Features or Bugs: The Seven Sins of Current Bitcoin

Part of the New Economic Windows book series (NEW)


Bitcoin has a number of features and properties which are sometimes presented as interesting and positive. In fact they are closer to engineering mistakes. Serious problems are programmed in the DNA (the source code) of great majority of crypto currencies. Small details in the source code can make very big difference. In this chapter seven major ‘sins’ of Bitcoin are discussed highlighting risks and suggesting solutions.


Bitcoin 51 % attack crypto currency security 


  1. Anderson, R.: Open and closed systems are equivalent (that is, in an ideal world). In: Perspectives on Free and Open Source Software, pp. 127–142. MIT Press (2005)Google Scholar
  2. Andreas, M.: Antonopoulos: speaking at L.A. Bitcoin Meetup (2014). https://www.youtube.com/watch?v=bTPQKyAq-DMfeature=youtu.bet=49m20s. Accessed 9 Jan 2014
  3. Antonopoulos, A.: Mastering Bitcoin, Unlocking Digital Cryptocurrencies, Book, 298 pp. O’Reilly Media, ISBN 978-1-4493-7404-4Google Scholar
  4. Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better: how to make Bitcoin a better currency. In: Financial Cryptography and Data Security, FC’12. Springer (2012)Google Scholar
  5. Bernstein, D.J., Lange, T.: SafeCurves: choosing safe curves for elliptic-curve cryptography, Discriminants sub-page.http://safecurves.cr.yp.to/disc.html. Accessed 4 Sept 2014
  6. Bitcoin Forum, Topic: NSA and ECC, cf. https://bitcointalk.org/index.php?topic=289795.80
  7. Cawrey, D.: What Are Bitcoin Nodes and Why Do We Need Them? 9 May 2014. http://www.coindesk.com/bitcoin-nodes-need/
  8. Cawrey, D.: Are 51 % Attacks a Real Threat to Bitcoin? http://www.coindesk.com/51-attacks-real-threat-bitcoin/
  9. Courtois, N.T.: Computer security foundations and principles. In: Extended Version of Slides from COMPGA01 Computer Security 1 taught at UCL in 2009–2013. http://www.nicolascourtois.com/papers/compsec/CompSec_Intro_01_long.ppt
  10. Courtois, N.T.: On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies, 20 May 2014 (2014). http://arxiv.org/abs/1405.0534. Accessed 10 Dec 2014
  11. Courtois, N.T., Emirdag, P., Nagy, D.A.: Could Bitcoin Transactions Be 100x Faster? In: Post-proceedings of SECRYPT 2014, 28–30 August 2014, Vienna, Austria (2014a). http://www.nicolascourtois.com/bitcoin/POSTER_100x_Secrypt2014_v1.0.pdf
  12. Courtois, N.T., Emirdag, P., Wang, Z.: On Detection of Bitcoin mining redirection attacks. In: ICISSP 2015, 1st International Conference on Information Systems Security and Privacy, 9–11 Feb 2015, Angers, France (2014b)Google Scholar
  13. Courtois, N.T., Grajek, M., Bahack, L.: On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency, 1em plus 0.5em minus 0.4em (2014c). http://arxiv.org/abs/1402.1718. Accessed 28 Jan 2014
  14. Courtois, N.T., Grajek, M., Naik, R.: Optimizing SHA256 in Bitcoin Mining. In: Proceedings of CSS 2014. Springer CCIS series Proceedings (2014d). http://link.springer.com/chapter/10.1007/978-3-662-44893-9_12
  15. Courtois, N.T., Grajek, M., Naik, R.: The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining. 1em plus 0.5em minus 0.4em (2013). http://arxiv.org/abs/1310.7935. Accessed 31 Oct 2013
  16. Decker, C.: Wattenhofer, R.: Bitcoin Transaction Malleability and MtGox. 1em plus 0.5em minus 0.4em (2014) http://arxiv.org/pdf/1403.6676.pdf
  17. Felten, E.: Bitcoin Mining Now Dominated by One Pool. https://freedom-to-tinker.com/blog/felten/bitcoin-mining-now-dominated-by-one-pool/. Accessed 16 June 2014
  18. Financial Times Videos: two excerpts from an interview with Dr Nicolas Courtois of UCL on Bitcoin: http://video.ft.com/3667480923001/Camp-Alphaville-on-cashless-society/Editors-Choice. Accessed 2 July 2014
