieved 31 October 2014. March 2016. Retrieved 23 February 2016.
1.1. BITCOIN 11

[68] Blystone, Dan. Bitcoin Transactions Vs. Credit Card [82] Nakamoto, Satoshi (9 January 2009). Bitcoin v0.1 re-
Transactions. Investopedia. Archived from the original leased. Archived from the original on 26 March 2014.
on 20 August 2016. Retrieved 3 September 2016.
[83] SourceForge.net: Bitcoin. Archived from the original
[69] Ben-Sasson, Eli; Chiesa, Alessandro; Garman, Christina; on 16 March 2013.
Green, Matthew; Miers, Ian; Tromer, Eran; Virza,
Madars (2014). Zerocash: Decentralized Anonymous [84] Peterson, Andrea (3 January 2014). Hal Finney received
Payments from Bitcoin (PDF). 2014 IEEE Symposium on the rst Bitcoin transaction. Heres how he describes it..
Security and Privacy. IEEE computer society. Archived The Washington Post. Archived from the original on 27
(PDF) from the original on 14 October 2014. Retrieved February 2015.
31 October 2014. [85] Popper, Nathaniel (30 August 2014). Hal Finney, Cryp-
tographer and Bitcoin Pioneer, Dies at 58. NYTimes.
[70] Miers, Ian; Garman, Christina; Green, Matthew; Rubin,
Archived from the original on 3 September 2014. Re-
Aviel. Zerocoin: Anonymous Distributed E-Cash from
trieved 2 September 2014.
Bitcoin (PDF). Johns Hopkins University. Archived
(PDF) from the original on 15 February 2015. Retrieved [86] Wallace, Benjamin (23 November 2011). The Rise and
15 February 2015. Fall of Bitcoin. Wired. Archived from the original on 4
November 2013. Retrieved 4 November 2013.
[71] Greenberg, Andy (29 April 2014). "Dark Wallet Is
About to Make Bitcoin Money Laundering Easier Than [87] McMillan, Robert. Who Owns the Worlds Biggest Bit-
Ever. Wired. Archived from the original on 13 February coin Wallet? The FBI. Wired. Cond Nast. Archived
2015. Retrieved 15 February 2015. from the original on 21 October 2016. Retrieved 7 Octo-
ber 2016.
[72] Odell, Matt (21 September 2015). A Solution To Bit-
coins Governance Problem. TechCrunch. Archived [88] Bosker, Bianca (16 April 2013). Gavin Andresen, Bit-
from the original on 26 January 2016. Retrieved 24 Jan- coin Architect: Meet The Man Bringing You Bitcoin
uary 2016. (And Getting Paid In It)". The Hungton Post. Archived
from the original on 3 August 2016. Retrieved 21 October
[73] Why the Bitcoin Block Size Debate Matters. Bitcoin
2016.
Magazine. 7 July 2016. Archived from the original on 7
July 2016. Retrieved 24 January 2016. [89] Sawyer, Matt (26 February 2013). The Beginners Guide
To Bitcoin Everything You Need To Know. Mone-
[74] Orcutt, Mike (19 May 2015). Leaderless Bitcoin Strug- tarism. Archived from the original on 9 April 2014.
gles to Make Its Most Crucial Decision. MIT Technology
Review. Retrieved 22 June 2017. [90] Vulnerability Summary for CVE-2010-5139. National
Vulnerability Database. 8 June 2012. Archived from the
[75] Smith, Jake (11 August 2017). The Bitcoin Cash Hard original on 9 April 2014. Retrieved 22 March 2013.
Fork Will Show Us Which Coin Is Best. Fortune. Re-
trieved 13 August 2017. [91] Nakamoto, Satoshi. ALERT we are investigating a
problem. Archived from the original on 15 October
[76] Rizzo, Pete (19 January 2016). Making Sense of Bit- 2013. Retrieved 15 October 2013.
coins Divisive Block Size Debate. CoinDesk. Archived
from the original on 5 August 2017. Retrieved 22 June [92] Groom, Nelson (9 December 2015). Revealed, the elu-
2017. sive creator of Bitcoin: Founder of digital currency is
named as an Australian academic after police raid his Syd-
[77] Jordan Pearson (14 October 2016). "Bitcoin Unlimited ney home. Daily Mail Australia. Archived from the orig-
Hopes to Save Bitcoin from Itself. Motherboard. Vice inal on 15 December 2015. Retrieved 4 January 2016.
Media LLC. Archived from the original on 18 January
2017. Retrieved 17 January 2017. [93] Monetarists Anonymous. The Economist. The
Economist Newspaper Limited. 29 September 2012.
[78] Aaron van Wirdum (20 June 2017). Bitcoin Miners Are Archived from the original on 20 October 2013. Re-
Signaling Support for the New York Agreement: Heres trieved 21 October 2013.
What that Means. Bitcoin Magazine. Bitcoin Magazine.
Archived from the original on 5 August 2017. Retrieved [94] Murphy, Kate (31 July 2013). Virtual Currency Gains
22 June 2017. Ground in Actual World. The New York Times.
Archived from the original on 14 October 2014. Re-
[79] Hertig, Alyssa (21 July 2017). BIP 91 Locks In: What trieved 6 May 2014. A type of digital cash, bitcoins were
This Means for Bitcoin and Why Its Not Scaled Yet. invented in 2009 and can be sent directly to anyone, any-
CoinDesk. Archived from the original on 21 July 2017. where in the world.
Retrieved 21 July 2017.
[95] Joyner, April (25 April 2014). How bitcoin is moving
[80] Wallace, Benjamin (23 November 2011). The Rise and money in Africa. usatoday.com. USA Today. Archived
Fall of Bitcoin. Wired. Archived from the original on 31 from the original on 1 May 2014. Retrieved 25 May 2014.
October 2013. Retrieved 13 October 2012.
[96] The magic of mining. The Economist. 13 January 2015.
[81] Block 0 Bitcoin Block Explorer. Archived from the Archived from the original on 12 January 2015. Retrieved
original on 15 October 2013. 13 January 2015.
12 CHAPTER 1. OVERVIEW

[97] Free Exchange. Money from nothing. Chronic dea- [112] Salyer, Kirsten (20 March 2013). Fleeing the Euro for
tion may keep Bitcoin from displacing its rivals.. The Bitcoins. Bloomberg L.P. Archived from the original on
Economist. 15 March 2014. Archived from the original 9 February 2014. Retrieved 31 October 2014.
on 25 March 2014. Retrieved 25 March 2014.
[113] Lee, Timothy B. The $11 million in bitcoins the Win-
[98] Wingeld, Nick (30 October 2013). Bitcoin Pursues the klevoss brothers bought is now worth $32 million. The
Mainstream. The New York Times. Archived from the Switch. The Washington Post. Archived from the original
original on 3 November 2013. Retrieved 4 November on 6 July 2017. Retrieved 11 August 2017.
2013.
[114] Jersey approve Bitcoin fund launch on island. BBC
[99] Scott Ellison (23 September 2014). PayPal and Virtual news. 10 July 2014. Archived from the original on 10
Currency. PayPal. Archived from the original on 10 Oc- July 2014. Retrieved 10 July 2014.
tober 2014. Retrieved 31 October 2014.
[115] Shin, Laura (11 December 2015). Should You Invest
[100] Tom Warren (11 December 2014). Microsoft now ac- In Bitcoin? 10 Arguments In Favor As Of December
cepts Bitcoin to buy Xbox games and Windows apps. 2015. Forbes. Archived from the original on 13 Decem-
The Verge. Vox Media. Archived from the original on ber 2015. Retrieved 12 December 2015.
11 December 2014. Retrieved 11 December 2014.
[116] Warning to consumers on virtual currencies (PDF). Eu-
[101] Sydney Ember (18 July 2014). Dell Begins Accepting
ropean Banking Authority. 12 December 2013. Archived
Bitcoin. New York Times. Archived from the original on
from the original (PDF) on 28 December 2013. Retrieved
18 July 2014. Retrieved 18 July 2014.
23 December 2013.
[102] Newegg accepts bitcoins. newegg.com. 1 July 2014.
Archived from the original on 6 July 2014. Retrieved 3 [117] Jonathan Stempel (11 March 2014). Beware Bitcoin:
July 2014. U.S. brokerage regulator.. reuters.com. Archived from
the original on 15 March 2014. Retrieved 14 March 2014.
[103] Chavez-Dreyfuss, Gertrude; Connor, Michael (28 August
2014). Bitcoin shows staying power as online merchants [118] Hill, Kashmir. How You Should Have Spent $100 In
chase digital sparkle. Reuters. Archived from the origi- 2013 (Hint: Bitcoin)". Forbes. Archived from the original
nal on 28 August 2014. Retrieved 28 August 2014. on 19 February 2015. Retrieved 16 February 2015.

[104] Robin Sidel (22 December 2013). Banks Mostly [119] Steverman, Ben (23 December 2014). The Best and
Avoid Providing Bitcoin Services. Wallstreet Journal. Worst Investments of 2014. bloomberg.com. Bloomberg
Archived from the original on 27 December 2014. Re- LP. Archived from the original on 9 January 2015. Re-
trieved 27 December 2014. trieved 9 January 2015.

[105] Dougherty, Carter (5 December 2013). Bankers Balk- [120] Gilbert, Mark (29 December 2015). Bitcoin Won 2015.
ing at Bitcoin in U.S. as Real-World Obstacles Mount. Apple ... Did Not. Bloomberg. Archived from the origi-
bloomberg.com. Bloomberg. Archived from the original nal on 29 December 2015. Retrieved 29 December 2015.
on 17 April 2014. Retrieved 16 April 2014.
[121] Meet the Bitcoin Millionaires. 12 April 2013. Archived
[106] Bitcoin rms dumped by National Australia Bank as 'too from the original on 5 February 2017 via www.
risky'". Australian Associated Press. The Guardian. 10 bloomberg.com.
April 2014. Archived from the original on 23 February
2015. Retrieved 23 February 2015. [122] Simonite, Tom (12 June 2013). Bitcoin Millionaires Be-
come Investing Angels. Computing News. MIT Technol-
[107] Weir, Mike (1 December 2014). HSBC severs links with ogy Review. Retrieved 13 June 2013.
rm behind Bitcoin fund. bbc.com. BBC. Archived from
the original on 3 February 2015. Retrieved 9 January [123] Robin Sidel (1 December 2014). Ten-hut! Bitcoin Re-
2015. cruits Snap To. Wall Street Journal. Dow Jones & Com-
pany. Archived from the original on 27 February 2015.
[108] ACCC investigating why banks are closing bitcoin com- Retrieved 9 December 2014.
panies accounts. Financial Review. Archived from the
original on 11 February 2016. Retrieved 28 January 2016. [124] Alex Hern (1 July 2014). Silk Roads legacy 30,000 bit-
coin sold at auction to mystery buyers. The Guardian.
[109] CBA tests blockchain trading with 10 global banks. The
Archived from the original on 23 October 2014. Re-
Sydney Morning Herald. Archived from the original on 24
trieved 31 October 2014.
January 2016. Retrieved 28 January 2016.

[110] Hill, Kashmir (5 December 2013). Bitcoin Valued [125] CoinSeed raises $7.5m, invests $5m in Bitcoin mining
At $1300 By Bank of America Analysts. Forbes.com. hardware Investment Round Up. Red Herring. 24 Jan-
Archived from the original on 25 March 2014. Retrieved uary 2014. Archived from the original on 9 March 2014.
23 March 2014. Retrieved 9 March 2014.

[111] Bitcoin: is Circle the worlds rst crypto-currency [126] Tasca, Paolo (7 September 2015). Digital Currencies:
bank?". The week.co.uk. 16 May 2014. Archived from Principles, Trends, Opportunities, and Risks. Social Sci-
the original on 27 June 2014. Retrieved 13 June 2014. ence Research Network. SSRN 2657598 .
1.1. BITCOIN 13

[127] Williams, Mark T. (21 October 2014). Virtual Cur- [141] Alabi, Ken (2017). Digital blockchain networks
rencies Bitcoin Risk (PDF). World Bank Conference appear to be following Metcalfes Law. Elec-
Washington DC. Boston University. Archived (PDF) from tronic Commerce Research and Applications. 24.
the original on 11 November 2014. Retrieved 11 Novem- doi:10.1016/j.elerap.2017.06.003.
ber 2014.
[142] Tasca, Paolo (7 September 2015). Digital Currencies:
[128] Lee, Timothy B. (12 April 2013). Bitcoins Volatility Is Principles, Trends, Opportunities, and Risks. Social Sci-
A Disadvantage, But Not A Fatal One. Forbes. Archived ence Research Network. SSRN 2657598 .
from the original on 5 November 2014. Retrieved 15
[143] Lavin, Tim (8 August 2013). The SEC Shows Why
November 2014.
Bitcoin Is Doomed. bloomberg.com. Bloomberg LP.
[129] Colombo, Jesse (19 December 2013). Bitcoin May Be Archived from the original on 25 March 2014. Retrieved
Following This Classic Bubble Stages Chart. Forbes. 20 October 2013.
Archived from the original on 5 January 2014. Retrieved [144] Bitcoins Virtual Currency: Unique Features Present
7 January 2014. Challenges for Deterring Illicit Activity (PDF). Cyber In-
telligence Section and Criminal Intelligence Section. FBI.
[130] Moore, Heidi (3 April 2013). Confused about Bitcoin? 24 April 2012. Archived (PDF) from the original on 14
Its 'the Harlem Shake of currency'". theguardian.com. October 2014. Retrieved 2 November 2014.
The Guardian. Archived from the original on 1 March
2014. Retrieved 2 May 2014. [145] Ball, James (22 March 2013). Silk Road: the online
drug marketplace that ocials seem powerless to stop.
[131] Lee, Timothy (5 November 2013). When will the peo- theguardian.com. Guardian News and Media Limited.
ple who called Bitcoin a bubble admit they were wrong. Archived from the original on 12 October 2013. Re-
The Washington Post. Archived from the original on 11 trieved 20 October 2013.
January 2014. Retrieved 10 January 2014.
[146] Matthew Graham Wilson & Aaron Yelowitz (November
[132] Liu, Alec (19 March 2013). When Governments Take 2014). Characteristics of Bitcoin Users: An Analysis of
Your Money, Bitcoin Looks Really Good. Motherboard. Google Search Data. Social Science Research Network.
Archived from the original on 7 February 2014. Retrieved Working Papers Series. SSRN 2518603 .
7 January 2014.
[147] Introducing Ledger, the First Bitcoin-Only Academic
Journal. Motherboard. Archived from the original on
[133] Lee, Timothy B. (11 April 2013). An Illustrated History
10 January 2017.
Of Bitcoin Crashes. Forbes. Archived from the original
on 13 January 2014. Retrieved 7 January 2014. [148] Bitcoin Peer-Reviewed Academic Journal Ledger
Launches. CoinDesk. Archived from the original on 19
[134] Ben Rooney (29 November 2013). Bitcoin worth almost September 2015.
as much as gold. CNN. Archived from the original on 26
October 2014. Retrieved 31 October 2014. [149] Editorial Policies. ledgerjournal.org. Archived from the
original on 23 December 2016.
[135] Bitcoin prices remain below $600 amid bearish chart sig-
[150] How to Write and Format an Article for Ledger (PDF).
nals. nasdaq.com. August 2014. Archived from the orig-
Ledger. 2015. doi:10.5195/LEDGER.2015.1. Archived
inal on 14 October 2014. Retrieved 31 October 2014.
(PDF) from the original on 22 September 2015.
[136] Ember, Sydney (13 January 2015). As Bitcoins Price [151] Hern, Alex (30 April 2014). MIT students to get $100
Slides, Signs of a Squeeze. New York Times. Archived worth of bitcoin from Wall Street donor. The Guardian.
from the original on 16 January 2015. Retrieved 16 Jan- Archived from the original on 30 April 2014. Retrieved 1
uary 2015. May 2014.

[137] Price, Rob (16 January 2015). Deep Web Drug Dealers [152] Dan (29 April 2014). Announcing the MIT Bitcoin
Are Freaking Out About The Bitcoin Crash. Business Project. MIT Bitcoin Club. Archived from the original
Insider. Archived from the original on 18 January 2015. on 4 July 2015. Retrieved 4 July 2015.
Retrieved 18 January 2015.
[153] Bitcoin Engineering. stanford.edu. Archived from the
[138] Yang, Stephanie (19 April 2016). Is Bitcoin Becom- original on 9 June 2017. Retrieved 14 April 2017.
ing More Stable Than Gold?". The Wall Street Journal. [154] Kenigsberg, Ben (2 October 2014). Financial Wild
Archived from the original on 20 April 2016. Retrieved West. The New York Times. Archived from the original
20 April 2016. on 18 May 2015. Retrieved 8 May 2015.

[139] Bitcoin value tops gold for rst time. BBC. 3 March [155] Paul Vigna (18 February 2014). BitBeat: Mt. Goxs
2017. Archived from the original on 23 April 2017. Re- Pyrrhic Victory. Money Beat. The Wall Street Journal.
trieved 22 April 2017. Archived from the original on 6 October 2014. Retrieved
30 September 2014. 'Ode to Satoshi' is a bluegrass-
[140] Molloy, Mark (3 March 2017). Bitcoin value surpasses style song with an old-timey feel that mixes references to
gold for the rst time. Telegraph. Archived from the Satoshi Nakamoto and blockchains (and, ahem, 'the fall
original on 23 April 2017. Retrieved 22 April 2017. of old Mt. Gox') with mandolin-picking and harmonicas.
14 CHAPTER 1. OVERVIEW

[156] Stross, Charles (2013). Neptunes Brood (Kindle ed.). 1.2.2 Creation
Ace. p. 109. Archived from the original on 28 May 2015.
"...[E]very exchange between two beacons must be cryp- In November 2008, a paper was posted to a cryptogra-
tographically signed by a third party bank in another star phy mailing list[10] under the name Satoshi Nakamoto ti-
system: it take years to settle a transaction. Its theft-proof
tled Bitcoin: A Peer-to-Peer Electronic Cash System. This
too for each bitcoin is cryptographically signed by the
paper detailed methods of using a peer-to-peer network
mind of its owner
to generate what was described as a system for elec-
tronic transactions without relying on trust.[11][12][13][14]
In January 2009, the bitcoin network came into existence
with the release of the rst open source bitcoin client and
1.2 History of Bitcoin the issuance of the rst bitcoins,[12][15][16][17] with Satoshi
Nakamoto mining the rst block of bitcoins ever (known
Further information: Bitcoin as the genesis block), which had a reward of 50 bitcoins.
Bitcoin is a cryptocurrency, a digital asset designed to One of the rst supporters, adopters, contributor to bit-
coin and receiver of the rst bitcoin transaction was
programmer Hal Finney. Finney downloaded the bit-
coin software the day it was released, and received
10 bitcoins from Nakamoto in the worlds rst bitcoin
transaction.[18][19] Other early supporters were Wei Dai,
creator of bitcoin predecessor b-money, and Nick Szabo,
creator of bitcoin predecessor bit gold.[20]
In the early days, Nakamoto is estimated to have mined
1 million bitcoins.[21] Before disappearing from any in-
volvement in bitcoin, Nakamoto in a sense handed over
the reins to developer Gavin Andresen, who then became
the bitcoin lead developer at the Bitcoin Foundation, the
Number of bitcoin transactions per month (logarithmic scale)
'anarchic' bitcoin communitys closest thing to an ocial
public face.[22]
work as a medium of exchange that uses cryptography
The value of the rst bitcoin transactions were negotiated
to control its creation and management, rather than re-
by individuals on the bitcointalk forums with one notable
lying on central authorities.[1] The presumed pseudony-
transaction of 10,000 BTC used to indirectly purchase
mous Satoshi Nakamoto integrated many existing ideas
two pizzas delivered by Papa Johns.[12]
from the cypherpunk community when creating bitcoin.
On 6 August 2010, a major vulnerability in the bit-
coin protocol was spotted. Transactions weren't prop-
erly veried before they were included in the transac-
1.2.1 Pre-history tion log or blockchain, which let users bypass bitcoins
economic restrictions and create an indenite number
Prior to the release of bitcoin there were a number of dig- of bitcoins.[23][24] On 15 August, the vulnerability was
ital cash technologies starting with the issuer based ecash exploited; over 184 billion bitcoins were generated in a
protocols of David Chaum [2] and Stefan Brands. Adam transaction, and sent to two addresses on the network.
Back developed hashcash, a proof-of-work scheme for Within hours, the transaction was spotted and erased
spam control. The rst proposals for distributed dig- from the transaction log after the bug was xed and
ital scarcity based cryptocurrencies were Wei Dai's b- the network forked to an updated version of the bitcoin
money[3] and Nick Szabo's bit gold.[4][5] Hal Finney de- protocol.[25][26] This was the only major security aw
veloped reusable proof of work (RPOW) using hashcash found and exploited in bitcoins history.[23][24]
as its proof of work algorithm.[6]
In the bit gold proposal which proposed a collectible mar-
ket based mechanism for ination control, Nick Szabo 1.2.3 Growth
also investigated some additional enabling aspects includ-
ing a Byzantine fault-tolerant asset registry to store and 2011
transfer the chained proof-of-work solutions.[5]
There has been much speculation as to the identity of Based on bitcoins open[27] source code, other cryptocurren-
Satoshi Nakamoto with suspects including Wei Dai, Hal cies started to emerge.
Finney and accompanying denials.[7][8] The possibility The Electronic Frontier Foundation, a non-prot group,
that Satoshi Nakamoto was a computer collective in the started accepting bitcoins in January 2011,[28] stopped
European nancial sector has also been bruited.[9] accepting them in June 2011,[29] and began again in May
1.2. HISTORY OF BITCOIN 15

2013.[30] Gox exchange briey halted bitcoin deposits and the ex-
[31]
In June 2011 Wikileaks and other organizations began change rate briey dipped by 23% to $37 as the event
to accept bitcoins for donations. The Electronic Fron- occurred[44][45] before recovering to previous level of ap-
tier Foundation began, and then temporarily suspended, proximately $48 in the following hours.[46] In the US, the
bitcoin acceptance, citing concerns about a lack of legal Financial Crimes Enforcement Network (FinCEN) es-
precedent about new currency systems.[32] The EFFs de- tablished regulatory guidelines for decentralized virtual
cision was reversed on 17 May 2013 when they resumed currencies such as bitcoin, classifying American bitcoin
accepting bitcoin.[33] miners who sell their generated bitcoins as Money Ser-
vice Businesses (or MSBs), that may be subject to regis-
On 22 March 2011 WeUseCoins published the rst vi- tration and other legal obligations.[47][48][49]
ral video [34] which has had over 6.4 million views.
In September 2011 Vitalik Buterin co-founded Bitcoin In April, payment processors BitInstant and Mt. Gox
Magazine. On 23 December 2011, Douglas Feigelson of experienced processing delays due to insucient
BitBills led a patent application for Creating And Us- capacity[50] resulting in the bitcoin exchange rate drop-
ing Digital Currency with the United States Patent and ping from $266 to $76 before returning to $160 within
Trademark Oce, an action which was contested based six hours.[51] Bitcoin gained greater recognition when
on prior art in June 2013.[35][36] services such as OkCupid and Foodler began accepting
it for payment.[52]
On 15 May 2013, the US authorities seized accounts as-
2012 sociated with Mt. Gox after discovering that it had not
registered as a money transmitter with FinCEN in the
In January 2012, bitcoin was featured as the main subject US.[53][54]
within a ctionalized trial on the CBS legal drama The
Good Wife in the third-season episode "Bitcoin for Dum- On 17 May 2013, it was reported that BitInstant pro-
mies". The host of CNBC's Mad Money, Jim Cramer, cessed approximately 30 percent of the money going into
played himself in a courtroom scene where he testies and out of bitcoin,
[55]
and in April alone facilitated 30,000
that he doesn't consider bitcoin a true currency, saying transactions,
Theres no central bank to regulate it; its digital and On 23 June 2013, it was reported that the US Drug
functions completely peer to peer.[37] Enforcement Administration listed 11.02 bitcoins as a
In September 2012, the Bitcoin Foundation was launched seized asset in a United States Department[56]of Justice
to accelerate the global growth of bitcoin through seizure notice pursuant to 21 U.S.C. 881. It is the
standardization, protection, and promotion of the open rst time a government agency has claimed to have seized
[57][58]
source protocol. The founders were Gavin Andresen, bitcoin.
Jon Matonis, Patrick Murck, Charlie Shrem, and Peter In July 2013 a project began in Kenya linking bitcoin with
Vessenes.[38] M-Pesa, a popular mobile payments system, in an exper-
[59]
In October 2012, BitPay reported having over 1,000 mer- iment designed to spur innovative payments in Africa.
chants accepting bitcoin under its payment processing During the same month the Foreign Exchange Admin-
service.[39] In November 2012, WordPress had started istration and Policy Department in Thailand stated that
accepting bitcoins.[40] bitcoin lacks any legal framework and would therefore be
illegal, which eectively banned trading on bitcoin ex-
changes in the country.[60][61] According to Vitalik Bu-
2013 terin, a writer for Bitcoin Magazine, bitcoins fate in
Thailand may give the electronic currency more credibil-
In February 2013 the bitcoin-based payment processor ity in some circles, but he was concerned it didn't bode
Coinbase reported selling US$1 million worth of bitcoins well for bitcoin in China.[62]
in a single month at over $22 per bitcoin.[41] The Internet On 6 August 2013, Federal Judge Amos Mazzant of the
Archive announced that it was ready to accept donations Eastern District of Texas of the Fifth Circuit ruled that
as bitcoins and that it intends to give employees the option bitcoins are a currency or a form of money (specically
to receive portions of their salaries in bitcoin currency.[42] securities as dened by Federal Securities Laws), and as
In March the bitcoin transaction log called the blockchain such were subject to the courts jurisdiction,[63][64] and
temporarily split into two independent chains with dif- Germanys Finance Ministry subsumed bitcoins under the
fering rules on how transactions were accepted. For six term unit of accounta nancial instrumentthough
hours two bitcoin networks operated at the same time, not as e-money or a functional currency, a classication
each with its own version of the transaction history. The nonetheless having legal and tax implications.[65]
core developers called for a temporary halt to trans- In October 2013, the FBI seized roughly 26,000 BTC
actions, sparking a sharp sell-o.[43] Normal operation from website Silk Road during the arrest of alleged owner
was restored when the majority of the network down- Ross William Ulbricht.[66][67][68] Two companies, Robo-
graded to version 0.7 of the bitcoin software.[43] The Mt.
16 CHAPTER 1. OVERVIEW

coin and Bitcoiniacs launched the worlds rst bitcoin mission CFTC to begin listing an over-the-counter
ATM on 29 October 2013 in Vancouver, BC, Canada, swap product based on the price of a bitcoin. The CFTC
allowing clients to sell or purchase bitcoin currency at a swap product approval marks the rst time a U.S. regula-
downtown coee shop.[69][70][71] Chinese internet giant tory agency approved a bitcoin nancial product.[92]
Baidu had allowed clients of website security services to In December 2014 Microsoft began to accept bitcoin to
pay with bitcoins.[72] buy Xbox games and Windows apps.[93]
In November 2013, the University of Nicosia announced
that it would be accepting bitcoin as payment for tuition
fees, with the universitys chief nancial ocer calling 2015
it the gold of tomorrow.[73] During November 2013,
the China-based bitcoin exchange BTC China overtook In January 2015 Coinbase raised 75 million USD as part
the Japan-based Mt. Gox and the Europe-based Bitstamp of a Series C funding round, smashing the previous record
to become the largest bitcoin trading exchange by trade for a bitcoin company.[94] Less than one year after the
volume.[74] collapse of Mt. Gox, United Kingdom-based exchange
Bitstamp announced that their exchange would be taken
In December 2013, Overstock.com[75] announced plans oine while they investigate a hack which resulted in
to accept bitcoin in the second half of 2014. On 5 De- about 19,000 bitcoins (equivalent to roughly US$5 mil-
cember 2013, the Peoples Bank of China prohibited Chi- lion at that time) being stolen from their hot wallet.[95]
nese nancial institutions from using bitcoins.[76] After The exchange remained oine for several days amid
the announcement, the value of bitcoins dropped,[77] and speculation that customers had lost their funds. Bitstamp
Baidu no longer accepted bitcoins for certain services.[78] resumed trading on 9 January after increasing security
Buying real-world goods with any virtual currency has measures and assuring customers that their account bal-
been illegal in China since at least 2009.[79] ances would not be impacted.[96]
In March 2015 21 Inc announced it had raised 116 million
2014 USD in venture funding, the largest amount for any digital
currency-related companies.[97]
In January 2014, Zynga[80] announced it was testing As of August 2015 it was estimated that 160,000 mer-
bitcoin for purchasing in-game assets in seven of its chants accept bitcoin payments.[98] Barclays announced
games. That same month, The D Las Vegas Casino that they would become the rst UK high street bank to
Hotel and Golden Gate Hotel & Casino properties in start accepting bitcoin, with a plan to facilitate users to
downtown Las Vegas announced they would also begin make charitable donations using the cryptocurrency out-
accepting bitcoin, according to an article by USA To- side their systems.[99] They partnered in April 2016 with
day. The article also stated the currency would be ac- mobile payment startup Circle Internet Financial.[100]
cepted in ve locations, including the front desk and In October 2015, a proposal was submitted to the
certain restaurants.[81] The network rate exceeded 10 Unicode Consortium to add a codepoint for the bitcoin
petahash/sec.[82] TigerDirect[83] and Overstock.com[84] symbol.[101]
started accepting bitcoin.
In early February 2014, one of the largest bitcoin ex-
changes, Mt. Gox,[85] suspended withdrawals citing tech- 2016
nical issues.[86] By the end of the month, Mt. Gox had
led for bankruptcy protection in Japan amid reports that In January 2016, the network rate exceeded 1
744,000 bitcoins had been stolen.[87] Months before the exahash/sec.[102]
ling, the popularity of Mt. Gox had waned as users ex- In March 2016, the Cabinet of Japan recognized virtual
perienced diculties withdrawing funds.[88] currencies like bitcoin as having a function similar to real
[103]
In June 2014 the network exceeded 100 petahash/sec.[89] money. Bidorbuy, the largest South African online
marketplace, launched bitcoin payments for both buyers
On 18 June 2014, it was announced that bitcoin payment [104]
service provider BitPay would become the new sponsor of and sellers.
St. Petersburg Bowl under a two-year deal, renamed the In April 2016, Steam started accepting bitcoin as pay-
Bitcoin St. Petersburg Bowl. Bitcoin was to be accepted ment for video games and other online media.[105]
for ticket and concession sales at the game as part of the In July 2016, researchers published a paper show-
sponsorship, and the sponsorship itself was also paid for ing that by November 2013 bitcoin commerce was no
using bitcoin.[90] longer driven by sin activities but instead by legitimate
In July 2014 Newegg and Dell[91] started accepting bit- enterprises.[106] Uber switched to bitcoin in Argentina af-
coin. ter the government blocked credit card companies from
[107]
In September 2014 TeraExchange, LLC, received ap- dealing with Uber.
proval from the U.S.Commodity Futures Trading Com- In August 2016, a major bitcoin exchange, Bitnex, was
1.2. HISTORY OF BITCOIN 17

hacked and nearly 120,000 BTC (around $60m) was US$3,000 for the rst time.
stolen.[108] On August 12 2017, the price of one BTC passed
In September 2016, the number of bitcoin ATMs had US$4,000 for the rst time.
doubled over the last 18 months and reached 771 ATMs Two days later, the price of one BTC hit a record high of
worldwide.[109]
US$4,400 for the rst time.
In November 2016, the Swiss Railway operator SBB
(CFF) upgraded all their automated ticket machines so
that bitcoin could be bought from them using the scan- 1.2.4 Prices and value history
ner on the ticket machine to scan the bitcoin address on a
phone app.[110]
Bitcoin generates more academic interest year after year;
the number of Google Scholar articles published men-
tioning bitcoin grew from 83 in 2009, to 424 in 2012,
and 3580 in 2016.[111] Also, the academic Ledger (jour-
nal) published its rst issue. It is edited by Peter Rizun.

The price of a bitcoin reached US$1,139.9 on 4 January 2017.


2017 (semi logarithmic plot)

The number of businesses accepting bitcoin continues to Among the factors which may have contributed
increase. In January 2017, NHK reported the number of to this rise were the European sovereign-debt cri-
online stores accepting bitcoin in Japan had increased 4.6 sisparticularly the 20122013 Cypriot nancial
times over the past year.[112] BitPay CEO Stephen Pair crisisstatements by FinCEN improving the cur-
declared the companys transaction rate grew 3 from rencys legal standing and rising media and Internet
January 2016 to February 2017, and explained usage of interest.[125][126][127][128]
bitcoin is growing in B2B supply chain payments.[113] Until 2013, almost all market with bitcoins were in US
Bitcoin gains more legitimacy among lawmakers and $.[129][130][131]
legacy nancial companies. For example, Japan passed As the market valuation of the total stock of bitcoins ap-
a law to accept bitcoin as a legal payment method,[114] proached US$1 billion, some commentators called bit-
and Russia has announced that it will legalize the use coin prices a bubble.[132][133][134] In early April 2013,
of cryptocurrencies such as bitcoin.[115] And Norways the price per bitcoin dropped from $266 to around $50
largest online bank, Skandiabanken, integrate bitcoin and then rose to around $100. Over two weeks starting
accounts.[116] late June 2013 the price dropped steadily to $70. The
In the rst half of 2017, 1 bitcoin surpassed the spot price began to recover, peaking once again on 1 Octo-
price of an ounce of gold for the rst time,[117] and sub- ber at $140. On 2 October, The Silk Road was seized by
sequently broke its all-time high, reaching US$1,402.03 the FBI. This seizure caused a ash crash to $110. The
on 1 May 2017,[118] and over US$1,800 on 11 May price quickly rebounded, returning to $200 several weeks
2017.[119] On 20 May 2017, the price of one bitcoin later.[135] The latest run went from $200 on 3 November
passed US$2,000 for the rst time. to $900 on 18 November.[136] Bitcoin passed US$1,000
on 28 November 2013 at Mt. Gox.
In March 2017, the number of GitHub projects related to
bitcoin passed 10,000.[120] Prices fell to around $400 in April 2014, before rallying
in the middle of the year. They then declined to not much
Exchange trading volumes continue to increase. For the
more than $200 in early 2015.[137]
6-month period ending March 2017, Mexican exchange
Bitso saw trading volume increase 1500%.[121] Between In the second quarter of 2017, prices more than doubled
January and May 2017 Poloniex saw an increase of more from $1200 to over $2500.
than 600% active traders online and regularly processed
640% more transactions.[122]
1.2.5 Satoshi Nakamoto
In June 2017, the bitcoin symbol was encoded in Unicode
version 10.0 at position U+20BF ( ) in the Currency Main article: Satoshi Nakamoto
Symbols block.[123]
Per Fortune, on 1 August 2017 bitcoin split into two dig- Satoshi Nakamoto is presumed to be a pseudonym
ital currencies, the classic bitcoin (BTC) and the Bitcoin for the person or people who designed the original bit-
Cash (BCH).[124] coin protocol in 2008 and launched the network in 2009.
On August 5 2017, the price of one BTC passed Nakamoto was responsible for creating the majority of
18 CHAPTER 1. OVERVIEW

the ocial bitcoin software and was active in making piece by Andrew O'Hagan about Nakamoto.[165]
modications and posting technical information on the
BitcoinTalk Forum.[152] Investigations into the real iden-
tity of Satoshi Nakamoto were attempted by The New 1.2.6 The fork of March 2013
Yorker and Fast Company. The New Yorkers investiga-
tion brought up at least two possible candidates: Michael On 12 March 2013, a bitcoin miner running version 0.8.0
Clear and Vili Lehdonvirta. Fast Company's investigation of the bitcoin software created a large block that was con-
brought up circumstantial evidence linking an encryption sidered invalid in version 0.7 (due to an undiscovered in-
patent application led by Neal King, Vladimir Oksman consistency between the two versions). This created a
and Charles Bry on 15 August 2008, and the bitcoin.org split or fork in the blockchain since computers with the
domain name which was registered 72 hours later. The recent version of the software accepted the invalid block
patent application (#20100042841) contained network- and continued to build on the diverging chain, whereas
ing and encryption technologies similar to bitcoins, and older versions of the software rejected it and continued
textual analysis revealed that the phrase "... computation- extending the blockchain without the oending block.
ally impractical to reverse appeared in both the patent This split resulted in two separate transaction logs being
application and bitcoins whitepaper.[11] All three inven- formed without clear consensus, which allowed for the
tors explicitly denied being Satoshi Nakamoto.[153][154] In same funds to be spent dierently on each chain. In re-
May 2013, Ted Nelson speculated that Japanese mathe- sponse, the Mt. Gox exchange temporarily halted bitcoin
matician Shinichi Mochizuki is Satoshi Nakamoto.[155] deposits.[166] The exchange rate fell 23% to $37 on the
Later in 2013 the Israeli researchers Dorit Ron and Adi Mt. Gox exchange but rose most of the way back to its
Shamir pointed to Silk Road-linked Ross William Ul- prior level of $48.[44][45]
bricht as the possible person behind the cover. The
Miners resolved the split by downgrading to version 0.7,
two researchers based their suspicion on an analysis of
putting them back on track with the canonical blockchain.
the network of bitcoin transactions.[156] These allegations
User funds largely remained unaected and were avail-
were contested.[157] Ron and Shamir later retracted their
able when network consensus was restored.[167] The net-
claim.[158]
work reached consensus and continued to operate as nor-
Nakamotos involvement with bitcoin does not appear mal a few hours after the split.[168]
to extend past mid-2010.[159] In April 2011, Nakamoto
communicated with a bitcoin contributor, saying that he
had moved on to other things.[160] 1.2.7 Regulatory issues
Stefan Thomas, a Swiss coder and active commu-
nity member, graphed the time stamps for each of On 18 March 2013, the Financial Crimes Enforcement
Nakamotos 500-plus bitcoin forum posts; the resulting Network (or FinCEN), a bureau of the United States
chart showed a steep decline to almost no posts between Department of the Treasury, issued a report regarding
the hours of 5 a.m. and 11 a.m. Greenwich Mean Time. centralized and decentralized virtual currencies and
Because this pattern held true even on Saturdays and Sun- their legal status within "money services business" (MSB)
days, it suggested that Nakamoto was asleep at this time, and Bank Secrecy Act regulations.[49][54] It classied dig-
and the hours of 5 a.m. to 11 a.m. GMT are midnight to ital currencies and other digital payment systems such
6 a.m. Eastern Standard Time (North American Eastern as bitcoin as "virtual currencies" because they are not
Standard Time). Other clues suggested that Nakamoto legal tender under any sovereign jurisdiction. FinCEN
was British: A newspaper headline he had encoded in the cleared American users of bitcoin of legal obligations[54]
genesis block came from the UK-published newspaper by saying, A user of virtual currency is not an MSB un-
The Times, and both his forum posts and his comments der FinCENs regulations and therefore is not subject to
in the bitcoin source code used British English spellings, MSB registration, reporting, and recordkeeping regula-
such as optimise and colour.[161] tions. However, it held that American entities who gen-
erate virtual currency such as bitcoins are money trans-
An Internet search by an anonymous blogger of texts sim- mitters or MSBs if they sell their generated currency for
ilar in writing to the bitcoin whitepaper suggests Nick Sz- national currency: "...a person that creates units of con-
abo's bit gold articles as having a similar author.[7] Nick vertible virtual currency and sells those units to another
denied being Satoshi, and stated his ocial opinion on person for real currency or its equivalent is engaged in
Satoshi and bitcoin in a May 2011 article.[162] transmission to another location and is a money transmit-
In a March 2014 article in Newsweek, journalist Leah ter. This specically extends to miners of the bitcoin
McGrath Goodman doxed Dorian S. Nakamoto of currency who may have to register as MSBs and abide
Temple City, California, saying that Satoshi Nakamoto is by the legal requirements of being a money transmitter if
the mans birth name. Her methods and conclusion drew they sell their generated bitcoins for national currency and
widespread criticism.[163][164] are within the United States.[47] Since FinCEN issued this
guidance, dozens of virtual currency exchangers and ad-
In June 2016, the London Review of Books published a
ministrators have registered with FinCEN, and FinCEN
1.2. HISTORY OF BITCOIN 19

is receiving an increasing number of suspicious activity 1.2.8 Theft and exchange shutdowns
reports (SARs) from these entities.[169]
Additionally, FinCEN claimed regulation over American Theft of bitcoin has been documented on numerous occa-
entities that manage bitcoins in a payment processor set- sions. At other times, bitcoin exchanges have shut down,
ting or as an exchanger: In addition, a person is an ex- taking their clients bitcoins with them. A Wired study
changer and a money transmitter if the person accepts published April 2013 showed that 45 percent of bitcoin
such de-centralized convertible virtual currency from one exchanges end up closing.[179]
person and transmits it to another person as part of the ac-
ceptance and transfer of currency, funds, or other value On 19 June 2011, a security breach of the Mt. Gox bit-
that substitutes for currency.[48][49] coin exchange caused the nominal price of a bitcoin to
fraudulently drop to one cent on the Mt. Gox exchange,
In summary, FinCENs decision would require bitcoin ex- after a hacker used credentials from a Mt. Gox auditors
changes where bitcoins are traded for traditional curren- compromised computer illegally to transfer a large num-
cies to disclose large transactions and suspicious activity, ber of bitcoins to himself. They used the exchanges soft-
comply with money laundering regulations, and collect ware to sell them all nominally, creating a massive ask
information about their customers as traditional nancial order at any price. Within minutes, the price reverted to
institutions are required to do.[54][170][171] its correct user-traded value.[180][181][182][183][184][185] Ac-
Patrick Murck of the Bitcoin Foundation criticized Fin- counts with the equivalent of more than US$8,750,000
CENs report as an overreach and claimed that Fin- were aected.[182]
CEN cannot rely on this guidance in any enforcement In July 2011, the operator of Bitomat, the third-largest
action.[172] bitcoin exchange, announced that he had lost access to his
Jennifer Shasky Calvery, the director of FinCEN said, wallet.dat le with about 17,000 bitcoins (roughly equiv-
Virtual currencies are subject to the same rules as other alent to US$220,000 at that time). He announced that he
currencies. ... Basic money-services business rules apply would sell the service for the missing amount, aiming to
here.[54] use funds from the sale to refund his customers.[186]
In its October 2012 study, Virtual currency schemes, the In August 2011, MyBitcoin, a now defunct bitcoin trans-
European Central Bank concluded that the growth of vir- action processor, declared that it was hacked, which
tual currencies will continue, and, given the currencies caused it to be shut down, paying 49% on customer
inherent price instability, lack of close regulation, and deposits, leaving more than 78,000 bitcoins (equiva-
risk of illegal uses by anonymous users, the Bank warned lent to roughly US$800,000 at that time) unaccounted
[187][188]
that periodic examination of developments would be nec- for.
essary to reassess risks.[173] In early August 2012, a lawsuit was led in San Fran-
In 2013, the U.S. Treasury extended its anti-money cisco court against Bitcoinica a bitcoin trading venue
laundering regulations to processors of bitcoin claiming about US$460,000 from the company. Bit-
transactions.[174][175] coinica was hacked twice in 2012, which led to allegations
that the venue neglected the safety of customers money
In June 2013, Bitcoin Foundation board member Jon Ma- and cheated them out of withdrawal requests.[189][190]
tonis wrote in Forbes that he received a warning letter
from the California Department of Financial Institutions In late August 2012, an operation titled Bitcoin Sav-
accusing the foundation of unlicensed money transmis- ings and Trust was shut down by the owner, leav-
sion. Matonis denied that the foundation is engaged in ing around US$5.6 million in bitcoin-based debts;
money transmission and said he viewed the case as an this led to allegations that the operation was a Ponzi
opportunity to educate state regulators.[176] scheme.[191][192][193][194] In September 2012, the U.S.
Securities and Exchange Commission had reportedly
In late July 2013, the industry group Committee for the started an investigation on the case.[195]
Establishment of the Digital Asset Transfer Authority
began to form to set best practices and standards, to In September 2012, Bitoor, a bitcoin exchange, also re-
work with regulators and policymakers to adapt exist- ported being hacked, with 24,000 bitcoins (worth about
ing currency requirements to digital currency technol- US$250,000) stolen. As a result, Bitoor suspended
[196][197]
ogy and business models and develop risk management operations. The same month, Bitoor resumed
standards.[177] operations; its founder said that he reported the theft to
FBI, and that he plans to repay the victims, though the
In 2014, the U.S. Securities and Exchange Commission time frame for repayment is unclear.[198]
led an administrative action against Erik T. Voorhees,
for violating Securities Act Section 5 for publicly oering On 3 April 2013, Instawallet, a web-based wallet
[199]
unregistered interests in two bitcoin websites in exchange provider, was hacked, resulting in the theft of over
[200]
for bitcoins. [178] 35,000 bitcoins which were valued at US$129.90 per
bitcoin at the time, or nearly $4.6 million in total. As a
result, Instawallet suspended operations.[199]
20 CHAPTER 1. OVERVIEW

On 11 August 2013, the Bitcoin Foundation announced change for bitcoins, a realization event has probably oc-
that a bug in a pseudorandom number generator within curred and any gain or loss would likely be calculated us-
the Android operating system had been exploited to steal ing fair market values for the service provided.[215]
from wallets generated by Android apps; xes were pro- In August 2013, the German Finance Ministry char-
vided 13 August 2013.[201] acterized bitcoin as a unit of account,[65][216] usable in
In October 2013, Inputs.io, an Australian-based bitcoin multilateral clearing circles and subject to capital gains
wallet provider was hacked with a loss of 4100 bitcoins, tax if held less than one year.[216]
worth over A$1 million at time of theft. The service was On 5 December 2013, the Peoples Bank of China an-
run by the operator TradeFortress. Coinchat, the asso- nounced in a press release regarding bitcoin regulation
ciated bitcoin chat room, has been taken over by a new that whilst individuals in China are permitted to freely
admin.[202] trade and exchange bitcoins as a commodity, it is prohib-
On 26 October 2013, a Hong-Kong based bitcoin trad- ited for Chinese nancial banks to operate using bitcoins
ing platform owned by Global Bond Limited (GBL) van- or for bitcoins to be used as legal tender currency, and that
ished with 30 million yuan (US$5 million) from 500 entities dealing with bitcoins must track and report suspi-
investors.[203] cious activity to prevent money laundering.[217] The value
Mt. Gox, the Japan-based exchange that in 2013 handled of bitcoin dropped on various exchanges between 11 and
70% of all worldwide bitcoin trac, declared bankruptcy 20 percent following the regulation[218]
announcement, be-
in February 2014, with bitcoins worth about $390 million fore rebounding upward again.
missing, for unclear reasons. The CEO was eventually
arrested and charged with embezzlement.[204]
1.2.10 Sports sponsorship
On 3 March 2014, Flexcoin announced it was closing its
doors because of a hack attack that took place the day On 18 June 2014, it was announced that bitcoin payment
before.[205][206][207] In a statement that now occupies their
service provider BitPay would become the new sponsor
homepage, they announced on 3 March 2014 that As of the St. Petersburg Bowl game under a two-year deal,
Flexcoin does not have the resources, assets, or otherwise
renamed the Bitcoin St. Petersburg Bowl. Bitcoin will
to come back from this loss [the hack], we are closing our
be accepted for ticket and concession sales as part of
doors immediately.[208] Users can no longer log into the
the sponsorship, and the sponsorship itself was also paid
site. for using bitcoin.[90] On 2 April 2015, after one year of
Chinese cryptocurrency exchange Bter lost $2.1 million sponsorship, BitPay declined to renew sponsorship of the
in BTC in February 2015.[209] game.[219]

The Slovenian exchange Bitstamp lost bitcoin worth $5.1


million to a hack in January 2015.[210] 1.2.11 References
The US-based exchange Cryptsy declared bankruptcy
in January 2016, ostensibly because of a 2014 hacking [1] Jerry Brito; Andrea Castillo (2013). Bitcoin: A Primer
incident; the court-appointed receiver later alleged that for Policymakers (PDF). Mercatus Center. George Ma-
son University. Retrieved 22 October 2013.
Cryptsys CEO had stolen $3.3 million.[211]
In May 2016, Gatecoin closed temporarily after a breach [2] Chaum, David (1983). Blind signatures for un-
had caused a loss of about $2 million in cryptocurrency. traceable payments (PDF). Advances in Cryptol-
It subsequently relaunched its exchange in August 2016 ogy Proceedings of Crypto. 82 (3): 199203.
and is slowly reimbursing its customers.[212][213] doi:10.1007/978-1-4757-0602-4_18.
Chaum, David; Fiat, Amos; Naor, Moni.
In August 2016, hackers stole some $72 million in
Untraceable Electronic Cash (PDF). Lecture
customer bitcoin from the Hong-Kong-based exchange Notes in Computer Science.
Bitnex.[214]
[3] Dai, W (1998). b-money. Archived from the original
on 2011-10-04. Retrieved 5 December 2013.
1.2.9 Taxation and regulation [4] Szabo, Nick. Bit Gold. Unenumerated. Blogspot.
Archived from the original on 2011-09-22. Retrieved 5
See also: Legality of bitcoin by country or territory December 2013.

[5] Tsorsch, Florian; Scheuermann, Bjorn (15 May 2015).


In 2012, the Cryptocurrency Legal Advocacy Group
Bitcoin and Beyond: A Technical Survey of Decentral-
(CLAG) stressed the importance for taxpayers to deter- ized Digital Currencies (PDF). Retrieved 24 June 2015.
mine whether taxes are due on a bitcoin-related transac-
tion based on whether one has experienced a "realization [6] Reusable Proofs of Work. Archived from the original
event": when a taxpayer has provided a service in ex- on December 22, 2007.
1.2. HISTORY OF BITCOIN 21

[7] Satoshi Nakamoto is (probably) Nick Szabo. [25] Nakamoto, Satoshi. ALERT we are investigating a
LikeInAMirror. WordPress. Archived from the problem. Archived from the original on 2013-10-15.
original on 2014-04-13. Retrieved 5 December 2013. Retrieved 15 October 2013.

[8] Weisenthal, Joe (19 May 2013). Heres The Problem [26] Garzik, Je. Strange block 74638. Archived from the
With The New Theory That A Japanese Math Professor original on 2013-10-16. Retrieved 15 October 2013.
Is The Inventor Of Bitcoin. Business Insider. Archived
from the original on 2013-11-03. Retrieved 19 May 2013. [27] Espinoza, Javier (22 September 2014). Is It Time to In-
vest in Bitcoin? Cryptocurrencies Are Highly Volatile, but
[9] Bitcoin Inventor Satoshi Nakamoto is Anonymous-style Some Say They Are Worth It. Journal Reports. The Wall
Cell from Europe Archived December 17, 2013, at the Street Journal. Retrieved 28 June 2016.
Wayback Machine.
[28] Rainey Reitman (20 January 2011). Bitcoin a Step To-
[10] Vigna, Paul; Casey, Michael J. (January 2015). The Age ward Censorship-Resistant Digital Currency. Electronic
of Cryptocurrency: How Bitcoin and Digital Money Are Frontier Foundation. Retrieved 21 November 2014.
Challenging the Global Economic Order (1 ed.). New
York: St. Martins Press. ISBN 978-1-250-06563-6. [29] Cohn, Cindy (20 June 2011). EFF and Bitcoin. Elec-
tronic Frontier Foundation. Retrieved 16 April 2014.
[11] Nakamoto, Satoshi (1 Nov 2008). Bitcoin: A Peer-to-
Peer Electronic Cash System (PDF). Retrieved 20 De- [30] Cindy Cohn; Peter Eckersley; Rainey Reitman & Seth
cember 2012. Schoen (17 May 2013). EFF Will Accept Bitcoins to
Support Digital Liberty. Electronic Frontier Foundation.
[12] Wallace, Benjamin (23 November 2011). The Rise and Retrieved 27 April 2014.
Fall of Bitcoin. Wired. Archived from the original on
2013-10-31. Retrieved 13 October 2012. [31] Greenberg, Andy (14 June 2011). WikiLeaks Asks
For Anonymous Bitcoin Donations. logs.forbes.com.
[13] Bitcoin P2P e-cash paper. 31 October 2008. Archived from the original on 2011-06-27. Retrieved 22
June 2011.
[14] Satoshis posts to Cryptography mailing list. Mail-
archive.com. Retrieved 26 March 2013. [32] EFF said they generally don't endorse any type of product
or service.EFF and Bitcoin | Electronic Frontier Foun-
[15] Block 0 Bitcoin Block Explorer. Archived from the
dation. E.org. 14 June 2011. Archived from the origi-
original on 2013-10-15.
nal on 2013-12-13. Retrieved 22 June 2011.
[16] Nakamoto, Satoshi (9 January 2009). Bitcoin v0.1 re-
leased. Archived from the original on 2014-03-26. [33] EFF and Bitcoin | Electronic Frontier Foundation.
E.org. 17 May 2013. Archived from the original on
[17] SourceForge.net: Bitcoin. Archived from the original 2014-03-27. Retrieved 21 May 2013.
on 2013-03-16.
[34] What Is Bitcoin?". WeUseCoins.com. Archived from the
[18] Peterson, Andrea (3 January 2014). Hal Finney received original on 2011-03-22. Retrieved 2017-03-03.
the rst Bitcoin transaction. Heres how he describes it..
The Washington Post. [35] BitBills Attempt to Patent Physical Bitcoins. Lets Talk
Bitcoin!. 30 June 2013. Archived from the original on
[19] Popper, Nathaniel (30 August 2014). Hal Finney, Cryp- 2014-02-19. Retrieved 23 October 2013.
tographer and Bitcoin Pioneer, Dies at 58. NYTimes. Re-
trieved 2 September 2014. [36] 301 Response to BitBills Patent By Crypto Coin Wallet
Cards. Archived from the original on 2013-11-01.
[20] Wallace, Benjamin (23 November 2011). The Rise and
Fall of Bitcoin. Wired. Retrieved 4 November 2013. [37] Toepfer, Susan (16 January 2012). "'The Good Wife' Sea-
son 3, Episode 13, 'Bitcoin for Dummies: TV Recap.
[21] McMillan, Robert. Who Owns the Worlds Biggest Bit- The Wall Street Journal. Archived from the original on
coin Wallet? The FBI. Wired. Cond Nast. Retrieved 7 2014-01-12.
October 2016.
[38] Matonis, Jon. Bitcoin Foundation Launches To Drive
[22] Bosker, Bianca (16 April 2013). Gavin Andresen, Bit- Bitcoins Advancement. Forbes. Retrieved 2017-05-20.
coin Architect: Meet The Man Bringing You Bitcoin
(And Getting Paid In It)". The Hungton Post. Retrieved [39] Browdie, Brian (11 September 2012). BitPay Signs
21 October 2016. 1,000 Merchants to Accept Bitcoin Payments. Ameri-
can Banker. Archived from the original on 2014-04-12.
[23] Sawyer, Matt (26 February 2013). The Beginners Guide
To Bitcoin Everything You Need To Know. Mone- [40] Skelton, Andy (15 November 2012). Pay Another Way:
tarism. Archived from the original on 2014-04-09. Bitcoin. WordPress. Retrieved 24 April 2014.

[24] Vulnerability Summary for CVE-2010-5139. National [41] Ludwig, Sean (8 February 2013). Y Combinator-backed
Vulnerability Database. 8 June 2012. Archived from the Coinbase now selling over $1M Bitcoin per month. Ven-
original on 2014-04-09. Retrieved 22 March 2013. tureBeat. Archived from the original on 2014-04-09.
22 CHAPTER 1. OVERVIEW

[42] Mandalia, Ravi (22 February 2013). The Internet [58] Sampson, Tim (2013). U.S. government makes its rst-
Archive Starts Accepting Bitcoin Donations. Parity ever Bitcoin seizure. The Daily Dot. Archived from the
News. Archived from the original on 2013-06-03. Re- original on 2013-06-30. Retrieved 2013-10-15.
trieved 28 February 2013.
[59] Jeremy Kirk (July 11, 2013). In Kenya, Bitcoin linked
[43] Lee, Timothy (11 March 2013). Major glitch in Bitcoin to popular mobile payment system. Cio.com. Archived
network sparks sell-o; price temporarily falls 23%". ar- from the original on 2014-02-01. Retrieved 2013-08-15.
stechnica.com. Retrieved 15 February 2015.
[60] Andrew Trotman (30 July 2013). Virtual currency Bit-
[44] Lee, Timothy (12 March 2013). Major glitch in Bitcoin coin not welcome in Thailand in possible setback to
network sparks sell-o; price temporarily falls 23%". Ar- mainstream ambitions. The Daily Telegraph. London.
stechnica. Archived from the original on 2013-04-22. Archived from the original on 2013-11-01. Retrieved 15
August 2013.
[45] Blagdon, Je (12 March 2013). Technical problems
cause Bitcoin to plummet from record high, Mt. Gox sus- [61] Maierbrugger, Arno (30 July 2013). Thailand rst coun-
pends deposits. The Verge. Archived from the original try to ban digital currency Bitcoin. Inside Investor.
on 2013-04-22. Archived from the original on 2014-02-04. Retrieved 3
August 2013.
[46] Bitcoin Charts. Archived from the original on 2014-05-
09. [62] Virtual currency Bitcoin not welcome in Thailand in pos-
sible setback to mainstream ambitions. bitcoinsalvation.
[47] Lee, Timothy (20 March 2013). US regulator Bitcoin 4 July 2015. Retrieved 4 July 2015.
Exchanges Must Comply With Money Laundering Laws.
Arstechnica. Archived from the original on 2013-10-21. [63] Farivar, Cyrus (2013-08-07). Federal judge: Bitcoin, a
Bitcoin miners must also register if they trade in their currency, can be regulated under American law. Ars
earnings for dollars. Technica. Archived from the original on 2013-10-20. Re-
trieved 2013-08-15.
[48] US govt claries virtual currency regulatory position.
Finextra. 19 March 2013. Archived from the original on [64] Securities and Exchange Commission v. Shavers et
2014-03-26. al, 4:13-cv-00416 (E.D.Tex.)". Docket Alarm, Inc.
Archived from the original on 2013-10-29. Retrieved 14
[49] Application of FinCENs Regulations to Persons Ad- August 2013.
ministering, Exchanging, or Using Virtual Currencies
(PDF). Department of the Treasury Financial Crimes En- [65] Vaishampayan, Saumya (19 August 2013). Bitcoins are
forcement Network. Retrieved 19 March 2013. private money in Germany. Marketwatch. Archived
from the original on 1 September 2013.
[50] Roose, Kevin (8 April 2013) Inside the Bitcoin Bubble:
BitInstants CEO Daily Intelligencer. Archived from [66] After Silk Road seizure, FBI Bitcoin wallet identied and
the original on 2014-04-09.. Nymag.com. Retrieved on pranked. Archived from the original on 2014-04-05.
20 April 2013. [67] Silkroad Seized Coins. Archived from the original on
[51] Bitcoin Exchange Rate. Bitcoinscharts.com. Archived 2014-01-09.
from the original on 2012-06-24. Retrieved 2013-08-15. [68] Hill, Kashmir. The FBIs Plan For The Millions Worth
Of Bitcoins Seized From Silk Road. Forbes. Archived
[52] Van Sack, Jessica (27 May 2013). Why Bitcoin makes
from the original on 2014-05-02.
cents. Archived from the original on 2014-02-09. Re-
trieved 2013-08-15. [69] Worlds rst Bitcoin ATM goes live in Vancouver Tues-
day. CBC. Archived from the original on 2013-10-28.
[53] Dillet, Romain. Feds Seize Assets From Mt. Goxs
Dwolla Account, Accuse It Of Violating Money Transfer [70] Vancouver to host worlds rst Bitcoin ATM. Archived
Regulations. Archived from the original on 2013-10-09. from the original on 2013-10-29.
Retrieved 2013-05-15.
[71] The worlds rst Bitcoin ATM is coming to Canada next
[54] Berson, Susan A. (2013). Some basic rules for using week. The Verge. Archived from the original on 2013-
'bitcoin' as virtual money. American Bar Association. 10-29. Retrieved October 29, 2013.
Archived from the original on 2013-10-29. Retrieved
2013-06-26. [72] Kapur, Saranya (15 October 2013). Chinas Google Is
Now Accepting Bitcoin. businessinsider.com. Business
[55] Taylor, Colleen. With $1.5M Led By Winklevoss Cap- Insider, Inc. Retrieved 26 December 2013.
ital, BitInstant Aims To Be The Go-To Site To Buy And
Sell Bitcoins. TechCrunch. Retrieved 2017-05-20. [73] Cypriot University to Accept Bitcoin Payments. abc
News. 21 November 2013. Archived from the original
[56] Cohen, Brian. Users Bitcoins Seized by DEA. Archived on 2013-12-02. Retrieved 24 November 2013.
from the original on 2013-10-09. Retrieved 2013-10-14.
[74] Natasha Lomas (18 November 2013). As Chinese In-
[57] The National Police completes the second phase of vestors Pile Into Bitcoin, Chinas Oldest Exchange, BTC
the operation Ransomware"". El Cuerpo Nacional de China, Raises $5M From Lightspeed. TechCrunch. Re-
Polica. Retrieved 2013-10-14. trieved 10 January 2014.
1.2. HISTORY OF BITCOIN 23

[75] Dante D'Orazio (21 December 2013). Online retailer [92] Callaway, Claudia; Greebel, Evan; Moriarity, Kathleen;
Overstock.com plans to accept Bitcoin payments next Xethalis, Gregory; Kim, Diana. First Bitcoin Swap
year. Archived from the original on 2014-01-06. Re- Proposed. The National Law Review. Katten Muchin
trieved 5 January 2014. Rosenman LLP. Retrieved 15 September 2014.

[76] Kelion, Leo (18 December 2013). Bitcoin sinks after [93] Warren, Tom (11 December 2014). Microsoft now ac-
China restricts yuan exchanges. bbc.com. BBC. Re- cepts Bitcoin to buy Xbox games and Windows apps.
trieved 20 December 2013.
[94] Megabank Joins Coinbases Record $75 Million Funding
[77] China bans banks from bitcoin transactions. The Sydney Round. 20 January 2015.
Morning Herald. Reuters. 6 December 2013. Retrieved [95] Srivastava, Shivam (6 January 2015). Bitcoin ex-
31 October 2014. change Bitstamp suspends service after security breach.
reuters.com. Reuters. Retrieved 24 January 2015.
[78] Baidu Stops Accepting Bitcoins After China Ban.
Bloomberg. New York. 7 December 2013. Retrieved 11 [96] Novak, Marja (9 January 2015). Bitcoin exchange Bit-
December 2013. stamp says to resume trading on Friday. reuters.com.
Reuters. Retrieved 24 January 2015.
[79] China bars use of virtual money for trading in real
goods. English.mofcom.gov.cn. 29 June 2009. Re- [97] Secretive Silicon Valley Bitcoin Startup Raises
trieved 10 January 2014. US$116m In Funding. 13 March 2015.

[80] Carl Franzen (4 January 2014). Zynga tests Bitcoin pay- [98] Bitcoin: A Disruptive Currency, 1 August 2015, This im-
ments for seven online games. Archived from the original plies that 160,000 already accept bitcoin
on 2014-01-06. Retrieved 5 January 2014. [99] Anthony, Sebastian (1 September 2015). Barclays to be-
come the rst major bank to accept Bitcoin. Ars Tech-
[81] Trejos, Nancy. Las Vegas casinos adopt new form of
nica. Retrieved 14 February 2017.
currency: Bitcoins. USA Today. Retrieved 21 January
2014. [100] Kelly, Jemima (6 April 2016). Barclays backs 'social
payments app' Circle as it launches in UK. Reuters. Re-
[82] We've just reached 10 petahash per second!". 20 De- trieved 14 February 2017.
cember 2013.
[101] Shirri, Ken (2 October 2015). Proposal for addition of
[83] Jane McEntegart (26 January 2014). TigerDirect is Now bitcoin sign (PDF). unicode.org. Unicode. Retrieved 3
Accepting Bitcoin As Payment. Toms hardware. Re- November 2015.
trieved 28 August 2014.
[102] Bitcoin hash rate exceeds 1 EH/s for the rst time. 25
[84] Vaishampayan, Saumya (9 January 2014). Bitcoin now January 2016.
accepted on Overstock.com through VC-backed Coin-
[103] Japan OKs recognizing virtual currencies as similar to
base. marketwatch.com. Wall Street Journal. Retrieved
real money. 4 March 2016.
10 February 2014.
[104] Activating and Using Bitcoin as a Payment Option.
[85] MtGox gives bankruptcy details. bbc.com. BBC. 4
March 2014. Retrieved 13 March 2014. [105] Steam accepts bitcoin with BitPay.

[86] Biggs, John (10 February 2014). Whats Going On With [106] Tasca, Paolo; Liu, Shaowen; Hayes, Adam (1 July 2016),
Bitcoin Exchange Mt. Gox?". TechCrunch. Retrieved 26 The Evolution of the Bitcoin Economy: Extracting and
February 2014. Analyzing the Network of Payment Relationships, p. 36,
SSRN 2808762 , By November, 2013, the amount of in-
[87] MtGox bitcoin exchange les for bankruptcy. bbc.com. ows attributable to sin entities had shrunk signicantly
BBC. 28 February 2014. Retrieved 18 April 2014. to just 3% or less of total transactions.

