You are on page 1of 57

A Project

On
A STUDY ON CRYPTOCURRENCY-BITCOIN

Submitted To
Rashtrasant Tukadoji Maharaj Nagpur University, Nagpur

Submitted in partial fulfillment of the requirement for the


Award of the Degree of Bachelor of Bussiness Administration

Submitted By
Amaya.M.Bais
Under The Guidance Of
Mr.Hitesh Raicha

Department of Commerce, Management & Computers


2018-2019
Hislop College, Nagpur
INDEX

SERIAL PARTICULARS PAGE


NO. NO.

1. Chapter 1-Executive Summary

2. Chapter 2-Introduction to Topic

3. Chapter 3-Research Methodology

4. Chapter 4-Analysis and Findings of the


study

5. Chapter 5-Conclusions and


Recommendations of the study.

6. Chapter 6-Bibliography

7. Chapter 7-Appendices
CERTIFICATE

I hereby declare that, the project report entitled “A study on Cryptocurrency-


Bitcoin” submitted by Amaya.M.Bais to Rashtrasant Tukdoji Maharaj
Nagpur University, Nagpur for the award of Bachelor Of Business
Administration Degree in the faculty of commerce is a bonafide and original
research work carried out under my guidance and supervision. The research is
sufficiently high standard to warrant its submission to the university of the said
degree.

No part of this project has been submitted for any degree or diploma, or
published in any other form. The assistance and the help to the researchers
during the course of the investigation in the form of basic source material and
information have been duly acknowledged.

Place: - Nagpur

Date: -

Dr(.Mrs.)Jigisha Naidu Guide:

Director

Internal Examiner: External Examiner


DECLARATION

I hereby declare that A STUDY ON CRYPTOCURRENCY-BITCOIN


submitted by AMAYA.M.BAIS is a result of my own research work under
the guidance of Mr.HITESH RAICHA for the partial fulfillment of Bachelor
Of Business Administration and that the same has not been previously
submitted to any degree/diploma.

Place:- Nagpur Signature of the Student

Date:-
ACKNOWLEDGEMENT

The project work has been undertaken as a part of curriculum of final year
degree in Bachelor of Business Administration. The purpose of doing this is to
impart integrated approach to our education. It gives us an opportunity to apply
our concepts vis-à-vis the subject we undertake to study.

It is said that success is the symbol of diligence, inspiration and innovation.


Success only smiles on those who strive hard for it. So I would like to ascribe
my success to the hard work of my guide Mr. HITESH RAICHA whose
endeavor for perfection, personal attention, enthusiasm and foresight has
contributed in a big way in completing this project with considerable ease
within the stipulated time.

At last my sincere thanks to the members of Department Of Commerce,


Management & Computers, friends and all those who helped me directly or
indirectly in the completion of this project work for all my inspiration and
strength in completing this work

Amaya.M.Bais
EXECUTIVE SUMMARY

Even as authorities tightened the noose and prices plummeted, “how to invest in
bitcoin” remained one of the most searched terms on Google India in 2018. This sums up the
perils and promises of trading in cryptoassets in the country.

The year 2018 was a decisive one for India’s cryptocurrency ecosystem. From a central bank
diktat prohibiting banks from dealing in cryptocoins, to the country’s biggest exchange,
Zebpay, downing its shutters, investors and traders believe they’ve seen it all in the past year.
In December 2017, the price of bitcoin was at an all-time high of nearly $20,000, and
investors in India were making a beeline for cryptocoins. This year, however, prices
plummeted and currently a bitcoin is priced at around $4,000. Traders also rue that confusion
reigned supreme on the regulatory front, in the absence of a clear government stance. India is
still working on draft regulations for virtual currencies and a panel headed by India’s
economic affairs secretary Subhash Chandra Garg was expected to submit its findings to a
panel this month.Now, all eyes are on prime minister Narendra Modi’s government, which is
expected to draft a clear policy on bitcoin and its ilk soon. At its peak in late 2017, major
crypto exchanges were adding between 300,000 and 400,000 users every month. However,
now the number has trickled down to just a few thousand, thanks to an unfavourable policy
environment, say industry experts.

The Reserve Bank of India (RBI) had first warned against digital currencies as early as
2013, but it tightened regulatory norms earlier this year. In April, the regulator instructed all
banks in the country to wind down business operations with cryptocurrency exchanges and
traders within three months. This meant no more trading in rupees on cryptobourses.

The exchanges refused to give up, though, and approached the supreme court. While the final
hearing in this case commenced on Sept. 11, the case hasn’t moved ahead much thanks to
several adjournments and delays. The next hearing is on Jan. 15, 2019.

In order to stay afloat, exchanges have experimented with peer-to-peer (P2P) and crypto-to-
crypto trading. This allows traders and the exchanges to circumvent the RBI ban as
transactions are not routed through the exchanges’ bank accounts.“Before the banking ban,
no one had thought that the P2P model could be successful in India as it was, in its earlier
form, riddled with problems. However, investors took to it really easily and it has been
working very well,” said Nischal Shetty, founder of WazirX, a cryptocurrency exchange in
India. Not all exchanges weathered the storm, though. In September, Zebpay decided
to move to Malta after shutting down its India operations. “The curb on bank accounts has
crippled our, and our customers’, ability to transact business meaningfully,” the cryptobourse
said in a blog after announcing its decision to shift its headquarters.

There is a threat of more such firms shifting overseas, “if there is no clarity on the
regulations, or if the stance continues to be unfavourable,” said Shetty.

The absence of a well-Since last December, the government has become more vocal about its
displeasure with cryptocurrencies, even likening it to a ponzi scheme. In the 2018 annual
budget in February, finance minister Arun Jaitley reiterated that he will not make cryptocoins
a part of the formal payments system.defined government policy has left the ecosystem in a
state of limbo.

Since last December, the government has become more vocal about its displeasure with
cryptocurrencies, even likening it to a ponzi scheme. In the 2018 annual budget in February,
finance minister Arun Jaitley reiterated that he will not make cryptocoins a part of the formal
payments system.
Then, in October, the government said it was looking to “ban (the) use of private
cryptocurrencies in India.”

Meanwhile, the Garg committee’s recommendations are awaited. In an affidavit filed in the
supreme court last month, the government said the panel’s draft report will be submitted to an
inter-ministerial group this month. Court documents suggest that the government is still in the
process of choosing between regulation and a ban, which leaves some hope for the industry.
Due to the confusion, the ecosystem has stagnated because businesses have put their
plans on hold,” said Sathvik Vishwanath, co-founder and CEO of Unocoin, a
cryptocurrency exchange. Vishwanath is, however, hopeful that there will be more
clarity on the regulatory stance in 2019 so that the ecosystem can become stronger.

Besides, the government has indicated its keenness to develop blockchain


technology in India. Since cryptocurrencies and blockchain are intertwined, the
industry is optimistic.

“In 2019, we are going to see an increasing number of blockchain products and
services with real use cases. And this is going to lead to a bull run in the virtual
currency market,” said Shubham Yadav, co-founder of Coindelta, another
Indian cryptocurrency exchange.

The year 2017 was a bull market for bitcoin and other cryptocurrencies, while in 2018
they were in the throes of a bear hug. As we approach 2019, the industry is hoping
that once again the tide will turn.

“This year has been a wild ride. Lot of new investors came into the scene after
watching the parabolic move in bitcoin last year and are now scared,” said a
cryptocurrency enthusiast who identifies himself by the pseudonym Gabru and runs
groups with over 4,000 members on the instant messaging platform Telegram.
“People who have been in crypto for longer know that this is just another market
cycle like the past ones, when Bitcoin went down 80-90% (in previous bear markets)
but still few years later was able to break all-time highs. I think this time is no
different.”
INTRODUCTION
Cryptocurrency is an electronic money created with technology controlling its creation and
protecting transactions, while hiding the identities of its users.
Crypto- is short for “cryptography”, and cryptography is computer technology used for
security, hiding information, identities and more. Currency simply means “money currently
in use”.

Cryptocurrencies are a digital cash designed to be quicker, cheaper and more reliable than our
regular government issued money. Instead of trusting a government to create your money and
banks to store, send and receive it, users transact directly with each other and store their
money themselves. Because people can send money directly without a middleman,
transactions are usually very affordable and fast.
To prevent fraud and manipulation, every user of a cryptocurrency can simultaneously record
and verify their own transactions and the transactions of everyone else. The digital
transaction recordings are known as a “ledger” and this ledger is publicly available to
anyone. With this public ledger, transactions become efficient, permanent, secure and
transparent.

With public records, cryptocurrencies don’t require you trust a bank to hold your money.
They don’t require you trust the person you are doing business with to actually pay you.
Instead, you can actually see the money being sent, received, verified, and recorded by
thousands of people. This system requires no trust. This unique positive quality is known as
“trustless. The first cryptocurrency was Bitcoin.

THE HISTORY OF CRYPTOCURRENCY:

The first decentralized digital cryptocurrency can be traced back to “bit gold” (not to be
confused with Bitgold), which was worked on by Nick Szabo between 1998 and 2005 but
was never implemented.

Although bit gold is considered the first precursor to bitcoin, cryptocurrency pioneer David
Chaum’s company DigiCash (a company founded in 1989 which attempted to innovate
digital currency), Wei Dai’s b-money (a conceptual system published in 1998 which Satoshi
cites it in the Bitcoin white paper), and “e-gold” (a centralized digital currency that started in
1996) are all notable early mentions.

