Security Research
Showing results for 
Search instead for 
Do you mean 

HP Security Briefing, episode 15 - Bitcoin and security

John_Park ‎07-31-2014 09:42 AM - edited ‎07-31-2014 09:51 AM

In this month’s Security Briefing, we look at Bitcoin, the most prominent of the emerging class of value-exchange mechanisms called digital currencies or cryptocurrencies. You can listen to this episode of the HP Security Briefing podcast on the Web or via iTunes, and you can read or download the detailed companion report here.

 

 

In the Briefing we first look at Bitcoin basics: how it works, where its security profile fits into the eternal confidentiality-integrity-availability triad, and why the underpinnings of the currency are a noteworthy attempt to solve some of Internet security’s thorniest security issues. 

 

Delving more deeply into the mechanics of Bitcoin, we examine how it tackles two potential problems – counterfeiting and the fair distribution of currency – through interesting architectural choices, and show how two potential “wrongs” not only make a right, but provide fundamental strength to the system. We make a brief but pointed detour to discuss the concept of what Bitcoin “mining” is and is not. (Hint: Please stop talking about prime numbers.)

 

Finally, we’ll look at the possibilities for cybercrime involving the cryptocurrency – as a target, as an exchange mechanism, and as a contributing element to criminal activity. We also take a peek at the guts of an ATM provisioned to buy and sell Bitcoin, reminding us that even virtual (digital, crypto) currencies touch the “real” world eventually.

 

Readers who followed our recent series of blog posts will find some of the same information in this Briefing, but with expanded analysis and new information on the current legislative climate. We also conduct a thought experiment: How might Bitcoin be used to fight crime?

 

0 Kudos
About the Author

John_Park

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Labels
Events
Aug 29 - Sep 1
Boston, MA
HPE Big Data Conference 2016
Attend HPE’s Big Data Conference to learn from peers in every industry and hear from Big Data experts and thought leaders in an exciting, energy fille...
Read more
Sep 13-16
National Harbor, MD
HPE Protect 2016
Protect 2016 is our annual conference and is the place to meet the world’s top information security talent, discuss new products and share information...
Read more
View all