Is mining a waste of resources?
Every member who joins the Bitcoin network generates their own address and private key. They can be likened to an email address and its password: people can send Bitcoin to your public address, and you need to use the private key to send Bitcoin out from your balance. Bitcoin addresses can also be presented in the form of QR codes.
When a transaction occurs, the sender broadcasts the transaction to other members (nodes) in the network, who will verify whether the sender has sufficient balance and whether the Bitcoin involved in the transaction has been double-spent in other transactions. Once the transaction is confirmed by a majority of nodes, it will be added to the shared ledger that all users in the network maintain, and all users will synchronize to update the "account" balances of both parties involved in the transaction. For network nodes, verifying the validity of these transactions is very simple. Therefore, validating transactions using a one-person-one-vote method is not secure; hackers can deploy a large number of fake nodes to validate fraudulent transactions. The double-spending problem can only be solved without relying on third parties based on the computational power consumed by network members; in other words, only by using the Proof of Work (PoW) mechanism can Bitcoin address the double-spending issue.
Essentially, Proof of Work is about having network members compete to solve mathematically difficult problems that are easy to verify. Bitcoin transactions that are verified within about 10 minutes will be packaged into a block by nodes, and a certain node will add the block to the Bitcoin ledger, which is the Bitcoin blockchain. Nodes compete for the right to add blocks by racing to find valid solutions to the Proof of Work; once a node finds a valid solution, it will immediately broadcast this solution to other network members, who can quickly verify its validity. Once the block submitted by the node and the validity of the Proof of Work are recognized by a majority of network nodes, that node will receive a certain amount of Bitcoin. The Bitcoin issued by the system is called "block subsidy," which is the only way to increase the supply of Bitcoin, just as mining is the only way to increase the supply of gold; for this reason, the process of obtaining new coins is referred to as "mining." In addition to block subsidies, the first node to complete the Proof of Work will also receive transaction fees included in that block. The sum of the block subsidy and transaction fees is the block reward.
Nodes compete for Proof of Work, which at first glance seems like a waste of computer processing power and electricity; however, Proof of Work is crucial for the operation of Bitcoin.
To ensure that digital goods have a reliably high production cost, so far, only Proof of Work has been the way. It is precisely because electricity and computational power must be consumed to produce new coins that Bitcoin has the potential to become hard currency. Only solving Proof of Work requires a large amount of computational power and electricity, and nodes that expand their computational power have a strong incentive not to package invalid transactions in their blocks. The cost of verifying the validity of transactions and Proof of Work is far less than the cost of solving Proof of Work; therefore, if a node attempts to mix invalid transactions into a block, it will almost certainly fail, rendering the computational power cost spent on Proof of Work wasted.
Proof of Work makes the cost of packaging blocks extremely high while the cost of verifying block validity is extremely low, which almost eliminates any motivation for anyone to create invalid transactions. If someone attempts to do so, they will only waste electricity and computational power without receiving any block rewards. Therefore, Bitcoin can be understood as a technology: it transforms electricity consumption into real transaction records through computational power. Nodes consume electricity to earn Bitcoin rewards, so they have a strong incentive to maintain the integrity of Bitcoin. Due to the economic incentives for honest nodes, the Bitcoin ledger has never had any discrepancies since its inception, and double-spending attacks on confirmed transactions have never succeeded. In fact, this integrity of the Bitcoin ledger does not rely on the honesty of any party. Bitcoin relies entirely on verification and does not require trust in anyone.
Attackers need to control the majority of the network's computational power to insert fraudulent transactions into the Bitcoin ledger. Honest nodes in the network have no motivation to do so, as it would undermine the integrity of the Bitcoin ledger, decrease the value of the block rewards they receive, and waste the electricity and resources they have invested in mining. Therefore, the only hope for attackers is to independently control more than 50% of the network's computational power, verify their fraudulent actions themselves, and write them into the Bitcoin ledger, pretending that this is a valid transaction. In the early days of Bitcoin, when the network's computational power was very small, such things were still possible. However, since the economic value of the Bitcoin network did not exist at that time, or was negligible, it did not attract such attacks. As the Bitcoin network grew, the computational power brought by users increased, and the cost of attacks became vastly different.