With that history noted, modern digital currency starts in 2008 when Satoshi Nakamoto (an
anonymous person and/or group) released their paper detailing what would become Bitcoin.
Bitcoin became the first decentralized digital coin when it was created in 2008. It then went
public in 2009

As of 2018, Bitcoin is the most commonly known and used cryptocurrency.


Meanwhile, other coins including Ethereum (ETH), Ripple (XRP), Litecoin (LTC), and
more are notable mentions.

Given the popularity of Bitcoin as well as its history, the term “altcoin” is sometimes
used to describe alternative cryptocurrencies to bitcoin (especially coins with small
market caps).

As of January 2015, there were over 500 different types of cryptocurrencies – or


altcoins – for trade in online markets. However, only 10 of them had market
capitalizations over $10 million.

As of September 2017, there were over 1,100 cryptocurrencies and the total market
capitalization of all cryptocurrencies reached an all-time high surpassing $60 billion!
Then, by December 2017, the total market cap reached $600 billion (a multiple of 10
in only two months).

In other words, although the future is uncertain, cryptocurrency seems to be more


than just a fad. Today cryptocurrency is shaping up to be a growing market that
(despite the pros and cons) is likely here for the long haul.

INTRODUCTION TO BITCOIN:
Bitcoin is a digital,decentralized,partially anonymous currency,not backed by any
government or other legal entity,and not redeemable for gold or other commodity.Its
proponents argue that Bitcoin has many properties that could make it an ideal currency for
mainstream consumers and merchants for example,bitcoins are highly liquid ,have low
transaction cost,can be used to send payments quickly across the internet and can be used to
make micropayments.This new currency could also hold the key to allowing organizations
such as Wikileaks,hated by government,to receive donations and conduct business
anonymously.

Amszingly,as of October 2011,a bitcoin (currency ticker BTC)IS WORTH ABOUT TWO
U.S Dollors (USD),there are about $20 million of bitcoins in existence,there are probably
around 20,000 Bitcoins are traded everyday.
Most of the currencies in the world,including the reserve currencies are flat currencies.The
term flat currencies refers to the currencies that are issued by a government,and the
government promises to pay the holder of such currencies an equivalent amount in
gold.Ifneeded.Thus,these currencies usually hav a central regulatory body which issues them
,and are consequently called’centralized’.in fact,at the end of the day they have a central
regulatory body which issues them and are consequently called ‘centralized’. In fact,at the
end of the day ,they have the value they have ,because somebody said so.The modern state
can make anything it chooses as acceptable currency,without any further backing of any
kind,even without a connection with gold.

Nitcoins are the most sought after cryptocurrency in the market.However there are several
other currencies which have gained momentum ever since the concept has been introduced.

Below are some other of cryptocurrencies that exist:

1. Ethereum-Ethereum is the second most famous name in the virtual currency market. It
somewhat similar to the concept of bitcoins however it possesses some additional attributes.
It is purely a block chain based platform. What makes it special is the Ethereal Virtual
Machine. The block chain in ethereal is used not to store data of the transaction but to make
sure smooth run of a decentralized application.

2.Ripple-Ripple is more in the nature of a payment protocol created and developed by a


company named ripple, which is based on the concept of Real time Gross Settlement. It was
initially released in year 2012.

3. NEM – Similar to bitcoinNEm is also a peer-to-peer block chain platform launched in the
year 2015.It uses the unique proof-of –importance algorithm, a way to validate transactions
and achieve the distributed consensus.

4. Litecoin- Initially introduced in the year 2011, litecoin is mostly identical to bitcoin.What
make it stand out is the use of segregated witness and the lightning network.

Some other crypto currencies are bbcoins and doge coins which have not gained much
significance due to their technical shortcomings and inability to standout.

Terms related to Bitcoin

• Bitcoin – Bitcoin is the name of the project started by Satoshi Nakamoto to create the
world’s first decentralized crypto-currency. A Bitcoin is the name of a single unit of the
Bitcoin currency, abbreviated as BTC.

• Address – An address is a key pair, including public and private key, used by user to access
their bitcoins.

• Transaction – A Transaction is a single operation of moving Bitcoins from one set of one
or more Addresses to another set of one or more Addresses. A Transaction is similar to a
bank transfer.
• Block – A Block is a package of information containing most notably all Transactions
created since the previous Block, as well as reference to that preceding Block.

• Block Chain – A Block Chain is a collection of linked Blocks from the most current one to
the Genesis Block.

• Network – The Bitcoin Network is a collective name for all applications connected together
that exchange information about Bitcoin Blocks, Transactions and connected Clients.

• Wallet – A Wallet is a set of Addresses created by the Client and saved locally in a file.

• Miner – A Miner is a computer machine and accompanying application dedicated to


creating new Blockish significance due to their technical shortcomings and inability to
standout.

History of bitcoin
Bitcoin is a cryptocurrency, a digital asset designed to work as a medium of exchange that
uses cryptographyto control its creation and management, rather than relying on central
authorities.[1] The presumed pseudonymous Satoshi Nakamoto integrated many existing ideas
from the cypherpunk community when creating bitcoin. Over the course of bitcoin's history,
it has undergone rapid growth to become a significant currency both on and offline – from the
mid 2010s, some businesses began accepting bitcoin in addition to traditional currencies.[

PRE-HISTORY
Prior to the release of bitcoin there were a number of digital cash technologies
starting with the issuer based ecash protocols of David Chaum and Stefan
Brands.[3][4][5] Adam Backdeveloped hashcash, a proof-of-work scheme for spam
control. The first proposals for distributed digital scarcity
based cryptocurrencies were Wei Dai's b-money[6] and Nick Szabo's bit gold.[7][8] Hal
Finney developed reusable proof of work (RPOW) using hashcash as its proof of
work algorithm.[9]
In the bit gold proposal which proposed a collectible market based mechanism for
inflation control, Nick Szabo also investigated some additional aspects including
a Byzantine fault-tolerant agreement protocol based on quorum addresses to store
and transfer the chained proof-of-work solutions, which was vulnerable to Sybil
attacks, though

CREATION OF BITCOIN:
On 18 August 2008, the domain name bitcoin.org was registered.[10] Later that year, on 31
October, a link to a paper authored by Satoshi Nakamoto titled Bitcoin: A Peer-to-Peer
Electronic Cash System[11] was posted to a cryptography mailing list.[12] This paper detailed
methods of using a peer-to-peer network to generate what was described as "a system for
electronic transactions without relying on trust".[13][14][15] On 3 January 2009, the bitcoin
network came into existence with Satoshi Nakamoto mining the genesis block of
bitcoin(block number 0), which had a reward of 50 bitcoins.[13][16] Embedded in
the coinbase of this block was the text:
The Times 03/Jan/2009 Chancellor on brink of second bailout for banks.[17]
The text refers to a headline in The Times published on 3 January 2009.[18] This note has been
interpreted as both a timestamp of the genesis date and a derisive comment on the instability
caused by fractional-reserve banking.[19]:18
The first open source bitcoin client was released on 9 January 2009, hosted
at SourceForge.[20][21]
One of the first supporters, adopters, contributor to bitcoin and receiver of the first bitcoin
transaction was programmer Hal Finney. Finney downloaded the bitcoin software the day it
was released, and received 10 bitcoins from Nakamoto in the world's first bitcoin transaction
on 12 January 2009.[22][23] Other early supporters were Wei Dai, creator of bitcoin
predecessor b-money, and Nick Szabo, creator of bitcoin predecessor bit gold.[13]
In the early days, Nakamoto is estimated to have mined 1 million bitcoins.[24] Before
disappearing from any involvement in bitcoin, Nakamoto in a sense handed over the reins to
developer Gavin Andresen, who then became the bitcoin lead developer at the Bitcoin
Foundation, the 'anarchic' bitcoin community's closest thing to an official public face.[25]
The value of the first bitcoin transactions were negotiated by individuals on the bitcoin forum
with one notable transaction of 10,000 BTC used to indirectly purchase two pizzas delivered
by Papa John's.[13]
On 6 August 2010, a major vulnerability in the bitcoin protocol was spotted. Transactions
weren't properly verified before they were included in the transaction log or blockchain,
which let users bypass bitcoin's economic restrictions and create an indefinite number of
bitcoins.[26][27] On 15 August, the vulnerability was exploited; over 184 billion bitcoins were
generated in a transaction, and sent to two addresses on the network. Within hours, the
transaction was spotted and erased from the transaction log after the bug was fixed and the
network forked to an updated version of the bitcoin protocol.[28] This was the only major
security flaw found and exploited in bitcoin's history
SATOSHI NAKAMOTO
"Satoshi Nakamoto" is presumed to be a pseudonym for the person or people who designed
the original bitcoin protocol in 2008 and launched the network in 2009. Nakamoto was
responsible for creating the majority of the official bitcoin software and was active in making
modifications and posting technical information on the bitcoin forum.[13] There has been
much speculation as to the identity of Satoshi Nakamoto with suspects including Dai, Szabo,
and Finney – and accompanying denials.[29][30] The possibility that Satoshi Nakamoto was a
computer collective in the European financial sector has also been discussed.[31]
Investigations into the real identity of Satoshi Nakamoto were attempted by The New
Yorker and Fast Company. The New Yorker's investigation brought up at least two possible
candidates: Michael Clear and Vili Lehdonvirta. Fast Company's investigation brought
up circumstantial evidence linking an encryption patent application filed by Neal King,
Vladimir Oksman and Charles Bry on 15 August 2008, and the bitcoin.org domain name
which was registered 72 hours later. The patent application (#20100042841) contained
networking and encryption technologies similar to bitcoin's, and textual analysis revealed that
the phrase "... computationally impractical to reverse" appeared in both the patent application
and bitcoin's whitepaper.[11] All three inventors explicitly denied being Satoshi
Nakamoto.[32][33]
In May 2013, Ted Nelson speculated that Japanese mathematician Shinichi Mochizuki is
Satoshi Nakamoto.[34] Later in 2013 the Israeli researchers Dorit Ron and Adi Shamirpointed
to Silk Road-linked Ross William Ulbricht as the possible person behind the cover. The two
researchers based their suspicion on an analysis of the network of bitcoin
transactions.[35] These allegations were contested[36] and Ron and Shamir later retracted their
claim.[37]
Nakamoto's involvement with bitcoin does not appear to extend past mid-2010.[13] In April
2011, Nakamoto communicated with a bitcoin contributor, saying that he had "moved on to
other things".[17]
Stefan Thomas, a Swiss coder and active community member, graphed the time stamps for
each of Nakamoto's 500-plus bitcoin forum posts; the resulting chart showed a steep decline
to almost no posts between the hours of 5 a.m. and 11 a.m. Greenwich Mean Time. Because
this pattern held true even on Saturdays and Sundays, it suggested that Nakamoto was asleep
at this time, and the hours of 5 a.m. to 11 a.m. GMT are midnight to 6 a.m. Eastern Standard
Time (North American Eastern Standard Time). Other clues suggested that Nakamoto was
British: A newspaper headline he had encoded in the genesis block came from the UK-
published newspaper The Times, and both his forum posts and his comments in the bitcoin
source code used British English spellings, such as "optimise" and "colour".[13]
An Internet search by an anonymous blogger of texts similar in writing to the bitcoin
whitepaper suggests Nick Szabo's "bit gold" articles as having a similar author.[29] Nick
denied being Satoshi, and stated his official opinion on Satoshi and bitcoin in a May 2011
article.[38]
In a March 2014 article in Newsweek, journalist Leah McGrath Goodman doxed Dorian S.
Nakamoto of Temple City, California, saying that Satoshi Nakamoto is the man's birth
name. Her methods and conclusion drew widespread criticism.[39][40]
In June 2016, the London Review of Books published a piece by Andrew
O'Hagan about Nakamoto.[41] The real identity of Satoshi Nakamoto still remains a
matter of disput
RESEARCH METHODOLOGY
MEANING OF RESEARCH
Research is an academic activity and as such the term should be used in a technical sense.
According to Clifford Woody research comprises defining and redefining problems,
formulating hypothesis or suggested solutions; collecting, organizing and evaluating data;
making deductions and reaching conclusions; and at last carefully testing the conclusions to
determine whether they fit the formulating hypothesis. D. Steiner and M. Stephenson in the
Encyclopedia of Social Sciences define research as “the manipulation of things, concepts or
symbols for the purpose of generalizing to extend, correct or verify knowledge, whether that
knowledge aids in construction of theory or in the practice of an art.”