  19. Galbraith, S.D., Smart, N.P.: Evaluation Report for CRYPTREC: Security Level of Cryptography—ECDLP Mathematical Problem. http://www.ipa.go.jp/security/enc/CRYPTREC/fy15/doc/1029_report.pdf
  20. Higgins, S.: Dogecoin to Allow Litecoin Merge Mining in Network Security bid. http://www.coindesk.com/dogecoin-allow-litecoin-merge-mining/. Accessed 4 Aug 2014
  21. Koblitz, N.: The uneasy relationship between mathematics and cryptography. In: Notices of the American Mathematical. Society. http://www.ams.org/notices/200708/tx070800972p.pdf
  22. Kerckhoffs, A.: La cryptographie militaire. Journal des Sciences Militaires IX, 5–38, 161–191(1883). http://www.petitcolas.net/fabien/kerckhoffs/
  23. Kroll, J.A., Davey, I.C., Felten, E.W.: The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries. In: WEIS 2013, Washington, DC. http://weis2013.econinfosec.org/papers/KrollDaveyFeltenWEIS2013.pdf. Accessed 11–12 June 2013
  24. Lee Kuo Chuen, D. (ed.): Handbook of Digital Currency, 1st edn. Bitcoin, Innovation, Financial Instruments, and Big Data, 612 pp. Academic Press. Accessed 29 April 2015Google Scholar
  25. Matthews, C.: Bit Con? Veteran fraud expert sets his sights on bitcoin. http://fortune.com/2014/10/24/bitcoin-fraud-scam/
  26. Maese, V.A.: Divining the Regulatory Future of Illegitimate Cryptocurrencies. Wall Street Lawyer 18(5)Google Scholar
  27. Marek (slush) Palatinus: Stratum mining protocol. The official documentation of lightweight bitcoin mining protocol (2014). https://mining.bitcoin.cz/stratum-mining. A compact thrid-party description can also be found at https://www.btcguild.com/new_protocol.php
  28. Mining digital gold, from the print edition: finance and economics. The Economist, 13 April 2013Google Scholar
  29. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). http://bitcoin.org/bitcoin.pdf
  30. Nakamoto, S., et al.: Bitcoin QT, the original and the most prominent bitcoin software distribution which implements a full peer-to-peer network node. Originally developed by Satoshi Nakamoto, core developers are Satoshi Nakamoto, Gavin Andresen, Pieter Wuille, Nils Schneider, Jeff Garzik, Wladimir J. van der Laan and Gregory Maxwell. http://bitcoin.org/en/download with source code at https://github.com/bitcoin/bitcoin
  31. Official Bitcoin Wiki: Weaknesses. Summary of all known weaknesses of bitcoin system (2014a). https://en.bitcoin.it/wiki/Weaknesses
  32. Official Bitcoin Wiki: Double Spending. page dedicated to double spending threats and attacks (2014b). https://en.bitcoin.it/wiki/Double-spending
  33. Perry, D.: Posted as GUEST: Bitcoin Attacks in Plain English. http://codinginmysleep.com/bitcoin-attacks-in-plain-english/. Accessed 5 Oct 2012
  34. Rosenfeld, M.: Mining pools reward methods. Presentation at Bitcoin 2013 Conference. http://www.youtube.com/watch?v=5sgdD4mGPfg
  35. Saltzer, J.H., Schroeder, M.D.: “The protection of information in computer systems.” In: Proceedings of the IEEE, 63(9), 1278–1308 (1975)Google Scholar
  36. Sams, R.: The Marginal Cost of Cryptocurrency. Blog entry at cryptonomics.org. http://cryptonomics.org/2014/01/15/the-marginal-cost-of-cryptocurrency/
  37. Swanson, T.: What Dogecoin Must Do to Survive. http://www.coindesk.com/what-dogecoin-must-do-survive/. Accessed 25 May 2014
  38. Technical Specification of the Bitcoin Protocol: https://en.bitcoin.it/wiki/Protocol_specification
  39. Todd, P.: Why I Just Sold 50 % of my Bitcoin: GHash.io. http://daytradernews.com/bitcoin-trading/why-i-just-sold-50-of-my-bitcoin-ghash-io.html. Accessed 13 June 2014
  40. Wong, J.I.: Gavin Andresen Rejects Bitcoin Centralisation Concerns at Web Summit, 6 Nov 2014. http://www.coindesk.com/gavin-andresen-rejects-bitcoin-centralisation-concerns-web-summit/

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.University College LondonLondonUK

Personalised recommendations