[88] Swan, Noelle (28 February 2014). MtGox bankruptcy: [107] Uber Switches to Bitcoin in Argentina After Govt Blocks
Bitcoin insiders saw problems with the exchange for Uber Credit Cards. 6 July 2016.
months. csmonitor.com. The Christian Science Monitor.
Retrieved 18 April 2014. [108] Coppola, Frances (6 August 2016). Theft And May-
hem In The Bitcoin World. Forbes. Retrieved 15 August
[89] Unprecedented: Bitcoin Mining Network Exceeds 100 2016.
PH/s. 14 June 2014. [109] Number of Bitcoin ATMs Has More Than Doubled In
Past 18 Months. 1 October 2016.
[90] Casey, Michael J. (18 June 2014). BitPay to Sponsor St.
Petersburg Bowl in First Major Bitcoin Sports Deal. The [110] SBB: Make quick and easy purchases with Bitcoin.. Re-
Wall Street Journal. Retrieved 18 June 2014. trieved 3 March 2017.

[91] Flacy, Mike (19 July 2014). Dell, Newegg Start Accept- [111] . 17 December 2016 https://mobile.twitter.com/lopp/
ing Bitcoin as Payment. Digital Trends. Retrieved 5 Au- status/810157568739966976. Missing or empty |title=
gust 2014. (help)
24 CHAPTER 1. OVERVIEW

[112] " 1 4.6 ". 9 January 2017. [133] Salmon, Felix. The Bitcoin Bubble and the Future of
Currency. Archived from the original on 2014-02-21.
[113] The Bitcoin Fee Market. 7 March 2017. our transaction Retrieved 9 April 2013.
growth of nearly 3x [...] Many of the businesses weve
signed up over the years have started using BitPay for B2B [134] Ro, Sam (3 April 2013). Art Cashin: The Bitcoin Bub-
supply chain payments. ble. Archived from the original on 2014-04-09.

[114] Kharpal, Arjun. Bitcoin value rises over $1 billion as [135] BBC News Bitcoin value drops after FBI shuts Silk
Japan, Russia move to legitimize cryptocurrency. Road drugs site. Bbc.co.uk. 2013-10-03. Archived from
the original on 2013-10-06. Retrieved 2013-12-04.
[115] Colibasanu, Antonia. Heres why Russia is opening the
door to cryptocurrencies. [136] Mt. Gox graph. Bitcoinity.org. Archived from the orig-
inal on 2013-10-06. Retrieved 2013-12-04.
[116] Redman, Jamie. Norways Largest Online Bank Inte-
grates Bitcoin Accounts. [137] http://www.coindesk.com/
[117] Shin, Laura (2 March 2017). 1 Bitcoin Is Now Worth markets-weekly-bitcoin-price-drops-coinbase-euphoria-wanes/
More Than An Ounce Of Gold. Forbes. Retrieved 3
[138] (in English) Bitcoin Auction: 10,000.00 BTC Starting
March 2017.
Bid 50.00 USD (discussion thread) Archived December
[118] Bitcoin Price Passes $1,400 to Hit Highest Value in His- 24, 2013, at the Wayback Machine.
tory. 1 May 2017.
[139] 2010. En.bitcoin.it. Archived from the original on
[119] Bitcoin crosses $1,800 for the rst time adding $3 billion 2014-02-13. Retrieved 2013-12-04.
in market cap in just four days.. 11 May 2017.
[140] Why Bitcoin Matters. Retrieved 2016-01-04.
[120] Bitcoin Projects on Github Surpass 10,000. 8 March
2017. [141] (in English) Pizza for bitcoins? (Bitcointalk) (pictures
linked in the thread now archived) Archived February 13,
[121] Mexican Bitcoin Adoption is Untold Story of the Last 2014, at the Wayback Machine.
Six Months. Nearly 1500% volume growth on its largest
exchange. Over $4M USD equivalent per week now.. 27 [142] (in English) Laszlos pizza for $76,880 Archived 12 April
March 2017. 2014 at the Wayback Machine.

[122] INDUSTRY GROWTH AND ITS EFFECT ON [143] Merchant, Brian (26 March 2013). This Pizza Cost
POLONIEX. 16 May 2017. $750,000. Motherboard. Retrieved 13 January 2017.

[123] Unicode 10.0.0. Unicode Consortium. 20 June 2017. [144] Leos Literak. Bitcoin doshl parity s dolarem. Abclin-
Retrieved 20 June 2017. uxu.cz. Archived from the original on 2014-02-22. Re-
trieved 2013-12-04.
[124] Smith, Jake (11 August 2017). The Bitcoin Cash Hard
Fork Will Show Us Which Coin Is Best. Fortune. Re- [145] Bitcoin worth almost as much as gold. CNN.com. 29
trieved 13 August 2017. November 2013. Retrieved 2017-02-24.

[125] Traverse, Nick (3 April 2013). Bitcoins Meteoric Rise. [146] (in English) Coindesk Bitcoin Price Index Chart Archived
Archived from the original on 2014-04-09. May 12, 2014, at the Wayback Machine.
[126] Bustillos, Maria (2 April 2013). The Bitcoin Boom. [147] BTC Price Declines Following False Report of Bitcoin
Archived from the original on 2014-03-13. Ban in China. CoinDesk.com. 21 March 2014. Archived
from the original on 2014-03-28.
[127] Seward, Zachary (28 March 2013). Bitcoin, up 152%
this month, soaring 57% this week. Archived from the [148] Price of Bitcoin Falls Under $500 Amid Uncertainty in
original on 2014-04-18. Retrieved 9 April 2013. China. CoinDesk.com. 28 March 2014. Archived from
[128] A Bit expensive. The Economist. 1 March 2013. the original on 2014-04-07.
Archived from the original on 2014-04-05.
[149] BitcoinWisdom Live Bitcoin/Litecoin charts Archived
[129] (in English) Bitcoin Charts (price) Archived March 28, May 11, 2014, at the Wayback Machine.
2011, at WebCite
[150] Bitcoin is now worth more than an ounce of gold for
[130] (in English) History of Bitcoin (Bitcoin wiki) Archived the rst time ever. Marketwatch.com. 2017-03-02. Re-
February 13, 2014, at the Wayback Machine. trieved 2017-03-02.

[131] History Bitcoin. En.bitcoin.it. Archived from the [151] Bitcoin price exceeds gold for rst time ever.
original on 2014-02-13. Retrieved 2013-12-04. CNN.com. 2017-03-03. Retrieved 2017-03-09.

[132] Estes, Adam (28 March 2013). Bitcoin Is Now A Billion [152] The Rise and Fall of Bitcoin. Wired. 23 November
Dollar Industry. Archived from the original on 2013-10- 2011. Archived from the original on 2013-10-31. Re-
11. trieved 13 October 2012.
1.2. HISTORY OF BITCOIN 25

[153] Penenberg, Adam. The Bitcoin Crypto-Currency Mys- [169] Remarks From Under Secretary of Terrorism and Finan-
tery Reopened. FastCompany. Archived from the origi- cial Intelligence David S. Cohen on 'Addressing the Illicit
nal on 2013-10-06. Retrieved 16 February 2013. Finance Risks of Virtual Currency'". United States De-
partment of the Treasury. March 18, 2014.
[154] Greeneld, Rebecca (11 October 2011). The Race to
Unmask Bitcoins Inventor(s)". The Atlantic. Archived [170] Lee, Timothy (19 March 2013). New Money Launder-
from the original on 2013-11-01. Retrieved 16 February ing Guidelines Are A Positive Sign For Bitcoin. Forbes.
2013. Archived from the original on 2013-10-19.

[155] I Think I Know Who Satoshi Is. YouTube TheTedNel- [171] Faiola, Anthony; Farnam, T.W. (4 April 2013). The rise
son Channel. 18 May 2013. Archived from the original of the bitcoin: Virtual gold or cyber-bubble?". Washing-
on 2014-04-14. ton Post. Archived from the original on 2013-10-29.

[156] John Marko (23 November 2013). Study Suggests Link [172] Murck, Patrick (19 March 2013). Today, we are all
Between Dread Pirate Roberts and Satoshi Nakamoto. money transmitters... (no, really!)". Bitcoin Foundation.
New York Times.
[173] Virtual Currency Schemes. European Central Bank.
[157] Trammell, Dustin D. I Am Not Satoshi. Archived October 2012. Archived from the original (PDF) on 27
from the original on 2013-12-05. Retrieved 27 Novem- July 2013.
ber 2013.
[174] Bitcoin, the nationless electronic cash beloved by hack-
[158] Wile, Rob. Researchers Retract Claim Of Link Between ers, bursts into nancial mainstream. Fox News. 11 April
Alleged Silk Road Mastermind And Founder Of Bitcoin. 2013. Archived from the original on 2013-11-07.. Fox
Business Week. Archived from the original on 2014-03- News (11 April 2013). Retrieved on 20 April 2013.
26. Retrieved 17 December 2013.
[175] Bitcoin Currency, Hackers Make Money, Investing in
[159] The Rise and Fall of Bitcoin. Wired. 23 November Bitcoins, Scams AARP. Archived from the original on
2011. Archived from the original on 2013-10-31. Re- 2014-03-22.. Blog.aarp.org (19 March 2013). Retrieved
trieved 13 October 2012. on 20 April 2013.

[160] Davis, Joshua (10 October 2011). The Crypto- [176] Coldewey, Devin (24 June 2013). Bitcoin losing shine
Currency. The New Yorker. Archived from the original after hitting the spotlight. NBC News. Archived from
on 2013-08-23. Retrieved 16 February 2013. the original on 27 July 2013.

[161] Benjamin Wallace: The Rise and Fall of Bitcoin, Wired, [177] Tsukayama, Hayley (30 July 2013). Bitcoin, others set up
23 November 2011 Archived 19 October 2013 at the standards group. The Washington Post. Archived from
Wayback Machine. the original on August 1, 2013.

[162] Newsweek Thinks It Found the Real Satoshi Nakamoto [178] Casey, Brian (23 July 2014). Bitcoin Is Anyone In
... and His Name Is Satoshi Nakamoto. slate.com. March Charge?". The National Law Review. Retrieved 15
6, 2014. Archived from the original on 2014-04-29. September 2014.

[163] Leah McGrath Goodman (6 March 2014). The Face Be- [179] Study: 45 percent of Bitcoin exchanges end up closing.
hind Bitcoin. Newsweek. Archived from the original on Archived from the original on 2013-04-26. Retrieved 28
2014-03-07. Retrieved 6 March 2014. April 2013. Cond Nast UK 2013 Wired.co.uk (26
April 2013).
[164] Greenberg, Andy (6 March 2014). Bitcoin Commu-
nity Responds To Satoshi Nakamotos 'Uncovering' With [180] Karpeles, Mark (30 June 2011). Clarication of Mt
Disbelief, Anger, Fascination. Forbes.com. Forbes. Gox Compromised Accounts and Major Bitcoin Sell-
Archived from the original on 7 March 2014. Retrieved 3 O. Tibanne Co. Ltd. Archived from the original on
April 2014. 2014-02-10.

[165] Nakamoto, Andrew OHagan on the many lives of Satoshi [181] Bitcoin Report Volume 8 (FLASHCRASH)".
(30 June 2016). The Satoshi Aair. pp. 728. Re- YouTube BitcoinChannel. 19 June 2011. Archived from
trieved 3 March 2017 via London Review of Books. the original on 2014-04-11.

[166] Karpeles, Mark. Bitcoin blockchain issue bitcoin de- [182] Mick, Jason (19 June 2011). Inside the Mega-Hack of
posits temporarily suspended. Mt. Gox. Archived from Bitcoin: the Full Story. DailyTech. Archived from the
the original on 2014-02-09. Retrieved 12 March 2013. original on 2013-04-22.

[167] 11/12 March 2013 Chain Fork Information. Bitcoin [183] Lee, Timothy B. (19 June 2011) Bitcoin prices plum-
Project. Archived from the original on 2014-02-14. Re- met on hacked exchange. Archived from the original on
trieved 12 March 2013. 2012-04-10., Ars Technica

[168] Bitcoin software bug has been rapidly resolved. ecur- [184] Karpeles, Mark (20 June 2011) Huge Bitcoin sell o due
rency. 12 March 2013. Archived from the original on to a compromised account rollback, Mt.Gox Support
2014-03-31. Archived June 20, 2011, at WebCite
26 CHAPTER 1. OVERVIEW

[185] Chirgwin, Richard (19 June 2011). Bitcoin collapses on [201] Chirgwin, Richard (12 August 2013). Android bug bat-
malicious trade Mt Gox scrambling to raise the Titanic. ters Bitcoin wallets / Old aw, new problem. The Reg-
The Register. Archived from the original on 2014-04-14. ister. Archived from the original on 17 August 2013.
Original Bitcoin announcement: Android Security Vul-
[186] Dotson, Kyt (1 August 2011) Third Largest Bitcoin Ex- nerability. bitcoin.org. 11 August 2013. Archived from
change Bitomat Lost Their Wallet, Over 17,000 Bitcoins the original on 17 August 2013.
Missing. Archived from the original on 2014-02-15..
SiliconAngle [202] Australian Bitcoin bank hacked. The Sydney Morning
Herald. Archived from the original on 2013-12-30. Re-
[187] Jeries, Adrianne (8 August 2011) MyBitcoin
trieved 9 November 2013.. Retrieved 9 November 2013.
Spokesman Finally Comes Forward: What Did You
Think We Did After the Hack? We Got Shitfaced"". [203] Hong Kong Bitcoin Trading Platform Vanishes with mil-
Archived from the original on 2013-10-30.. BetaBeat lions. Archived from the original on 12 November 2013.
[188] Jeries, Adrianne (19 August 2011) Search for Owners Retrieved 18 November 2013.
of MyBitcoin Loses Steam. Archived from the original
[204] Ex-boss of MtGox bitcoin exchange arrested in Japan
on 2014-04-04.. BetaBeat
over lost $390m. The Guardian. 1 August 2015.
[189] Geuss, Megan (12 August 2012) Bitcoinica users sue for
[205] Flexcoin exing Bitcoins to their limit. malwareZero.
$460k in lost bitcoins. Archived from the original on
Archived from the original on 2014-03-09. Retrieved 9
2014-04-11.. Arstechnica
March 2014.
[190] Peck, Morgen (15 August 2012) First Bitcoin Lawsuit
Filed In San Francisco. Archived from the original on [206] Bitcoin bank Flexcoin shuts down after theft. Reuters. 4
2014-04-14.. IEEE Spectrum March 2014. Archived from the original on 2014-03-09.
Retrieved 9 March 2014.
[191] Bitcoin ponzi scheme investors lose US$5 million in
online hedge fund. RT. 29 August 2012. Archived from [207] Bitcoin bank Flexcoin pulls plug after cyber-robbers nick
the original on 2013-02-18. $610,000. The Register. Archived from the original on
2014-03-10. Retrieved March 9, 2014.
[192] Jeries, Adrianne (27 August 2012). Suspected multi-
million dollar Bitcoin pyramid scheme shuts down, in- [208] Flexcoin homepage. Flexcoin. Archived from the orig-
vestors revolt. The Verge. Archived from the original inal on 2014-03-12. Retrieved 9 March 2014.
on 2013-10-11.
[209] Bter to Return 'Hacked' Funds Following Security Part-
[193] Mick, Jason (28 August 2012). ""Pirateat40 Makes nership. CoinDesk. March 12, 2015.
O $5.6M USD in BitCoins From Pyramid Scheme.
DailyTech. Archived from the original on 2014-04-11. [210] Bitstamp Claims $5 Million Lost in Hot Wallet Hack.
CoinDesk. January 5, 2015.
[194] Mott, Nathaniel (31 August 2012). Bitcoin: How a
Virtual Currency Became Real with a $5.6M Fraud. [211] Cryptsy CEO Stole Millions From Exchange, Court Re-
PandoDaily. Archived from the original on 2013-10-27. ceiver Alleges. CoinDesk. August 11, 2016.
[195] Foxton, Willard (2 September 2012) Bitcoin 'Pirate' [212] Hacked Gatecoin Raises $500K to Reopen Exchange.
scandal: SEC steps in amid allegations that the whole Bitcoin.com. July 6, 2016.
thing was a Ponzi scheme. The Daily Telegraph. Lon-
don. 27 September 2012. Archived from the original on [213] Gatecoin Announces Relaunch of its Trading Platform -
2014-04-14.. The Telegraph CryptoCoinsNews. CryptoCoinsNews. 2016-08-05. Re-
trieved 2017-05-12.
[196] Bitcoin theft causes Bitoor exchange to go oine.
BBC News. 25 September 2012. Archived from the orig- [214] All Bitnex clients to share 36% loss of assets following
inal on 2014-03-27. exchange hack. The Guardian. 7 August 2016.
[197] Goddard, Louis (5 September 2012). Bitcoin exchange [215] Stewart, David D.; Soong Johnston, Stephanie D. (29
BitFloor suspends operations after $250,000 theft. The October 2012). 2012 TNT 209-4 NEWS ANALYSIS:
Verge. Archived from the original on 2014-02-11. VIRTUAL CURRENCY: A NEW WORRY FOR TAX
[198] Chirgwin, Richard (25 September 2012). Bitcoin ex- ADMINISTRATORS?. (Release Date: OCTOBER 17,
change back online after hack. PC World. Archived 2012) (Doc 2012-21516)". Tax Notes Today. 2012 TNT
from the original on 2014-04-14. 209-4 (2012 TNT 2094).

[199] Cutler, Kim-Mai (3 April 2013). Another Bitcoin Wal- [216] Nestler, Franz (16 August 2013). Deutschland erkennt
let Service, Instawallet, Suers Attack, Shuts Down Until Bitcoins als privates Geld an (Germany recognizes Bit-
Further Notice. TechCrunch. Archived from the original coin as private money)". Frankfurter Allgemeine Zeitung.
on 2014-03-31. Retrieved 12 April 2013. Archived from the original on 2013-10-22.

[200] Transaction details for bitcoins stolen from Instawal- [217] 2013-12-05, ,
let. Archived from the original on 2013-10-19.. Peoples Bank of China Archived January 22, 2014, at
Blockchain.info (3 April 2013). Retrieved 20 April 2013. the Wayback Machine.
1.3. LEGALITY OF BITCOIN BY COUNTRY 27

[218] 2013-12-06, China bans banks from bitcoin transactions, Southern Africa
The Sydney Morning Herald Archived March 23, 2014,
at the Wayback Machine.
Americas
[219] Bitcoin backer BitPay dumps St. Pete Bowl sponsor-
ship. Retrieved 2 April 2015. North America

1.2.12 External links United Mexican States

Interactive bitcoin history


Central America
Wolfram|Alpha bitcoin price tracking

Bitcoin price and portfolio tracking Caribbean

South America
1.3 Legality of bitcoin by country
Asia
For a broader coverage related to this topic, see Bitcoin.
Central Asia
The legal status of bitcoin varies substantially from coun-
try to country and is still undened or changing in many
Eurasia
of them. Whilst the majority of countries do not make
the usage of bitcoin itself illegal (with the exceptions of:
Bangladesh, Bolivia, Ecuador & Kyrgyzstan), its status Western Asia
as money (or a commodity) varies, with diering regu-
latory implications. While some countries have explic-
itly allowed its use and trade, others have banned or re- Southern Asia
stricted it. Likewise, various government agencies, de-
partments, and courts have classied bitcoins dierently. Eastern Asia
While this article provides the legal status of bitcoin, reg-
ulations and bans that apply to this cryptocurrency likely
extend to similar systems as well. Southeast Asia

Europe
1.3.1 Detail by union
Central Europe
1.3.2 Detail by country or territory
Alphabetical index to classications Eastern Europe

Africa
Northern Europe
Northern Africa
Southern Europe
Western Africa
Western Europe
Central Africa
Oceania

Southeast Africa Australasia

Horn of Africa Melanesia

Indian Ocean States Micronesia


28 CHAPTER 1. OVERVIEW

Polynesia [13] Position Paper on Virtual Currencies (PDF). South


African Reserve Bank.

1.3.3 Footnotes [14] BITMARI Conrmation letter(1).pdf. Google Docs.


Retrieved 2017-06-11.
[1] Translated from: ...bitcoin nespa atribty meny v [15] Canada: Can You Take A Security Interest In Bit-
prvnom zmysle (jeho platnos na uritom zem nie je coin?,Mondaq,May 14.2014.Wednewday 4:10PM
mocensky ustanoven, prvny poriadok neupravuje jej EST,Ms M. Sandra Appel(A security Agreement for
obeh ani ochranu), zastvame nzor, e ho nie je mon Bitcoin: Is it Possible?)
oznaova za menu.
[16] Rubenfeld, Samuel (23 June 2014). Canada Enacts Bit-
coin Regulations. Risk and Compliance Journal. Wall
1.3.4 References Street Journal. Retrieved 24 February 2015.

[1] Regulation of Bitcoin in Selected Jurisdictions. loc.gov. [17] Statement of Jennifer Shasky Calvery, Director Financial
The Law Library of Congress, Global Legal Research Crimes Enforcement Network United States Department
Center. 2014. Retrieved 25 February 2015. of the Treasury Before the United States Senate Commit-
tee on Banking, Housing, and Urban Aairs Subcommit-
[2] The exchange of traditional currencies for units of the tee on National Security and International Trade and Fi-
bitcoin virtual currency is exempt from VAT (PDF). nance Subcommittee on Economic Policy. ncen.gov.
Court of Justice of the European Union. Retrieved 6 De- Financial Crimes Enforcement Network. 19 November
cember 2016. 2013. Retrieved 1 June 2014.

[3] Bitcoin currency exchange not liable for VAT taxes: top [18] IRS Virtual Currency Guidance : Virtual Currency Is
EU court. Reuters. 22 October 2015. Retrieved 23 Oc- Treated as Property for U.S. Federal Tax Purposes; Gen-
tober 2015. eral Rules for Property Transactions Apply. www.irs.
gov. Retrieved 2017-04-22.
[4] Bodoni, Stephanie; Thomson, Amy (22 October 2015).
EUs Top Court Rules That Bitcoin Exchange Is Tax- [19] https://www.reuters.com/article/
Free. BloombergBusiness. Bloomberg. Retrieved 23 Oc- us-jpmorgan-cyber-bitcoin-idUSKCN11P2DE
tober 2015.
[20] Cuthbertson, Anthony (20 June 2014). Cryptocurrency
[5] European Central Bank (October 2012). Virtual Currency Round-Up: Bolivian Bitcoin Ban, iOS Apps & Doge-
Schemes (PDF). Frankfurt am Main: European Central coin at McDonalds. ibtimes.co.uk. International Busi-
Bank. ISBN 978-92-899-0862-7. Retrieved 5 March ness Times. Retrieved 23 February 2015.
2014. [21] https://www3.bcb.gov.br/normativo/detalharNormativo.
[6] Szczepaski, Marcin (November 2014). Bitcoin: Mar- do?method=detalharNormativo&N=114009277. Miss-
ket, economics and regulation (PDF). European Parlia- ing or empty |title= (help)
mentary Research Service. Annex B: Bitcoin regulation or [22] Riesgos de las operaciones realizadas con Monedas Vir-
plans therefor in selected countries. Members Research tuales"". Superintendencia Financiera de Colombia. 26
Service. p. 9. Retrieved 18 February 2015. March 2014. Retrieved 20 October 2015.
[7] EBA Opinion on virtual currencies (pdf). European [23] Cuthbertson, Anthony (1 September 2014). Ecuador
Banking Authority. 4 July 2014. p. 46. Retrieved 8 July Reveals National Digital Currency Plans Following Bit-
2014. coin Ban. ibtimes.co.uk. International Business Times.
Retrieved 23 February 2015.
[8] http://www.europarl.europa.eu/news/
en/news-room/20160524IPR28821/ [24] Martnez Vinueza, Diego; Rivera, Patrco. DBCE-
meps-call-for-virtual-currency-watchdog-to-combat-money-laundering-and-terrorism
0360-2013 (PDF). Banco Central del Ecuador. Re-
trieved 22 October 2015.
[9] http://www.coindesk.com/
european-union-proposes-tighter-bitcoin-controls-panama-papers-response/
[25] Warning of the National Bank of the Kyrgyz Republic on
the spread and use of the virtual currency, in particular,
[10] https://www.cryptocoinsnews.com/ bitcoins (bitcoin)". nbkr.kg. National Bank of the Kyrgyz
the-european-union-wants-to-identify-bitcoin-users/ Republic. 18 July 2014. Retrieved 23 February 2015.
[11] Guidance for a Risk-Based Approach: Prepaid Cards, [26] Bitcoin Israel - Q & A | Dave Wolf & Co. Law Oces.
Mobile Payments and Internet-based Payment Services www.lawfirmwolf.com. Retrieved 2017-07-06.
(PDF). Guidance for a risk-based approach. Paris: Fi-
nancial Action Task Force (FATF). June 2013. p. 47. [27] Taxation of Cryptocurrency (PDF). |rst1= missing
Retrieved 6 March 2014. |last1= in Authors list (help)

[12] https://www.naij.com/ [28] " ""


."Al Arabiya. 4 July 2017. Retrieved 17 July
1083244-central-bank-nigeria-bans-transaction-bitcoins-onecoin-others.
html 2017.
1.3. LEGALITY OF BITCOIN BY COUNTRY 29

[29] Knutsen, Elise (24 Feb 2014). Despite warnings, Bitcoin [48] Japan eyes treating bitcoins the same as real money.
gains toehold in region. dailystar.com.lb. The Daily Star. Nikkei Asian Review. The Nikkei. 24 February 2016. Re-
Retrieved 17 June 2015. [In February of 2014] the Cen- trieved 28 April 2016.
tral Bank of Jordan issued a warning against the currency,
becoming the second government in the region to do so [49] https://bravenewcoin.com/news/
after Lebanon. local-government-using-bitcoin-to-promote-tourism-in-japan/

[30] Obeidat, Omar (22 February 2014). Central bank warns [50] https://mainichi.jp/articles/20170422/ddl/k02/010/
against using bitcoin. The Jordan Times. 010000c

[51] https://bravenewcoin.com/news/
[31] AFP (15 Sep 2014). Why Bangladesh will jail Bitcoin
bitcoin-regulation-overhaul-in-japan/
traders. telegraph.co.uk. The Telegraph. Retrieved 23
February 2015. [52] http://www.cnbc.com/2017/04/12/
bitcoin-price-rises-japan-russia-regulation.html
[32] No move to regulate Bitcoins: RBI. The Times of India.
29 December 2013. Retrieved 29 December 2013. [53] Russell, Jon (10 December 2013). Korea becomes the
latest Asian country to reject Bitcoin as a legitimate cur-
[33] "RBI neither regulates nor supports bitcoins". The Hindu rency. thenextweb.com. The Next Web. Retrieved 26
Business Line. 28 December 2013. Retrieved 29 Decem- February 2015.
ber 2013.
[54] Korean-American caught buying illegal drugs with Bit-
[34] Legality of bitcoin in Pakistan. 20 November 2015. coin. The Korea Herald. Herald Corporation. 17 March
2014. Retrieved 26 February 2015.
[35] China Bans Financial Companies From Bitcoin Trans-
actions. Bloomberg. 5 December 2013. Retrieved 16 [55] " " "" [Bank of Korea:"Government
December 2013. Needs to Make Bitcoin Regulation"]. HANKOOKI. De-
cember 27, 2013. Retrieved September 21, 2014.
[36] Bitcoins Outlook In China Is Not Looking So Good
Right Now. Business Insider. 16 December 2013. Re- [56] Reynolds, Sam. BITCOIN NOW FOR SALE AT TAI-
trieved 16 December 2013. WANS FAMILY MART. vrworld.com. VR World Me-
dia Hong Kong Ltd. Retrieved 9 July 2015.
[37] China Bitcoin Exchange CEO: Were Not Giving Up
Yet. 19 December 2013. Retrieved 19 December 2013. [57] Horwitz, Josh (Oct 28, 2014). Now you can buy bitcoin
along with your snacks and sodas in 3,000 Taiwanese con-
[38] Chao Deng; Lingling Wei (1 April 2014). China Cracks venience stores. techinasia.com. Tech in Asia. Retrieved
Down on Bitcoin. WSJ.com. Dow Jones & Company. 8 July 2015. Sound complicated? It is. ... As you can see,
Retrieved 8 November 2014. its best suited for folks who have already passed Bitcoin
101.
[39] Kelion, Leo (18 December 2013). Bitcoin sinks after
China restricts yuan exchanges. Technology. BBC. Re- [58] Hsu, Crystal. Regulators warn against using bitcoins.
trieved 22 October 2015. Taipei Times. Retrieved 17 April 2017.

[40] " ". 2017-02-09. [59] , (6 December 2013). "


Archived from the original on 2017-02-09. (Taiwan is not crazy about Bitcoin. The central bank does
not regulate it but the public is advised not to speculate on
[41] " ". 2017-02-09. it)". China Times. Retrieved 18 January 2014.
Archived from the original on 2017-02-09.
[60] Crystal, Hsu (31 December 2013). Regulators warn
[42] " ". 2017-02-09. Archived from the original against using bitcoins. Taipei Times. Retrieved 15 Oc-
on 2017-02-09. tober 2015.

[43] " OKCoin The Leading [61] Shu, Catherine (5 January 2014). Taiwans Government
Global Bitcoin Exchange OKCoi". 2017-02-09. Says No To Bitcoin ATMs. TechCrunch. Retrieved 18
Archived from the original on 2017-02-09. January 2014.

[44] " - ". 2017-02-09. [62] FSC vows to keep hands o bitcoin management.
Archived from the original on 2017-02-09. Taipei Times. 19 November 2015.

[45] " (Bitcoin is not regulated by HKMA)". Ta [63] FamilyMart Now Accepts BitoEXs Bitcoin Wallet to
Kung Pao. 16 November 2013. Retrieved 18 January Buy Goods. Medium.com. 26 October 2015.
2014.
[64] Ryan, Huang (20 January 2014). Indonesia warns against
[46] Bitconnect.co. Japan Ocially Recognizes Bitcoin and Bitcoin usage - The central bank said the digital currency
Digital Currencies as Money - Bitconnect. was not covered under any regulations, and highlighted the
risks involved in transaction security. ZDNet. Archived
[47] The First Governmental View: Bitcoin is not Currency from the original on 28 February 2015. Retrieved 15 Oc-
(in Japanese)". Nikkei Inc. 7 March 2014. tober 2015.
30 CHAPTER 1. OVERVIEW

[65] BI: Pemakaian bitcoin melanggar Undang-undang! (BI: [82] Komunikat Narodowego Banku Polskiego i Komisji
Bitcoin usage violates the law!)". KONTAN. 16 January Nadzoru Finansowego w sprawie walut wirtualnych (in
2014. Retrieved 15 October 2015. Polish). nbp.pl. 7 July 2017. Retrieved 31 July 2017.

[66] Bank Negaras Ocially Unocial Statement on Bitcoin [83] Banca Naional a Romniei. www.bnr.ro. Retrieved
is No Statement. Betanomics.asia. Retrieved September 2016-02-03.
21, 2014.
[84] Niekoko vah k virtulnej mene bitcoin (PDF). Slovak
[67] Statement on Bitcoin. Bank Negara Malaysia. 6 January National Bank. Retrieved 24 March 2015.
2014. Retrieved 2 March 2014. [85] Davna obravnava poslovanja z virtualno valuto po
ZDoh-2 in ZDDPO-2 | Davna uprava RS (in Slovenian).
[68] Fuad, Madiha (6 January 2014). BNM warns on Bitcoin
Durs.gov.si. 2013-12-23. Retrieved 2013-12-27.
risks. The Edge (Malaysia). Retrieved 11 January 2014.
[86] Fact sheet Status: Bitcoins (PDF). nma.ch/. FINMA:
[69] Bangko Sentral ng Pilipinas - Regulations. www.bsp. Swiss Financial Market Supervisory Authority. 25 June
gov.ph. Retrieved 2017-05-07. 2014. Retrieved 26 February 2015. The use of bitcoins
as a means of paying for goods and services in Switzerland
[70] Irene Tham (2013-09-22). Bitcoin users beware: MAS
is not regulated
| AsiaOne Business. Business.asiaone.com. Retrieved
2013-12-27. [87] Swiss Parliament: Rechtssicherheit fr Bitcoin schaen.
Parlament.ch. Retrieved 2013-12-27.
[71] Terence Lee (2013-12-23). Singapore government de-
cides not to interfere with Bitcoin. Techinasia.com. Re- [88] Swiss Parliament: Bitcoin and AML. Parlament.ch.
trieved 2013-12-27. Retrieved 2014-04-16.

[72] Tay, Liz (9 January 2014). Singaporean Tax Authori- [89] Federal Council report on virtual currencies in response
ties Have Issued Guidance On Bitcoin-Related Sales And to the Schwaab (13.3687) and Weibel (13.4070) postu-
Earnings. Business Insider (Australia). Retrieved 11 lates (PDF). Federal Council (Switzerland). Swiss Con-
January 2014. federation. 25 June 2014. Retrieved 28 November 2014.

[73] Sangwongwanich, Pathom (18 Aug 2014). Bitcoin rm [90] Uhlig/jse, Christian (1 July 2016). Alpine 'Crypto Val-
licensed to trade in baht. bangkokpost.com. Bangkok ley' pays with Bitcoins. DW Finance. Archived from the
Post. Retrieved 24 February 2015. Another bitcoin trad- original on 20 September 2016. Retrieved 20 September
ing company has emerged as a legally registered entity in 2016.
Thailand... despite doubts over the legality of the virtual [91] SBB: Make quick and easy purchases with Bitcoin.
currency. Sbb.ch. Retrieved 2017-01-05.
[74] Watts, Jake Maxwell (31 July 2013). Thailands Bitcoin [92] Advarsel mod virtuelle valutaer [Warning against virtual
ban is not quite what it seems. Quartz. Atlantic Media. currencies] (in Danish). Financial Supervisory Authority.
Retrieved 2 June 2015. December 17, 2013. Archived from the original on De-
cember 17, 2013.
[75] Bank of Thailand Says Bitcoin 'Not Illegal' But Warns
Against its Use. CoinDesk. 2014-03-18. Retrieved [93] Schwartzkop, Frances. Bitcoins Spark Regulatory
2016-05-10. Crackdown as Denmark Drafts Rules. Retrieved 24 De-
cember 2013.
[76] Vietnam to develop legal framework for Bitcoin. VN-
Express. VNExpress. 6 December 2016. Retrieved 6 De- [94] Anals: olemuslikke takistusi Bitcoini kasutamise
cember 2016. seadustamiseks pole. Majandus (in Estonian). Retrieved
2017-03-15.
[77] Obchodovn s bitcoiny (PDF). Czech National Bank.
Retrieved 19 March 2015. [95] https://www.vero.fi/syventavat-vero-ohjeet/
ohje-hakusivu/48411/virtuaalivaluuttojen_tuloverotu/
[78] Clinch, Matt (19 August 2013). Bitcoin recognized by
[96] Joe Stanley-Smith (14 November 2014). Finland recog-
Germany as 'private money'". CNBC. Retrieved 18 Jan-
nises Bitcoin services as VAT exempt. International Tax
uary 2014.
Review. Retrieved 15 November 2014.
[79] Dillet, Romain (19 August 2013). Germany Recognizes [97] https://www.vero.fi/syventavat-vero-ohjeet/
Bitcoin As Private Money, Sales Tax Coming Soon. ennakkoratkaisut/54360/kvl034201/
TechCrunch. Retrieved 8 August 2017.
[98] Signicant risk attached to use of virtual currency. cb.is.
[80] MinFin: Bitcoin nie jest nielegalny. Puls Biznesu. 18 The Central Bank of Iceland. 19 March 2014. Retrieved
December 2013. Retrieved 18 December 2013. 17 June 2015.

[81] Banks closed current accounts for Bitcoin trade (in Pol- [99] Fidel Martinez and Rob Wile (23 September 2014). U.S.
ish). bankier.pl. 27 January 2015. Retrieved 28 January hesitation is chasing Bitcoin to Europe. Retrieved 8 Jan-
2015. uary 2015.
1.3. LEGALITY OF BITCOIN BY COUNTRY 31

[100] Nathaniel Popper (21 December 2013). Into the Bitcoin 1.3.5 External links
Mines. Deal Book New York Times. New Yotk Times
Company. Retrieved 9 December 2014. Regulation of Bitcoin in Selected Jurisdictions -
[101] Hftin stva viskipti me Bitcoin (Controls suspend
law.gov
trading in bitcoin)". mbl.is (in Icelandic). Morgun- Bitcoin Legality - Map of Current Regulatory Land-
blasins. 19 December 2013. Retrieved 19 December
scape - coindesk.com
2013.
[102] Progress of the Plan for Removal of Capital Controls Legal status of Bitcoin around the world - legal-or-
(PDF). ministryonance.is. The Ministry of Finance. 25 not.com
April 2017. Retrieved 5 June 2017.
Bictoin Ban by Country - bitcoinbans.com
[103] Lietuvos bankas apsisprend dl bitkoin". vz.lt. 31 Jan-
uary 2014. Retrieved 31 January 2014.
[104] Saleha Mohsin (13 December 2013) Bitcoins Fail Cur-
1.3.6 Websites
rency Test in Scandinavias Richest Nation Bloomberg.
bitcoinbans.com
Retrieved 13 December 2013
[105] Finansdepartementet (2017-02-09). Bitcoin er unntatt
fra merverdiavgift. Regjeringen.no (in Norwegian). Re-
trieved 2017-04-02.
[106] An unocial translation of the letter from the Federal
Tax Service of Russia On the measures regarding the
exercise of control over the circulation of cryptocurren-
cies"". Russian E-Money Association. Retrieved 20 De-
cember 2016.
[107] Russian Tax Oce Updates Legal Stance On Bitcoin.
[108] " ".
loc.gov. . 2015. Retrieved 28 July
2015.
[109] Diacono, Tim (20 April 2017). Malta set for revolu-
tionary national blockchain strategy. MaltaToday. Re-
trieved 25 April 2017.
[110] Press release (PDF) (Press release). Turkish Banking
Regulation and Supervision Agency. 25 November 2013.
[111] Rguler les monnaies virtuelles (PDF). Ministre des Fi-
nances. Retrieved 6 June 2016.
[112] Communique virtual currencies (PDF). Commission de
Surveillance du Secteur Financier. Retrieved 15 October
2015.
[113] Rizzo, Pete. Luxembourg Opens Dialogue with Bitcoin
Businesses in New Statement. Regulation. CoinDesk.
Retrieved 19 October 2015.
[114] SnapSwap granted rst bitLicense in Europe. Snap-
Swap. Retrieved 19 October 2015.
[115] Rizzo, Pete (12 October 2015). Scorechain Raises
$570k for European Bitcoin Compliance Solution. Com-
panies. CoinDesk. Retrieved 19 October 2015.
[116] Tax treatment of activities involving Bitcoin and other
similar cryptocurrencies. HM Revenue & Customs.
[117] Hartge-Hazelman, Bianca (December 13, 2013). Glenn
Stevens says Bitcoins show promise, but so did tulips.
JHT. The Australian Financial Review. Retrieved
September 21, 2014.
[118] Bitcoin To Become Just Like Money In Australia July
1. cointelegraph.com. Retrieved May 10, 2017.
Chapter 2

People

2.1 Satoshi Nakamoto transferred several related domains to various prominent


members of the bitcoin community, and stopped his in-
Satoshi Nakamoto is the name used by the unknown volvement in the project. Until shortly before his absence
person or persons who designed bitcoin and created and handover, Nakamoto made all modications to the
its original reference implementation.[1] As part of the source code himself.
implementation, they also devised the rst blockchain The inventor left a text message in the rst mined block
database. In the process they were the rst to solve the which reads 'The Times 03/Jan/2009 Chancellor on brink
double spending problem for digital currency. They were of second bailout for banks. The text refers to a head-
active in the development of bitcoin up until December line in The Times published on 3 January 2009. It is a
2010. strong indication that the rst block was mined no ear-
[13]
Nakamoto has claimed to be a man living in Japan, born lier than this date. The genesis block has a timestamp
on 5 April 1975.[2] However, speculation about the true of 18:15:05 GMT on January 3 2009. This block is un-
identity of Nakamoto has mostly focused on a num- like all other[13] blocks in that it doesn't have previous block
ber of cryptography and computer science experts of to reference. This required the use of custom code to
non-Japanese descent, living in the United States and mine it. Timestamps for subsequent blocks indicate that
Europe. [3] Nakamoto did not try to mine all the early blocks solely
for himself.[13]
As of 24 May 2017, Nakamoto is believed to own up to
roughly one million bitcoins,[4] with a value estimated at As the sole, predominant early miner the inventor was
approximately $4.2 billion USD as of August 2017. awarded bitcoin at genesis and for 10 days afterwards.[14]
Except for test transactions these remain unspent since
mid January 2009.[14] The public bitcoin transaction log
shows that Nakamotos known addresses contain roughly
2.1.1 Development of bitcoin one million bitcoin. As of August 14 2017, it is worth
to equivalent of over $4,278,130,000 in BTC.[15][16] Due
In October 2008, Nakamoto published a paper[5][6] on to the hardfork in which bitcoin cash was made the
The Cryptography Mailing list at metzdowd.com[7] de- one million BCH is worth about $223,552,310.16[17][18]
scribing the bitcoin digital currency. It was titled Bit- This in total gives Nakamoto a net worth of about
coin: A Peer-to-Peer Electronic Cash System. In January $3,381,502,310.
2009, Nakamoto released the rst bitcoin software that
launched the network and the rst units of the bitcoin
cryptocurrency, called bitcoins.[8][9] Satoshi Nakamoto 2.1.2 Characteristics and identity
released the Version 0.1 of Bitcoin software on Source-
forge on 9 January 2009. Nakamoto did not disclose any personal information
Nakamoto claimed that work on the writing of the code when discussing technical matters.[3] He provided some
began in 2007.[10] The inventor of bitcoin knew that duecommentary on banking and fractional reserve lending.
to its nature the core design would have to be able to sup-
On his P2P Foundation prole as of 2012, Nakamoto
port a broad range of transaction types. The implementedclaimed to be a 37-year-old male who lived in Japan,[19]
solution enabled specialised codes and data elds from the
but some speculated he was unlikely to be Japanese due
start through the use of a predicative script.[11] to his use of perfect English and his bitcoin software not
[3]
Nakamoto created a website with the domain name bit- being documented or labelled in Japanese.
coin.org and continued to collaborate with other devel- Occasional British English spelling and terminology
opers on the bitcoin software until mid-2010. Around (such as the phrase bloody hard) in both source code
this time, he handed over control of the source code comments and forum postings led to speculation that
repository and network alert key to Gavin Andresen,[12] Nakamoto, or at least one individual in the consortium

32
2.1. SATOSHI NAKAMOTO 33

claiming to be him, was of Commonwealth origin.[5][3][20] sive American man of Hungarian descent named Nick
[31]
Stefan Thomas, a Swiss coder and active commu- Szabo.
nity member, graphed the time stamps for each of
Nakamotos bitcoin forum posts (more than 500); the re- Dorian Nakamoto In a high-prole March 6,
sulting chart showed a steep decline to almost no posts be- 2014, article in the magazine Newsweek,[32] jour-
tween the hours of 5 a.m. and 11 a.m. Greenwich Mean nalist Leah McGrath Goodman identied Dorian
Time. Because this pattern held true even on Saturdays Prentice Satoshi Nakamoto, a Japanese American
and Sundays, it suggested that Nakamoto was asleep at man living in California, whose birth name is Satoshi
this time.[3] If Nakamoto is a single individual with con- Nakamoto,[32][33][34] as the Nakamoto in question.
ventional sleeping habits, it suggests he resided in a re- Besides his name, Goodman pointed to a number of
gion using the UTC05:00 or UTC06:00 time oset. facts that circumstantially suggested he was the bitcoin
This includes the parts of North America that fall within inventor.[32] Trained as a physicist, Nakamoto worked
the Eastern Time Zone and Central Time Zone, as well as a systems engineer on classied defense projects and
as parts of Central America, the Caribbean and South computer engineer for technology and nancial informa-
America. tion services companies. Nakamoto was laid o twice in
Satoshis initial email to Dai is dated August 22, 2008; the early 1990s and turned libertarian, according to his
the metadata for this PDF (pdftk bitcoin.pdf dump_data) daughter, and encouraged her to start her own business
yields as the CreationDate the value 20081003134958- and not under the governments thumb. In the articles
07'00' - this implies 3 October 2008 or a bit over a month seemingly biggest piece of evidence, Goodman wrote
later, which is consistent with the local date mentioned that when she asked him about bitcoin during a brief
in the Cypherpunk mailing list email. This is an earlier in-person interview, Nakamoto seemed to conrm his
draft than the nal draft on bitcoin.org, which is dated identity as the bitcoin founder by stating: I am no longer
20090324113315-06'00' or 24 March 2009; the time- involved in that and I cannot discuss it. Its been turned
zone diers: 7 vs 6.[21] over to other people. They are in charge of it now. I no
longer have any connection.[32][35] The articles publica-
Gavin Andresen has said of Nakamotos code He was a
tion led to a urry of media interest, including reporters
brilliant coder, but it was quirky.[22]
camping out near Dorian Nakamotos house and briey
chasing him by car when he drove to an interview.[36]
Possible identities However, during the subsequent full-length interview,
Dorian Nakamoto denied all connection to bitcoin,
saying he had never heard of the currency before, and
There is still doubt about the real identity of Satoshi
that he had misinterpreted Goodmans question as being
Nakamoto.
about his previous work for military contractors, much
of which was classied.[37] In a reddit ask-me-anything
Nick Szabo In December 2013, a blogger named Skye interview, he claimed he'd misinterpreted Goodmans
Grey linked Nick Szabo to the bitcoin whitepaper using question as being related to his work for Citibank.[38]
a stylometric analysis.[23][24][25] Szabo is a decentralized Later that day, the pseudonymous Nakamotos P2P
currency enthusiast and published a paper on bit gold, Foundation account posted its rst message in ve years,
which is considered a precursor to bitcoin.[24][25] He is stating: I am not Dorian Nakamoto.[39][40]
known to have been interested in using pseudonyms in
the 1990s.[26] In a May 2011 article, Szabo stated about Hal Finney Hal Finney (May 4, 1956 August 28,
the bitcoin creator: Myself, Wei Dai, and Hal Finney 2014) was a pre-bitcoin cryptographic pioneer and the
were the only people I know of who liked the idea (or rst person (other than Satoshi himself) to use the soft-
in Dais case his related idea) enough to pursue it to any ware, le bug reports, and make improvements.[41] He
signicant extent until Nakamoto (assuming Nakamoto is also lived a few blocks from Dorian Nakamotos family
not really Finney or Dai).[27] home, according to Forbes journalist Andy Greenberg.[42]
Detailed research by nancial author Dominic Frisby pro- Greenberg asked the writing analysis consultancy Juola
vides much circumstantial evidence but, as he admits, no & Associates to compare a sample of Finneys writing to
proof that Satoshi is Szabo.[28] Speaking on RTs The Satoshi Nakamotos, and they found that it was the clos-
Keiser Report, he said I've concluded there is only one est resemblance they had yet come across (including the
person in the whole world that has the sheer breadth but candidates suggested by Newsweek, Fast Company, The
also the specicity of knowledge and it is this chap ....[29] New Yorker, Ted Nelson and Skye Grey).[42] Greenberg
But Szabo has denied being Satoshi. In a July 2014 email theorized that Finney may have been a ghostwriter on be-
to Frisby, he said: 'Thanks for letting me know. I'm half of Nakamoto, or that he simply used his neighbor
afraid you got it wrong doxing me as Satoshi, but I'm used Dorians identity as a drop or patsy whose personal
to it'.[30] Nathaniel Popper wrote in the New York Times information is used to hide online exploits. However,
that the most convincing evidence pointed to a reclu- after meeting Finney, seeing the emails between him and
34 CHAPTER 2. PEOPLE

Satoshi, his bitcoin wallets history including the very rst thing, and security researcher Dan Kaminsky concluded
bitcoin transaction (from Satoshi to him, which he for- Wrights claim was intentional scammery.[57][58]
got to pay back) and hearing his denial, Greenberg con- On 4 May 2016, Wright made another post on his blog
cluded Finney was telling the truth. Juola & Associates promising to publish a series of pieces that will lay the
also found that Satoshis emails to Finney more closely re- foundations for this extraordinary claim.[59][60] But the
semble Satoshis other writings than Finneys do. Finneys following day, he deleted all his blog posts and replaced
fellow extropian and sometimes co-blogger Robin Han- them with a notice entitled I'm Sorry, which read in
son assigned a subjective probability of at least 15% part:
that Hal was more involved than hes said, before fur-
ther evidence suggested that was not the case.[43]
I believed that I could put the years of
anonymity and hiding behind me. But, as the
events of this week unfolded and I prepared
Craig Steven Wright On 8 December 2015, Wired
to publish the proof of access to the earliest
wrote that Craig Steven Wright, an Australian former aca-
keys, I broke. I do not have the courage. I
demic, either invented bitcoin or is a brilliant hoaxer
cannot.[61][62]
who very badly wants us to believe he did.[44] Craig
Wright took down his Twitter account and neither he
nor his ex-wife responded to press inquiries. The same In June 2016, the London Review of Books published a
day, Gizmodo published a story with evidence obtained 35,000 word article by Andrew O'Hagan about the events,
by a hacker who supposedly broke into Wrights email based on discussions with Wright and many of the other
accounts, claiming that Satoshi Nakamoto was a joint people involved.[63][64] It also reveals that the Canadian
pseudonym for Craig Steven Wright and computer foren- company nTrust was behind Wrights claim made in May
sics analyst David Kleiman, who died in 2013.[45] A 2016.
number of prominent bitcoin promoters remained uncon-
vinced by the reports.[46] Subsequent reports also raised Other speculation In a 2011 article in The New
the possibility that the evidence provided was an elabo- Yorker, Joshua Davis claimed to have narrowed down
rate hoax,[47][48] which Wired acknowledged cast doubt the identity of Nakamoto to a number of possible indi-
on their suggestion that Wright was Nakamoto.[49] viduals, including the Finnish economic sociologist Dr.
On 9 December, only hours after Wired claimed Wright Vili Lehdonvirta and Irish student Michael Clear, then
was Nakamoto, Wrights home in Gordon, New South a graduate student in cryptography at Trinity College
Wales was raided by at least ten police ocers. His Dublin.[65] Clear strongly denied he was Nakamoto,[66]
business premises in Ryde, New South Wales were also as did Lehdonvirta.[67] In October 2011, writing for Fast
searched by police. The Australian Federal Police stated Company, investigative journalist Adam Penenberg cited
they conducted searches to assist the Australian Taxation circumstantial evidence suggesting Neal King, Vladimir
Oce and that This matter is unrelated to recent media Oksman and Charles Bry could be Nakamoto.[68] They
reporting regarding the digital currency bitcoin.[50] Ac- jointly led a patent application that contained the phrase
cording to a document released by Gizmodo alleged to be computationally impractical to reverse in 2008, which
a transcript of a meeting between Wright and the ATO, was also used in the bitcoin white paper by Nakamoto.[69]
he had been involved in a taxation dispute with them for The domain name bitcoin.org was registered three days
several years.[45] after the patent was led. All three men denied being
Nakamoto when contacted by Penenberg.[68]
On 2 May 2016, Craig Wright posted on his blog pub-
licly claiming to be Satoshi Nakamoto. In articles re- In May 2013, Ted Nelson speculated that Nakamoto is
leased on the same day, journalists from the BBC and really Japanese mathematician Shinichi Mochizuki.[70]
The Economist stated that they saw Wright signing a mes- Later, an article was published in The Age newspaper
sage using the private key associated with the rst bitcoin that claimed that Mochizuki denied these speculations,
transaction.[51][52] Wrights claim was supported by Jon but without attributing a source for the denial.[71] A 2013
Matonis (former director of the Bitcoin Foundation) and article,[72] in Vice listed Gavin Andresen, Jed McCaleb,
bitcoin developer Gavin Andresen, both of whom met or a government agency as possible candidates to be
Wright and witnessed a similar signing demonstration.[53] Nakamoto. Dustin D. Trammell, a Texas-based security
However, bitcoin developer Peter Todd said that Wrights researcher, was suggested as Nakamoto, but he publicly
blog post, which appeared to contain cryptographic denied it.[73] In 2013, two Israeli mathematicians, Dorit
proof, actually contained nothing of the sort.[54] The Ron and Adi Shamir, published a paper claiming a link
Bitcoin Core project released a statement on Twitter between Nakamoto and Ross William Ulbricht. The two
saying There is currently no publicly available cryp- based their suspicion on an analysis of the network of bit-
tographic proof that anyone in particular is Bitcoins coin transactions,[74] but later retracted their claim.[75]
creator.[55][56] Bitcoin developer Je Garzik agreed that Some considered Nakamoto might be a team of people;
evidence publicly provided by Wright does not prove any- Dan Kaminsky, a security researcher who read the bitcoin
2.1. SATOSHI NAKAMOTO 35

code,[76] said that Nakamoto could either be a team of [16] Satoshi Nakamoto has got richer in theory Steemit.
people or a genius";[20] Laszlo Hanyecz, a former bit- Steemit. 2017-08-05. Retrieved 2017-08-05.
coin core developer who had emailed Nakamoto, had the
feeling the code was too well designed for one person.[3] [17] Bitcoin Cash Price Chart (BCH/USD) | CoinGecko.
CoinGecko. Retrieved 2017-08-05.

[18] Satoshi Nakamoto has got richer in theory Steemit.


2.1.3 References Steemit. 2017-08-05. Retrieved 2017-08-05.

[1] S., L. (2 November 2015). Who is Satoshi Nakamoto?". [19] Satoshi Nakamotos Page. P2P Foundation. Retrieved
The Economist explains. The Economist. 2 May 2016.

[2] Patron, Travis (9 November 2014). Who is Satoshi [20] Jeries, Adrianne (4 October 2011). The New Yorkers
Nakamoto?". diginomics.com. Diginomics. Retrieved 7 Joshua Davis Attempts to Identify Bitcoin Creator Satoshi
July 2017. Nakamoto. Betabeat. Retrieved 27 December 2013.

[3] Wallace, Benjamin (23 November 2011). The Rise [21] Dai, Satoshi Nakamoto, Wei. Dai/Nakamoto emails -
and Fall of Bitcoin. Wired. Retrieved 31 May 2016. Gwern.net. www.gwern.net. Retrieved 2017-07-01.
It seemed doubtful that Nakamoto was even Japanese.
His English had the awless, idiomatic ring of a native [22] Simonite, Tom (15 August 2014). The Man Who Really
speaker. Built Bitcoin. MIT Technology Review. Massachusetts
Institute of Technology. Retrieved 14 November 2016.
[4] McMillan, Robert (18 December 2013). Who Owns the
Worlds Biggest Bitcoin Wallet? The FBI. Wired. Re- [23] John Biggs. Who is the real Satoshi Nakamoto? One re-
trieved 31 May 2016. searcher may have found the answer. TechCrunch. Re-
trieved 2014-03-06.
[5] Nakamoto, Satoshi (24 May 2009). Bitcoin: A Peer-to-
Peer Electronic Cash System (PDF). Retrieved 5 March [24] Grey, Skye (2013-12-01). Satoshi Nakamoto is (proba-
2014. bly) Nick Szabo. Retrieved 2014-03-13.

[6] Nakamoto, Satoshi (31 October 2008). Bitcoin P2P e- [25] Grey, Skye (2014-03-11). Occams Razor: who is most
cash paper. Retrieved 5 March 2014. likely to be Satoshi Nakamoto?". Retrieved 2014-03-15.

[7] Satoshis posts to Cryptography mailing list. Mail- [26] Re: on anonymity, identity, reputation, and spoong.
archive.com. Retrieved 2013-12-14. 1993-10-18. Retrieved 2014-03-15.

[8] Davis, Joshua. The Crypto-Currency: Bitcoin and its [27] Nick Szabo (2011-05-28). Bitcoin, what took ye so
mysterious inventor.. The New Yorker. long?". Retrieved 2014-03-12.

[9] Penenberg, Adam. The Bitcoin Crypto-Currency Mys- [28] Frisby, Dominic (2014) Who is Satoshi Nakamoto?" In
tery Reopened. Fast Company. A New Yorker writer Bitcoin : the Future of Money?, p 85-149. Unbound.
implies he found Bitcoins mysterious creator. We think ISBN 1783520779
he got the wrong man, and oer far more compelling ev-
idence that points to someone else entirely. [29] Nick Szabo is (probably) Satoshi Nakamato. 2014-11-
06. Retrieved 2014-11-06. at ~17:30 into the show
[10] Satoshi Nakamoto (17 November 2008). Re: Bitcoin
P2P e-cash paper 2008-11-17 16:33:04 UTC. Satoshi [30] Frisby p 147
Nakamoto Institute. Retrieved 4 December 2016.
[31] Popper, Nathaniel. Decoding the Enigma. New York
[11] Satoshi Nakamoto (17 June 2010). Re: Transactions and Times. the most convincing evidence pointed to a reclu-
Scripts: DUP HASH160 ... EQUALVERIFY CHECK- sive American man of Hungarian descent named Nick Sz-
SIG. Satoshi Nakamoto Institute. Retrieved 8 December abo.
2016.
[32] Leah McGrath Goodman (6 March 2014). The Face Be-
[12] Bosker, Bianca. Gavin Andresen, Bitcoin Architect: hind Bitcoin. Newsweek. Retrieved 6 March 2014.
Meet The Man Bringing You Bitcoin (And Getting Paid
In It)". HuPostTech. [33] Andy Greenberg. Bitcoin Community Responds To
Satoshi Nakamotos Outing With Disbelief, Anger, Fas-
[13] How to use hexdump to look at the Genesis Block. cination. Forbes. Retrieved 2014-03-06.
21.co. Retrieved 25 December 2016.
[34] Oremus, Will (2013-11-26). The real Satoshi
[14] Danny Bradbury (23 November 2014). How Dangerous Nakamoto: Newsweek nds mysterious bitcoin creator in
is Satoshi Nakamoto?". Coindesk. Retrieved 24 Decem- Los Angeles. Slate.com. Retrieved 2014-03-06.
ber 2016.
[35] Winton, Richard (2014-03-07). Deputies: Newsweek
[15] Bitcoin Exchange Rate Bitcoin Live Converter Bitcoin story quoted Satoshi Nakamoto accurately. Los
Preev. preev.com. Retrieved 2017-08-05. Angeles Times. Retrieved 2014-03-09.
36 CHAPTER 2. PEOPLE

[36] Rodriguez, Salvador (2014-03-06). Dorian Satoshi [55] Bitcoin Core Project. Twitter.
Nakamoto chased by reporters, denies founding Bitcoin.
Los Angeles Times. Retrieved 2014-03-06. [56] Floyd, David (2 May 2016). Has Bitcoin Creator Satoshi
Nakamoto Been Found?". investopedia.com. Investope-
[37] Hedman Rahm, Victor. The Unbelievable story of Bit- dia. Retrieved 7 July 2017.
coin. Coinworld. Retrieved 2017-07-01.
[57] Craig Wrights New Evidence That He Is Satoshi
[38] Hi r/bitcoin I am Dorian Nakamoto. AMA. Reddit. 8 Nakamoto Is Worthless. Motherboard.
October 2016. Retrieved 7 July 2017.
[58] Validating Satoshi (Or Not)". Dan Kaminskys Blog.
[39] Bitcoin open source implementation of P2P currency.
2014-03-07. Retrieved 2014-03-07. [59] Alex Hern. Bitcoin: Craig Wright promises new evi-
dence to prove identity. the Guardian.
[40] "'Real' bitcoin creator: 'I am not Dorian Nakamoto'".
CNBC. [60] Extraordinary Claims Require Extraordinary Proof - Dr.
Craig Wright BlogDr. Craig Wright Blog, archived from
[41] Hal Finney received the rst Bitcoin transaction. Heres the original on 2016-05-04, retrieved 2016-05-07
how he describes it.. Washington Post. Retrieved 24
February 2015. [61] Dr. Craig Wright. Archived from the original on 2016-
05-07.
[42] Andy Greenberg (2014-03-25). Nakamotos Neighbor:
My Hunt For Bitcoins Creator Led To A Paralyzed [62] Alex Hern. Craig Wright U-turns on pledge to provide
Crypto Genius. Forbes. Retrieved 2016-01-18. evidence he invented bitcoin. the Guardian.

[43] Conspiracy Theory, Up Close & Personal. 2014-03-25. [63] Nakamoto, Andrew OHagan on the many lives of Satoshi
Retrieved 2014-03-25. (2016-06-30). The Satoshi Aair. London Review of
Books. pp. 728. ISSN 0260-9592. Retrieved 2016-06-
[44] Greenberg, Andy; Branwen, Gwern (December 8, 2015). 28.
Bitcoins Creator Satoshi Nakamoto Is Probably This Un-
known Australian Genius. Wired. Retrieved December [64] There could be a lot of money in claiming to have in-
8, 2015. vented Bitoin. Retrieved 2016-06-28.

[45] Biddle, Sam; Cush, Andy (December 8, 2015). This [65] Davis, Joshua (10 October 2011). The Crypto-
Australian Says He and His Dead Friend Invented Bit- Currency. The New Yorker. Retrieved 17 December
coin. Gizmodo. Retrieved December 8, 2015. 2013.

[46] Kaminska, Izabella (9 December 2015). So, Satoshi is [66] Clear, Michael (4 April 2013). Clarications on Bitcoin
an Aussie?". FT Alphaville. Retrieved 9 December 2015. Article. Retrieved 17 December 2013.

[47] Jeong, Sarah (9 December 2015). Satoshis PGP Keys [67] Who is Satoshi Nakamoto?". coindesk.com. 26 Novem-
Are Probably Backdated and Point to a Hoax. Mother- ber 2013. Retrieved 17 December 2013.
board. Retrieved 10 December 2015. [68] Penenberg, Adam (11 October 2011). The Bitcoin
[48] Ryall, Jenni (10 December 2015). New chase for Bitcoin Crypto-currency Mystery Reopened. The Fast Com-
founder leaves everyone exhausted and no wiser. Mash- pany. Retrieved 17 December 2013.
able. Mashable. Retrieved 10 December 2015. [69] Updating and Distributing Encryption Keys US
[49] Greenberg A (11 December 2015). New Clues Sug- 20100042841 A1
gest Craig Wright, Suspected Bitcoin Creator, May Be a [70] I Think I Know Who Satoshi Is. YouTube TheTedNel-
Hoaxer. Wired. Retrieved 12 December 2015. son Channel. 18 May 2013.
[50] Hunt, Ellie; Farrell, Paul (9 December 2015). Reported [71] Eileen Ormsby (2013-07-10). The outlaw cult.
bitcoin 'founder' Craig Wrights home raided by Aus- Theage.com.au. Retrieved 2013-12-19.
tralian police. The Guardian. London. Retrieved 9 De-
cember 2015. [72] Liu, Alec. Who Is Satoshi Nakamoto, the Creator of
Bitcoin?". vice.com. Retrieved 17 December 2013.
[51] Creator of Bitcoin digital cash reveals identity - BBC
News. BBC News. BBC. BBC. 2 May 2016. Retrieved [73] I am not Satoshi (blog). Retrieved 2014-02-21.
2 May 2016.
[74] Marko, John (23 November 2013). Study Sug-
[52] Craig Steven Wright claims to be Satoshi Nakamoto. Is gests Link Between Dread Pirate Roberts and Satoshi
he?". The Economist. 2 May 2016. Retrieved 2 May Nakamoto. New York Times.
2016.
[75] Wile, Rob. Researchers Retract Claim Of Link Between
[53] Satoshi, archived from the original on 2016-05-05, re- Alleged Silk Road Mastermind And Founder Of Bitcoin.
trieved 2016-05-07 Business Week. Retrieved 17 December 2013.

