{"id":19461,"date":"2014-03-04T23:01:05","date_gmt":"2014-03-04T15:01:05","guid":{"rendered":"https:\/\/www.hongkiat.com\/blog\/?p=19461"},"modified":"2022-10-14T17:54:22","modified_gmt":"2022-10-14T09:54:22","slug":"bitcoin-security","status":"publish","type":"post","link":"https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/","title":{"rendered":"The Good, The Bad And The Ugly of Bitcoin Security"},"content":{"rendered":"<p>It\u2019s safe to assume that <a target=\"_blank\" href=\"https:\/\/www.hongkiat.com\/blog\/introductions-to-bitcoins-tor-network\/\" rel=\"noopener\">Bitcoin<\/a> is <strong>here to stay<\/strong>. Yes, it\u2019s a bit volatile and yes, <a target=\"_blank\" href=\"https:\/\/www.hongkiat.com\/blog\/bitcoin-alternatives\/\" rel=\"noopener\">other cryptocurrencies<\/a> are a lot easier to <a target=\"_blank\" href=\"https:\/\/www.hongkiat.com\/blog\/bitcoin-mining-machines\/\" rel=\"noopener\">mine<\/a> and a lot cheaper to buy, but the ever-growing number of <a target=\"_blank\" href=\"https:\/\/www.hongkiat.com\/blog\/places-to-spend-bitcoins\/\" rel=\"noopener\">ways to spend bitcoins<\/a> \u2013 plus the fact that it\u2019s still around <strong>after being proclaimed dead numerous times over the past few years \u2013 <\/strong> is a testimony of the resilience of the world\u2019s most popular, and polarizing, cryptocurrency.<\/p>\n<p>Thing is though, this doesn\u2019t mean that you should blindly jump into Bitcoin. Aside from the high price of entry, a string of events over the past year have shown that while the Bitcoin protocol itself may be secure, the <strong>wallets and services used to store and exchange Bitcoin<\/strong> <strong>may not<\/strong>.<\/p>\n<p>Here\u2019s a quick look into the security of the bitcoin protocol itself as well as some notable instances of large-scale bitcoin theft.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-1\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/tips-tricks-safeguard-bitcoins\/\" class=\"ref-block__link\" title=\"Read More: How to Secure Your Bitcoin Investments\" rel=\"bookmark\"><span class=\"screen-reader-text\">How to Secure Your Bitcoin Investments<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/tips-tricks-safeguard-bitcoins.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-37764 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/tips-tricks-safeguard-bitcoins.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">How to Secure Your Bitcoin Investments<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tBitcoin, one of the largest digital assets, is frequently targeted in thefts and security breaches. It's clear why...\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<h2>Encryption And the Blockchain<\/h2>\n<p>Bitcoin is one of many cryptocurrencies available today. Cryptocurrencies are digital currencies that implement <strong>cryptography as a central part of the protocol<\/strong>, in order to establish pseudonymous (or anonymous) and decentralized currencies.<\/p>\n<p>Bitcoin uses <strong>SHA-256 encryption<\/strong> for both its Proof-of-Work (PoW) system and transaction verification. The security of the bitcoin protocol lies in one of its fundamental characteristics, the <strong>transaction blockchain<\/strong>.<\/p>\n<h3>Bitcoin Blockchain<\/h3>\n<p>The blockchain is basically a chain of <strong>multiple \"blocks\" containing transaction history<\/strong>. The blockchain starts with the initial block, known as the <strong>genesis block<\/strong>. Transactions and solved hashes add new blocks after this genesis block, creating a blockchain.<\/p>\n<p>The image below shows a <strong>visualisation of the blockchain<\/strong>, with the genesis block in green and the longest blockchain in black:<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/bitcoin-security\/bitcoin-blockchain.jpg?newedit\" alt=\"Bitcoin Blockchain\" height=\"188\" width=\"500\"><\/figure>\n<p>Within the bitcoin protocol, the blockchain that has seen <strong>the most work put into it<\/strong> is considered to be the <strong>best blockchain<\/strong> and the one that the entire protocol refers to when verifying transactions. Bitcoins are considered spent once a transaction has been verified.<\/p>\n<h3>Double Spending<\/h3>\n<p>It\u2019s possible (despite belief in the contrary) to trick the blockchain and <strong>spend the same bitcoins twice<\/strong>, an action known as double spending.