A specific problem that an internet payment system must solve is double-spending, whereby a user pays the same coin to two or more different recipients. An example of such a problem would be if Eve sent a bitcoin to Alice and later sent the same bitcoin to Bob. The bitcoin network guards against double-spending by recording all bitcoin transfers in a ledger (the blockchain) that is visible to all users, and ensuring for all transferred bitcoins that they haven't been previously spent.[14]:4
Nor was it simply the deep pockets. At these prices, even smaller operators have been able to make real money running a few machines in home-based, under-the-radar mines. Take the 20-something Wenatchee man we’ll call “Benny”—he didn’t want to be identified—who last July bought three mining servers, set them up in his house (one in the master bedroom and two in the living room)—and began mining Ethereum, bitcoin’s closest cryptocurrency rival. As Ethereum climbed from $165 in July to nearly $1,200 in January, Benny had not only repaid his $7,000 investment but was making enough to pay his mortgage. As a side benefit, this winter, Benny’s power bill went down: The waste heat from the three churning servers kept the house at a toasty 78 degrees. “We actually have to open the windows,” he told me in January. His servers, meanwhile, pretty much run themselves—although, when he’s at work, clerking at a grocery, he monitors the machines, and the Ethereum price, on his phone. “It’s just basically free money,” Benny says. “All I have to do is wake up in the morning and make sure nothing crashed during the night.”
A variant race attack (which has been called a Finney attack by reference to Hal Finney) requires the participation of a miner. Instead of sending both payment requests (to pay Bob and Alice with the same coins) to the network, Eve issues only Alice's payment request to the network, while the accomplice tries to mine a block that includes the payment to Bob instead of Alice. There is a positive probability that the rogue miner will succeed before the network, in which case the payment to Alice will be rejected. As with the plain race attack, Alice can reduce the risk of a Finney attack by waiting for the payment to be included in the blockchain.[16]
Transactions are verified by network nodes through cryptography and recorded in a public distributed ledger called a blockchain. Bitcoin was invented by an unknown person or group of people using the name Satoshi Nakamoto[9] and released as open-source software in 2009.[10] Bitcoins are created as a reward for a process known as mining. They can be exchanged for other currencies,[11] products, and services. Research produced by the University of Cambridge estimates that in 2017, there were 2.9 to 5.8 million unique users using a cryptocurrency wallet, most of them using bitcoin.[12]
×