[54] Thomas Fox-Brewster (2 May 2016). Craig Wright [76] Naughton, John (7 April 2013). Why Bitcoin scares
Claims Hes Bitcoin Creator Satoshi -- Experts Fear An banks and governments. The Observer. Retrieved 11
Epic Scam. Forbes. March 2014.
2.2. HAL FINNEY 37

2.1.4 External links Finney would write on the Cypherpunks


Mailing List in 1992.
The Satoshi Aair. Andrew O'Hagan on the many
lives of Satoshi Nakamoto
He was an early bitcoin user and received the rst bit-
coin transaction from bitcoins creator Satoshi Nakamoto.
2.2 Hal Finney Finney lived in the same town for 10 years that Dorian
Satoshi Nakamoto lived, adding to speculation that he
may have been Bitcoins creator.[9] Finney denied that he
Harold Thomas Finney II (May 4, 1956 August 28,
was Satoshi Nakamoto.[10]
2014) was a developer for PGP Corporation, and was the
second developer hired after Phil Zimmermann. In his In March 2013, Finney posted on a bitcoin forum Bit-
early career, he was credited as lead developer on several coinTalk that he was essentially paralyzed, but continued
console games. He also was an early bitcoin user and re- to program. He continued to program until his death;
ceived the rst bitcoin transaction from bitcoins creator he was working on experimental software called bcick,
Satoshi Nakamoto. which uses Trusted Computing to strengthen bitcoin wal-
lets.
During the last year of his life, the Finneys received
2.2.1 Early life and education anonymous calls demanding an extortion fee of 1,000
bitcoin. They became victims of swatting a hoax
Finney was born in Coalinga, California, in 1956. He where the perpetrator calls up emergency dispatch us-
went on to attend the California Institute of Technology, ing a spoofed telephone number and pretends to have
graduating with a BS in engineering in 1981. committed a heinous crime in the hopes of provoking an
armed police response to the victims home.[11]
2.2.2 Career
2.2.4 Private life, illness
After graduation from Caltech, he went to work in the
computer gaming eld for a company that developed In October 2009, Finney announced in an essay on
video games such as Adventures of Tron, Armor Ambush, the blog Less Wrong that he had been diagnosed with
Astroblast and Space Attack.[1] He later went to work for Amyotrophic Lateral Sclerosis (ALS) in August 2009.[12]
the PGP Corporation with whom he remained until his Prior to his illness, Finney had been an active run-
retirement in 2011.[2] ner. Finney and his wife Fran Finney raised money
Finney was a noted cryptographic activist.[3] During the for ALS research with the Santa Barbara International
[13][14][15]
early 1990s, in addition to being a regular poster on the Marathon.
cypherpunks listserv, Finney ran two anonymous remail-
ers.[4] Further cryptographic activism included running a
(successful) contest to break the export-grade encryption 2.2.5 Death
Netscape used.[5]
Hal Finney died in Phoenix August 28, 2014 and was
In 2004, Finney created the rst reusable proof of work cryopreserved by the Alcor Life Extension Founda-
system before bitcoin.[6] In January 2009, Finney was the tion.[2][16][17]
bitcoin networks rst transaction recipient.[7]

2.2.6 References
2.2.3 Bitcoin
[1] AtariAge. Retrieved 24 February 2015.
Finney was a cypherpunk and said:[8] [2] Popper, Nathaniel, Hal Finney, Cryptographer and Bit-
coin Pioneer, Dies at 58, The New York Times, August
""It seemed so obvious to me;" Here we 30, 2014
are faced with the problems of loss of privacy, [3] For instance, many ACLU members do not share the
creeping computerization, massive databases, generalized antipathy toward government that is a com-
more centralization - and Chaum oers a mon premise of cypherpunk activists like Hal Finney
completely dierent direction to go in, one and Tim May. David Brin, The Transparent Society ch2
which puts power into the hands of individuals
rather than governments and corporations. [4] Prospects for remailers - Parekh - First Monday. Re-
trieved 24 February 2015.
The computer can be used as a tool to liberate
and protect people, rather than to control [5] Give Us Some Credit: Your Card is Safe, The Washing-
them."" ton Post, 1996
38 CHAPTER 2. PEOPLE

[6] Heres The Problem With The New Theory That A by Satoshi Nakamoto, the pseudonymous inventor of Bit-
Japanese Math Professor Is The Inventor Of Bitcoin. SF- coin, as lead developer on Bitcoin Core, the reference
Gate. Retrieved 24 February 2015. implementation for Bitcoin client software. In 2012 he
[7] Hal Finney received the rst Bitcoin transaction. Heres
founded the Bitcoin Foundation to support and nurture
how he describes it.. Washington Post. Retrieved 24 the development of the Bitcoin currency, and by 2014
February 2015. left his software development role to concentrate on his
work with the Foundation.
[8] The Little Black Book of Billionaire Secrets Nakamotos
Neighbor: My Hunt For Bitcoins Creator Led To A Par-
alyzed Crypto Genius. Forbes. Retrieved 17 April 2017. 2.3.1 Career
line feed character in |title= at position 45 (help)
Andresen graduated from Princeton University in
[9] The Little Black Book of Billionaire Secrets Nakamotos
Neighbor: My Hunt For Bitcoins Creator Led To A Par- 1988.[1] He began his career working on 3D graphics
alyzed Crypto Genius. Forbes. Retrieved 17 April 2017. software at Silicon Graphics Computer Systems.[2] In
line feed character in |title= at position 45 (help) 1996, he co-authored the VRML 2.0 specication,[3] and
later published a reference manual for VRML 2.0.[4]
[10] The Little Black Book of Billionaire Secrets Nakamotos
Neighbor: My Hunt For Bitcoins Creator Led To A Par- Since leaving Silicon Valley in 1996, Andresen has tack-
alyzed Crypto Genius. Forbes. Retrieved 17 April 2017. led a wide variety of software-related ventures, includ-
line feed character in |title= at position 45 (help) ing CTO of an early voice-over-the-Internet startup and
co-founder of a company that made multiplayer online
[11] Robert McMillan (29 December 2014). An Extor- games for blind people and their sighted friends.[2]
tionist Has Been Making Life Hell for Bitcoins Earliest
Adopters. Wired. Cond Nast. Retrieved 3 January
2015. Bitcoin
[12] Dying Outside. Retrieved 24 February 2015.
Prior to 2014 Andresen was the lead developer for a part
[13] Fight for a Cure for ALS: A Marathoners Story of the bitcoin digital currency project, working to create a
secure, stable cash for the Internet. [5] Andresen discov-
[14] Hal and Fran Finney Are Running for a Cause. Re-
ered bitcoin in 2010, quickly recognising the brilliance
trieved 24 February 2015.
of its design. Soon after he created a website called the
[1]
[15] After a Year of ALS, Reality Begins to Hit Home for Hal Bitcoin Faucet which gave away bitcoin. In April 2011,
and Fran Finney. Retrieved 24 February 2015. Forbes quoted Andresen as saying, Bitcoin is designed to
bring us back to a decentralized currency of the people,
[16] Max More (2014-08-28). Hal Finney being cryopre-
and this is like better gold than gold.[6] He was soon
served now.
designated by the inventor of bitcoin, Satoshi Nakamoto
[17] Andy Greenberg (2014-08-28). Bitcoins Earliest to lead development of the client software for the bitcoin
Adopter Is Cryonically Freezing His Body to See the Fu- network which is now known as Bitcoin Core.[1]
ture.
Andresen also created ClearCoin, an escrow-type of ser-
vice, which was closed c. June 23, 2011.[7] After several
2.2.7 External links years working on the software, Andresen left the role of
lead developer of bitcoin to work on the strategic devel-
[8]
Hal Finney home page. Archived from the origi- opment of its technology. He conceived of the Bitcoin
nal on 2014-04-03. Foundation which became reality in 2012.
Gavin initially stated he believed that Craig Wright was
Review: Vernor Vinges Fast Times (review by
the real identity of Satoshi Nakamoto, but later retracted
Finney in Extropy)
this statement.[9] As of June 2017, he has not contributed
Hal Finneys prole in Forbes Magazine to Bitcoin Core since February 2016.[10] His commit ac-
cess was revoked in May 2016.[11]

2.3 Gavin Andresen 2.3.2 See also


Gavin Andresen (born Gavin Bell[1] ) is a software de- History of bitcoin
veloper best known for his involvement with Bitcoin. He
is based in Amherst, Massachusetts.
2.3.3 References
Originally a developer of 3D graphics and virtual reality
software, he became involved in developing products for [1] Simonite, Tom (15 August 2014). The Man Who Really
the Bitcoin market in 2010, and by 2011 was designated Built Bitcoin. MIT Technology Review. Massachusetts
2.4. NICK SZABO 39

Institute of Technology. Retrieved 14 November 2016. the highly evolved practices of contract law and prac-
tice to the design of electronic commerce protocols be-
[2] The Future of Payments - Panelists - Bitcoin 2013: The tween strangers on the Internet.[3][4] Smart contracts are a
Future of PaymentsMay 17-19, 2013 - San Jose, CA.
major feature of cryptocurrency[5] and the programming
Bitcoin 2013. 2011-04-16. Retrieved 2014-03-06.
language E.[6]
[3] VRML 2.0. Szabo inuentially[7] argued that a minimum granularity
of micropayments is set by mental transaction costs.[8][9]
[4] The Annotated VRML 2.0 Reference Manual.

[5] Kadhim Shubber (8 April 2014). Gavin Andresen Steps


Down as Bitcoins Lead Developer. Coindesk. Retrieved
2.4.1 Bit gold
15 November 2016.
In 1998, Szabo designed a mechanism for a decentral-
[6] Crypto Currency. Forbes. 2011-04-20. Retrieved ized digital currency he called bit gold.[10][11] Bit gold
2014-03-06. was never implemented, but has been called a direct pre-
cursor to the Bitcoin architecture.[12]
[7] ClearCoin - Bitcoin. En.bitcoin.it. Retrieved 2014-03-
06. In Szabos bit gold scheme, a participant would dedicate
computer power to solving cryptographic puzzles. In a
[8] Preukschat, Alex; Josep Busquet (2015). Bitcoin: The bit gold network, solved puzzles would be sent to the
Hunt of Satoshi Nakamoto. Europe Comics. p. 87. ISBN Byzantine fault-tolerant public registry and assigned to
9791032800201. Retrieved 16 November 2016. the public key of the solver. Each solution would become
[9] Satoshi. 16 November 2016. Retrieved 15 November
part of the next challenge, creating a growing chain of
2016. new property. This aspect of the system provided a way
for the network to verify and time-stamp new coins, be-
[10] https://archive.is/ycCMP cause unless a majority of the parties agreed to accept
new solutions, they couldnt start on the next puzzle.[13][14]
[11] https://twitter.com/petertoddbtc/status/
727078284345917441 When attempting to design transactions with a digital
coin, you run into the double-spending problem. Once
data have been created, reproducing them is a simple mat-
2.3.4 External links ter of copying and pasting. Most digital currencies solve
the problem by relinquishing some control to a central au-
Bitcoin Foundation: Transperency: Board Mem- thority, which keeps track of each accounts balance. This
bers. Bitcoin Foundation. Retrieved 2015-01-15. was an unacceptable solution for Szabo. I was trying to
mimic as closely as possible in cyberspace the security
Bitcoin 2013: The Future of Payments - Panelists and trust characteristics of gold, and chief among those
- Bitcoin 2013: The Future of Payments May 17- is that it doesnt depend on a trusted central authority, he
19, 2013 - San Jose, CA. Bitcoin Foundation. Re- said.[10]
trieved 2013-08-07.

Gavin Andresen interviewed on the TV show Tri- 2.4.2 Bitcoin speculation


angulation on the TWiT.tv network 15 May 2013,
duration: 60 min. In 2008, a mysterious gure who wrote under the
name Satoshi Nakamoto released a proposal for bitcoin.
Can Bitcoin Go Mainstream? Voices of the Next Nakamotos true identity remained a secret, which led
Generation with Gavin Andresen of Bitcoin, Coun- to speculation about a long list of people suspected to
cil of Foreign Relations, February 6, 2014 be Nakamoto. Although Szabo has repeatedly denied it,
people have speculated that he is Nakamoto.[15]
Research by nancial author Dominic Frisby provided
2.4 Nick Szabo circumstantial evidence but, as he admits, no proof that
Satoshi is Szabo.[16] Speaking on RTs Keiser Report, he
Nick Szabo is a computer scientist, legal scholar and said I've concluded there is only one person in the whole
cryptographer known for his research in digital contracts world that has the sheer breadth but also the specicity of
and digital currency. He graduated from the University of knowledge and it is this chap....[17] In a July 2014 email
Washington in 1989 with a degree in computer science.[1] to Frisby, Szabo said Thanks for letting me know. I'm
He holds an honorary professorship at the Universidad afraid you got it wrong doxing me as Satoshi, but I'm used
Francisco Marroqun.[2] to it.[18]
The phrase and concept of "smart contracts" was devel- Nathaniel Popper wrote in The New York Times that the
oped by Szabo with the goal of bringing what he calls most convincing evidence pointed to a reclusive Amer-
40 CHAPTER 2. PEOPLE

ican man of Hungarian descent named Nick Szabo. In [17] Episode 676. RT. 6 November 2014. Retrieved 8 Jan-
2008, prior to the release of bitcoin, Szabo wrote a com- uary 2017.
ment on his blog about the intent of creating a live version
[18] Frisby, Dominic (2014), p. 147
of his hypothetical currency.[1]
In 2015, the subsequent blockchain Ethereum named a
subunit of the Ethereum value token the "Szabo". 2.4.4 External links
Ocial website
2.4.3 References
Nick Szabos Essays, Papers, and Concise Tutorials
[1] Popper, Nathaniel (15 May 2015). Decoding the Enigma at Archive.is (archived 16 July 2015)
of Satoshi Nakamoto and the Birth of Bitcoin. The New
York Times. Retrieved 8 January 2017.

[2] https://noticias.ufm.edu/index.php?title=Graduaci% 2.5 Winklevoss twins


C3%B3n_UFM_y_doctorado_a_Nick_Szabo

[3] Morris, David Z. (21 January 2014). Bitcoin is not just


Warning: Page using Template:Infobox sportsperson
digital currency. Its Napster for nance. Fortune. Re- with unknown parameter Brother (this message is
trieved 8 January 2017. shown only in preview).

[4] Szabo, Nick (September 1997). Formalizing and Secur-


ing Relationships on Public Networks. First Monday. The Winklevoss twins (born August 21, 1981; also hu-
Retrieved 8 January 2017. morously referred to as the Winklevi[1][2] or Winkle-
vii[3] ) are American rowers and Internet entrepreneurs,
[5] Swanson, Tim (22 January 2014). Smart Property, Col- Cameron Winklevoss and Tyler Winklevoss. They com-
ored Coins and Mastercoin. CoinDesk. Retrieved 8 Jan- peted in the mens pair rowing event at the 2008 Beijing
uary 2017. Olympics. They are known for co-founding HarvardCon-
[6] Smart Contracts. Retrieved 8 January 2017. nection (later renamed ConnectU) along with Harvard
University classmate Divya Narendra. In 2004, the Win-
[7] Anderson, Chris. Free: The Future of a Radical Price. klevoss brothers sued Facebook founder Mark Zucker-
ISBN 1401394515. berg, claiming he stole their ConnectU idea to create the
[8] Szabo, Nick. Micropayments and Mental Transaction popular social networking site, and ultimately received
Costs. CiteSeerX 10.1.1.23.9779 . $65 million.
They are now venture capitalists,[4] and have led a
[9] Szabo, Nick. The Mental Accounting Barrier to Mi-
seed funding round for bitcoin payment processor
cropayments. Archived from the original on 12 January
2013. Retrieved 8 January 2017. BitInstant.[5] In April 2013, the brothers claimed they
owned nearly 1% of all bitcoin in existence at the time.
[10] Peck, Morgan (30 May 2012). Bitcoin: The Cryptoan-
archists Answer to Cash. IEEE Spectrum. Retrieved 8
January 2017. 2.5.1 Early life and education
[11] Szabo, Nick (December 2005). Bit gold. Retrieved 8
The Winklevoss twins were born in Southampton, New
January 2017.
York, and raised in Greenwich, Connecticut.[6] Their fa-
[12] OLeary, Martin (8 May 2015). The Mysterious Disap- ther is Howard Edward Winklevoss, Jr.;[7][8] Howard was
pearance of Satoshi Nakamoto, Founder & Creator of Bit- an adjunct professor of actuarial science at the Wharton
coin. The Hungton Post. Retrieved 8 January 2017. School of the University of Pennsylvania.[9] He is the au-
[13] Tschorsch, Florian; Scheuermann, Bjrn (15 May 2015).
thor of Pension Mathematics with Numerical Illustrations,
Bitcoin and Beyond: A Technical Survey of Decen- and founder of Winklevoss Consultants and Winklevoss
tralized Digital Currencies (PDF). Retrieved 8 January Technologies.
2017. The twins went to the Greenwich Country Day School be-
[10]
[14] Szabo, Nick (1998). Secure Property Titles with Owner fore attending the Brunswick School for high school.
Authority. Retrieved 8 January 2017. They showed a fondness for the classics in high school,
studying Latin and Ancient Greek. During their junior
[15] Who Is The Real Satoshi Nakamoto? One Researcher year, they co-founded the crew program.[11][12] They en-
May Have Found The Answer. TechCrunch. 5 Decem- rolled at Harvard University in 2000 for their undergrad-
ber 2013. Retrieved 8 January 2017.
uate studies where they majored in economics, earning
[16] Frisby, Dominic (2014) Who is Satoshi Nakamoto?" In B.A. degrees and graduating in 2004. At Harvard, they
Bitcoin: The Future of Money?, p. 85-149. Unbound. were members of the mens varsity crew, the Porcellian
ISBN 1783520779 Club[13][14] and the Hasty Pudding Club.
2.5. WINKLEVOSS TWINS 41

In 2009, they began graduate business study at the Sad rowing, and race against the Winklevoss twins, who are
Business School at the University of Oxford and com- voiced by Armie Hammer.[30] They appear in the Fam-
pleted MBA degrees in 2010.[15] While at Oxford, the ily Guy episode The Giggity Wife when Joe, Peter, and
brothers were members of Christ Church,[16] and rowed Quagmire use a conscated Harvard student card to eat
in the Blue Boat in the Oxford-Cambridge Boat Race in the esteemed Harvard dining hall.
earning them an Oxford Blue.[17][18]

2.5.5 References
2.5.2 ConnectU
[1] Karl M. Aspelund (December 8, 2013). Winklevi Finally
Main article: ConnectU Vindicated?". Harvard Crimson. Retrieved February 24,
2015.

ConnectU (originally HarvardConnection) was a social [2] James Temple (April 23, 2011). The Winklevi typify
networking website launched on May 21, 2004,[19] that culture of whiners. San Francisco Chronicle. Retrieved
was founded by Harvard students Cameron Winklevoss, February 24, 2015.
Tyler Winklevoss, and Divya Narendra in December [3] Killingsworth, Silvia (May 15, 2012). The Winklevii.
2002.[20] Users could add people as friends, send them The New Yorker.
messages, and update their personal proles to notify
friends about themselves.[21] Users were placed in net- [4] Mashable Video (April 28, 2012). Winklevoss Twins
works based upon the domain name associated with the Start Up a Venture Capital Firm [VIDEO]". Mash-
able.com. Retrieved 2012-12-18.
email address they used for registration.[22]
[5] Taylor, Colleen (May 17, 2013). With $1.5M Led By
Winklevoss Capital, BitInstant Aims To Be The Go-To
2.5.3 Bitcoin Site To Buy And Sell Bitcoins. TechCrunch.

The twins company, Math-Based Asset Services LLC, [6] NBC Olympics Cameron Winklevoss Athlete Bio. Re-
led to register a bitcoin-based exchange-traded fund trieved 2010-08-26.
called Winklevoss Bitcoin Trust in 2013.[23][24][25] The [7] Chamo, Lisa (March 27, 2010). Friendships Forged in
fund was denied in March 2017.[26] Devastating Nor-Easter. Greenwich Time.
In 2013, the twins led a $1.5 million in seed funding [8] Mildred Lotz Leonard Obituary. The Wave. February
of BitInstant, a bitcoin payment processor. However, 9, 2007.
in January 2014, Charlie Shrem, CEO of BitInstant,
was arrested and charged with money laundering related [9] Winklevoss Technologies About Us. Retrieved 2010-
to the Silk Road online black market investigation.[27] 08-21.
The brothers said they were passive investors in the [10] Gustafson, Colin (August 16, 2010). Twins back in spot-
company.[25] light with upcoming Facebook lm. Greenwich Time.
In 2014, the twins launched Winkdex, a nancial index [11] Riley, Cailin (July 10, 2008). Twin rowers headed to
that tracks the price of bitcoin.[25] The index uses data Olympics. The Southampton Press.
from seven exchanges, weighed based on the daily trading
volume of each exchange.[25] [12] Matson, Barbara (July 27, 2008). Rowing Machines:
Winklevoss twins hope to form successful pair in Beijing.
In March 2014, it was announced that the twins had pur- The Boston Globe.
chased seats on Richard Branson's Virgin Galactic shuttle
using the prots they had made from bitcoin.[28] [13] Ben Mezrich. The Accidental Billionaires. p. 28.

In October 2015, Gemini, the twins Bitcoin exchange, [14] Aaron Sorkin toured Harvards secret clubs for Facebook
received approval to launch from the New York State De- lm. New York Post. July 25, 2010.
partment of Financial Services. The exchange is targeted
[15] Betts, Hannah (March 20, 2010). Muscle-bound,
at both rst-time users and professional traders. [29]
Oxford-educated and multi-millionaires-meet the Win-
klevoss twins. London: The Times, The Sunday Times.
2.5.4 Popular culture [16] Milmo, Cahal (March 3, 2010). Is there anything the
Winklevoss twins can't do?". London: The Independent.
Both twins are played by actor Armie Hammer in The
Social Network (2010), a lm directed by David Fincher [17] Rossingh, Danielle (April 1, 2010). Harvard Twins Who
Sue Facebook Now Take on Cambridge in 156th Boat
about the founding of Facebook. Actor Josh Pence was
Race. Bloomberg.
the body double for Tyler with Hammers face super-
imposed. In an episode of The Simpsons, "The D'oh- [18] Whittle, Natalie (March 5, 2010). Social networking pi-
cial Network", Patty and Selma take part in the Olympic oneers...and killer oarsmen. Financial Times.
42 CHAPTER 2. PEOPLE

[19] Bombardieri, Marcella (September 17, 2004). Online 2.6.2 Career


Adversaries: Rivalry between college-networking web-
sites spawns lawsuit. The Boston Globe. According to Karpels LinkedIn page, he worked from
[20] Pontin, Jason (August 12, 2007). Who owns the concept 2003 to 2005 at Linux Cyberjoueurs [9]
as a software de-
if no one signs the papers?". The New York Times. veloper and network administrator. Karpels is a PHP
developer, and has contributed to the languages ocial
[21] Cassidy, John (May 15, 2006). Me Media: How hang- repository of extensions with proctitle,[10] which allows
ing out on the Internet became big business. The New the name of the current process to be changed on Linux
Yorker. systems, as well as developing a fully functional DNS
[11]
[22] McGinn, Timothy (May 28, 2004). Online facebooks server and an inetd[12] , also both in PHP.
duel over tangled web of authorship. The Harvard Crim- From 2002 to 2005 Karpels was involved in
son. the Ragnarok Online community, hosting[13] and
[14]
[23] Condon, Christopher (February 2, 2014). Winklevosses administering a private server (French Ragnarok
Lawyer in talks with SEC over Bitcoin ETF. Bloomberg. Online, shortened as fRO, mimicking the ocial kRO,
jRO and eRO naming). During this time he particiapted
[24] Womack, Brian (July 2, 2013). Winklevoss twins create in the development of the Ragnarok Online server emu-
fund to invest in Bitcoin market. Bloomberg.
lators Freya[15] and then Nezumi[16] . Before becoming a
[25] Popper, Nathaniel (February 19, 2014). Winklevoss fork of Freya, Nezumi initially started as a clean-room
[17]
brothers oer an index to track price of Bitcoin. The PHP implementation of the server part of the game,
New York Times. aiming at improving performance, stability, portability,
and resource use notably compared to the then current
[26] https://www.nytimes.com/
eAthena and jAthena servers, as well as making the
2017/03/10/business/dealbook/
hosting of such servers legal instead of using leaked
winkelvoss-brothers-bid-to-create-a-bitcoin-etf-is-rejected.
html AEGIS server builds. Karpels tried to bootstrap a
hosting organisation named Ookoo[18] (then pivoting
[27] Greenberg, Andy (January 27, 2014). Winklevoss- into .st[19] ) which also served to host the private
funded Bitcoin startups CEO arrested in Silk Road in- server community and development resources (such as
vestigation. Forbes. the homepage, forums, IRC, SVN, and bug tracker).
[28] Long, Katie (March 5, 2014). The Winklevoss Twins ookoo.org and .st would later fall under Tibannes
[20]
Are Paying to go to Space With Bitcoin. Slate. Retrieved umbrella until each domain expired.
March 6, 2014. Karpels founded Tibanne Co. Ltd. in 2009. He is
[21][22]
[29] Faraz, Tabish. Winklevoss twins announce launch of Bit- CEO. He was a founding member of the Bitcoin
coin exchange Gemini. www.coinreport.net. Retrieved Foundation, created in 2012 with a mission to standardize
October 15, 2015. and promote bitcoin, and served on its board until Febru-
ary 2014.[23][24][25]
[30] Snierson, Dan (July 22, 2011). Armie Hammer to play
the Winklevoss twins again... on 'The Simpsons! -- EX- Karpels acquired 88% of the Tokyo-based company Mt.
CLUSIVE. Entertainment Weekly. Retrieved 2011-07- Gox from programmer Jed McCaleb in 2011.[26][27][28]
22. Mt. Gox led for bankruptcy in Japan on February
28, 2014 and for Chapter 15, Title 11, United States
Code bankruptcy in the United States (Texas) in March
2.6 Mark Karpels 2014.[1][29][30]
Karpels was subpoenaed by the United States Depart-
Mark Marie Robert Karpels[1][2] (born June 1, 1985), ment of the Treasury's Financial Crimes Enforcement
also sometimes known by his online alias MagicalTux, Network to appear in Washington, D.C. to provide tes-
was the CEO of bitcoin exchange Mt. Gox.[3][4] He timony on April 18, 2014. Karpels, in a court ling by
moved to Japan in 2009.[5][6] Mt. Gox lawyers, responded that he did not have a lawyer
for this matter and therefore declined to appear.[31][32]
Karpels sought to appear in D.C. to testify on May 5,
2.6.1 Early life and education 2014.[33][34]

Karpels was born in 1985 in Chenve, France, the child According to a joint report by Cyrus Farivar of Ars Tech-
of Anne-Robert Karpels, a geologist.[7] He was raised nica and Pierre Alonso of Le Monde, Karpels was found
in Dijon.[7][8] Between 1995 and 2000, Karpels was guilty of fraud when he was tried in absentia in France in
educated at Collge Prieur de Binson in Chtillon-sur- 2010. He also admitted to having pirated a server to
Marne, near Dormans.[3] He then spent one year at Lyce French authorities. He was sentenced to a year in jail but
Claude Bernard in Paris, before completing his education has not yet served his sentence.[35][36]
in 2003 at Lyce Louis Armand in Paris.[3] Ross William Ulbricht, while on trial for operating the
2.6. MARK KARPELS 43

undercover Silk Road marketplace, claimed in 2015 that [12] https://github.com/MagicalTux/pinetd2


the pseudonymous Dread Pirate Roberts behind Silk
[13] http://teamgp.free.fr/backup_fro/infos.php
Road was not him but Mark Karpels.[37] Karpels pub-
[38]
licly denied the claim on Twitter, and Ulbricht was [14] http://teamgp.free.fr/backup_fro/staff.php
eventually found guilty.[39]
[15] https://github.com/flaviojs/freya

[16] https://github.com/MagicalTux/nezumi
2.6.3 Arrest and prosecution
[17] https://github.com/MagicalTux/nezumi/blob/master/
Karpels was arrested on 1 August 2015 by Japanese Changelog.txt#L838
police on suspicion of having accessed the exchanges [18] https://web.archive.org/web/20010331201253/http:
computer system to falsify data on its outstanding //www.ookoo.org/
balance,[40][41][42] he was re-arrested and allegedly
charged with embezzlement.[43] [19] https://web.archive.org/web/20010925140409/http:
//www.ookoo.org/
Karpels was released on bail in July 2016, but must re-
main in Japan.[44] [20] https://web.archive.org/web/20140910190104/http:
//ookoo.org/

[21] http://www.cnbc.com/id/101486280
2.6.4 References
[22] David Meyer. A Bitcoin Exchange Goes for Respectabil-
[1] Declaration of Mark Marie Mark Karpeles (PDF). US ity. Businessweek.com. Retrieved 24 February 2015.
Bankruptcy Court for the Northern District of Texas Dal-
las Division: 1. Retrieved 13 March 2014. The docu- [23] Mt. Gox resigns from Bitcoin Foundation. Reuters.
ment, signed by Robert Marie Mark Karpeles, was pub- February 23, 2014. Retrieved 25 February 2014.
lished by Ars Technica on the Scribd website, and ac-
cording to Ars Technica is a court document led in US [24] Mt. Gox quits Bitcoin Foundation board. PCWorld. 24
Bankruptcy Court. February 2014. Retrieved 24 February 2015.

[2] Farivar, Cyrus (2014-03-10). MtGox les for US [25] Jon Matonis (27 September 2012). Bitcoin Foundation
bankruptcy protection to put lawsuits on hold. Ars Tech- Launches To Drive Bitcoins Advancement. Forbes. Re-
nica. trieved 24 February 2015.

[26] Rachel Abrams Matthew Goldstein and Hiroko Tabuchi.


[3] Mark Robert KARPELS, 28 ans (TOKYO, CHATIL-
Erosion of Faith Was Death Knell for Mt. Gox. The
LON SUR MARNE, PARIS)". Copains d'avant
New York Times. Retrieved 24 February 2015.
L'Internaute (in French). CCM Benchmark Group. Re-
trieved 2014-02-27. [27] Jeries, Adrianne (April 1, 2013). Barons of Bitcoin.
The Verge. Retrieved 13 March 2014.
[4] King, Leo (2014-02-26). Mt. Gox CEO Mark Karpeles:
'I am still in Japan'". Forbes. Retrieved 2014-02-27. [28] https://online.wsj.com/article/
BT-CO-20140310-712183.html
[5] Warnock, Eleanor; Mochizuki, Takashi (2014-02-28).
Bitcoins Mt. Gox: a look at the man in charge. The [29] Bitcoin Exchange Mt. Gox Files for U.S. Bankruptcy as
Wall Street Journal. Death Spiral Continues. WIRED. Retrieved 24 February
2015.
[6] Philippe, Berry (2014-02-27). MtGox: Mark Karples,
un supergeek franais au cur du scandale bitcoin. 20 [30] Mt. Gox les for Chapter 15 in U.S.. Market Watch.
Minutes (in French). Retrieved 2014-02-27. Retrieved 13 March 2014.
[7] Gautronneau, Vincent (2014-01-03). Le gnie cte- [31] Mt. Gox founder won't appear in U.S. for questions about
d'orien qui fait trembler le net. Le Journal de Sane et bankruptcy case. Reuters. Retrieved 24 February 2015.
Loire (in French).
[32] Mt. Gox founder won't attend US bankruptcy hearing.
[8] Mick, Jason (March 5, 2014). Bitcoin King: Mt. CNET. CBS Interactive. Retrieved 24 February 2015.
Gox CEO Mark Karpels History of Arrests, Firings.
DailyTech. Retrieved March 9, 2014. [33] John Ribeiro (15 April 2014). Mt. Gox seeks postpone-
ment of CEOs U.S. court deposition. Computerworld.
[9] Karpeles, Mark. " Mark Karpels. LinkedIn. Re- Retrieved 24 February 2015.
trieved 2014-02-27.
[34] BBC News - MtGox chief refuses to go to Bitcoin
[10] PECL :: Package :: proctitle. Retrieved 24 February bankruptcy hearing. BBC News. Retrieved 24 February
2015. 2015.

[11] https://web.archive.org/web/20130323152647/ [35] Farivar, Cyrus (August 1, 2014). Why the head of Mt.
http://blog.magicaltux.net/2009/02/19/ Gox Bitcoin exchange should be in jail. Ars Technica.
your-own-php-dns-daemon/ Retrieved August 1, 2014.
44 CHAPTER 2. PEOPLE

[36] Alonso, Pierre (August 1, 2014). En France, le pass


trouble de lancien " baron du bitcoin "" [Old bitcoin
barons old trouble in France]. Le Monde (in French). Re-
trieved August 1, 2014.

[37] UNDERCOVER SILK ROAD AGENT BELIEVED


DREAD PIRATE ROBERTS (DPR) TO BE MARK
KARPELES OF MT. GOX. Retrieved 16 January 2015.

[38] Mark Karpeles on Twitter: This is probably going to be


disappointing for you, but I am not and have never been
Dread Pirate Roberts."". January 15, 2015. Retrieved
January 28, 2015.

[39] Mullin, Joe (4 February 2015). Ulbricht guilty in Silk


Road online drug-tracking trial. Ars Technica. Re-
trieved 4 February 2015.

[40] MtGox bitcoin chief Mark Karpeles arrested in Japan.


1 August 2015. Retrieved 1 August 2015.

[41] Jonathan Soble (August 1, 2015). Mark Karpeles, Chief


of Bankrupt Bitcoin Exchange, Is Arrested in Tokyo.
The New York Times. Retrieved August 1, 2015.

[42] Mt. Gox bitcoin rm head arrested. The Japan News by


The Yomiuri Shimbun. August 1, 2015. Retrieved August
1, 2015.

[43] French MtGox CEO in Japan charged with embezzle-


ment amid bitcoin fraud investigation. South China
Morning Post. September 11, 2015. Retrieved Septem-
ber 11, 2015.

[44] Mark Karpeles Twitter Game Unaected By Prison


Stint. July 18, 2016. Retrieved December 30, 2016.

2.6.5 External links


Mark Karpels on Twitter
Chapter 3

Organizations

3.1 Bitcoin Foundation and Elizabeth Ploshay.[7] In October 2014, Jon Matonis
resigned from his position of Executive Director of the
The Bitcoin Foundation is an American nonprot cor- Foundation, and at the end of the election cycle on 31
poration. It was founded in September 2012 with the December[8]2014 stepped down from the groups board of
stated mission to standardize, protect and promote the directors.
use of bitcoin cryptographic money for the benet of BTC China CEO Bobby Lee and venture capitalist
users worldwide.[1] The organization was modeled on Brock Pierce were appointed to the foundations board
the Linux Foundation and is funded mainly through of directors following a May 2014 runo election, ll-
grants made by for-prot companies that depend on the ing vacancies left by the earlier resignations of former
bitcoin technology.[2] BitInstant CEO Charlie Shrem and Mt. Gox CEO Mark
[7]
In March 2014, the Foundation hired Jim Harper of the Karpels. Nine members of the foundation resigned
Cato Institute as Global Policy Counsel and Amy Weiss following the May election, citing opposition to [9] the ap-
of Weiss Public Aairs as a media consultant. [3] pointments and the direction of the organization.
On 13 April 2015, the board appointed investor and -
nancial consultant Bruce Fenton as Executive Director of
3.1.1 History the Bitcoin Foundation.[10] At the Blockchain Training
Conference / DEVCORE Toronto, the Bitcoin Founda-
According to its founding documents, the Bitcoin Foun- tion announced the appointment of Llew Claasen as Ex-
dations original members included Gavin Andresen, ecutive Director, eective 1 July 2016 [11]
Charlie Shrem, Mark Karpeles, Peter Vessenes, Roger
Ver, and Patrick Murck. Current board members are di-
vided into one of three categories: Founding Members, 3.1.3 Awards
Industry Members, and Individual Members. The board
is made up of a combination of elected members of the On 29 March 2016, the Bitcoin Foundation was listed by
aforementioned categories. UK-based company Richtopia at number 27 in the list of
[12][13]
Former lead bitcoin developer Gavin Andresen is em- 100 Most Inuential Blockchain Organisations.
ployed by the foundation as chief scientist.[2] In June
2013, the foundation received media attention when it
published a letter from the California Department of Fi- 3.1.4 Criticism
nancial Institutions requesting that they cease and desist
from conducting the business of money transmission in The Foundation and its leadership have been criticized by
this state,[4] and again when it published their detailed some in the media.[14][15] Former vice-chairman Charlie
response to the regulators.[5] In November 2013, Patrick Shrem pleaded guilty to aiding and abetting the operation
Murck, general counsel of the Bitcoin Foundation, testi- of an unlicensed money-transmitting business related to
ed before a United States Senate committee convened to his role in assisting agents of the online marketplace Silk
assess digital currencies, at which the reception of bitcoin Road.[16][17][18] Executive chairman Peter Vessenes busi-
by lawmakers was generally positive.[6] ness relationship to former board member Mark Karpe-
les, the former CEO of collapsed Bitcoin exchange Mt.
Gox, has been highlighted as inappropriate.[15] The Foun-
3.1.2 Leadership dation has also suered scrutiny and resignations over its
hiring of former child star Brock Pierce.[19]
Bitcoin Foundations board of directors, as of May 2014, In November 2014, the Bitcoin Foundation announced
included chairperson Peter Vessenes, Gavin Andresen, that it would seek to wind down its education, outreach
Bobby Lee, Micky Malka, Jon Matonis, Brock Pierce, and public policy initiatives as it turns its focus to core

45
46 CHAPTER 3. ORGANIZATIONS

development. Three surveys conducted earlier by the Bit- [7] Rizzo, Pete (9 May 2014). Bobby Lee, Brock Pierce join
coin Foundation suggest that many community members, Bitcoin Foundations board of directors. CoinDesk.
both inside and outside of the organization, want to see
[8] Rizzo, Pete (30 October 2014). Jon Matonis Resigns As
it adopt a stronger focus on bitcoins open-source tech- Bitcoin Foundation Executive Director. CoinDesk.
nology development.[20] The bitcoin community itself is
divided over the role of the Foundation as a community or [9] Hajdarbegovic, Nermin (12 May 2014). Bitcoin Founda-
industry representative.[14] Some libertarian bitcoin advo- tion members resign following appointment controversy.
cates have criticized the organizations strategy of politi- CoinDesk.
cal lobbying and participation with federal regulators.[14] [10] The Bitcoin Foundation Welcomes Bruce Fenton as Ex-
In November 2014, Cody Wilson announced his run for ecutive Director. Bitcoin Foundation. April 13, 2015.
board seat in the Bitcoin Foundation, stating I will run Archived from the original on May 10, 2015. Retrieved
on a platform of the complete dissolution of the Bitcoin March 28, 2016.
Foundation and will begin and end every single one of my
public statements with that message. [21] [11] Bitcoin Foundation Appoints Llew Claasen as Executive
Director. Retrieved 2016-07-12.
Professor and author Mark T. Williams criticized the Bit-
coin Foundations priorities, writing in a Business Insider [12] Top 100 Blockchain Organisations: From CoinDesk to
editorial that A Foundation of 'B' players has no busi- BitPay, These Are the Most Inuential Organisations in
the Distributed Ledger Space. Richtopia. Retrieved 18
ness claiming it is a protector of a system that remains
[22] June 2016.
vulnerable and untrustworthy.
In early 2015, Jim Harper, a fellow at the Cato Institute [13] Blockchain Organisations Top 100. Blockchain Age.
Retrieved 11 May 2016.
and Olivier Janssens, a founder of the Freedom Invest-
ment Group, were elected to the Bitcoin Foundations [14] Neal, Meghan (May 12, 2014). Bitcoin is Hiring Lobby-
Board.[23] In July 2015, towards the beginning of his term ists. Motherboard.com. Retrieved May 16, 2014.
as board member, Janssens made a public announcement
[15] Tiku, Nitasha (March 7, 2014). Whistleblower Threat-
on both the Bitcoin Foundation online forum and Reddit
ens to Expose Corruption at Bitcoin Foundation. Val-
concerning the near-term insolvency of the Bitcoin Foun-
leyWag. Archived from the original on May 17, 2014.
dation, which had been kept secret by the board. As a Retrieved May 16, 2014.
result of this and a lack of cash ow, various sta were
terminated.[24] Following disagreement over the future of [16] Jerving, Sara (September 6, 2014) Bitcoin Promoter
the organizationHarper and Janssens having both cast Charles Shrem Pleads Guilty The Wall Street Journal
votes to dissolve the FoundationHarper resigned and
[17] Hill, Kashmir (January 27, 2014). Winklevosses, Bitcoin
Janssens was removed the Board in December 2015.[25] Community Shocked By Arrest of BitInstant CEO Charlie
Although their philosophies and interests dier, Fenton, Shrem. Forbes.com. Retrieved May 16, 2014.
Janssens and Harper may all be considered reformers. [18] Jeres, Adrianne (January 28, 2014). Charlie Shrem
resigns from the Bitcoin Foundation after arrest. The
Verge. Retrieved May 16, 2014.
3.1.5 References
[19] Menn, Joseph (May 16, 2014). Bitcoin Foundation hit by
[1] Matonis, Jon (27 September 2012). Bitcoin Foundation resignations over new director. Reuters.com. Retrieved
launches to drive bitcoins advancement. Forbes. May 16, 2014.

[2] Bustillos, Maria (2 April 2013). The bitcoin boom. The [20] Higgins, Stan. Bitcoin Foundation Pledges to Focus
New Yorker. Retrieved 30 December 2013. Solely on Core Development. coindesk.com. Retrieved
19 November 2014.
[3] Jim Harper joins Bitcoin Foundation as global policy
counsel and Amy Weiss as media consultant (PDF). [21] del Castillo, Michael (22 December 2014). Its ocial:
Bitcoin Foundation (Press release). 11 March 2014. Cody Wilson is trying to destroy the Bitcoin Foundation
Archived from the original (PDF) on 7 April 2014. from within. Upstart.

[22] Williams, Mark T. (25 February 2014). Mt Gox: The


[4] McMillan, Robert (24 June 2013). California says the
tower of toxic sludge. Business Insider.
Bitcoin Foundation is a money-transferrer. Wired. Re-
trieved 31 December 2013. [23] Olivier Janssens and Jim Harper Voted to Bitcoin Foun-
dation Board. CoinDesk. Retrieved 2016-03-29.
[5] Spaven, Emily (3 July 2013). Bitcoin Foundation issues
response to cease and desist warning. CoinDesk. Re- [24] Pick, Leon (July 4, 2015). Olivier Janssens: Bitcoin
trieved 31 December 2013. Foundation Has No Money Left. Financial Magnates.
Retrieved March 28, 2016.
[6] Lee, Timothy (23 November 2013). For Bitcoin, a suc-
cessful charm oensive on the Hill. Washington Post. [25] Two Board Members Exit as Bitcoin Foundation Seeks
Retrieved 24 November 2013. Funding - CoinDesk. CoinDesk. Retrieved 2016-03-29.
3.1. BITCOIN FOUNDATION 47

3.1.6 External links


Ocial website
Chapter 4

Technologies

4.1 Bitcoin network payee can examine each previous transaction to verify the
chain of ownership. Unlike traditional check endorse-
For a broader coverage related to this topic, see Bitcoin. ments, bitcoin transactions are irreversible, which elimi-
[3]
The bitcoin network is a peer-to-peer payment net- nates risk of chargeback fraud.
Although it is possible to handle bitcoins individually, it
Transaction Transaction Transaction
would be unwieldy to require a separate transaction for
Owner 1's Owner 2's Owner 3's
every bitcoin in a transaction. Transactions are therefore
Public key Public key Public key allowed to contain multiple inputs and outputs,[4] allow-
ing bitcoins to be split and combined. Common trans-
Hash Hash Hash
actions will have either a single input from a larger pre-
vious transaction or multiple inputs combining smaller
Owner 0's Owner 1's Owner 2's
Signature Signature Signature amounts, and one or two outputs: one for the payment,
and one returning the change, if any, to the sender. Any
dierence between the total input and output amounts of
Owner 1's Owner 2's Owner 3's
Private Key Private Key Private Key a transaction goes to miners as a transaction fee.[1]

A diagram of a bitcoin transfer 4.1.2 Mining


work that operates on a cryptographic protocol. Users To form a distributed timestamp server as a peer-to-
send and receive bitcoins, the units of currency, by broad- peer network, bitcoin uses a proof-of-work system.[2] The
casting digitally signed messages to the network using work in this system is what is often referred to as bitcoin
bitcoin wallet software. Transactions are recorded into mining. The signature is discovered rather than provided
a distributed, replicated public database known as the by knowledge.[5] This process is energy intensive.[6] Elec-
blockchain, with consensus achieved by a proof-of-work tricity can consume more than 90% of operating costs
system called mining. The protocol was designed in for miners.[7] A data center in China, planned mostly for
2008 and released in 2009 as open source software by bitcoin mining, is expected to require up to 135 MW of
Satoshi Nakamoto, the name or pseudonym of the origi- power.[8]
nal developer/developer group.
The rule of requiring a proof-of-work to provide the sig-
The network requires minimal structure to share transac- nature for the blockchain was Satoshi Nakamotos key
tions. An ad hoc decentralized network of volunteers is innovation.[5] The mining process involves identifying a
sucient. Messages are broadcast on a best eort ba- block that when hashed twice with SHA-256, yields a
sis, and nodes can leave and rejoin the network at will. number smaller than the given diculty target. While
Upon reconnection, a node downloads and veries new the average work required increases in inverse proportion
blocks from other nodes to complete its local copy of the to the diculty target, a hash can always be veried by
blockchain.[1][2] executing a single round of double SHA-256.
For the bitcoin timestamp network, a valid proof-of-
4.1.1 Transactions work is found by incrementing a nonce until a value is
found that gives the blocks hash the required number of
A bitcoin is dened by a sequence of digitally signed leading zero bits. Once the hashing has produced a valid
transactions that began with the bitcoins creation, as a result, the block cannot be changed without redoing the
block reward. The owner of a bitcoin transfers it by digi- work. As later blocks are chained after it, the work to
tally signing it over to the next owner using a bitcoin trans- change the block would include redoing the work for each
action, much like endorsing a traditional bank check. A subsequent block.

48
4.1. BITCOIN NETWORK 49

GPU-based mining rig, 2012

Lancelot FPGA-based mining board, 2013

work of that block and all blocks after it and then surpass
the work of the honest nodes. The probability of a slower
attacker catching up diminishes exponentially as subse-
quent blocks are added.[2]

1,000,000,000,000

10,000,000,000

100,000,000

1,000,000

10,000

100

1
The best chain consists of the longest series of transaction records 2009 2010 2011 2012 2013 2014 2015 2016 2017

from the genesis block to the current block or record. Orphaned


records exist outside of the best chain. Mining diculty has increased signicantly

Majority consensus in bitcoin is represented by the To compensate for increasing hardware speed and vary-
longest chain, which required the greatest amount of ef- ing interest in running nodes over time, the diculty of
fort to produce. If a majority of computing power is nding a valid hash is adjusted roughly every two weeks.
controlled by honest nodes, the honest chain will grow If blocks are generated too quickly, the diculty in-
fastest and outpace any competing chains. To modify a creases and more hashes are required to make a block
past block, an attacker would have to redo the proof-of- and to generate new bitcoins.[2]
50 CHAPTER 4. TECHNOLOGIES

Diculty Process

Bitcoin mining is a competitive endeavor. An "arms race"


has been observed through the various hashing technolo-
gies that have been used to mine bitcoins: basic CPUs,
high-end GPUs common in many gaming computers,
FPGAs and ASICs all have been used, each reducing the
protability of the less-specialized technology. Bitcoin-
specic ASICs are now available.[9] As bitcoins become
more dicult to mine, computer hardware manufactur-
ing companies have seen an increase in sales of high-end
products.[10]
Computing power is often bundled together or pooled
to reduce variance in miner income. Individual mining
rigs often have to wait for long periods to conrm a block
Avalon ASIC-based mining machine
of transactions and receive payment. In a pool, all partic-
ipating miners get paid every time a participating server
solves a block. This payment depends on the amount of
work an individual miner contributed to help nd that
block.[11]
Bitcoin data centers prefer to keep a low prole, are dis-
persed around the world and tend to cluster around the
availability of cheap electricity.[7]

Energy consumption

ASICMINER ASIC-based USB mining device

A rough overview of the process to mine bitcoins is:[2]

1. New transactions are broadcast to all nodes.


2. Each miner node collects new transactions into a
A mining farm in Iceland block.
3. Each miner node works on nding a proof-of-work
In 2013, Mark Gimein estimated electricity use to be code for its block.
about 40.9 megawatts (982 megawatt-hours a day).[12] In
2014, Hass McCook estimated 80.7 megawatts (80,666 4. When a node nds a proof-of-work, it broadcasts
kW).[13] As of 2015, The Economist estimated that even the block to all nodes.
if all miners used modern facilities, the combined elec-
tricity consumption would be 166.7 megawatts (1.46 5. Receiving nodes validate the transactions it holds
terawatt-hours per year).[14] and accept only if all are valid.

Journalist Matt O'Brien opined that it is not obvious 6. Nodes express their acceptance by moving to work
whether bitcoin is lowering transaction costs, since the on the next block, incorporating the hash of the ac-
costs are transformed into pollution costs, which he char- cepted block.
acterizes as environmental spillovers on everyone else,
or what economists call negative externalities.[15]
Mined bitcoins
To lower the costs, bitcoin miners have set up in places
like Iceland where geothermal energy is cheap and cool- By convention, the rst transaction in a block is a spe-
ing Arctic air is free.[15] Chinese bitcoin miners are cial transaction that produces new bitcoins owned by the
known to use hydroelectric power in Tibet to reduce elec- creator of the block. This is the incentive for nodes to
tricity costs.[16] support the network.[1] It provides the way to move new
4.1. BITCOIN NETWORK 51

time sending the same bitcoin to Bob. By the rules, the


network accepts only one of the transactions. This is
called a race attack, since there is a race which transaction
will be accepted rst. Alice can reduce the risk of race
attack stipulating that she will not deliver the goods until
Eves payment to Alice appears in the blockchain.[20]
A variant race attack (which has been called a Finney
attack by reference to Hal Finney) requires the partici-
Diagram showing how bitcoin transactions are veried pation of a miner. Instead of sending both payment re-
quests (to pay Bob and Alice with the same coins) to the
network, Eve issues only Alices payment request to the
bitcoins into circulation. The reward for mining halves network, while the accomplice tries to mine a block that
every 210,000 blocks. It started at 50 bitcoin, dropped includes the payment to Bob instead of Alice. There is
to 25 in late 2012 and to 12.5 bitcoin in 2016.[17] This a positive probability that the rogue miner will succeed
halving process is programmed to continue for 64 times before the network, in which case the payment to Alice
before new coin creation ceases.[17] will be rejected. As with the plain race attack, Alice can
reduce the risk of a Finney attack by waiting for the pay-
ment to be included in the blockchain.[21]
4.1.3 Security

Various potential attacks on the bitcoin network and its History modication
use as a payment system, real or theoretical, have been
considered. The bitcoin protocol includes several fea- Each block that is added to the blockchain, starting with
tures that protect it against some of those attacks, such the block containing a given transaction, is called a con-
as unauthorized spending, double spending, forging bit- rmation of that transaction. Ideally, merchants and ser-
coins, and tampering with the blockchain. Other at- vices that receive payment in bitcoin should wait for at
tacks, such as theft of private keys, require due care by least one conrmation to be distributed over the network,
users.[18][19][20][21][22][23][24] before assuming that the payment was done. The more
conrmations that the merchant waits for, the more di-
cult it is for an attacker to successfully reverse the trans-
Unauthorized spending action in a blockchainunless the attacker controls more
than half the total network power, in which case it is
Unauthorized spending is mitigated by bitcoins imple- called a 51% attack.[22]
mentation of public-private key cryptography. For ex-
ample; when Alice sends a bitcoin to Bob, Bob becomes
the new owner of the bitcoin. Eve observing the trans- Deanonymisation of clients
action might want to spend the bitcoin Bob just received,
but she cannot sign the transaction without the knowledge Deanonymisation is a strategy in data mining in which
of Bobs private key.[19] anonymous data is cross-referenced with other sources
of data to re-identify the anonymous data source. Along
with transaction graph analysis, which may reveal con-
Double spending nections between bitcoin addresses (pseudonyms),[18][23]
there is a possible attack[24] which links a users
A specic problem that an internet payment system must pseudonym to its IP address. If the peer is using Tor, the
solve is double-spending, whereby a user pays the same attack includes a method to separate the peer from the
coin to two or more dierent recipients. An example of Tor network, forcing them to use their real IP address for
such a problem would be if Eve sent a bitcoin to Alice and any further transactions. The attack makes use of bitcoin
later sent the same bitcoin to Bob. The bitcoin network mechanisms of relaying peer addresses and anti-DoS pro-
guards against double-spending by recording all bitcoin tection. The cost of the attack on the full bitcoin network
transfers in a ledger (the blockchain) that is visible to all is under 1500 per month.[24]
users, and ensuring for all transferred bitcoins that they
haven't been previously spent.[19]:4
4.1.4 Payment verication
Race attack
Main article: Online transaction processing
If Eve oers to pay Alice a bitcoin in exchange for goods
and signs a corresponding transaction, it is still possible Each miner can choose which transactions are included
that she also creates a dierent transaction at the same in or exempted from a block.[25] A greater number of
52 CHAPTER 4. TECHNOLOGIES

transactions in a block does not equate to greater com- weapons[37] are also allegedly available on black market
putational power required to solve that block.[25] sites that sell in bitcoin. Due to the anonymous nature and
Upon receiving a new transaction a node must validate it: the lack of central control on these markets, it is hard to
in particular, verify that none of the transactions inputs know whether [38]
the services are real or just trying to take
have been previously spent. To carry out that check the the bitcoins.
node needs to access the blockchain. Any user who does Several deep web black markets have been shut by au-
not trust his network neighbors, should keep a full local thorities. In October 2013 Silk Road was shut down by
copy of the blockchain, so that any input can be veried. U.S. law enforcement[39][40][41] leading to a short-term
[42]
As noted in Nakamotos whitepaper, it is possible to ver- decrease in the value of bitcoin. In 2015, [43]
the founder
ify bitcoin payments without running a full network node of the site was sentenced to life in prison. Alternative
(simplied payment verication, SPV). A user only needs sites were soon available, and in early 2014 the Australian
a copy of the block headers of the longest chain, which Broadcasting Corporation reported that the closure of
are available by querying network nodes until it is appar- Silk Road had little impact on the number of Australians
[44]
ent that the longest chain has been obtained. Then, get the selling drugs online, which had actually increased. In
Merkle branch linking the transaction to its block. Link- early 2014, Dutch authorities closed Utopia, an online il-
[45]
ing the transaction to a place in the chain demonstrates legal goods market, and seized 900 bitcoins. In late
that a network node has accepted it, and blocks added 2014, a joint police operation saw European and Ameri-
after it further establish the conrmation.[1] can authorities seize bitcoins and close 400 deep web sites
including the illicit goods market Silk Road 2.0.[46] Law
enforcement activity has resulted in several convictions.
4.1.5 Data in the blockchain In December 2014, Charlie Shrem was sentenced to two
years in prison for indirectly helping to send $1 million
to the Silk Road drugs site,[47] and in February 2015, its
While it is possible to store any digital le in the
founder, Ross Ulbricht, was convicted on drugs charges
blockchain, the larger the transaction size, the larger any
[26] and faces a life sentence.[48]
associated fees become. Various items have been em-
bedded, including URLs to child pornography, an ASCII Some black market sites may seek to steal bitcoins from
art image of Ben Bernanke, material from the Wikileaks customers. The bitcoin community branded one site,
cables, prayers from bitcoin miners, and the original bit- Sheep Marketplace, as a scam when it prevented with-
coin whitepaper.[27] drawals and shut down after an alleged bitcoins theft.[49]
In a separate case, escrow accounts with bitcoins belong-
ing to patrons of a dierent black market were hacked in
4.1.6 Criminal activity early 2014.[50]
According to the Internet Watch Foundation, a UK-based
The use of bitcoin by criminals has attracted the atten- charity, bitcoin is used to purchase child pornography,
tion of nancial regulators, legislative bodies, law en- and almost 200 such websites accept it as payment. Bit-
forcement, and the media.[28] The FBI prepared an intelli- coin isn't the sole way to purchase child pornography on-
gence assessment,[29] the SEC has issued a pointed warn- line, as Troels Oertling, head of the cybercrime unit at
ing about investment schemes using virtual currencies,[28] Europol, states, Ukash and Paysafecard... have [also]
and the U.S. Senate held a hearing on virtual currencies been used to pay for such material. However, the In-
in November 2013.[30] ternet Watch Foundation lists around 30 sites that exclu-
Several news outlets have asserted that the popularity of sively accept bitcoins.[35] Some of these sites have shut
bitcoins hinges on the ability to use them to purchase il- down, such as a deep web crowdfunding website that
legal goods.[31][32] In 2014, researchers at the University aimed to fund the creation of new child porn.[51] Further-
of Kentucky found robust evidence that computer pro- more, hyperlinks to child porn websites have been added
gramming enthusiasts and illegal activity drive interest in to the blockchain as arbitrary data can be included when
bitcoin, and nd limited or no support for political and a transaction is made.[52][53]
investment motives.[33]

Malware
Black markets
Malware stealing Some malware can steal private
Main article: Darknet market keys for bitcoin wallets allowing the bitcoins themselves
to be stolen. The most common type searches computers
A CMU researcher estimated that in 2012, 4.5% to 9% of for cryptocurrency wallets to upload to a remote server
all transactions on all exchanges in the world were for drug where they can be cracked and their coins stolen.[54]
trades on a single dark web drugs market, Silk Road.[34] Many of these also log keystrokes to record passwords,
Child pornography,[35] murder-for-hire services,[36] and often avoiding the need to crack the keys.[54] A dier-
4.1. BITCOIN NETWORK 53

ent approach detects when a bitcoin address is copied For four days in December 2013 and January 2014,
to a clipboard and quickly replaces it with a dier- Yahoo! Europe hosted an ad containing bitcoin min-
ent address, tricking people into sending bitcoins to the ing malware that infected an estimated two million
wrong address.[55] This method is eective because bit- computers.[70] The software, called Sefnit, was rst de-
coin transactions are irreversible.[56]:57 tected in mid-2013 and has been bundled with many soft-
One virus, spread through the Pony botnet, was reported ware packages. Microsoft has been removing the mal-
in February 2014 to have stolen up to $220,000 in cryp- ware through its Microsoft
[71]
Security Essentials and other
[57]
tocurrencies including bitcoins from 85 wallets. Secu- security software.
rity company Trustwave, which tracked the malware, re- Several reports of employees or students using univer-
ports that its latest version was able to steal 30 types of sity or research computers to mine bitcoins have been
digital currency.[58] published.[72]
A type of Mac malware active in August 2013, Bit-
vanity posed as a vanity wallet address generator and Money laundering
stole addresses and private keys from other bitcoin
client software.[59] A dierent trojan for macOS, called Bitcoins may not be ideal for money laundering, because
CoinThief was reported in February 2014 to be re- all transactions are public.[73] Authorities, including the
sponsible for multiple bitcoin thefts.[59] The software European Banking Authority[74] the FBI,[29] and the
was hidden in versions of some cryptocurrency apps on Financial Action Task Force of the G7[75] have expressed
Download.com and MacUpdate.[59] concerns that bitcoin may be used for money laundering.
In early 2014, an operator of a U.S. bitcoin exchange,
Charlie Shrem, was arrested for money laundering.[76]
Ransomware Some ransomware demand payment in
Subsequently, he was sentenced to two years in prison
bitcoin. One program called CryptoLocker, typically
for aiding and abetting an unlicensed money transmitting
spread through legitimate-looking email attachments, en-
business.[47] A report by UKs Treasury and Home Of-
crypts the hard drive of an infected computer, then dis-
ce named UK national risk assessment of money laun-
plays a countdown timer and demands a ransom, usually
dering and terrorist nancing (2015 October) found that,
two bitcoins, to decrypt it.[60] Massachusetts police said
of the twelve methods examined in the report, bitcoin car-
they paid a 2 bitcoin ransom in November 2013, worth
ries the lowest risk of being used for money laundering,
more than $1,300 at the time, to decrypt one of their
with the most common money laundering method being
hard drives.[61] Linkup, a combination ransomware and
the banks.[77]
bitcoin mining program that surfaced in February 2014,
disables internet access and demands credit card informa-
tion to restore it, while secretly mining bitcoins.[60] Bit- Ponzi scheme
coin is currently being used as the ransom medium of
choice in the WannaCry ransomware hack hitting many In a Ponzi scheme that utilized bitcoins, The Bitcoin Sav-
buildings in Asia and Europe.[62] ings and Trust promised investors up to 7 percent weekly
interest, and raised at least 700,000 bitcoins from 2011
to 2012.[78] In July 2013 the U.S. Securities and Ex-
Unauthorized mining In June 2011, Symantec change Commission charged the company and its founder
warned about the possibility that botnets could mine in 2013 with defrauding investors in a Ponzi scheme in-
covertly for bitcoins.[63] Malware used the parallel pro- volving bitcoin.[78] In September 2014 the judge ned
cessing capabilities of GPUs built into many modern Bitcoin Savings & Trust and its owner $40 million for
video cards.[64] Although the average PC with an inte- operating a bitcoin Ponzi scheme.[79]
grated graphics processor is virtually useless for bitcoin
mining, tens of thousands of PCs laden with mining mal-
ware could produce some results.[65] Theft
In mid-August 2011, bitcoin mining botnets were There have been many cases of bitcoin theft.[80] One way
detected,[66] and less than three months later, bitcoin min- this is accomplished involves a third party accessing the
ing trojans had infected Mac OS X.[67] private key to a victims bitcoin address,[81] or of an online
In April 2013, electronic sports organization E-Sports wallet.[82] If the private key is stolen, all the bitcoins from
Entertainment was accused of hijacking 14,000 comput- the compromised address can be transferred. In that case,
ers to mine bitcoins; the company later settled the case the network does not have any provisions to identify the
with the State of New Jersey.[68] thief, block further transactions of those stolen bitcoins,
[83]
German police arrested two people in December 2013 or return them to the legitimate owner.
who customized existing botnet software to perform bit- Theft also occurs at sites where bitcoins are used to pur-
coin mining, which police said had been used to mine at chase illicit goods. In late November 2013, an esti-
least $950,000 worth of bitcoins.[69] mated $100 million in bitcoins were allegedly stolen from
54 CHAPTER 4. TECHNOLOGIES

the online illicit goods marketplace Sheep Marketplace, [3] Dean, Andrew (14 August 2014). Online Gambling
which immediately closed.[84] Users tracked the coins as Meets Bitcoin. Retrieved 21 August 2014.
they were processed and converted to cash, but no funds
were recovered and no culprits identied.[84] A dierent [4] Block Chain Overview. bitcoin.org/. Bitcoin Project
20092014 Released under the MIT license. 20092014.
black market, Silk Road 2, stated that during a Febru-
Retrieved 14 August 2014.
ary 2014 hack, bitcoins valued at $2.7 million were taken
from escrow accounts.[50] [5] Enabling Blockchain Innovations with Pegged
Sites where users exchange bitcoins for cash or store them Sidechains (PDF). Blockstream. 22 October 2014. p.
in wallets are also targets for theft. Inputs.io, an Aus- 3. Retrieved 9 January 2017.
tralian wallet service, was hacked twice in October 2013
[6] Peter Kelly-Detwiler (21 July 2016). Mining Bitcoins Is
and lost more than $1 million in bitcoins.[85] In late Febru- A Surprisingly Energy-Intensive Endeavor. Forbes. Re-
ary 2014 Mt. Gox, one of the largest virtual currency ex- trieved 7 January 2017.
changes, led for bankruptcy in Tokyo amid reports that
bitcoins worth $350 million had been stolen.[86] Flexcoin, [7] Lester Coleman (25 July 2016). As Mining Expands,
a bitcoin storage specialist based in Alberta, Canada, shut Will Electricity Consumption Constrain Bitcoin?". cryp-
down on March 2014 after saying it discovered a theft tocoin news. Retrieved 7 January 2017.
of about $650,000 in bitcoins.[87] Poloniex, a digital cur-
rency exchange, reported on March 2014 that it lost bit- [8] Mining Bitcoin With Wind And Solar Power. Energy
Matters. 7 November 2016. Retrieved 7 January 2017.
coins valued at around $50,000.[88] In January 2015 UK-
based bitstamp, the third busiest bitcoin exchange glob- [9] Tindell, Ken (5 April 2013). Geeks Love The Bitcoin
ally, was hacked and $5 million in bitcoins were stolen.[89] Phenomenon Like They Loved The Internet In 1995.
February 2015 saw a Chinese exchange named BTER Business Insider.
lose bitcoins worth nearly $2 million to hackers.[90]
[10] Bitcoin boom beneting TSMC: report. Taipei Times.
A major bitcoin exchange, Bitnex, was hacked and
4 January 2014.
nearly 120,000 bitcoins (around $60m) was stolen in
2016. Bitnex was forced to suspend its trading. The [11] Biggs, John (8 April 2013). How To Mine Bitcoins.
theft is the second largest bitcoin heist ever, dwarfed only Techcrunch.
by Mt. Gox theft in 2014. According to Forbes, All
of Bitnexs customers,... will stand to lose money. The [12] Gimein, Mark (13 April 2013). Virtual Bitcoin Min-
company has announced a haircut of 36.067% across the ing Is a Real-World Environmental Disaster. Bloomberg
board.[91] Business. Bloomberg LP. Retrieved 22 April 2015.

Thefts have raised safety concerns. Charles Hayter, [13] McCook, Hass (21 June 2014). Under the Microscope:
founder of digital currency comparison website Cryp- Economic and Environmental Costs of Bitcoin Mining.
toCompare said, Its a reminder of the fragility of the Retrieved 25 November 2016.
infrastructure in such a nascent industry.[92] According
to the hearing of U.S. House of Representatives Com- [14] The magic of mining. The Economist. 13 January 2015.
Retrieved 13 January 2015.
mittee on Small Business in April 2, 2014, these ven-
dors lack regulatory oversight, minimum capital stan- [15] O'Brien, Matt (13 June 2015). The scam called Bitcoin.
dards and don't provide consumer protection against loss Daily Herald. Retrieved 20 September 2016.
or theft.[93]
[16] Maras, Elliot (14 September 2016). Chinas Mining
Dominance: Good Or Bad For Bitcoin?". Cryptocoin
4.1.7 See also News. Retrieved 25 November 2016.

[17] Jacob Donnelly (12 June 2016). What is the 'Halving'?


Lists of network protocols A Primer to Bitcoins Big Mining Change. CoinDesk.
Retrieved 10 January 2017.

