Image by Gerd Altmann from Pixabay
The first time I heard about Bitcoin was in the summer of 2018 during a casual conversation with a Russian professor of economics. The price action was around $8k per coin.
At that time, I was unemployed, looking for a job, and wanted to help my parents and one of their friends improve their financial situation while I improved mine. My parents’ friend was an 80-year-old guy with his life savings and investments in one of the region’s top banks that managed two of his portfolios.
He managed to save and invest since 1955. Still, for some inexplicable reason, his wealth was approximately €350k, which is incredibly low for living in one of the top 5 countries of the European Union and having the most minimalistic lifestyle I have ever seen.
So how did decades of traditional saving lead to €350k? Did Bitcoin change his life?
This story will walk you through the complexity of Bitcoin as a technology (network) and financial asset (coin) using conversational language, comparisons, and examples to explain topics that several professionals with master’s or Ph.D. degrees in Economics, Finance, or Computer Science don’t understand or aren’t interested in understanding.
This isn’t another crypto success story. It’s a critical examination of what happens when traditional finance meets digital disruption. Sometimes, the most important lessons come from questioning both sides of the equation.
Is Bitcoin worth it? Is it safe? How could an asset grow by more than 10k times in less than 10 years? If it’s too good to be true, it should be a Ponzi or a scam, right?
Image of Warren Buffet’s declaration about Bitcoin. Image source generated by Elon Musk Loops channel on YouTube.
Bitcoin is more of a technology than a financial asset, but at some point, both concepts merged since they became interdependent to cover the network’s sustainability.
First, let’s explore the complexity of the Bitcoin network, its characteristics, components, and flaws to know how “safe” it is as an infrastructure.
The network is where everything starts and could potentially end. According to Satoshi Nakamoto’s white paper, Bitcoin was created as a purely peer-to-peer version of electronic cash and a solution to double-spending. A system that would allow payments without relying 100% on a third party which for marketers means decentralization even if this word isn’t mentioned in the Bitcoin white paper.
The double-spending dilemma could also exist in banking or other types of centralized systems but in this environment, it is easily “solved” by implementing TTP (Trusted Third Party) models which are used by entities that facilitate interactions between two parties. The problem here is that these parties have to be fully trusted to act on behalf of their client’s interests. The concept of trust here also means there is no way to verify if the system is operating in your interests, hence the need to trust it.
When you use the traditional banking system to send money or make a payment, you’re not actually doing it yourself; instead, you’re giving an order to your bank to handle it for you. They maintain the ledger and check that you have enough funds to complete the transaction. The issue here is that you depend entirely on them to fulfill this task, which operates within a system that lacks transparency and has a central point of failure susceptible to hacking, corruption, or mismanagement.
Collage of some banking hacks news publicly disclosed.
You should know that banks aren’t obligated to disclose hacks publicly. Therefore, while major bank hacks do occur, the specifics are often kept confidential. News reports may emerge about a bank experiencing “IT issues” or “service disruptions,” which could be a sign of a cyberattack, but the bank may not confirm the details except for communicating the news to people directly impacted or when the hack is too big to be hidden. Hacks in traditional banking are more common than you think and, in some cases, clients aren’t protected by law.
The problem here is so big that it is expected that by 2025 cybercrime could cost $10.5 trillion. Cyberattacks are particularly devastating because, according to IBM, it takes on average 212 days to detect a breach and 75 extra days to contain it. This means hackers count for approximately more than 9 months to infect computers, servers, and networks.
The financial sector is the second preferred target of hacks after the healthcare industry.
Here are some cybercrime numbers:
This unveils a silent security problem that is hidden by banks and legacy media and taken in most cases as if it isn’t something serious due to the lack of transparency to report the crime to clients.
The initial goal of the Bitcoin network creation was to solve the double-spending problem under a PoW (Proof-of-Work) mechanism and without relying on a third party as in the case of banks or any centralized authority. Double-spending happens when someone tries to spend the same digital asset more than once. In a decentralized blockchain like the Bitcoin network, a series of participants are involved during a transaction to prevent this type of fraud.
Bitcoin prevents double-spending by combining:
Participants That Prevent A Double-Spending Hack.