Research is, thus, an original contribution to the existing stock of knowledge making for its
advancement. It is the per suit of truth with the help of study, observation, comparison and
experiment. In short, the search for knowledge through objective and systematic method of
finding solution to a problem is research. The systematic approach concerning generalization
and the formulation of a theory is also research. As such the term ‘research’ refers to the
systematic method consisting of enunciating the problem, formulating a hypothesis,
collecting the facts or data, analyzing the facts and reaching certain conclusions either in the
form of solutions(s) towards the concerned problem or in certain generalizations for some
theoretical formulation

IMPORTANCE OF RESEARCH
 To those students who are to write a master’s or Ph.D. thesis, research may mean
careerism or a way to attain a high position in the social structure.

 To professionals in research methodology, research may mean a source of livelihood.

 To philosophers and thinkers, research may mean the outlet for new ideas and
insights.

 To literary men and women, research may mean the development of new styles and
creative work.

 To analysts and intellectuals, research may mean the generalizations of new theories.
RESERACH PROCESS
Before embarking on the details of research methodology and techniques, it seems
appropriate to present a brief overview of the research process. Research process consists of
series of actions or steps necessary to effectively carry out research and the desired
sequencing of these steps. At times, the first step determines the nature of the last step to be
undertaken. If subsequent procedures have not been taken into account in the early stages,
serious difficulties may arise which may even prevent the completion of the study. One
should remember that the various steps involved in a research process are not mutually
exclusive; nor are they separate and distinct.

They do not necessarily follow each other in any specific order and the researcher has to be
constantly anticipating at each step in the research process the requirements of the subsequent
steps. However, the following order concerning various steps provides a useful procedural
guideline regarding the research process:

• Formulating the research problem;


• Extensive literature survey;
• Developing the hypothesis;
• Preparing the research design;
• Determining sample design;
• Collecting the data;
• Execution of the project;
• Analysis of data;
• Hypothesis testing.
• Generalizations and interpretation, and
• Preparation of the report or presentation of the results, i.e. formal write-up of conclusions
reached.
STATEMENT OF PROBLEM:

The author Henry Miller once said, “Confusion is a word we have invented for an order
which is not understood.” And confusion seems to run rampant in many articles that
are critical of blockchain, while the real problem is with Bitcoin and cryptocurrencies.

There are key differences between Bitcoin and blockchain. Blockchain is a digitized,
distributed and secure ledger that guarantees immutable transactions and solves the trust
problem when two parties exchange value. Cryptocurrencies like Bitcoin rely on blockchain
to conduct transactions. Yet blockchain transcends cryptocurrencies and offers many
solutions that are likely to disrupt numerous industries with some profound implications.

In a simple metaphoric comparison, blockchain is like an engine that can be used in airplanes,
vehicles, elevators, escalators, washers and dryers. Bitcoin, meanwhile, is like the first Ford
Model T car that was manufactured in 1908. This fundamental difference helps in
understanding the polymorphic value of blockchain and the problems with bitcoin and most
cryptocurrencies.

One area of confusion about blockchain is the perceived negative environmental impact, but
this is a problem specific to bitcoin and some other cryptocurrencies. It is caused by the
limitations of the decade-old design of bitcoin and due to Bitcoin’s mining process that
requires a “proof of work” to validate transactions. Proof of work is a mathematical algorithm
that is essential to validate transactions in the Bitcoin blockchain and consumes huge
computational power and energy close to what Denmark consumes annually. Other
cryptocurrencies operate differently. Ether, for example, uses the proof-of-stake concept,
which is energy efficient, while the cryptocurrency ripple does not require mining.

Another misconstrued problem is blockchain's slow performance, which is, again, a Bitcoin
issue. Bitcoin’s network requires an average of 10 minutes to create a block, and
it's estimated that it can only manage seven transactions per second (TPS). Ethereum does
better (20 TPS), and the IBM blockchain (1,000 TPS) and Ripple (1,500 TPS) are even more
impressive.
SCOPE OF THE STUDY

• The project can be used as a source of information. It gives the idea about the effects of
bitcoin and its associates before and after its innovation.
• Through this project we can examine the current position of bitcoin in the Indian which
will help the internal and external investors for investing strategically.
• This report will also provide the figures working capital and the loss which is being
recovered post innovation of bitcoin..
OBJECTIVES OF THE STUDY:
The main objectives of the study are as follows:

 Understanding the concept of Bitcoin.

 Analysing the position of Bitcoin in India

 Studying the regulatory concerns regarding the Bitcoin.

 Understanding the intellectual property issues.

 Analysing the Security, privacy and Data Protection issues.

 Understanding and analyzing the other risks and vulnerability in Bitcoin transactions.

 Studying the regulatory considerations and setting up of Bitcoin related business in


India.
ANALYSIS AND FINDINGS:

DATA COLLECTION

Data for the purpose of research has been collected from secondary sources. The has then
been analyzed in order to find out reasons of merger and its effects in Indian Banking System.

Primary Data

It refers to the data that the investigator collects from the very first time. This type of data has
not been collected earlier by this or any other investigator before. A primary Data will
provide the investigator with the most reliable first hand information about the respondents.
The investigators would have a clear idea about the technology uses, the statistical units
employed, the research methodology and the size of sample technique.

Methods of Primary Data Collection:


 Direct Personal Interview
 Indirect Oral Interview
 Mailed Questionnaire
 Schedules

Secondary Data
It refers to the data that the investigator collects from another source. Past
Investigators or agents collect data required for the study. The investigator is the
first researcher or statistical to collect the data. Moreover, the investigator does
not have a clear idea about the intricacies of the data.

Methods Of Secondary Data Collection

 Internet
 Business Journals
 Libraries
 Social Books
 The data is being collected section wise and all the data that are being
collected are of secondary data mode. By the help of internet and the
Annual Report which is being published by the SBI.
 However some findings and opinions are being collected from various
articles written by economists or bankers to strengthen the facts and the
research report.
 Each and every financial data regarding the working capital, the effect on
share holders post merger and the loss recovered by the Bank post merger
are being collected from the annual report of SBI Annual Report 2017-
2018
 .For the comparative study of the working capital and the loss that is being
recovered this current financial year as compared to previous year the SBI
Annual Report 2016-2017 has also been referred where the bank has given
its post merger assumptions regarding the deposits and advances and the
treasury pool of the bank.

MEANING OF DATA ANALYSIS


Data Analysis is the process of systematically applying statistical and/or logical
techniques to describe and illustrate, condense and recap, and evaluate data. According to
Shamoo and Resnik (2003) various analytic procedures “provide a way of drawing
inductive inferences from data and distinguishing the signal (the phenomenon of interest)
from the noise (statistical fluctuations) present in the data”.