[18] Ron Dorit; Adi Shamir (2012). Quantitative Analysis of


4.1.8 References
the Full Bitcoin Transaction Graph (PDF). Cryptology
ePrint Archive. Retrieved 18 October 2012.
[1] Nakamoto, Satoshi (24 May 2009). Bitcoin: A Peer-to-
Peer Electronic Cash System (PDF). Retrieved 20 De- [19] Jerry Brito & Andrea Castillo (2013). Bitcoin: A Primer
cember 2012. for Policymakers (PDF). Mercatus Center. George Ma-
son University. Retrieved 22 October 2013.
[2] Barber, Simon; Boyen, Xavier; Shi, Elaine & Uzun, Ersin
(2012). Bitter to Better how to make Bitcoin a better [20] Erik Bonadonna (29 March 2013). Bitcoin and the
currency (PDF). Financial Cryptography and Data Secu- Double-spending Problem. Cornell University. Re-
rity. Springer Publishing. trieved 22 October 2014.
4.1. BITCOIN NETWORK 55

[21] Karame, Ghassan O.; Androulaki, Elli; Capkun, Srdjan were traded in Bitcoin exchanges over the same period...
(2012). Two Bitcoins at the Price of One? Double- The only conclusion we can draw from this comparison is
Spending Attacks on Fast Payments in Bitcoin (PDF). that Silk Road-related trades could plausibly correspond
International Association for Cryptologic Research. Re- to 4.5% to 9% of all exchange trades
trieved 22 October 2014.
[35] Schweizer, Kristen (10 October 2014). Bitcoin
[22] Michael J. Casey; Paul Vigna (16 June 2014). Short- Payments by Pedophiles Frustrate Child Porn Fight.
Term Fixes To Avert 51% Attack"". Money Beat. Wall BloombergBusiness. Bloomberg LP. Retrieved 16 Febru-
Street Journal. Retrieved 30 June 2014. ary 2015.
[23] Reid, Fergal; Harrigan, Martin (2013). An Analysis of [36] Lake, Eli (17 October 2013). Hitman Network Says It
Anonymity in the Bitcoin System. Security and Privacy Accepts Bitcoins to Murder for Hire. The Daily Beast.
in Social Networks: 197223. The Daily Beast Company LLC. Retrieved 17 February
2015.
[24] Biryukov, Alex; Khovratovich, Dmitry; Pustogarov, Ivan
(2014). Deanonymisation of clients in Bitcoin P2P net- [37] Smith, Gerry (15 April 2013). How Bitcoin Sales Of
work. ACM Conference on Computer and Communica- Guns Could Undermine New Rules. hungtonpost.com.
tions Security. TheHungtonPost.com, Inc. Retrieved 20 October 2013.
[25] Houy, N. (2016). The Bitcoin Mining Game. Ledger.
[38] Alex, Knapp (19 January 2015), Faking Murders And
1 (0): 5368. doi:10.5195/ledger.2016.13. Retrieved 14
Stealing Bitcoin: Why The Silk Road Is The Strangest
January 2017.
Crime Story Of The Decade, Forbes, retrieved 2 January
[26] How much will the transaction fee be?". Bitcoin- 2016
fees.com. Retrieved 30 November 2014.
[39] Andy Greenberg (23 October 2013). FBI Says Its Seized
[27] How porn links and Ben Bernanke snuck into Bitcoins $28.5 Million In Bitcoins From Ross Ulbricht, Alleged
code. CNN Money. CNN. 2 May 2013. Owner Of Silk Road (blog). Forbes.com. Retrieved 24
November 2013.
[28] Lavin, Tim (8 August 2013). The SEC Shows Why Bit-
coin Is Doomed. bloomberg.com. Bloomberg LP. Re- [40] Kelion, Leo (12 February 2014). Five arrested in Utopia
trieved 20 October 2013. dark net marketplace crackdown. bbc.co.uk. BBC. Re-
trieved 13 February 2014.
[29] Bitcoins Virtual Currency: Unique Features Present
Challenges for Deterring Illicit Activity (PDF). Cyber In- [41] Alex Hern (3 October 2013). Bitcoin price plummets af-
telligence Section and Criminal Intelligence Section. FBI. ter Silk Road closure. The Guardian. Retrieved 31 Oc-
24 April 2012. Retrieved 2 November 2014. tober 2014. Digital currency loses quarter of value after
arrest of Ross Ulbricht, who is accused of running online
[30] Lee, Timothy B. (21 November 2013). Heres how Bit- drugs marketplace
coin charmed Washington. The Washington Post. Re-
trieved 10 October 2016. [42] Robert McMillan (2 October 2013). Bitcoin Values
Plummet $500M, Then Recover, After Silk Road Bust.
[31] Monetarists Anonymous. The Economist. The Wired. Retrieved 31 October 2014.
Economist Newspaper Limited. 29 September 2012. Re-
trieved 21 October 2013. [43] Silk Road drug website founder Ross Ulbricht jailed.
BBC News. BBC. 29 May 2015. Retrieved 30 May 2015.
[32] Ball, James (22 March 2013). Silk Road: the online drug
marketplace that ocials seem powerless to stop. the- [44] Katie Silver (31 March 2014). Silk Road closure fails
guardian.com. Guardian News and Media Limited. Re- to dampen illegal drug sales online, experts say. ABC
trieved 20 October 2013. News. Retrieved 31 October 2014.
[33] Matthew Graham Wilson & Aaron Yelowitz (November
[45] Sophie Murray-Morris (13 February 2014). Utopia no
2014). Characteristics of Bitcoin Users: An Analysis of
more: Drug marketplace seen as the next Silk Road shut
Google Search Data. Social Science Research Network.
down by Dutch police. The Independent. London: inde-
Working Papers Series. SSRN 2518603 . pendent.co.uk. Retrieved 8 November 2014.
[34] Christin, Nicolas (2013). Traveling the Silk Road: A Mea- [46] Wakeeld, Jane (7 November 2014). Huge raid to shut
surement Analysis of a Large Anonymous Online Market- down 400-plus dark net sites. bbc.com. BBC. Retrieved
place (PDF). Carnegie Mellon INI/CyLab. p. 8. Re- 8 November 2014.
trieved 22 October 2013. we suggest to compare the es-
timated total volume of Silk Road transactions with the [47] Nate Raymond (19 December 2014). Bitcoin backer gets
estimated total volume of transactions at all Bitcoin ex- two years prison for illicit transfers. Reuters. Thompson
changes (including Mt.Gox, but not limited to it). The Reuters. Retrieved 20 December 2014.
latter corresponds to the amount of money entering and
leaving the Bitcoin network, and statistics for it are read- [48] Ross Ulbricht: Silk Road creator convicted on drugs
ily available... approximately 1,335,580 BTC were ex- charges. BBC. 5 February 2015. Retrieved 17 Febru-
changed on Silk Road... approximately 29,553,384 BTC ary 2015.
56 CHAPTER 4. TECHNOLOGIES

[49] Ravi Mandalia (1 December 2013). Silk Road-like [67] Lucian Constantin (1 November 2011). Mac OS X Tro-
Sheep Marketplace scams users; over 39k Bitcoins worth jan steals processing power to produce Bitcoins: Security
$40 million stolen. Techie News. Retrieved 2 December researchers warn that DevilRobber malware could slow
2013. down infected Mac computers. TechWorld. IDG com-
munications. Retrieved 24 January 2012.
[50] Silk Road 2 loses $2.7m in bitcoins in alleged hack.
BBC News. 14 February 2014. Retrieved 15 February [68] E-Sports Entertainment settles Bitcoin botnet allega-
2014. tions. BBC News. 20 November 2013. Retrieved 24
November 2013.
[51] While Markets Get Seized: Pedophiles Launch a Crowd-
funding Site. Retrieved 19 February 2015. [69] Mohit Kumar (9 December 2013). The Hacker News
The Hacker News +1,440,833 ThAlleged Skynet Botnet
[52] Hopkins, Curt (7 May 2013). If you own Bitcoin, you creator arrested in Germany. Retrieved 8 January 2015.
also own links to child porn. The Daily Dot. Retrieved
16 February 2015. [70] McGlaun, Shane (9 January 2014). Yahoo malware
turned Euro PCs into bitcoin miners. SlashGear. Re-
[53] Bradbury, Danny. As Bitcoin slides, the Blockchain trieved 8 January 2015.
grows. IET Engineering and Technology Magazine.
[71] Liat Clark (20 January 2014). Microsoft stopped Tor
[54] Hajdarbegovic, Nermin (27 February 2014). Nearly 150 running automatically on botnet-infected systems. Re-
strains of malware are after your bitcoins. CoinDesk. Re- trieved 8 January 2015.
trieved 7 March 2014.
[72] Hornyack, Tim (6 June 2014). US researcher banned
[55] Gregg Keizer (28 February 2014). Bitcoin malware for mining Bitcoin using university supercomputers. PC
count soars as cryptocurrency value climbs. Computer- world.com. IDG Consumer & SMB. Retrieved 13 June
world. Retrieved 8 January 2015. 2014.

[56] Barski, Conrad; Wilmer, Chris (14 November 2014). Bit- [73] Kirk, Jeremy (28 August 2013). Bitcoin oers privacy-
coin for the Befuddled. No Starch Press. ISBN 978-1- as long as you don't cash out or spend it. PC World. Re-
59327-573-0. trieved 31 October 2014.

[74] Warning to consumers on virtual currencies (PDF). Eu-


[57] Zach Miners (24 February 2014). Bitcoins, other digi-
ropean Banking Authority. 12 December 2013. Archived
tal currencies stolen in massive 'Pony' botnet attack. Re-
from the original (PDF) on 28 December 2013. Retrieved
trieved 8 January 2015.
23 December 2013.
[58] Finkle, Jim (24 February 2014). "'Pony' botnet steals bit-
[75] Guidance for a Risk-Based Approach: Prepaid Cards,
coins, digital currencies: Trustwave. Reuters. Retrieved
Mobile Payments and Internet-based Payment Services
7 March 2014.
(PDF). Guidance for a risk-based approach. Paris: Fi-
[59] Watch out! Mac malware spread disguised as cracked nancial Action Task Force (FATF). June 2013. p. 47.
versions of Angry Birds, Pixelmator and other top apps. Retrieved 6 March 2014.
ESET. 26 February 2014. Retrieved 20 November 2015. [76] Lee, Dave (27 January 2014). US makes Bitcoin ex-
[60] How Ransomware turns your computer into a bitcoin change arrests after Silk Road closure. bbc.co.uk. BBC.
miner. The Guardian. 10 February 2014. Retrieved 7 Retrieved 28 January 2014.
March 2014. [77] UK national risk assessment of money laundering and
terrorist nancing (PDF). UK HM Treasury and Home
[61] Gibbs, Samuel (21 November 2013). US police force
Oce. Retrieved 3 May 2016.
pay bitcoin ransom in Cryptolocker malware scam. The
Guardian. Retrieved 7 March 2014. [78] SEC charges Texas man with running Bitcoin-
denominated Ponzi scheme (Press release). US
[62] Usborne, Simon (15 May 2017). Digital gold: why hack- Securities and Exchange Commission. 23 July 2013.
ers love Bitcoin via The Guardian. Retrieved 7 March 2014.
[63] Peter Coogan (17 June 2011). Bitcoin Botnet Mining. [79] Jay Adkisson (25 September 2014). Bitcoin Savings &
Symantec.com. Retrieved 24 January 2012. Trust Comes Up $40 Million Short On The Trust Part.
Personal Finance. Forbes. Retrieved 13 December 2014.
[64] Goodin, Dan (16 August 2011). Malware mints virtual
currency using victims GPU. The Register. Retrieved 31 [80] Bitcoin: Bitcoin under pressure. The Economist. 30
October 2014. November 2013. Retrieved 30 November 2013.
[65] Ryder, Greg (9 June 2013). All About Bitcoin Mining: [81] Jeries, Adrianne (19 December 2013). How to steal
Road To Riches Or Fools Gold?". Toms hardware. Re- Bitcoin in three easy steps. The Verge. Retrieved 17 Jan-
trieved 18 September 2015. uary 2014.

[66] Infosecurity - Researcher discovers distributed bitcoin [82] Everett, David (April 2012). So how can you steal Bit-
cracking trojan malware. Infosecurity-magazine.com. coins. Smartcard & Identity News. Retrieved 17 January
19 August 2011. Retrieved 24 January 2012. 2014.
4.2. CRYPTOCURRENCY 57

[83] Grocer, Stephen (2 July 2013). Beware the Risks of the


Bitcoin: Winklevii Outline the Downside. Moneybeat.
The Wall Street Journal. Retrieved 21 October 2013.

[84] Hern, Alex (9 December 2013). Recovering stolen bit-


coin: a digital wild goose chase. The Guardian. Re-
trieved 6 March 2014.

[85] Hern, Alex (8 November 2013). Bitcoin site Inputs.io


loses 1m after hackers strike twice. The Guardian. Re-
trieved 18 September 2015.

[86] MtGox bitcoin exchange les for bankruptcy. bbc.com.


BBC. 28 February 2014. Retrieved 18 April 2014.

[87] Ligaya, Armina (5 March 2014). After Albertas Flex-


coin, Mt. Gox hacked, Bitcoin businesses face sting of
free-wheeling ways. Financial Post. Retrieved 7 March
2014.

[88] Truong, Alice (6 March 2014). Another Bitcoin ex-


change, another heist. Fast Company. Retrieved 7 March
2014. Hashcoin mine

[89] Zack Whittaker (5 January 2015). Bitstamp exchange


hacked, $5M worth of bitcoin stolen. Zdnet. CBS Inter-
active. Retrieved 6 January 2015.

[90] Millward, Steven (16 February 2015). Nearly $2M in bit-


coins feared lost after Chinese cryptocurrency exchange
hack. techinasia.com. Tech In Asia. Retrieved 18 Febru-
ary 2015.

[91] Coppola, Frances (6 August 2016). Theft And May-


hem In The Bitcoin World. Forbes. Retrieved 15 August
2016.

[92] Heller, Matthew (4 August 2016). Bitnex Hack Fuels


Bitcoin Security Concerns -". CFO. Retrieved 11 January
2017.

[93] Testimony of Mark T. Williams Bitcoin: Examining the


Benets and Risks for Small Business (PDF). U.S. House
of Representatives Committee on Small Business Hear-
ing. 2 April 2014. Retrieved 10 January 2017.

4.2 Cryptocurrency

Nxt exchanges

cryptography to secure the transactions and to control the


creation of additional units of the currency.[1] Cryptocur-
rencies are classied as a subset of digital currencies and
are also classied as a subset of alternative currencies and
virtual currencies.
Bitcoin became the rst decentralized cryptocurrency
in 2009.[2] Since then, numerous cryptocurrencies have
HitBTC cryptocurrency exchange terminal window been created.[3] These are frequently called altcoins, as
a blend of bitcoin alternative.[4][5] Bitcoin and its deriva-
A cryptocurrency (or crypto currency) is a digital as- tives use decentralized control[6] as opposed to cen-
set designed to work as a medium of exchange using tralized electronic money/centralized banking systems.[7]
58 CHAPTER 4. TECHNOLOGIES

to the ledger in accordance with a particular timestamp-


ing scheme.[12]
The security of cryptocurrency ledgers is based on the
assumption that the majority of miners are honestly trying
to maintain the ledger, having nancial incentive to do so.
Most cryptocurrencies are designed to gradually decrease
production of currency, placing an ultimate cap on the to-
tal amount of currency that will ever be in circulation,
mimicking precious metals.[1][13] Compared with ordi-
nary currencies held by nancial institutions or kept as
cash on hand, cryptocurrencies can be more dicult for
seizure by law enforcement.[1] This diculty is derived
from leveraging cryptographic technologies. A primary
example of this new challenge for law enforcement comes
from the Silk Road case, where Ulbrichts bitcoin stash
was held separately and ... encrypted.[14] Cryptocur-
rencies such as bitcoin are pseudonymous, though addi-
tions such as Zerocoin have been suggested, which would
allow for true anonymity.[15][16][17]

4.2.2 History
Monero wallet on a mobile phone

In 1998, Wei Dai published a description of b-money,


The decentralized control is related to the use of bitcoins an anonymous, distributed electronic cash system.[18]
blockchain transaction database in the role of a dis- Shortly thereafter, Nick Szabo created Bit Gold.[19]
tributed ledger.[8] Like bitcoin and other cryptocurrencies that would fol-
low it, Bit Gold was an electronic currency system which
required users to complete a proof of work function with
4.2.1 Overview solutions being cryptographically put together and pub-
lished. A currency system based on a reusable proof of
Decentralized cryptocurrency is produced by the entire work was later created by Hal Finney who followed the
cryptocurrency system collectively, at a rate which is de- work of Dai and Szabo.
ned when the system is created and which is publicly The rst decentralized cryptocurrency, bitcoin, was
known. In centralized banking and economic systems created in 2009 by pseudonymous developer Satoshi
such as the Federal Reserve System, corporate boards Nakamoto. It used SHA-256, a cryptographic hash func-
or governments control the supply of currency by print- tion, as its proof-of-work scheme.[12][20] In April 2011,
ing units of at money or demanding additions to digital Namecoin was created as an attempt at forming a decen-
banking ledgers. In case of decentralized cryptocurrency, tralized DNS, which would make internet censorship very
companies or governments cannot produce new units, and dicult. Soon after, in October 2011, Litecoin was re-
have not so far provided backing for other rms, banks or leased. It was the rst successful cryptocurrency to use
corporate entities which hold asset value measured in it. scrypt as its hash function instead of SHA-256. Another
The underlying technical system upon which decentral- notable cryptocurrency, Peercoin was the rst to use a
ized cryptocurrencies are based was created by the group proof-of-work/proof-of-stake hybrid.[21] IOTA was the
or individual known as Satoshi Nakamoto.[9] rst cryptocurrency not based on a block chain, and in-
As of March 2015, hundreds of cryptocurrency spec- stead uses the Tangle.[22][23] Many other cryptocurren-
ications exist; most are similar to and derived from cies have been created though few have been success-
the rst fully implemented decentralized cryptocurrency, ful, as they have brought little in the way of technical
bitcoin.[10][11] Within cryptocurrency systems the safety, innovation.[24] On 6 August 2014, the UK announced its
integrity and balance of ledgers is maintained by a com- Treasury had been commissioned to do a study of cryp-
munity of mutually distrustful parties referred to as min- tocurrencies, and what role, if any, they can play in the
ers: members of the general public using their computers UK economy. The study was also to report on whether
to help validate and timestamp transactions adding them regulation should be considered.[25]
4.2. CRYPTOCURRENCY 59

Russia.[31] The growing community around Dogecoin is


looking to cement its charitable credentials by raising
funds to sponsor service dogs for children with special
needs.[32]

4.2.3 Legality

The legal status of cryptocurrencies varies substantially


from country to country and is still undened or chang-
ing in many of them. While some countries have explic-
itly allowed their use and trade, others have banned or
restricted it. Likewise, various government agencies, de-
partments, and courts have classied bitcoins dierently.
China Central Bank banned the handling of bitcoins by
nancial institutions in China during an extremely fast
adoption period in early 2014.[33] In Russia, though cryp-
tocurrencies are legal, it is illegal to actually purchase
goods with any currency other than the Russian ruble.[34]
On March 25, 2014, the United States Internal Revenue
Service (IRS) ruled that bitcoin will be treated as prop-
erty for tax purposes as opposed to currency. This means
bitcoin will be subject to capital gains tax. One benet
of this ruling is that it claries the legality of bitcoin. No
Bitcoin ATM longer do investors need to worry that investments in or
prot made from bitcoins are illegal or how to report them
to the IRS.[35] In a paper published by researchers from
Publicity Oxford and Warwick, it was shown that bitcoin has some
characteristics similar to the precious metals market more
Central bank representatives have stated that the adop- than to traditional currencies, hence in agreement to the
[36]
tion of cryptocurrencies such as bitcoin pose a signicant IRS decision even if based on dierent reasons.
challenge to central banks ability to inuence the price of Legal issues not dealing with governments have also
credit for the whole economy.[26] They have also stated arisen for cryptocurrencies. Coinye, for example, is an
that as trade using cryptocurrencies becomes more popu- altcoin that used rapper Kanye West as its logo without
lar, there is bound to be a loss of consumer condence in permission. Upon hearing of the release of Coinye, orig-
at currencies.[27] Gareth Murphy, a senior central bank- inally called Coinye West, attorneys for Kanye West sent
ing ocer has stated widespread use [of cryptocurrency] a cease and desist letter to the email operator of Coinye,
would also make it more dicult for statistical agencies David P. McEnery Jr. The letter stated that Coinye was
to gather data on economic activity, which are used by willful trademark infringement, unfair competition, cy-
governments to steer the economy. He cautioned that berpiracy, and dilution and instructed Coinye to stop us-
virtual currencies pose a new challenge to central banks ing the likeness and name of Kanye West.[37]
control over the important functions of monetary and ex-
change rate policy.[28]
Concerns of an unregulated global economy
Jordan Kelley, founder of Robocoin, launched the rst
bitcoin ATM in the United States on February 20, 2014.
The kiosk installed in Austin, Texas is similar to bank As the popularity of and demand for online currencies [38][39]
ATMs but has scanners to read government-issued iden- increases since the inception of bitcoin in 2009, so
tication such as a drivers license or a passport to conrm do concerns that such an unregulated person to person
users identities.[29] By May 2017 1189 bitcoin ATMs global economy that cryptocurrencies oer may become
were installed around the world with an average fee of a threat to society. Concerns abound that altcoins [40]
may
8.82%. An average of 3 bitcoin ATMs were being in- become tools for anonymous web criminals.
stalled per day in May 2017.[30] Cryptocurrency networks display a marked lack of regu-
The Dogecoin Foundation, a charitable organization cen- lation that attracts many users who seek decentralized ex-
tered around Dogecoin and co-founded by Dogecoin change and use of currency, however these very same lack
co-creator Jackson Palmer, donated more than $30,000 of regulations have been critiqued as potentially enabling
worth of Dogecoin to help fund the Jamaican bob- criminals who seek to evade taxes and launder money.
sled team's trip to the 2014 Olympic games in Sochi, Transactions that occur through the use and exchange of
60 CHAPTER 4. TECHNOLOGIES

these altcoins are independent from formal banking sys- as Paycoin. He is accused of masterminding an elab-
tems, and therefore can make tax evasion simpler for in- orate ponzi scheme under the guise of cloud mining
dividuals. Since charting taxable income is based upon with mining equipment hosted in a data center. He pur-
what a recipient reports to the revenue service, it becomesported the cloud miners known as hashlets to be min-
extremely dicult to account for transactions made us- ing cryptocurrency within the Zenportal cloud when in
ing existing cryptocurrencies, a mode of exchange that is fact there were no miners actively mining cryptocurrency.
complex (and in some cases impossible) to track.[40] Zenportal had over 10,000 users that had purchased hash-
[48][49]
Systems of anonymity that most cryptocurrencies oer lets for a total of over 19 million U.S. dollars.
can also serve as a simpler means to launder money. On August 24, 2016, a federal judge in Florida certi-
Rather than laundering money through an intricate net of ed a class action lawsuit[50] against defunct cryptocur-
nancial actors and oshore bank accounts, laundering rency exchange Cryptsy and Cryptsys owner. He is ac-
money through altcoins stands outside institutions and can cused of misappropriating millions of dollars of user de-
be achieved through anonymous transactions.[40] Laun- posits, destroying evidence, and is believed to have ed
dering services for cryptocurrency exist to service the to China.[51]
bitcoin currency, in which multiple sourced bitcoins are
blended to obscure the relationship between input and
output addresses.[40]

Arrests
Darknet markets
There have been arrests in the United States related to
cryptocurrency. A notable case was the arrest of Charlie
Shrem, the CEO of BitInstant.[41][42] Main article: Darknet market

Fraud Cryptocurrency is also used in controversial settings in


the form of online black markets, such as Silk Road. The
On August 6, 2013, Magistrate Judge Amos Mazzant of original Silk Road was shut down in October 2013 and
the Eastern District of Texas federal court ruled that be- there have been two more versions in use since then; the
cause cryptocurrency (expressly bitcoin) can be used as current version being Silk Road 3.0. The successful for-
money (it can be used to purchase goods and services, pay mat of Silk Road has been widely used in online dark
for individual living expenses, and exchanged for conven- markets, which has led to a subsequent decentralization
tional currencies), it is a currency or form of money. This of the online dark market. In the year following the initial
ruling allowed for the SEC to have jurisdiction over cases shutdown of Silk Road, the number of prominent dark
of securities fraud involving cryptocurrency.[43] markets increased from four to twelve, while the amount
of drug listings increased from 18,000 to 32,000.[40]
GBL, a Chinese bitcoin trading platform, suddenly shut
down on October 26, 2013. Subscribers, unable to log in, Darknet markets present growing challenges in regard to
lost up to $5 million worth of bitcoin.[44][45] legality. Bitcoins and other forms of cryptocurrency used
in dark markets are not clearly or legally classied in al-
In February 2014, cryptocurrency made national head- most all parts of the world. In the U.S., bitcoins are la-
lines due to the worlds largest bitcoin exchange, Mt. Gox,
belled as virtual assets. This type of ambiguous classi-
declaring bankruptcy. The company stated that it had lost cation puts mounting pressure on law enforcement agen-
nearly $473 million of their customers bitcoins likely due
cies around the world to adapt to the shifting drug trade
to theft. This was equivalent to approximately 750,000 of dark markets.[52]
bitcoins, or about 7% of all the bitcoins in existence. Due
to this crisis, among other news, the price of a bitcoin fell Since most darknet markets run through Tor, they can be
from a high of about $1,160 in December to under $400 found with relative ease on public domains. This means
in February.[46] that their addresses can be found, as well as customer
reviews and open forums pertaining to the drugs being
On March 31, 2015, two now-former agents from the sold on the market, all without incriminating any form
Drug Enforcement Administration and the U.S. Secret of user.[40] This kind of anonymity enables users on both
Service were charged with wire fraud, money laundering sides of dark markets to escape the reaches of law en-
and other oenses for allegedly stealing bitcoin during the forcement. The result is that law enforcement adheres to
federal investigation of Silk Road, an underground illicit a campaign of singling out individual markets and drug
black market federal prosecutors shut down in 2013.[47] dealers to cut down supply. However, dealers and sup-
On December 1, 2015, the owner of the now-defunct pliers are able to stay one step ahead of law enforce-
GAW Miners website was accused of securities fraud ment, who cannot keep up with the rapidly expanding and
following his development of the cryptocurrency known anonymous marketplaces of dark markets.[52]
4.2. CRYPTOCURRENCY 61

4.2.4 Timestamping

Cryptocurrencies use various timestamping schemes to


avoid the need for a trusted third party to timestamp
transactions added to the blockchain ledger.

Proof-of-work schemes

The rst timestamping scheme invented was the proof-


of-work scheme. The most widely used proof-of-work Crypto-currency market capitalizations as of 29 June 2017
schemes are based on SHA-256, which was introduced
by bitcoin, and scrypt, which is used by currencies
such as Litecoin.[21] The latter now dominates over the 100 billion USD and record high daily volume is larger
world of cryptocurrencies, with at least 480 conrmed than 6 billion USD.[55]
implementations.[53]
Some other hashing algorithms that are used for proof- Competition in cryptocurrency markets
of-work include CryptoNight, Blake, SHA-3, and X11.
As of July 2017, there were over 900[56] digital currencies
in existence.
Proof-of-stake and combined schemes

Some cryptocurrencies use a combined proof-of- Indices


work/proof-of-stake scheme.[21][54] The proof-of-stake
is a method of securing a cryptocurrency network and In order to follow the development of the market of cryp-
achieving distributed consensus through requesting users tocurrencies, indices keep track of notable cryptocurren-
to show ownership of a certain amount of currency. It is cies and their cumulative market value.
dierent from proof-of-work systems that run dicult
hashing algorithms to validate electronic transactions. Crypto index CRIX The cryptocurrency index CRIX
The scheme is largely dependent on the coin, and theres is a conceptual measurement jointly developed by statis-
currently no standard form of it. ticians at Humboldt University of Berlin, Singapore Man-
agement University and the enterprise CoinGecko and
was launched in 2016.[57] The index represents cryptocur-
4.2.5 Economics rency market characteristics dating back until July 31,
2014.[58][59] Its algorithm takes into account that the cryp-
tocurrency market is frequently changing, with the con-
tinuous creation of new cryptocurrencies and infrequent
trading of some of the existing ones.[60][61] Therefore, the
number of index members is adjusted quarterly accord-
ing to their relevance on the cryptocurrency market as a
whole.[58] It is the rst dynamic index reecting changes
on the cryptocurrency market.

4.2.6 List
Main article: List of cryptocurrencies

Crypto-currency market capitalizations as of 12 November 2016


4.2.7 Academic studies
Cryptocurrencies are used primarily outside existing
banking and governmental institutions, and exchanged Journals
over the Internet. While these alternative, decentralized
modes of exchange are in the early stages of development, Main article: Ledger (journal)
they have the unique potential to challenge existing sys-
tems of currency and payments. As of June 2017 total In September 2015, the establishment of the peer-
market capitalization of cryptocurrencies is bigger than reviewed academic journal Ledger (ISSN 2379-5980)
62 CHAPTER 4. TECHNOLOGIES

was announced. It will cover studies of cryptocurren- irreversible transaction using a system with native
cies and related technologies, and is published by the chargebacks, so this aspect is actually an advantage.
University of Pittsburgh.[62][63] The journal encourages
authors to digitally sign a le hash of submitted pa- Some coins may be a project with little to no com-
pers, which will then be timestamped into the bitcoin munity backing and no visible developer.[75]
blockchain. Authors are also asked to include a personal While cryptocurrencies are digital currencies that
bitcoin address in the rst page of their papers.[64][65] are managed through advanced encryption tech-
niques, many governments have taken a cautious ap-
proach toward them, fearing their lack of central
4.2.8 Criticism
control and the eects they could have on nancial
security.[76]

In December 2013, Jason O'Grady reported on var- Environmentally conscious people are concerned
ious pump and dump schemes in altcoins distinct with the enormous amount of energy that goes into
from bitcoin and Litecoin.[66] cryptocurrency mining with little to show in return,
but it is important to compare it to the consumption
Community refers to premining, hidden launches, of the legacy nancial system.[77]
or extreme rewards for the altcoin founders as a de-
ceptive practice,[67] but it can also be used as an in- Traditional nancial products have strong consumer
herent part of a digital cryptocurrencys design, as in protections. However, if bitcoins are lost or stolen,
the case of Ripple.[68] Pre-mining means currency is there is no intermediary with the power to limit con-
generated by the currencys founders prior to mining sumer losses.[78]
code being released to the public.[69]
Regulators in several countries have warned against
Most cryptocurrencies are duplicates of existing their use and some have taken concrete regulatory
cryptocurrencies with minor changes and no novel measures to dissuade users.[79]
technical developments. One such, Coinye West,
a comedy cryptocurrency alluding to the rapper The success of some cryptocurrencies has caused
Kanye West, was served a cease-and-desist letter on multi-level marketing schemes to arise with pseudo
7 January 2014, for using Wests name and implying cryptocurrencies, such as Onecoin.[80]
a connection that did not exist.[70]
Banks generally do not oer services for cryptocur- 4.2.9 See also
rencies and sometimes refuse to oer services to
virtual-currency companies.[71] Cryptographic protocol
There are ways to permanently lose cryptocurrency
from local storage due to malware or data loss. This 4.2.10 References
can also happen through the destruction of the phys-
ical media, eectively removing lost cryptocurren- [1] Andy Greenberg (20 April 2011). Crypto Currency.
cies forever from their markets.[72] Forbes.com. Retrieved 8 August 2014.
There are many perceived criteria that cryptocurren- [2] Sagona-Stophel, Katherine. Bitcoin 101 white paper
cies must reach before they can become mainstream. (PDF). Thomson Reuters. Retrieved 11 July 2016.
For example, the number of merchants accepting
[3] Tasca, Paolo (7 September 2015). Digital Currencies:
cryptocurrencies is increasing, but still only a few
Principles, Trends, Opportunities, and Risks. SSRN
merchants accept them.[73]
2657598 .
With technological advancement in cryptocurren-
cies such as bitcoin, the cost of entry for min- [4] Altcoin. Investopedia. Retrieved 8 January 2015.
ers requiring specialized hardware and software is [5] Wilmoth, Josiah. What is an Altcoin?". cryptocoin-
high.[74] snews.com. Retrieved 4 March 2015.
Cryptocurrency transactions are normally irre- [6] McDonnell, Patrick PK (9 September 2015). What
versible after a number of blocks conrm the trans- Is The Dierence Between Bitcoin, Forex, and Gold.
action. One of the features cryptocurrency lacks in NewsBTC. Retrieved 15 September 2015.
comparison to credit cards is consumer protection
against fraud, such as chargebacks.[12] This is, how- [7] Allison, Ian (8 September 2015). If Banks Want Benets
Of Blockchains, They Must Go Permissionless. News-
ever, a non-issue because third-party multisignature-
BTC. Retrieved 15 September 2015.
based escrow can be used to mediate a transac-
tion, this is eectively equivalent to enabling charge- [8] All you need to know about Bitcoin. timesondia-
backs. This is also much easier than performing an economictimes.
4.2. CRYPTOCURRENCY 63

[9] Economist Sta (31 October 2015). Blockchains: The [30] https://coinatmradar.com/charts/
great chain of being sure about things. The Economist.
Retrieved 18 June 2016. [31] Dogecoin Users Raise $30,000 to Send Jamaican Bob-
sled Team to Winter Olympics, Digital Trends, 20 January
[10] Listing of active coins. cryptocoincharts.info. 27 Febru- 2014
ary 2014.
[32] Dogecoin Community Raising $30,000 for Childrens
[11] Proof of burn (another authentication protocol forked Charity, International Business Times, 4 February 2014
from P.O.S.. en.bitcoin.it. 7 June 2013.
[33] The Big Picture Behind the News of Chinas Bitcoin Bans
[12] Jerry Brito and Andrea Castillo (2013). Bitcoin: Bitcoin Magazine. Bitcoin Magazine. Retrieved 24
A Primer for Policymakers (PDF). Mercatus Center. February 2015.
George Mason University. Retrieved 22 October 2013.
[34] Bitcoins Legality Around The World, Forbes, 31 January
[13] How Cryptocurrencies Could Upend Banks Monetary 2014
Role, American Banker, 26 May 2013
[35] 3 Reasons The IRS Bitcoin Ruling Is Good For Bitcoin,
[14] The FBIs Plan For The Millions Worth Of Bitcoins Nasdaq, 24 March 2014
Seized From Silk Road, Forbes, 4 October 2013
[36] On the Complexity and Behaviour of Cryptocurrencies
[15] 'Zerocoin' Add-on For Bitcoin Could Make It Truly Compared to Other Markets, 7 November 2014
Anonymous And Untraceable, Forbes, 26 May 2013
[37] Infringement of Kayne West Mark and Other Violations,
[16] Matthew Green (26 May 2013). Zerocoin: Anonymous Pryor Cashman LLP, 6 January 2014
Distributed E-Cash from Bitcoin (pdf). Johns Hopkins
[38] Iwamura, Mitsuru; Kitamura, Yukinobu; Matsumoto,
University.
Tsutomu (February 28, 2014). Is Bitcoin the Only Cryp-
[17] This is Huge: Gold 2.0Can code and competition build tocurrency in the Town? Economics of Cryptocurrency
a better Bitcoin?, New Bitcoin World, 26 May 2013 And Friedrich A. Hayek. SSRN 2405790 .

[18] Wei Dai (1998). B-Money. [39] doi:10.2139/ssrn.2405790

[19] Bitcoin: The Cryptoanarchists Answer to Cash. IEEE [40] ALI, S, T; CLARKE, D; MCCORRY, P; Bitcoin: Per-
Spectrum. Around the same time, Nick Szabo, a com- ils of an Unregulated Global P2P Currency [By S. T Ali,
puter scientist who now blogs about law and the history D. Clarke, P. McCorry Newcastle upon Tyne: Newcastle
of money, was one of the rst to imagine a new digital University: Computing Science, 2015. (Newcastle Uni-
currency from the ground up. Although many consider versity, Computing Science, Technical Report Series, No.
his scheme, which he calls bit gold, to be a precursor to CS-TR-1470)
Bitcoin
[41] Sidel, Robin. Bitcoin Entrepreneur Charlie Shrem Re-
[20] Bitcoin developer chats about regulation, open source, and ports to Prison.
the elusive Satoshi Nakamoto, PCWorld, 26-05-2013
[42] Tracking the Intangible: How Fraud Examiners Are
[21] Wary of Bitcoin? A guide to some other cryptocurrencies, Busting Bitcoin Fraud. Retrieved 24 February 2015.
ars technica, 26-05-2013
[43] SEC v Shavers, United States District Court Eastern Dis-
[22] Popov, Serguei (2016). The Tangle Whitepaper (PDF). trict Of Texas, 08-06-2013

[23] Snsteb, David (2016). IOTA First Chapter Synopsis. [44] Banshee bitcoins: $5 million worth of bitcoin vanish in
China. Russia Today. Retrieved 6 March 2015.
[24] Are Any Altcoins Currently Useful? No, Says Mon-
ero Developer Riccardo Spagni. Bitcoin Magazines. Re- [45] When bitcoins go bad: 4 stories of fraud, hacking, and
trieved 31 May 2016. digital currencies.. Washington Post. Retrieved 6 March
2015.
[25] UK launches initiative to explore potential of virtual cur-
rencies. The UK News. Retrieved 8 August 2014. [46] Mt. Gox Seeks Bankruptcy After $480 Million Bitcoin
Loss, Carter Dougherty and Grace Huang, Bloomberg
[26] Central Banks Face 3 New Dilemmas in the Era of Bit- News, Feb. 28, 2014
coin and Digital Currencies. Bitcoin Magazine. Re-
trieved 31 May 2016. [47] Perez, Evan. CNN Justice Reporter. CNN. Retrieved
31 March 2015.
[27] How Bitcoin Compares to Fiat Currencys House of
Cards. Bitcoin Magazine. Retrieved 31 May 2016. [48] Farivar, Cyrus. Pissed-o customers sue GAW Miners
in proposed class-action suit. Ars Technica. Retrieved 6
[28] decentralized currencies impact on central banks, rte June 2016.
News, 3 April 2014
[49] Julian, Borax (27 July 2016). Best Forex Brokers That
[29] First U.S. Bitcoin ATMs to open soon in Seattle, Austin, Oer Bitcoin (BTC/USD) Trading. FXdailyReport.Com.
Reuters, 18 February 2014 Retrieved 28 October 2016.
64 CHAPTER 4. TECHNOLOGIES

[50] Liu v. Project Investors, Inc. et al (9:16-cv-80060), [70] Kanye Wests lawyer orders Coinye to cease and desist
Florida Southern District Court. just before launch. Ars Technica. Retrieved 24 February
2015.
[51] http://cryptsyreceivership.com/
v1/wp-content/uploads/2016/08/ [71] Sidel, Robin (22 December 2013). Banks Mostly Avoid
Notice-of-Filing-Receivers-2nd-Report-8-2-16-full. Providing Bitcoin Services. Lenders Don't Share In-
pdf vestors Enthusiasm for the Virtual-Currency Craze. On-
line.wsj.com. Retrieved 29 December 2013.
[52] Raeesi, Reza (2015-04-23). The Silk Road, Bitcoins and
the Global Prohibition Regime on the International Trade [72] Keeping Your Cryptocurrency Safe, Center for a Stateless
in Illicit Drugs: Can this Storm Be Weathered?". Glendon Society, 1 April 2014
Journal of International Studies / Revue d'tudes interna-
tionales de Glendon. 8 (12). ISSN 2291-3920. [73] The Future of Cryptocurrency, Investopedia, 10 Septem-
ber 2013
[53] CryptoCoinTalk.com - Discussing the World of Cryp-
tocurrencies. CryptoCoinTalk. Retrieved 24 February [74] Want to make money o Bitcoin mining? Hint: Don't
2015. mine, The Week, 15 April 2013

[54] Sunny King, Scott Nadal (19 August 2012). PPCoin: [75] Fundamental Analysis for Cryptocurrency, Wall Street
Peer-to-Peer Crypto-Currency with Proof-of-Stake Crypto, 10 January 2014
(PDF). Retrieved 12 May 2013.
[76] Cryptocurrency and Global Financial Security Panel at
[55] https://coinmarketcap.com/charts/ Georgetown Diplomacy Conf, MeetUp, 11 April 2014
[56] coinmarketcap.com. Retrieved 16 July 2017. [77] Experiments in Cryptocurrency Sustainability, Lets Talk
Bitcoin, March 2014
[57] CRIXCRypto IndeX. crix.hu-berlin.de. Retrieved
2016-08-12. [78] Four Reasons You Shouldn't Buy Bitcoins, Forbes, 3 April
2013
[58] Simon Trimborn; Wolfgang Karl Hrdle. CRIX or eval-
uating blockchain based currencies, ISSN 1860-5664, [79] Schwartzkop, Frances (17 December 2013). Bitcoins
SFB 649 Discussion Paper 2016-021. SSRN 2800928 Spark Regulatory Crackdown as Denmark Drafts Rules.
. Bloomberg. Retrieved 29 December 2013.

[59] CRIX Discussion Paper (PDF). crix.hu-berlin.de. June [80] Ponzi-like OneCoin trading scheme swindles many in
15, 2016. Vietnam. Tuoi Tre News. 11 July 2016. Retrieved 10
November 2016.
[60] Ladislav Kristoufek (2 June 2014). What are the main
drivers of the Bitcoin price? Evidence from wavelet co-
herence analysis. p. 1 Section 1 Introduction, "(the) suc-
cess has ignited an exposition of new alternative crypto-
4.2.11 Further reading
currencies.
Chayka, Kyle (2 July 2013). What Comes After
[61] Crypto-Currency Market Capitalizations. Bitcoin?". Pacic Standard. Retrieved 18 January
2014.
[62] Introducing Ledger, the First Bitcoin-Only Academic
Journal. Motherboard. Guadamuz, Andres; Marsden, Chris (2015).
[63] Bitcoin Peer-Reviewed Academic Journal Ledger Blockchains and Bitcoin: Regulatory responses
Launches. CoinDesk. to cryptocurrencies. First Monday. 20 (12).
doi:10.5210/fm.v20i12.6198.
[64] Editorial Policies. ledgerjournal.org.

[65] How to Write and Format an Article for Ledger (PDF).


Ledger. 2015. doi:10.5195/LEDGER.2015.1.
4.2.12 External links
[66] A crypto-currency primer: Bitcoin vs. Litecoin. ZD- Media related to Cryptocurrency at Wikimedia
Net. 14 December 2013. Retrieved 29 December 2013. Commons
[67] Scamcoins. August 2013.

[68] Bradbury, Danny (25 June 2013). Bitcoins successors: 4.3 Elliptic Curve Digital Signa-
from Litecoin to Freicoin and onwards. The Guardian.
Guardian News and Media Limited. Retrieved 11 January ture Algorithm
2014.

[69] Morris, David Z (24 December 2013). Beyond bitcoin: In cryptography, the Elliptic Curve Digital Signature
Inside the cryptocurrency ecosystem. CNNMoney, a ser- Algorithm (ECDSA) oers a variant of the Digital Sig-
vice of CNN, Fortune & Money. Cable News Network. nature Algorithm (DSA) which uses elliptic curve cryp-
Retrieved 11 January 2014. tography.
4.3. ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM 65

4.3.1 Key and signature-size comparison attacker can now calculate the private key dA = skz
r
to DSA . This implementation failure was used, for example, to
extract the signing key used for the PlayStation 3 gaming-
As with elliptic-curve cryptography in general, the bit size console.[2] Another way ECDSA signature may leak pri-
of the public key believed to be needed for ECDSA is vate keys is when k is generated by a faulty random num-
about twice the size of the security level, in bits. For ex- ber generator. Such a failure in random number genera-
ample, at a security level of 80 bits (meaning an attacker tion caused users of Android Bitcoin Wallet to lose their
requires a maximum of about 280 operations to nd the funds in August 2013.[3] To ensure that k is unique for
private key) the size of an ECDSA public key would be each message one may bypass random number genera-
160 bits, whereas the size of a DSA public key is at least tion completely and generate deterministic signatures by
1024 bits. On the other hand, the signature size is the deriving k from both the message and the private key.[4]
same for both DSA and ECDSA: apx. 4t bits, where t is
the security level measured in bits, that is, about 320 bits
for a security level of 80 bits. 4.3.3 Signature verication algorithm
For Bob to authenticate Alices signature, he must have a
4.3.2 Signature generation algorithm copy of her public-key curve point QA . Bob can verify
QA is a valid curve point as follows:
Suppose Alice wants to send a signed message to
Bob. Initially, they must agree on the curve parameters 1. Check that QA is not equal to the identity element
(CURVE, G, n) . In addition to the eld and equation of O , and its coordinates are otherwise valid
the curve, we need G , a base point of prime order on the
curve; n is the multiplicative order of the point G . 2. Check that QA lies on the curve

Alice creates a key pair, consisting of a private key integer 3. Check that n QA = O
dA , randomly selected in the interval [1, n 1] ; and a
public key curve point QA = dA G . We use to After that, Bob follows these steps:
denote elliptic curve point multiplication by a scalar.
For Alice to sign a message m , she follows these steps: 1. Verify that r and s are integers in [1, n 1] . If not,
the signature is invalid.
1. Calculate e = HASH(m) , where HASH is a 2. Calculate e = HASH(m) , where HASH is the same
cryptographic hash function, such as SHA-2. function used in the signature generation.
2. Let z be the Ln leftmost bits of e , where Ln is the 3. Let z be the Ln leftmost bits of e .
bit length of the group order n .
4. Calculate w = s1 mod n .
3. Select a cryptographically secure random integer
k from [1, n 1] . 5. Calculate u1 = zw mod n and u2 = rw mod n .

4. Calculate the curve point (x1 , y1 ) = k G . 6. Calculate the curve point (x1 , y1 ) = u1 G + u2
QA . If u1 G + u2 QA = O then the signature
5. Calculate r = x1 mod n . If r = 0 , go back to step is invalid.
3.
7. The signature is valid if r x1 (mod n) , invalid
6. Calculate s = k 1 (z + rdA ) mod n . If s = 0 , go otherwise.
back to step 3.
7. The signature is the pair (r, s) . Note that using Shamirs trick, a sum of two scalar mul-
tiplications u1 G + u2 QA can be calculated faster
than two scalar multiplications done independently.[5]
When computing s , the string z resulting from
HASH(m) shall be converted to an integer. Note that
z can be greater than n but not longer.[1] 4.3.4 Correctness of the algorithm
As the standard notes, it is crucial to select dierent k
for dierent signatures, otherwise the equation in step 6 It is not immediately obvious why verication even func-
can be solved for dA , the private key: Given two signa- tions correctly. To see why, denote as C the curve point
tures (r, s) and (r, s ) , employing the same unknown k computed in step 6 of verication,
for dierent known messages m and m , an attacker can C = u1 G + u2 QA
calculate z and z , and since s s = k 1 (z z ) (all
operations in this paragraph are done modulo n ) the at- From the denition of the public key as QA = dA G ,

1
tacker can nd k = zzss . Since s = k (z + rdA ) , the C = u1 G + u2 dA G
66 CHAPTER 4. TECHNOLOGIES

Because elliptic curve scalar multiplication distributes 4.3.7 Notes


over addition,
[1] NIST FIPS 186-4, July 2013, pp. 19 and 26
C = (u1 + u2 dA ) G
[2] Console Hacking 2010 - PS3 Epic Fail, page 123128
Expanding the denition of u1 and u2 from verication
step 5, [3] Android Security Vulnerability. Retrieved February 24,
C = (zs 1
+ rdA s 1
)G 2015.

Collecting the common term s1 , [4] RFC 6979 - Deterministic Usage of the Digital Signature
1 Algorithm (DSA) and Elliptic Curve Digital Signature Al-
C = (z + rdA )s G gorithm (ECDSA)". Retrieved February 24, 2015.
Expanding the denition of s from signature step 6,
[5] The Double-Base Number System in Elliptic Curve
C = (z + rdA )(z + rdA )1 (k 1 )1 G Cryptography (PDF). Retrieved 22 April 2014.
Since the inverse of an inverse is the original element, and [6] Bendel, Mike (2010-12-29). Hackers Describe PS3 Se-
the product of an elements inverse and the element is the curity As Epic Fail, Gain Unrestricted Access. Ex-
identity, we are left with ophase.com. Retrieved 2011-01-05.
C =kG [7] Cryptology ePrint Archive: Report 2011/232. Re-
From the denition of r , this is verication step 6. trieved February 24, 2015.

This shows only that a correctly signed message will verify [8] Vulnerability Note VU#536044 - OpenSSL leaks ECDSA
correctly; many other properties are required for a secure private key through a remote timing attack
signature algorithm.
[9] ChangeLog. OpenSSL Project. Retrieved 22 April
2014.

4.3.5 Security [10] Android bug batters Bitcoin wallets. The Register. 12
August 2013.
In December 2010, a group calling itself fail0verow an-
nounced recovery of the ECDSA private key used by
Sony to sign software for the PlayStation 3 game console.
4.3.8 References
However, this attack only worked because Sony did not
Accredited Standards Committee X9, American
properly implement the algorithm, because k was static
National Standard X9.62-2005, Public Key Cryptog-
instead of random. As pointed out in the Signature gen-
raphy for the Financial Services Industry, The El-
eration algorithm section above, this makes dA solvable
[6] liptic Curve Digital Signature Algorithm (ECDSA),
and the entire algorithm useless.
November 16, 2005.
On March 29, 2011, two researchers published an IACR
paper[7] demonstrating that it is possible to retrieve a Certicom Research, Standards for ecient cryptog-
TLS private key of a server using OpenSSL that authen- raphy, SEC 1: Elliptic Curve Cryptography, Version
ticates with Elliptic Curves DSA over a binary eld via a 2.0, May 21, 2009.
timing attack.[8] The vulnerability was xed in OpenSSL
Lpez, J. and Dahab, R. An Overview of Elliptic
1.0.0e.[9]
Curve Cryptography, Technical Report IC-00-10,
In August 2013, it was revealed that bugs in some imple- State University of Campinas, 2000.
mentations of the Java class SecureRandom sometimes
generated collisions in the k value. As discussed above, Daniel J. Bernstein, Pippengers exponentiation al-
this allowed solution of the private key, in turn allowing gorithm, 2002.
stealing bitcoins from the containing wallet on Android
Daniel R. L. Brown, Generic Groups, Collision Re-
app implementations, which use Java and rely on ECDSA
sistance, and ECDSA, Designs, Codes and Cryptog-
to authenticate transactions.[10]
raphy, 35, 119152, 2005. ePrint version
This issue can be prevented by deterministic generation
of k, as described by RFC 6979. Ian F. Blake, Gadiel Seroussi, and Nigel Smart, edi-
tors, Advances in Elliptic Curve Cryptography, Lon-
don Mathematical Society Lecture Note Series 317,
Cambridge University Press, 2005.
4.3.6 See also
Hankerson, D.; Vanstone, S.; Menezes, A. (2004).
Elliptic curve cryptography Guide to Elliptic Curve Cryptography. Springer Pro-
fessional Computing. New York: Springer. ISBN
EdDSA 0-387-95273-X. doi:10.1007/b97644.
4.4. PEER-TO-PEER 67

4.3.9 External links tributed application architecture that partitions tasks or


workloads between peers. Peers are equally privileged,
Digital Signature Standard; includes info on ECDSA equipotent participants in the application. They are said
to form a peer-to-peer network of nodes.
Peers make a portion of their resources, such as process-
4.4 Peer-to-peer ing power, disk storage or network bandwidth, directly
available to other network participants, without the need
Not to be confused with Point-to-point (telecommunica- for central coordination by servers or stable hosts.[1] Peers
tions). are both suppliers and consumers of resources, in contrast
This article is about peer-to-peer computer networks. For to the traditional client-server model in which the con-
other uses, see Peer-to-peer (disambiguation). sumption and supply of resources is divided. Emerging
Peer-to-peer (P2P) computing or networking is a dis- collaborative P2P systems are going beyond the era of
peers doing similar things while sharing resources, and
are looking for diverse peers that can bring in unique re-
sources and capabilities to a virtual community thereby
empowering it to engage in greater tasks beyond those
that can be accomplished by individual peers, yet that are
benecial to all the peers.[2]
While P2P systems had previously been used in many
application domains,[3] the architecture was popularized
by the le sharing system Napster, originally released
in 1999. The concept has inspired new structures and
philosophies in many areas of human interaction. In
such social contexts, peer-to-peer as a meme refers to the
egalitarian social networking that has emerged through-
out society, enabled by Internet technologies in general.

4.4.1 Historical development


While P2P systems had previously been used in many
application domains,[3] the concept was popularized by
A peer-to-peer (P2P) network in which interconnected nodes le sharing systems such as the music-sharing application
(peers) share resources amongst each other without the use of Napster (originally released in 1999). The peer-to-peer
a centralized administrative system movement allowed millions of Internet users to connect
directly, forming groups and collaborating to become
user-created search engines, virtual supercomputers, and
lesystems. [4] The basic concept of peer-to-peer com-
puting was envisioned in earlier software systems and net-
working discussions, reaching back to principles stated in
the rst Request for Comments, RFC 1.[5]
Tim Berners-Lee's vision for the World Wide Web was
close to a P2P network in that it assumed each user of
the web would be an active editor and contributor, cre-
ating and linking content to form an interlinked web
of links. The early Internet was more open than present
day, where two machines connected to the Internet could
send packets to each other without rewalls and other se-
curity measures.[4] This contrasts to the broadcasting-like
structure of the web as it has developed over the years.[6]
As a precursor to the Internet, ARPANET was a success-
ful client-server network where every participating node
could request and serve content. However, ARPANET
was not self-organized, and it lacked the ability to pro-
vide any means for context or content-based routing be-
[7]
A network based on the client-server model, where individual yond 'simple' address-based routing.
clients request services and resources from centralized servers Therefore, a distributed messaging system that is often
68 CHAPTER 4. TECHNOLOGIES

likened as an early peer-to-peer architecture was estab-


lished: USENET. USENET was developed in 1979 and
is a system that enforces a decentralized model of control.
The basic model is a client-server model from the user or
client perspective that oers a self-organizing approach
to newsgroup servers. However, news servers commu-
nicate with one another as peers to propagate Usenet
news articles over the entire group of network servers.
The same consideration applies to SMTP email in the
sense that the core email-relaying network of mail trans-
fer agents has a peer-to-peer character, while the periph-
ery of e-mail clients and their direct connections is strictly
a client-server relationship.
In May 1999, with millions more people on the Internet,
Shawn Fanning introduced the music and le-sharing ap-
plication called Napster.[7] Napster was the beginning of Overlay network diagram for an unstructured P2P network, il-
peer-to-peer networks, as we know them today, where lustrating the ad hoc nature of the connections between nodes
participating users establish a virtual network, entirely
independent from the physical network, without having [11]
to obey any administrative authorities or restrictions.[7] other. (Gnutella, Gossip, and Kazaa are examples of
unstructured P2P protocols).[12]
Because there is no structure globally imposed upon
4.4.2 Architecture them, unstructured networks are easy to build and al-
low for localized optimizations to dierent regions of the
A peer-to-peer network is designed around the notion overlay.[13] Also, because the role of all peers in the net-
of equal peer nodes simultaneously functioning as both work is the same, unstructured networks are highly robust
clients and servers to the other nodes on the net- in the face of high rates of churnthat is, when large
work. This model of network arrangement diers from numbers of peers are frequently joining and leaving the
the clientserver model where communication is usually network.[14][15]
to and from a central server. A typical example of a le
transfer that uses the client-server model is the File Trans- However, the primary limitations of unstructured net-
fer Protocol (FTP) service in which the client and server works also arise from this lack of structure. In particular,
programs are distinct: the clients initiate the transfer, and when a peer wants to nd a desired piece of data in the
the servers satisfy these requests. network, the search query must be ooded through the
network to nd as many peers as possible that share the
data. Flooding causes a very high amount of signaling
Routing and resource discovery trac in the network, uses more CPU/memory (by re-
quiring every peer to process all search queries), and does
Peer-to-peer networks generally implement some form of not ensure that search queries will always be resolved.
virtual overlay network on top of the physical network Furthermore, since there is no correlation between a peer
topology, where the nodes in the overlay form a subset and the content managed by it, there is no guarantee that
of the nodes in the physical network. Data is still ex- ooding will nd a peer that has the desired data. Pop-
changed directly over the underlying TCP/IP network, ular content is likely to be available at several peers and
but at the application layer peers are able to communi- any peer searching for it is likely to nd the same thing.
cate with each other directly, via the logical overlay links But if a peer is looking for rare data shared by only a few
(each of which corresponds to a path through the under- other peers, then it is highly unlikely that search will be
lying physical network). Overlays are used for indexing successful.[16]
and peer discovery, and make the P2P system indepen-
dent from the physical network topology. Based on how
the nodes are linked to each other within the overlay net- Structured networks In structured peer-to-peer net-
work, and how resources are indexed and located, we can works the overlay is organized into a specic topology,
classify networks as unstructured or structured (or as a hy- and the protocol ensures that any node can eciently[17]
brid between the two).[8][9][10] search the network for a le/resource, even if the resource
is extremely rare.
Unstructured networks Unstructured peer-to-peer The most common type of structured P2P networks im-
networks do not impose a particular structure on the plement a distributed hash table (DHT),[18][19] in which a
overlay network by design, but rather are formed variant of consistent hashing is used to assign ownership
by nodes that randomly form connections to each of each le to a particular peer.[20][21] This enables peers
4.4. PEER-TO-PEER 69

brid model is to have a central server that helps peers


nd each other. Spotify is an example of a hybrid model.
There are a variety of hybrid models, all of which make
trade-os between the centralized functionality provided
by a structured server/client network and the node equal-
ity aorded by the pure peer-to-peer unstructured net-
works. Currently, hybrid models have better performance
than either pure unstructured networks or pure structured
networks because certain functions, such as searching, do
require a centralized functionality but benet from the
decentralized aggregation of nodes provided by unstruc-
tured networks.[30]

Overlay network diagram for a structured P2P network, us- Security and trust
ing a distributed hash table (DHT) to identify and locate
nodes/resources Peer-to-peer systems pose unique challenges from a
computer security perspective.
to search for resources on the network using a hash ta- Like any other form of software, P2P applications can
ble: that is, (key, value) pairs are stored in the DHT, and contain vulnerabilities. What makes this particularly dan-
any participating node can eciently retrieve the value gerous for P2P software, however, is that peer-to-peer
associated with a given key.[22][23] applications act as servers as well as clients, meaning that
they can be more vulnerable to remote exploits.[31]
Data Key Distributed
Hash Network
Fox function DFCD3454
Routing attacks Also, since each node plays a role in
The red fox
runs across
Hash
52ED879E
routing trac through the network, malicious users can
function
the ice
perform a variety of routing attacks, or denial of service
The red fox
Hash
attacks. Examples of common routing attacks include
walks across 46042841
the ice function
Peers incorrect lookup routing whereby malicious nodes de-
liberately forward requests incorrectly or return false re-
sults, incorrect routing updates where malicious nodes
Distributed hash tables
corrupt the routing tables of neighboring nodes by send-
However, in order to route trac eciently through the ing them false information, and incorrect routing net-
network, nodes in a structured overlay must maintain lists work partition where when new nodes are joining they
of neighbors that satisfy specic criteria. This makes bootstrap via a malicious node, which places the new
them less robust in networks with a high rate of churn (i.e. node in a partition of the network that is populated by
with large numbers of nodes frequently joining and leav- other malicious nodes.[32]
ing the network).[15][24] More recent evaluation of P2P
resource discovery solutions under real workloads have Corrupted data and malware See also: Data valida-
pointed out several issues in DHT-based solutions such as tion and Malware
high cost of advertising/discovering resources and static
and dynamic load imbalance.[25]
The prevalence of malware varies between dierent peer-
Notable distributed networks that use DHTs include to-peer protocols. Studies analyzing the spread of mal-
BitTorrents distributed tracker, the Kad network, the ware on P2P networks found, for example, that 63% of
Storm botnet, YaCy, and the Coral Content Distribu- the answered download requests on the Limewire net-
tion Network. Some prominent research projects include work contained some form of malware, whereas only 3%
the Chord project, Kademlia, PAST storage utility, P- of the content on OpenFT contained malware. In both
Grid, a self-organized and emerging overlay network, and cases, the top three most common types of malware ac-
CoopNet content distribution system.[26] DHT-based net- counted for the large majority of cases (99% in Limewire,
works have also been widely utilized for accomplishing and 65% in OpenFT). Another study analyzing trac on
ecient resource discovery[27][28] for grid computing sys- the Kazaa network found that 15% of the 500,000 le
tems, as it aids in resource management and scheduling sample taken were infected by one or more of the 365
of applications. dierent computer viruses that were tested for.[33]
Corrupted data can also be distributed on P2P networks
Hybrid models Hybrid models are a combination of by modifying les that are already being shared on the
peer-to-peer and client-server models.[29] A common hy- network. For example, on the FastTrack network, the
70 CHAPTER 4. TECHNOLOGIES

RIAA managed to introduce faked chunks into down- works related to the topic of data backup, recovery, and
loads and downloaded les (mostly MP3 les). Files in- availability. In a centralized network, the system admin-
fected with the RIAA virus were unusable afterwards and istrators are the only forces controlling the availability
contained malicious code. The RIAA is also known to of les being shared. If the administrators decide to no
have uploaded fake music and movies to P2P networks longer distribute a le, they simply have to remove it
in order to deter illegal le sharing.[34] Consequently, the from their servers, and it will no longer be available to
P2P networks of today have seen an enormous increase users. Along with leaving the users powerless in decid-
of their security and le verication mechanisms. Mod- ing what is distributed throughout the community, this
ern hashing, chunk verication and dierent encryption makes the entire system vulnerable to threats and requests
methods have made most networks resistant to almost any from the government and other large forces. For example,
type of attack, even when major parts of the respective YouTube has been pressured by the RIAA, MPAA, and
network have been replaced by faked or nonfunctional entertainment industry to lter out copyrighted content.
hosts.[35] Although server-client networks are able to monitor and
manage content availability, they can have more stability
in the availability of the content they choose to host. A
Resilient and scalable computer networks client should not have trouble accessing obscure content
that is being shared on a stable centralized network. P2P
See also: Wireless mesh network and Distributed com- networks, however, are more unreliable in sharing unpop-
puting ular les because sharing les in a P2P network requires
that at least one node in the network has the requested
The decentralized nature of P2P networks increases ro- data, and that node must be able to connect to the node
bustness because it removes the single point of failure requesting the data. This requirement is occasionally hard
that can be inherent in a client-server based system.[36] to meet because users may delete or stop sharing data at
As nodes arrive and demand on the system increases, the any point.[37]
total capacity of the system also increases, and the like- In this sense, the community of users in a P2P network is
lihood of failure decreases. If one peer on the network completely responsible for deciding what content is avail-
fails to function properly, the whole network is not com- able. Unpopular les will eventually disappear and be-
promised or damaged. In contrast, in a typical client come unavailable as more people stop sharing them. Pop-
server architecture, clients share only their demands with ular les, however, will be highly and easily distributed.
the system, but not their resources. In this case, as more Popular les on a P2P network actually have more sta-
clients join the system, fewer resources are available to bility and availability than les on central networks. In a
serve each client, and if the central server fails, the entire centralized network a simple loss of connection between
network is taken down. the server and clients is enough to cause a failure, but in
P2P networks the connections between every node must
be lost in order to cause a data sharing failure. In a cen-
Distributed storage and search
tralized system, the administrators are responsible for all
data recovery and backups, while in P2P systems, each
node requires its own backup system. Because of the lack
of central authority in P2P networks, forces such as the
recording industry, RIAA, MPAA, and the government
are unable to delete or stop the sharing of content on P2P
systems.[38]

4.4.3 Applications

Content delivery

In P2P networks, clients both provide and use resources.


This means that unlike client-server systems, the content-
serving capacity of peer-to-peer networks can actually in-
Search results for the query "software libre", using YaCy a free crease as more users begin to access the content (espe-
distributed search engine that runs on a peer-to-peer network in- cially with protocols such as Bittorrent that require users
stead making requests to centralized index servers (like Google, to share, refer a performance measurement study[39] ).
Yahoo, and other corporate search engines) This property is one of the major advantages of using P2P
networks because it makes the setup and running costs
There are both advantages and disadvantages in P2P net- very small for the original content distributor.[40][41]
4.4. PEER-TO-PEER 71

File-sharing networks Netsukuku, a Wireless community network de-


signed to be independent from the Internet.
Many le peer-to-peer le sharing networks, such as
Gnutella, G2, and the eDonkey network popularized Dalesa, a peer-to-peer web cache for LANs (based
peer-to-peer technologies. on IP multicasting).

Open Garden, connection sharing application that


Peer-to-peer content delivery networks. shares Internet access with other devices using Wi-
Fi or Bluetooth.
Peer-to-peer content services, e.g. caches for im-
proved performance such as Correli Caches[42] Peerspace is a peer-to-peer marketplace for booking
space for events, meetings and productions.
Software publication and distribution (Linux distri-
bution, several games); via le sharing networks. Research like the Chord project, the PAST storage
utility, the P-Grid, and the CoopNet content distri-
bution system.
Copyright infringements Peer-to-peer networking in-
volves data transfer from one user to another without JXTA, a peer-to-peer protocol designed for the Java
using an intermediate server. Companies developing platform.
P2P applications have been involved in numerous legal
cases, primarily in the United States, over conicts with The U.S. Department of Defense is conducting re-
copyright law.[43] Two major cases are Grokster vs RIAA search on P2P networks as part of its modern net-
and MGM Studios, Inc. v. Grokster, Ltd..[44] In the last work warfare strategy.[45] In May, 2003, Anthony
case, the Court unanimously held that defendant peer- Tether, then director of DARPA, testied that the
to-peer le sharing companies Grokster and Streamcast United States military uses P2P networks.
could be sued for inducing copyright infringement.

4.4.4 Social implications


Multimedia
See also: Social peer-to-peer processes
The P2PTV and PDTP protocols.

