In the zero-sum game that cryptocurrency has become, one man’s free money is another man’s headache. In the Mid-Columbia Basin, the latter category includes John Stoll, who oversees Chelan County Public Utility District’s maintenance crews. Stoll regards people like Benny as “rogue operators,” the utility’s term for small players who mine without getting proper permits and equipment upgrades, and whose numbers have soared in the past 12 months. Though only a fraction of the size of their commercial peers, these operators can still overwhelm residential electric grids. In extreme cases, insulation can melt off wires. Transformers will overheat. In one instance last year, the utility says, a miner overloaded a transformer and caused a brush fire.
Mining a block is difficult because the SHA-256 hash of a block's header must be lower than or equal to the target in order for the block to be accepted by the network. This problem can be simplified for explanation purposes: The hash of a block must start with a certain number of zeros. The probability of calculating a hash that starts with many zeros is very low, therefore many attempts must be made. In order to generate a new hash each round, a nonce is incremented. See Proof of work for more information.
To be accepted by the rest of the network, a new block must contain a so-called proof-of-work (PoW). The system used is based on Adam Back's 1997 anti-spam scheme, Hashcash. The PoW requires miners to find a number called a nonce, such that when the block content is hashed along with the nonce, the result is numerically smaller than the network's difficulty target.:ch. 8 This proof is easy for any node in the network to verify, but extremely time-consuming to generate, as for a secure cryptographic hash, miners must try many different nonce values (usually the sequence of tested values is the ascending natural numbers: 0, 1, 2, 3, ...:ch. 8) before meeting the difficulty target.
Bitcoins may not be ideal for money laundering, because all transactions are public. Authorities, including the European Banking Authority the FBI, and the Financial Action Task Force of the G7 have expressed concerns that bitcoin may be used for money laundering. In early 2014, an operator of a U.S. bitcoin exchange, Charlie Shrem, was arrested for money laundering. Subsequently, he was sentenced to two years in prison for "aiding and abetting an unlicensed money transmitting business". Alexander Vinnik, an alleged owner of BTC-e was arrested in Greece July 25 of 2017 on $4 bln money laundering charges for flouting anti-money laundering (AML) laws of the US. A report by UK's Treasury and Home Office named "UK national risk assessment of money laundering and terrorist financing" (2015 October) found that, of the twelve methods examined in the report, bitcoin carries the lowest risk of being used for money laundering, with the most common money laundering method being the banks.
At the end of the day, all of this can go over your head without much danger. Just remember that it’s good to know what you’re dealing with. Bitcoin wallets make use of a fundamental cryptographic principle that we use for things ranging from https for websites or sending anonymous tips to Wikileaks. Most importantly, by understanding private keys you’ll have a much easier familiarizing yourself with Cold Storage wallets.
With the Antminers needing to stay below 38 °C, Mongolia is not the ideal location for a mining facility. It had been above 40 °C for several days when I visited in July. And in the winter, it can fall to –20 °C, cold enough for Bitmain to add insulation to the facilities. Dust is a problem as well, which is why the interior of every warehouse I walk through is veiled in a fine fabric filter.
All mining ASICs, Bitmain’s included, are performing essentially the same computation—the SHA-256 hashing algorithm—even if they go about it a bit differently. The standard algorithm takes 64 steps to complete, but in Bitcoin it is run twice for each block header, meaning a full round requires 128 steps that are heavy on integer addition. “That’s what dominates the whole design,” says Timo Hanke, the chief cryptographer at String Labs, a cryptography-focused incubator in Palo Alto, Calif. “So, if somebody was to optimize it, they have to optimize the adders. That’s where most of the work is.”
What bitcoin miners actually do could be better described as competitive bookkeeping. Miners build and maintain a gigantic public ledger containing a record of every bitcoin transaction in history. Every time somebody wants to send bitcoins to somebody else, the transfer has to be validated by miners: They check the ledger to make sure the sender isn’t transferring money she doesn’t have. If the transfer checks out, miners add it to the ledger. Finally, to protect that ledger from getting hacked, miners seal it behind layers and layers of computational work—too much for a would-be fraudster to possibly complete.
Volatility. This very reason many speculators are attracted to Bitcoin is the same reason many potential users are hesitant to get involved. Users that look at Bitcoin as a speculative investment option are essentially gambling on the process, and the future price of Bitcoin is largely unknown. There are estimates that Bitcoin will both be worth pennies in a few years, while some predict that a single bitcoin will be worth $500k in three years. As new investors continue to invest and the market cap grows, Bitcoin’s price could become more stable.
Though Bitcoin was not designed as a normal equity investment (no shares have been issued), some speculative investors were drawn to the digital money after it appreciated rapidly in May 2011 and again in November 2013. Thus, many people purchase bitcoin for its investment value rather than as a medium of exchange. But their lack of guaranteed value and digital nature means the purchase and use of bitcoins carries several inherent risks. Many investor alerts have been issued by the Securities and Exchange Commission (SEC), the Financial Industry Regulatory Authority (FINRA), the Consumer Financial Protection Bureau (CFPB), and other agencies.
More broadly, the region is watching uneasily as one of its biggest natural resources—a gigantic surplus of hydroelectric power—is inhaled by a sector that barely existed five years ago and which is routinely derided as the next dot-com bust, or this century’s version of the Dutch tulip craze, or, as New York Times columnist Paul Krugman put it in January, a Ponzi scheme. Indeed, even as Miehe was demonstrating his prospecting chops, bitcoin’s price was already in a swoon that would touch $5,900 and rekindle widespread doubts about the future of virtual currencies.
The receiver of the first bitcoin transaction was cypherpunk Hal Finney, who created the first reusable proof-of-work system (RPOW) in 2004. Finney downloaded the bitcoin software on its release date, and on 12 January 2009 received ten bitcoins from Nakamoto. Other early cypherpunk supporters were creators of bitcoin predecessors: Wei Dai, creator of b-money, and Nick Szabo, creator of bit gold. In 2010, the first known commercial transaction using bitcoin occurred when programmer Laszlo Hanyecz bought two Papa John's pizzas for 10,000 bitcoin.