Network nodes can earn block rewards by verifying blocks, making controlling computational power profitable. As of January 2017, the total computational power of the Bitcoin network was approximately equal to the sum of the computational power of 20 trillion consumer laptops, a figure that is 2 million times greater than the computational power of the world's largest supercomputer and 200,000 times greater than the total computational power of the top 500 supercomputers in the world. By directly monetizing computational power, Bitcoin has become the world's largest single-use computer network.
Another factor promoting the growth of computational power is that the verification of transactions and the solving of Proof of Work problems have shifted from personal computers to dedicated mining machines, which are specifically designed for optimal performance of Bitcoin software. ASICs (Application Specific Integrated Circuits) first appeared in 2012, and their deployment further improved the efficiency of computational power in the Bitcoin network. Using ASICs, no electricity is wasted on computing units unrelated to Bitcoin calculations. The globally distributed network composed of mining machines safeguards the integrity of the Bitcoin ledger. Besides verifying transactions and solving Proof of Work, these mining machines have no other uses. If Bitcoin were to fail for some reason, the mining machines would become useless, and investors' investments would be lost, so they have a strong incentive to maintain the integrity and credibility of the network.
If someone wants to tamper with the transaction records of the Bitcoin network, they would need to invest at least hundreds of millions of dollars to develop new ASIC chips. Even if someone successfully tampered with the transaction records, they are unlikely to gain any benefits because the value of the Bitcoin network would plummet, potentially to zero, due to their attack. In other words, to destroy Bitcoin, attackers would need to incur enormous costs without receiving any returns. In fact, even if such a scheme were successful, honest nodes on the network could roll back to the block before the attack occurred, allowing the network to continue operating. Then, attackers would need to continue incurring significant costs to attack the consensus of honest nodes.
In the early days of Bitcoin, users ran nodes to send their transactions while verifying each other's transactions; in fact, each node was both a wallet and a validator/miner. However, over time, these functions were separated. Now, ASIC chips are specifically used for verifying transactions and obtaining block rewards (which is why they are often referred to as mining machines). Node operators can generate unlimited wallets to provide convenient wallet services for users, allowing users to send and receive Bitcoin without running nodes or consuming computational power. In this sense, although Bitcoin is no longer a purely peer-to-peer network between nodes, the network still consists of a large number of nodes, and its operation does not rely on any single party; the decentralized and distributed nature of the network has been fully preserved. Furthermore, it is the specialization of mining that has allowed the computational power behind the network to grow to such an astonishing scale today.
In the early days, when Bitcoin had almost no value, the network was vulnerable to being hijacked or destroyed by hackers. However, as the network gained some value, people could be free from such concerns. The increasing value of the Bitcoin network may make it more attractive to attackers, but at the same time, the rising cost of attacks has also become more apparent, resulting in no successful attacks. From another perspective, perhaps the true protection of the Bitcoin network is that at any time, the value of the network's tokens entirely depends on the integrity of the network. Any successful modification of the blockchain, theft of coins, or successful double-spending attack would lead network members to feel that the Bitcoin network is no longer secure, significantly reducing the demand for using the Bitcoin network and holding coins, causing the price of Bitcoin to collapse, leaving attackers with no benefits. In other words, the armor of Bitcoin is not only the high cost of attacks but also the crucial point that a successful attack would render the spoils worthless. As a completely voluntary system, the network can only operate if it is trusted; otherwise, people will abandon it.