Some proprietary multimedia applications, such as


Spotify, use a peer-to-peer network along with Incentivizing resource sharing and cooperation
streaming servers to stream audio and video to their
clients. Further information: Uberisation
Cooperation among a community of participants is key
Peercasting for multicasting streams. to the continued success of P2P systems aimed at casual
human users; these reach their full potential only when
Pennsylvania State University, MIT and Simon
large numbers of nodes contribute resources. But in cur-
Fraser University are carrying on a project called
rent practice P2P networks often contain large numbers
LionShare designed for facilitating le sharing
of users who utilize resources shared by other nodes, but
among educational institutions globally.
who do not share anything themselves (often referred to
Osiris is a program that allows its users to create as the freeloader problem). Freeloading can have a
anonymous and autonomous web portals distributed profound impact on the network and [46]
in some cases can
via P2P network. cause the community to collapse. In these types of
networks users have natural disincentives to cooperate
because cooperation consumes their own resources and
Other P2P applications may degrade their own performance. [47] Studying the
social attributes of P2P networks is challenging due to
Tradepal and M-commerce applications that power large populations of turnover, asymmetry of interest and
real-time marketplaces. zero-cost identity.[47] A variety of incentive mechanisms
have been implemented to encourage or even force nodes
Bitcoin and alternatives such as Peercoin and Nxt are to contribute resources.[48]
peer-to-peer-based digital cryptocurrencies.
Some researchers have explored the benets of enabling
I2P, an overlay network used to browse the Internet virtual communities to self-organize and introduce incen-
anonymously. tives for resource sharing and cooperation, arguing that
the social aspect missing from todays P2P systems should
Innit is an unlimited and encrypted peer to peer le be seen both as a goal and a means for self-organized vir-
sharing application for digital artists written in C++. tual communities to be built and fostered.[49] Ongoing
72 CHAPTER 4. TECHNOLOGIES

gal as long as the developers had no ability to prevent the


sharing of the copyrighted material. To establish crim-
inal liability for the copyright infringement on peer-to-
peer systems, the government must prove that the defen-
dant infringed a copyright willingly for the purpose of
personal nancial gain or commercial advantage.[51] Fair
use exceptions allow limited use of copyrighted material
to be downloaded without acquiring permission from the
rights holders. These documents are usually news report-
ing or under the lines of research and scholarly work.
Controversies have developed over the concern of ille-
gitimate use of peer-to-peer networks regarding public
safety and national security. When a le is downloaded
through a peer-to-peer network, it is impossible to know
who created the le or what users are connected to the
network at a given time. Trustworthiness of sources is
a potential security threat that can be seen with peer-to-
The BitTorrent protocol: In this animation, the colored bars be- peer systems.[52]
neath all of the 7 clients in the upper region above represent the
le being shared, with each color representing an individual piece
of the le. After the initial pieces transfer from the seed (large Network neutrality
system at the bottom), the pieces are individually transferred from
client to client. The original seeder only needs to send out one Peer-to-peer applications present one of the core issues
copy of the le for all the clients to receive a copy. in the network neutrality controversy. Internet service
providers (ISPs) have been known to throttle P2P le-
sharing trac due to its high-bandwidth usage.[53] Com-
research eorts for designing eective incentive mech- pared to Web browsing, e-mail or many other uses of the
anisms in P2P systems, based on principles from game internet, where data is only transferred in short intervals
theory, are beginning to take on a more psychological and and relative small quantities, P2P le-sharing often con-
information-processing direction. sists of relatively heavy bandwidth usage due to ongoing
le transfers and swarm/network coordination packets.
In October 2007, Comcast, one of the largest broadband
Privacy and anonymity Some peer-to-peer networks Internet providers in the United States, started block-
(e.g. Freenet) place a heavy emphasis on privacy ing P2P applications such as BitTorrent. Their rationale
and anonymitythat is, ensuring that the contents of was that P2P is mostly used to share illegal content, and
communications are hidden from eavesdroppers, and their infrastructure is not designed for continuous, high-
that the identities/locations of the participants are con- bandwidth trac. Critics point out that P2P network-
cealed. Public key cryptography can be used to provide ing has legitimate legal uses, and that this is another way
encryption, data validation, authorization, and authenti- that large providers are trying to control use and con-
cation for data/messages. Onion routing and other mix tent on the Internet, and direct people towards a client-
network protocols (e.g. Tarzan) can be used to provide server-based application architecture. The client-server
anonymity.[50] model provides nancial barriers-to-entry to small pub-
lishers and individuals, and can be less ecient for shar-
ing large les. As a reaction to this bandwidth throttling,
4.4.5 Political implications several P2P applications started implementing protocol
obfuscation, such as the BitTorrent protocol encryption.
Intellectual property law and illegal sharing Techniques for achieving protocol obfuscation involves
removing otherwise easily identiable properties of pro-
Although peer-to-peer networks can be used for legit- tocols, such as deterministic byte sequences and packet
imate purposes, rights holders have targeted peer-to- sizes, by making the data look as if it were random.[54]
peer over the involvement with sharing copyrighted ma- The ISPs solution to the high bandwidth is P2P caching,
terial. Peer-to-peer networking involves data transfer where an ISP stores the part of les most accessed by P2P
from one user to another without using an interme- clients in order to save access to the Internet.
diate server. Companies developing P2P applications
have been involved in numerous legal cases, primarily
in the United States, primarily over issues surrounding 4.4.6 Current research
copyright law.[43] Two major cases are Grokster vs RIAA
and MGM Studios, Inc. v. Grokster, Ltd..[44] In both of Researchers have used computer simulations to aid in un-
the cases the le sharing technology was ruled to be le- derstanding and evaluating the complex behaviors of in-
4.4. PEER-TO-PEER 73

dividuals within the network. Networking research of- [5] RFC 1, Host Software, S. Crocker, IETF Working Group
ten relies on simulation in order to test and evaluate new (April 7, 1969)
ideas. An important requirement of this process is that
[6] Berners-Lee, Tim (August 1996). The World Wide
results must be reproducible so that other researchers can
Web: Past, Present and Future. Retrieved 5 Novem-
replicate, validate, and extend existing work. [55] If the ber 2011. Is This Peer-to-Peer About? (pp. 9-16).
research cannot be reproduced, then the opportunity for Springer Berlin Heidelberg.
further research is hindered. Even though new simu-
lators continue to be released, the research community [7] Steinmetz, R., & Wehrle, K. (2005). 2. What Is This
tends towards only a handful of open-source simulators. Peer-to-Peer About? (pp. 9-16). Springer Berlin Hei-
The demand for features in simulators, as shown by our delberg.
criteria and survey, is high. Therefore, the community
[8] Ahson, Syed A.; Ilyas, Mohammad, eds. (2008). SIP
should work together to get these features in open-source Handbook: Services, Technologies, and Security of Ses-
software. This would reduce the need for custom simula- sion Initiation Protocol. Taylor & Francis. p. 204. ISBN
tors, and hence increase repeatability and reputability of 9781420066043.
experiments. [55]
[9] Zhu, Ce; et al., eds. (2010). Streaming Media Architec-
Besides above, there have been work done on ns-2 open tures: Techniques and Applications: Recent Advances. IGI
source network simulator. One research issue related to Global. p. 265. ISBN 9781616928339.
free rider detection and punishment has been explored
using ns-2 simulator here.[56] [10] Kamel, Mina; et al. (2007). Optimal Topology Design
for Overlay Networks. In Akyildiz, Ian F. Networking
2007: Ad Hoc and Sensor Networks, Wireless Networks,
4.4.7 See also Next Generation Internet: 6th International IFIP-TC6 Net-
working Conference, Atlanta, GA, USA, May 14-18, 2007
Clientqueueclient Proceedings. Springer. p. 714. ISBN 9783540726050.

Cultural-Historical Activity Theory (CHAT) [11] Filali, Imen; et al. (2011). A Survey of Structured
P2P Systems for RDF Data Storage and Retrieval. In
End-to-end principle Hameurlain, Abdelkader; et al. Transactions on Large-
Scale Data- and Knowledge-Centered Systems III: Special
Decentralized computing Issue on Data and Knowledge Management in Grid and
Distributed Data Management Architecture PSP Systems. Springer. p. 21. ISBN 9783642230738.

Friend-to-friend [12] Zulhasnine, Mohammed; et al. (2013). P2P Streaming


Over Cellular Networks: Issues, Challenges, and Oppor-
List of P2P protocols tunities. In Pathan; et al. Building Next-Generation Con-
verged Networks: Theory and Practice. CRC Press. p. 99.
Segmented downloading ISBN 9781466507616.

Semantic P2P networks [13] Chervenak, Ann; Bharathi, Shishir (2008). Peer-to-
peer Approaches to Grid Resource Discovery. In Dane-
Sharing economy lutto, Marco; et al. Making Grids Work: Proceedings of
the CoreGRID Workshop on Programming Models Grid
Wireless ad hoc network
and P2P System Architecture Grid Systems, Tools and En-
USB dead drop vironments 12-13 June 2007, Heraklion, Crete, Greece.
Springer. p. 67. ISBN 9780387784489.

[14] Jin, Xing; Chan, S.-H. Gary (2010). Unstructured Peer-


4.4.8 References
to-Peer Network Architectures. In Shen; et al. Hand-
[1] Rdiger Schollmeier, A Denition of Peer-to-Peer Net- book of Peer-to-Peer Networking. Springer. p. 119. ISBN
working for the Classication of Peer-to-Peer Architectures 978-0-387-09750-3.
and Applications, Proceedings of the First International
[15] Lv, Qin; et al. (2002). Can Heterogeneity Make Gnutella
Conference on Peer-to-Peer Computing, IEEE (2002).
Stable?". In Druschel, Peter; et al. Peer-to-Peer Systems:
[2] Bandara, H. M. N. D; A. P. Jayasumana (2012). Collab- First International Workshop, IPTPS 2002, Cambridge,
orative Applications over Peer-to-Peer Systems Chal- MA, USA, March 7-8, 2002, Revised Papers. Springer.
lenges and Solutions. Peer-to-Peer Networking and Ap- p. 94. ISBN 9783540441793.
plications. doi:10.1007/s12083-012-0157-3.
[16] Shen, Xuemin; Yu, Heather; Buford, John; Akon, Mur-
[3] D. Barkai, Peer-to-Peer Computing, Intel Press, 2002. salin (2009). Handbook of Peer-to-Peer Networking (1st
ed.). New York: Springer. p. 118. ISBN 0-387-09750-3.
[4] Oram, A. (Ed.). (2001). Peer-to-peer: Harnessing the
Benets of a Disruptive Technologies. O'Reilly Media, [17] Typically approximating O(log N), where N is the number
Inc. of nodes in the P2P system
74 CHAPTER 4. TECHNOLOGIES

[18] Other design choices include overlay rings and d-Torus. [31] Vu, Quang H.; et al. (2010). Peer-to-Peer Computing:
See for example Bandara, H. M. N. D.; Jayasumana, Principles and Applications. Springer. p. 8. ISBN 978-3-
A. P. (2012). Collaborative Applications over Peer- 642-03513-5.
to-Peer Systems Challenges and Solutions. Peer-
to-Peer Networking and Applications. 6 (3): 257. [32] Vu, Quang H.; et al. (2010). Peer-to-Peer Computing:
doi:10.1007/s12083-012-0157-3. Principles and Applications. Springer. pp. 157159.
ISBN 978-3-642-03513-5.
[19] R. Ranjan, A. Harwood, and R. Buyya, Peer-to-peer
based resource discovery in global grids: a tutorial, IEEE [33] Goebel, Jan; et al. (2007). Measurement and Analysis
Commun. Surv., vol. 10, no. 2. and P. Truno, Peer-to- of Autonomous Spreading Malware in a University En-
Peer resource discovery in Grids: Models and systems, vironment. In Hmmerli, Bernhard Markus; Sommer,
Future Generation Computer Systems archive, vol. 23, no. Robin. Detection of Intrusions and Malware, and Vulner-
7, Aug. 2007. ability Assessment: 4th International Conference, DIMVA
2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings.
[20] Kelaskar, M.; Matossian, V.; Mehra, P.; Paul, D.; Springer. p. 112. ISBN 9783540736134.
Parashar, M. (2002). A Study of Discovery Mechanisms
for Peer-to-Peer Application{{inconsistent citations}} [34] Sorkin, Andrew Ross (4 May 2003). Software Bullet Is
Sought to Kill Musical Piracy. New York Times. Re-
[21] Dabek, Frank; Zhao, Ben; Druschel, Peter; Kubiatow-
trieved 5 November 2011.
icz, John; Stoica, Ion (2003). Towards a Common API
for Structured Peer-to-Peer Overlays. Peer-to-Peer Sys- [35] Singh, Vivek; Gupta, Himani (2012). Anonymous File
tems II. Lecture Notes in Computer Science. 2735: 33 Sharing in Peer to Peer System by Random Walks (Techni-
44. ISBN 978-3-540-40724-9. doi:10.1007/978-3-540- cal report). SRM University. 123456789/9306.
45172-3_3.
[36] Lua, Eng Keong; Crowcroft, Jon; Pias, Marcelo; Sharma,
[22] Moni Naor and Udi Wieder. Novel Architectures for P2P
Ravi; Lim, Steven (2005). A survey and comparison of
Applications: the Continuous-Discrete Approach. Proc.
peer-to-peer overlay network schemes.
SPAA, 2003.

[23] Gurmeet Singh Manku. Dipsea: A Modular Distributed [37] Balakrishnan, Hari; Kaashoek, M. Frans; Karger, David;
Hash Table Archived 2004-09-10 at the Wayback Ma- Morris, Robert; Stoica, Ion (2003). Looking up data in
chine.. Ph. D. Thesis (Stanford University), August 2004. P2P systems (PDF). Communications of the ACM. 46 (2):
4348. doi:10.1145/606272.606299. Retrieved 8 Octo-
[24] Li, Deng; et al. (2009). Vasilakos, A.V.; et al., eds. An ber 2013.
Ecient, Scalable, and Robust P2P Overlay for Autonomic
Communication. Springer. p. 329. ISBN 978-0-387- [38] Art thou a Peer?". www.p2pnews.net. 14 June 2012.
09752-7. Archived from the original on 6 October 2013. Retrieved
10 October 2013.
[25] Bandara, H. M. N. Dilum; Jayasumana, Anura P. (Jan-
uary 2012). Evaluation of P2P Resource Discovery Ar- [39] Sharma P., Bhakuni A. & Kaushal R.Performance
chitectures Using Real-Life Multi-Attribute Resource and Analysis of BitTorrent Protocol. Na-
Query Characteristics. IEEE Consumer Communications tional Conference on Communications, 2013
and Networking Conf. (CCNC '12). doi:10.1109/NCC.2013.6488040

[26] Korzun, Dmitry; Gurtov, Andrei (November 2012). [40] Li, Jin (2008). On peer-to-peer (P2P) content delivery
Structured P2P Systems: Fundamentals of Hierarchical (PDF). Peer-to-Peer Networking and Applications. 1 (1):
Organization, Routing, Scaling, and Security. Springer. 4563. doi:10.1007/s12083-007-0003-1.
ISBN 978-1-4614-5482-3.
[41] Stutzbach, Daniel; et al. (2005). The scalability of
[27] Ranjan, Rajiv; Harwood, Aaron; Buyya, Rajkumar (1 De- swarming peer-to-peer content delivery. In Boutaba,
cember 2006). A Study on Peer-to-Peer Based Discov- Raouf; et al. NETWORKING 2005 -- Networking Tech-
ery of Grid Resource Information (PDF){{inconsistent nologies, Services, and Protocols; Performance of Com-
citations}} puter and Communication Networks; Mobile and Wireless
[28] Ranjan, Rajiv; Chan, Lipo; Harwood, Aaron; Karunasek- Communications Systems (PDF). Springer. pp. 1526.
era, Shanika; Buyya, Rajkumar. Decentralised Resource ISBN 978-3-540-25809-4.
Discovery Service for Large Scale Federated Grids
[42] Gareth Tyson, Andreas Mauthe, Sebastian Kaune, Mu Mu
(PDF).
and Thomas Plagemann. Corelli: A Dynamic Replication
[29] Darlagiannis, Vasilios (2005). Hybrid Peer-to-Peer Service for Supporting Latency-Dependent Content in
Systems. In Steinmetz, Ralf; Wehrle, Klaus. Peer- Community Networks. In Proc. 16th ACM/SPIE Multi-
to-Peer Systems and Applications. Springer. ISBN media Computing and Networking Conference (MMCN),
9783540291923. San Jose, CA (2009).

[30] Yang, Beverly; Garcia-Molina, Hector (2001). [43] Glorioso, Andrea; et al. (2010). The Social Impact of
Comparing Hybrid Peer-to-Peer Systems (PDF). P2P Systems. In Shen; et al. Handbook of Peer-to-Peer
Very Large Data Bases. Retrieved 8 October 2013. Networking. Springer. p. 48. ISBN 978-0-387-09750-3.
4.5. PROOF-OF-WORK SYSTEM 75

[44] John Borland (April 25, 2003). Judge: File-Swapping Foundation of Peer-to-Peer Computing, Special Is-
Tools are Legal. news.cnet.com. Archived from the orig- sue, Elsevier Journal of Computer Communication,
inal on 2012-03-10. (Ed) Javed I. Khan and Adam Wierzbicki, Volume
31, Issue 2, February 2008
[45] Walker, Leslie (2001-11-08). Uncle Sam Wants Nap-
ster!". The Washington Post. Retrieved 2010-05-22. Anderson, Ross J. The eternity service.
[46] Krishnan, R., Smith, M. D., Tang, Z., & Telang, R. (2004,
Pragocrypt. 1996.
January). The impact of free-riding on peer-to-peer net- Marling Engle & J. I. Khan. Vulnerabilities of P2P
works. In System Sciences, 2004. Proceedings of the
systems and a critical look at their solutions, May
37th Annual Hawaii International Conference on (pp. 10-
pp). IEEE.
2006

[47] Feldman, M., Lai, K., Stoica, I., & Chuang, J. (2004,
Stephanos Androutsellis-Theotokis and Diomidis
May). Robust incentive techniques for peer-to-peer net- Spinellis. A survey of peer-to-peer content dis-
works. In Proceedings of the 5th ACM conference on tribution technologies. ACM Computing Surveys,
Electronic commerce (pp. 102-111). ACM. 36(4):335371, December 2004.

[48] Vu, Quang H.; et al. (2010). Peer-to-Peer Computing: Biddle, Peter, Paul England, Marcus Peinado, and
Principles and Applications. Springer. p. 172. ISBN 978- Bryan Willman, The Darknet and the Future of
3-642-03513-5. Content Distribution. In 2002 ACM Workshop on
Digital Rights Management, November 2002.
[49] P. Antoniadis and B. Le Grand, Incentives for resource
sharing in self-organized communities: From economics John F. Buford, Heather Yu, Eng Keong Lua P2P
to social psychology, Digital Information Management Networking and Applications. ISBN 0123742145,
(ICDIM '07), 2007 Morgan Kaufmann, December 2008
[50] Vu, Quang H.; et al. (2010). Peer-to-Peer Computing: Djamal-Eddine Meddour, Mubashar Mushtaq, and
Principles and Applications. Springer. pp. 179181. Touk Ahmed, "Open Issues in P2P Multimedia
ISBN 978-3-642-03513-5.
Streaming", in the proceedings of the 1st Multi-
[51] Majoras, D. B. (2005). Peer-to-peer le-sharing technol- media Communications Workshop MULTICOMM
ogy consumer protection and competition issues. Federal 2006 held in conjunction with IEEE ICC 2006 pp
Trade Commission, Retrieved from http://www.ftc.gov/ 4348, June 2006, Istanbul, Turkey.
reports/p2p05/050623p2prpt.pdf
Detlef Schoder and Kai Fischbach, "Core Concepts
[52] The Government of the Hong Kong Special Admin- in Peer-to-Peer (P2P) Networking". In: Subrama-
istrative Region, (2008). Peer-to-peer network. Re- nian, R.; Goodman, B. (eds.): P2P Computing: The
trieved from website: http://www.infosec.gov.hk/english/ Evolution of a Disruptive Technology, Idea Group
technical/files/peer.pdf Inc, Hershey. 2005
[53] Janko Roettgers, 5 Ways to Test Whether your ISP Ramesh Subramanian and Brian Goodman (eds),
throttles P2P, http://newteevee.com/2008/04/02/ Peer-to-Peer Computing: Evolution of a Disruptive
5-ways-to-test-if-your-isp-throttles-p2p/
Technology, ISBN 1-59140-429-0, Idea Group Inc.,
[54] Hjelmvik, Erik; John, Wolfgang (2010-07-27). Breaking Hershey, PA, United States, 2005.
and Improving Protocol Obfuscation (PDF). ISSN 1652-
926X.
Shuman Ghosemajumder. Advanced Peer-Based
Technology Business Models. MIT Sloan School of
[55] Basu, A., Fleming, S., Stanier, J., Naicken, S., Wakeman, Management, 2002.
I., & Gurbani, V. K. (2013). The state of peer-to-peer
network simulators. ACM Computing Surveys, 45(4), 46. Silverthorne, Sean. Music Downloads: Pirates-
or Customers?. Harvard Business School Working
[56] A Bhakuni, P Sharma, R Kaushal Free-rider detec- Knowledge, 2004.
tion and punishment in BitTorrent based P2P networks,
International Advanced Computing Conference, 2014. Glasnost test P2P trac shaping (Max Planck Insti-
doi:10.1109/IAdCC.2014.6779311 tute for Software Systems)

4.4.9 External links 4.5 Proof-of-work system


Ghosh Debjani, Rajan Payas, Pandey Mayank P2P-
VoD Streaming: Design Issues & User Experience A proof-of-work (POW) system (or protocol, or func-
Challenges Springer Proceedings, June 2014 tion) is an economic measure to deter denial of service
attacks and other service abuses such as spam on a net-
Glossary of P2P terminology work by requiring some work from the service requester,
76 CHAPTER 4. TECHNOLOGIES

usually meaning processing time by a computer. The con- teractive link between the requester (client) and the
cept may have been rst presented by Cynthia Dwork and provider (server). The provider chooses a challenge,
Moni Naor in a 1993 journal article.[1] The term Proof say an item in a set with a property, the requester
of Work or POW was rst coined and formalized in nds the relevant response in the set, which is sent
a 1999 paper by Markus Jakobsson and Ari Juels.[2] An back and checked by the provider. As the challenge
early example of the proof-of-work system used to give is chosen on the spot by the provider, its diculty
value to a currency is the Shell Money of the Solomon can be adapted to its current load. The work on
Islands. the requester side may be bounded if the challenge-
response protocol has a known solution (chosen by
A key feature of these schemes is their asymmetry: the
work must be moderately hard (but feasible) on the re- the provider), or is known to exist within a bounded
search space.
quester side but easy to check for the service provider.
This idea is also known as a CPU cost function, client
puzzle, computational puzzle or CPU pricing function. It 1. request service
is distinct from a CAPTCHA, which is intended for a hu- 3. challenge
2. choose

man to solve quickly, rather than a computer. Proof of


4. solve 5. response
space (PoS) proposals apply the same principle by prov-
7. grant service 6. verify
ing a dedicated amount of memory or disk space instead
Client Server
of CPU time. Proof of bandwidth approaches have been
discussed in the context of cryptocurrency. Proof of own-
ership aims at proving that specic data are held by the
prover. Solution-verication protocols do not assume such
a link: as a result the problem must be self-imposed
before a solution is sought by the requester, and
4.5.1 Background
the provider must check both the problem choice
and the found solution. Most such schemes are un-
One popular systemused in bitcoin mining and
bounded probabilistic iterative procedures such as
Hashcashuses partial hash inversions to prove that
Hashcash.
work was done, as a good-will token to send an e-
mail. For instance the following header represents
about 252 hash computations to send a message to
calvin@comics.net on January 19, 2038: 1. compute

X-Hashcash: 1:52:380119:calvin@comics.net:::9B760005E92F0DAE 2. solve


3. send
4. verify
It is veried with a single computation by checking that
Sender Receiver
the SHA-1 hash of the stamp (omit the header name X-
Hashcash: including the colon and any amount of whites-
pace following it up to the digit '1') begins with 52 binary
Known-solution protocols tend to have slightly lower vari-
zeros, that is 13 hexadecimal zeros:
ance than unbounded probabilistic protocols, because the
0000000000000756af69e2bdb930261873cd71 variance of a rectangular distribution is lower than the
Whether POW systems can actually solve a particular variance of a Poisson distribution (with the same mean).
denial-of-service issue such as the spam problem is sub- A generic technique for reducing variance is to use mul-
ject to debate;[3][4] the system must make sending spam tiple independent sub-challenges, as the average of mul-
emails obtrusively unproductive for the spammer, but tiple samples will have lower variance.
should also not prevent legitimate users from sending There are also xed-cost functions such as the time-lock
their messages. In other words, a genuine user should puzzle.
not encounter any diculties when sending an email, but
Moreover, the underlying functions used by these
an email spammer would have to expend a considerable
schemes may be:
amount of computing power to send out many emails at
once. Proof-of-work systems are being used as a prim-
itive by other more complex cryptographic systems such CPU-bound where the computation runs at the
as bitcoin which uses a system similar to Hashcash. speed of the processor, which greatly varies in time,
as well as from high-end server to low-end portable
devices.[5]
4.5.2 Variants
Memory-bound[6][7][8][9] where the computation
There are two classes of proof-of-work protocols. speed is bound by main memory accesses (either la-
tency or bandwidth), the performance of which is
Challenge-response protocols assume a direct in- expected to be less sensitive to hardware evolution.
4.5. PROOF-OF-WORK SYSTEM 77

Network-bound[10] if the client must perform few of the real-world resources required to 'mint' a POW to-
computations, but must collect some tokens from ken. In Finneys version of RPOW, the POW token is a
remote servers before querying the nal service piece of Hashcash.
provider. In this sense the work is not actually per- A website can demand a POW token in exchange for
formed by the requester, but it incurs delays anyway service. Requiring a POW token from users would in-
because of the latency to get the required tokens. hibit frivolous or excessive use of the service, sparing the
services underlying resources, such as bandwidth to the
Finally, some POW systems oer shortcut computations Internet, computation, disk space, electricity and admin-
that allow participants who know a secret, typically a pri- istrative overhead.
vate key, to generate cheap POWs. The rationale is that
Finneys RPOW system diered from a POW system in
mailing-list holders may generate stamps for every recip-
permitting random exchange of tokens without repeating
ient without incurring a high cost. Whether such a feature
the work required to generate them. After someone had
is desirable depends on the usage scenario.
spent a POW token at a website, the websites operator
could exchange that spent POW token for a new, un-
4.5.3 List of proof-of-work functions spent RPOW token, which could then be spent at some
third party web site similarly equipped to accept RPOW
Here is a list of known proof-of-work functions: tokens. This would save the resources otherwise needed
to 'mint' a POW token. The anti-counterfeit property of
the RPOW token was guaranteed by remote attestation.
Integer square root modulo a large prime[1] The RPOW server that exchanges a used POW or RPOW
token for a new one of equal value uses remote attes-
Weaken FiatShamir signatures[1]
tation to allow any interested party to verify what soft-
OngSchnorrShamir signature broken by ware is running on the RPOW server. Since the source
Pollard[1] code for Finneys RPOW software was published (under
a BSD-like license), any suciently knowledgeable pro-
Partial hash inversion[11][12][2] This paper formalizes grammer could, by inspecting the code, verify that the
the idea of a proof of work (POW) and introduces software (and, by extension, the RPOW server) never is-
the dependent idea of a bread pudding protocol", sued a new token except in exchange for a spent token of
a re-usable proof of work (RPOW) system.[13] as equal value.
Hashcash
Until 2009, Finneys system was the only RPOW sys-
Hash sequences [14] tem to have been implemented; it never saw economically
signicant use. In 2009, the bitcoin network went on-
Puzzles [15] line. Bitcoin is a proof-of-work cryptocurrency that, like
Finneys RPOW, is also based on the Hashcash POW. But
DieHellman-based puzzle[16] in bitcoin double-spend protection is provided by a de-
centralized P2P protocol for tracking transfers of coins,
Moderate[6] rather than the hardware trusted computing function used
Mbound [7] by RPOW. Bitcoin has better trustworthiness because it
is protected by computation; RPOW is protected by the
Hokkaido [8] private keys stored in the TPM hardware and manufac-
turers holding TPM private keys. Hackers who steal a
Cuckoo Cycle[9] TPM manufacturer key, or anyone capable of obtaining
the key by examining the TPM chip itself, could subvert
Merkle tree based[17] that assurance. Bitcoins are mined using the Hashcash
Guided tour puzzle protocol [10] proof-of-work function by individual nodes and veried
by the decentralized P2P bitcoin network.

4.5.4 Reusable proof-of-work as e-money


4.5.5 Useful proof-of-work
Computer scientist Hal Finney built on the proof-of-work
idea, yielding a system that exploited reusable proof of Many POW systems require the clients to do useless
work (RPOW).[18] The idea of making proofs-of-work work, such as inverting a hash function. This means that
reusable for some practical purpose had already been es- a lot of resources (mainly the electricity that powers the
tablished in 1999.[2] Finneys purpose for RPOW was as clients computers) is wasted in vain. To mitigate the loss,
token money. Just as a gold coins value is thought to be some alternative coins use a POW system where the per-
underpinned by the value of the raw gold needed to make formed work is actually useful. For example, Primecoin
it, the value of an RPOW token is guaranteed by the value requires clients to nd unknown prime numbers of cer-
78 CHAPTER 4. TECHNOLOGIES

tain types, which can have useful side-applications (see [11] Back, Adam. HashCash. Popular proof-of-work sys-
Primecoin#Proof-of-work system). tem. First announce in March 1997.

[12] Gabber, Eran; Jakobsson, Markus; Matias, Yossi; Mayer,


4.5.6 See also Alain J. (1998). Curbing junk e-mail via secure classi-
cation. Financial Cryptography: 198213.
Bitcoin [13] Wang, Xiao-Feng; Reiter, Michael (May 2003).
Cryptocurrency Defending against denial-of-service attacks with puzzle
auctions (PDF). IEEE Symposium on Security and
Bitmessage Privacy '03.

Proof-of-stake [14] Franklin, Matthew K.; Malkhi, Dahlia (1997). Auditable


metering with lightweight security. Financial Cryptogra-
phy '97. Updated version May 4, 1998.
4.5.7 Notes
[15] Juels, Ari; Brainard, John (1999). Client puzzles: A
1.^ On most Unix systems this can cryptographic defense against connection depletion at-
tacks. NDSS 99.
be veried with a command: echo -n
1:52:380119:calvin@comics.net:::9B760005E92F0DAE
[16] Waters, Brent; Juels, Ari; Halderman, John A.; Felten,
| openssl sha1 Edward W. (2004). New client puzzle outsourcing tech-
niques for DoS resistance. 11th ACM Conference on
Computer and Communications Security.
4.5.8 References
[17] Coelho, Fabien. An (almost) constant-eort solution-
[1] Dwork, Cynthia; Naor, Moni (1993). Pricing via Pro- verication proof-of-work protocol based on Merkle
cessing, Or, Combatting Junk Mail, Advances in Cryptol- trees. Cryptology ePrint Archive, Report.
ogy. CRYPTO92: Lecture Notes in Computer Science No.
740. Springer: 139147. [18] Reusable Proofs of Work. Archived from the original
on December 22, 2007.
[2] Jakobsson, Markus; Juels, Ari (1999). Proofs of Work
and Bread Pudding Protocols. Communications and Mul-
timedia Security. Kluwer Academic Publishers: 258272. 4.5.9 External links
[3] Laurie, Ben; Clayton, Richard (May 2004). Proof-of-
work proves not to work. WEIS 04.
Finneys system at the Wayback Machine (archived
December 22, 2007)
[4] Liu, Debin; Camp, L. Jean (June 2006). Proof of Work
can work - Fifth Workshop on the Economics of Informa- Bit gold. Describes a complete money system (includ-
tion Security. ing generation, storage, assay, and transfer) based on
proof of work functions and the machine architecture
[5] How powerful was the Apollo 11 computer?, a specic
problem raised by the use of these functions.
comparison that shows how dierent classes of devices
have dierent processing power.

[6] Abadi, Martn; Burrows, Mike; Manasse, Mark; Wob-


ber, Ted (2005). Moderately hard, memory-bound func-
4.6 SHA-2
tions. ACM Trans. Inter. Tech. 5 (2): 299327.
SHA-2 (Secure Hash Algorithm 2) is a set of
[7] Dwork, Cynthia; Goldberg, Andrew; Naor, Moni (2003). cryptographic hash functions designed by the United
On memory-bound functions for ghting spam. Ad- States National Security Agency (NSA).[3] Cryptographic
vances in Cryptology: CRYPTO 2003. Springer. 2729:
hash functions are mathematical operations run on digi-
426444.
tal data; by comparing the computed hash (the output
[8] Coelho, Fabien. Exponential memory-bound functions from execution of the algorithm) to a known and expected
for proof of work protocols. Cryptology ePrint Archive, hash value, a person can determine the datas integrity.
Report. For example, computing the hash of a downloaded le
[9] Tromp, John (2015). Cuckoo Cycle; a memory bound
and comparing the result to a previously published hash
graph-theoretic proof-of-work (PDF). Financial Cryp- result can show whether the download has been modied
tography and Data Security: BITCOIN 2015. Springer. or tampered with.[4] A key aspect of cryptographic hash
pp. 4962. functions is their collision resistance: nobody should be
able to nd two dierent input values that result in the
[10] Abliz, Mehmud; Znati, Taieb (December 2009). A same hash output.
Guided Tour Puzzle for Denial of Service Prevention.
Proceedings of the Annual Computer Security Applications SHA-2 includes signicant changes from its predecessor,
Conference (ACSAC) 2009. Honolulu, HI: 279288. SHA-1. The SHA-2 family consists of six hash functions
4.6. SHA-2 79

with digests (hash values) that are 224, 256, 384 or 512 A B C D E F G H
bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA- Wt
512/224, SHA-512/256.
Ch Kt
SHA-256 and SHA-512 are novel hash functions com-
puted with 32-bit and 64-bit words, respectively. They 1

use dierent shift amounts and additive constants, but


their structures are otherwise virtually identical, diering Ma
only in the number of rounds. SHA-224 and SHA-384 0
are simply truncated versions of the rst two, computed
with dierent initial values. SHA-512/224 and SHA-
512/256 are also truncated versions of SHA-512, but the A B C D E F G H
initial values are generated using the method described
in Federal Information Processing Standards (FIPS) PUB
180-4. SHA-2 was published in 2001 by the National In- One iteration in a SHA-2 family compression function. The blue
stitute of Standards and Technology (NIST) a U.S. fed- components perform the following operations:
eral standard (FIPS). The SHA-2 family of algorithms are Ch(E, F, G) = (E F ) (E G) Ma(A, B, C) = (A
B) (A C) (B C) 0 (A) = (A 2) (A
patented in US patent 6829355.[5] The United States has
13)(A 22) 1 (E) = (E 6)(E 11)(E 25)
released the patent under a royalty-free license.[6]
The bitwise rotation uses dierent constants for SHA-512. The
In 2005, an algorithm emerged for nding SHA-1 col- given numbers are for SHA-256.
lisions in about 2,000 times fewer steps than was previ- The red is addition modulo 232 for SHA-256, or 264 for SHA-
ously thought possible.[7] In 2017, an example of a SHA- 512.
1 collision was published.[8] The security margin left by
SHA-1 is weaker than intended, and its use is there-
fore no longer recommended for applications that depend with updated technical notation consistent with that de-
on collision resistance, such as digital signatures. Al- scribing the inner workings of the SHA-2 family.[11]
though SHA-2 bears some similarity to the SHA-1 algo-
In February 2004, a change notice was published for
rithm, these attacks have not been successfully extended
FIPS PUB 180-2, specifying an additional variant, SHA-
to SHA-2.
224, dened to match the key length of two-key Triple
Currently, the best public attacks break preimage resis- DES.[12] In October 2008, the standard was updated in
tance for 52 rounds of SHA-256 or 57 rounds of SHA- FIPS PUB 180-3, including SHA-224 from the change
512, and collision resistance for 46 rounds of SHA- notice, but otherwise making no fundamental changes to
256, as shown in the Cryptanalysis and validation section the standard. The primary motivation for updating the
below.[1][2] standard was relocating security information about the
SHA-256 and SHA-512, and, to a lesser degree, SHA- hash algorithms and recommendations for their use to
224 and SHA-384 are prone to length extension at- Special Publications 800-107 and 800-57.[13][14][15] De-
tacks,[9] rendering it insecure for some applications. It is tailed test data and example message digests were also
thus generally recommended to switch to SHA-3 for 512 removed from the standard, and provided as separate
bit hashes and to use SHA-512/224 and SHA-512/256 documents.[16]
instead of SHA-224 and SHA-256. This also happens to In January 2011, NIST published SP800-131A, which
be faster than SHA-224 and SHA-256 on x86-64, since specied a move from the current minimum security of
SHA-512 works on 64 bit instead of 32 bit words.[10] 80-bits (provided by SHA-1) allowable for federal gov-
ernment use until the end of 2013, with 112-bit security
(provided by SHA-2) being the minimum requirement
4.6.1 Hash standard current thereafter, and the recommended security level
from the publication date.[17]
With the publication of FIPS PUB 180-2, NIST added In March 2012, the standard was updated in FIPS PUB
three additional hash functions in the SHA family. The 180-4, adding the hash functions SHA-512/224 and
algorithms are collectively known as SHA-2, named after SHA-512/256, and describing a method for generating
their digest lengths (in bits): SHA-256, SHA-384, and initial values for truncated versions of SHA-512. Addi-
SHA-512. tionally, a restriction on padding the input data prior to
The algorithms were rst published in 2001 in the draft hash calculation was removed, allowing hash data to be
FIPS PUB 180-2, at which time public review and com- calculated simultaneously with content generation, such
ments were accepted. In August 2002, FIPS PUB 180-2 as a real-time video or audio feed. Padding the nal data
became the new Secure Hash Standard, replacing FIPS block must still occur prior to hash output.[18]
PUB 180-1, which was released in April 1995. The up- In July 2012, NIST revised SP800-57, which provides
dated standard included the original SHA-1 algorithm, guidance for cryptographic key management. The publi-
80 CHAPTER 4. TECHNOLOGIES

cation disallows creation of digital signatures with a hash lic SHA-1-signed TLS certicates from February 2017.
security lower than 112-bits after 2013. The previous re- Mozilla disabled SHA-1 in early January 2016, but had
vision from 2007 specied the cuto to be the end of to re-enable it temporally via a Firefox update, after prob-
2010.[15] In August 2012, NIST revised SP800-107 in lems with web-based user interfaces of some router mod-
the same manner.[14] els and security appliances.[31]
The NIST hash function competition selected a new hash
function, SHA-3, in 2012.[19] The SHA-3 algorithm is not 4.6.3 Cryptanalysis and validation
derived from SHA-2.
For a hash function for which L is the number of bits in
the message digest, nding a message that corresponds to
4.6.2 Applications a given message digest can always be done using a brute
force search in 2L evaluations. This is called a preimage
For more details on this topic, see Cryptographic hash attack and may or may not be practical depending on L
function Applications. and the particular computing environment. The second
criterion, nding two dierent messages that produce the
The SHA-2 hash function is implemented in some widely same message digest, known as a collision, requires on
used security applications and protocols, including TLS average only 2L/2 evaluations using a birthday attack.
and SSL, PGP, SSH, S/MIME, and IPsec. Some of the applications that use cryptographic hashes,
SHA-256 partakes in the process of authenticating such as password storage, are only minimally aected by
Debian software packages[20] and in the DKIM message a collision attack. Constructing a password that works for
signing standard; SHA-512 is part of a system to authen- a given account requires a preimage attack, as well as ac-
ticate archival video from the International Criminal Tri- cess to the hash of the original password (typically in the
bunal of the Rwandan genocide.[21] SHA-256 and SHA- shadow le) which may or may not be trivial. Revers-
512 are proposed for use in DNSSEC.[22] Unix and Linux ing password encryption (e.g., to obtain a password to try
vendors are moving to using 256- and 512-bit SHA-2 for against a users account elsewhere) is not made possible
secure password hashing.[23] by the attacks. (However, even a secure password hash
cannot prevent brute-force attacks on weak passwords.)
Several cryptocurrencies like Bitcoin use SHA-256 for
verifying transactions and calculating proof-of-work or In the case of document signing, an attacker could not
proof-of-stake. The rise of ASIC SHA-2 accelerator simply fake a signature from an existing documentthe
chips has led to the use of scrypt-based proof-of-work attacker would have to produce a pair of documents, one
schemes. innocuous and one damaging, and get the private key
holder to sign the innocuous document. There are prac-
SHA-1 and SHA-2 are the secure hash algorithms re-
tical circumstances in which this is possible; until the
quired by law for use in certain U.S. Government ap-
end of 2008, it was possible to create forged SSL certi-
plications, including use within other cryptographic al-
cates using an MD5 collision which would be accepted
gorithms and protocols, for the protection of sensitive
by widely used web browsers.[32]
unclassied information. FIPS PUB 180-1 also encour-
aged adoption and use of SHA-1 by private and com- Increased interest in cryptographic hash analysis during
mercial organizations. SHA-1 is being retired for most the SHA-3 competition produced several new attacks on
government uses; the U.S. National Institute of Standards the SHA-2 family, the best of which are given in the table
and Technology says, Federal agencies should stop us- below. Only the collision attacks are of practical com-
ing SHA-1 for...applications that require collision resis- plexity; none of the attacks extend to the full round hash
tance as soon as practical, and must use the SHA-2 fam- function.
ily of hash functions for these applications after 2010 At FSE 2012, researchers at Sony gave a presentation sug-
(emphasis in original).[24] NISTs directive that U.S. gov- gesting pseudo-collision attacks could be extended to 52
ernment agencies must stop uses of SHA-1 after 2010[25] rounds on SHA-256 and 57 rounds on SHA-512 by build-
was hoped to accelerate migration away from SHA-1. ing upon the biclique pseudo-preimage attack.[33]
The SHA-2 functions were not quickly adopted initially,
despite better security than SHA-1. Reasons might in-
clude lack of support for SHA-2 on systems running Win- Ocial validation
dows XP SP2 or older[26] and a lack of perceived ur-
gency since SHA-1 collisions had not yet been found. Main article: Cryptographic Module Validation Program
The Google Chrome team announced a plan to make their
web browser gradually stop honoring SHA-1-dependent Implementations of all FIPS-approved security functions
TLS certicates over a period from late 2014 and early can be ocially validated through the CMVP program,
2015.[27][28][29] Similarly, Microsoft announced[30] that jointly run by the National Institute of Standards and
Internet Explorer and Edge would stop honouring pub- Technology (NIST) and the Communications Security
4.6. SHA-2 81

Establishment (CSE). For informal verication, a pack- := 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5,
age to generate a high number of test vectors is made 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,
available for download on the NIST site; the resulting ver- 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,
ication, however, does not replace the formal CMVP 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,
validation, which is required by law for certain applica- 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc,
tions. 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
As of December 2013, there are over 1300 validated im- 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7,
plementations of SHA-256 and over 900 of SHA-512, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,
0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,
with only 5 of them being capable of handling messages
with a length in bits not a multiple of eight while support- 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,
0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3,
ing both variants (see SHS Validation List).
0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5,
4.6.4 Test vectors 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e63,
0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,
Hash values of an empty string (i.e., a zero-length input 0x90befa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2 Pre-
text). processing: begin with the original message of length L
bits append a single '1' bit append K '0' bits, where K is
SHA224("") 0x d14a028c2a3a2bc9476102bb288234c415a2b01f828ea62ac5b3e42f
the minimum number >= 0 such that L + 1 + K + 64 is
SHA256("") 0x e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
a multiple of 512 append L as a 64-bit big-endian inte-
SHA384("") 0x 38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b
ger, making the total post-processed length a multiple of
SHA512("") 0x cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b08318d2877eec2f6
512 bits Process the message in successive 512-bit chunks:
SHA512/224("") 0x 6ed0dd02806fa89e25de060c19d3ac86cabb87d6a0ddd05c333b84f4
break message into 512-bit chunks for each chunk cre-
SHA512/256("") 0x c672b8d1ef56ed28ab87c3622c5114069bdd3ad7b8f9737498d0c01ecef0967a
ate a 64-entry message schedule array w[0..63] of 32-bit
Even a small change in the message will (with overwhelm- words (The initial values in w[0..63] don't matter, so many
ing probability) result in a mostly dierent hash, due to implementations zero them here) copy chunk into rst 16
the avalanche eect. For example, adding a period to the words w[0..15] of the message schedule array Extend the
end of this sentence changes almost half (111 out of 224) rst 16 words into the remaining 48 words w[16..63] of
of the bits in the hash: the message schedule array: for i from 16 to 63 s0 :=
SHA224("The quick brown fox (w[i-15] rightrotate 7) xor (w[i-15] rightrotate 18) xor
jumps over the lazy dog") 0x (w[i-15] rightshift 3) s1 := (w[i-2] rightrotate 17) xor
730e109bd7a8a32b1cb9d9a09aa2325d2430587ddbc0c38bad911525 (w[i-2] rightrotate 19) xor (w[i-2] rightshift 10) w[i] :=
SHA224("The quick brown fox w[i-16] + s0 + w[i-7] + s1 Initialize working variables to
jumps over the lazy dog.) 0x current hash value: a := h0 b := h1 c := h2 d := h3 e := h4
619cba8e8e05826e9b8c519c0a5c68f4fb653e8a3d8aa04bb2c8cd4c f := h5 g := h6 h := h7 Compression function main loop:
for i from 0 to 63 S1 := (e rightrotate 6) xor (e rightro-
tate 11) xor (e rightrotate 25) ch := (e and f) xor ((not
4.6.5 Pseudocode e) and g) temp1 := h + S1 + ch + k[i] + w[i] S0 := (a
rightrotate 2) xor (a rightrotate 13) xor (a rightrotate
Pseudocode for the SHA-256 algorithm follows. Note 22) maj := (a and b) xor (a and c) xor (b and c) temp2
the great increase in mixing between bits of the w[16..63] := S0 + maj h := g g := f f := e e := d + temp1 d := c c :=
words compared to SHA-1. b b := a a := temp1 + temp2 Add the compressed chunk
to the current hash value: h0 := h0 + a h1 := h1 + b h2 :=
Note 1: All variables are 32 bit unsigned integers and ad-
h2 + c h3 := h3 + d h4 := h4 + e h5 := h5 + f h6 := h6 +
dition is calculated modulo 232 Note 2: For each round,
g h7 := h7 + h Produce the nal hash value (big-endian):
there is one round constant k[i] and one entry in the mes-
digest := hash := h0 append h1 append h2 append h3
sage schedule array w[i], 0 i 63 Note 3: The com-
append h4 append h5 append h6 append h7
pression function uses 8 working variables, a through h
Note 4: Big-endian convention is used when expressing the The computation of the ch and maj values can be opti-
constants in this pseudocode, and when parsing message mized the same way as described for SHA-1.
block data from bytes to words, for example, the rst word SHA-224 is identical to SHA-256, except that:
of the input message abc after padding is 0x61626380
Initialize hash values: (rst 32 bits of the fractional the initial hash values h0 through h7 are dierent,
parts of the square roots of the rst 8 primes 2..19): and
h0 := 0x6a09e667 h1 := 0xbb67ae85 h2 := 0x3c6ef372
h3 := 0xa5453a h4 := 0x510e527f h5 := 0x9b05688c the output is constructed by omitting h7.
h6 := 0x1f83d9ab h7 := 0x5be0cd19 Initialize array of
round constants: (rst 32 bits of the fractional parts of SHA-224 initial hash values (in big endian): (The second
the cube roots of the rst 64 primes 2..311): k[0..63] 32 bits of the fractional parts of the square roots of the
82 CHAPTER 4. TECHNOLOGIES

9th through 16th primes 23..53) h[0..7] := 0xc1059ed8, 0x34b0bcb5e19b48a8, 0x391c0cb3c5c95a63,


0x367cd507, 0x3070dd17, 0xf70e5939, 0xc00b31, 0x4ed8aa4ae3418acb, 0x5b9cca4f7763e373,
0x68581511, 0x64f98fa7, 0xbefa4fa4 0x682e63d6b2b8a3, 0x748f82ee5defb2fc,
SHA-512 is identical in structure to SHA-256, but: 0x78a5636f43172f60, 0x84c87814a1f0ab72,
0x8cc702081a6439ec, 0x90befa23631e28,
0xa4506cebde82bde9, 0xbef9a3f7b2c67915,
the message is broken into 1024-bit chunks, 0xc67178f2e372532b, 0xca273eceea26619c,
the initial hash values and round constants are ex- 0xd186b8c721c0c207, 0xeada7dd6cde0eb1e,
tended to 64 bits, 0xf57d4f7fee6ed178, 0x06f067aa72176fba,
0x0a637dc5a2c898a6, 0x113f9804bef90dae,
there are 80 rounds instead of 64, 0x1b710b35131c471b, 0x28db77f523047d84,
0x32caab7b40c72493, 0x3c9ebe0a15c9bebc,
the message schedule array w has 80 64-bit words 0x431d67c49c100d4c, 0x4cc5d4becb3e42b6,
instead of 64 32-bit words, 0x597f299cfc657e2a, 0x5fcb6fab3ad6faec,
0x6c44198c4a475817] SHA-512 Sum & Sigma:
to extend the message schedule array w, the loop is
S0 := (a rightrotate 28) xor (a rightrotate 34) xor
from 16 to 79 instead of from 16 to 63,
(a rightrotate 39) S1 := (e rightrotate 14) xor (e
the round constants are based on the rst 80 primes rightrotate 18) xor (e rightrotate 41) s0 := (w[i-15]
2..409, rightrotate 1) xor (w[i-15] rightrotate 8) xor (w[i-15]
rightshift 7) s1 := (w[i-2] rightrotate 19) xor (w[i-2]
the word size used for calculations is 64 bits long, rightrotate 61) xor (w[i-2] rightshift 6)
the appended length of the message (before pre- SHA-384 is identical to SHA-512, except that:
processing), in bits, is a 128-bit big-endian integer,
and the initial hash values h0 through h7 are dierent
the shift and rotate amounts used are dierent. (taken from the 9th through 16th primes), and

the output is constructed by omitting h6 and h7.


SHA-512 initial hash values (in big-endian): h[0..7]
:= 0x6a09e667f3bcc908, 0xbb67ae8584caa73b,
0x3c6ef372fe94f82b, 0xa5453a5f1d36f1, SHA-384 initial hash values (in big-endian): h[0..7]
0x510e527fade682d1, 0x9b05688c2b3e6c1f, := 0xcbbb9d5dc1059ed8, 0x629a292a367cd507,
0x1f83d9abfb41bd6b, 0x5be0cd19137e2179 SHA-512 0x9159015a3070dd17, 0x152fecd8f70e5939,
round constants: k[0..79] := [ 0x428a2f98d728ae22, 0x67332667c00b31, 0x8eb44a8768581511,
0x7137449123ef65cd, 0xb5c0fbcfec4d3b2f, 0xdb0c2e0d64f98fa7, 0x47b5481dbefa4fa4
0xe9b5dba58189dbbc, 0x3956c25bf348b538, SHA-512/t is identical to SHA-512 except that:
0x59f111f1b605d019, 0x923f82a4af194f9b,
0xab1c5ed5da6d8118, 0xd807aa98a3030242,
0x12835b0145706fbe, 0x243185be4ee4b28c, the initial hash values h0 through h7 are given by the
0x550c7dc3d5b4e2, 0x72be5d74f27b896f, SHA-512/t IV generation function,
0x80deb1fe3b1696b1, 0x9bdc06a725c71235,
0xc19bf174cf692694, 0xe49b69c19ef14ad2, the output is constructed by truncating the concate-
0xefbe4786384f25e3, 0x0fc19dc68b8cd5b5, nation of h0 through h7 at t bits,
0x240ca1cc77ac9c65, 0x2de92c6f592b0275,
0x4a7484aa6ea6e483, 0x5cb0a9dcbd41fbd4, t equal to 384 is not allowed, instead SHA-384
0x76f988da831153b5, 0x983e5152ee66dfab, should be used as specied, and
0xa831c66d2db43210, 0xb00327c898fb213f,
0xbf597fc7beef0ee4, 0xc6e00bf33da88fc2, t values 224 and 256 are especially mentioned as ap-
0xd5a79147930aa725, 0x06ca6351e003826f, proved.
0x142929670a0e6e70, 0x27b70a8546d22c,
0x2e1b21385c26c926, 0x4d2c6dfc5ac42aed,
0x53380d139d95b3df, 0x650a73548baf63de, The SHA-512/t IV generation function evaluates a modi-
0x766a0abb3c77b2a8, 0x81c2c92e47edaee6, ed SHA-512 on the ASCII string SHA-512/t", substi-
0x92722c851482353b, 0xa2bfe8a14cf10364, tuted with the decimal representation of t. The modied
0xa81a664bbc423001, 0xc24b8b70d0f89791, SHA-512 is the same as SHA-512 except its initial values
0xc76c51a30654be30, 0xd192e819d6ef5218, h0 through h7 have each been XORed with the hexadec-
0xd69906245565a910, 0xf40e35855771202a, imal constant 0xa5a5a5a5a5a5a5a5.
0x106aa07032bbd1b8, 0x19a4c116b8d2d0c8, Sample C implementation for SHA-2 family of hash
0x1e376c085141ab53, 0x2748774cdf8eeb99, functions can be found in RFC 6234.
4.6. SHA-2 83

4.6.6 Comparison of SHA functions Skein-512 and the SHA-2 family (PDF). IACR Cryptol-
ogy ePrint Archive. 2011:286.
In the table below, internal state means the internal hash
[2] Mario Lamberger & Florian Mendel (2011). Higher-
sum after each compression of a data block. Order Dierential Attack on Reduced SHA-256 (PDF).
Further information: MerkleDamgrd construction IACR Cryptology ePrint Archive. 2011:37.

[3] On the Secure Hash Algorithm family (PDF).


In the bitwise operations column, Rot stands for rotate
[4] Cryptographic Hash Function. About.com. Retrieved
no carry, and Shr stands for right logical shift. All of
2014-08-18.
these algorithms employ modular addition in some fash-
ion except for SHA-3. [5] US 6829355
More detailed performance measurements on modern [6] Licensing Declaration for US patent 6829355.. Re-
processor architectures are given in the table below. trieved 2008-02-17.
The performance numbers labeled 'x86' were running us- [7] Schneier on Security: Cryptanalysis of SHA-1.
ing 32-bit code on 64-bit processors, whereas the 'x86- Schneier.com. Retrieved 2011-11-08.
64' numbers are native 64-bit code. While SHA-256
is designed for 32-bit calculations, it does benet from [8] Cryptology Group at Centrum Wiskunde & Informatica
(CWI) and the Google Research Security, Privacy and
code optimized for 64-bit processors on the x86 archi-
Anti-abuse Group. Shattered: We have broken SHA-1
tecture. 32-bit implementations of SHA-512 are signi-
in practice. SHAttered. Retrieved 2017-02-23.
cantly slower than their 64-bit counterparts. Variants of
both algorithms with dierent output sizes will perform [9] http://netifera.com/research/flickr_api_signature_
similarly, since the message expansion and compression forgery.pdf
functions are identical, and only the initial hash values
[10] https://www.cryptologie.net/article/400/
and output sizes are dierent. The best implementations maybe-dont-skip-sha-3/
of MD5 and SHA-1 perform between 4.5 and 6 cycles
per byte on modern processors. [11] Federal Register Notice 02-21599, Announcing Approval
of FIPS Publication 180-2
Testing was performed by the University of Illinois at
Chicago on their hydra8 system running an Intel Xeon [12] FIPS 180-2 with Change Notice 1 (PDF). csrc.nist.gov.
E3-1275 V2 at a clock speed of 3.5 GHz, and on their
[13] Federal Register Notice E8-24743, Announcing Approval
hydra9 system running an AMD A10-5800K at a clock of FIPS Publication 180-3
speed of 3.8 GHz.[45] The referenced cycles per byte
speeds above are the median performance of an algo- [14] FIPS SP 800-107 Recommendation for Applications Us-
rithm digesting a 4,096 byte message using the SU- ing Approved Hash Algorithms
PERCOP cryptographic benchmarking software.[46] The [15] FIPS SP 800-57 Recommendation for Key Management:
MiB/s performance is extrapolated from the CPU clock- Part 1: General
speed on a single core; real-world performance will vary
due to a variety of factors. [16] NIST.gov - Computer Security Division - Computer Se-
curity Resource Center.

[17] FIPS SP 800-131A Recommendation for Transitioning


4.6.7 See also the Use of Cryptographic Algorithms and Key Lengths
Comparison of cryptographic hash functions [18] Federal Register Notice 2012-5400, Announcing Ap-
proval of FIPS Publication 180-4
Hash-based message authentication code
[19] NIST Selects Winner of Secure Hash Algorithm (SHA-
Hashcash 3) Competition. Retrieved 24 February 2015.
International Association for Cryptologic Research [20] Debian codebase in Google Code. Google. Archived
(IACR) from the original on November 7, 2011. Retrieved 2011-
11-08.
sha1sum (sha224sum, sha256sum, sha384sum and
sha512sum) commands [21] John Marko, A Tool to Verify Digital Records, Even as
Technology Shifts, New York Times, January 26, 2009
Trusted timestamping
[22] RFC 5702,RFC-Editor.org

[23] Ulrich Drepper, Unix crypt with SHA-256/512


4.6.8 References
[24] National Institute on Standards and Technology Computer
[1] Dmitry Khovratovich, Christian Rechberger & Alexandra Security Resource Center, NISTs Policy on Hash Func-
Savelieva (2011). Bicliques for Preimages: Attacks on tions, accessed March 29, 2009.
84 CHAPTER 4. TECHNOLOGIES

[25] Secure Hashing. NIST. Retrieved 2010-11-25. [41] The MD5 Message-Digest Algorithm. Retrieved 2016-
04-18. In the unlikely event that b is greater than 2^64,
[26] Microsoft Corporation,Overview of Windows XP Service then only the low-order 64 bits of b are used.
Pack 3
[42] Announcing the rst SHA1 collision. Retrieved 2017-
[27] Chromium Blog, September 5, 2014, Gradually sunset- 02-23.
ting SHA-1
[43] The Sponge Functions Corner. Retrieved 2016-01-27.
[28] Eric Mill. SHAAAAAAAAAAAAA.
SHAAAAAAAAAAAAA.com. [44] The Keccak sponge function family. Retrieved 2016-
01-27.
[29] Filippo Valsorda, The Unocial Chrome SHA1 Depre-
cation FAQ [45] SUPERCOP Benchmarks Measurements of hash func-
tions, indexed by machine
[30] An update to our SHA-1 deprecation roadmap -
Microsoft Edge Dev BlogMicrosoft Edge Dev Blog. [46] SUPERCOP. Retrieved 24 February 2015.
blogs.windows.com. Retrieved 2016-11-28.