<\/p>\n<p>There are a number of ways this can be done. If a merchant doesn\u2019t wait for transaction confirmation, bitcoins can be double spent by attacker(s) quickly <strong>sending two conflicting transactions<\/strong> into the network. Another way is to <strong>pre-mine one transaction<\/strong> into a block and then spend the same coins, before releasing the block into the blockchain.<\/p>\n<p>However the amount of computing power required to succeed at this <strong>renders it less productive than just to mine bitcoins legitimately<\/strong>.<\/p>\n<h2>Bitcoin Wallets<\/h2>\n<p>Bitcoins are stored in wallets, but unlike, say, a PayPal account, these \"wallets\" <strong>don\u2019t actually store the bitcoins themselves<\/strong>. Despite a number of different implementations and formats, generally wallets will <strong>contain a public key<\/strong> that is used to receive bitcoins (similar to a bank account number). It also contains <strong>a private key<\/strong> that is used to verify that you are indeed the owner of the bitcoins you\u2019re trying to spend.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-2\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/setup-trezor-beginner\/\" class=\"ref-block__link\" title=\"Read More: How to Setup TREZOR Wallet (For First-timers)\" rel=\"bookmark\"><span class=\"screen-reader-text\">How to Setup TREZOR Wallet (For First-timers)<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/setup-trezor-beginner.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-37996 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/setup-trezor-beginner.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">How to Setup TREZOR Wallet (For First-timers)<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tIf you are serious about the cryptocurrencies in your possession, you should keep them in a hardware wallet...\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<h3>Storing Bitcoins Offline<\/h3>\n<p>Wallets are usually stored digitally, either locally or online, but there are <strong>more secure ways to store bitcoins<\/strong>. Your bitcoin \"wallets\" can be printed out and stored on paper. A paper wallet is a slip of paper with <strong>both your private and public keys<\/strong> printed on it.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/bitcoin-security\/paper-wallet.jpg?newedit\" alt=\"Bitcoin Paper Wallet\" height=\"223\" width=\"500\"><\/figure>\n<p>There are also <strong>hardware wallets,<\/strong> which store key information in offline hardware. The advantage of hardware wallets is in the fact that the key data is stored in a <strong>protected area of a microcontroller<\/strong> and that they are <strong>immune to software and viruses<\/strong> that can steal wallets stored on normal computers.<\/p>\n<p>The bitcoins stored in hardware wallets can also be used directly, unlike paper wallets, which need to be keyed in or imported to software.<\/p>\n<h2> Security Breaches<\/h2>\n<p>As mentioned earlier, the bitcoin protocol itself may be secure enough, but this does not extend to all the sites and services that deal in bitcoin. Here\u2019s a quick rundown of some of the more notable instances of security-related issues over the past year or two.<\/p>\n<h3>Inputs.io<\/h3>\n<p>October 2013, online Bitcoin wallet service inputs.io was hacked twice. A total of <strong>4,100 Bitcoins, <\/strong>worth about $1.2 million at the time were stolen via a <strong>social engineering attack<\/strong>, gaining access to inputs.io\u2019s systems hosted on Linode, a cloud-hosting provider.<\/p>\n<p>By <strong>compromising a series of email accounts<\/strong>, beginning with an email account that the inputs.io founder had set up six years prior to the attack, the hacker managed to gain access to the site\u2019s account on Linode and <strong>reset the site\u2019s account password<\/strong>.<\/p>\n<h3>Mt. Gox<\/h3>\n<p>Mt. Gox, which used to be one of the leading Bitcoin exchange services, <strong>has filed for <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/information-technology\/2014\/02\/having-lost-463-million-in-bitcoins-mtgox-files-for-bankruptcy-protection\/\">bankruptcy protection<\/a><\/strong>, having lost a staggering amount of bitcoins: $468 million worth!<\/p>\n<p>Mt. Gox\u2019s demise began in early February when it, alongside other Bitcoin exchange sites such as BTC-e, <strong>froze Bitcoin withdrawals<\/strong> citing heavy Distributed Denial of Service (DoS) attacks aimed at taking advantage of <strong>bitcoin\u2019s transaction malleability<\/strong>.