Despite the blockchain consensus mechanism to guarantee network security, every blockchain faces vulnerability attacks. These attack strategies come in different forms. The most popular and severe is the 51% attack.
A 51% attack occurs when a single entity or group gains control of more than 50% of a blockchain network’s mining or computational power. This majority control allows the attacker to disrupt the network’s operations and manipulate the blockchain ledger.
Gaining Majority Control: In Proof-of-Work (PoW) blockchain networks, miners compete to solve complex mathematical puzzles to validate transactions and add new blocks to the blockchain. If an individual or group manages to control over 50% of the network’s total computational power (hash rate), they can dominate this process.
In August 2020, the Ethereum Classic blockchain experienced multiple 51% attacks. They occurred due to the low network hash rate, the viable economic costs, the poor mining pool distribution, and the scarce number of members in the dev community. However, they solved the issue approximately 48 hours later and proposed changes to their initial POW mechanism to reduce the possibilities of new attacks.
Even if a 51% attack didn’t end with the Ethereum Classic network, it immediately damaged trust in the network which was reflected in the dev community’s growth in the long term.
Ethereum Classic Price Chart (August 2020). Source: coingecko.com
We must analyze both networks’ (Bitcoin and Ethereum Classic) hash rates, economic incentives, and developers’ numbers to estimate the chances of a potential attack.
A) Hash Rate Comparison (Network Security)
The higher the hash rate is, the more decentralized the network becomes due to better-distributed mining power among miners or mining pools which is reflected in energy consumption.
Bitcoin (BTC)
Ethereum Classic (ETC)
Current Hash Rate Comparison BTC vs ETC Blockchain.
This indicates that Bitcoin’s hash rate is about 3M times greater than that of Ethereum Classic.
Comparison with Banking Systems and Countries
This means that if a group or entity wants to attack the Bitcoin network, they will have to invest as much as the annual energy consumption of Poland, which is considered a mid-sized energy consumer globally.
This security comes at a cost – both financial and environmental. Is this trade-off worth it for the average investor?
High energy costs could be seen as something positive and negative at the same time. It will depend on who you ask.
According to Vitalik Buterin, Ethereum Co-founder, “Bitcoin’s security model is revolutionary, but its energy consumption is a legitimate concern.” On the other side, Michael Saylor, MicroStrategy CEO, thinks “The cost of securing the network is justified by the value it protects.”
Bitcoin Network Security takeaway
According to some analysts and some of the most popular criticism, Bitcoin mining could be considered a form of centralization due to its difficulty and cost. However, Bitcoin mining companies are derivating part of their revenue in R&D to make mining activity more cost-efficient. This enables them to find cheaper energy sources and at the same time set partnerships with communities around the globe.
These are some examples:
Last year, I wrote an article that was a review of a YouTube video where I debunked James Jani’s point of view about Bitcoin. To explain the decentralized nature of the Bitcoin network I explained how mining activity is becoming more decentralized and sustainable thanks to the Bitcoin Mining Council (BMC), mining companies, and countries like Paraguay which are working together to make mining more sustainable even if they are still facing some environmental and social issues.
Additionally, Bitcoin mining companies are currently exploring operations on AI activities which sets a positive challenge to the industry since they are diversifying energy usage. This may lower their participation in the hash rate growth reducing competitive pressure on the Bitcoin network but at the same time giving opportunities to new companies to participate in Bitcoin mining activities.
B) Economic Incentives and Attack Feasibility
The cost of controlling 51% mining power becomes more expensive.
Estimated 51% Attack Cost for 1 Hour (in Blockchain Networks)
Current Attack Cost Comparison BTC vs ETC Blockchain.
As I mentioned before, the 51% attack in the Ethereum Classic network was solved in approximately 48 hours which is a fast reaction time if we compare it to the banking system that typically needs several months to solve the hack.
In 2016, the Central Bank of Bangladesh was targeted to exploit vulnerabilities in the SWIFT payment system. The attackers attempted to fraudulently transfer nearly $1 billion from the bank’s account at the Federal Reserve Bank of New York. While most transactions were blocked, approximately $101 million was successfully transferred, with about $63-$81 million remaining unrecovered (direct losses).