[31] Fabian A. Scherschel, HeiseSecurity: Firefox: Mozilla Additional reading


schaltet SHA-1 ab und direkt wieder an (german)
Henri Gilbert, Helena Handschuh: Security Analy-
[32] Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Ar- sis of SHA-256 and Sisters. Selected Areas in Cryp-
jen Lenstra, David Molnar, Dag Arne Osvik, Benne de tography 2003: pp175193
Weger, MD5 considered harmful today: Creating a rogue
CA certicate, accessed March 29, 2009. Proposed Revision of Federal Information Pro-
cessing Standard (FIPS) 180, Secure Hash Stan-
[33] Ji Li, Takanori Isobe and Kyoji Shibutani, Sony China
dard. Federal Register. 59 (131): 3531735318.
Research Laboratory and Sony Corporation, Converting
1994-07-11. Retrieved 2007-04-26.
Meet-in-the-Middle Preimage Attack into Pseudo Colli-
sion Attack: Application to SHA-2

[34] Somitra Kumar Sanadhya & Palash Sarkar (2008). New 4.6.9 External links
Collision Attacks Against Up To 24-step SHA-2 (PDF).
IACR Cryptology ePrint Archive. 2008:270. Descriptions of SHA-256, SHA-384, and SHA-512
from NIST
[35] Kazumaro Aoki; Jian Guo; Krystian Matusiewicz; Yu
Sasaki & Lei Wang (2009). Preimages for step-reduced SHA-2 Checker SHAChecker check your SSL
SHA-2. Advances in Cryptology - ASIACRYPT 2009. compatibility for SHA-2.
Lecture Notes in Computer Science. Springer Berlin Hei-
delberg. 5912: 578597. ISBN 978-3-642-10366-7. Specications for a Secure Hash Standard (SHS)
ISSN 0302-9743. doi:10.1007/978-3-642-10366-7_34. Draft for proposed SHS (SHA-0)

[36] Jian Guo; San Ling; Christian Rechberger & Huaxiong Secure Hash Standard (SHS) Proposed SHS
Wang (2010). Advanced meet-in-the-middle preimage (SHA-0)
attacks: First results on full Tiger, and improved results
on MD4 and SHA-2 (PDF). Advances in Cryptology - CSRC Cryptographic Toolkit Ocial NIST site
ASIACRYPT 2010. Lecture Notes in Computer Science. for the Secure Hash Standard
Springer Berlin Heidelberg. 6477: 5675. ISBN 978-
3-642-17373-8. ISSN 0302-9743. doi:10.1007/978-3-
FIPS PUB 180-4: Secure Hash Standard (SHS)
642-17373-8_4. (PDF, 1.7 MB) Current version of the Secure Hash
Standard (SHA-1, SHA-224, SHA-256, SHA-384,
[37] Florian Mendel; Tomislav Nad; Martin Schler (2013). and SHA-512), March 2012
Improving Local Collisions: New Attacks on Reduced
SHA-256. Advances in Cryptology EUROCRYPT 2013. Test vectors for SHA-256/384/512 from the
Lecture Notes in Computer Science. Springer Berlin Hei- NESSIE project
delberg. 7881: 262278. ISBN 978-3-642-38348-9.
ISSN 0302-9743. doi:10.1007/978-3-642-38348-9_16. Test vectors for SHA-1, SHA-2 from NIST site

[38] Maria Eichlseder and Florian Mendel and Martin Schlf- NIST Cryptographic Hash Project SHA-3 competi-
fer (2014). Branching Heuristics in Dierential Colli- tion
sion Search with Applications to SHA-512 (PDF). IACR
RFC 3874: A 224-bit One-way Hash Function:
Cryptology ePrint Archive. 2014:302.
SHA-224.
[39] Christoph Dobraunig; Maria Eichlseder & Florian Mendel
(2016). Analysis of SHA-512/224 and SHA-512/256 RFC 6234: US Secure Hash Algorithms SHA and
(PDF). SHA-based HMAC and HKDF. Contains sample C
implementation.
[40] http://bench.cr.yp.to/results-hash.html#amd64-skylake
Chapter 5

Exchanges

5.1 ANX (Hong Kong company) ANX Blockchain Services (ABS)

ANX INTERNATIONAL (formerly known as Asia Launched in May 2016,[14] ANX Blockchain Services is
Nexgen[1] ) is a Hong Kong-based nancial technology a cloud platform built on blockchain technology, which
company that provides solutions based on blockchain can be implemented across a wide range of industries.[15]
technology. The company serves over 3 million users in It is a self-service platform for users to create digital as-
more than 50 countries and has processed over 100 mil- sets, digital wallets, and branded exchange platforms.[16]
lion transactions since its establishment.[2] In 2016, ANX Potential applications include loyalty programs, payment
launched ANX Blockchain Services (ABS), which is a applications, token systems, voucher systems, coupon ap-
cloud platform for customers to generate digital assets, plications, registry systems and more. ABS requires no
digital wallets, and branded exchange platforms.[3] software installation and is free to use.[17] Users can cre-
ate unique customised digital assets to suit their business
needs and determine how many digital assets to create.[18]
Digital wallets and exchange platforms can be customised
with company logo, colour scheme, and personalised con-
5.1.1 Company Growth tent, allowing digital assets to be sent and received within
the network.[3] Added-on managed services are also avail-
ANX International was founded in 2013 by Ken Lo, Dave able for ABS users.
Chapman and Hugh Madden. Lo now serves as Chief Ex-
ecutive Ocer, Chapman serves as Chief Operating Of-
cer, and Madden serves as Chief Technology Ocer.[2]
Digital Assets White Label Solutions
In February 2014, the company launched the worlds rst
digital assets physical retail store in Sai Ying Pun, Hong Digital Assets White Label Solutions include technical
Kong,[4][5] allowing buyers to walk into the store, pay cash development, infrastructure hosting, maintenance and se-
and send digital assets to their virtual wallets instead of curity, customer support, payment processing, distribu-
buying with credit cards on online exchanges.[6][7] tion, and regulatory compliance.[19] ANX provides digital
In March 2014, ANX International announced the launch assets exchange setup, coin development, API for custom
of digital asset ATMs,[8] which were the rst digital asset digital assets, mobile app and wallet services.
ATMs in Hong Kong.[9] The machines accept deposits of
Hong Kong dollars in exchange for digital assets.
In July 2014, ANX introduced one of the rst digital asset ANXPRO
debit cards that can be used worldwide at any merchant
that support the respective payment networks.[10][11] To ANX operates a digital assets exchange platform called
remedy the situation of digital assets not being widely ac- ANXPRO.[20] It originated from ANXBTC and is de-
cepted, ANX merged digital assets with traditional card signed for experienced digital assets traders, specialis-
payments.[12] Users can reload funds to the debit cards ing in Altcoins, Algos and Performance. The order en-
with digital assets and the card can then be used for both gine delivers pre-scan pricing and users can choose to
online and Point of Sale purchases, as well as withdrawals either x the quantity of digital assets or x the price
through the Global AT&T Network.[13] paid for every order. The trading platform is modelled
on the same LMAX/disruptor pattern leveraged by the
worlds largest investment banks. It also features one con-
solidated shared order book for blended multi-currency
5.1.2 Major Products and Services settlement in addition to real time FX pricing and risk
management.[21]

85
86 CHAPTER 5. EXCHANGES

ANX Vault App platforms transactions between digital assets and at cur-
rencies in the US, Canada and the European Union.[35]
In April 2014, ANX Vault App was launched on the App In January 2015, ANX added Black Gold Coin,[36]
Store[22] and Google Play Store.[23] Users can login their which was launched by National Aten Coin.[37] Clients
ANXPRO account via a mobile interface using the app. in National Aten Coin (NAC) will have instant access to
It features high security encryption, one-time passwords, ANXPROs UI, shared order book for multi-currency set-
and send privilege controls. The app relies on industrial tlement, real time FX pricing, deposit options and risk
strength security standards, including a three-factor au- management and trading tools.[38]
thentication optical. It supports major at currencies and
digital assets.[24] All customer funds are held in cold stor- In October 2016, ANX became one of the rst join-
age for protection against hackers.[25] ANX works with a ers of the Multichain partner program for blockchain
leading provider of DDoS protection services, and multi- developers, along with Accenture, D+H, Mphasis and
rewall protection is also implemented into services. All more.[39][40] The program is designed to foster the re-
servers are hosted in a Tier 3 compliant data centre.[1] lationship between Multichain and the growing num-
ber of IT consulting companies and blockchain solution
providers building on the platform.[41]
Payment Solutions

ANX Payment Solutions oer transaction acquiring ser- 5.1.5 Awards and Recognitions
vices and digital asset debit card payout solutions.[26]
ANX is one of the rst digital assets exchanges in Hong 2015
Kong to ocially be issued the Money Services Opera-
Hong Kongs Most Valuable Companies Award[42]
tor (MSO) license,[27] providing day-to-day foreign ex-
change services for worldwide markets.
2016

Next Commerce Solutions 25 Most Recommended Banking Services


Provider[43]
ANX Next Commerce Solutions oer customers advi-
sory services and managed services, including customised UKTI UK FinTech Awards 2016 Merit Prize[44]
digital asset solutions, technological advices, regulatory Top 12 FinTech Startups in Hong Kong[45]
compliance, systems administration, customer service
and more.[28]
5.1.6 References
5.1.3 Acquisitions [1] Best Coin Exchange ANXBTC. bestcoinex-
change.com. Retrieved 2017-01-25.
In November 2014, ANX acquired Norwegian exchange [2] About Us | ANX INTERNATIONAL. anxintl.com.
Justcoin,[29] expanding its presence in the European mar- Retrieved 2017-01-25.
ket. Justcoin moved to run on ANX infrastructure and
incorporated features available from ANX technology. [3] ANX Blockchain Services | ABS. abs.anxintl.com. Re-
ANX was able to migrate the Justcoin platform in less trieved 2017-01-25.
than a week[30] with proprietary trading engine and [4] "'Worlds rst' Bitcoin shop opens doors in Hong Kong.
white-label capabilities. The Straits Times. 2014-02-28. Retrieved 2017-01-25.
In January 2015, ANX announced the acquisition of
[5] Bitcoin ATMs Open in Singapore. The Wall Street Jour-
CoinMkt,[31] the Santa Monica-based digital assets ex- nal. Retrieved 2017-01-25.
change. CoinMkt continued to operate under its original
brand name, but resided under the umbrella of ANX.[32] [6] Bitcoin exchange opens in Hong Kong - CNN Video, re-
trieved 2017-01-25

[7] A Look at the Worlds First Bitcoin Shop, Bloomberg.com,


5.1.4 Agreements retrieved 2017-01-25

The Payment Processing specialist Vogogo signed an [8] Three companies set to launch bitcoin ATMs in Hong
agreement with ANXPRO and The Rock Trading Com- Kong within days. South China Morning Post. Retrieved
2017-01-25.
pany of Malta, a Maltese-based exchanges, in December
2014.[33] Rock Trading and ANXPRO will be integrated [9] Justice, Adam (2014-03-13). Hong Kong Company
with Vogogos payment processing and risk management Launches Citys First Bitcoin ATM. International Busi-
platform,[34] enabling each to oer users their respective ness Times UK. Retrieved 2017-01-25.
5.2. BITINSTANT 87

[10] Hong Kong Exchange ANX Launches Bitcoin Debit [31] Honk Kong Bitcoin Exchange ANX Acquires Coin-
Card. CoinDesk. July 15, 2014. Retrieved May 30, MKT. NEWSBTC. 2015-01-27. Retrieved 2017-01-26.
2015.
[32] Hong Kong Exchange ANX Chases US Market with
[11] ANX Issues Worlds First Bitcoin Debit Card. CoinMKT Acquisition. CoinDesk. 2015-01-27. Re-
CoinTelegraph. July 13, 2014. Retrieved May 30, 2015. trieved 2017-01-26.
[12] ANX Issues Worlds First Bitcoin Debit Card. Coin- [33] Bitcoin Exchanges ANXPro and Rock Trading Integrate
Telegraph. 13 July 2014. Retrieved 1 June 2015. with Vogogo. MarketWatch. Retrieved 2017-01-26.
[13] Keiser Report: (Dis-)harmony with Cash (E702)".
[34] Vogogo to Handle Payments for ANXPro, the Rock
Youtube. RT Keiser Report. Retrieved 1 June 2015.
Trading Company | Finance Magnates. Finance Mag-
[14] ANX Launches The Worlds First Free and Instant Ac- nates | Financial and business news. 2014-12-07. Re-
cess to Blockchain Applications - Press Release. Coin- trieved 2017-01-26.
Desk. Retrieved 2017-01-25.
[35] Bitcoin Exchanges ANXPro and Rock Trading Integrate
[15] ANX launches free instant access to blockchain appli- with Vogogo. Marketwired. 2014-12-05. Retrieved
cations | Computerworld Hong Kong. Computerworld 2017-01-27.
Hong Kong. Retrieved 2017-01-25.
[36] ANXPRO Exchange To Include Aten Black Gold Coin
[16] ANX Launches The Worlds First Free and Instant Ac- In 2015 | Business Wire. www.businesswire.com. Re-
cess to Blockchain Applications. Retrieved 2017-01-25. trieved 2017-01-26.
[17] Kastelein, Richard (2016-05-18). Hong Kongs ANX In- [37] ""Anti-Money Laundering Coin to Become Available for
ternational to launch Free, Instant Blockchain Service. Trade on ANXPRO | Finance Magnates. Finance Mag-
Blockchain News. Retrieved 2017-01-25. nates | Financial and business news. 2015-01-27. Re-
[18] Startup Touts Blockchain Exchange Thats as Simple as trieved 2017-01-26.
E-Mail. Bloomberg. 2016-05-17. Retrieved 2017-01-
[38] ANXPRO Exchange To Include Aten Black Gold Coin
25.
In 2015. Retrieved 2017-01-26.
[19] White Label | ANX INTERNATIONAL. anxintl.com.
Retrieved 2017-01-25. [39] First MultiChain Partners Announced | MultiChain.
www.multichain.com. Retrieved 2017-01-26.
[20] Homepage. anxpro.com. Retrieved 2017-01-26.
[40] MultiChain Platform Partners | MultiChain. www.
[21] About ANXPRO. anxpro.com. Retrieved 2017-01-26. multichain.com. Retrieved 2017-01-26.
[22] ANX Vault: Your Bitcoin Wallet on the App Store. App [41] Kastelein, Richard (2016-10-27). First MultiChain Part-
Store. Retrieved 2017-01-25. ners Announced. Blockchain News. Retrieved 2017-01-
[23] ANX Vault: Your Bitcoin Wallet - Android Apps on 26.
Google Play. Google Play Store. Retrieved 2017-01-25.
[42] ANX International Oers Front-To-Back Solutions That
[24] Millet, Author Jonathan (2014-07-29). ANX Vault App Can Make Working With Bitcoin Easier. CoinTelegraph.
For iOS Enables Send/Receive Functionality. NEWS- Retrieved 2017-01-26.
BTC. Retrieved 2017-01-25.
[43] Banking Special | September Issue | ESoutlook Magazine
[25] How to prevent bitcoin hacking. CNBC. Retrieved 1. www.esoutlook.com. Retrieved 2017-01-26.
2017-01-25.
[44] UKTI Hong Kong FinTech Awards 2016 (PDF). Re-
[26] Payment Solutions | ANX INTERNATIONAL. anx- trieved 2016-01-27.
intl.com. Retrieved 2017-01-26.
[45] Top 12 Fintech Startups in Hong Kong. Fintech Hong
[27] Search Licensee Register List - Money Service Opera- Kong. 2016-11-04. Retrieved 2017-01-26.
tors Licensing System -Money Service Operators Licens-
ing System. Customs and Excise Department (in Chi-
nese). Archived from the original on 2015-06-30. Re-
trieved 2017-01-26. 5.2 BitInstant
[28] Next Commerce Solutions | ANX INTERNATIONAL.
anxintl.com. Retrieved 2017-01-26. BitInstant was a bitcoin exchange start-up based in New
York City.[1][2] Founded in 2011 by Gareth Nelson and
[29] Justcoin Rights Acquired by ANX Hong Kong Bitcoin Charlie Shrem, BitInstant provided a means to rapidly
Company. CryptoCoinsNews. 2014-11-21. Retrieved
pay traditional funds to bitcoin exchanges.[3] As of Jan-
2017-01-26.
uary 2014, BitInstants website is no longer available, dis-
[1]
[30] ANX Acquires Justcoin, Incorporates Platform within a playing only a blank page. Its blog was unavailable as
Week. CoinTelegraph. Retrieved 2017-01-26. of October 31, 2014.
88 CHAPTER 5. EXCHANGES

5.2.1 History comply with regulations governing money transmission


businesses.[14]
BitInstant was founded in 2011 by Gareth Nelson and
Charlie Shrem.[3] The company allowed its customers to
purchase the bitcoins via more than 700,000 stores, in- 5.2.3 References
cluding Walmart, Walgreens, and Duane Reade.[4]
[1] Lee, Timothy B. Feds charge Bitcoin start-up founder
In September 2012, when presidential candidate Mitt with money laundering. Washingtonpost.com. Retrieved
Romney was threatened with blackmail unless he paid an 2014-01-28.
anonymous group $1 million in bitcoin, BitInstants Erik
[2] Taylor, Colleen (17 May 2013). With $1.5M Led By
Voorhees oered to purchase the bitcoin for him without
Winklevoss Capital, BitInstant Aims To Be The Go-To
a fee.[5] Site To Buy And Sell Bitcoins. TechCrunch. Retrieved
According to Shrem, transaction volume grew rapidly 11 July 2013.
during 2013 as the price of bitcoin rose, and basically
[3] Emily Spaven (2013-08-15). Frustrated customers hit
tripled during April.[6] BitInstant with a class action lawsuit. Coindesk.com. Re-
As of May 2013, BitInstant had 16 employees when trieved 2014-01-07.
Winklevoss Capital invested $1.5 million in the
[4] Alexa Simon (2013-04-10). Meet the Bitcoin Million-
company.[2] According to the Winklevosses, the funding aires. Businessweek. Retrieved 2014-01-28.
is meant to allow the company to further scale up
its sta and product. BitInstant later announced a [5] Garver, Abe (7 September 2012). BitInstant To Rom-
partnership with the Winklevosses bitcoin investment ney Camp: 'We'll Convert $1,000,000 USD to Bitcoin For
fund.[7] Free.'". Forbes. Retrieved 12 July 2013.

In June 2013, BitInstant announced integration with [6] Roose, Kevin (8 April 2013). Inside the Bitcoin Bubble:
Jumio, an online payment company led by Daniel Mat- A Q&A With BitInstants Stressed-Out CEO. New York
tes. Jumios Netverify software allows BitInstant to ver- Magazine. Retrieved 11 July 2013.
ify customers identity.[8] BitInstant also restricted bitcoin [7] Gilson, David (8 July 2013). BitInstant to partner up with
transactions in some states, stating that We have tem- Winklevoss twins bitcoin fund. CoinDesk. Archived
porarily limited transactions in some locations, and we from the original on 20 February 2014. Retrieved 11 July
apologize for the inconvenience. We believe that these 2013.
measures are vital to serving the interests of both BitIn-
stant and the greater bitcoin community..[9] [8] Jumio June 13, 2013 8:00 AM (2013-06-13). Bitcoin
Purchase Platform BitInstant Integrates Jumios Netver-
In July 2013, BitInstant suspended services, saying it ify to Speed Transactions and Reduce Fraud - Yahoo Fi-
wanted to improve the code based on trends they no- nance. Finance.yahoo.com. Retrieved 2014-01-07.
ticed in nearly 17,300 customer service complaints.[10]
[9] Squarespace - Account Not Available.
Several days earlier, a class action lawsuit had been led
Blog.bitinstant.com. Archived from the original on
on behalf of customers, claiming failure to perform ser-
2014-01-08. Retrieved 2014-01-07.
vices and false representation.[11]
On January 27, 2014, company CEO Charlie Shrem was [10] BitInstant website. 15 July 2013. Archived from the
original on 5 October 2013. Retrieved 29 July 2013.
arrested at New Yorks JFK airport and charged with
conspiring to commit money laundering by selling more [11] Iacono et al. v. BitInstant LLC, Case 1:13-cv-04674-CM
than $1 million in bitcoins to users of the black mar- (S.D.N.Y. 8 July 2013).
ket website Silk Road....[12] BitInstant website has been
[12] Bitcoin Operators Charged in Illicit Drug Site Bust. As-
blank since then.
sociated Press. Retrieved 27 January 2014.

[13] Siluk, Shirley (13 June 2013). BitInstant complaints are


up after beta site launch. CoinDesk. Retrieved 11 July
5.2.2 Criticism
2013.

BitInstant received many complaints from customers con- [14] Sidel, Robin (25 June 2013). States Put Heat on Bitcoin.
cerning transaction processing delays sometimes of sev- The Wall Street Journal. Retrieved 11 July 2013.
eral days.[6][13] In response to complaints, BitInstant CTO
Gareth Nelson stated that we are all stressing out and
working day and night (literally) to get things xed and 5.3 Bitstamp
hope to have a proper resolution for the backlogged
orders.[13] Bitstamp is a bitcoin exchange based in Luxembourg.
The New York State Department of Financial Ser- As of 2016 it was the worlds second largest by volume.[2]
vices issued a warning letter to BitInstant, asking it to It allows trading between USD currency and bitcoin
5.3. BITSTAMP 89

cryptocurrency. It allows USD, EUR, bitcoin, litecoin or 5.3.3 Notes


Ripple deposits and withdrawals.
[1] The company is registered in Reading in the UK, but this
The company was founded as a European-focused alter-
is in fact just the oces of UK PLC, a company specialis-
native to then-dominant bitcoin exchange Mt. Gox.[3] ing in company formation and which, amongst its services,
While the company trades in US dollars, it allows money allows companies to use its own address as their registered
to be deposited through the European Unions Single oce, eectively acting as a forwarding address. There
Euro Payments Area, a convenient way of transferring is no clear information available as to where Bitstamps
money between European bank accounts.[1] operations are located or whether they actually have any
presence at all in the UK, or are still run out of Slovenia.
Bitstamp oers an API to allow clients to use custom soft-
ware to access and control their accounts.[4]
5.3.4 References
[1] Boase, Richard; Spaven, Emily (2013-11-22). Bitstamp
5.3.1 History shows higher Bitcoin price than Mt. Gox. CoinDesk.

[2] Bitcoin markets. Bitcoin Charts. Retrieved September


The company is headed by CEO Nejc Kodri, a widely
25, 2014.
known member of the bitcoin community, who co-
founded the company in August 2011 with Damijan Mer- [3] Hill, Kashmir (26 June 2014). The Bitcoin Economys
lak in his native Slovenia, but later moved its registra- 'Backbone' Is Bitstamp, An Exchange Run By Two Young
tion to the UK in April 2013, then to Luxembourg in Slovenians. Forbes. Retrieved 5 January 2017.
2016.[1][nb 1] Bitstamp outsourced certain operations to
the UK due to the lack of adequate nancial and legal [4] API Bitstamp. Bitstamp. Retrieved 2014-02-21.
services in Slovenia.[3]
[5] Metz, Cade (25 April 2016). A Bitcoin Exchange Just
When incorporating in the United Kingdom, the com- Got Approval to Operate Across the EU. Wired. Re-
pany approached the UKs Financial Conduct Authority trieved 5 January 2017.
for guidance, but was told that bitcoin was not classed as a
currency, so the exchange was not subject to regulation.[1] [6] https://www.bitstamp.net/article/
Bitstamp says that it instead regulates itself, following a bitstamp-opens-online-investment/
set of best practices to authenticate customers and deter
money laundering.[1] In September 2013, the company [7] Kharif, Olga (12 February 2014). Bitcoin Exchange Bit-
stamp Halts Customer Withdrawals. Bloomberg. Re-
began requiring account holders to verify their identity
trieved 5 January 2017.
with copies of their passports and ocial records of their
home address.[1] In April 2016, the Luxembourgish gov- [8] Spaven, Emily (2014-02-14). Bitstamp to resume Bit-
ernment granted a license to Bitstamp to be fully regu- coin withdrawals today, BTC-e still working on a solu-
lated in the EU as a payment institution, allowing it to do tion. CoinDesk. Retrieved 2014-02-19.
business in all 28 EU member states.[5]
[9] Pagliery, Jose (12 February 2014). Another Bitcoin ex-
In December 2016 Bitstamp started a public funding
change goes down. CNN. Retrieved 5 January 2017.
campaign on the BnkToTheFuture investment website.[6]
[10] Alisie, Mihai (2012-10-15). Bitstamp under DDoS.
Bitcoin Magazine. Retrieved 2014-02-21.

[11] Hajdarbegovic, Nermin (2014-02-20). Bitstamp restores


5.3.2 Service disruptions withdrawals following security scare. CoinDesk. Re-
trieved 2014-02-21.
In February 2014, the company suspended withdrawals
for several days in the face of a distributed denial-of- [12] Zack Whittaker (5 January 2015). Bitstamp exchange
service.[7][8][9] Bitcoin Magazine reported that people be- hacked, $5M worth of bitcoin stolen. Zdnet. CBS Inter-
hind the attack sent a ransom demand of 75 bitcoins to active. Retrieved 6 January 2015.
Kodri, who refused due to a company policy against ne-
[13] Ember, Sydney (9 January 2015). Bitcoin Exchange Bit-
gotiating with terrorists.[10] Days after restoring ser- stamp Resumes Services. The New York Times. Re-
vice, Bitstamp temporarily suspended withdrawals for trieved 5 January 2017.
some users as a security precaution due to increased
phishing attempts.[11]
In January 2015, Bitstamp suspended its service af- 5.3.5 External links
ter a hack during which less than 19,000 bitcoins were
stolen,[12] reopening nearly a week later.[13] Ocial website
90 CHAPTER 5. EXCHANGES

5.4 BTC-e while vacationing with his family in Greece and is cur-
rently awaiting extradition to the US. These events led to
[10][11]
BTC-e was a digital currency trading platform and the temporary suspension of the BTC-e service.
exchange.[1][2] It was founded in July 2011 and as of On the 28th of July 2017, US authorities seized the BTC-
February 2015 handled around 2.5% of all Bitcoin ex- e.com domain name.
change volume.[3] Until 25 July 2017, it allowed trad-
BTC-e posted on 31st July 2017 that Alexander Vinnik
ing between the U. S. dollar, Russian ruble and euro
was never the operator or employee of BTC-e and that
currencies, and the bitcoin, litecoin, namecoin, novacoin,
they would be back working within a month or would put
peercoin, dash and ethereum cryptocurrencies.
facilities in place to return funds and coins to users.[12]
It has been a component of the CoinDesk Bitcoin Price
Index since the index started in September 2013.[4]
5.4.2 References
BTC-e is operated by ALWAYS EFFICIENT LLP,[5]
which is registered in London and is listed as having 2 [1] Benjamin Guttmann (2014). The Bitcoin Bible Gold
ocers: Sandra Gina Esparon and Evaline Sophie Jou- Edition. Books on Demand. pp. 175176. ISBN
bert and two people with signicant control: Alexander 9783732296965.
Buyanov and Andrii Shvets.[6]
[2] Russian National And Bitcoin Exchange Charged In 21-
The US Justice Dept attempted to close down BTC-e Count Indictment For Operating Alleged International
on 7/26/2017 when they charged Alexander Vinnik and Money Laundering Scheme And Allegedly Laundering
BTC-e in a 21-count indictment for operating alleged in- Funds From Hack Of Mt. Gox.
ternational money laundering scheme and allegedly laun- [3] Bitcoin Exchanges Market Share. Bitcoinity. Retrieved
dering funds from the hack of Mt. Gox[2][7] . 2015-02-10.
[4] Del Rey, Jason (September 11, 2013). Whats a Bitcoin
5.4.1 History Really Worth? CoinDesk Thinks It Has the Answer.. All
Things D.
[5] https://btc-e.com/page/1. Missing or empty |title= (help)
[6] ALWAYS EFFICIENT LLP - Overview.
[7] Vinnik Superseding Indictment Redacted for U.S. Dis-
trict Court Northern District of California San Francisco
Division Case No CR 16-00227 SI.
[8] BTC-e (2011-10-25). Start trading on a pairs of
BTC/RUB, LTC/USD, RUC/RUB, USD/RUB!". Re-
trieved 2015-11-20.
[9] Jonathon Millet @ NewsBTC. BTC-e Reports DDOS
Attack Against Their Server.
[10] Russian National And Bitcoin Exchange Charged In 21-
Count Indictment For Operating Alleged International
Money Laundering Scheme And Allegedly Laundering
BTC-e Domain Seized by U.S. Law Enforcement Funds From Hack Of Mt. Gox.
[11] Russian wanted in US caught in Greece for money laun-
BTC-e started in July 2011, handling just a few coin pairs, dering. The Daily Star Newspaper - Lebanon. 2017-07-
including Bitcoin/U. S. dollar and I0Coin to Bitcoin. By 26. Retrieved 2017-07-28.
October 2011, they supported many dierent currency
[12] Jamie Redman @ Bitcoin.com. BTC-e on Refunds, the
pairs, including Litecoin to dollars, Bitcoin to rubles and FBI and Alexander Vinnik.
RuCoin to rubles.[8]
During 2013 and 2014, BTC-e had many outages related
to Distributed Denial of Service attacks.[9] They later be- 5.5 BTC China
gan using the reverse proxy service CloudFlare to help
mitigate these attacks, reducing downtime for the ex- BTCChina (now BTCC), based in Shanghai, is the
change. worlds second largest bitcoin exchange by volume as
The BTC-e website is oine since 25 July 2017, follow- of October 2014.[1] Founded in June 2011, it was the
ing the arrest of BTC-e sta members and the seizure of Chinas rst bitcoin exchange, and most of its customers
server equipment at one of their data centres. In addition, are thought to be Chinese.[2] In November 2013, the com-
suspected BTC-e operator Alexander Vinnik was arrested pany had grown to 20 employees.[2]
5.6. BUTTERCOIN 91

5.5.1 History shown only in preview).

Company CEO Bobby Lee approached the then two- Buttercoin was a private American start-up company
person company in early 2013, and after investing his that provided digital currency exchange services to the
own money and attracting investors, oversaw the com- US.[2][3] Specically, Buttercoin operated a full order
panys rapid expansion and marketshare growth by the book trading platform for buying and selling bitcoins.
end of the year.[2] The Stanford computer science gradu-
ate, whose brother founded the cryptocurrency Litecoin, On April 6, 2015, citing a loss of interest in bitcoin from
previously worked for Yahoo! in the United States, and venture capital rms, the company announced that it was
for Walmart China as Vice President of Technology.[2] shutting down as of April 10, 2015.[5]
In November 2013, BTCChina raised $5 million in Series
A funding from investors Lightspeed China Partners and
Lightspeed Venture Partners.[3]
5.6.1 Funding
On 18 December 2013, BTCChina announced that it was Y Combinator, Google Ventures (Kevin Rose and Chris
temporarily suspending acceptance of Chinese yuan de- Hutchins), Floodgate, Initialized Capital, Rothenberg
posits, attributing the decision to government regulations, Ventures, and Reddit co-founder Alexis Ohanian in-
following a 5 December statement from the Peoples vested approximately $1 million into Buttercoin.[1][4] A
Bank of China (PBOC).[4] On 30 January 2014, the Swiss company, Centralway Ventures, invested an addi-
exchange resumed accepting yuan deposits, after fur- tional $250,000 into Buttercoin.[3] Combined with other
ther studying the PBOC statement and other rules.[5] sources, Buttercoin raised a total of $1.6 million as of
While the PBOC prohibited banks from trading in Bit- September 2013.[3] Subsequently, Buttercoin raised an
coin, BTCChina explained that they were accepting yuan undisclosed sum from Wedbush Securities, making it the
into their corporate bank account, and transferring that rst bitcoin company to receive investment from a large
money to their customer accounts, before it was traded Wall Street institution. [6]
for bitcoins.[5]

5.6.2 References
5.5.2 References
[1] Cutler, Kim-Mai (August 20, 2013). YC-Backed Butter-
[1] Bitcoin Market. Bitcoin Charts. Retrieved October 10, coin Uses Bitcoin To Attack The $500B-A-Year Remit-
2014. tances Economy. TechCrunch. Retrieved November 30,
2013.
[2] Hill, Kashmir (2013-11-08). From Walmart To Bitcoin:
The CEO Behind The Chinese Exchange Sending BTC
[2] Reutzel, Bailey (September 9, 2013). Buttercoin Takes
To New Highs. Forbes. Retrieved 2013-11-08.
a Dierent Path to Handling Virtual Currency. Pay-
[3] Lomas, Natasha (2013-11-18). As Chinese Investors mentsSource. Retrieved November 30, 2013.
Pile Into Bitcoin, Chinas Oldest Exchange, BTCChina,
Raises $5M From Lightspeed. TechCrunch. Retrieved [3] Lomas, Natasha (September 18, 2013). Swiss Company-
2014-02-21. Builder Centralway Opens $50M Fund, Invests $250k In
Bitcoin Whitelabel Exchange Buttercoin. TechCrunch.
[4] Rose, Adam (2013-12-18). China tightens curbs on bit- Retrieved December 1, 2013.
coin trade. Reuters since major stack holder from India
smcapl . Retrieved 2014-02-21. [4] Kolodny, Lora (August 19, 2013). International Bit-
coin Exchange Buttercoin Raises $1M to Revamp Re-
[5] Casey, Michael J. (2014-01-31). China Bitcoin ex- mittance. VentureWire. Retrieved November 30, 2013.
change restores deposit facility. The Wall Street Journal. (Subscription required (help)).
Retrieved 2014-03-03.
[5] Russell, Jon (April 6, 2015). Google Ventures-
Backed Bitcoin Exchange Buttercoin Is Shutting Down.
5.5.3 External links TechCrunch. Retrieved April 6, 2015.

Ocial site [6] Kharif, Olga (November 17, 2014). Bitcoin Startup But-
tercoin Draws Wedbush as Investor. "Bloomberg". Re-
trieved December 9, 2014.

5.6 Buttercoin
5.6.3 External links
Warning: Page using Template:Infobox company with
unknown parameter Former type (this message is Buttercoin Ocial website
92 CHAPTER 5. EXCHANGES

5.7 Coinbase ments service provider Vogogo[28] .


On 29 March 2016, Coinbase was listed by UK-based
Coinbase is a digital asset exchange company head- company Richtopia at number 2 in the list of 100 Most
quartered in San Francisco, California. It operates ex- Inuential Blockchain Organisations[29][30] .
changes of Bitcoin ( ), Ethereum (), Litecoin () and
In May 2016, the company rebranded the Coinbase Ex-
other digital assets with at currencies in 32 countries,[7]
change, changing the name to the Global Digital Asset
and bitcoin transactions and storage in 190 countries
Exchange (GDAX)[31] and oering Ether, the value to-
worldwide.[8][9][10][11]
ken of Ethereum, for trade on its professional trading
exchange service[32] . In July 2016, they extended the
support to their Coinbase retail exchange by adding
5.7.1 History Ether as only the second digital currency oered to re-
tail customers[33] .
Coinbase was founded in June 2012 by Brian Armstrong
and Fred Ehrsam.[5][12] It enrolled in the Summer 2012 Y On 17 January 2017, Coinbase obtained the Bitlicense
Combinator startup incubator program. In October 2012, from the New York State Department of Financial Ser-
the company launched the services to buy and sell bitcoin vices, which authorizes the company continuing virtual
through bank transfers.[13] currency business operations in New York[34] .
In May 2013, the company received a US$5 million On March 2017, Coinbase received from the New York
Series A investment led by Fred Wilson from the ven- Department of Financial Services the approval to of-
ture capital rm Union Square Ventures[14] . In De- fer trading of Ethereum and Litecoin currencies in New
cember 2013, the company received a US$25 million York[35] .
investment, from the venture capital rms Andreessen
Horowitz, Union Square Ventures and Ribbit Capital.[15]
5.7.2 Products
In 2014, the company grew to one million users, acquired
the blockchain explorer service Blockr and the web book- Coinbase has two core products: a Global Digital As-
marking company Kippt, secured insurance covering the set Exchange (GDAX) for trading a variety of digital as-
value of bitcoin stored on their servers, and launched sets on its professional asset trading platform, and a user-
the vault system for secure bitcoin storage[16][17][18] . facing retail exchange of Bitcoin, Ether, and Litecoin for
Throughout 2014, the company also formed partner- at currency[33] . It also oers an API for developers and
ships with Overstock, Dell, Expedia, Dish Network, merchants to build applications and accept payments in
Time Inc., and Wikipedia to power accepting bitcoin both digital currencies. As of 2014, the company oered
payments[19][20][21][22][23] . The company also added bit- buy/sell trading functionality in 25 countries, while the
coin payment processing capabilities to the traditional wallet was available in 190 countries worldwide.[36]
payment companies Stripe, Braintree, and PayPal[24] .
The exchange can be funded through a bank transfer or
In January 2015, the company received a US$75 mil- wire, and trades on the exchange have a maker/taker price
lion investment, led by Draper Fisher Jurvetson, the New model in which traders pay either a 0.25% fee (taker) or
York Stock Exchange, USAA, and several banks, ap- nothing (maker) to execute trades[37] .
parently the rst time any traditional nancial institu-
tions have taken direct stakes in a bitcoin enterprise[25] .
Later in January, the company launched a U.S.-based bit- 5.7.3 See also
coin exchange for professional traders called Coinbase
Exchange[26] . List of bitcoin companies
In May 2015 there was controversy around reports on
Reddit that Coinbase had asked a user to describe how
they were spending their bitcoin; the Daily Dot reported
5.7.4 References
on the matter, and received a statement from Coindesk [1] Global Coinbase. Global Coinbase. Retrieved 2017-05-
stating: We dont comment on specic cases, however, 05.
Coinbase is required to monitor activity on its platform in
accordance with the Bank Secrecy Act and other regula- [2] Coinbase. LinkedIn. Retrieved 2017-05-28.
tion governing all Money Service Businesses.; the Daily
[3] About Coinbase. Retrieved 2017-05-28.
Dot noted that Coindesk is obligated to comply with the
Bank Secrecy Act, which prevents money laundering, in [4] About Coinbase. Coinbase. Retrieved 1 Oct 2014.
order to operate as an exchange.[27]
[5] Company Overview of Coinbase, Inc.. Bloomberg
Coinbase began to oer services in Canada in 2015, but News. Retrieved 1 July 2014.
in July 2016, Coinbase announced it would halt services
in August after the closure of their Canadian online pay- [6] Coinbase. LinkedIn. Retrieved 1 July 2014.
5.8. HUOBI 93

[7] Global Coinbase. Retrieved 2017-05-05. [27] Cox, Joseph (5 May 2015). Coinbase accused to spying
on a Dark Net researcher. The Daily Dot.
[8] Coinbase - Your Hosted Bitcoin Wallet. Coinbase. Re-
trieved 30 November 2015. [28] Coinbase to Shutdown CAD Services to Canadian Cus-
tomers - CCN: Financial Bitcoin & Cryptocurrency
[9] Fowler, Georey A. (2014-02-18). Bitcoin experiment News. cryptocoinsnews.com. 8 July 2016. Retrieved 23
in everyday life. The Wall Street Journal. Retrieved July 2016.
2014-02-25.
[29] Top 100 Blockchain Organisations: From CoinDesk to
[10] Fung, Brian. Expedia wants you to book your next hotel BitPay, These Are the Most Inuential Organisations in
stay with Bitcoin. The Washington Post. Retrieved 1 July the Distributed Ledger Space. Richtopia. Retrieved 21
2014. May 2016.

[11] Ember, Sydney (2014-09-10). Coinbase Extends Bitcoin [30] Blockchain Organisations Top 100. Blockchain Age.
Access to International Customers. The New York Times. Retrieved 3 June 2016.
Retrieved 10 October 2014.
[31] GDAX - Trusted Digital Asset Exchange. Retrieved
[12] Dish Network Says It Will Accept Bitcoin. The New 2017-06-07.
York Times. Retrieved 1 July 2014.
[32] Shin, Laura (2016-05-20). Digital Currencies Show Po-
[13] Ludwig, Sean (2013-02-08). Y Combinator-backed tential To Be New Asset Class As Demand For Bitcoin
Coinbase now selling over $1M Bitcoins per month. Rival Ethereum Rises. forbes.com. Retrieved 23 July
2016.
[14] Sarah E. Needleman (2013-05-07). Coinbase Nabs $5M
[33] Tepper, Fitz (2016-07-21). Coinbase is adding support
in Biggest Funding for Bitcoin Startup. The Wall Street
for Ethereum. techcrunch.com. Retrieved 23 July 2016.
Journal. Retrieved 10 October 2014.
[34] Suarez, Juan (2017-01-17). Coinbase obtains the Bitli-
[15] Alex Williams (2013-12-12). Coinbase Raises $25M
cense. Retrieved 10 June 2017.
Led By Andreessen Horowitz To Build Its Bitcoin Wallet
And Merchant Services. TechCrunch. Retrieved 2013- [35] DFS authorizes Coinbase, Inc. to provide additional vir-
12-13. tual currency products and services. 2017-03-22.
[16] Cutler, Kim-Mai (2014-05-06). Coinbase Acquires YC- [36] Reisinger, Don (2014-09-11). Bitcoin platform Coin-
Backed Kippt To Beef Up Its Product, Design Talent. base expands to 13 European countries.

[17] Cutler, Kim-Mai (2014-08-18). Coinbase Acquires [37] Coinbase Exchange Documentation. 2015-01-26.
Blockchain Explorer Blockr.io.

[18] Knight, Shawn (2014-09-01). Coinbase has been insur-


ing Bitcoin deposits for nearly a year. 5.8 Huobi
[19] Burns, Matt (2013-12-21). Overstock.com partners Huobi ( ) is a Chinese digital currency trading plat-
with Coinbase and starts accepting bitcoins as payment.
form and exchange based in Beijing.[1][2][3][4][5][6]
TechCrunch. Retrieved 2014-01-10.
Huobi was founded in September 2013. It is one of the
[20] Kharif, Olga. Expedia to Accept Bitcoins for Online Ho- largest digital currency exchanges in China.[7]
tel Bookings. Bloomberg. Retrieved 28 September 2014.

[21] Expedia.com Now Accepts Bitcoin to Give Travel-


ers More Choice and Flexibility in Hotel Payments.
5.8.1 References
Bloomberg. Jun 11, 2014. Retrieved 28 September 2014.
[1] Chinese Bitcoin Exchange Huobi 'Loses 5,000 BTC' in
[22] Rizzo, Pete. Time Inc Becomes First Major Magazine 1.2m Blunder. International Business Times UK.
Publisher to Accept Bitcoin. Coindesk. Retrieved 16 De-
[2] Huobi Launches USD Exchange With 24/7 Customer
cember 2014.
Support. CoinDesk.
[23] Wilhelm, Alex (2014-07-18). Dell Now Accepts Bitcoin [3] Huobis BitVC Takes Trader Prot to Cover $1 Million
For All Online U.S. Purchases. TechCrunch. Retrieved Loss. CoinDesk.
2014-07-24.
[4] Huobi Will Now Take Your Bitcoins as Stock Trading
[24] Del Rey, Jason (2014-03-27). Stripe Merchants Will Collateral. CoinDesk.
Soon Be Able to Accept Bitcoin Payments.
[5] After Crackdown, a New Bitcoin King Emerges in
[25] Vigna, Paul; Casey, Michael (2015-01-20). Coinbase China. WIRED. 9 January 2014.
raises 75 million in funding round. Wall Street Journal.
[6] Pando: Huobis new xed-interest bitcoin investment
[26] Bensinger, Greg (2015-01-25). First U.S. Bitcoin Ex- product should have the hairs on your neck standing at
change Set to Open. Wall Street Journal. attention. Pando.
94 CHAPTER 5. EXCHANGES

[7] Huobi emerges as leading bitcoin platform in China. same month, LocalBitcoins suered from a security
wantchinatimes.com. Archived from the original on 2015- breach, when 30 bitcoins (then worth US$15k) were
08-02. stolen from its users.[9]
In December 2014, the Federal Financial Supervisory
Authority of Germany contacted LocalBitcoins about li-
5.9 ItBit censing issues, and LocalBitcoins ceased to operate in
Germany.[10] LocalBitcoins said that it had about 8000
itBit is a nancial services company that oers a suite people actively using the service from Germany at the
of bitcoin trading services, including a global bitcoin ex- time.[10]
change and over-the-counter (OTC) trading desk. The
In February 2014, two men from Florida were charged
company launched in November 2013.
with violating state money laundering laws for using
In May 2015, itBit received a trust charter [1] from the LocalBitcoins.[11] In April 2016, another two men from
New York State Department of Financial Services (DFS) Louisiana, United States, a former chiropractor and his
and became the rst company to operate a regulated bit- son, pleaded guilty to funneling money through an un-
coin exchange in the United States. lawful Bitcoin nancial scheme. The men were using Lo-
[12]
itBit received more than US$5 million in venture capi- calBitcoins to advertise their services.
tal [2] from Canaan Partners, RRE Ventures, Liberty City In August 2015, LocalBitcoins ceased to operate in New
Ventures, and angel investors Jay W. Jordan II and Ben York state because sellers would have to purchase a
Davenport in their initial funding round. itBits Series BitLicense from the New York State Department of Fi-
A round raised $25 million from RRE Ventures, Liberty nancial Services to remain in compliance with local nan-
City Ventures and others. cial regulations.[13]
The company is headquartered in New York with an in- In August 2016, LocalBitcoins said that 1.35 million peo-
ternational oce in Singapore. ple from 249 countries were using its platform, and that
the weekly volume of transactions was US$14 million.[3]

5.9.1 References In September 2016, access from Russia to LocalBitcoins


was blocked by Roskomnadzor, the executive agency for
[1] Bitcoin Exchange itBit Gets N.Y. Trust Charter, Bank telecommunications in Russia, after the nance ministry
Partner proposed criminalising the use of bitcoin.[14][15] Local-
Bitcoins posted instructions for users on how to bypass
[2] itBit Debuts Bitcoin Currency Exchange the access restrictions.[14][16]

5.10 LocalBitcoins 5.10.2 References

LocalBitcoins is a bitcoin startup company based in [1] Knibbs, Kate (2015-02-05). Meet the Street Dealers
Helsinki, Finland. Its service facilitates over-the-counter Who Peddle Bitcoin. Gizmodo. Archived from the orig-
trading of local currency for bitcoins.[5] Users post ad- inal on 2016-12-30. Retrieved 2016-12-30.
vertisements on the website, where they state exchange
rates and payment methods for buying or selling bitcoins. [2] LocalBitcoins | CrunchBase Prole. CrunchBase. Re-
trieved 2014-02-19.
Other users reply to these advertisements and agree to
meet the person to buy bitcoins with cash[6] or pay with
[3] Leung, Angus (2016-09-16). Russia Blocks Finnish Bit-
online banking. LocalBitcoins has a reputation and feed- coin Exchange, Reasons Not Explained. CoinTelegraph.
back mechanism for users and an escrow and conict- Archived from the original on 2017-01-03. Retrieved
resolution service. As of December 2013, LocalBitcoins 2017-01-03.
has around 110,000 active traders with a trade volume of
14003000 bitcoins per day.[7] [4] Pineda, Marco (2014-07-14). Exclusive Interview With
Founder of LocalBitcoins.com - Jeremias Kangas. Bit-
coinist. Archived from the original on 2017-01-03. Re-
5.10.1 History trieved 2017-01-03.

LocalBitcoins was founded in June 2012 by Jeremias [5] McMillan, Robert (2013-03-28). Why the Only Real
Kangas. He implemented an escrow system for the mar- Way to Buy Bitcoins Is on the Streets | Wired Enterprise.
ketplace by the end of 2012. The website started gener- Wired. Cond Nast. Retrieved 2014-02-19.
ating revenue by early 2013.[4]
[6] Murphy, Kate (July 31, 2013). Virtual Currency Gains
In April 2014, the company announced that it would Ground in Actual World. New York Times. Retrieved
begin mass-producing low-cost bitcoin ATMs.[8] In the February 20, 2014.
5.11. MT. GOX 95

[7] Lemarchand, Rafael (2013-12-06). Helsinkis LocalBit- Mt. Gox announced that approximately 850,000 bit-
coins Hits Up To 3 Million A Day In Exchanges. Arc- coins belonging to customers and the company were miss-
ticStartup. Retrieved 2014-02-19. ing and likely stolen, an amount valued at more than
$450 million at the time.[9][10] Although 200,000 bit-
[8] Joon Ian Wong (2014-02-15). LocalBitcoins Starts Man-
ufacturing Low-Cost Bitcoin ATM. CoinDesk. Re-
coins have since been found, the reason(s) for the
trieved 2014-02-19. disappearancetheft, fraud, mismanagement, or a com-
bination of thesewere initially unclear. New evidence
[9] Berkman, Fran (2014-04-17). LocalBitcoins exchange presented in April 2015 by Tokyo security company Wiz-
conrms security breach, stolen bitcoins. The Daily Dot. Sec led them to conclude that most or all of the missing
Archived from the original on 2016-12-30. Retrieved bitcoins were stolen straight out of the Mt. Gox hot wallet
2016-12-30. over time, beginning in late 2011.[11][12]
[10] Rizzo, Pete (2014-12-10). LocalBitcoins 'Exploring
Options After Service Halt in Germany. CoinDesk.
Archived from the original on 2016-04-10. Retrieved
5.11.1 Founding (2006-10)
2017-01-03.
In late 2006, programmer Jed McCaleb (eDonkey2000,
[11] LocalBitcoins.com Targeted - Another Major Bitcoin Overnet1, Ripple, Stellar) thought of building a website
Exchange May Be Under Threat. Business Insider. 2014- for users of the Magic: The Gathering Online fantasy-
02-09. Retrieved 2014-02-19. based card game service, to let them trade Magic:
The Gathering Online cards like stocks.[13][14][4] In
[12] Elliot Maras (2016-05-23). Arrests And Prosecutions
Reveal Big Vagaries In Bitcoin Selling Regulations.
January 2007, he purchased the domain name mt-
CryptoCoinsNews. Retrieved 2016-05-23. gox.com, short for Magic: The Gathering On-
line eXchange.[15][16][17][18] Initially in beta release,[19]
[13] Young, Joseph (2015-08-25). BitQuick and Local Bit- sometime around late 2007, the service went live for ap-
coins Terminate Service in NY due to BitLicense Compli- proximately three months before McCaleb moved on to
ance Costs. Bitcoin Magazine. Archived from the origi- other projects, having decided it was not worth his time.
nal on 2016-05-21. Retrieved 2017-01-03. He reused the domain name in 2009 to advertise his card
[20]
[14] Redman, Jamie (2016-09-12). Russian Authorities Ban game The Far Wilds.
LocalBitcoins, Contradicting Previous Statements. Bit- In July 2010, McCaleb read about bitcoin on Slashdot,[21]
coin.com. Saint Bitts. Archived from the original on and decided that the bitcoin community needed an ex-
2016-09-12. Retrieved 2017-01-03. change for trading bitcoin and regular currencies. After
[15] Das, Samburaj (2016-09-13). Russia Blocks Access to writing an exchange website, he launched it while reusing
Bitcoin P2P Exchange LocalBitcoins. CryptoCoinsNews. the spare mtgox.com domain name.[14] On July 18, Mt.
Archived from the original on 2016-09-14. Gox launched its exchange and price quoting service de-
ploying it on the spare mtgox.com domain name.[14][22]
[16] Mizrahi, Avi (2016-09-13). Russias National Censor
Blocks Access to LocalBitcoins. LocalBitcoins responded
to the ban by instructing Russian users on how to bypass 5.11.2 Security breach and invalid ad-
the censorship.. Finance Magnates. Archived from the dresses (2011)
original on 2016-12-30. Retrieved 2016-12-30.
McCaleb sold the site to French developer Mark
Karpels, who was living in Japan, in March 2011, say-
5.10.3 External links
ing to really make mtgox what it has the potential to be
Ocial website would require more time than I have right now. So Ive
decided to pass the torch to someone better able to take
the site to the next level.[23][4]

5.11 Mt. Gox On 19 June 2011, a security breach of the Mt. Gox
bitcoin exchange caused the nominal price of a bitcoin
to fraudulently drop to one cent on the Mt. Gox ex-
Mt. Gox was a bitcoin exchange based in Shibuya, change, after a hacker allegedly used credentials from
Tokyo, Japan.[1] Launched in July 2010, by 2013 and a Mt. Gox auditors compromised computer to trans-
into 2014 it was handling over 70% of all bitcoin transac- fer a large number of bitcoins illegally to himself. He
tions worldwide, as the largest bitcoin intermediary and used the exchanges software to sell them all nominally,
the worlds leading bitcoin exchange.[2][3][4][5] creating a massive "ask" order at any price. Within
In February 2014, Mt. Gox suspended trading, closed its minutes the price corrected to its correct user-traded
website and exchange service, and led for bankruptcy value.[24][25][26][27][28][29] Accounts with the equivalent of
protection from creditors.[6][7] In April 2014, the com- more than $8,750,000 were aected.[26] In order to prove
pany began liquidation proceedings.[8] that Mt. Gox still had control of the coins, the move of
96 CHAPTER 5. EXCHANGES

In March 2013, the bitcoin transaction log or


"blockchain" temporarily forked into two indepen-
dent logs, with diering rules on how transactions could
be accepted. The Mt. Gox bitcoin exchange briey
halted bitcoin deposits. Bitcoin prices briey dipped
by 23%, to $37, as the event occurred,[32][33] before
recovering to their previous level (approximately $48) in
the following hours.[34]
By April 2013 and into 2014 the site had grown to the
point where it was handling over 70% of the worlds
bitcoin trades, as the largest bitcoin intermediary and the
worlds leading bitcoin exchange.[5][4][35][3] With prices
Bitcoin transactions made on Mt.Gox Bitcoin Exchange on 19 increasing rapidly, Mt. Gox suspended trading from 11
June 2011, demonstrating price crash. Size of circular plot de-
12 April for a market cooldown.[36] The value of a sin-
notes size of transaction.
gle bitcoin fell to a low of $55.59 after the resumption
of trading, before stabilizing above $100. Around mid-
424,242 bitcoins from cold storage to a Mt. Gox ad- May 2013, Mt. Gox traded 150,000 bitcoins per day, per
[37]
dress was announced beforehand, and executed in Block Bitcoin Charts.
132749.[30] On 2 May 2013 CoinLab led a $75 million lawsuit
[38]
In October 2011, about two dozen transactions appeared against Mt. Gox, alleging a breach of contract.
in the block chain (Block 150951)[31] that sent a total of The companies had formed a partnership in February
2,609 BTC to invalid addresses. As no private key could 2013 under which CoinLab was to handle all of Mt.
[38]
ever be assigned to them, these bitcoins were eectively Goxs North American services. CoinLabs lawsuit
lost. While the standard client would check for such an contended that Mt. Gox failed to allow it to move ex-
error and reject the transactions, nodes on the network isting U.S. and Canadian customers from Mt. Gox to
[38]
would not, exposing a weakness in the protocol. CoinLab.
On 15 May 2013 the US Department of Homeland Se-
curity (DHS) issued a warrant to seize money from Mt.
5.11.3 Processor of most of worlds bitcoin Goxs U.S. subsidiarys account with payment processor
trades; issues (2013) Dwolla.[39] The warrant suggested the US Immigration
and Customs Enforcement, an investigative branch of the
DHS, asserted that the subsidiary, which was not licensed
by the US Financial Crimes Enforcement Network (Fin-
CEN), was operating as an unregistered money trans-
mitter in the US.[39][40] Between May and July the DHS
seized more than $5 million from the subsidiary.[37][4] On
29 June 2013, Mt. Gox received its money services busi-
ness (MSB) license from FinCEN.[40]
Mt. Gox suspended withdrawals in US dollars on June
20, 2013.[41] The Mizuho Bank branch in Tokyo that han-
Logarithmic scaled bitcoin price history in USD on the Mt. Gox
exchange from February 2012 until its shutdown in February dled Mt. Gox transactions pressured Mt. Gox from then
2014 on to close its account.[37] On July 4, 2013, Mt. Gox an-
nounced that it had fully resumed withdrawals, but as of
On 22 February 2013, following the introduction September 5, 2013, few US dollar withdrawals had been
of new anti-money laundering requirements by e- successfully completed.[42][43][44]
commerce/online payment system company Dwolla,
On August 5, 2013, Mt. Gox announced that it in-
some Dwolla accounts became temporarily restricted. As
curred signicant losses due to crediting deposits which
a result, transactions from Mt. Gox to those accounts
had not fully cleared, and that new deposits would no
were cancelled by Dwolla. The funds never made it back
longer be credited until the funds transfer was fully
to Mt. Gox accounts. The Mt. Gox help desk issued the
completed.[45]
following comment: Please be advised that you are actu-
ally not allowed to cancel any withdrawals received from Wired Magazine reported in November 2013 that cus-
Mt. Gox as we have never had this case before and we are tomers were experiencing delays of weeks to months in
working with Dwolla to locate your returned funds. The withdrawing cash from their accounts.[35][3] The article
funds were nally returned on May 3, nearly three months said that the company had eectively been frozen out of
later, with a note: Please be advised never to cancel any the U.S. banking system because of its regulatory prob-
Dwolla withdrawals from us again. lems.
5.11. MT. GOX 97

5.11.4 Withdrawals halted; trading sus- Six other major bitcoin exchanges released a joint state-
pended; bitcoin missing (2014) ment distancing themselves from Mt. Gox, shortly before
Mt. Goxs website went oine.[63][64]
On 25 February 2014, Mt. Gox reported on its website
Customer complaints about long delays were mounting as that a decision was taken to close all transactions for the
of February 2014, with more than 3,300 posts in a thread time being, citing recent news reports and the potential
about the topic on the Bitcoin Talk online forum.[46] repercussions on Mt Goxs operations. Chief executive
Mark Karpels told Reuters that Mt. Gox was at a turn-
On 7 February 2014, Mt. Gox halted all bitcoin
ing point.[65][66][67][68]
withdrawals.[47] The company said it was pausing with-
drawal requests to obtain a clear technical view of the From 1 February 2014 until the end of March, during the
currency processes.[47] The company issued a press re- period of Mt. Gox problems, the value of bitcoin declined
lease on February 10, 2014, stating that the issue was due by 36%.[69]
to transaction malleability: A bug in the bitcoin software
makes it possible for someone to use the bitcoin network
to alter transaction details to make it seem like a sending
5.11.5 Bankruptcy; Stolen bitcoin (2014
of bitcoins to a bitcoin wallet did not occur when in fact
it did occur. Since the transaction appears as if it has not 16)
proceeded correctly, the bitcoins may be resent. Mt Gox
is working with the bitcoin core development team and On 28 February 2014 Mt. Gox led in Tokyo for a
others to mitigate this issue.[48][49] form of bankruptcy protection from creditors called minji
saisei (or civil rehabilitation) to allow courts to seek a
On 17 February 2014, with all Mt. Gox withdrawals buyer, reporting that it had liabilities of about 6.5 bil-
still halted and competing exchanges back in full oper- lion yen ($65 million, at the time), and 3.84 billion yen in
ation, the company published another press release indi- assets.[70][71][72][73][3]
cating the steps it claimed it was taking to address secu-
rity issues.[50] In an email interview with the Wall Street The company said it had lost almost 750,000 of its cus-
Journal, CEO Mark Karpels refused to comment on in- tomers bitcoins, and around 100,000 of its own bitcoins,
creasing concerns among customers about the nancial totaling around 7% of all bitcoins, and worth around $473
[72][73]
status of the exchange, did not give a denite date on million near the time of the ling. Mt. Gox released
which withdrawals would be resumed, and wrote that the a statement saying, The company believes there is a high
exchange would impose new daily and monthly limits possibility that the bitcoins were stolen, blamed hackers,
[10][37]
[51]
on withdrawals if and when they were resumed. A poll and began a search for the missing bitcoin. Chief
of 3,000 Mt. Gox customers by CoinDesk indicated that Executive Karpels said technical issues opened up the
68% of polled customers were still awaiting funds from way for fraudulent withdrawals.
Mt. Gox. The median waiting time was between one Mt. Gox also faces lawsuits from its customers.[74][75]
and three months, and 21% of poll respondents had been
waiting for three months or more.[52] On 9 March 2014, Mt. Gox led for bankruptcy protec-
tion in the US, to halt U.S. legal action temporarily by
On 20 February 2014, with all withdrawals still halted, traders who alleged the bitcoin exchange operation was a
Mt. Gox issued yet another statement, not giving any date fraud.[76][77][78]
for the resumption of withdrawals.[53] A protest by two
bitcoin enthusiasts outside the building that houses the On 20 March 2014, Mt. Gox reported on its website that
Mt. Gox headquarters in Tokyo continued. Citing secu- it found some bitcoins worth around $116 million [4]

rity concerns, Mt. Gox moved its oces to a dierent in an old digital wallet used prior to June 2011. That
location in Shibuya. Bitcoin prices quoted by Mt. Gox brought the total number[79] of bitcoins the rm lost down to
650,000, from 850,000.
dropped to below 20% of the prices on other exchanges,
reecting the markets estimate of the unlikelihood of Mt. New evidence presented in April 2015 by Tokyo security
Gox paying its customers.[54][55] company WizSec led them to conclude that most or all
On 23 February 2014, Mt. Gox CEO Mark Karpels of the missing bitcoins were stolen straight out of the Mt.
[80][81]
resigned from the board of the Bitcoin Foundation. [56] Gox hot wallet over time, beginning in late 2011.
The same day, all posts on its Twitter account were On April 14, Mt. Gox lawyers said that Karpels would
removed.[57] not appear for a deposition in a Dallas court, or heed a
[37]
On 24 February 2014, Mt. Gox suspended all trading, subpoena by FinCEN. On 16 April 2014, Mt. Gox
and hours later its website went oine, returning a blank gave up its plan to rebuild under bankruptcy protection,
page.[58][59][60]
A leaked alleged internal crisis manage- and asked a Tokyo court to allow it to be liquidated.[82]
ment document claimed that the company was insolvent, In a 6 Jan 2015 interview, Kraken bitcoin exchange
after having lost 744,408 bitcoins in a theft which went CEO Jesse Powell discussed being appointed by the
undetected for years.[58][59][61][62] bankruptcy trustee to assist in processing claims by the
98 CHAPTER 5. EXCHANGES

127,000 creditors of Mt. Gox.[83][84][85][3] [10] Mt. Gox Seeks Bankruptcy After $480 Million Bitcoin
Loss, Carter Dougherty and Grace Huang, Bloomberg
CEO Karpels was arrested in August 2015 by Japanese News, Feb. 28, 2014
police and charged with fraud and embezzlement, and
manipulating the Mt. Gox computer system to increase [11] Nilsson, Kim (19 April 2015). The missing MtGox bit-
the balance in an account -- this charge was not related to coins. Retrieved 10 December 2015. Most or all of the
the missing 650,000 bitcoins.[86][87][4][88][89] After he was missing bitcoins were stolen straight out of the Mt. Gox
interrogated, Japanese prosecutors accused him of mis- hot wallet over time, beginning in late 2011
appropriating Y315m ($2.6m) in bitcoin deposited into [12]
their trading accounts by investors at Mt. Gox, and mov-
ing it into an account he controlled, approximately six [13] The Middle Class in Emerging Societies: Consumers,
months before Mt. Gox failed in early 2014.[90][91] Lifestyles and Markets

By May 2016, creditors of Mt. Gox had claimed they [14] Statement by McCaleb February 2014
lost $2.4 trillion when Mt. Gox went bankrupt, which
[15] Mt. Goxs Original Creator Is At Work On A Secret Bit-
they asked be paid to them.[92] The Japanese trustee over-
coin Project. TechCrunch. AOL. Retrieved 24 February
seeing the bankruptcy said that only $91 million in as- 2015.
sets had been tracked down to distribute to claimants, de-
spite Mt. Gox having asserted in the weeks before it went [16] 5 Things About Mt. Goxs Crisis. WSJ. Retrieved 24
bankrupt that it had more than $500 million in assets.[93] February 2015.
The trustees interim legal and accounting costs through
[17] Stripe Backs Non-Prot Decentralized Payment Net-
that date, to be paid ultimately by creditors, were $5.5 work Stellar, From Mt. Goxs Original Creator.
million.[94] TechCrunch. AOL. Retrieved 28 April 2015.

[18] Mt. Gox bitcoin exchange closure could help legitimize


5.11.6 See also the currency.. Slate Magazine. Retrieved 24 February
2015.
Digital currency exchange
[19] Internet Archive Wayback Machine. Retrieved 24
Bitnex, which replaced Mt. Gox as the worlds February 2015.
largest bitcoin exchange, lost $72 million in bitcoin
[20] The Far Wilds: Free Online Strategy Game. Archived
in 2016. from the original on 12 August 2009. Retrieved 24 Febru-
ary 2015.

5.11.7 References [21] http://ripple.com/blog/


interview-with-jed-mccaleb-inventor-of-the-ripple-protocol-and-co-founde
[1] Terrorist Use of Cyberspace and Cyber Terrorism: New
Challenges and Responses [22] Financial Cryptography and Data Security: 17th Interna-
tional Conference, FC 2013, Okinawa, Japan, April 1-5,
[2] Vigna, Paul (2014-02-25). 5 things about Mt. Goxs cri- 2013, Revised Selected Papers
sis. The Wall Street Journal.
[23] Jed McCaleb. Mtgox is changing owners. Bitcointalk
[3] Solving Modern Crime in Financial Markets: Analytics and Bitcoin Forum: Economy: Marketplace: Service Discus-
Case Studies - Marius-Cristian Frunza sion, 6 March 2011. Accessed 23 October 2016.

[4] Whiplash: How to Survive Our Faster Future - Joi Ito, Je [24] Karpeles, Mark (30 June 2011). Clarication of Mt
Howe Gox Compromised Accounts and Major Bitcoin Sell-O
(Press release). Tibanne Co. Ltd. Archived from the orig-
[5] Computer Security - ESORICS 2014: 19th European inal on 19 September 2011.
Symposium on Research in Computer Security, Wroclaw,
Poland, September 7-11, 2014. Proceedings, Part 2 [25] Bitcoin Report Volume 8 - (FLASHCRASH). YouTube Bit-
coinChannel. 19 June 2011.
[6] McLannahan, Ben (2014-02-28). Bitcoin exchange Mt
Gox les for bankruptcy protection. Financial Times. [26] Mick, Jason (19 June 2011). Inside the Mega-Hack of
Bitcoin: the Full Story. DailyTech.
[7] Abrams, Rachel; Goldstein, Matthew; Tabuchi, Hiroko
(2014-02-28). Erosion of Faith Was Death Knell for Mt. [27] Lee, Timothy B. (19 June 2011). Bitcoin prices plummet
Gox. The New York Times. on hacked exchange. Ars Technica. Cond Nast.

[8] Mt. Gox abandons rebuilding plans and les for liquida- [28] Mark Karpeles, 20 June 2011, Huge Bitcoin sell o due
tion: WSJ - The Verge to a compromised account rollback, Mt. Gox Support

[9] Abrams, Rachel; Popper, Nathaniel (2014-02-25). [29] Chirgwin, Richard (19 June 2011). Bitcoin collapses on
Trading Site Failure Stirs Ire and Hope for Bitcoin. The malicious trade Mt Gox scrambling to raise the Titanic.
New York Times. The Register.
5.11. MT. GOX 99

[30] Block 132749 - Bitcoin Block Explorer. Retrieved 24 [48] Update - Statement Regarding BTC Withdrawal Delays
February 2015. (Press release). Mt. Gox Co. Ltd. 10 February 2014.
Archived from the original on 10 February 2014.
[31] Block 150951 - Bitcoin Block Explorer. Retrieved 24
February 2015. [49] mt gox shutdown puts bitcoin investors on edge -
pokerupdate.com. pokerupdate.com. Retrieved 24
[32] Lee, Timothy. Major glitch in Bitcoin network sparks February 2015.
sell-o; price temporarily falls 23%". Ars Technica.
Cond Nast. Retrieved 12 March 2013. [50] 20140217-Announcement: Tokyo, Japan, February
17th, 2014 (PDF) (Press release). Tokyo: Mt. Gox. 17
[33] Blagdon, Je. Technical problems cause Bitcoin to February 2014. Archived from the original (PDF) on 17
plummet from record high, Mt. Gox suspends deposits. February 2014.
The Verge. Retrieved 12 March 2013.
[51] Mochizuki, Takashi & Warnock, Eleanor (February 17,
[34] Bitcoin Charts. Bitcoin Charts. 2014). Bitcoin Platform Mt. Gox Apologizes for De-
layed Response - CEO Karpeles Declines To Shed Light
[35] McMillan, Robert; Metz, Cade (6 November 2013). The On How Customer Funds Are Protected. Wall Street
rise and fall of the worlds largest Bitcoin exchange. Journal.
Wired. Cond Nast. Retrieved 8 February 2014.
[52] Wong, Joon Ian (15 February 2014). 68% of Mt. Gox
[36] Twitter / MtGox: Trading is suspended until. Twit- Users Still Awaiting Their Funds, Survey Reveals. Coin
ter.com. Archived from the original on November 13, Desk.
2013. Retrieved 2014-02-17.
[53] Clinch, Matt (February 20, 2014). Bitcoin investor fury
[37] Mochizuki, Takashi (20 April 2014). Tracing a Bit- at Mt Gox delays. CNBC.
coins Exchanges Fall From the Top to Shutdown Mark
Karpels hoped to set up a bitcoin cafe in the building [54] Byford, Sam (February 20, 2014). Mt. Gox, where is
where his exchange rented space.. WSJ. Retrieved 22 our money?". The Verge.
April 2014.
[55] Bitcoin exchange in Downward Spiral: Mt Gox has left
[38] Chen, Adrian (2 May 2013). Massive Bitcoin Business the building"". Hannover, Germany: Heise. February 20,
Partnership Devolves Into $75 Million Lawsuit. Gawker 2014.
Media. Archived from the original on 13 June 2013. Re-
[56] Mt. Gox resigns from Bitcoin Foundation. Reuters.
trieved 8 June 2013.
February 23, 2014. Retrieved 25 February 2014.
[39] Dillet, Romain (16 May 2013). Feds Seize Assets From
[57] MtGox Resigns From Bitcoin Foundation, Deletes All
Mt. Goxs Dwolla Account, Accuse It Of Violating
Tweets From Twitter Feed. Business Insider. February
Money Transfer Regulations. TechCrunch. AOL Inc.
23, 2014. Retrieved 25 February 2014.
Retrieved 10 February 2014.
[58] McMillan, Robert (24 February 2014). Bitcoin exchange
[40] Buterin, Vitalik (29 June 2013). MtGox Gets FinCEN
Mt. Gox implodes amid allegations of $350 million hack.
MSB License. Bitcoin Magazine. Coin Publishing Ltd.
Wired. Retrieved 25 February 2014.
Retrieved 10 February 2014.
[59] Popper, Nathaniel; Abrams, Rachel (25 February 2014).
[41] McMillan, Robert (20 June 2013). Bitcoins Big Bank Apparent theft at Mt. Gox shakes Bitcoin world. The
Problem: Why Did Mt. Gox Halt U.S. Payouts?". Wired. New York Times. Retrieved 25 February 2014.
Cond Nast.
[60] Nagano, Yuriko; Wright, Stephen (25 February 2014).
[42] Vigna, Paul (5 July 2013). Bitcoin operator Mt. Gox Website of Bitcoin exchange Mt. Gox oine. Asso-
resumes withdrawals. The Wall Street Journal. ciated Press. Retrieved 25 February 2014.
[43] Vigna, Paul (31 July 2013). Bitcoin exchange Mt. Gox [61] How a bug in bitcoin led to MtGoxs collapse, Alex Hern,
still grappling with slowdown. The Wall Street Journal. The Guardian, Feb. 27, 2014
[44] Marron, Donald (3 September 2013). How Bitcoin [62] Kathryn Glass. Internet Chat Reveals Mt. Gox CEO
spreads violate a fundamental economic law. Forbes. Hasn't 'Given Up'". Fox Business. Retrieved 24 February
2015.
[45] August 2013 Mt. Gox Status Update (Press release).
Mt. Gox Co. Ltd. 5 August 2013. Archived from the [63] Bitcoin exchange Mt. Goxs website down. Reuters. 25
original on 5 August 2013. February 2014. Retrieved 25 February 2014.
[46] Wong, Joon Ian (4 February 2014). Poll: Are you hav- [64] The Coinbase Blog - Joint Statement Regarding MtGox.
ing Mt. Gox withdrawal issues?". CoinDesk. Retrieved 9 The Coinbase Blog (Press release). Coinbase. 24 February
February 2014. 2014. Retrieved 24 February 2014.

[47] Dougherty, Carter (7 February 2014). Bitcoin Price [65] Mt. Gox website says all transactions closed for the time
Plunges as Mt. Gox Exchange Halts Activity. being"". Reuters. 25 February 2014. Retrieved 25 Febru-
Bloomberg. Retrieved 9 February 2014. ary 2014.
100 CHAPTER 5. EXCHANGES

[66] Lowery, Adrian (25 February 2014). Is it the beginning [81]


of the end for Bitcoin? Virtual currency in turmoil as
rumoured $375m theft closes major exchange. This is [82] Takashi MochizukiAnd Katy Stech (16 April 2014). Mt.
money. Retrieved 25 February 2014. Gox Files for Liquidation. WSJ. Retrieved 24 February
2015.
[67] Anklam, Fred (25 February 2014). Bitcoin exchange Mt.
Gox goes oine amid turmoil. USA Today. Retrieved 25
February 2014. [83] Powell, Jesse. MtGox Bankruptcy Trustee. We Use
Coins. Retrieved 6 January 2015.
[68] Vaishampayan, Saumya (25 February 2014). Mt. Gox
says transactions closed 'for time being'". Market Watch. [84] Interview with Jesse Powell, Bitcoin Knowledge Pod-
Retrieved 25 February 2014. cast, January 6, 2015.
[69] Whats Wrong with Money?: The Biggest Bubble of All -
Michael Ashton [85] Kraken Accepting MtGox Bankruptcy Claims and Giv-
ing Free Trade Credit. Bitcoin Magazine (Press release).
[70] McLannahan, Ben (2014-02-28). Bitcoin exchange Mt Bitcoin Magazine. 22 April 2015. Retrieved 12 May
Gox les for bankruptcy protection. Financial Times. 2015.