<\/p>\n<p>Simply put, transaction malleability means that it\u2019s possible for valid transactions to be <strong>modified<\/strong> so that the <strong>transactions appear to not have gone through, when in reality it was succesful<\/strong>.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/bitcoin-security\/mt-gox-protesters.jpg?newedit\" alt=\"Mt. Gox Protesters\" height=\"333\" width=\"500\"><\/figure>\n<p>However, transaction malleability is <strong>not a new issue<\/strong>. Neither is it one that is impossible to solve, as Bitcoin developer Greg Maxwell has <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.ccn.com\/mt-gox-blames-bitcoin-core-developer-greg-maxwell-responds\/\">pointed out.<\/a><\/p>\n<p>In fact, other Bitcoin exchanges such as Bitstamp and BTC-E are <strong>still operational<\/strong>, having <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.bitstamp.net\/article\/bitcoin-withdrawals-processing-soon\/\">resolved the issues<\/a> on their side and resumed processing transactions <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.newsbtc.com\/news\/bitstamp-btc-e-bitcoin-exchanges-resuming-withdrawals-today\/\">within days<\/a> after initially freezing transactions. Most damning of all, though, is the aforementioned lost bitcoins and <strong>poor security and accounting<\/strong> in Mt Gox, as detailed in a <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.scribd.com\/document\/209098983\/MtGox-Situation-Crisis-Strategy-Draft-With-No-black-Bars\">leaked series of slides<\/a>. There might have been more going on behind the scenes than just issues with transaction malleability.<\/p>\n<h3>Silk Road 2.0<\/h3>\n<p>In February this year, <strong>$2.7 million worth of bitcoins<\/strong> were <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.theverge.com\/2014\/2\/13\/5409340\/the-silk-road-2-has-been-hacked-for-2-7-million\">stolen from Silk Road 2.0<\/a>\u2018s escrow account. This heist occured at roughly the same time as the aforementioned DoS attacks on bitcoin exchanges such as Mt. Gox, and <strong>exploited the same transaction malleability<\/strong> in the bitcoin protocol.<\/p>\n<p>However, unlike the bitcoin exchanges, which shut themselves down as a precautionary measure, Silk Road 2.0 <strong>did not shut itself down<\/strong> and was <strong>attacked during a re-launch phase<\/strong> when all bitcoins were stored in hot storage.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/bitcoin-security\/silk-road.jpg?newedit\" alt=\"Silk Road 2.0\" height=\"274\" width=\"500\"><\/figure>\n<p>However, some users, such as those on <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.reddit.com\/r\/DarkNetMarkets\/comments\/1xtqty\/sr_has_been_hacked\/\">Reddit\u2019s DarkNetMarkets<\/a>, believe that the hacking story was a <strong>cover-up<\/strong> \u2013 and that Silk Road 2.0 was <strong>a scam from the start<\/strong>.<\/p>\n<p>The idea is that the new Dread Pirate Roberts set up the site expressly to <strong>steal users\u2019 bitcoins<\/strong>, leveraging on the trust present in the Silk Road name. The illicit nature of the goods bought and sold on Silk Road 2.0 would help such an endeavour, since it would make victims think twice about <strong>seeking aid from law enforcement<\/strong>.<\/p>\n<h3>\"Pony\" Botnet<\/h3>\n<p>Over the course of 5 months (Sept 2013 \u2013 Jan 2014), criminals used a botnet known as <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/information-technology\/2014\/02\/pony-botnet-pilfers-digital-coins-worth-220000-in-sustained-attack\/\">Pony<\/a> to infect a large number of computers, stealing <strong>up to $220,000 worth of bitcoins<\/strong> and other cryptocurrencies. Pony was the same botnet that was found to have <strong>stolen more than <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.infosecurity-magazine.com\/news\/pony-botnet-lifts-two-million-mostly-weak\/\">two million passwords<\/a><\/strong> and stored them on a server owned by the hackers.<\/p>\n<p>Pony infected computers and <strong>stole bitcoin wallets stored locally<\/strong> on the infected machines., effectively showing the dangers of storing bitcoin wallets on Internet-connected devices.<\/p>\n<h3>51% Attack<\/h3>\n<p>This isn\u2019t a security breach per se, but it is one of the <strong>bitcoin network\u2019s most dangerous weaknesses<\/strong>. When an individual or a group of individuals owns more than 50% of the computing power within the bitcoin network, the network is opened up to the possibility of a <strong>51% attack<\/strong> \u2013 the advantage in computing power can be used to <strong>fork the main transaction blockchain and commit fraud<\/strong>, including the double spending discussed earlier.