The hackers’ investment to attack the Central Bank of Bangladesh oscillated around $50k. However, it took the Central Bank of Bangladesh 48 hours to detect the attack, meaning the attackers had spent around $1k per hour to execute the hack.
Costs and rewards of hacking different systems.
Central Bank of Bangladesh (2016 SWIFT attack) estimated hack investment
This is an estimation since the Central Bank of Bangladesh never disclosed the potential investment attackers could have made to hack the system. The hack cost estimation includes exploitation of SWIFT System vulnerabilities, phishing or social engineering tactics, insider collaboration (if any), and infrastructure and operational costs.
C) Developers
When an attack happens they are in partial charge of the system defense since they should build security measures to stop the attack using technical and hardware resources to defend the network.
Bitcoin (BTC)
Ethereum Classic (ETC)
Current Number of Developers Working In Both Networks.
The 51% attack isn’t the only potential vulnerability the Bitcoin network has. There are other types of minor attacks the network has gone through or could potentially experience.
Attack Type | Cost Resources Needed | Ease Of Execution | Potential Damage |
---|---|---|---|
51% Attack | Extremely high hash rate, very expensive | Low | Severe (double spending, reorgs) |
Transaction Malleability | Exploits software vulnerabilities, low cost | Moderate | Exchange-level disruptions |
Routing Attack | Exploits internet routing vulnerabilities, low cost | Moderate | Delays, possible network partitions |
Sybil Attack | Many nodes, moderate costs | Moderate | Node-level disruptions |
Timejacking | Low resources, mitigated in Bitcoin Core | Low | Transaction delays |
Eclipse Attack | Many nodes, moderate costs | Moderate | Node isolation, transaction issues |
Dusting Attack | Very low cost | High | Privacy breaches |
Miner Attacks | A high hash rate required | Low | Forks, delays, or inefficiency |
Cryptographic Exploit | Immense computational power (e.g., quantum) | Low | Severe, network-wide compromise |
Fee Sniping | Moderate hash rate | Low | Transaction delays |
Wallet Exploits | Software bugs or social engineering, low cost | High | Loss of funds |
This time we aren’t going through the specifics of each vulnerability because this section of the article is a technical overview that aims to help you understand Bitcoin from a technological perspective and measure the potential risks of Bitcoin as an investment.
However, it was important to examine the 51% attack since it is the most severe and real example of an attack registered until today.
The other hypothetical big threat to any blockchain network and cryptographic system is quantum computing. However, according to Vitalik Buterin, quantum computing cannot break all forms of cryptographic algorithms. He has added that developers have been working on unbreakable cryptographic algorithm replacements for those that quantum computing can break.
The topic has been studied by different groups like QBT, IDQ, BTQ, and others committed to quantum blockchain technologies. Bitcoin Optech, a non-profit research company that aims to help Bitcoin-based businesses, has published some research articles on the topic since 2018.
While we’ve explored Bitcoin’s technological foundation and security mechanisms in detail, this is only half the story. The network’s non-perfect but robust architecture laid the groundwork for Bitcoin’s emergence as a unique financial asset – one that would challenge traditional investment paradigms and catch the attention of both institutional and retail investors worldwide as it did with me and my friend who struggled to understand it but highlighted its transparency and resilience in comparison to the one of the banking system.
We’ve dissected Bitcoin’s technological foundation but it is still too soon to know if a robust technology automatically makes for a good investment.
In Part 2, we’ll confront the uncomfortable truths about Bitcoin as an investment:
Stay tuned as we challenge both the critics and supporters of Bitcoin investment. After all, sometimes the most valuable insights come from questioning our own assumptions.
This article was originally published by Rey C on HackerNoon.
The Tech Panda takes a look at recent funding events in the tech ecosystem, seeking…
Open source software is everywhere—used in almost every modern application—but the security challenges it faces…
Argentine President Javier Milei is facing impeachment after the cryptocurrency he endorsed called $LIBRA crashed…
India is targeting US$500 B in electronics production by 2030. Last year July, Niti Aayog…
The IMF predicts that more Indians will use AI every day than in any other…
The rapid digital transformation of businesses has led to an ongoing debate about the security…