[71] Abrams, Rachel; Goldstein, Matthew; Tabuchi, Hiroko [86]


(2014-02-28). Erosion of Faith Was Death Knell for Mt.
Gox. The New York Times.
[87]
[72] Warnock, Eleanor; Mochizuki, Takashi; Martin, Alexan-
der (28 February 2014). Mt. Gox les for bankruptcy [88]
protection. The Wall Street Journal. Retrieved 28 Febru-
ary 2014. [89]
[73] Takemoto, Yoshifumi; Knight, Sophie (28 February
2014). Mt. Gox les for bankruptcy, blames hackers [90]
for losses. Reuters. Retrieved 28 February 2014.
[91]
[74] Sidel, Robin (28 February 2014). Almost Half a Billion
Worth of Bitcoins Vanish. Wall Street Journal. Retrieved
3 March 2014. [92]

[75] MtGox Boss Sued For Bitcoin Losses. Investing.com. 4 [93]


March 2014.
[94]
[76] Finley, Klint (10 March 2014). Bitcoin Exchange Mt.
Gox Files for U.S. Bankruptcy as Death Spiral Contin-
ues. Wired. Retrieved 11 March 2014.
5.11.8 External links
[77] Hals, Tom (10 March 2014). Mt. Gox les U.S.
bankruptcy, opponents call it a ruse. Reuters. Retrieved
11 March 2014. Ocial website

[78] Bitcoin exchange Mt. Gox les for US bankruptcy. New


MtGox Co., Ltd. bankruptcy docket from the
York Post. 10 March 2014. Retrieved 11 March 2014.
United States Courts Archive
[79] Karpeles, Mark (2014-03-20).
" / Announcement
regarding the balance of Bitcoin held by the company
(PDF). MtGox. Retrieved 2014-03-22. MtGox Co., Ltd. 5.12 OKCoin
had certain oldformat wallets which were used in the past
and which, MtGox thought, no longer held any bitcoins.
OKCoin is a Bitcoin company in China with core product
Following the application for commencement of a civil
rehabilitation proceeding, these wallets were rescanned
lines of a Bitcoin exchange, and a mobile consumer pay-
and their balance researched. On March 7, 2014, MtGox ment and lending app. OKCoin Exchange China operates
Co., Ltd. conrmed that an oldformat wallet which was CNY/BTC spot pair with margin trading from its Beijing
used prior to June 2011 held a balance of approximately entity, while OKCoin International operates USD/BTC
200,000 BTC (199,999.99 BTC). spot pair with margin trading and BTC/USD futures from
its Singapore entity.
[80] Nilsson, Kim (19 April 2015). The missing MtGox bit-
coins. Retrieved 10 December 2015. Most or all of the As of August 2016, OKCoin is the largest Bitcoin ex-
missing bitcoins were stolen straight out of the Mt. Gox change in the world with a volume of over 16,000,000
hot wallet over time, beginning in late 2011 Bitcoins per month.[1]
5.12. OKCOIN 101

5.12.1 History [3] Jon Southurst (@southtopia) (2014-05-19). OKCoin and


Huobi Discuss Bitcoin in China and Plans for Survival.
OKCoin was founded by CEO Star Xu in 2013 and has Coindesk.com. Retrieved 2014-06-30.
raised US$10mm in investments from Ceyuan Ventures, [4] OKCoin) (2015-05-23). OKCoin no longer managing
Mantra Capital, Ventures Lab and other notable private Bitcoin.com due to contract conict with domain owner.
investors including Silicon Valley investor Tim Draper. OKCoin Blog. Retrieved 2015-05-26.
Star Xu is an experienced technology execu- [5] Stan Higgins) (2015-05-05). FinCEN Fines Ripple Labs
tive.Professionally, Star worked at Yahoo/Alibaba for Bank Secrecy Act Violations. Coindesk. Retrieved
as a search algorithm engineer before serving as Chief 2015-05-26.
Technical Ocer of DocIn.com a popular le sharing
company where he managed a team of 120 engineers.[2] [6] Joseph Young) (2015-05-25). Roger Ver and OK-
Coin Squabble over Bitcoin.com, Breach of Contract.
OKCoin has publicly expressed intention to expand over- CoinTelegraph. Retrieved 2015-05-26.
seas and become a worldwide digital currency services
company.[3] [7] Allen Scott) (2015-05-25). Roger Ver: I Will Oer a
$1,000,000 Bounty to Anyone Who Can Prove I Signed
that Contract". CoinTelegraph. Retrieved 2015-05-26.
5.12.2 Controversy [8] Ben McGinnes (2015-05-29). Analysis of OKCoin Doc-
uments. Retrieved 2016-09-05.
On May 23, 2015, OKCoin made public a contractual
dispute the company was having with Roger Ver over the
management rights to the domain name bitcoin.com.[4]
OKCoin management claimed that they could no longer
pay Ver the money which was contractually owed to him
due to a recent case in which Ripple Labs was ned
$700,000 by FinCEN for failure to collect proper KYC
paperwork from Ver.[5] In response, Ver published sev-
eral months of email history between himself and OK-
Coin demonstrating that OKCoin had not been making
payments for several months prior to the news about Rip-
ples ne.[6] In the emails, OKCoin CEO Star Xu claims
to have discovered a more recent version of the con-
tract signed by both parties, which included a clause that
gave OKCoin the right to terminate the contract upon six
months notice. Until this point, all communications be-
tween the two parties had been cryptographically signed
using GPG, but Ver was able to prove that the newer
version of the contract was signed with the same times-
tamped signature he appended to the previous version
of the contract, indicating that his signature was merely
copied over to the new document.[7] OKCoin proceeded
to make a public oer of a $20,000 reward for anyone
who was able to prove that Vers statements were false;
Ver responded in kind by oering a $1,000,000 reward
to anyone who could prove that the signature on the more
recent contract was actually valid and not a forgery.[7] The
OKCoin reward was paid at the end of May, 2015 follow-
ing the report of analysis of the contracts posted publicly
by OKCoin.[8]

5.12.3 References
[1] Bitcoin Charts / Markets. www.bitcoincharts.com. Re-
trieved 2016-08-06.

[2] The China King of Bitcoin: Star Xu - BEIJING, June 10,


2014 /PRNewswire/". Prnewswire.com. Retrieved 2014-
06-30.
Chapter 6

Text and image sources, contributors, and


licenses

6.1 Text
Bitcoin Source: https://en.wikipedia.org/wiki/Bitcoin?oldid=795902693 Contributors: Damian Yerrick, Eloquence, Zundark, The Anome,
Tommy~enwiki, Roybadami, Edward, Canton, Nealmcb, Michael Hardy, Fred Bauder, Liftarn, Ixfd64, Cyde, TakuyaMurata, DavidW-
Brooks, Kingturtle, Julesd, Pratyeka, Glenn, Ciphergoth, Theamer, Mike Linksvayer, Susurrus, Grin, Samw, Ed Brey, Dcoetzee, Fuzheado,
Andrewman327, WhisperToMe, Tpbradbury, Furrykef, Cleduc, Shizhao, Topbanana, Dbabbitt, AnonMoos, Power~enwiki, GPHemsley,
Drernie, Jni, Lambda, Nurg, Pjedicke, Rfc1394, Markewilliams, DataSurfer, Pifactorial, Tea2min, David Gerard, Psb777, DocWatson42,
DavidCary, Nelson Minar, Gil Dawson, Fudoreaper, HangingCurve, MSGJ, Marcika, Gus Polly, Dratman, Gamaliel, Micru, Jorge Stol,
Gracefool, Daniel Brockman, Wiki Wikardo, Esrogs, Isidore, Chowbok, Utcursch, SoWhy, Pgan002, R. end, SarekOfVulcan, OverlordQ,
Quarl, IGEL, Kaldari, Oneiros, DragonySixtyseven, Bosmon, Bodnotbod, Mayosmith, Kevin143, Byset, Shadypalm88, Thorwald, T-Boy,
SYSS Mouse, Mike Rosoft, Shiftchange, AliveFreeHappy, Rudd-O, Robert Horning, Discospinster, Bri, Rich Farmbrough, Tere, Pmsyyz,
Zombiejesus, Smyth, Cagliost, D-Notice, Arthur Holland, TimBray, Gronky, Bender235, Mike Hearn, Jgarzik, Neko-chan, Pjf, Kwamik-
agami, Emeitner, Mr. Strong Bad, Art LaPella, Tgeller, PatrikR, BalanceUT, Cretog8, Aceat64, Truthux, Stesmo, Billymac00, Small-
jim, Beachy, John Vandenberg, C S, Makomk, Giraedata, Palmcluster, 99of9, BenM, Mattl, Ociallyover, Spitzl, Gary, Terrycojones,
MrTree, Bnicklin, The RedBurn, Mizerydearia, Vaelor, Lectonar, Graingert, Jonathanriley, Daniel.inform, Theodore Kloba, Spangineer,
Atomicthumbs, Teggles, Wtmitchell, Velella, Rebroad, Quintin3265, Stephan Leeds, Runtime, Tony Sidaway, Geraldshields11, DaveIn-
Austin, Dzhim, Dduane, Drbreznjev, Recury, Voxadam, Martian, Hyfen, Dismas, Daranz, Zntrip, Feezo, AustinZ, Bobrayner, Gmaxwell,
Dandv, ApLundell, Shadeofblue, Danmaz74, MattGiuca, Benbest, Pol098, Tabletop, GregorB, Simsong, Mattmorgan, Stcalvert, Fleetham,
BD2412, Qwertyus, David Levy, Zzedar, Jclemens, Ses4j, Koavf, Isaac Rabinovitch, Jake Wartenberg, Hulagutten, Helvetius, Strait, XP1,
ColdWind, Mikesc86, Jrn0074, Ekspiulo, Ttwaring, MarnetteD, Syced, Diablo-D3, SystemBuilder, Ground Zero, Akihabara, KarlFrei,
Ysangkok, Crazycomputers, GnniX, Intgr, Lmatt, Sperxios, OpenToppedBus, Schandi, Mrschimpf, Alec.brady, Benlisquare, 020543m,
Voodoom, Bgwhite, Manscher, Fcs, Aalegado, Wavelength, ThunderPeel2001, Conchisness, Taurrandir, Mrienstra, Huw Powell, Cyferx,
MJustice, Red Slash, Chosenken, Bhny, Pi Delport, Hydrargyrum, Stephenb, Sneak, David Woodward, Danuthaiduc, NawlinWiki, Teb728,
GSK, E123, Arichnad, P The D, Joel7687, Harksaw, Mesolimbo, Brandon, Vivaldi, Voidxor, FML, Tony1, Zythe, Deku-shrub, Luke-Jr,
Morgan Leigh, Eclipsed, DRosenbach, Kkmurray, Black Falcon, MarkBrooks, Unforgiven24, Ott2, Genjix, Cmskog, Ripper234, Larry-
LACa, Sandstein, Johndrinkwater, Pyronite, Ninly, Nikkimaria, Arthur Rubin, Bondegezou, Modify, Netrapt, Richardbondi, Petri Krohn,
Pifvyubjwm, Paulsnx2, Shawnc, Back ache, Katieh5584, Merlinthe, Tom Morris, Chronosilence, SmackBot, Ashenai, Kosik, C.Fred,
Ginot, Elwood j blues, KVDP, Delldot, Crazyanimal, Wanders~enwiki, Rnin, Timotheus Canens, Wittylama, Mauls, Tim@, SmartGuy
Old, Yamaguchi , Gilliam, Portillo, Emj, Ohnoitsjamie, TrollDeBatalla, Sparge, Wcoenen, Chris the speller, Advorak, Thumperward,
Gil mo, Elatanatari, GeraldKaszuba, V4vijayakumar, James Fryer, SvGeloven, Mdwh, Deli nk, Jerome Charles Potts, Jfsamper, Jdt-
hood, Tekhnoend, Kmag~enwiki, Ladislav Mecir, Lenin and McCarthy, Mike hayes, Famspear, Tamfang, Smallbones, Metallurgist, Frap,
Zootreeves, Jtbobwaysf, Rrburke, Xyzzyplugh, Kittybrewster, WhereAmI, Blue Matt, Fuhghettaboutit, Fiskbullar, Ddas, Speedplane, Wal-
doJ, RolandR, BackDraft9387, Derek R Bullamore, Clean Copy, Nonstopdrivel, Sokolesq, Kleuske, Webjoe, Meni Rosenfeld, Piedmont,
Springnuts, Juneblender, Byelf2007, Paul 012, Lambiam, Mike the k, Dmh~enwiki, Jjjjjjjjjj, Kaputa12, John, ZAB, Robosh, Plaiche,
Severoon, IronGargoyle, Nagle, Tymothy, Melody Concerto, Makyen, Davemcarlson, Larrymcp, Meco, Dr.K., AdjustablePliers, Jcmorin,
Dl2000, Jimisdead, Pjrm, Norm mit, PaulGS, DouglasCalvert, Iridescent, Kencf0618, Jmchugh, Clarityend, Courcelles, WakiMiko,
TiriPon, Mikeyfaces, FatalError, Geremia, Jackzhp, Risoto2000~enwiki, Matthieu Houriet, Mgumn, BeenAroundAWhile, The Cake is
a Lie, JohnCD, Jokes Free4Me, N2e, Penbat, Thepm, Cydebot, Cahk, Danrok, Krauss, Snarpel, ChristTrekker, Reywas92, Steel, Gogo
Dodo, Jedonnelley, Maged123, Bposert, DumbBOT, Hontogaichiban, Biblbroks, Kozuch, Sckirklan, Arb, Crum375, PamD, Ishdarian,
Headbomb, Parsiferon, Davidhorman, EdJohnston, Gnurkel, Floridasand, Kjj31337, Izyt, Mmortal03, Utopiah, KrakatoaKatie, Ileres-
olu, CLSwiki, Seaphoto, Lovibond, Activist, Smartse, Mack2, Jdhowlett, SCarboni, Kmcnamee, JonathanCross, Ingolfson, Steelpillow,
Daytona2, Deadbeef, Leuko, Dereckson, Barek, MER-C, Skomorokh, Sonicsuns, Bidofthis, OhanaUnited, Andonic, Dscotese, Mwar-
ren us, Gert7, Xoneca, Magioladitis, Swikid, Firenu, Yakushima, JamesBWatson, SHCarter, Nyttend, Froid, Destynova, I JethroBT, JL-
Madrigal, Tekn04, Sipa1024, Logictheo, Mjbauer, Mcfar54, Craig Mayhew, Dan Pelleg, JaGa, TimidGuy, Gwern, Oren0, FisherQueen,
Ekki01, Jimmilu, Rsraleigh, CommonsDelinker, Xiphosurus, ShoWPiece, Shellwood, Metallaxis, Trusilver, Maurice Carbonaro, Xris0,
Headinthedoor, Manderso, Smite-Meister, Maproom, Toobaz, Lordgilman, Nemo bis, 10mbt, Laytonsmith14, Tarinth, Leonarbe, NewEng-
landYankee, Ontarioboy, Yablochko, Misbach, Tyraz, Ultra two, KylieTastic, Corriebertus, Ross Fraser, Ajfweb, Bonadea, Scott Illini,
Pdcook, BernardZ, Loopback007, Davidr89, Cuzkatzimhut, Theochino, VolkovBot, Thomas.W, Rubyuser, Fences and windows, Dom
Kaos, Toddy1, QuackGuru, Redpointist, Philip Trueman, Oshwah, Giszmo~enwiki, Jogar2, Burpen, Sbjf, Chuckwolber, HannahKon,

102
6.1. TEXT 103

JUBALCAIN, Someguy1221, Cloudswrest, Jakebed, Rjm at sleepers, Noformation, Atheros1, UnitedStatesian, Unknownlight, Sheridan
Zhoy, Ale85, Larklight, Agyle, Billinghurst, PeterEasthope, Dirkbb, Cooperh, Poltair, Ashokpanda1, Celosia, Tigerchen, Ecnirpnaf99,
Jakub Vrna, Groceryheist, TheLastNinja, Jehorn, Ellomate, DestroyerofDreams, EverGreg, Ponyo, TJRC, Swliv, Hertz1888, OldCar,
Znmeb, Gatopeich, X-Fi6, Yintan, Revent, Araignee, Soler97, Gts 2000, Bentogoa, Flyer22 Reborn, Jimthing, EditorInTheRye, Ro-
darmor, SPACKlick, Jonahtrainer, DMNT, SimonTrew, Int21h, Oniscoid, Cpey, Metalsmyth, Svick, Stfg, S2000magician, HighInBC,
Randomblue, MarkMLl, Tradereddy, Mr. Stradivarius, Dabomb87, Denisarona, VanishedUser sdu9aya9fs787sads, ImageRemovalBot,
Mx. Granger, Sfan00 IMG, Verbaetlittera, Elassint, Keyur mithawala, SummerWithMorons, Jbening, Ethridgela, Newzild, Dmurashchik,
Blueyed, Cambrasa, KeithyIrwin, Quinxorin, Drmies, Der Golem, Frmorrison, Mild Bill Hiccup, Leopard850, SuperHamster, Niceguyedc,
Kamillas 1, Jswd, LeoFrank, Kitsunegami, Excirial, Socrates2008, Watchduck, Karlhendrikse, Mandtplatt, Sebleouf, NathanWalther, Dr-
Croco, Arjayay, Tuchomator, Snacks, Tony Holkham, JasonAQuest, NintendoFan, Ecureuil espagnol, Chrisarnesen, Zootboy, SF007,
Lironah, M.qrius, Curious georgianna, Twovethreetwo, Jtjathomps, XLinkBot, Jytdog, Laser brain, Dthomsen8, Mitch Ames, Galzigler,
CapnZapp, Beach drifter, Mrcatzilla, MystBot, Jabberwoch, Glavkos, Dbrisinda, Addbot, Mckinley99, Mortense, Grayfell, FrankAnd-
Proust, Antonio92~enwiki, Thomasee73, AlbinoFerret, Mike30188, Mootros, TutterMouse, Frankensite, IceCreamEmpress, Philoso-
phyKing, BabelStone, Download, LaaknorBot, JasonCooney, Neilonidas, NittyG, Favonian, Rook944, Jasper Deng, AgadaUrbanit, 84user,
Ehrenkater, Equilibrium007, Josh Keen, Cesiumfrog, Jarble, Mutorq, , Softy, The Bushranger, Ben Ben, Legobot, Acmi-
lan15, Luckas-bot, Zhitelew, Yobot, Fraggle81, Louisstar, Legobot II, Ddcorkum, Amirobot, Sobi3ch, Denispir, Aoxfordca, R2D2!, Edoe,
Rick Raubenheimer, Torsch, GamerPro64, Jerebin, Kirov Airship, Masharabinovich, Vroo, Dickdock, 4th-otaku, Dmarquard, David-
Harkness, Ian Kelling, AnomieBOT, KDS4444, Wikiyakapoola, DemocraticLuntz, John Holmes II, Erel Segal, Message From Xenu,
Jim1138, Interligator, Keithbob, L3lackEyedAngels, Mann jess, Materialscientist, Are you ready for IPv6?, Citation bot, Object404,
V8skittles, GB fan, ArthurBot, Teilolondon, LilHelpa, Xqbot, Huangpo, JimVC3, El33th4x0r, Crookesmoor, Aussiejohn, Mononomic,
GenQuest, TheCuriousGnome, DataWraith, Gidoca, Dniel Fraga, Jamescart, Srich32977, Mr.choppers, Sithishade, Solphusion~enwiki,
Frettsy, Bizso, Omnipaedista, Orbixx, The Interior, Carrite, West Coast Gordo, KennethHan, RCraig09, Polargeo, Rasos, Dpinna85,
Sainibindass, A. di M., ASOTMKX, Sandro kensan, GliderMaven, Anna Roy, ., Riventree, Hobsonlane, Mu Mind, Quinn d,
UncleNinja, Sanpitch, WikiDonn, Alarics, Ptrinh18, RoyGoldsmith, Timos m, Haeinous, Mfwitten, Kenfyre, Marcel van b, Redcert,
Alex.ryazantsev, Greggydude, Weirdo10o4, OgreBot, Redrose64, Dusanson, Extramaster, OriumX, Gautier lebon, Pinethicket, I dream
of horses, Elockid, Alphazeta33, Lesath, Sanderd17, Intrepid-NY, Raphaelbastide, Calmer Waters, Smithd98, The.megapode, Hisabness,
Henriwatson, ContinueWithCaution, Cathy Richards, Rholme, Kylebk, Niri.M, Kgrad, Soundcomm, Tbuckley89, Sandegud, Trappist the
monk, Dchestnykh, Sirius-n, The Frenchie, Jesus Presley, Shelbymoore3, Throwaway85, Lotje, Krassotkin, Callanecc, Krisives, Athaba,
Ponmudivn, Miracle Pen, Bluest, Mattmill30, Mcharnay, Aoidh, Cowlibob, David Hedlund, Jadair10, No One of Consequence, Diannaa,
Vanzandtj, Ivanvector, Fblan001, Chronulator, Skakkle, Stanjourdan, Suusion of Yellow, EyeKnows, Skmacksler, Civic Cat, Jfman-
tis, Mean as custard, JjusticeIV, Dree12, RjwilmsiBot, Sargdub, Ripchip Bot, VernoWhitney, Vivek.m1234, Phlegat, Mchcopl, Opticbit,
HeinzzzderMannn, Kiko4564, Rollins83, Steve03Mills, Rayman60, EmausBot, Cricobr, WikitanvirBot, Timtempleton, Rathergood15,
Look2See1, Observer6, Nuujinn, Philippe (WMF), Mjdtjm, Jibbsisme, Dewritech, GoingBatty, RA0808, Marco Guzman, Jr, Gardaud,
Gogophergo, Antiquax, Qrsdogg, Klbrain, Torturella, NorthernKnightNo1, Your Lord and Master, Steve Lux, Jr., Mmeijeri, Wikipelli,
Dcirovic, Gagarine, Kaskaad, K6ka, Zeallous, Werieth, JDDJS, Grondilu, ZroBot, QuentinUK, FlippyFlink, John Cline, Checking-
fax, Josve05a, Bollyje, Humanist09, Melksoft, rico, Leotheleo, Mrmatiko, Eugene4444, Jonpatterns, Fortheloveofbacon, Yiosie2356,
7partparadigm, SporkBot, Arpabone, L0ngpar1sh, Ocaasi, Casascius, Andre.Koster, Coubs514, JoeSperrazza, Gonzo.Lubitsch, Libertaar,
0Core0, CJDuhaime, Palosirkka, Spobin, Gsarwa, Donner60, SBaker43, Do3cc~enwiki, Bulwersator, Ipsign, Blibrestez55, Chuispaston-
Bot, Gandrewstone, AndyTheGrump, JanetteDoe, Targaryen, Jav wiki, Elph, Kai445, Ebehn, Doc Merlin, TitaniumCarbide, Davey2010,
Voomoo, Cgt, Petrb, Mikhail Ryazanov, ClueBot NG, HLachman, Johnnyshocker, Gareth Grith-Jones, George strawberry, Ulund,
Somedierentstu, Verpies, Ypnypn, LogX, Gilderien, Satellizer, Exposo, Polargeo 3, Tcatm, Magic1million, Vacation9, Loginnigol,
Kjrreid, Mahir256, Bussings, Imperi, YuMaNuMa, Korrawit, Matt06012011, Alex1inferno, Seancasey00, OverQuantum, Bazuz, Table-
track, Mathew105601, ParkKimLim, Frietjes, Dreth, Porkloinson, Luziusmeisser, Asukite, VinceSamios, Cyborg4, Widr, Heyandy889,
Nicboman, Newyorkadam, Ryan Vesey, Lawsonstu, Barry McGuiness, Slushcz, Gerritharkness, Oddbodz, Helpful Pixie Bot, MS10EL,
Ericsheldon, Rhydic, Cojovo, Aesir.le, Calabe1992, Guest2625, Hostfat, Emisanle, Jeraphine Gryphon, Technical 13, Da5id403, Lean-
dro.cesar, Lowercase sigmabot, BG19bot, Justintbassett, Roberticus, Dvtimes99, Esoteric10, FuFoFuEd, Astrohacker, Criticcon, WikiTry-
HardDieHard, The editor1900, Iselilja, Werowe, 13Goldem, Dpacmittal, Jcnetsys, Proudnewly1, Maccollie, Brustopher, ThereNHere, Ba-
touzo, Nen, ThisIsNotReal, McZusatz, JesseT77, Global Standard, MusikAnimal, Ecurrencies, Nikos 1993, Bitcoineer, Cavirtex, GKFX,
Sirws, Sharpseek, Elucches, WinampLlama, Mark Arsten, Erik.Bjareholt, Vermillion trade, Miraje182, Fbarousse, BitcoinTomWilliams,
Socialmaven1, Exercisephys, Falkirks, Dmoores55, Juggernauts10, ChrisPDX, Izmailov, Mascarponette, FormerNukeSubmariner, Cita-
tionCleanerBot, Terry4forex, Ainderbyquernhow, Ivan.a.tikhonov, Peterowenwilson, Majorbolz, Crh23, Bob Re-born, TheMacMini09,
U4ealongan, Lxndr, MrBill3, GoCubs88, Rivoton, Victorsharpe, JMtB03, Tesssla, Cli12345, Thegreatgrabber, Klilidiplomus, The-
GoodBadWorst, Steve.alleny, Rutebega, Cleanelephant, Pastrychick, Clearish, Hamez0, Winston Chuen-Shih Yang, Samwalton9, Mean-
MotherJr, BattyBot, Factsearch, Sonba, Tkbx, Tutelary, Mleeds12, David.moreno72, ~riley, Mitesheth, Testem, Zhaofeng Li, Kabesang
Tales, JayBeeCool, Swctg, Cyberbot II, Phelix77, 0x0F, ChrisGualtieri, Larmsterpoet, JimNelin, CrunchySkies, Iolaka91823972, Jray310,
Electricmun11, Polarandwet, Earl King Jr., Khazar2, Momposi, Xoviat, MSUGRA, MohammedBinAbdullah, Tow, Meiloorun, DJ-
Fission, OsmanRF34, Dexbot, Jockzain, Rezonansowy, TobyGoodwin, Swenkman, Codename Lisa, Black Rainbow 999, Mogism, Ci-
tation Needed, Guss82, Kbog, Kephir, Doggum, Cerabot~enwiki, TippyGoomba, Lone boatman, Farmenergybars, Bitenthusiast, Lut-
worth, MrAndreessen, Nonnompow, Lugia2453, Hto9950, Leptus Froggi, Frosty, Osyed1, Statecraft, HowardStrong, ComfyKem, Andy-
howlett, 123sage321, Pizarrojesus, Ezzayakoo, SPECIFICO, W1k1p3d1a26, Danny Sprinkle, Gowthamkare, Telfordbuck, Leijurv, An-
other John S, Mariagvozd, BurritoBazooka, Gatenosix, BeachComber1972, Anonymous68th, PinkAmpersand, Sr.ganador, Epicgenius,
SolarStarSpire, Tsgesq, BitBus, Hotelmason241, Ianpurton, Ruby Murray, Play Money for Dummies, Tomato expert1, Neoconfederate,
EricLarson80, Mbmexpress, Kap 7, Surfer43, Dairhead, TinkleBear, Alfy32, Wuerzele, Tango303, Dvdlevy120, RaphaelQS, Jacque-
lineDerrida, JimHarperDC, Thkie, Flat Out, Byung do jung, New worl, Sarath divakar, Money money tickle parsnip, Suumitgeek, Kyle-
Landas, GegeZ, Akh81, Ndeine, NorthBySouthBaranof, FischTank, Asm20, NYC.Geek, Klakurka, 51coin, Patrick2409, NottNott, My
name is not dave, Jupitus Smart, MisterHungry, JoshDieter, Someone not using his real name, JeanLucMargot, Sam Sailor, Keepinter-
netfree, Jianhui67, EverythingGeography, Paul2520, Archlinux, Drchriswilliams, TCMemoire, Oumot, MrScorch6200, DarkestElephant,
DPRoberts534, XTC99LLC, Bojo1498, Rahulsuresht, CameraWallet, Pinetreecrush, LaFayettePolitico, Lemonsdrops, Fixuture, Crow,
JaconaFrere, G S Palmer, Lakun.patra, Marc Bago, Eliteware, JexsterB312, Tunacanoe, Unicodesnowman, Weslam123, ExtremeHeat11,
CogitoErgoSum14, Vcwatcher, Mikhat, CarnivorousBunny, Encrypto1, Yoshi24517, Nyashinski, Jaumenuez, YubbaDoo, Craigrottman,
Currency cobano, Mattpalen, Silbtsc, Mojargon, BitcoinWiki, Hypnopompus, XDexus, Pigpie45, Bitbain, Krautsk, Wiki man 195,
Concord hioz, Monkbot, BarnstarFactory, BerkeleyLaw1979, JorgeGabriel, Powerful Lomax, Volker Siegel, Teaksmitty, Litecoinguy,
CFRN Editor, Kitsios.a, Justin15w, Jebanks101, J.vayner, SantiLak, Lauritzf, Colombo Eagle, OKNoah, Seppelpeters, Abckhxkcvr-
104 CHAPTER 6. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES

tyu, Zulkar ramzan, Wikifanman33, Dsprc, TitmanTrolled, BkDJk, Blue oracl2495, Manishvyas1747, Rextexesq, QuantOfAsia, Ali78v,
Bobby223322, Nexthh87, Hats2543, Shadowzdx, ChrNPal, Qwertym77, Mollyjohn1436, BitcoinrealityCheck, TwoEscarf, 12uihy, Pird-
PirdPrid, Milidepe, Paulpocket, LampWithALeaf, WwATuu, Urunak, MARIODOESBREAKFAST, FOXIBOX, LoseKabel, Hannasnow,
Robert-Rhys, Henryb2000, 10pippe, Bitslots, ChocTinFoil, LeeParq, Chunchi8, Hitechcomputergeek, Vilalna, Titfditroyl, Superdavy-
wavy, Eliteness, SpiltOctacle, MonteDaCunca, Unframboise, Thegrubbsian, Imthewinner, Vinnie james, DissidentAggressor, Rooley555,
Immanuel Thoughtmaker, UneCanardNoire, Myfare, HMSLavender, Ozzke, BitMeistern, Julia Eremina, Anotherusername1, Coin Col-
lecting John, Zowayix001, Vwm3nelson, Homni, Wasill37, HamishPassion, Mozzzus, Akemaschite, KH-1, Mario Casteln Castro, Cal-
iburn, Phrackage, TheMagikCow, Kshanti07, Randomuser0122, ChamithN, Expresscoin, Bastian crypto, Webdesignersnow, AydinC,
Tmarie3753, Jack Matelot, Jsthack, BITPUMP, Mtahaalam, BondNewYork, Druxe, Adeyaya, Sysuwxm, Sealyy, TBroe, Primealgorith,
Matthew Ferguson 57, Creationlayer, Liance, ThePenultimateOne, Brianrisk, Tenaqzn'f Fbvyrq Gubat, Wuerzele2, Hayman30, E3b0c,
Donate Bticoin, Rog31905, TheCoeeAddict, YossiBoroPark, Esquivalience, Weegeerunner, Buchanjim, Mariksel, 4455tyui, Lothlo-
rien317, BitTony, Vatadoshu, BoA-BTCopsec-14, TyHeers, Craftdraw, Sizeont, SoSivr, GimmeOpenRoad, Nysrtup, Acruxlilt, THE
GREY LINER, Kraainem, SaronBacchus, BashCo, DiogoCo, Jimmylone, SamsungGalaxyPlayer, , Benjaminikuta, Spiry-
Golden, Ster3oPro, MariaAnnaWien, Eric0928, Zahirfahmi, I enjoy sandwiches, MLODROB, KasparBot, Ceannlann gorm, Samalter,
Rickshawcraw, Pharoah237, BitcoinX, LJWiki2000, Brollymook, Politrukki, 666AngelOfDeath, DylanMcKaneWiki, , Pyrros, Con-
tentry, Milko Zec, Wywyit, Ira Leviton, My Chemistry romantic, Pendletonian, Zmetzger11, VirtuOZ, Cashregister225, Malibubarbie, Pe-
terVanDerStraaten, BU Rob13, NorwayStorm, Gaelan, Furious Mythical Beast, CAPTAIN RAJU, D4m13nb3rry, FiddleFudger, Chevvin,
PetitMonsieur, Thereisnous, 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, Dr Lotus Black, ElectricController, FOSBusters, Pocketapock-
eta, Sftty, Cockblower, Brandonb01, Simplexity22, AdmiredSneeze, 1FVLiNNTM65cxZ1rErevtEBLGHxzDMnVRY, Bitcoin Guy, Wel-
tenstuermer, Qzd, Scott085, Sangeethfrancisjames, Ecoinseo, InternetArchiveBot, PowerdByCaeine, Sineout, KryptoNatasha, 30has09,
Mdclxvi0, Ghost of hugh glass, 20.11., Jeboh, Dertyqwerty, Oreigdor, Optimised, GreenC bot, Btcvia, HarshPandya09,
Chrimas1, ThePlatypusofDoom, Gulumeemee, BearGlyph, Someone Not Awful, Johnwk, AppMaster1000, AtErik1, Zfrohardt, Emir of
Wikipedia, Bender the Bot, 72, PointedToTheMoon, Earl King, Tiven2240, Sparkyscience, Attraction3, Bladefrost, Bobbeeeeee, Marmara-
group, DIYeditor, GoPackGoHome, Wikiconceptt, Mrkibble, Felcotiya, Brandonkellynd, Tankst, Rishabh.idea, Prinsipe Ybarro, Karlpop-
pery, Al014789, DSmurf, Heather-Hit, Carlathomas21, Brittbal0, Rishabh82, Jerm1020, Ashu panth, Rahm93, Kerryliny, Royal2412,
Tisike, Octavian706, Zinedine17, Yobitnet and Anonymous: 1066
History of Bitcoin Source: https://en.wikipedia.org/wiki/History_of_bitcoin?oldid=795741918 Contributors: AxelBoldt, Fnielsen, Ed-
ward, Dj ansi, David Latapie, Dbabbitt, Chealer, Gil Dawson, Guanaco, Gracefool, Mormegil, Nwerneck, Stesmo, David Levy, Rjwilmsi,
Akihabara, Ysangkok, Catsmeat, Benlisquare, Bgwhite, Wavelength, RDKTSR, Red Slash, Hydrargyrum, Rsrikanth05, Luke-Jr, Puritan
Nerd, Bondegezou, Rathfelder, Exukvera, Jerome Charles Potts, Ladislav Mecir, Frap, Jtbobwaysf, WhereAmI, The Cheating King, Milbor-
neOne, IronGargoyle, Kencf0618, Kozuch, Brettreasure, Headbomb, Floridasand, JonathanCross, Xhienne, Nyttend, KConWiki, PStrait,
Sirpupu, KylieTastic, Bonadea, Philip Trueman, Agyle, Jonahtrainer, Int21h, TheCatalyst31, Sfan00 IMG, Mild Bill Hiccup, UltraEdit,
Staygyro, Chrisarnesen, Mhockey, Download, LuK3, Softy, Zhitelew, Yobot, AnomieBOT, Erel Segal, Netscr1be, Citation bot, Ywaz,
Alumnum, Ye, Geomenegay, Sanpitch, Breadblade, Gfcvoice, I dream of horses, Jonesey95, David Hedlund, Rschnall, Dree12, Rjwilm-
siBot, John of Reading, Dewritech, GoingBatty, Dcirovic, Werieth, QuentinUK, Checkingfax, Josve05a, SporkBot, Palosirkka, AndyThe-
Grump, ClueBot NG, Onano, Frietjes, Chisme, Hassanchug, VinceSamios, Cyborg4, BG19bot, IlCyborg, Cli12345, Merritttttt, Jose-
manuelgp, Samwalton9, BattyBot, Cyberbot II, ChrisGualtieri, Khazar2, Rezonansowy, Mogism, Kbog, Ikesham, Corn cheese, Adam2us,
PC-XT, Mbmexpress, KyleLandas, Qetrix, NorthBySouthBaranof, Someone not using his real name, Archlinux, Marcila28, Graces-
fall, SamanthaPuckettIndo, Impsswoon, JexsterB312, Thegentlemanfromtralfamadore, Unicodesnowman, Pythonideus, Mercurys Step-
son, Olenyash, BarnstarFactory, Rextexesq, Gsync, Paulpocket, Lolpootis, FlyBEET, Hannasnow, MonteDaCunca, Sarbz, Den82~enwiki,
Adeyaya, Chrisbarnes67, Pretendus, Gamebuster, SoSivr, Stepbang, Stockst, , Equinox, Srednuas Lenoroc, Pendletonian, Websoft-
warerev, 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, Mbevand, GreenC bot, Yinshiyi, Thomae12, Pictomania, Bender the Bot, Kenji
Gunawan, PrimeBOT, Mjgryphon, Jon Kolbert, GoPackGoHome, SnakamotoS, EHD1958, Voo doo, CarolineLA, Ejb212, Jamiecypher
and Anonymous: 103
Legality of bitcoin by country Source: https://en.wikipedia.org/wiki/Legality_of_bitcoin_by_country_or_territory?oldid=795497021
Contributors: Tommy~enwiki, Roadrunner, Roybadami, Jorge Stol, Kieron, PatrikR, Stesmo, Daranz, Benbest, Apokrif, Fleetham, Ak-
ihabara, Benlisquare, Bgwhite, Rsrikanth05, Dbrs, Eclipsed, Newagelink, Josh3580, Yamaguchi , Ladislav Mecir, Cemeraslan, Va-
lenciano, Meni Rosenfeld, Nagle, Iridescent, Runderwo, VanHelsing.16, Gafter, Cydebot, Kozuch, Floridasand, Repku, Magioladitis,
Monkeyjunky, Drewmutt, Ontarioboy, KylieTastic, Theochino, Agyle, Kellypeters, Hotbelgo, Unbuttered Parsnip, Michele.mostarda, Ar-
jayay, Rui Gabriel Correia, Chrisarnesen, Mhockey, Mitch Ames, Mrcatzilla, Grayfell, Download, Josh Keen, Zhitelew, Yobot, Fluiday,
Bearas, AnomieBOT, Materialscientist, Pjs2008, Pipeafcr, Jeune17, Ptrinh18, Alejandroadan, Haripetrov, Lady Lotus, Jonesey95, Cere-
visae, Arbero, Trappist the monk, Lotje, Callanecc, David Hedlund, Herun1988, Dree12, Misconceptions2, John of Reading, MrFawwaz,
Dewritech, Checkingfax, Leotheleo, Derekleungtszhei, AManWithNoPlan, CJDuhaime, GermanJoe, Iketsi, ClueBot NG, Joefromrandb,
Mahir256, Hahahafr, VinceSamios, BG19bot, WikiTryHardDieHard, Riyantojayadi, BattyBot, David.moreno72, ArmorShieldA99, En-
terprisey, Rezonansowy, Mogism, Jackninja5, Vengadora, Surfer43, Soredo, Wuerzele, DavidLeighEllis, Mareksip, Yilku1, CyrusV,
Habarithor, SamanthaPuckettIndo, Unicodesnowman, Mattpalen, Silbtsc, Monkbot, CV99, GinAndChronically, Ks91020, 10pippe, Bit-
Meistern, Huuku, Jelly Bean MD, Homni, Wasill37, Phrackage, Knowledgebattle, Jonoweltman, EoRdE6, K.e.coman, Esquivalience,
Matshenricson, Ictgeek, Pzez, Goenkas, Droidmaxxx, Juan Jos Garca Chvez, Celsiuss, Srednuas Lenoroc, Bitcoinina, Saintv2, Lin-
guist111, FOSBusters, Tiseko88, Gautam Shetty, Qzd, InternetArchiveBot, McGucket, GreenC bot, Neurotrophian, Cumisfun, Chalitshee,
Thomas James Foster, Bender the Bot, Pradeepsingh1993, Gozakhar, Marcopesani, Bukhosimhlanga, Nickps and Anonymous: 109
Satoshi Nakamoto Source: https://en.wikipedia.org/wiki/Satoshi_Nakamoto?oldid=795768138 Contributors: Enchanter, Mrwojo,
Michael Hardy, Kaihsu, David Latapie, Fuzheado, Greenrd, Jeq, Huangdi, Bearcat, Auric, JackofOz, Hucknne, Mdmcginn, var
Arnfjr Bjarmason, Wiki Wikardo, Esrogs, Thorwald, Shiftchange, Zombiejesus, Smyth, TerraFrost, Mike Hearn, Glenn Willen, Et-
noy, John Vandenberg, Deryck Chan, Gargaj, GregorB, BD2412, Tlroche, Koavf, Vegaswikian, Ysangkok, Crazycomputers, Catsmeat,
Czar, Intgr, Lmatt, Wester, Stan2525, Bhny, Matt Fitzpatrick, Hydrargyrum, Anomalocaris, Korny O'Near, Dissolve, Moogsi, Abune,
CharlesHBennett, Mlibby, SmackBot, McGeddon, Mauls, Gilliam, Ladislav Mecir, Racklever, Icerat, Jtbobwaysf, Soap, Ben Moore,
BillFlis, Kothog, Iridescent, Yugyug, CalebNoble, Jesse Viviano, Penbat, Staberinde, Widefox, Obiwankenobi, Jayron32, Yellowdesk,
JonathanCross, FuriouslySerene, Magioladitis, TGGP, Dane, Oren0, Anaxial, ChrisfromHouston, Maproom, Katharineamy, Misbach,
Sigmundur, Ajfweb, Black Kite, Fences and windows, Oshwah, Mercurywoodrose, Agyle, Y, BrianRecchia, Jkalltheway, OldCar, Flyer22
Reborn, Lagrange613, Randomblue, Niceguyedc, NuclearWarfare, Arjayay, TheRedPenOfDoom, SF007, Karpouzi, Mortense, FrankAnd-
Proust, 84user, OlEnglish, Jarble, Yobot, Carleas, Dmarquard, AnomieBOT, Jim1138, Materialscientist, G6cid, Gumok, Veryhappy-
chappy, Omnipaedista, Patchy1, Rotideypoc41352, Sanpitch, Mistakender, Rhalah, Vicenarian, LittleWink, Pmokeefe, Woodcutterty,
6.1. TEXT 105

Mannaro85, Aoidh, Yunesj, Tbhotch, Onel5969, Brkt, GoingBatty, Peaceray, Your Lord and Master, Dcirovic, Chihaya Sta, DuN-
noxd, AvicBot, Checkingfax, Donner60, AndyTheGrump, ClueBot NG, , Kejia, Polargeo 3, Hahahafr, Ngabor7, Newyorkadam,
Guest2625, Emisanle, Abhishekgharat, Aoidh (Away), BG19bot, KateWishing, WalterKin, Kendall-K1, Erik.Bjareholt, David.karpay,
Cgos62703, Samwalton9, BattyBot, Da9iel, Codeh, Rezonansowy, Another John S, Bitcoin, Hopkinsenior, Rmehtany, Neoconfederate,
Jodosma, Surfer43, Blythwood, Bahooka, KevinLiu, Comp.arch, KyleLandas, NorthBySouthBaranof, Matrix142, TheycallmetheDoctor,
Stamptrader, Thatonewikiguy, SamanthaPuckettIndo, Unicodesnowman, YubbaDoo, Henry Castor dos Santos, Felderburg, BusinessRules,
Filedelinkerbot, Taco Viva, Flippzz, Editosaurus, Augusto192, Lgats, Hannasnow, Hitechcomputergeek, KDDLB, CamelCase, Ywe-
cur, Aleowk, KH-1, Handpolk, Satoshinakamotosan, Adeyaya, Creationlayer, Hollth, Danmabraham, Govindaharihari, Grocko1, Craft-
draw, Adamheins, Roselyn Hamilton, Sss04, Kripmo, GeneralizationsAreBad, AlshMoudy, KasparBot, UrnJ, Anarchyte, DosPassos,
Aduggan1234, Maxbradleyadams, Juhishadan, 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, Mar11, Senoranandmanikutty, Aditshah00,
RoyalMer, Great oors, Gulumeemee, Kayminmb, DougMaher, Roost btc, Emir of Wikipedia, El cid, el campeador, Anam 786, Bender the
Bot, Navtsi0479, Kennethttran, Kanglord, WestonReed, Wuzkool, Magic links bot, LiamC544, Hameltion, Kennakamoto13, Maan2213,
Carlathomas21, Rahm93, Fact bruh and Anonymous: 220
Hal Finney (cypherpunk) Source: https://en.wikipedia.org/wiki/Hal_Finney_(computer_scientist)?oldid=790526640 Contributors: Mike
Linksvayer, Rosarino, Bender235, Mjackson, Wikiklrsc, ArtDent, Bhaak, SmackBot, Sadads, Jtbobwaysf, Bradenripple, Robosh, Cyde-
bot, Obiwankenobi, Connormah, Bongwarrior, Waacstats, Thibbs, Gwern, Ontarioboy, GrahamHardy, Ruukasu2005, Natg 19, DFRussia,
Atepomaros, Chrisarnesen, Yobot, AnomieBOT, Unbitwise, RjwilmsiBot, Adits90, Catlemur, Wgolf, BG19bot, ArmorShieldA99, Cy-
berbot II, Clevera, Wuerzele, YubbaDoo, Creationlayer, KasparBot, 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, RobbieIanMorrison,
Bender the Bot and Anonymous: 19
Gavin Andresen Source: https://en.wikipedia.org/wiki/Gavin_Andresen?oldid=795126149 Contributors: Lquilter, Samw, Bearcat, Pulp-
Spy, Shiftchange, YUL89YYZ, Koavf, Ysangkok, Back ache, Hmains, Jtbobwaysf, Derek R Bullamore, Timtrent, Cydebot, Obi-
wankenobi, Jayron32, DGG, R'n'B, Adavidb, Seudo, Aboutmovies, UnitedStatesian, Gbawden, Repat, Chrisarnesen, Tassedethe, Jere-
bin, AnomieBOT, Pmokeefe, Jadair10, Ponydepression, Justinba1010, VinceSamios, BG19bot, Kendall-K1, Mark Arsten, Cli12345,
Plimptiplom, Wuerzele, YubbaDoo, Creationlayer, Gladamas, 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, Favourized, Aramsow21 and
Anonymous: 16
Nick Szabo Source: https://en.wikipedia.org/wiki/Nick_Szabo?oldid=793864881 Contributors: Mike Linksvayer, Fuzheado,
Power~enwiki, Phil Boswell, David Gerard, Ysangkok, Xoloz, P The D, Mattythewhite, Beetstra, N2e, Penbat, Medovina, Obi-
wankenobi, Waacstats, Ontarioboy, Fences and windows, Lamro, Chrisarnesen, Andreic777, Yobot, AnomieBOT, Sanpitch,
Tom.Reding, Beyond My Ken, BG19bot, Daveman16, ChrisGualtieri, Pintoch, TortoiseWrath, Jodosma, DavidLeighEllis, Mer-
curys Stepson, YubbaDoo, Augusto192, Ferenstein, Yousefak123, Handpolk, Creationlayer, Tourorist, KasparBot, Pendletonian,
1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, Flo626, Bender the Bot, PrimeBOT, Looposhinakafomo and Anonymous: 14
Winklevoss twins Source: https://en.wikipedia.org/wiki/Winklevoss_twins?oldid=795557723 Contributors: Agtx, AnonMoos, Jerzy,
Xanzzibar, Discospinster, Night Gyr, Lauciusa, Art LaPella, Dgpop, BDD, Dandv, Benbest, Kmg90, Karam.Anthony.K, RichardWeiss, Sj,
Rjwilmsi, ElKevbo, Ground Zero, Ysangkok, King of Hearts, Bgwhite, RussBot, Arichnad, SmackBot, Portillo, Derek R Bullamore, Will
Beback, The Man in Question, CmdrObot, Kenyan105, MC10, SchutteGod, Widefox, Obiwankenobi, Inks.LWC, Waacstats, Vanished
user ty12kl89jq10, NatGertler, George415, Mufka, Wikimandia, Agyle, Raivenblade, MBD123, GorillaWarfare, All Hallows Wraith,
Niceguyedc, Auntof6, Arjayay, Chrisarnesen, Ost316, Download, Yobot, Fraggle81, Tiller54, McAnt, Lady Lotus, Serols, RjwilmsiBot,
Aircorn, EmausBot, MikeyMouse10, Checkingfax, Shuipzv3, A930913, General Fiasco, Surajt88, Targaryen, ClueBot NG, FreebirdBiker,
Yale2013, BattyBot, Sscsasrs, Fraulein451, Cheerioswithmilk, Jecm1990, Everymorning, Sayitclearly, Jules871, NottNott, Bmrg567,
Kind Tennis Fan, Potenttomato, Frenchballmansquid, AbeFrohman1977, YubbaDoo, TropicAces, Script8man, TheMagikCow, Kshanti07,
BD2412bot, 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, Bender the Bot, Xuzsagon, None of your beezwax and Anonymous: 63
Mark Karpels Source: https://en.wikipedia.org/wiki/Mark_Karpel%C3%A8s?oldid=792147890 Contributors: Wjhonson, David Ger-
ard, Piotrus, Smyth, Smalljim, Saga City, Fragglet, DAJF, Deku-shrub, Jerome Charles Potts, Lenin and McCarthy, MagicalTux, Tbc42,
Jesse Viviano, Danrok, Obiwankenobi, Magioladitis, Waacstats, Ajfweb, Oshwah, Agyle, All Hallows Wraith, Willhwl, Underwaterbualo,
84user, AnomieBOT, Jonesey95, Ecafyelims, Dewritech, GoingBatty, Josve05a, ClueBot NG, Catlemur, Chisme, BG19bot, Squirelewis,
Jeremy112233, UNOwenNYC, Epicgenius, Taco Viva, Dontthrowaway, Markkarpeles, TheCockroach, KasparBot, , Equinox, ,
CAPTAIN RAJU, 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, InternetArchiveBot, JJMC89 bot, Bender the Bot, LexieLou, Mark
Karpeles and Anonymous: 44
Bitcoin Foundation Source: https://en.wikipedia.org/wiki/Bitcoin_Foundation?oldid=791572400 Contributors: The Anome, Shiftchange,
Jayjg, Smyth, MBisanz, Bgwhite, MSJapan, Tom Morris, Kamenev, Kendrick7, Robosh, Cydebot, DumbBOT, Mmortal03, Magi-
oladitis, DGG, Agyle, Clivemacd, Chrisarnesen, AnomieBOT, Erel Segal, Alvin Seville, Aoidh, Reaper Eternal, Tbhotch, Checking-
fax, Guest2625, BG19bot, Exercisephys, Safehaven86, Cyberbot II, Dexbot, Rezonansowy, Another John S, Doyouevenlift84, Mrp-
system, PizzaAddict, Gdesmedt1, Bitkoof, Olenyash, JRFORSYTH, Bomberjacket5, Okinawa55, Terry Rchardson, Srednuas Lenoroc,
1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, Spendulus, InternetArchiveBot, Bender the Bot and Anonymous: 10
Bitcoin network Source: https://en.wikipedia.org/wiki/Bitcoin_network?oldid=795709910 Contributors: Canton, Collabi, Julesd, David
Gerard, Rchandra, Shiftchange, Closeapple, Neko-chan, Stesmo, Giraedata, Graingert, Wtmitchell, Benlisquare, Wavelength, Pburka,
Moe Epsilon, Deku-shrub, Delldot, Chris the speller, Jprg1966, Ladislav Mecir, Solarix, ZAB, MeekMark, Smartse, Lfstevens, Xhi-
enne, Wootery, Magioladitis, Oren0, Pashley, Enderminh, Jdeacon, Jonahtrainer, Daviderenne, SuperHamster, JustinClarkCasey, Arjayay,
Chrisarnesen, Mortense, Fgnievinski, Jarble, Yobot, AnomieBOT, Erel Segal, Wiki.gcc, Srich32977, VladimirReshetnikov, Argumzio,
OgreBot, Divinity76, Mean as custard, Dree12, Xiangfu, Observer6, Mmeijeri, Dcirovic, Werieth, QuentinUK, Checkingfax, Coee-
andcode, Blibrestez55, GermanJoe, Targaryen, Jack Greenmaven, Catlemur, Aandaleeb85, VinceSamios, BG19bot, Falkirks, Pnbamania,
Cli12345, BattyBot, ChrisGualtieri, Earl King Jr., Tmfs10, Rezonansowy, Me, Myself, and I are Here, Epicgenius, Dairhead, Wuerzele,
Suumitgeek, Comp.arch, KyleLandas, Dalukasio, Eliteware, Bloukingsher, SyaWgnignahCehT, Kevin514, Mattpalen, Melcous, Litecoin-
guy, Deepbit, MARIODOESBREAKFAST, FOXIBOX, JDLade, Hannasnow, Ozzke, Charlie7705, Zowayix001, Adeyaya, Creationlayer,
GimmeOpenRoad, Benjaminikuta, Bitcoinwhoswho, Tomaskulich, 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, Pvaish, Jpkabin, Dat-
Guy, InternetArchiveBot, AllBestFaith, Bender the Bot, Earl King, Jon Kolbert, Jitendradhage13, Belfricsbitcoin and Anonymous: 48
Cryptocurrency Source: https://en.wikipedia.org/wiki/Cryptocurrency?oldid=795571321 Contributors: Canton, Greenman, IMSoP,
David Latapie, Hyacinth, Dbabbitt, Chealer, Altenmann, David Gerard, Cool Hand Luke, Thomas Veil, Kaldari, Shiftchange, Mormegil,
Discospinster, Hydrox, Smyth, Closeapple, BalanceUT, Stesmo, V2Blast, Hoary, Stephan Leeds, Mindmatrix, Sburke, Benbest, Sjakkalle,
Rjwilmsi, Equitor, DVdm, Volunteer Marek, Bgwhite, Bradtem, Dialectric, Deku-shrub, Eclipsed, Ripper234, DoriSmith, NeilN, Resolute,
106 CHAPTER 6. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES

Melchoir, Darkstar1st, Kintetsubualo, Sektah, Deli nk, Ladislav Mecir, BlackTerror, AThing, JzG, A. Parrot, Kencf0618, Mikes1988,
ShakespeareFan00, Ruslik0, N2e, Penbat, Krauss, Guineapigs, DumbBOT, Headbomb, Sobreira, JustAGal, Barek, Maqayum, Albany
NY, Extropian314, Magioladitis, Rdubeau, Froid, Smite-Meister, Theochino, Oshwah, Riraselbow, Don4of4, Wiae, Agyle, Cin-
damuse, RMJJRM, RatnimSnave, Jonahtrainer, Werldwayd, Roxor128, Gamall Wednesday Ida, Markvtc, Elassint, Clivemacd, Gher-
son2, VQuakr, Doseiai2, Niceguyedc, Jreiss17, Another Believer, Chrisarnesen, Editor2020, Mjbauer95, Fgnievinski, Jncraton, MrOllie,
Erik Streb, Eculewatt, Yobot, Jerebin, ONaNcle, AnomieBOT, Jim1138, Materialscientist, Eumolpo, LilHelpa, Tyrol5, Hromi, Glid-
erMaven, FrescoBot, Ivoras, Hellknowz, Rditucci, Wimmeljan, Serols, Sandegud, Lotje, AMuraliKumar, Mcharnay, Aoidh, Cowlibob,
C4K3, Pozytyv, Mean as custard, EmausBot, Tuankiet65, Lucien504, Super48paul, Dewritech, Ballofstring, Dcirovic, K6ka, Ext0399,
John Cline, Checkingfax, Fabior1984, Jonpatterns, I'm not human, JoeSperrazza, Wadaad, Sonicyouth86, Mikhail Ryazanov, ClueBot
NG, Cpabon, Catlemur, Mahir256, Wdchk, Mathew105601, VinceSamios, Widr, Kevoras, Cojovo, Wbm1058, Emisanle, BG19bot,
WikiTryHardDieHard, MusikAnimal, Mark Arsten, CitationCleanerBot, DARIO SEVERI, Amritamaz, Blaspie55, Vario, Cli12345,
FeralOink, BattyBot, Factsearch, Mleeds12, ArmorShieldA99, Mdann52, 0x0F, ChrisGualtieri, Rfkrishnan, Leostaley, IjonTichyIjon-
Tichy, Enterprisey, Rezonansowy, Citation Needed, Darcourse, AldezD, Sidelight12, Chustuck, Sr.ganador, Randykitty, Alfredymora,
Sudoquai, Neoconfederate, Surfer43, Dairhead, GRIFFnDOOR, Hendrick 99, Jakec, Soredo, Wuerzele, DavidLeighEllis, Comp.arch,
KyleLandas, Garzfoth, Matuhin86, Stirling7, FDMS4, AnonymousWiking, RainCity471, Someone not using his real name, FockeWulf
FW 190, Ppcoinwikipeercoin, Grjgt893u34, Nerdcustoms, Djnickers, Alienwalkerx, Unicodesnowman, DiddlyDoes, 22merlin, Stable-
Coin, Mikandjo, Mercurys Stepson, YubbaDoo, SemiSynthPsy, Bitsumishi, Permafrost46, Panos Skourtis, NataliWinehouse, Concord
hioz, Monkbot, Towtol, Huey2323, Kumarovski, Davidbentolila, Aniapie, Coincq, Keycoin, Dsprc, Salsacz, Eristas, Spireanet, Beach-
danny, DNotescoin, Catoshi, Paulpocket, RtrebWnordl, Bels11, Hannasnow, Croteaumj, Everettjustin, FursuitYi, Pelecoin123456,
Banjokid2000, Ozzke, Vwm3nelson, Mozzzus, Starroc, TheMagikCow, MitchellMint, Narky Blert, Sealyy, Rainbowtrail, Winterstorm-
Rage, ThePenultimateOne, Pishcal, TheCoeeAddict, NielThiart, Godsy, Stanley.garland, Arthistorian1977, Huckleberry15, SpiryGolden,
Cryptowest, I enjoy sandwiches, Vindicated8912, CAPTAIN RAJU, Wikihelpful, BrokenCrypto, Raymon Johnstone, Dataronin, MaxKo-
rdek, 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, Agar.ioSUCKSBUTT, Hayleyithink, Calcorn7, Dylanpoor, DatGuy, InternetArchive-
Bot, WilliamJennings1989, Aximov, Treetear, Asgowrisankar, Bender the Bot, Asienbummler2, Cryptofanz, Cryptoedge, BottleOfChoco-
lateMilk, Sparkyscience, Ameerrosic, Samurai4321, Alice2017, Kingsleyumeh2020, Sophie2017, Mahmoudfromafar, Janetguyon, Snasps,
L.lefarge, Richard Crosby, Coinbit, Caothuy100370, Nickps, Winstonxyz123, Yannik.metalpay, Narora1717 and Anonymous: 211
Elliptic Curve Digital Signature Algorithm Source: https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm?oldid=
787768247 Contributors: Danny, Imran, Michael Hardy, Shellreef, CesarB, Cyp, Giftlite, Inkling, Matt Crypto, CryptoDerk, TonyW,
ArnoldReinhold, Bender235, Barcex, Davidgothberg, Huerlisi, Kelly Martin, Mandarax, Maxal, Intgr, Siddhant, Fgrieu, Gene.arboit, Ewx,
Tony1, Arthur Rubin, KnightRider~enwiki, Rtc, GBL, Ekalin, LouScheer, DRLB, TastyPoutine, Daniel5127, Jesse Viviano, Cydebot,
Synergy, Dawnseeker2000, Widefox, JonathanCross, Dimawik, JAnDbot, Pbroks13, Pharaoh of the Wizards, Smite-Meister, Flyingstar16,
Trosati, Bugbee, Phil Bridger, Annie Yousar, Leobold1, Duncan, FiloSottile, Addbot, Darhuuk, MrOllie, Yobot, MarioS, KamikazeBot,
Zxb, Nageh, Winterst, Ale And Quail, Olawlor, Ripchip Bot, John of Reading, Arkename, Catlemur, Lundril, Chmarkine, ChrisGualtieri,
Dexbot, SoledadKabocha, Namnatulco, Nonnompow, Mark viking, Dncsky, ThomasPopp, Claw of Slime, YubbaDoo, BkDJk, RGMoonen,
Zppix, Lover amethyst, Chrisseberino, Hackancuba, Majingxia, Michael0019, Mohanyogipys and Anonymous: 58
Peer-to-peer Source: https://en.wikipedia.org/wiki/Peer-to-peer?oldid=795809662 Contributors: Damian Yerrick, AxelBoldt, Kpjas,
Wesley, The Anome, RoseParks, Rjstott, Andre Engels, Greg Lindahl, Youssefsan, Aldie, M~enwiki, SimonP, Ben-Zin~enwiki, Ellmist,
Heron, ZeroTimePad, Branko, Olivier, Chuq, Jim McKeeth, Edward, Ubiquity, K.lee, Michael Hardy, Kwertii, Lexor, Lousyd, Shell-
reef, Kku, Liftarn, Gabbe, Collabi, Delirium, Eric119, Minesweeper, CesarB, Mkweise, Ahoerstemeier, Copsewood, Haakon, Mac, Ronz,
TUF-KAT, Yaronf, Kingturtle, Ping, LittleDan, Julesd, Pratyeka, Glenn, Sir Paul, Rossami, Rl, Jonik, Thebramp, Conti, Schneelocke,
Mydogategodshat, Frieda, Timwi, MatrixFrog, Viajero, Wik, IceKarma, Rvalles, Maximus Rex, Sweety Rose, Furrykef, Itai, Bhuston,
Meembo, SEWilco, Omegatron, Ed g2s, Bloodshedder, Dysfunktion, MadEwokHerd, Johnleemk, Jamesday, Owen, Chuunen Baka, Rob-
bot, Paranoid, MrJones, Sander123, Korath, Tomchiukc, ZimZalaBim, Tim Ivorson, Postdlf, Texture, Yacht, TittoAssini, Qwm~enwiki,
Mushroom, Anthony, Cyrius, Moehre, Jrash, RyanKoppelman, Rossgk, Connelly, Giftlite, DocWatson42, Fennec, DavidCary, Laudaka,
ShaunMacPherson, Mintleaf~enwiki, Wolfkeeper, Netoholic, Lupin, Bkonrad, Niteowlneils, Endlessnameless, FrYGuY, Gracefool, Alis-
tairMcMillan, Softssa, VampWillow, Benad, Jrdioko, Neilc, PeterC, Fys, Toytoy, Knutux, Lockeownzj00, Thomas Veil, ArneBab, Lord
dut, Hgfernan, Secfan, Maximaximax, Vbs, Wiml, Korou, Ihsuss, Jareha, Lee1026, Cynical, Joyous!, Kevyn, DMG413, Ivo, The stu-
art, Shiftchange, Mormegil, Tom X. Tobin, DanielCD, Lifefeed, Discospinster, 4pq1injbok, Sharepro, Solitude, Rich Farmbrough, Rho-
bite, Iainscott, Till Ulen, H0riz0n, Jon Backenstose, Inkypaws, Jsnow, Morten Blaabjerg, Deelkar, Bender235, S.K., Loren36, Mjohn-
son, CanisRufus, Gen0cide, Koenige, Tverbeek, PhilHibbs, Diomidis Spinellis, Sietse Snel, Just zis Guy, you know?, Eltomzo, Grick,
LBarsov, Velociped, BrokenSegue, Johnteslade, Unquietwiki, SpeedyGonsales, VBGFscJUn3, Minghong, Idleguy, Wrs1864, Haham
hanuka, Merope, Conny, Ifny, Liao, Mo0, Falsian, CyberSkull, Gwendal (usurped), Andrewpmk, Cctoide, Sl, Apoc2400, Antoniad,
Gaurav1146, Elchupachipmunk, Denniss, Snowolf, Eekoo, Melaen, Gbeeker, Totof, Raraoul, ReyBrujo, Stephan Leeds, Evil Monkey,
Tony Sidaway, Computerjoe, Versageek, Gene Nygaard, Ringbang, Netkinetic, MiguelTremblay, Ceyockey, Adrian.benko, AlexMyltsev,
Mahanga, Kelly Martin, Mindmatrix, Vorash, The Belgain, Jersyko, Morton.lin, Deeahbz, Splintax, Abab99, Ilario, Ruud Koot, The Word-
smith, MONGO, Mangojuice, Wtfunkymonkey, Rchamberlain, CharlesC, Waldir, Sendai2ci, Wayward, Toussaint, Karam.Anthony.K,
Palica, Gerbrant, Aarghdvaark, Zephyrxero, David Levy, Kbdank71, Phoenix-forgotten, Canderson7, CortlandKlein, Sjakkalle, Kumarb-
hatia, Rjwilmsi, Quale, Strait, PinchasC, Tawker, Forage, Edggar, Kry~enwiki, Peter Tribe, LjL, Bhadani, -lulu-, FlaBot, Authalic, Ground
Zero, RexNL, Ewlyahoocom, Mike Van Emmerik, Valermos, RobyWayne, Bmicomp, Chobot, Garas, Bgwhite, Manu3d, Dadu~enwiki,
Cuahl, YurikBot, Wavelength, Borgx, Pip2andahalf, RussBot, Wellreadone, Akamad, Gaius Cornelius, CambridgeBayWeather, Bovineone,
Salsb, Richard Allen, Msoos, Johann Wolfgang, Nick, Retired username, Mikeblas, RL0919, Amwebb, Matthewleslie, Nethgirb, Mavol,
Wangi, DeadEyeArrow, Atbk, Bota47, Charleswiles, Xpclient, Nlu, Bikeborg, Boivie, FF2010, Zzuuzz, 2bar, Lt-wiki-bot, Ninly, Bay-
erischermann, Icedog, Closedmouth, Abune, GraemeL, Adammw, Fram, Scoutersig, Rearden9, Sunil Mohan, Bluezy, Carlosguitar, Max-
amegalon2000, Teryx, GrinBot~enwiki, BiH, Aimini, Prab, Elbperle, Veinor, Zso~enwiki, SmackBot, Evansp, Xkoalax, Reedy, Unyoyega,
Augest, Od Mishehu, Cutter, Vald, Bomac, Echoghost, Arny, KelleyCook, HalfShadow, Preeeemo, Yamaguchi , Gilliam, Ohnoitsjamie,
Folajimi, Skizzik, Chris the speller, Bluebot, Coinchon, Jprg1966, Emufarmers, Thumperward, Victorgrigas, Carlconrad, Octahedron80,
Trek00, DHN-bot~enwiki, Konstable, Audriusa, Royboycrashfan, Kzm, Mirshae, Neiltheernaniii, , Preada, TCL,
Ultra-Loser, Nixeagle, JonHarder, Rrburke, Zak123321, Vironex, NoIdeaNick, Radagast83, E. Sn0 =31337=, Bslede, Jiddisch~enwiki,
Funky Monkey, Bernino, Allyant, Jeremyb, Sigma 7, LeoNomis, Cjdkoh, Ck lostsword, Alcuin, Pilotguy, Kukini, Ricky@36, Mbauwens,
P2pauthor, SashatoBot, Nishkid64, Harryboyles, Tazmaniacs, Rjdainty1, Gobonobo, Aaronchall, Joshua Andersen, InnityB, Musicat,
Generic69, Scyth3, Flamingblur, F15 sanitizing eagle, Loadmaster, Silvarbullet1, JHunterJ, Mauro Bieg, Tigrisnaga, Ryulong, Rosejn,
Peyre, Caiaa, Teemuk, Fan-1967, Iridescent, Michaelbusch, BrainMagMo, Sschluter, Sirius Wallace, Thommi, Az1568, Courcelles,
Gounis, Pjbynn, Tawkerbot2, FatalError, SkyWalker, JForget, CmdrObot, Bane004, Zarex, Miatatroll, Pmerson, GargoyleMT, Reques-
6.1. TEXT 107