<\/p>\n<p>While this may seem far-fetched, the bitcoin network was <strong> nearly exposed to such an attack<\/strong> earlier this year. In January, panic spread when Ghash.io, a mining pool, began approaching that 50% limit. The situation was resolved without incident, due to <strong>miners leaving Ghash.io<\/strong> for smaller pools, as well as the pool\u2019s own decision to <strong>stop accepting new miners<\/strong>.<\/p>\n<p>While the reaction shows that <strong>the bitcoin network can self-regulate<\/strong>, having to rely on miners and pool owners doing the right thing is problematic, to say the least. The distribution of mining power has become less concentrated, but the possibility remains that a 51% attack can still happen.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/bitcoin-security\/bitcoin-mining-distribution.jpg?newedit02\" alt=\"Bitcoin Mining Distribution\" height=\"448\" width=\"500\"><\/figure>\n<h2>Final Thoughts<\/h2>\n<p>It\u2019s hard to deny that there are indeed security issues with bitcoin. However, a recurring theme is the fact that these security breaches and issues have <strong>less to do with the protocol itself<\/strong>, and a lot <strong>more to do with the people and services<\/strong> handling and storing these bitcoins.<\/p>\n<p>For instance, the inputs.io bitcoin heist and the Pony botnet took advantage of wallets stored online and on Internet-connected computers. Simply storing Bitcoins in an <a href=\"https:\/\/www.hongkiat.com\/blog\/bitcoin-wallets\/\">offline savings wallet<\/a>, such as a paper or hardware wallet, should <strong>eliminate the risk of having bitcoin wallets stolen<\/strong> over the Internet. While some of the money lost in the Mt. Gox fiasco was indeed from offline wallets, there is <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.extremetech.com\/extreme\/177609-asleep-at-the-wheel-how-mt-gox-lost-400-million-of-customer-money\">conjecture<\/a> that this was a direct result of how Mt. Gox implemented an automated system which pulled from offline wallets when needed.<\/p>\n<h3>Dodgy Exchanges<\/h3>\n<p>The dangers of once-trusted sites and exchanges such as Mt. Gox and Silk Road 2.0 either being hacked or imploding and going offline are not so easily dismissed, though. The <strong>lack of a central authority<\/strong> that regulates bitcoin can be seen as a strength, but it\u2019s also a weakness. For one, it may be a lot more <strong>difficult to hold individuals or companies accountable<\/strong> through legal channels.<\/p>\n<p>More importantly, though, the unregulated bitcoin ecosystem means that there\u2019s no way to ensure that services and exchanges <strong>comply to standards of trustworthiness and security<\/strong>. We trust banks because we know that they\u2019re <strong>heavily regulated<\/strong> and can\u2019t be established on a whim. This plainly hasn\u2019t been the case with bitcoin exchanges.<\/p>\n<h3>The Future?<\/h3>\n<p>Interestingly enough, the fallout from Mt. Gox may just be good for bitcoin. In a <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/medium.com\/blockchain\">joint statement<\/a> issued by 5 leading bitcoin exchanges, the need for <strong>appropriate and independently audited safety measures<\/strong> for custodians, alongside more t<strong>ransparency and accountability<\/strong>, is brought up.<\/p>\n<p>It\u2019s conceivable that such measures are <strong>exactly what bitcoin needs<\/strong> if it wants to survive recent events and reestablish its credibility and security. Ironically however, these forms of regulation and auditing may end up <strong>going against the original spirit of bitcoin<\/strong>. How this paradox will resolve itself, though, remains to be seen.