Cryptocurrencies, especially Bitcoin, have been a hot topic in recent months. While Bitcoin is standing out as perhaps the most successful cryptocurrency, 出现了广泛的安全问题, as the currency can be vulnerable amid transactions or potentially attacked within its online storage pools and exchanges. 事实上, recent discoveries have indicated that Bitcoin is not fully secure against attackers who are attempting to steal from the “honest” Bitcoin participants (known as “miners”), sparking major research on the topic of cryptocurrency security.

以下是比特币的基本概述, cryptocurrencies, and what to know about the growing security concerns surrounding this new cultural wave.

什么是比特币和加密货币?

Bitcoin is viewed as the first successful employment of cryptocurrency, which relies on cryptography to produce “currency” and authenticate related transactions. While there were several attempts as far back as the 1990s to create forms of digital money, the concepts of Bitcoin were first introduced in early 2009 by a researcher using the pseudonymous name, “Satoshi Nakamoto.他声称自己从未想过要发明货币, Nakamoto said he created a “Peer-to-Peer Electronic Cash 系统,“ with the main purpose of inventing what several others failed to create before digital cash. Perhaps the most important part of Nakamoto’s invention was that he discovered how to build a decentralized digital cash system, which goes against the standard system of a centralized server keeping record of the balances to prevent double-spending.

采矿是如何工作的?

由全球货币使用者控制, cryptocurrencies-namely, Bitcoins—require confirmation from miners before being sealed/confirmed. If a transaction is unconfirmed, it is considered “pending” and can be counterfeit. 一旦确认, 比特币不能再被伪造或伪造了, making it part of an unchangeable record of proven transactions in what’s known as a blockchain. (More discussion on blockchain’s relevance to cybersecurity coming in future articles.)换句话说, 矿工需要交易, 确认他们, 然后在整个网络中分发, 要求每台计算机, 或节点, 将其添加到数据库中. As this process occurs, miners are rewarded with a token of the cryptocurrency—Bitcoins, for example.

加密货币的安全问题

While still not fully understood by most people across the world, 重要的是要知道许多银行, 政府, 世界各地的组织都知道加密货币, and they are studying and evaluating their use and emergence as a viable currency on an ongoing basis. While the Bitcoin we know today was built on the proof-of-work principle that transactions can be 安全 在去中心化点对点网络上处理, 不需要一个中央收缴机构, 挖掘和事务处理不是完全安全的. 事实上, conspiring participants can impose upon of the flaws found within the process.

Here are five key security concerns that can lead to potentially harmful attacks and threats with the use of cryptocurrencies:

    1. 自私的矿业— This allows a sufficient size pool of “selfish miners” to gain revenue larger than its ratio of mining power, which forces “honest miners” to spend their cycles on blocks that won’t make it to the blockchain.
    2. 双支出— This allows an attacker to successfully make more than one transaction using a single coin, 哪一个使“诚实”交易无效.
    3. 钱包软件/分布式拒绝服务攻击(DDoS)—“Wallets” are client-side applications used to manage Bitcoins and transactions of Bitcoins from/to the client and can be accessed online or via download. Online wallets are more vulnerable to DDoS attacks since they need encryption and are backed off-line.
    4. 获得超过50%的计算能力— This is when any conspiring user acquires more than 50% of the computing power in mining process, 这也会导致其他的攻击.
    5. Timejacking— This happens when an attacker announces an inaccurate timestamp while connecting to a node for a transaction, 改变网络时间计数器,欺骗节点, 什么会导致双重消费.

而加密货币网络仍在发展中, 采矿过程面临的威胁正在逼近, and it’s important for individuals and organizations to not only be aware of this phenomenon but to also be prepared in the event of an attack, and to understand how this new form of currency could be manipulated for illicit gain. 明升体育app下载 today to learn how LBMC 信息安全’s team is uniquely equipped to handle the most technical of IT security assessments.

友情链接: 1 2 3 4 5 6 7 8 9 10