tion, Lentower, Pgr94, Kennyluck, Cldnails, Arangana, Phatom87, Ooskapenaar, Jackiechen01, ECELonghorn, Krauss, Steel, Gogo Dodo,
Feedloadr, Farshad83, Vanished user 8jq3ijalkdjhviewrie, DumbBOT, FastLizard4, Kozuch, Nuwewsco, Daniel Olsen, Lo2u, Gimmetrow,
Thijs!bot, Epbr123, Coelacan, Oldiowl, Headbomb, Nick Number, Wikidenizen, AntiVandalBot, Lord JoNil, Ingjerdj, Bondolo, Caper13,
Bigjimr, Leuko, Davewho2, Dustin gayler, CosineKitty, Albany NY, BrotherE, Geniac, SteveSims, Magioladitis, Antelan, Bongwarrior,
VoABot II, Dekimasu, Yandman, JamesBWatson, CobaltBlue, Radio Dan, Mupet0000, Gabriel Kielland, Pausch, M 3bdelqader, 4nT0, Cpl
Syx, Kgeischmann, Deathmolor, RayBeckerman, Stephenchou0722, Aliendude5300, Sachdevj, MartinBot, LinuxPickle, Rettetast, Akki-
nenirajesh, Webpageone.co.uk, Mattsag, LedgendGamer, Thirdright, Brunelstudy, Mthibault, Feierbach, Hopper96, Icseaturtles, Karrade,
LordAnubisBOT, Touisiau, Wuyanhuiyishi, Aervanath, Cometstyles, SirJibby, Warlordwolf, Remember the dot, Ghacks, Lawman3516,
Ahtih, Stanleyuroy, Idioma-bot, Funandtrvl, Soali, Jimmytharpe, VolkovBot, ABF, Hansix~enwiki, Je G., Indubitably, I'mDown, Philip
Trueman, Oshwah, Smywee, Hpfreak26, TouristPhilosopher, Someguy1221, Coldre82, Una Smith, Lradrama, LotharZ, Seb26, Jack-
fork, LeaveSleaves, Buryfc, Anishsane, Haseo9999, Gillyweed, SmileToday, VanishedUserABC, Hardistyar, Kbrose, Exile.mind, SieBot,
Kwirky88, BotMultichill, Gerakibot, Caltas, Rexguo, Terribim, ACNS, Dattebayo321, Bentogoa, Flyer22 Reborn, Permacultura, Reinde-
rien, Matthewedwards, Bagatelle, Cshear, Lightmouse, Hobartimus, Kos1337tt, Mattycl, Creative1980, DRTllbrg, Jludwig, Phelfe, Tom-
dobb, Stedjamulia, Celique, Tuxa, Atif.t2, Augman85, ClueBot, Mlspeten, Binksternet, The Thing That Should Not Be, Cambrasa, Enthu-
siast01, Ice77cool, Yamakiri, Alexbot, Diegocr, Abrech, Vivio Testarossa, Kihoiu, Dilumb, Rhododendrites, SchreiberBike, Wvithanage,
Cyko 01, Classicrockfan42, ClanCC, Miami33139, XLinkBot, Mmv-ru, Petchboo, OWV, Cwilso, Harisankarh, Little Mountain 5, Cmr08,
Lewu, Moose mangle, Harjk, Lajena, Addbot, Imeriki al-Shimoni, VCHunter, Qnext-Support, Tothwolf, Larrybowler, Cuaxdon, MrOl-
lie, Jreconomy, ManiaQ, Jwiki11235, RogersMD, Jakester23jj, Evildeathmath, Flappychappy, Tide rolls, Krano, Gail, SasiSasi, Vincent
stehle, Arm-1234, Legobot, Yobot, Tohd8BohaithuGh1, Old Death, Dfe6543, Preston.lee, Knownot, RedMurcury1~enwiki, Koman90,
AnomieBOT, Bwishon, Kristen Eriksen, Sonia, Jim1138, Dinesh smita, FenrirTheWolf, Neilapalmer, Materialscientist, CoMePrAdZ, Ci-
tation bot, Teilolondon, LilHelpa, MC707, Ludditesoft, Lairdp, Laboriousme, Mrdoomino, Tad Lincoln, Jmundo, Miym, Mobilon, Abce2,
Frosted14, Kevinzhouyan, Zicko1, Felix.rivas, Elrovjxhsudghhgdx, Coolblaze03, Alainr345, Shadowjams, Nyhet, Tknew, Dougofborg,
FrescoBot, Sky Attacker, Sae1962, Eliezerb, Drew R. Smith, Tom235, Tiger Brown, Pinethicket, I dream of horses, Btrest, A8UDI, Gabriel-
gmendonca, Ocexyz, LiberatorG, Patrickzuili, Shielazhang, CountZer0, TobeBot, Irvine.david, Vrenator, TBloemink, Stjones86, Jerd10,
Tyofcore, Peacedance, XDnonameXD, RjwilmsiBot, TjBot, Onfopt, Dangerousrave, Noodles-sb, Slon02, DASHBot, P2prules, Emaus-
Bot, Orphan Wiki, WikitanvirBot, Snied, Yoelzanger, Klbrain, K6ka, AvicBot, Juststreamit, Josve05a, MorbidEntree, Fred Gandt, Wayne
Slam, Layona1, Donner60, Senator2029, DASHBotAV, Mattsenate, Rocketrod1960, Helpsome, Will Beback Auto, ClueBot NG, Dr-
DooBig, Jack Greenmaven, Lokeshyadav99, Satellizer, Mesoderm, BC108, Widr, G8yingri, Helpful Pixie Bot, Manja Neuhaus, Lowercase
sigmabot, BG19bot, Desmarie17, Absalom23, Gabriel Yuji, Metricopolus, RentalicKim, Editerjhon, Skpande, Lesldock, Chazza1113, TR-
Burton, Skabboz, ChrisGualtieri, ZappaOMati, Ducknish, Prolemine, FoCuSandLeArN, Codename Lisa, Hmainsbot1, GrayEagle1, Non-
nompow, Lugia2453, Rcomrce, Razibot, Epicgenius, Pronacampo9, Tigstep, Maxwell bernard, Nshunter, Cp123127, EvergreenFir, Cecilia
Hecht, Sahil sharma2119, Myconix, NorthBySouthBaranof, Lesser Cartographies, Ginsuloft, Ekilson, FockeWulf FW 190, AlyssaG92,
CBCompton, J grider65, Cespo4, Ppcoinwikipeercoin, Jkielty82, Fixuture, Saectar, SwiftCrimson, Rosesollere, Hard ToOp, Drkhata-
niar, Monkbot, Cazer78, V-apharmd, Vanished user 31lk45mnzx90, MARIODOESBREAKFAST, W.phillips7, AkashValliath, Rade-
mers, Emhohensee, Nelsonkam, Gautamdebjani, IPUpcia, Jesuufamtobie, Astapor12, CAPTAIN RAJU, InternetArchiveBot, GreenC
bot, NoToleranceForIntolerance, Saghiri-optimus, Bender the Bot, PrimeBOT, Arthurwitts, Naeelradha, Kamaluddinqadri, Mandyosh1E,
BreakerOfChainz and Anonymous: 1138
Proof-of-work system Source: https://en.wikipedia.org/wiki/Proof-of-work_system?oldid=793608584 Contributors: Michael Hardy,
Mike Linksvayer, Robbot, DataSurfer, Cloud200, Matt Crypto, Bender235, Lycurgus, Tromp, Pearle, Pgimeno~enwiki, Oleg Alexan-
drov, MarkSteward, Julian Krause, Rjwilmsi, Helvetius, Flarn2006, Bgwhite, John Quincy Adding Machine, Dialectric, Avalon, Abune,
SmackBot, Rtc, Jon513, Frap, Dreadstar, Jhonan, Nishkid64, Camilo Sanchez, Petr Matas, CmdrObot, N2e, Acabtp, Kredal, Headbomb,
JustAGal, Davidhorman, Animarcus, SeanTater, Albany NY, Magioladitis, NoDepositNoReturn, Yakushima, Logictheo, David Eppstein,
Gwern, Ontarioboy, TreasuryTag, Giszmo~enwiki, Nicksh, Doublesuited, Mumiemonstret, SuzieDerkins, Chrisarnesen, Mehmud, Mi-
ami33139, XLinkBot, Addbot, AnomieBOT, Erel Segal, DannyAsher, Omnipaedista, Breadblade, Jesse V., RjwilmsiBot, Joeyhewitt,
Mmeijeri, Euloiix, Jonpatterns, H3llBot, L0ngpar1sh, Ipsign, 4368a, BG19bot, Cli12345, Gurmeet0108, 0x0F, Tuxayo, Wuchang,
Me, Myself, and I are Here, Adam2us, Play Money for Dummies, PostScarcity, Omninonsense, Saectar, Unicodesnowman, YubbaDoo,
Monkbot, MARIODOESBREAKFAST, FOXIBOX, Hannasnow, Vivi239, 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, JonBobbie,
GreenC bot, ACleaningPerson, CybFox and Anonymous: 63
SHA-2 Source: https://en.wikipedia.org/wiki/SHA-2?oldid=795699716 Contributors: Zundark, Paul Ebermann, Nealmcb, Haakon, Ci-
phergoth, Jeq, Giftlite, DavidCary, Ds13, Markus Kuhn, Jason Quinn, Hgfernan, Indolering, ArnoldReinhold, Smyth, Kwamikagami,
Sietse Snel, RoyBoy, SpeedyGonsales, Feezo, LOL, Dionyziz, Rjwilmsi, Ysangkok, Intgr, Prikryl, 121a0012, Bgwhite, Peterl, Wavelength,
Fgrieu, Jkg, CFSworks, Dsmouse, Ospalh, Arthur Rubin, Cedar101, Rtc, Caligatio, Yamaguchi , Thumperward, EncMstr, Sadads, Mal-
brain, Frap, Hl, PeterJeremy, Sjock, Loadmaster, Brajonrondo, Byrnejb, Snorkelman, Geremia, Jesse Viviano, Krauss, Ebrahim, NadirAli,
Jm3, Mojo Hand, Dawnseeker2000, Widefox, D V S, Doca, Erxnmedia, Od1n, Geniac, Xoneca, Magioladitis, AVRS, Jspiegler, Mau-
rice Carbonaro, Jesant13, Smite-Meister, Robertgreer, KylieTastic, Oconnor663, Quindraco, Rogerdpack, Andy Dingley, Cowlinator,
Neil Smithline, MacScoop, Sfan00 IMG, JJuran, Netvope, Borneq, Sun Creator, GlasGhost, DavidRabahy, Delt01, Addbot, Mortense,
Thomas.pornin, Grashoofd, Maslen, OlEnglish, Yobot, AnomieBOT, Citation bot, Aleph Innity, Quebec99, Digiphi, Octotron, Om-
nipaedista, Krisztin Pintr, Ialbrekht, MathsPoetry, Sep332, Fortdj33, Alxeedo, Mfwitten, John85, Jonesey95, Skyerise, Loresayer,
LiberatorG, Lotje, Wfunction, Timtempleton, TheInevitable, Noloader, Dewritech, RenamedUser01302013, Dcirovic, Quelrod, Nose-
binary, Westley Turner, Rushless, Quondum, Mmendez534, Jacosoft apps, Shnako, ClueBot NG, Proz, Nielsduif, Catlemur, Joefrom-
randb, Meganomic, Skoot13, Frietjes, Parsley1972, BG19bot, Jackbrear, Wkunkel, Maartenvanrooijen, Maver2909, Felidofractals, Tony
Tan, Pboudra, Cli12345, Cyberbot II, Napcae, AMRMHR, CuriousMind01, Nonnompow, Manishrw, Kotz, Juanal editor, Skeuomorf,
DD4235, Richieframe, Dwarvenux, Severyn.kozak, Ppcoinwikipeercoin, Willisius, Bad Dryer, CPU Terminator, ReadWriteWriteRead,
Claw of Slime, Maciej Czyewski, Enrique Santos L., TheMagikCow, CV9933, Megatherium, Thomas.matecki, Kurousagi, Luis150902,
ThePiGrepper, GreenC bot, Gulumeemee, Satharat, Kuckuckz, Sjfeenstra, AtErik1, Bender the Bot, Mabube, MinusBot, AurelioJuarez
and Anonymous: 127
ANX (Hong Kong company) Source: https://en.wikipedia.org/wiki/ANX_(Hong_Kong_company)?oldid=793854095 Contributors:
Shiftchange, BD2412, Vegaswikian, Bgwhite, Deku-shrub, Eclipsed, N2e, ONUnicorn, Casliber, Magioladitis, Keith D, LibStar,
AnomieBOT, Airon90, Onel5969, Mean as custard, BG19bot, Reddogsix, DPL bot, Dexbot, SJ Defender, John Marsh 701, Filedelink-
erbot, Dsprc, Walterlipolyu, Sunmist, Asia bun, Adam9007, , Ste Sasi, Rodney Linder, Jackbtcjack, Jackbtcjack123, Wikiwikipeter,
InternetArchiveBot, Brahiim123, SwiftyPeep, Bender the Bot, Ellygirlsun, Hyperbolick, ANX PRO and Anonymous: 6
BitInstant Source: https://en.wikipedia.org/wiki/BitInstant?oldid=793676413 Contributors: Bearcat, Shiftchange, Kdammers, Smyth,
108 CHAPTER 6. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES

Stesmo, Andrewpmk, Geraldshields11, Malcolma, BiH, Narkstraws, Ccchambers, Cydebot, Kozuch, Magioladitis, JoeDeRose, Agyle,
Lamro, Jonahtrainer, Chrisarnesen, AnomieBOT, PabloCastellano, Bernie44, MusikAnimal, Erik.Bjareholt, Mogism, Cmannatt, Bmrg567,
MasturbatingCow, Xrt6L, JexsterB312, Vdrey, MrGiantEditor, 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, InternetArchiveBot, Ben-
der the Bot and Anonymous: 15
Bitstamp Source: https://en.wikipedia.org/wiki/Bitstamp?oldid=794687424 Contributors: Roybadami, Edward, Bearcat, Rpyle731, Pi-
otrus, Shiftchange, Smyth, King of Hearts, Benlisquare, Dialectric, Tamfang, Obiwankenobi, Magioladitis, Jhirsch41, Black Kite,
Agyle, VanishedUser sdu9aya9fs787sads, Chrisarnesen, Yobot, 4th-otaku, AnomieBOT, Erel Segal, RevelationDirect, Sargdub, Atilla000,
Emisanle, Erik.Bjareholt, ChrisGualtieri, Dexbot, Citation Needed, Ildottoreverde, Wuerzele, Ginsuloft, Ssanchezd, Wolololol, PirateBut-
tercup, Wasill37, 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, Bender the Bot and Anonymous: 15
BTC-e Source: https://en.wikipedia.org/wiki/BTC-e?oldid=795830112 Contributors: Cloud200, Piotrus, Hierarchypedia, Dcsuther-
land, Eclipsed, AjaxSmack, N2e, KrakatoaKatie, Smartse, Repku, Oshwah, TheCatalyst31, Drmies, AnomieBOT, Ptrinh18, Kras-
sotkin, EmausBot, Grottenolm42, Compgenius, Bamyers99, GermanJoe, ClueBot NG, Satellizer, Wgolf, Emisanle, BG19bot,
TranslucentCloud, Aisteco, Cyberbot II, 0x0F, Telfordbuck, FallingGravity, Wolololol, Gladamas, Bongan, , RebelOfBabylon,
1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, Mbevand, Anareth, Quantomworks, StanceGarmstrong, Kiroxler, Jawtired and Anony-
mous: 26
BTC China Source: https://en.wikipedia.org/wiki/BTC_China?oldid=795474974 Contributors: Shiftchange, Pmsyyz, Anthony Ap-
pleyard, Benlisquare, Kozuch, Obiwankenobi, Malvineous, Magioladitis, Ontarioboy, Black Kite, Agyle, Chrisarnesen, C933103,
I dream of horses, Sargdub, YFdyh000, Citation Needed, Jamesmcmahon0, CNMall41, Wasill37, Chenyijia001, Jackbtcjack,
1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, Bender the Bot and Anonymous: 4
Buttercoin Source: https://en.wikipedia.org/wiki/Buttercoin?oldid=793243031 Contributors: Shiftchange, BD2412, Black Falcon, N2e,
Kozuch, Obiwankenobi, Vanished user ty12kl89jq10, DGG, Malik Shabazz, Agyle, Eeekster, Chrisarnesen, ZTebaykina, Yobot, BattyBot,
1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, Bender the Bot and Anonymous: 6
Coinbase Source: https://en.wikipedia.org/wiki/Coinbase?oldid=795420715 Contributors: Edward, Gabbe, Dbabbitt, Guanaco,
Shiftchange, Dennis Brown, Vipul, Stesmo, Sj, Wjfox2005, Black Falcon, Arthur Rubin, Abune, Egsan Bacon, Mitchumch, Matthew
hk, Jjjjjjjjjj, Robosh, Nagle, N2e, Cydebot, Kozuch, MainlyTwelve, Obiwankenobi, Magioladitis, Hwbehrens, QuackGuru, Mercury-
woodrose, Agyle, Df747jet, Mentor397, VanishedUser sdu9aya9fs787sads, ImageRemovalBot, Jeynesey, Vishtany, Chrisarnesen, Gnick-
ett1, Jytdog, Mortense, Download, 84user, Yobot, 4th-otaku, AnomieBOT, Ulric1313, LilHelpa, Bliljerk101, Jugadormta, Mean as custard,
Sargdub, Timtempleton, Dcirovic, Komodore, ClueBot NG, Frietjes, Jeraphine Gryphon, Mark Arsten, Cky2250, Cli12345, BigButter-
y, Darylgolden, NathanielBlack12, MarcoPolo419, Ascom99, Werneravr, RaphaelQS, Quenhitran, Makkachin, Sam Sailor, Jayaguru-
Shishya, Xrt6L, Pinetreecrush, Gavleson, Bad Dryer, Innitycoin, TheDragonFire, Josh DeBruycker, BitcoinWiki, I.eat.Gox, Gwlady,
Spfcraze, Sanjev Rajaram, DCLukas, Genegri, Bdarmtrong, Daylen, Coinbasescam, 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR,
Brahiim123, Dimmer2222, Bender the Bot, BulkData, BitcoinFrance, StudyAbroadGaza, LiqoUTC, SandroAlex, Merst792, Devexit,
Baltazari, Connectbn, TrezorHunt and Anonymous: 49
Huobi Source: https://en.wikipedia.org/wiki/Huobi?oldid=774188057 Contributors: Shiftchange, Hierarchypedia, Whoisjohngalt,
Eclipsed, N2e, Yobot, AnomieBOT, Foledman, 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, InternetArchiveBot, Bender the Bot and
Anonymous: 4
ItBit Source: https://en.wikipedia.org/wiki/ItBit?oldid=793364500 Contributors: Bearcat, David Gerard, Piotrus, Shiftchange, Mal-
colma, Eclipsed, Black Falcon, Derek R Bullamore, Cydebot, Kozuch, Obiwankenobi, Magioladitis, Juliancolton, Black Kite, Agyle,
ChicagoRob78, Arjayay, Chrisarnesen, SwisterTwister, AnomieBOT, Sargdub, Slightsmile, Meatsgains, Citation Needed, Nv 225,
Nyc10009, Itbit Exchange, Mrphobos123, , 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, Atlantic306, Natashagural and Anonymous:
4
LocalBitcoins Source: https://en.wikipedia.org/wiki/LocalBitcoins?oldid=794372391 Contributors: Graeme Bartlett, Piotrus,
Shiftchange, BD2412, GSK, Magioladitis, Joshua Issac, Bonadea, Black Kite, Chrisarnesen, AnomieBOT, Nickmeet, LiberatorG, John
of Reading, Dewritech, Jonpatterns, Jeraphine Gryphon, BG19bot, Northamerica1000, Daveman16, 0x0F, Citation Needed, Jerguismi,
Sr.ganador, BitcoinUser, Chapipipopo, Peraurico, Ywecur, Liance, ToonLucas22, InternetArchiveBot, GreenC bot, Bender the Bot and
Anonymous: 14
Mt. Gox Source: https://en.wikipedia.org/wiki/Mt._Gox?oldid=794846178 Contributors: Edward, Delirium, Julesd, Timwi, Furrykef,
Tea2min, David Gerard, SoWhy, DNewhall, AndrewKeenanRichardson, Thincat, Mike Rosoft, Shiftchange, Discospinster, Hydrox,
Smyth, Deathawk, Ociallyover, SnowFire, Tabletop, Runarb, Fresheneesz, DVdm, Pburka, Resolute, Tweet, Frap, Ianmacm, Na-
gle, Optakeover, Norm mit, Kencf0618, Doceddi, Matthieu Houriet, Jesse Viviano, N2e, Gafter, Danrok, Medovina, Kozuch, PamD,
Saintrain, Mojo Hand, Widefox, Obiwankenobi, Yellowdesk, Global Cerebral Ischemia, Kk5000, Acroterion, Magioladitis, Gwern,
Maproom, Ontarioboy, Atama, Ajfweb, Maxxyme, Donjrude, B1db2, Agyle, CheloVechek, L32007, Jonahtrainer, SimonTrew, Svick,
Trustable, Pianoman320, Trivialist, SkE, Chrisarnesen, NittyG, Tassedethe, Yobot, Mmacdon6, 4th-otaku, AnomieBOT, Erel Segal,
Hard700, Brightgalrs, Quebec99, Crookesmoor, , FrescoBot, Surv1v4l1st, Djetelina, Sjcjoosten, Stephanefr, Aoidh, Dewritech,
Wikipelli, Dcirovic, K6ka, NicatronTg, Jack Sebastian, Brandmeister, Ego White Tray, ClueBot NG, Geoburke, Catlemur, Hpersh, Widr,
Newyorkadam, Lowercase sigmabot, BG19bot, McZusatz, Mark Arsten, Meatsgains, Blaspie55, Cli12345, Shirudo, Grahvity, BattyBot,
Cyberbot II, Esszet, Neoconfederate, Melonkelon, Soredo, Wuerzele, ChaseAm, Brianen2, NorthBySouthBaranof, Makkachin, Tiban75,
Archlinux, Bitkoof, Verjohnpike, Xrt6L, Vidmastb, Kubrixcube, Eliteware, TheWiki122, Hakanwk, Aniapie, OKNoah, I.eat.Gox,
Ross.PokerVIP, Mollyjohn1436, Ddoback, Liance, Crito10, Equinox, 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR, Mbevand, Inter-
netArchiveBot, Kithblurs, GreenC bot, Bender the Bot, Jon Kolbert, Slavikme and Anonymous: 83
OKCoin Source: https://en.wikipedia.org/wiki/OKCoin?oldid=753569215 Contributors: Stesmo, BenM, Bgwhite, Deku-shrub, N2e,
Timtrent, Magioladitis, StAnselm, XLinkBot, Yobot, AnomieBOT, LilHelpa, Sargdub, Newzack, Pastafarianist, BattyBot, Zekesonxx,
Salvationist2nd, OKCoin, Rayna Jaymes, Redartsina, SAnthonyR, Eric Pode lives, 1Wiki8Q5G7FviTHBac3dx8HhdNYwDVstR,
AaronD9933 and Anonymous: 4

6.2 Images
File:10elqpi.jpg Source: https://upload.wikimedia.org/wikipedia/commons/9/93/10elqpi.jpg License: CC BY-SA 3.0 Contributors:
Transferred from en.wikipedia to Commons. Original artist: The original uploader was Ladislav Mecir at English Wikipedia
6.2. IMAGES 109

File:ANX_INTERNATIONAL.png Source: https://upload.wikimedia.org/wikipedia/commons/3/3d/ANX_INTERNATIONAL.png


License: Public domain Contributors: http://www.anxintl.com Original artist: ANX INTERNATIONAL
File:ASICMINER_USB_Block_Erupter.jpg Source: https://upload.wikimedia.org/wikipedia/commons/d/d3/ASICMINER_USB_
Block_Erupter.jpg License: CC BY-SA 3.0 Contributors: Own work Original artist: Targaryen
File:All-currency-symbol.svg Source: https://upload.wikimedia.org/wikipedia/commons/9/9d/All-currency-symbol.svg License: Public
domain Contributors: Own work Original artist: User:StalkerAT
File:Ambox_current_red.svg Source: https://upload.wikimedia.org/wikipedia/commons/9/98/Ambox_current_red.svg License: CC0
Contributors: self-made, inspired by Gnome globe current event.svg, using Information icon3.svg and Earth clip art.svg Original artist:
Vipersnake151, penubag, Tkgd2007 (clock)
File:Ambox_important.svg Source: https://upload.wikimedia.org/wikipedia/commons/b/b4/Ambox_important.svg License: Public do-
main Contributors: Own work based on: Ambox scales.svg Original artist: Dsmurat, penubag
File:AustrianBitCoinMiningRig.jpg Source: https://upload.wikimedia.org/wikipedia/commons/6/6c/AustrianBitCoinMiningRig.jpg
License: CC BY 2.0 Contributors: https://secure.flickr.com/photos/gastev/8157565917 Original artist: Gastev (Mirko Tobias Schaefer)
File:Avalon-An_ASIC_base_bitcoin_machine.jpg Source: https://upload.wikimedia.org/wikipedia/commons/e/ee/Avalon-An_
ASIC_base_bitcoin_machine.jpg License: CC0 Contributors: Sent to me personally Original artist:
File:BTC-e_Seizure_Banner.png Source: https://upload.wikimedia.org/wikipedia/en/0/08/BTC-e_Seizure_Banner.png License: PD
Contributors:
https://btc-e.com/index.html Original artist:
U.S. Law Enforcement
File:BTC_number_of_transactions_per_month.png Source: https://upload.wikimedia.org/wikipedia/commons/c/c8/BTC_number_
of_transactions_per_month.png License: CC0 Contributors: Own work Original artist: Zhitelew
File:BitcoinSign.svg Source: https://upload.wikimedia.org/wikipedia/commons/b/ba/BitcoinSign.svg License: Public domain Contribu-
tors: http://bitcoin.org Original artist: Satoshi Nakamoto
File:Bitcoin_Teller_SIBOS_Boston_2014_2.jpg Source: https://upload.wikimedia.org/wikipedia/commons/2/21/Bitcoin_Teller_
SIBOS_Boston_2014_2.jpg License: CC BY-SA 3.0 Contributors: Own work Original artist: Martin E. Walder
File:Bitcoin_Transaction_Visual.svg Source: https://upload.wikimedia.org/wikipedia/commons/c/ce/Bitcoin_Transaction_Visual.svg
License: CC0 Contributors: Inkscape
Previously published: https://github.com/graingert/bitcoin-IRP/blob/master/img/Bitcoin_Transaction_Visual.svg Original artist:
Graingert
File:Bitcoin_crash_2011-06-19.png Source: https://upload.wikimedia.org/wikipedia/en/4/4a/Bitcoin_crash_2011-06-19.png License:
PD Contributors:
Data plot originally obtained from a thread on the /g/ board on 4chan that has since reached 404. Original artist:
Anon
File:Bitcoin_exchange_mtgox_-_Feb2012-Feb2014_-_log_scale.png Source: https://upload.wikimedia.org/wikipedia/commons/9/
99/Bitcoin_exchange_mtgox_-_Feb2012-Feb2014_-_log_scale.png License: CC BY-SA 3.0 Contributors: http://bitcoincharts.com/
charts/mtgoxUSD#rg730zigDailyztgMzm1g10zm2g25zl Original artist: http://bitcoincharts.com
File:Bitcoin_logo.svg Source: https://upload.wikimedia.org/wikipedia/commons/c/c5/Bitcoin_logo.svg License: CC0 Contributors:
Bitcoin forums Original artist: Bitboy
File:Bitcoin_paper_wallet_generated_at_bitaddress.jpg Source: https://upload.wikimedia.org/wikipedia/commons/d/db/Bitcoin_
paper_wallet_generated_at_bitaddress.jpg License: MIT Contributors: http://bitaddress.org Original artist: Open Source
File:Bitcoin_price_and_volatility.svg Source: https://upload.wikimedia.org/wikipedia/commons/d/d5/Bitcoin_price_and_volatility.svg
License: CC BY-SA 3.0 Contributors: https://en.wikipedia.org/wiki/File:Bitcoin_price_and_volatility.svg Original artist: https://en.
wikipedia.org/wiki/User:Ladislav_Mecir
File:Bitcoinpaymentverification.png Source: https://upload.wikimedia.org/wikipedia/commons/2/24/Bitcoinpaymentverification.png
License: MIT Contributors: http://bitcoin.org/bitcoin.pdf Original artist: Satoshi Nakamoto
File:BitstampUSD_weekly.png Source: https://upload.wikimedia.org/wikipedia/commons/9/92/BitstampUSD_weekly.png License: CC
BY-SA 3.0 Contributors: http://bitcoincharts.com/charts/bitstampUSD#rg730zigWeeklyztgTzm1g10zm2g10zl Original artist: Bitcoin
Charts
File:Bitstamp_Logo_2013.png Source: https://upload.wikimedia.org/wikipedia/en/6/68/Bitstamp_Logo_2013.png License: Fair use
Contributors: http://www.thebitcoinchannel.com/archives/12355 Original artist: ?
File:Blockchain.svg Source: https://upload.wikimedia.org/wikipedia/commons/9/98/Blockchain.svg License: CC BY 3.0 Contributors:
Bitcoin Wiki: https://en.bitcoin.it/wiki/File:Blockchain.png Original artist:
original le: Theymos from Bitcoin wiki
vectorization: Own work
File:Buttercoin_Logo_LowRes.png Source: https://upload.wikimedia.org/wikipedia/en/3/38/Buttercoin_Logo_LowRes.png License:
Fair use Contributors: Buttercoin ocial website: http://www.buttercoin.com/#/ Original artist: ?
File:Cameron_Winklevoss_at_the_2008_Beijing_Olympics_-_20080817.jpg Source: https://upload.wikimedia.org/wikipedia/
commons/7/76/Cameron_Winklevoss_at_the_2008_Beijing_Olympics_-_20080817.jpg License: CC BY 3.0 Contributors: Own work.
Original artist: Johnnyroee.
File:Cash_template.svg Source: https://upload.wikimedia.org/wikipedia/commons/1/19/Cash_template.svg License: CC BY-SA 3.0
Contributors: Own work Original artist: Ain92
110 CHAPTER 6. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES

File:Coinbase_Logo_2013.png Source: https://upload.wikimedia.org/wikipedia/commons/c/c7/Coinbase_Logo_2013.png License:


Public domain Contributors: https://www.coinbase.com Original artist: Coinbase, Inc.
File:Commons-logo.svg Source: https://upload.wikimedia.org/wikipedia/en/4/4a/Commons-logo.svg License: PD Contributors: ? Origi-
nal artist: ?
File:Crypto-currency_market_capitalizations.png Source: https://upload.wikimedia.org/wikipedia/commons/c/cb/Crypto-currency_
market_capitalizations.png License: CC0 Contributors: Own work Original artist: Sandegud
File:Crypto_key.svg Source: https://upload.wikimedia.org/wikipedia/commons/6/65/Crypto_key.svg License: CC-BY-SA-3.0 Contribu-
tors: Own work based on image:Key-crypto-sideways.png by MisterMatt originally from English Wikipedia Original artist: MesserWoland
File:Cryptocurrency_Mining_Farm.jpg Source: https://upload.wikimedia.org/wikipedia/commons/3/37/Cryptocurrency_Mining_
Farm.jpg License: CC BY-SA 4.0 Contributors: Own work Original artist: Marco Krohn
File:Cryptocurrency_market_capitalizations.png Source: https://upload.wikimedia.org/wikipedia/commons/e/e6/Cryptocurrency_
market_capitalizations.png License: CC0 Contributors: Own work Original artist: Nickps
File:Crystal_Clear_app_linneighborhood.svg Source: https://upload.wikimedia.org/wikipedia/commons/f/f9/Crystal_Clear_app_
linneighborhood.svg License: LGPL Contributors: All Crystal Clear icons were posted by the author as LGPL on kde-look; Derivative
works of this le: of File:Banned proxys.svg Original artist: Everaldo Coelho and YellowIcon; User:Ch.Andrew, Notwist and Carport
File:DHT_en.svg Source: https://upload.wikimedia.org/wikipedia/commons/9/98/DHT_en.svg License: Public domain Contributors: Jn-
lin Original artist: Jnlin
File:Desktop_computer_clipart_-_Yellow_theme.svg Source: https://upload.wikimedia.org/wikipedia/commons/d/d7/Desktop_
computer_clipart_-_Yellow_theme.svg License: CC0 Contributors: https://openclipart.org/detail/17924/computer Original artist: AJ from
openclipart.org
File:Edit-clear.svg Source: https://upload.wikimedia.org/wikipedia/en/f/f2/Edit-clear.svg License: Public domain Contributors: The
Tango! Desktop Project. Original artist:
The people from the Tango! project. And according to the meta-data in the le, specically: Andreas Nilsson, and Jakub Steiner (although
minimally).
File:Electrum_Bitcoin_Wallet.png Source: https://upload.wikimedia.org/wikipedia/commons/1/16/Electrum_Bitcoin_Wallet.png Li-
cense: GPL Contributors: http://electrum.org/ Original artist: electrum
File:Emblem-money.svg Source: https://upload.wikimedia.org/wikipedia/commons/f/f3/Emblem-money.svg License: GPL Contribu-
tors: http://www.gnome-look.org/content/show.php/GNOME-colors?content=82562 Original artist: perfectska04
File:Estimated-transaction-volume-usd.svg Source: https://upload.wikimedia.org/wikipedia/commons/5/57/
Estimated-transaction-volume-usd.svg License: CC0 Contributors: Own work Original artist: Ladislav Mecir
File:Flag_of_Argentina.svg Source: https://upload.wikimedia.org/wikipedia/commons/1/1a/Flag_of_Argentina.svg License: Public do-
main Contributors: Here, based on: http://manuelbelgrano.gov.ar/bandera/creacion-de-la-bandera-nacional/ Original artist: Government
of Argentina
File:Flag_of_Australia.svg Source: https://upload.wikimedia.org/wikipedia/en/b/b9/Flag_of_Australia.svg License: Public domain Con-
tributors: ? Original artist: ?
File:Flag_of_Bangladesh.svg Source: https://upload.wikimedia.org/wikipedia/commons/f/f9/Flag_of_Bangladesh.svg License: Public
domain Contributors: http://www.dcaa.com.bd/Modules/CountryProfile/BangladeshFlag.aspx Original artist: User:SKopp
File:Flag_of_Belgium_(civil).svg Source: https://upload.wikimedia.org/wikipedia/commons/9/92/Flag_of_Belgium_%28civil%29.svg
License: Public domain Contributors: ? Original artist: ?
File:Flag_of_Bolivia.svg Source: https://upload.wikimedia.org/wikipedia/commons/4/48/Flag_of_Bolivia.svg License: Public domain
Contributors: Own work Original artist: SKopp
File:Flag_of_Bosnia_and_Herzegovina.svg Source: https://upload.wikimedia.org/wikipedia/commons/b/bf/Flag_of_Bosnia_and_
Herzegovina.svg License: Public domain Contributors: Own work Original artist: Kseferovic
File:Flag_of_Brazil.svg Source: https://upload.wikimedia.org/wikipedia/en/0/05/Flag_of_Brazil.svg License: PD Contributors: ? Origi-
nal artist: ?
File:Flag_of_Bulgaria.svg Source: https://upload.wikimedia.org/wikipedia/commons/9/9a/Flag_of_Bulgaria.svg License: Public do-
main Contributors: The ag of Bulgaria. The colors are specied at http://www.government.bg/cgi-bin/e-cms/vis/vis.pl?s=001&p=0034&
n=000005&g= as: Original artist: SKopp
File:Flag_of_Canada.svg Source: https://upload.wikimedia.org/wikipedia/en/c/cf/Flag_of_Canada.svg License: PD Contributors: ?
Original artist: ?
File:Flag_of_Chile.svg Source: https://upload.wikimedia.org/wikipedia/commons/7/78/Flag_of_Chile.svg License: Public domain Con-
tributors: Own work Original artist: SKopp
File:Flag_of_Colombia.svg Source: https://upload.wikimedia.org/wikipedia/commons/2/21/Flag_of_Colombia.svg License: Public do-
main Contributors: Drawn by User:SKopp Original artist: SKopp
File:Flag_of_Croatia.svg Source: https://upload.wikimedia.org/wikipedia/commons/1/1b/Flag_of_Croatia.svg License: Public domain
Contributors: http://www.sabor.hr/Default.aspx?sec=4317 Original artist: Nightstallion, Elephantus, Neoneo13, Denelson83, Rainman,
R-41, Minestrone, Lupo, Zscout370,
<a href='//commons.wikimedia.org/wiki/User:MaGa' title='User:MaGa'>Ma</a><a href='//commons.wikimedia.org/wiki/File:
Croatian_squares_Ljubicic.png' class='image'><img alt='Croatian squares Ljubicic.png' src='https://upload.wikimedia.org/wikipedia/
commons/thumb/7/7f/Croatian_squares_Ljubicic.png/15px-Croatian_squares_Ljubicic.png' width='15' height='15' srcset='https:
//upload.wikimedia.org/wikipedia/commons/thumb/7/7f/Croatian_squares_Ljubicic.png/23px-Croatian_squares_Ljubicic.png 1.5x,
https://upload.wikimedia.org/wikipedia/commons/thumb/7/7f/Croatian_squares_Ljubicic.png/30px-Croatian_squares_Ljubicic.png
2x' data-le-width='202' data-le-height='202' /></a><a href='//commons.wikimedia.org/wiki/User_talk:MaGa' title='User
talk:MaGa'>Ga</a> (based on Decision of the Parliament)
6.2. IMAGES 111

File:Flag_of_Cyprus.svg Source: https://upload.wikimedia.org/wikipedia/commons/d/d4/Flag_of_Cyprus.svg License: Public domain


Contributors: Own work Original artist: User:Vzb83
File:Flag_of_Denmark.svg Source: https://upload.wikimedia.org/wikipedia/commons/9/9c/Flag_of_Denmark.svg License: Public do-
main Contributors: Own work Original artist: Madden
File:Flag_of_Ecuador.svg Source: https://upload.wikimedia.org/wikipedia/commons/e/e8/Flag_of_Ecuador.svg License: Public domain
Contributors: http://www.presidencia.gob.ec/pdf/Simbolos-Patrios.pdf Original artist: President of the Republic of Ecuador, Zscout370
File:Flag_of_Estonia.svg Source: https://upload.wikimedia.org/wikipedia/commons/8/8f/Flag_of_Estonia.svg License: Public domain
Contributors: http://www.riigikantselei.ee/?id=73847 Original artist: Originally drawn by User:SKopp. Blue colour changed by User:PeepP
to match the image at [1].
File:Flag_of_Europe.svg Source: https://upload.wikimedia.org/wikipedia/commons/b/b7/Flag_of_Europe.svg License: Public domain
Contributors:
File based on the specication given at [1]. Original artist: User:Verdy p, User:-x-, User:Paddu, User:Nightstallion, User:Funakoshi,
User:Jeltz, User:Dbenbenn, User:Zscout370
File:Flag_of_Finland.svg Source: https://upload.wikimedia.org/wikipedia/commons/b/bc/Flag_of_Finland.svg License: Public domain
Contributors: http://www.finlex.fi/fi/laki/ajantasa/1978/19780380 Original artist: SVG drawn by Sebastian Koppehel
File:Flag_of_France.svg Source: https://upload.wikimedia.org/wikipedia/en/c/c3/Flag_of_France.svg License: PD Contributors: ? Orig-
inal artist: ?
File:Flag_of_Germany.svg Source: https://upload.wikimedia.org/wikipedia/en/b/ba/Flag_of_Germany.svg License: PD Contributors: ?
Original artist: ?
File:Flag_of_Greece.svg Source: https://upload.wikimedia.org/wikipedia/commons/5/5c/Flag_of_Greece.svg License: Public domain
Contributors: Own work (Original text: own code) Original artist: (of code) cs:User:-xfi- (talk)
File:Flag_of_Hong_Kong.svg Source: https://upload.wikimedia.org/wikipedia/commons/5/5b/Flag_of_Hong_Kong.svg License: Public
domain Contributors: http://www.protocol.gov.hk/flags/chi/r_flag/index.html Original artist: Tao Ho
File:Flag_of_Iceland.svg Source: https://upload.wikimedia.org/wikipedia/commons/c/ce/Flag_of_Iceland.svg License: Public domain
Contributors: Proportions: Forsetisruneyti slands Colours: Alingi Original artist: rni Dagur, and Magasjukur2
File:Flag_of_India.svg Source: https://upload.wikimedia.org/wikipedia/en/4/41/Flag_of_India.svg License: Public domain Contributors:
? Original artist: ?
File:Flag_of_Indonesia.svg Source: https://upload.wikimedia.org/wikipedia/commons/9/9f/Flag_of_Indonesia.svg License: Public do-
main Contributors: Law: s:id:Undang-Undang Republik Indonesia Nomor 24 Tahun 2009 (http://badanbahasa.kemdiknas.go.id/
lamanbahasa/sites/default/files/UU_2009_24.pdf) Original artist: Drawn by User:SKopp, rewritten by User:Gabbe
File:Flag_of_Ireland.svg Source: https://upload.wikimedia.org/wikipedia/commons/4/45/Flag_of_Ireland.svg License: Public domain
Contributors: Drawn by User:SKopp Original artist: ?
File:Flag_of_Israel.svg Source: https://upload.wikimedia.org/wikipedia/commons/d/d4/Flag_of_Israel.svg License: Public domain Con-
tributors: http://mfa.gov.il/MFA/AboutIsrael/IsraelAt50/Pages/The%20Flag%20and%20the%20Emblem.aspx Original artist: The Pro-
visional Council of State Proclamation of the Flag of the State of Israel of 25 Tishrei 5709 (28 October 1948) provides the ocial
specication for the design of the Israeli ag.
File:Flag_of_Italy.svg Source: https://upload.wikimedia.org/wikipedia/en/0/03/Flag_of_Italy.svg License: PD Contributors: ? Original
artist: ?
File:Flag_of_Japan.svg Source: https://upload.wikimedia.org/wikipedia/en/9/9e/Flag_of_Japan.svg License: PD Contributors: ? Origi-
nal artist: ?
File:Flag_of_Jordan.svg Source: https://upload.wikimedia.org/wikipedia/commons/c/c0/Flag_of_Jordan.svg License: Public domain
Contributors: ? Original artist: ?
File:Flag_of_Kyrgyzstan.svg Source: https://upload.wikimedia.org/wikipedia/commons/c/c7/Flag_of_Kyrgyzstan.svg License: Public
domain Contributors: Drawn by User:SKopp, construction sheet. Redo by: cs:User:-xfi- Original artist: Made by Andrew Duhan for the
Sodipodi SVG ag collection, and is public domain.
File:Flag_of_Lebanon.svg Source: https://upload.wikimedia.org/wikipedia/commons/5/59/Flag_of_Lebanon.svg License: Public do-
main Contributors: ? Original artist: Traced based on the CIA World Factbook with some modication done to the colours based on
information at Vexilla mundi.
File:Flag_of_Lithuania.svg Source: https://upload.wikimedia.org/wikipedia/commons/1/11/Flag_of_Lithuania.svg License: Public do-
main Contributors: Own work Original artist: SuKopp
File:Flag_of_Luxembourg.svg Source: https://upload.wikimedia.org/wikipedia/commons/d/da/Flag_of_Luxembourg.svg License: Pub-
lic domain Contributors: Own work http://www.legilux.public.lu/leg/a/archives/1972/0051/a051.pdf#page=2, colors from http://www.
legilux.public.lu/leg/a/archives/1993/0731609/0731609.pdf Original artist: Drawn by User:SKopp
File:Flag_of_Malaysia.svg Source: https://upload.wikimedia.org/wikipedia/commons/6/66/Flag_of_Malaysia.svg License: Public
domain Contributors: Create based on the Malaysian Government Website (archive version)
Original artist: SKopp, Zscout370 and Ranking Update

File:Flag_of_Malta.svg Source: https://upload.wikimedia.org/wikipedia/commons/7/73/Flag_of_Malta.svg License: CC0 Contributors:


? Original artist: ?
File:Flag_of_New_Zealand.svg Source: https://upload.wikimedia.org/wikipedia/commons/3/3e/Flag_of_New_Zealand.svg License:
Public domain Contributors: http://www.mch.govt.nz/files/NZ%20Flag%20-%20proportions.JPG Original artist: Zscout370, Hugh Jass
and many others
112 CHAPTER 6. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES

File:Flag_of_Nicaragua.svg Source: https://upload.wikimedia.org/wikipedia/commons/1/19/Flag_of_Nicaragua.svg Li-


cense: Public domain Contributors: Own work based on: <a data-x-rel='nofollow' class='external text' href='https:
//docs.google.com/viewer?a=v,<span>,&,</span>,q=cache:tRiqYRg_YJ4J:www.casc.gob.ni/index.php?option%3Dcom_
docman%26task%3Ddoc_download%26gid%3D704%26Itemid%3D4+ley+sobre+los+simbolo+patrios+nicaragua+
2002,<span>,&,</span>,hl=es,<span>,&,</span>,gl=ni,<span>,&,</span>,pid=bl,<span>,&,</span>,srcid=ADGEEShaqFptSDRqZyUoeWlWgMGTvcFvWOs
About Characteristics And Use Of Patriotic Symbols of Nicaragua</a> Original artist: C records (talk contribs)
File:Flag_of_Nigeria.svg Source: https://upload.wikimedia.org/wikipedia/commons/7/79/Flag_of_Nigeria.svg License: Public domain
Contributors: ? Original artist: ?
File:Flag_of_Norway.svg Source: https://upload.wikimedia.org/wikipedia/commons/d/d9/Flag_of_Norway.svg License: Public domain
Contributors: Own work Original artist: Dbenbenn
File:Flag_of_Pakistan.svg Source: https://upload.wikimedia.org/wikipedia/commons/3/32/Flag_of_Pakistan.svg License: Public do-
main Contributors: The drawing and the colors were based from agspot.net. Original artist: User:Zscout370
File:Flag_of_Poland.svg Source: https://upload.wikimedia.org/wikipedia/en/1/12/Flag_of_Poland.svg License: Public domain Contrib-
utors: ? Original artist: ?
File:Flag_of_Portugal.svg Source: https://upload.wikimedia.org/wikipedia/commons/5/5c/Flag_of_Portugal.svg License: Public do-
main Contributors: http://jorgesampaio.arquivo.presidencia.pt/pt/republica/simbolos/bandeiras/index.html#imgs Original artist: Colum-
bano Bordalo Pinheiro (1910; generic design); Vtor Lus Rodrigues; Antnio Martins-Tuvlkin (2004; this specic vector set: see sources)
File:Flag_of_Romania.svg Source: https://upload.wikimedia.org/wikipedia/commons/7/73/Flag_of_Romania.svg License: Public do-
main Contributors: Own work Original artist: AdiJapan
File:Flag_of_Russia.svg Source: https://upload.wikimedia.org/wikipedia/en/f/f3/Flag_of_Russia.svg License: PD Contributors: ? Origi-
nal artist: ?
File:Flag_of_Saudi_Arabia.svg Source: https://upload.wikimedia.org/wikipedia/commons/0/0d/Flag_of_Saudi_Arabia.svg
License: CC0 Contributors: the actual ag Original artist: Unknown<a href='https://www.wikidata.org/wiki/Q4233718'
title='wikidata:Q4233718'><img alt='wikidata:Q4233718' src='https://upload.wikimedia.org/wikipedia/commons/thumb/f/ff/
Wikidata-logo.svg/20px-Wikidata-logo.svg.png' width='20' height='11' srcset='https://upload.wikimedia.org/wikipedia/commons/
thumb/f/ff/Wikidata-logo.svg/30px-Wikidata-logo.svg.png 1.5x, https://upload.wikimedia.org/wikipedia/commons/thumb/f/ff/
Wikidata-logo.svg/40px-Wikidata-logo.svg.png 2x' data-le-width='1050' data-le-height='590' /></a>
File:Flag_of_Singapore.svg Source: https://upload.wikimedia.org/wikipedia/commons/4/48/Flag_of_Singapore.svg License: Public do-
main Contributors: The drawing was based from http://app.www.sg/who/42/National-Flag.aspx. Colors from the book: (2001). The
National Symbols Kit. Singapore: Ministry of Information, Communications and the Arts. pp. 5. ISBN 8880968010 Pantone 032 shade from
http://www.pantone.com/pages/pantone/colorfinder.aspx?c_id=13050 Original artist: Various
File:Flag_of_Slovakia.svg Source: https://upload.wikimedia.org/wikipedia/commons/e/e6/Flag_of_Slovakia.svg License: Public do-
main Contributors: Own work; here, colors Original artist: SKopp
File:Flag_of_Slovenia.svg Source: https://upload.wikimedia.org/wikipedia/commons/f/f0/Flag_of_Slovenia.svg License: Public domain
Contributors: Own work construction sheet from http://flagspot.net/flags/si%27.html#coa Original artist: User:Achim1999
File:Flag_of_South_Africa.svg Source: https://upload.wikimedia.org/wikipedia/commons/a/af/Flag_of_South_Africa.svg License:
Public domain Contributors: Per specications in the Constitution of South Africa, Schedule 1 - National ag Original artist: Flag de-
sign by Frederick Brownell, image by Wikimedia Commons users
File:Flag_of_South_Korea.svg Source: https://upload.wikimedia.org/wikipedia/commons/0/09/Flag_of_South_Korea.svg License:
Public domain Contributors: Ordinance Act of the Law concerning the National Flag of the Republic of Korea, Construction and color
guidelines (Russian/English) Original artist: Various
File:Flag_of_Spain.svg Source: https://upload.wikimedia.org/wikipedia/en/9/9a/Flag_of_Spain.svg License: PD Contributors: ? Original
artist: ?
File:Flag_of_Sweden.svg Source: https://upload.wikimedia.org/wikipedia/en/4/4c/Flag_of_Sweden.svg License: PD Contributors: ?
Original artist: ?
File:Flag_of_Switzerland.svg Source: https://upload.wikimedia.org/wikipedia/commons/f/f3/Flag_of_Switzerland.svg License: Public
domain Contributors: PDF Colors Construction sheet Original artist: User:Marc Mongenet

Credits:
File:Flag_of_Thailand.svg Source: https://upload.wikimedia.org/wikipedia/commons/a/a9/Flag_of_Thailand.svg License: Public do-
main Contributors: Own work Original artist: Zscout370
File:Flag_of_Turkey.svg Source: https://upload.wikimedia.org/wikipedia/commons/b/b4/Flag_of_Turkey.svg License: Public domain
Contributors: Turkish Flag Law (Trk Bayra Kanunu), Law nr. 2893 of 22 September 1983. Text (in Turkish) at the website of the
Turkish Historical Society (Trk Tarih Kurumu) Original artist: David Benbennick (original author)
File:Flag_of_Vietnam.svg Source: https://upload.wikimedia.org/wikipedia/commons/2/21/Flag_of_Vietnam.svg License: Public do-
main Contributors: http://vbqppl.moj.gov.vn/law/vi/1951_to_1960/1955/195511/195511300001 http://vbqppl.moj.gov.vn/vbpq/Lists/
Vn%20bn%20php%20lut/View_Detail.aspx?ItemID=820 Original artist: Lu Ly v li theo ngun trn
File:Flag_of_Zimbabwe.svg Source: https://upload.wikimedia.org/wikipedia/commons/6/6a/Flag_of_Zimbabwe.svg License: Public
domain Contributors: Own work after www.flag.de Original artist: User:Madden
File:Flag_of_the_Czech_Republic.svg Source: https://upload.wikimedia.org/wikipedia/commons/c/cb/Flag_of_the_Czech_Republic.
svg License: Public domain Contributors:
-x-'s le
-x-'s code
Zirlands codes of colors
6.2. IMAGES 113

Original artist:
(of code): SVG version by cs:-x-.
File:Flag_of_the_Netherlands.svg Source: https://upload.wikimedia.org/wikipedia/commons/2/20/Flag_of_the_Netherlands.svg Li-
cense: Public domain Contributors: Own work Original artist: Zscout370
File:Flag_of_the_People{}s_Republic_of_China.svg Source: https://upload.wikimedia.org/wikipedia/commons/f/fa/Flag_of_the_
People%27s_Republic_of_China.svg License: Public domain Contributors: Own work, http://www.protocol.gov.hk/flags/eng/n_flag/
design.html Original artist: Drawn by User:SKopp, redrawn by User:Denelson83 and User:Zscout370
File:Flag_of_the_Philippines.svg Source: https://upload.wikimedia.org/wikipedia/commons/9/99/Flag_of_the_Philippines.svg Li-
cense: Public domain Contributors: The design was taken from [1] and the colors were also taken from a Government website Original
artist: User:Achim1999
File:Flag_of_the_Republic_of_China.svg Source: https://upload.wikimedia.org/wikipedia/commons/7/72/Flag_of_the_Republic_of_
China.svg License: Public domain Contributors: [1] Original artist: User:SKopp
File:Flag_of_the_United_Kingdom.svg Source: https://upload.wikimedia.org/wikipedia/en/a/ae/Flag_of_the_United_Kingdom.svg Li-
cense: PD Contributors: ? Original artist: ?
File:Flag_of_the_United_States.svg Source: https://upload.wikimedia.org/wikipedia/en/a/a4/Flag_of_the_United_States.svg License:
PD Contributors: ? Original artist: ?
File:Folder_Hexagonal_Icon.svg Source: https://upload.wikimedia.org/wikipedia/en/4/48/Folder_Hexagonal_Icon.svg License: Cc-by-
sa-3.0 Contributors: ? Original artist: ?
File:Free_and_open-source_software_logo_(2009).svg Source: https://upload.wikimedia.org/wikipedia/commons/3/31/Free_and_
open-source_software_logo_%282009%29.svg License: Public domain Contributors: FOSS Logo.svg Original artist: Free Software Portal
Logo.svg (FOSS Logo.svg): ViperSnake151
File:Freewallet_Monero_Wallet_UI.png Source: https://upload.wikimedia.org/wikipedia/commons/3/37/Freewallet_Monero_Wallet_
UI.png License: CC BY-SA 4.0 Contributors: https://freewallet.org/press-kit Original artist: Freewallet Team
File:History_of_Bitcoin_difficulty.svg Source: https://upload.wikimedia.org/wikipedia/commons/4/4b/History_of_Bitcoin_difficulty.
svg License: BSD Contributors: Own work Original artist: Ladislav (talk) (Uploads)
File:Hitbtc_terminal_window.png Source: https://upload.wikimedia.org/wikipedia/commons/e/ef/Hitbtc_terminal_window.png Li-
cense: CC BY-SA 4.0 Contributors: Own work Original artist: Aldgodjer
File:ItBit2016logonew.png Source: https://upload.wikimedia.org/wikipedia/commons/5/52/ItBit2016logonew.png License: CC BY-SA
4.0 Contributors: Own work Original artist: Natashagural
File:Lancelot-A_FPGA_based_bitcoin_mining_board.jpg Source: https://upload.wikimedia.org/wikipedia/commons/f/f0/
Lancelot-A_FPGA_based_bitcoin_mining_board.jpg License: CC0 Contributors: Sent to me personally Original artist:
File:Lock-green.svg Source: https://upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg License: CC0 Contributors: en:File:
Free-to-read_lock_75.svg Original artist: User:Trappist the monk
File:Mergefrom.svg Source: https://upload.wikimedia.org/wikipedia/commons/0/0f/Mergefrom.svg License: Public domain Contribu-
tors: ? Original artist: ?
File:MtGox.png Source: https://upload.wikimedia.org/wikipedia/commons/d/dc/MtGox.png License: Public domain Contributors: Mt-
Gox.com Original artist: MtGox
File:Nxt_SecureAE_Asset_Exchange_view.png Source: https://upload.wikimedia.org/wikipedia/commons/f/fb/Nxt_SecureAE_
Asset_Exchange_view.png License: CC0 Contributors: Own work Original artist: Thomas Veil
File:Office-book.svg Source: https://upload.wikimedia.org/wikipedia/commons/a/a8/Office-book.svg License: Public domain Contribu-
tors: This and myself. Original artist: Chris Down/Tango project
File:P2P-network.svg Source: https://upload.wikimedia.org/wikipedia/commons/3/3f/P2P-network.svg License: Public domain Contrib-
utors: Own work Original artist: User:Mauro Bieg
File:People_icon.svg Source: https://upload.wikimedia.org/wikipedia/commons/3/37/People_icon.svg License: CC0 Contributors: Open-
Clipart Original artist: OpenClipart
File:Portal-puzzle.svg Source: https://upload.wikimedia.org/wikipedia/en/f/fd/Portal-puzzle.svg License: Public domain Contributors: ?
Original artist: ?
File:Proof_of_Work_challenge_response.svg Source: https://upload.wikimedia.org/wikipedia/commons/5/55/Proof_of_Work_
challenge_response.svg License: Public domain Contributors: Own work by the original uploader Original artist: Fabien Coelho
(http://www.coelho.net/)
File:Proof_of_Work_solution_verification.svg Source: https://upload.wikimedia.org/wikipedia/commons/2/24/Proof_of_Work_
solution_verification.svg License: Public domain Contributors: Own work by the original uploader Original artist: Fabien Coelho
(http://www.coelho.net/)
File:Question_book-new.svg Source: https://upload.wikimedia.org/wikipedia/en/9/99/Question_book-new.svg License: Cc-by-sa-3.0
Contributors:
Created from scratch in Adobe Illustrator. Based on Image:Question book.png created by User:Equazcion Original artist:
Tkgd2007
File:SHA-2.svg Source: https://upload.wikimedia.org/wikipedia/commons/7/7d/SHA-2.svg License: CC-BY-SA-3.0 Contributors: Own
work Original artist: User:kockmeyer
File:Server-based-network.svg Source: https://upload.wikimedia.org/wikipedia/commons/f/fb/Server-based-network.svg License:
LGPL Contributors: derived from the Image:Computer n screen.svg which is under the GNU LGPL Original artist: User:Mauro Bieg
File:Sha-family.svg Source: https://upload.wikimedia.org/wikipedia/commons/d/d7/Sha-family.svg License: CC BY-SA 4.0 Contribu-
tors: Own work Original artist: Uwe Martens
114 CHAPTER 6. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES

File:Structured_(DHT)_peer-to-peer_network_diagram.png Source: https://upload.wikimedia.org/wikipedia/commons/7/79/


Structured_%28DHT%29_peer-to-peer_network_diagram.png License: CC0 Contributors: Inkscape Original artist: Mesoderm
File:Symbol_book_class2.svg Source: https://upload.wikimedia.org/wikipedia/commons/8/89/Symbol_book_class2.svg License: CC
BY-SA 2.5 Contributors: Mad by Lokal_Prol by combining: Original artist: Lokal_Prol
File:Symbol_list_class.svg Source: https://upload.wikimedia.org/wikipedia/en/d/db/Symbol_list_class.svg License: Public domain Con-
tributors: ? Original artist: ?
File:The_logo_of_OKCoin,_a_Chinese_bitcoin_exchange.png Source: https://upload.wikimedia.org/wikipedia/en/c/ca/The_logo_
of_OKCoin%2C_a_Chinese_bitcoin_exchange.png License: Fair use Contributors: OKCoin.com Original artist: ?
File:Tor-logo-2011-flat.svg Source: https://upload.wikimedia.org/wikipedia/commons/1/15/Tor-logo-2011-flat.svg License: CC BY
3.0 us Contributors: https://media.torproject.org/image/official-images/2011-tor-logo-flat.svg Original artist: The Tor Project, Inc.
File:Torrentcomp_small.gif Source: https://upload.wikimedia.org/wikipedia/commons/3/3d/Torrentcomp_small.gif License: CC-BY-
SA-3.0 Contributors: https://en.wikipedia.org/wiki/BitTorrent smaller le-size GIF for BitTorrent article, cleaned up the dithered and
ugly pixels. I made this to replace the monstrous 1.77 MB GIF residing on that articles page. Original artist: Wikiadd
File:Total-bitcoins.svg Source: https://upload.wikimedia.org/wikipedia/commons/e/ed/Total-bitcoins.svg License: CC BY-SA 3.0 Con-
tributors: Transferred from en.wikipedia to Commons. Original artist: Ladislav Mecir at English Wikipedia
File:TylerWinklevoss.jpg Source: https://upload.wikimedia.org/wikipedia/commons/9/9c/TylerWinklevoss.jpg License: CC BY-SA 3.0
Contributors: Own work Original artist: GabrielF
File:United_States_penny,_obverse,_2002.png Source: https://upload.wikimedia.org/wikipedia/commons/4/46/United_States_
penny%2C_obverse%2C_2002.png License: Public domain Contributors: ? Original artist: ?
File:Unstructured_peer-to-peer_network_diagram.png Source: https://upload.wikimedia.org/wikipedia/en/f/fa/Unstructured_
peer-to-peer_network_diagram.png License: CC0 Contributors:
Inkscape
Original artist:
Mesoderm
File:Utxo-count.svg Source: https://upload.wikimedia.org/wikipedia/commons/3/31/Utxo-count.svg License: CC BY-SA 4.0 Contribu-
tors: Own work Original artist: Ladislav Mecir
File:Wiki_letter_w_cropped.svg Source: https://upload.wikimedia.org/wikipedia/commons/1/1c/Wiki_letter_w_cropped.svg License:
CC-BY-SA-3.0 Contributors: This le was derived from Wiki letter w.svg: <a href='//commons.wikimedia.org/wiki/File:
Wiki_letter_w.svg' class='image'><img alt='Wiki letter w.svg' src='https://upload.wikimedia.org/wikipedia/commons/thumb/6/6c/Wiki_
letter_w.svg/50px-Wiki_letter_w.svg.png' width='50' height='50' srcset='https://upload.wikimedia.org/wikipedia/commons/thumb/6/6c/
Wiki_letter_w.svg/75px-Wiki_letter_w.svg.png 1.5x, https://upload.wikimedia.org/wikipedia/commons/thumb/6/6c/Wiki_letter_w.svg/
100px-Wiki_letter_w.svg.png 2x' data-le-width='44' data-le-height='44' /></a>
Original artist: Derivative work by Thumperward
File:X_mark.svg Source: https://upload.wikimedia.org/wikipedia/commons/a/a2/X_mark.svg License: Public domain Contributors: Own
work Original artist: User:Gmaxwell
File:Yacy-resultados.png Source: https://upload.wikimedia.org/wikipedia/commons/f/f1/Yacy-resultados.png License: GFDL Contrib-
utors: Trabajo propio/captura de pantalla Original artist: User:Hack-Master
File:Yes_check.svg Source: https://upload.wikimedia.org/wikipedia/en/f/fb/Yes_check.svg License: PD Contributors: ? Original artist: ?
File:_HashCoins.jpg Source: https://upload.wikimedia.org/wikipedia/commons/a/a8/%D0%9E%D0%B1%D0%BE%
D1%80%D1%83%D0%B4%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5_HashCoins.jpg License: CC BY-SA 4.0 Con-
tributors: Own work Original artist: Alexandr Gromov

6.3 Content license


Creative Commons Attribution-Share Alike 3.0

You might also like