<\/p>","protected":false},"excerpt":{"rendered":"<p>It\u2019s safe to assume that Bitcoin is here to stay. Yes, it\u2019s a bit volatile and yes, other cryptocurrencies are a lot easier to mine and a lot cheaper to buy, but the ever-growing number of ways to spend bitcoins \u2013 plus the fact that it\u2019s still around after being proclaimed dead numerous times over&hellip;<\/p>\n","protected":false},"author":131,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3398],"tags":[1963,3825,4601],"topic":[4521],"class_list":["entry-content","is-maxi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Good, The Bad And The Ugly of Bitcoin Security - Hongkiat<\/title>\n<meta name=\"description\" content=\"It&#039;s safe to assume that Bitcoin is here to stay. Yes, it&#039;s a bit volatile and yes, other cryptocurrencies are a lot easier to mine and a lot cheaper to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Good, The Bad And The Ugly of Bitcoin Security\" \/>\n<meta property=\"og:description\" content=\"It&#039;s safe to assume that Bitcoin is here to stay. Yes, it&#039;s a bit volatile and yes, other cryptocurrencies are a lot easier to mine and a lot cheaper to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Hongkiat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hongkiatcom\" \/>\n<meta property=\"article:published_time\" content=\"2014-03-04T15:01:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-14T09:54:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.hongkiat.com\/uploads\/bitcoin-security\/bitcoin-blockchain.jpg?newedit\" \/>\n<meta name=\"author\" content=\"Azzief Khaliq\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:site\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Azzief Khaliq\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/bitcoin-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/bitcoin-security\\\/\"},\"author\":{\"name\":\"Azzief Khaliq\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/151d8332829ab05f15185d7907fbd752\"},\"headline\":\"The Good, The Bad And The Ugly of Bitcoin Security\",\"datePublished\":\"2014-03-04T15:01:05+00:00\",\"dateModified\":\"2022-10-14T09:54:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/bitcoin-security\\\/\"},\"wordCount\":1754,\"commentCount\":40,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/bitcoin-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/bitcoin-security\\\/bitcoin-blockchain.jpg?newedit\",\"keywords\":[\"Bitcoin\",\"Cryptocurrency\",\"Security and Privacy\"],\"articleSection\":[\"Internet\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/bitcoin-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/bitcoin-security\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/bitcoin-security\\\/\",\"name\":\"The Good, The Bad And The Ugly of Bitcoin Security - Hongkiat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/bitcoin-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/bitcoin-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/bitcoin-security\\\/bitcoin-blockchain.jpg?newedit\",\"datePublished\":\"2014-03-04T15:01:05+00:00\",\"dateModified\":\"2022-10-14T09:54:22+00:00\",\"description\":\"It's safe to assume that Bitcoin is here to stay. Yes, it's a bit volatile and yes, other cryptocurrencies are a lot easier to mine and a lot cheaper to\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/bitcoin-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/bitcoin-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/bitcoin-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/bitcoin-security\\\/bitcoin-blockchain.jpg?newedit\",\"contentUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/bitcoin-security\\\/bitcoin-blockchain.jpg?newedit\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/bitcoin-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Good, The Bad And The Ugly of Bitcoin Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"name\":\"Hongkiat\",\"description\":\"Tech and Design Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\",\"name\":\"Hongkiat.com\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"width\":1200,\"height\":799,\"caption\":\"Hongkiat.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hongkiatcom\",\"https:\\\/\\\/x.com\\\/hongkiat\",\"https:\\\/\\\/www.pinterest.com\\\/hongkiat\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/151d8332829ab05f15185d7907fbd752\",\"name\":\"Azzief Khaliq\",\"description\":\"Azzief is a writer for Hongkiat.com. He is also a musician, Android user and all around nerd. He loves his tea and spends far too much time thinking about video games.