While data analysis in qualitative research can include statistical procedures, many times
analysis becomes an ongoing iterative process where data is continuously collected and
analyzed almost simultaneously. Indeed, researchers generally analyze for patterns in
observations through the entire data collection phase (Savenye, Robinson, 2004). The
form of the analysis is determined by the specific qualitative approach taken (field study,
ethnography content analysis, oral history, biography, unobtrusive research) and the form
of the data (field notes, documents, audiotape, and videotape).
ANALYSING THE CURRENT POSITION OF BITCOIN IN INDIA:

Despite being down 80 percent from its all-time high, a fairly large number of investors are
still cautious and shorting bitcoin in a low price range.

Bitcoin shorts achieved a 3-week high earlier this week, demonstrating a lack of confidence
of investors in the cryptocurrency market in the near-term performance of bitcoin.

1-Month Price Chart of Bitcoin (Source: Coinmarketcap.com)


But, according to a trader known to the cryptocurrency industry as “Galaxy,” bitcoin at
$3,000 may be a rare opportunity that does not come again in the future.

WHY $3,000 FOR BITCOIN IS RARE

According to Galaxy, since its inception, bitcoin has established a trend of reaching a new
all-time high, enduring a steep decline in price, initiating an accumulation, and recovering to
a new high.
Based on that trend, the trader said that investors will likely never see Bitcoin at $3,000 once
again after April and the dominant cryptocurrency is en route to recovering in 1 to 2 months.

He said:

Although prices may appear to be random (to some), they actually create repeating patterns
and trends.
Observing this pattern makes April the last month of cheap BTC. And now, of course it will
be cheap multiple times in the future, but never $3,000 cheap.
There are several traders and technical analyst who foresee bitcoin replicating its price
movement in November wherein it experienced three months of stability and fell by nearly 50
percent in the following month.
If bitcoin fails to cleanly break into the $4,000 region and surpass key resistance levels at
$4,200 and $4,300, analysts have said that a retest of lows at $3,300 and $3,122 is a
possibility.

“Unless we break new local highs ($4,300), trend is still bearish. Expecting at least a dump
back down to the green support level, maybe lower,” a trader said.
However, the trend in which bitcoin experiences an extended period of stability and then
plunges in price right after by a large margin was portrayed once in November.
In contrast, the trend in which bitcoin hits a new all-time high, endures an 85 percent
correction, initiates an accumulation phase, and recovery has been around for 10 years of
bitcoin’s existence.

WILL INSTITUTIONAL INVESTORS FUEL BITCOIN MOMENTUM?


Last month, Blocktower chief investment officer Ari Paul said that while he has been too
optimistic about the rate of institutional adoption in the cryptocurrency market, he expects
institutions to arrive in Q3 of 2019.

Paul stated:

I’ve been too optimistic about the pace of institutional adoption in the past. It’s coming, but I
can’t estimate which quarter (Whether that’s this year or 2022) that we’ll see a big spike. As
a humble guess, something like Q3 2019.
Less than a month after Paul’s statement, the first two public pension funds in the U.S.
invested in Morgan Creek Digital’s cryptocurrency fund, officially marking the entrance of
institutional investors into the cryptocurrency sector.

Although uncertain, depending on the pace of institutional adoption, the inflow of capital
from institutions over the upcoming quarters could fuel the momentum of the asset if it
begins its accumulation phase in 1 or 2 months as some traders predict.

REGULATORY CONCERNS REGARDING THE BITCOIN IN INDIA:


Although the RBI advises caution on its use, bitcoin is not illegal in India. Cryptocurrency
exchanges operate freely and hence we can say that bitcoin is legal
Topics

crypto-money mint-india-wire rbisebigovernmentfinance ministryincome taxusers

Income tax department surveyed the major bitcoin exchanges in India. The survey reports
said, this was done to collect information about transactions and check whether there was a
risk of tax evasion. This week, it was reported that the income tax department is set to issue
notices to about 5,00,000 high net worth individuals trading on the exchange across India.
This comes at a time when there are still no clear regulations on cryptocurrencies and bitcoin
exchanges.
Although the Reserve Bank of India (RBI) advises caution on its use, bitcoin is not illegal in
India. Cryptocurrency exchanges operate freely and hence we can say that bitcoin is legal.
So, if it is a legal entity, why is there silence on its regulation? Also, who is responsible for
regulating it?
The RBI has so far issued three notifications pertaining to bitcoin and other virtual currencies
(VC). In all these, starting December 2013, the RBI has cautioned users, holders and traders
on the risk of these currencies and clarified that it has not given any licence or authorisation
to any entity or company to operate such schemes or deals . In a December 2013 notification,
the RBI said, “The creation, trading or usage of VCs including Bitcoins, as a medium for
payment are not authorised by any central bank or monetary authority. No regulatory
approvals, registration or authorisation is stated to have been obtained by the entities
concerned for carrying on such activities." Other than cautioning the public, the RBI hasn’t
taken any regulatory stance on virtual currencies yet.
After repeated cautionary circulars from the apex bank, in April 2017 the government set up
an inter-disciplinary committee—chaired by special secretary (economic affairs)—to
examine the existing framework of virtual currencies. The committee was supposed to submit
its report within 3 months. The committee was set up to take stock of the present status of
virtual currencies both in India and globally, examine the existing global regulatory and legal
structures governing virtual currencies, suggest measures for dealing with such virtual
currencies including issues relating to consumer protection, money laundering and examine
any other matter related to virtual currencies that may be relevant. In December 2017, finance
minister Arun Jaitley told the media that the government doesn’t consider bitcoin as a legal
tender and it is working on recommendations for such currencies.
Meanwhile, Securities Exchange Board of India (Sebi) on 20 December said that if bitcoin is
considered as a commodity derivative then Sebi might regulate it. In countries such as the
US, the Sebi-equivalent regulatory body is looking into cryptocurrenices. Experts say,
considering cryptocurrencies are looked at as a commodity, Sebi should look at regulating
them.
Though there are still no clear regulations or proper jurisdiction, the income-tax department is
clear that tax has to be paid on all cryptocurrency transactions. Though there is no mention of
cryptocurrencies in the Act, income tax will still have to be paid on any gains accruing from
cryptocurrency transactions.

UPDATES PROGRESS ON CRYPTO REGULATION:

The Indian government has reportedly provided an update on its progress toward the
country’s regulatory framework for cryptocurrencies. The government provided its latest
stance in areas such as the national cryptocurrency and licensing of crypto businesses. It is
pursuing crypto regulations “with due caution,” according to reports.

The Indian Ministry of Finance has reportedly answered some questions regarding
cryptocurrencies asked by Lok Sabha, the lower house of India’s bicameral parliament. A
document circulating on social media details five questions as well as their answers by Shri
Pon Radhakrishnan, Minister of State in the Ministry of Finance. According to the document,
the questions were to be answered on Dec. 28.

One of the questions concerns the composition of the panel established to draft crypto
regulations, its recommendations, and “the timeline for the expected release of the
regulation,” the document reads.

The minister explained that the government has constituted an inter-ministerial committee
“under the chairmanship of Secretary, Department of Economic Affairs, with representatives
from concerned departments to study all aspects of cryptocurrencies and crypto-assets
including bitcoin.” The committee includes representation from the Ministry of Electronics
and Information Technology, the Reserve Bank of India (RBI), the Securities and Exchange
Board of India, and the Central Board of Direct Taxes. The answer to this question reads:

This document surfaced after the media reported on the panel recommending a ban on crypto
transactions and another report claiming that there were recommendations
to legalize cryptocurrencies with strong riders. Both cited anonymous sources.
National Crypto and Licensing

In response to the question of legality, the


minister wrote, “The government has not recognised cryptocurrencies as legal tender. The
issue of permitting trading in cryptocurrencies is currently under examination by an inter-
ministerial committee.”

The government also denied keeping track of the value of cryptocurrencies traded by Indian
nationals within the country. Regarding licensing or authorizing any entities or businesses to
deal with bitcoin or other cryptocurrencies, the minister confirmed:

No decision on licensing and authorising any entity or company to operate such schemes or
deal with bitcoins or any virtual currency has been made as yet.

Lastly, the minister also revealed that the committee “is examining all issues, including the
pros and cons of the introduction of an official digital currency in India.”
INTELLACTUAL PROPERTY ISSUES:

India has witnessed a huge surge in the applications for intellectual property rights and their
subsequent approvals in the last five years. According to statistics from Department of
Industrial Policy and Promotion (DIPP), trademarks, copyrights and patent registrations have
seen growth of 236 per cent, 233 per cent and 41 per cent respectively since 2016.
Intellectual property (IP) refers to the intangible creation of human intellect in the form of
patent, trade mark, copyright, trade secret. Growth in intellectual property in a country is
indicative of technological progress and improved economic activity.

In the year 2017-18 (data available till 31st Dec 2017) applications for 35,511 patents, 8,521
designs, 1,95,705 trade marks and 18,584 copyrights were filed with the patent office out of
which 8,940 patents, 7,406 designs, 2,18,383 trademarks (includes previous year's pending
applications) and 15,017 copyrights were granted registration.

The Indian government under the Make in India initiative has recognized intellectual property
as one of the crucial factors in its vision for long-term development. The government is
providing incentives for startups in the form of concessions in the application fees up to 80
per cent, especially for small and medium enterprises (SMEs). Government has also provided
option of e-filing which saves the hassles of physically visiting the patent office to file an
application. Moreover the government is also offering a 10 per cent discount on e-filing of
patents. Since implementation of such measures, the number of applications for intellectual
property has risen drastically.