The decentralization of computational power, the strong resistance to code changes, and the steadfast monetary policy are the reasons Bitcoin has survived and grown to its current scale. It is hard for newcomers to Bitcoin to imagine how many logical and security challenges Bitcoin has overcome to reach this point. The internet has created endless opportunities for hackers, who attack various websites and networks out of interest or profit; computer networks and email servers around the world are exposed to various security vulnerabilities every day. These systems provide attackers with only opportunities for data or political gain, while Bitcoin is a valuable asset. Thinking of it this way, Bitcoin's achievements today are even more remarkable. The immense value of the Bitcoin network and its ability to operate securely and stably is because it has always operated in a highly hostile environment, facing relentless trials over the long term. Programmers and hackers around the world have attempted to challenge it in various ways, but Bitcoin stands firm.
"The essence of Bitcoin determines that since the release of version 0.1, its core design has been fixed and will never change."
— Satoshi Nakamoto, June 17, 2010
So far, Bitcoin's resilience is not only reflected in successfully repelling external attacks but also in its strong resistance to any attempts to change Bitcoin or alter its characteristics. Most skeptics have not fully recognized the power and implications of this statement. If Bitcoin is likened to a central bank, it would be the most independent central bank in the world; if Bitcoin is likened to a country, it would be the most sovereign nation-state in the world. The sovereignty of Bitcoin stems from the fact that everyone knows that the consensus rules of Bitcoin determine that no one can manipulate it. It is no exaggeration to say that no one can control Bitcoin; people's only choice is to use it as it is or not use it at all.
This immutability does not mean that Bitcoin software cannot be changed; for anyone with programming skills, changing it is easy. This immutability arises from the economic effects of Bitcoin as a currency and network, and the difficulty of change lies in getting every user in the network to accept the same modification. Bitcoin is open-source software, allowing individuals to run nodes connected to the Bitcoin network. Bitcoin was originally developed by Satoshi Nakamoto in collaboration with the late Hal Finney and several other programmers. Since then, anyone can freely download and use the software and modify it. The open-source nature creates a free competitive market where anyone can freely modify or improve the software and submit it for user use.
For a long time, hundreds of computer programmers from around the world have voluntarily spent time improving node software and enhancing the functionality of individual nodes. These programmers have completed many different implementations, the most popular of which is called "Bitcoin Core." In addition to Bitcoin Core, users can also use Bitcoin software completed by other developers to connect to the Bitcoin network and can freely modify the source code. The only requirement for nodes to join the Bitcoin network is to adhere to the consensus protocol shared by other nodes. If a node violates the consensus rules, changing the blockchain structure, transaction validity, block rewards, or any other system parameters, the transactions submitted by that node will be rejected by all other nodes.
The process of defining Bitcoin parameters is an excellent example of what Scottish philosopher Adam Ferguson referred to as "the product of human action, but not the product of human design." Satoshi Nakamoto and Hal Finney completed the working model of Bitcoin in January 2009, but since then, Bitcoin has made significant progress. Through the selection of thousands of running nodes and the contributions of hundreds of developers, the Bitcoin code has undergone significant changes. There is no central authority deciding how Bitcoin software should evolve, nor can any programmer determine any outcome. It has been proven that the key to the adoption of a particular improvement is to follow the parameters of the original design. In terms of changes, improvements to Bitcoin software can be better understood as enhancing the interaction between individual nodes and the network rather than altering the Bitcoin network or any of its consensus rules. A detailed discussion of these exceeds the scope of this book, but to summarize: if a change makes a node inconsistent with other nodes, all other nodes must update, and the node initiating the change must remain in the network. If a group of nodes collectively adopts new consensus rules while the remaining nodes do not follow, a so-called hard fork will occur.
Despite their excellence, Bitcoin developers cannot control Bitcoin; they can only influence Bitcoin to some extent if the software they provide is used by nodes. Not only can developers not control Bitcoin, but miners cannot either, regardless of how much computational power they possess. No matter how much computational power miners waste on invalid blocks, they will not gain the recognition of the majority of network nodes. If miners attempt to change the consensus rules, the blocks they produce will only be ignored by other network members, wasting computational power for nothing. Only if miners package blocks containing only valid transactions according to the existing consensus rules can it be said that miners can influence Bitcoin to some extent.