\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/author\\\/azzief\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Good, The Bad And The Ugly of Bitcoin Security - Hongkiat","description":"It's safe to assume that Bitcoin is here to stay. Yes, it's a bit volatile and yes, other cryptocurrencies are a lot easier to mine and a lot cheaper to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/","og_locale":"en_US","og_type":"article","og_title":"The Good, The Bad And The Ugly of Bitcoin Security","og_description":"It's safe to assume that Bitcoin is here to stay. Yes, it's a bit volatile and yes, other cryptocurrencies are a lot easier to mine and a lot cheaper to","og_url":"https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/","og_site_name":"Hongkiat","article_publisher":"https:\/\/www.facebook.com\/hongkiatcom","article_published_time":"2014-03-04T15:01:05+00:00","article_modified_time":"2022-10-14T09:54:22+00:00","og_image":[{"url":"https:\/\/assets.hongkiat.com\/uploads\/bitcoin-security\/bitcoin-blockchain.jpg?newedit","type":"","width":"","height":""}],"author":"Azzief Khaliq","twitter_card":"summary_large_image","twitter_creator":"@hongkiat","twitter_site":"@hongkiat","twitter_misc":{"Written by":"Azzief Khaliq","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/#article","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/"},"author":{"name":"Azzief Khaliq","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/151d8332829ab05f15185d7907fbd752"},"headline":"The Good, The Bad And The Ugly of Bitcoin Security","datePublished":"2014-03-04T15:01:05+00:00","dateModified":"2022-10-14T09:54:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/"},"wordCount":1754,"commentCount":40,"publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/bitcoin-security\/bitcoin-blockchain.jpg?newedit","keywords":["Bitcoin","Cryptocurrency","Security and Privacy"],"articleSection":["Internet"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/","url":"https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/","name":"The Good, The Bad And The Ugly of Bitcoin Security - Hongkiat","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/#primaryimage"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/bitcoin-security\/bitcoin-blockchain.jpg?newedit","datePublished":"2014-03-04T15:01:05+00:00","dateModified":"2022-10-14T09:54:22+00:00","description":"It's safe to assume that Bitcoin is here to stay. Yes, it's a bit volatile and yes, other cryptocurrencies are a lot easier to mine and a lot cheaper to","breadcrumb":{"@id":"https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/#primaryimage","url":"https:\/\/assets.hongkiat.com\/uploads\/bitcoin-security\/bitcoin-blockchain.jpg?newedit","contentUrl":"https:\/\/assets.hongkiat.com\/uploads\/bitcoin-security\/bitcoin-blockchain.jpg?newedit"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hongkiat.com\/blog\/bitcoin-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hongkiat.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Good, The Bad And The Ugly of Bitcoin Security"}]},{"@type":"WebSite","@id":"https:\/\/www.hongkiat.com\/blog\/#website","url":"https:\/\/www.hongkiat.com\/blog\/","name":"Hongkiat","description":"Tech and Design Tips","publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hongkiat.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hongkiat.com\/blog\/#organization","name":"Hongkiat.com","url":"https:\/\/www.hongkiat.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","contentUrl":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","width":1200,"height":799,"caption":"Hongkiat.com"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hongkiatcom","https:\/\/x.com\/hongkiat","https:\/\/www.pinterest.com\/hongkiat\/"]},{"@type":"Person","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/151d8332829ab05f15185d7907fbd752","name":"Azzief Khaliq","description":"Azzief is a writer for Hongkiat.com. He is also a musician, Android user and all around nerd. He loves his tea and spends far too much time thinking about video games.","url":"https:\/\/www.hongkiat.com\/blog\/author\/azzief\/"}]}},"jetpack_featured_media_url":"https:\/\/","jetpack_shortlink":"https:\/\/wp.me\/p4uxU-53T","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/19461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/comments?post=19461"}],"version-history":[{"count":3,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/19461\/revisions"}],"predecessor-version":[{"id":62778,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/19461\/revisions\/62778"}],"wp:attachment":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/media?parent=19461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/categories?post=19461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/tags?post=19461"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/topic?post=19461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}