When used commercially, IP rights provide competitive advantage to its holder as it prevents
unauthorised usage. SMEs can safeguard their know-how from bigger players in the market
by registering their intellectual property.

IP rights would generate more profit for its holders in form of license fees, if such registered
intellectual rights are used by other businesses with the IP right holder's permission.
IP rights is a very important asset for startups in raising funding as startups can convince
sponsors about the viability of their business idea based on their patents and copyrights. It
helps startups highlight a competitive edge over the existing businesses.
SECURITY,PRIVACY AND DATA PROTECTION ISSUES:

Bitcoin is a popular cryptocurrency that records all transactions in a distributed append-only


public ledger called blockchain. The security of Bitcoin heavily relies on the
incentivecompatible proof-of-work (PoW) based distributed consensus protocol, which is run
by network nodes called miners. In exchange for the incentive, the miners are expected to
honestly maintain the blockchain. Since its launch in 2009, Bitcoin economy has grown at an
enormous rate, and it is now worth about 170 billions of dollars. This exponential growth in
the market value of Bitcoin motivates adversaries to exploit weaknesses for profit, and
researchers to discover new vulnerabilities in the system, propose countermeasures, and
predict upcoming trends.

B ITCOIN uses peer-to-peer (P2P) technology, and it operates without any trusted third party
authority that may appear as a bank, a Chartered Accountant (CA), a notary, or any other
centralized service [1]. In particular, an owner has full control over its bitcoins, and she could
spend them anytime and anywhere without involving any centralized authority. Bitcoin
design is open-source and nobody owns or control.Moreover, it is a cryptographically secure
electronic payment system, and it enables transactions involving virtual currency in the form
of digital tokens called Bitcoin coins (BTC or simply bitcoins)s it.

Since its deployment in 2009, Bitcoin has attracted a lots of attention from both academia and
industry. With a market capitalization of 170 billion and more than 375,000 aggregate
number of confirmed transactions per day (December 2017), Bitcoin is the most successful
cryptocurrency to date. Given the amount of money at stake, Bitcoin is an obvious target for
adversaries. Indeed, numerous attacks have been described targeting different aspects of the
system, including double spending [2], netsplit [3], transaction malleability [4], networking
attacks [5], or attacks targeting mining [6] [7] [8] and mining pools [9]. In [10], authors claim
that “Bitcoin works in practice and not in theory” due to the lack of security research to find
out theoretical foundation for Bitcoin protocols. Until today, the incomplete existence of a
robust theoretical base forces the security research community for dismissing the use of
bitcoins. Existing security solutions for Bitcoin lacks the required measures that could ensure
an adequate level of security for its users. We believe that security solutions should cover all
the major protocols running critical functions in Bitcoin, such as blockchain, consensus, key
management, and networking protocols. Although, the online communities have already
started to use bitcoins with the belief that Bitcoin will soon take over the online trading
business. For instance, “Wiki leaks” request its users to donate using the bitcoins. The request
quote is “Bitcoin is a secure and anonymous digital currency, bitcoins cannot be easily
tracked back to you, and are safer, and are the faster alternative to other donation methods”.
Wiki leaks also support the use of Litecoin, another cryptocurrency, for the same reason [11].
Recently, Bitcoin technology is grabbing lots of attention from government bodies due to its
increasing use by the malicious users to undermine legal controls. In [12], authors call
bitcoins “Enigmatic and Controversial Digital Cryptocurrency” due to mysterious concepts
underneath the Bitcoin system and severe opposition from the government. According to
[13], the current bitcoin exchange rate is approximately USD 13k (as of December 2017)
from around 1000 dollars at the start of 2016. The major technologies such as blockchain and
consensus protocols that makes the Bitcoin a huge success will now also being envisioned in
various next-generation applications, including smart trading in smart grids [14], Internet of
Things (IoT) [15] [16], vehicular networks [17], healthcare data management [18], and smart
cities [19], to name a few. As the length of popularity largely depends on the amount of
security built on the system which surpasses all its other benefits, we aim to investigate the
associated security and privacy issues in Bitcoin and its underlying techniques.

TRANSACTION AND PROOF OF WORK:

Bitcoin use transactions to move coins from one user wallet to another. In particular, the
coins are represented in the form of transactions, more specifically, a chain of transactions.
As depicted in Figure 1, the key fields in a transaction includes Bitcoin version, hash of the
transaction, Locktime1 , one or more inputs, and one or more outputs. Every input in a
transaction belongs to a particular user, and it consists of the following:

(i) hash pointer to a previous transaction which serves as the identifier of the transaction
that includes the output we now want to utilise as an input,
(ii) an index to specific unspent previous transaction output (UTXO) that we want to
spend in the current transaction
(iii) unlocking script (also referred to as scriptSig) which satisfies the conditions
associated with the use of UTXO. While a transaction output consists of the number
of bitcoins that are being transferred, locking script length, and locking script (also
referred to as scriptPubKey) which imposes a condition that must be met before the
UTXO can be spent. To authorize a transaction input, the corresponding user of the
input provides the public key and the cryptographic signature generated using her
private key. Multiple inputs are often listed in a transaction.
(iv) All of the transaction’s input values are added up, and the total (excluding
transaction fee, if any) is completely used by the outputs of the transaction. In
particular, when the output of a previous transaction is used as the input in a new
transaction, it must be spent in its entirety. Sometimes the coin value of the output is
higher than what the user wishes to pay. In this case, the sender generates a new
Bitcoin address, and sends the difference back to this address. For instance, Bob has
50 coins from one of its previous transaction’s output, and he wants to transfer 5
coins to Alice using that output as an input in a new transaction. For this purpose,
Bob has to create a new transaction with one input (i.e., output from its previous
transaction) and two or more outputs. In the outputs, one output will show that 5
coins are transferred to Alice, and other output(s) will show transfer of the remaining
coins to one (or more) wallet(s) owned by Bob. With this approach, the Bitcoin
achieves two 1 It indicates the earliest time or blockchain length when this
transaction may be spent to the blockchain. goals:

(v) it implements the idea of change, and


(vi) one can easily identify the unspent coins or balance of a user by only looking the
outputs from its previous transactions. An output in a transaction specifies the
number of coins being transferred along with the Bitcoin address of the new owner.
These inputs and outputs are managed using a Forth-like scripting language which
dictates the essential conditions to claim the coins. The dominant script in today’s
market is the “Pay-to-PubKeyHash” (P2PKH) which requires only one signature
from the owner to authorize a payment. While the other script is called “Payto-
ScriptHash” (P2SH) [22], which is typically used as multisignature addresses, but it
also enables a variety of transaction types and supports future developments.

Unlike central bank in which all the transactions are verified, processed, and recorded
in a centralized private ledger, in Bitcoin every user acts as a bank and keep a copy of
this ledger. In Bitcoin, the role of the distributed ledger is played by the so-called
blockchain. However, storing multiple copies of the blockchain in the network adds
new vulnerabilities in the system such as keeping the global view of the blockchain
consistent. For instance, a user (say Alice) could generate two different transactions
simultaneously using the same set of coins to two different receivers (say, Bob and
Carol). This type of malicious behavior by a user is termed as double spending. If
both the receiver processes the transaction independently based on their local view of
the blockchain, and the transaction verification is successful, this leaves the
blockchain into an inconsistent state.

The main requirements to avoid the above problem is two-folded:


(i) distribute the transaction verification process to ensure the correctness of the
transaction, and
(ii) everyone in the network should know quickly about a successfully
processed transaction to ensure the consistent state of the blockchain. To
fulfill the To fulfthe aforementioned requirements, Bitcoin uses the concept
of Proof-of-Work (PoW) and a probabilistic distributed consensus
protocol.aforementioned requirements, Bitcoin uses the concept of Proof-of-
Work (PoW) and a probabilistic distributed consensus protocol.

The distributed transaction verification process ensures that a majority of miners will
verify the legitimacy of a transaction before it is added in the blockchain. In this
way, whenever the blockchain goes into an inconsistent state, all the nodes update
their local copy of blockchain with the state on which a majority of miners agree, in
this way the correct state of the blockchain is obtained by election. However, this
scheme is vulnerable to the sybil attacks [23]. With sybil attack, a miner creates
multiple virtual nodes in the network and these nodes could disrupt the election
process by injecting false information in the network such as voting positive for a
faulty transaction.Bitcoin counters the sybil attacks by making use of PoW based
consensus model, in which to verify a transaction the miners have to perform some
sort of computational task to prove that they are not virtual entities.

The PoW consists of a complex cryptographic math puzzle, similar to Adam Back’s
Hashcash [24]. In particular, PoW involves scanning for a value (called nonce) that
when hashed, such as with SHA256, the resulting hash begins with a number of
zeros. The average work required is exponential to the number of zeros in the correct
hash however, the verification process consists of a single step, i.e., by executing a
single hash. In this way, PoW imposes a high level of computational cost on the
transaction verification process, and the verification will be dependent on the
computing power of a miner instead of the number of (possibly virtual) identities.
The main idea is that it is much harder to fake the computing resources than it is to
perform a sybil attack in the network.

In practice, the miners do not mine individual transactions instead, they collect pending
transactions to form a block. The miners mine a block by calculating the hash of that block
along with a varying nonce. The nonce is varied until the resultant hash value becomes lower
or equal to a given target value. The target is a 256-bit number that all miners share.
Calculating the desired hash value is computationally difficult. For hashing, Bitcoin uses
SHA-256 hash function [25]. Unless the cryptographic hash function finds the required hash
value, the only option is to try different nonces until a solution (a hash value lower than the
target) is discovered. Consequently, the difficulty of the puzzle depends on the target value,
i.e., lower the target, the fewer solutions exist, hence more difficult the hash calculation
becomes. Once a miner calculates the correct hash value for a block, it immediately broadcast
the block in the network along with the calculated hash value and nonce, and it alsoappends
the block in its private blockchain. The rest of the miners when receiving a mined block can
quickly verify its correctness by comparing the hash value given in the received block with
the target value. The miners will also update their local blockchain by adding the newly
mined block.