Since neither developers nor miners can do so, it seems that the people running nodes control Bitcoin. However, this judgment is only true in a highly theoretical context. In fact, each node operator can only control their own node, decide which network protocol to join, and determine which transactions they consider valid or invalid. Nodes cannot freely choose their consensus rules because if they choose rules inconsistent with the entire network, they will be rejected by the network. Therefore, all nodes have a strong preference to keep the consensus rules unchanged and to remain compatible with other nodes running that consensus rule. No single node can force other nodes to change their code, resulting in a strong collective consensus to maintain the existing consensus rules.
In summary, if Bitcoin developers want their code to be accepted, it is best to keep the original consensus rules unchanged; if Bitcoin miners want to be rewarded and not waste the costs of mining, the best choice is also to adhere to the original consensus rules; if network users want their transactions to settle smoothly, the best choice is also to maintain the original consensus rules unchanged. No developer, miner, or node is indispensable to Bitcoin; if they deviate from the consensus rules, the most likely outcome is the waste of their resources. As long as the Bitcoin network provides positive incentives for participants, no one is irreplaceable. Therefore, from this perspective, these consensus characteristics reflect the sovereignty of Bitcoin, and to what extent Bitcoin remains Bitcoin depends on these characteristics and norms. Bitcoin's strong preference for the status quo makes it extremely difficult to change its supply or other important economic parameters. It is this stable equilibrium that has earned Bitcoin its hard currency attributes. If Bitcoin deviates from these consensus rules, its status as hard currency will also be severely diminished.
To my knowledge, there has not yet been a significant coordinated effort to change Bitcoin's monetary policy; moreover, some simpler and more direct attempts to alter certain technical parameters of Bitcoin have also failed. Some seemingly harmless technical improvements are also difficult to promote, primarily due to the distributed nature of the Bitcoin network. It requires the agreement of parties that are unrelated or even have conflicting interests for a change to be implemented. The more participants there are, the harder it becomes to ensure that everyone understands the significance of a change, making it even more challenging to achieve consensus. For everyone, the current state has undergone repeated testing, is safe and familiar, and is stable and reliable. The status quo of Bitcoin can be understood as a stable Schelling Point, incentivizing all participants to persist, as abandoning it would bring significant risks of loss.
If some members of the Bitcoin network decide to introduce a new version of Bitcoin software that changes certain characteristics of Bitcoin code, and this new Bitcoin software is incompatible with other network members, the result will be a fork, effectively creating two different currencies and networks. As long as someone is willing to continue using the original old network, they will benefit from the existing network infrastructure, mining equipment, network effects, and recognition. For the new fork to replace the old network, it must achieve an overwhelming migration of users, computational power, and all related infrastructure. If it cannot gain an overwhelming majority, the most likely outcome is the emergence of two Bitcoins. If the proponents behind the fork wish to prevail, they must sell their Bitcoins on the original network and hope everyone does the same, causing the price of Bitcoins on the old network to drop while the tokens on the new fork rise, thereby driving more computational power and economic activity from the old network to the new network. However, any modification of any characteristic of Bitcoin will only benefit some people while disadvantaging others, making it unlikely for everyone to reach a consensus and collectively migrate to the new network. More broadly, the reason most people hold Bitcoin is that Bitcoin automatically completes transactions without being influenced by third parties. Such individuals are unlikely to take risks and are unlikely to hand over the discretion to modify the network to organizations submitting incompatible code. Arguing about who constitutes the majority is of no practical significance; what matters is that as long as a group of people insisting on the original network rules exists, the existing system characteristics will be preserved (unless some unknown reason disrupts the operation of the system).
