Story image

Bitcoin’s not a fad, it’s a waiting game

16 Mar 2018

Article by digital transformation agency Kablamo founder and CEO Allan Waddell

For all of its naysayers, the world’s first functioning virtual currency, the Bitcoin, has done amazingly well.

But its accomplishments are completely unrelated to its price. Nine years ago, Bitcoin’s blockchain system launched, the equivalent of sending a pilotless financial warship into a sea of hackers.

Blockchain is the technology that mathematically verifies that a bitcoin, which is just a secret number that can’t be merely copied and then spent twice.

Blockchain was a stroke of distributed computing genius: it incentivised people to join a network, bolstering its security, without ever needing to verify those people’s real-life identification.

It was the trustless, decentralised database that computer scientists had theorised about for decades. Bitcoin has spawned at least 2,000 other projects with tokens that use blockchain-like systems to secure transactions or record information.

Most are bootstrapped and have little likelihood of surviving.

Keeping expectations realistic

Bitcoin’s wild price swings since it hit new highs in December brought out the usual tired tropes predicting its demise: it’s a Ponzi scheme, Bitcoins are Dutch tulips and aren’t supported by anything other than faith.  Not so fast. 

Sure, virtual currencies have a lot of problems.

First, it’d be foolish to ever expect one to displace fiat currency.

Also, the fraudulent activities and scams centred around virtual currencies are astonishing.

Launching ICOs – or initial coin offerings – as a means of startup funding is innovative, but regulators justifiably worry investors may be defrauded. Additionally, it’s literally insane to keep a large amount of virtual currency on a computer given the poor state of information security.

The tools for managing, storing and then actually using virtual currency to buy goods are convoluted, insecure and difficult to use, even for a well-versed technologist.

Ironically, the safest way to store virtual currency is on 'paper' wallets, where the codes to unlock and spend it are printed or written on paper.

Technology still hasn’t come up with a safer way to store it other than slipping that paper under a mattress. But these problems will be solved or at least mitigated over time, and virtual currencies and blockchains will become a pervasive feature of our technological landscape.  

Laying the foundation for the next technological leap

The internet in 1990 was largely made of command-line interfaces to applications.

The creation of HTML and the advent of the Netscape browser made the internet friendlier and easy to navigate.

The piping of the internet, composed of dozens of protocols that date two decades or more, have held relatively strong with periodic modification and improvements.

With blockchain, the foundation is just being laid in the ground. Virtual currency now is in 1990.

Think of Bitcoin as a proof-of-concept.

It’s an early beta, which is startling considering the hype and media coverage.

Compared to the transactions speeds of Visa or MasterCard, it’s a turtle.

Security-wise, banks are far better at defending deposits with the added assurance of compensating consumer losses if it goes wrong.

That doesn’t apply to marketplaces that sell Bitcoin, or to Microsoft or Apple if a vulnerability in their operating system eventually leads to a cryptocurrency theft. The market price of Bitcoin is a red herring.

The key is blockchain.

The best minds in computer security have pored over the code for vulnerabilities and not come up with much.

It may be risky to store virtual currency on a personal computer, but the transactional system is, for the most part, solid if finicky to maintain.

Data entered into a blockchain is essentially (with the exception of the so-called 51 percent attack) immutable.

And that is opening up intriguing possibilities for other applications.

Looking ahead

Try this: taking advantage of underutilised storage on computers across the internet with agreements brokered via smart contracts embedded in a blockchain.

How about doing away with username and passwords, and instead embedding encrypted identification information in a blockchain so service providers never need to collect personal data but are confident that what is on the blockchain is true?

Or how about using blockchain to store shipping information, reducing the manual verification and red tape involved when moving goods from Cape Town to London?

What if the price of Bitcoin falls to zero tomorrow?

It would invariably affect investors’ enthusiasm for ICOs.

And it’s naïve to say that even those projects whose prime focus is solving a problem unrelated to financial transactions don’t hope their bitcoin-like token doesn’t go “to the moon,” a humorous social media meme describing an extraordinary value appreciation.

But the ideas around blockchain will hang around, waiting for others to improve. So before predicting the death of bitcoin, virtual currencies or blockchains, let’s at least wait until 1995.

Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.
One Identity named Leader in PAM and IAM by KuppingerCole
KuppingerCole lead analyst Anmol Singh evaluated the strengths and weaknesses of 20 solution providers in the PAM market for the report.
Healthcare environments difficult to secure - Forescout
The convergence of IT, Internet of Things (IoT) and operational technology (OT) makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks.
Bitglass appoints new cloud, business development leaders
The cloud security company has appointed vice presidents for worldwide channels and worldwide business development.