Once a block is successfully added in the blockchain (i.e., a majority of miners consider the
block valid), the miner who first solved the PoW will be rewarded (as of May 2017, 12.5
BTCs) with a set of newly generated coins. This reward halves every 210,000 blocks. In
particular, these mining rewards are not really received from anyone because there is no
central authority that would be able to do this. In Bitcoin, rewards are part of the block
generation process, in which a miner inserts a reward generating transaction (or a coinbase
transaction) for its own Bitcoin address, and it is always the first transaction appearing in
every block. If the mined block is validated and accepted by the peers, then this inserted
transaction becomes valid and the miner receives the rewarded bitcoins.

Apart from the mining reward, for every successful addition of a transaction in the
blockchain, the miner will also receive an amount called transaction fee, which is equivalent
to the amount remaining when the value of all outputs in a transaction is subtracted from all
its inputs [26]. As the mining reward keep on decreasing with time and the number of
transactions is rapidly increasing in the network, the transaction fee takes a major role for
how fast a transaction is to be included in the blockchain. The Bitcoin never mandates
transaction fee and it is only specified by the owner(s) of a transaction, and it is different for
each transaction. A transaction with low transaction fee could suffer from the starvation
problem, i.e., denied service for a long time, if the miners are busy processing the
transactions with a higher transaction fee.

All the miners race to calculate the correct hash value for a block by performing the PoW, so
that they can collect the corresponding reward. The chance of being the first to solve the
puzzle is higher for the miners who own or control more number of computing resources. By
this rule, a miner with higher computing resources can always increase her chances to win the
reward. To enforce reasonable waiting time for the block validation and generation, the target
value is adjusted after every 2,016 blocks. This adjustment of the target also helps in keeping
per block verification time to approximately 10 minutes. It further effects the new bitcoins
generation rate in the Bitcoin because keeping the block verification time near to 10 minutes
implies that only 12.5 new coins can be added in the network per 10 minutes. In [27], authors
propose an equation to calculate the new target value for the Bitcoin. The new target is given
by the following Equation.

T = Tprev ∗ Tactual 2016 ∗ 10min .


(1) Here, Tprev is the old target value, and Tactual is the time period that the
Bitcoin network took to generate the last 2,016 blocks.

Blockchain and Mining


The blockchain is a public append-only link-list based data structure which stores the entire
network’s transaction history in terms of blocks. In each block, the transactions are stored
using Merkle Tree [28], and a relatively secure time-stamp and a hash of the previous block
is also stored. Figure 2 shows the working methodology that is being in use for creating and
maintaining the Bitcoin’s blockchain. To successfully add a new block in the blockchain, the
miners need to verify (mine) a block by solving a computationally difficult PoW puzzle. One
can traverse the blockchain in order to determine the ownership of each bitcoin because the
blocks are stored in an ordered form. Also, tempering within a block is not possible as it
would change the hash of the block. In particular, if a transaction in a block is tampered with,
the hash value of that block changes, this, in turn, changes the subsequent blocks because
each block contains the hash of the previous block. The blockchain constantly grows in
length due to the continuous mining process in the network. The process of adding a new
block is as follows: (i) once a miner determines a valid hash value (i.e., a hash equal or lower
than target) for a block, it adds the block in her local blockchain and broadcast the solution,
and (ii) upon receiving a solution for a valid block, the miners will quickly check for its
validity, if the solution is correct the miners update their local copy of blockchain else discard
the block.
Due to the distributed nature of the block validation process, it is possible that two valid
solutions are found approximately at the same time or distribution of a verified block is
delayed due to network latency, this results in valid blockchain forks of equal length. The
forks are undesirable as the miners need to keep a global state of the blockchain, consisting of
the totally ordered set of transactions. However, when multiple forks exist, the miners are
free to choose a fork and continue to mine on top of it. Now that the network is having
multiple forks and miners are extending different but valid versions of the blockchain based
on their local view, a time will come due to the random nature of PoW where miners
operating on one fork will broadcast a valid block before the others. Due to this, a longer
version of the blockchain now exists in the network, and all the miners will start adding their
following blocks on top of this longer blockchain. The aforementioned behavior of
blockchain is shown in Figure 3.

The presence of blockchain forks in Bitcoin could be exploited by a malicious miner to gain
profits or to disturb the normal functioning of the Bitcoin. In particular, a resourceful miner
(or mining pool) could force a blockchain fork in the network by privately mining on it. Once
the malicious miner sees that the length of the public blockchain is catching up fast with her
private chain, the miner broadcast her blockchain in the network, and due to its longer length,
all the other miners will start mining on top of it. In this process, all the mined (i.e., valid)
blocks on the other parallel blockchain get discarded which makes the efforts of the genuine
miners useless. In Section III, we will discuss an array of attacks on Bitcoin that exploits the
forking nature of Bitcoin blockchain.

In general, the security in Bitcoin is on the assumption that the honest players control a
majority of the computing resources. The main driving factor for miners to honestly verify a
block is the reward (i.e., 12.5 BTCs) that they receive upon every successful block addition in
the blockchain. As mentioned before that to verify a block, the miners need to solve the
associated hard crypto-puzzle. The probability of solving the crypto-puzzle is proportional to
a number of computing resources used. As per [29], a single home miner which uses a
dedicated Application-Specific Integrated Fig. 4. Bitcoin transaction processing steps Circuit
(ASIC) for mining will unlikely verify a single block in years. For this reason, miners mine in
the form of the so-called mining pools. All miners that are associated with a pool works
collectively to mine a particular block under the control of a pool manager. Upon successful
mining, the manager distributes the reward among all the associated miners proportional to
the resources expended by each miner. A detailed discussion of different pooled mining
approaches and their reward systems is given in [30] [31].

For the better understanding how a transaction is being processed in the Bitcoin, please refer
to Figure 4. Assume that Bob wants to transfer 5 bitcoins to Alice. In order to pay to Alice,
Bob needs a device such as a smartphone, tablet, or laptop that runs the Bitcoin full or
lightweight clientside software, and two pieces of information which include Bob0 s private
key and Alice0 s Bitcoin address. Any user in the network can send money to a Bitcoin
address, but only a unique signature generated using the private key can release bitcoins from
the account. Bob uses a cryptographic key to digitally sign off on the transaction, proving that
he owns those coins. When Bob broadcast a transaction in the network, an alert is sent to all
the miners in the network informing them about this new transaction. The miners check that
the digital signatures are correct, and Bob has enough bitcoins to complete the transactions.
Additionally, miners race to bundle all the pending transactions (including bob0 s) in the
network and mine the resulting block by varying the nonce. In particular, the miners create a
hash of the block, and if the hash does not begin with a particular number of zeros, the hash
function is rerun using a new random number (i.e., the nonce). The required hash value must
have a certain but arbitrary number of zeros at the beginning. It is unpredictable which nonce
will generate the required hash with a correct number of zeros, so the miners have to keep
trying by using different nonces to find the desired hash value. When the miner finds a hash
value with the correct number of zeros (i.e., the discovered value is lower than target value),
the discovery is announced in the network, and both the Bob and the Alice will also receive a
confirmation about the successful transaction. Other miners communicate their acceptance,
and they turn their attention to discover the next block in the network. However, a successful
transaction could be discarded or deemed invalid at latter period of time, if it is unable to stay
in the blockchain due to reasons, such as existence of multiple forks, majority of miners does
not agree to consider the block containing this transaction as a valid block, a double spending
attack is detected, to name a few.

The Bitcoin protocol rewards the winning miner with the set of newly minted bitcoins as
incentive, and the hashed block is published in the public ledger. Once Bob0 s transaction has
been added in the blockchain, he and Alice each receive the first confirmation stating that the
Bitcoin has been signed over to Alice. In terms of transaction time, it depends on the current
network load and the transaction fee included in the transaction by Bob, but at the minimum,
it would be around 10 minutes. However, receiving the first confirmation does not mean that
the transaction is processed successfully, and it cannot be invalidated at a latter point in time.
In particular, it has been recommended by the Bitcoin community that after a block is mined
it should receive enough consecutive block confirmations (currently 6 confirmations) before
it is considered as a valid transaction.

Consensus Protocol
Bitcoin blockchain is a decentralized system, thus it does not require authorization from any
trusted third party (TTP) to process the transactions. In particular, the nodes communicate
over a network and collaboratively construct the blockchain without relying on a central
authority. However, individual nodes might crash, behave maliciously, act against the
common goal, or the network communication may become interrupted. For delivering a
continuous service, the nodes, therefore, run a fault-tolerant consensus protocol to ensure that
they all agree on the order in which entries are appended to the blockchain. To add a new
block in the blockchain, every miner must follow a set of rules specified in the consensus
protocol. Bitcoin achieves the distributed consensus by using PoW based consensus
algorithm. This algorithm imposes the following major rules: (i) input and output values are
rational, (ii) transactions only spend unspent outputs, (iii) all inputs being spent have valid
signatures, (iv) no coinbase2 transaction outputs were spent within 100 blocks of their
creation, and (v) no transactions spend inputs with a locktime before the block in which they
are confirmed. Generally, a blockchain based system such as Bitcoin is considered as secure
and robust as its consensus model.