Unless the current design experiences a catastrophic failure, it is certain that a considerable proportion of nodes will choose to continue using the existing Bitcoin implementation, which is far safer for anyone than using a forked network. The problem with using a forked network is that to help the forked network succeed, one must sell their Bitcoins on the original network. What no one wants to see is that they sell their Bitcoins on the old network, move to the new network, and find that there are very few followers behind them, causing the price of tokens on the new network to plummet. In short, if an absolute majority of people are not willing to collectively migrate, there cannot be a new consensus rule implemented, and without absolute majority support, parties participating in the new network will almost certainly face economically disastrous consequences. If any new shift succeeds, it will grant the initiators of that shift significant influence over the future direction of Bitcoin. However, to succeed, they must gain the support of a broad base of holders, and holders can be said to fundamentally oppose any form of authority over Bitcoin, making it almost impossible for them to support such a shift. The existence of these groups of holders makes it particularly dangerous for anyone else to support a fork. This analysis may explain why Bitcoin has so far rejected all attempts to significantly change it.
Coordinating Interests#
It is very tricky for opposing parties to take coordinated action, especially when many people are extremely committed to the immutability of Bitcoin from their own positions. Unless some irresistible force arises in the future that compels people to abandon the current Bitcoin implementation.
For example, suppose a modification could increase the rate of new Bitcoin issuance and increase the mining rewards for miners; miners might like this proposal, but existing holders probably would not, so holders are unlikely to agree to such a modification. Similarly, if a proposal increases the block size of the Bitcoin network, it would benefit miners, allowing them to package more transactions in a single block and receive more transaction fees, thus increasing the returns on their mining investments. However, long-term holders are unlikely to support such a modification; they would worry that larger blocks would make the entire blockchain too large, making the cost of running full nodes too expensive, thereby reducing the number of full nodes in the network and making it more centralized and vulnerable to attacks. Developers create software to run Bitcoin nodes but cannot impose changes on anyone. They can only submit code, and users freely choose to download the code and software versions they prefer. Code that is compatible with the current Bitcoin implementation is more likely to gain user acceptance and downloads than incompatible code, as incompatible code can only be effective when an overwhelming majority of users in the network use it.
Therefore, Bitcoin exhibits a strong preference for the status quo. So far, only minor, uncontroversial changes have occurred, and every attempt to make large-scale changes to Bitcoin has ended in complete failure. This pleases long-term holders of Bitcoin, as they value Bitcoin's immutability and resistance to change the most. Among these attempts, the most notable has been the "scaling" attempts (increasing the size of individual blocks to increase the network's transaction capacity). Several projects have attempted to scale, garnering support from many prominent and early Bitcoin participants and striving for public support. Gavin Andresen is one of the most well-known figures associated with Bitcoin; he, along with many stakeholders (including some technically skilled developers and wealthy entrepreneurs), has actively promoted several attempts to give Bitcoin larger blocks.
Initially, Gavin Andresen and a programmer named Mike Hearn proposed "Bitcoin XT" in June 2015, aiming to increase Bitcoin's block size limit from the then 1MB to 8MB. However, most nodes preferred to maintain the 1MB block size and refused to upgrade. Subsequently, Mike Hearn was hired by a "financial institution blockchain alliance" to apply blockchain technology to financial markets, while an article in The New York Times praised Hearn as a hero desperately trying to save Bitcoin, claiming that due to the lack of recognition for heroes, Bitcoin had irretrievably headed toward failure. Hearn declared that "the Bitcoin experiment has failed," stating that the lack of growth in transaction capacity was a fatal obstacle for Bitcoin, and announced that he had sold all his Bitcoins. At that time, the price of Bitcoin was $350, and two years later, the price of Bitcoin had risen more than 40 times, while the "blockchain alliance" he joined had achieved nothing.
Gavin Andresen did not give up and immediately proposed a new fork under the name "Bitcoin Classic," still aiming to raise the block size to 8MB. This attempt also failed. By March 2016, the number of nodes supporting Bitcoin Classic began to decline. Next, the big block faction gathered again under the banner of "Bitcoin Unlimited" in 2017, this time with even greater momentum, including the world's largest mining machine manufacturers and super-rich individuals controlling the bitcoin.com domain, who spent countless resources promoting the big block movement. The media hyped it up, creating a sense of crisis for everyone following Bitcoin news on mainstream and social media. However, the fact is that the big block faction still did not succeed, and most nodes continued to run the 1MB version of Bitcoin.