In the PoW based consensus algorithm, the participants require no authentication to join the
network, which makes the Bitcoin consensus model extremely scalable in terms of supporting
thousands of network nodes. However, PoW based consensus is vulnerable to “51%” attacks,
in which an adversary has control over 51% of the mining power (i.e. hashrate) in the
network, hence it can write its own blocks or fork the blockchain that at a later point
converges with the main blockchain. This behavior of adversary helps her to perform several
other types of attacks in the Bitcoin, which includes double spending, eclipse, and denial-of-
service. In particular, 51% attack drives away the honest miners from the mining process,
thus weakens the consensus protocol which poses a threat to Bitcoin security and robustness.
One way to achieve the 51% attack in Bitcoin system is to incentivize (or bribe) the honest
miners to join the attackers’ coalition.

Along with the various security attacks (please refer to tables I and II), the effectiveness of a
consensus protocol also depends on the performance and stability of the network. For
instance, an increase in the latency between the validation of a block and its receipt by all
other miners increases the possibility of a temporary blockchain fork. Although, due to the
PoW model eventual consistency in the blockchain will be reached despite the temporary
forks however, it results in longer transaction confirmation times. Today the Bitcoin network
is restricted to a sustained rate of 7 transactions per section (tps) due to the Bitcoin protocol
restricting block sizes to 1MB. This is very slow when considered the high processing speed
of MasterCard or VISAs, i.e., millions of tps. Therefore, it is important for Bitcoin to have a
broadcast network which is not only decentralized but it also provides low latency, and it is
difficult to deliberately censor or delay messages. The PoW based consensus algorithm also
wastes a lot of energy in hash computations during the mining process. However, it facilitates
high scalability in terms of nodes participating in the network and operates completely in a
decentralized fashion.

Bitcoin consensus algorithm has been its most widely debated component in the Bitcoin
research community. This is because the consensus algorithm rises: (i) open questions about
the Bitcoin stability [10]; (ii) concerns about the performance and scalability of the protocol
[32]; and (iii) concerns for 2A coinbase transaction is a unique type of bitcoin transaction that
can only be created by a miner. computational resource wastage [33]. In particular, the PoW
consensus model used by Bitcoin blockchain is very inefficient in terms of power
consumption and the overall generation time of new blocks. Hence, to overcome or limit
some of the aforementioned disadvantages of PoW, various other consensus protocols such as
Proof-of-Stake (PoS) [34], Proof of Elapsed Time (PoET), Proof of Authority (PoA),
Practical byzantine fault tolerance (PBFT) [35], Federated Byzantine Fault Tolerance
(FBFT), Proof of Storage [36] [37], to name a few are designed. The most obvious difference
between these consensus protocols and PoW is that each of these alternative protocols the
consensus is driven at the expense of internal resources (e.g., coins or reputation) instead of
external resources (e.g., electricity). This creates an entirely different set of incentives for
(and trust in) network nodes (i.e., miners), which drastically changes the network security
model.

Networking Infrastructure
Bitcoin uses an unstructured peer-to-peer (P2P) network based on unencrypted persistent
TCP connections as its foundational communication structure. In general, unstructured
overlays are easily constructed and robust against highly dynamic network topologies, i.e.,
against frequently joining and leaving peers. These type of networks are best suited for
Bitcoin as the aim is to distribute information as fast as possible to reach consensus on the
blockchain. However, experimenting with the Bitcoin network/protocol poses a challenge. By
now, there are a few possibilities to approach this task. One way is to connect to the mainnet,
i.e., the live Bitcoin network, or the testnet. Another way is to use the simulation
environments such as Shadow [42] event discrete simulator, which aims at simulating large-
scale Bitcoin networks, while keeping full control over all components.

Bitcoin nodes maintain a list of IP addresses of potential peers, and the list is bootstrapped
via a DNS server, and additional addresses are exchanged between peers. Each peer aims to
maintain a minimum of 8 unencrypted TCP connections in the overlay, i.e, the peer actively
tries to establish additional connections if the current number of connections is lower than 8.
The number of eight connections can be significantly exceeded if incoming connections are
accepted by a Bitcoin peer upto a maximum of 125 connections at a time. By default, peers
listen on port 8333 for inbound connections.

When peers establish a new connection, they perform an application layer handshake,
consisting of version and verack messages. The messages include a timestamp for time
synchronization, IP addresses, and the protocol version. A node selects its peers in a random
fashion and it selects a new set of peers after a fixed amount of time. This is done to
minimize the possibility and effects of netsplit attack, in which an attacker creates an
inconsistent view of the network (and the blockchain) at the attacked node. Since Bitcoin
version 0.7, IPv6 is supported. In order to detect when peers have left, Bitcoin uses a softstate
approach. If 30 minutes have been passed since messages were last exchanged between
neighbors, peers will transmit a hello message to keep the connection alive. Miners
continually listen to new block announcements which are sent via INV messages containing
the hash of the mined block. If a miner discovers that it does not hold a newly announced
block, it transmits a GET DAT A message to one of its neighbor. The neighbor then respond
by sending the requested information in a BLOCK message. In case the requested block do
not arrive within 20 minutes, the miner trigger the disconnection of that particular neighbor
and request the same information from another neighbor. The propagation of transactions
occur in a sequence given as INV , GET DAT A, and T X messages, in which nodes
announce, request, and share transactions that have not yet been included in the blockchain.

In order to form the distributed consensus, newly discovered transactions and blocks are
propagated (through flooding) in the whole network. Miners store new transactions for the
mining purposes, but after some time remove them if they do not make it on the blockchain.
It is the responsibility of the transaction originator that the transaction is received by all the
peers in the network. To this end, the originator might need to rebroadcast the transaction if it
did not get into the blockchain in first attempt. This is to ensure that the transaction gets
considered in the next block. An adversary could introduce delay in the propagation of both,
new transactions and mined block, for the purpose of launching the double spend and netsplit
attacks. As shown in [43], the propagation time can even be further extended under
reasonable circumstances. Authors in [5] presents a taxonomy of routing attacks and their
impact on Bitcoin, considering both small-scale attacks, targeting individual nodes, and large-
scale attacks, targeting the network as a whole. By isolating parts of the network or delaying
block propagation, adversaries could cause significant amount of mining power to be wasted,
leading to revenue losses and exposing the network to a wide range of exploits such as double
spending. The use of an unstructured P2P network in Bitcoin enables the required rapid
distribution of information in every part of the network.

The security of Bitcoin heavily depends on the global consistent state of blockchain which
relies on the efficiency of its PoW based consensus protocol. The variations in the
propagation mechanisms could adversely affect the consensus protocol. The presence of
inconsistent blockchain states, if exploited correctly could lead to a successful double
spending. To this end, it is essential that the Bitcoin network should remains scalable in terms
of network bandwidth, network size, and storage requirements because this will facilitate the
increase in number of honest miners in the network, which will strengthen the consensus
protocol. In Bitcoin, full nodes download and verify all blocks starting from the genesis block
because it is the most secure way. Full nodes participate in the P2P network and help to
propagate information, although its not mandatory to do so. Alternatively, the thin clients use
the simplified payment verification (SPV) to perform Bitcoin transactions. The SPV is a
method used by Bitcoin thin client for verifying if particular transactions are included in a
block without downloading the entire block. However, the use of SPV costs the thin clients
because it introduces weaknesses such as Denial of Service (DoS) and privacy leakage for the
thin client. In particular, the general scalability issues of unstructured overlays combined with
the issues induced by the Bitcoin protocol itself remains in the system. Many of the results
suggest that scalability remains an open problem [44] and it is hard to keep the fully
decentralized network in future

Securing Bitcoin wallet


A wallet contains private keys, one for each account [104]. These private keys are encrypted
using the master key which is a random key, and it is encrypted using AES-256-CBC with a
key derived from a passphrase using SHA-512 and OpenSSLs EVP BytesToKey [117].
Private key combined with the public key generates a digital signature which is used to
transact from peer-to-peer. Bitcoin uses ECDSA (Elliptic Curve Digital Signature Algorithm)
algorithm for encryption, and it is modified in [101] for secret sharing and threshold
cryptography.

Securing Bitcoin Networks


In this section, we will discuss various existing countermeasures proposed for securing the
Bitcoin’s core protocols and its peer-to-peer networking infrastructure functionalities
6TrustZone is a technology that is used as an extension of processors and system
architectures to increase their security. against an array of security threats some of which we
have discussed in Section III-D. 1) DDoS Attacks: In [90], authors propose a game theoretic
approach for analyzing the DDoS attacks. The game assumes that the pools are in
competition with each other because the larger pools are always weighted more than the
smaller pools. The game exists between the pools, and each pool tries to increase their
computational cost over others, and then it imposes a DDoS attack on the other pools. In this
way, authors draw an equilibrium condition between the players and concludes that the larger
pools will have more incentives against the smaller pools. In [9], authors propose a “miner’s
dilemma”, again a game theoretical approach to model the behavior of miners similar to
repetitive prisoner’s dilemma. There exist a game between the pools. The longest chain
dominates over the smaller chains and grabs the rewards by behaving selfishly in the
network. Game theory concludes that by performing attacks, the pools actually lose the
bitcoins that they are supposed to get when compared it with the case without attacking each
other. In particular, this kind of game theory problems is called “Tragedy of Commons”,
where the peers turn out to be rational, selfish and harm other peers for their benefits.
PRIVACY AND ANONYMITY IN BITCOIN
The traditional banking system achieves a level of privacy by limiting access to transactions
information to the entities involved and the trusted third party. While in Bitcoin, the public
blockchain reveals all the transaction data to any user connected to the network. However, the
privacy can still be maintained upto certain level by breaking the flow of information
somewhere in the Bitcoin transaction processing chain. Bitcoin achieves it by keeping public
keys anonymous, i.e., the public can see that someone is sending an amount to someone else,
but without information linking the transaction to anyone. To further enhance the user
privacy, it is advised to use a new key pair for each transaction to keep them from being
linked to a particular user. However, linking is still possible in multi-input transactions,
which necessarily reveal that their inputs were owned by the same owner. Also, if the owner
of a key is revealed, there is a risk that linking could reveal other transactions belonging to
the same user. In particular, Bitcoin offers a partial unlinkability (i.e., pseudonymity), and
thus it is possible to link a number of transactions to an individual user by tracing the flow of
money through a robust blockchain analysis procedure. Bitcoin technology upholds itself
when it comes to the privacy, but the only privacy that exists in Bitcoin comes from
pseudonymous addresses (public keys or their hashes) which are fragile and easily
compromised through different techniques such as Bitcoin address reuse, “taint” analysis and
tracking payments via blockchain analysis methods, IP address monitoring nodes, web-
spidering, to name a few. Once broken, this privacy is difficult and sometimes costly to
recover. In [93] authors highlight the fact that the Bitcoin does not have any directory to
maintain the log and other transaction-related information. However, an adversary can
associate the offline data such as emails and shipping addresses with the online information,
and it can get the private information about the peers. In this section, we discuss the various
security threats to privacy and anonymity of the Bitcoin users and the corresponding state-of-
the-art solutions that are proposed to enhance the same.

THE RISKS AND VULNERABILITY IN BITCOIN TRANSACTION:


High energy consumption: Bitcoin’s blockchain uses PoW model to achieve distributed
consensus in the network. Although, the use of PoW makes the mining process more
resistant to various security threats such as sybil and double spending, it consumes a
ridiculous amount of energy and computing resources [47]. In particular, processing a
bitcoin transaction consumes more than 5000 times as much energy as using a Visa credit
card, hence innovative technologies that reduce this energy consumption are required to
ensure a sustainable future for Bitcoin. Furthermore, due to the continuous increase in
network load and energy consumption, the time required for transaction processing is
increasing.

• Wallets can be lost: Since there is no trusted third party if a uses lost the private key
associated with her wallet due to a hard drive crash or a virus corrupts data or lost the device
carrying the key, all the bitcoins in the wallet has been considered lost for forever. There is
nothing that can be done to recover the bitcoins, and these will be forever orphaned in the
system. This can bankrupt a wealthy Bitcoin investor within seconds.
• (Facilitate) Criminal activity: The considerable amount of anonymity provided by the
Bitcoin system helps the would-be cyber criminals to perform various illicit activities such
as ransomware [48], tax evasion, underground market, and money laundering.

the risk is the exposure to the level of danger associated with Bitcoin technology; in fact, the
same can be applied to any such digital cryptocurrency. The major risks that threaten the
wide usability of the Bitcoin payment systems are as follow.

• Social risks: it includes bubble formation (i.e., risk of socio-economic relationship such as
what people talk and gossip), cool factor (i.e., entering the networking without knowing the
ill effects), construction of chain (i.e., risk related with the blockchain formation like
hashing and mining rewards), and new coins release (i.e., on what basis the new coins to be
generated, is there a need etc.).

• Legal risks: Bitcoin technology opposes rules and regulations, and hence it finds
opposition from the government. This risk also includes law enforcement towards handling
financial, operational, customer protection and security breaches that arise due to Bitcoin
system.

• Economic risks: deflation, volatility and timing issues in finding a block which might lead
the users to migrate towards other currencies that offer faster services.

• Technological risks: this includes the following, network equipment, and its loss, network
with which the peers are connected and its associated parameters, threat vulnerabilities on
the system, hash functions with its associated robustness factor, and software associated
risks that Bitcoin system demands.

BITCOIN RELATED BUSSINESS IN INDIA:

An Indian minister has reportedly revealed that a state government is working to protect
businesses operating without a regulatory framework in India. They include cryptocurrency
exchanges and crypto-accepting merchants. The move follows the arrests of the founders of
a crypto exchange after they tried to set up an ATM-like kiosk at a local mall.

India’s Social Welfare Minister Priyank Kharge has reportedly revealed that the Karnataka
state government “is working on setting up an Innovation Authority” with the aim “to protect
consumer-friendly technology businesses that are operating in regulatory grey areas,” the
Economic Times reported.

“Technologies are fast changing and our policies are only trying to catch up,” he told the
news outlet on Monday. “Instead of banning a people-friendly business on the grounds that
the regulations do not allow it, the Innovation Authority would intervene to come up with a
quick policy framework.” The minister elaborated:
For example, bitcoins are traded in restaurants in Bengaluru, and we will need to interact with
the government and get a regulatory clarity instead of banning those technologies for which
regulations are not yet in place.

Confusion Over Unocoin’s Kiosk


Cementing his point about the need for innovation-friendly policies, Kharge referred to the
recent arrests of Unocoin founders, the publication conveyed.

Unocoin, one of India’s largest cryptocurrency


exchanges, is based in Bengaluru, the capital of Karnataka. Following the crypto banking ban
by the country’s central bank, the Reserve Bank of India (RBI), the company placed a
machine in a local mall in October to handle fiat deposits and withdrawals for its customers.
This machine was originally marketed as a Unocoin ATM but the company soon rebranded it
to a kiosk.

The Bengaluru cyber crime department soon


seized the machine and arrested the company’s founders, CFO Harish BV and CEO Sathvik
Vishwanath. “The detaining was on the accusation that we as a company were not having
necessary approvals to set up an ATM,” Unocoin explained in a statement on Tuesday.

According to the exchange, the police took the stance of “The ATM kiosk installed by
Unocoin at Kemp Fort Mall has not taken any permission from the state government and is
dealing in cryptoasset outside the remit of the law.” The company argued:

Since this is a private kiosk, there isn’t any need for procuring any license or an approval of
any sort from authorities. Kiosk machines of Unocoin do not fit RBI’s definition of ATM
which connects to the banking network.
Police Questioned Legality of Cryptocurrency

Unocoin clarified that “The situation finally


came under control once the police authorities understood our initiative in its original intent.”
The exchange added that the authorities were also “made aware that we haven’t violated any
law in setting up the kiosk and thereby the whole fiasco came to a speedy conclusion albeit
some formal legal proceedings.”

Regarding the kiosk, Vishwanath told news.Bitcoin.com that so far the police “have
understood” that it is not an ATM. However, he noted:

Because they have started a legal proceeding, it will take its own sweet time and course
before the issue gets cleared.

Prior to his arrest, the Times of India quoted Vishwanath explaining that cryptocurrency is
not illegal in India. He emphasized that the statement by the country’s finance minister “was
clear: cryptocurrencies are not legal tender in India. He did not say that they are not legal in
India. There’s a huge difference.”

Their [police’s] main concern is around the legality of crypto assets itself, and it is difficult to
make the police understand the regulatory stance of our country as the topic is quite new to

them .
CONCLUSIONS AND RECCOMENDATIONS
CONCLUSIONS:

 Bitcoin has already evinced a popular digital currency in the market. However, the
fame of Bitcoin has attracted antagonists to use Bitcoin network for their selfish
motives and benefits. Today we have approximately 1146 different cryptocurrencies in
action, out of which many are a recent introduction to the market. From all these fiat-
currencies, the outstanding popularity and high market capital of bitcoins make it
attractive for adversaries to launch various security threats.

 Even though the construction of the Bitcoin protocols with proof-of-work and
consensus to protect the user actions are the robust features in Bitcoin, these itself
becoming a point of manipulation for cyber thieves. Starting from packet sniffing to the
double spending, the Bitcoin is dreaded with various attacks. Though literature
provides solutions against few of these attacks, the robust and effective security
solutions that can ensure proper functioning of Bitcoin in the future are still absent.

 Together with security, the distributed nature of Bitcoin blockchain has lead glitches in
the privacy and anonymity requirements of the users. the security and privacy issues in
different fields of Bitcoin. Once presenting the major components of Bitcoin, its basic
characteristics and related concepts, in brief, our survey mainly focuses on the security
and privacy aspects that can be found at various stages in the Bitcoin system, starting
from transaction creation to its successful addition in the blockchain. We studied and
emphasize the issue of user privacy and anonymity in this rapidly growing e-commerce
industry. With the set of future research directions and open questions that we have
raised, we hope that our work will motivate fledgling researchers towards tackling the
security and privacy issues of Bitcoin systems.
RECCOMENDATIONS

 Ending the speculation on virtual currencies such as cryptocurrencies and


bitcoins, a government panel should suggest that the government should
consider framing a new law for regulating that space.

 Several announcements by the Indian government have been mistaken by some


as cryptocurrencies being banned or made illegal. For example, in his February
budget speech, the finance minister said that the Indian government does not
consider cryptocurrencies legal tender. Some media outlets subsequently
misinterpreted his words as meaning cryptocurrencies are illegal.
BIBLIOGRAPHY
BIBLIOGRAPHY:
Bibliography is defined as a list of the books and articles that has been used by someone
when writing a book or articles.

Web-sites:

 https://bitcoin.org/bitcoin.pdf

 https://www.ccn.com/bitcoin-is-cheap-until-april-well-never-see-
price-at-3000-again-trader

 https://shop.wikileaks.org/donate

You might also like