Ultimately, in August 2017, the big block faction hard forked a version of Bitcoin called "Bitcoin Cash." Bitcoin Cash vividly demonstrated the fate of a forked coin that did not gain overwhelming consensus. Most people chose to stay on the original Bitcoin network, and the entire economic infrastructure remained concentrated on the original Bitcoin network; the value of Bitcoin was far higher than that of Bitcoin Cash, whose price continued to decline, falling to less than 5% of Bitcoin by November 2017. Bitcoin Cash not only failed to achieve economic value but also faced severe technical issues that made it nearly unusable. Since the new chain and Bitcoin use the same hashing algorithm, miners can mine on both chains and receive mining rewards from both sides. The value of Bitcoin is far higher than that of Bitcoin Cash, and the computational power for mining Bitcoin is much greater than that for mining Bitcoin Cash. However, once the mining profitability of Bitcoin Cash increases, a large amount of Bitcoin's computational power will shift over. This presents Bitcoin Cash with an unfortunate dilemma: if the mining difficulty is too high, computational power will leak out, and blocks will take a long time to mine, resulting in unconfirmed transactions; if the mining difficulty is too low, computational power will flood in, blocks will be mined too quickly, and the currency supply will increase too rapidly. The supply speed of Bitcoin Cash being faster than that of Bitcoin will lead to its mining rewards being quickly exhausted, making it impossible to attract miners in the future. More likely, it will lead Bitcoin Cash to continue hard forking to adjust the supply growth rate in hopes of achieving sustainable mining incentives. Only Bitcoin's forked coins will face this dilemma; Bitcoin itself will not. Bitcoin mining has always attracted the most computational power, and as miners purchase more mining equipment, the computational power continues to increase. However, for Bitcoin's forked coins, with lower value and lower mining difficulty, it is always difficult to resist the ravaging of computational power from higher-value chains.
Bitcoin Cash attempted to challenge and prove who the real Bitcoin is, but it failed. Another fork attempt, negotiated by many startups active in the Bitcoin economy, aimed to double the block size of Bitcoin but was canceled in November 2017 because its proponents recognized that they were unlikely to gain overwhelming support in the network and would ultimately likely end up with another forked coin and forked network. Through repeated education by facts, Bitcoin supporters began to dismiss such attempts; they knew that no matter how much hype there was, any attempt to change Bitcoin's consensus rules would lead to the birth of another imitation Bitcoin, just like so-called "altcoins," which, no matter how many details they copied, could not replicate Bitcoin's most important characteristic—immutability. Through the above analysis, we can recognize that Bitcoin's advantages do not lie in speed, convenience, or user-friendly experience; Bitcoin's value comes from its unchangeable monetary policy that no one can alter. Any group attempting to change a characteristic of Bitcoin to fork a new coin loses the most valuable fundamental attribute of Bitcoin—immutability—at the moment that coin is born.
Bitcoin is easy to use but almost impossible to change. Using Bitcoin is entirely voluntary; no one is forced to use Bitcoin. Once you choose to use Bitcoin, you must abide by its rules. Bitcoin is almost impossible to undergo substantial changes; any attempt merely adds another meaningless counterfeit. Bitcoin is Bitcoin; you can only fully accept everything about it, abide by its rules, and use the services it provides. For all practical intents and purposes, Bitcoin is supreme: it operates according to its own rules, and no outsider can change those rules. One might even imagine Bitcoin's parameters as akin to the rotations of the Earth, Sun, Moon, or stars—forces we cannot control; they exist rather than being changed.
[1] Adam Ferguson, An Essay on the History of Civil Society. (London: T. Cadell, 1782).
[2] After Bitcoin's production halved for the first time in 2012, some miners attempted to continue mining blocks with a subsidy of 50 new coins each, but this attempt was quickly rejected by other nodes, forcing them back to the original Bitcoin issuance plan.
[3] A Schelling Point, also known as a "focal point," is a tendency for people to make choices in game theory without communication, making this choice because it seems like a natural selection, hoping others will also make that choice. Schelling described it this way: "Each person's expected Schelling point is the choice that others expect him to expect to be made." Since it is impossible to accurately estimate how many Bitcoin nodes there are, for each node, the Schelling point is to maintain the existing consensus rules and avoid change.
[4] That is R3CEV. — Translator's note
[5] https://blog.plan99.net/the-resolution-of-the-bitcoin-experiment-dabb30201f7#.5jvqjf-9lg. — Translator's note
The fact is that the Bitcoin ledger can be accessed worldwide, and this ledger is immutable. As long as the Bitcoin network is operational, it will record every transaction that has occurred. Rather than saying Bitcoin is anonymous, it is more accurate to say it is pseudonymous (or using a pseudonym or alias). While it is not guaranteed, it is possible to establish a connection between a Bitcoin address and a person's real identity. Once that connection is established, all transactions associated with that address can be traced. When discussing the topic of anonymity, it is interesting to compare the anonymity of Bitcoin with that of the internet: both depend on how well you hide and how serious the seeker is. However, it is more difficult to be anonymous on Bitcoin than on the internet. You can easily dispose of a hardware device, an email address, or an IP address and never use it again, but it is challenging to completely erase the traces of funds on a Bitcoin address. Essentially, the blockchain architecture of Bitcoin is not suited for anonymity.
This means that for any crime with victims, it is unwise for criminals to use Bitcoin. The pseudonymous nature of Bitcoin means that addresses can be linked to real-world identities, and no matter how many years have passed since the crime, there is no ultimate safety. Even years later, police, victims, or any investigators may still find the connection between that address and a real person. The clues left by Bitcoin payments have become the reason many online drug dealers have been identified; it can be said that it is the myth of Bitcoin's complete anonymity that has led them to lose their way.
In other words, Bitcoin increases individual freedom but does not make it easier for them to commit crimes. Bitcoin is not a magic ring; it is an inseparable part of a future of peace and prosperity.
One notable type of crime involving Bitcoin is ransomware: invading a victim's computer, encrypting their files, and only decrypting them after the victim pays a ransom (usually in Bitcoin). This form of crime existed before the invention of Bitcoin; the invention of Bitcoin merely made it more convenient to carry out such crimes, and many believe this is the best example of Bitcoin facilitating crime. However, it is the laxity of computer security that has allowed these attacks to occur. If a company's computer system is locked by hackers and a ransom of thousands of dollars in Bitcoin is demanded, the real problem exposed by that company is far more serious than those thousands of dollars. What hackers seek may be thousands of dollars, but if the company's competitors, customers, or suppliers obtain the company's data, their appetite will be much larger than that of the hackers. In practical terms, ransomware will prompt companies to check and eliminate computer security vulnerabilities. This process will lead companies to adopt better security measures and promote the development of the security industry. In other words, Bitcoin has monetized the computer security market; initially, hackers profited from it, but in the long run, quality companies will possess the best security resources.
[1] Stein, Mara Lemos. "The Morning Risk Report: Terrorism Financing Via Bitcoin May Be Exaggerated." Wall Street Journal, 2017.
Hacker Attacks#
Resistance to attacks stems from three characteristics:
(1) Extremely simple design;
(2) Unmatched computational power, which has nothing to do except protect the system's simple design;
(3) Distributed nodes, where any change must first gain the unanimous consent of these nodes. Imagine surrounding a school with the infantry and equipment of the U.S. military to protect it from invasion, and you will understand how strong Bitcoin's defense capability is.
Bitcoin is essentially a ledger that records ownership of virtual currency. There are only 21 million Bitcoins in total worldwide, distributed across millions of different addresses, with fewer than 500,000 transactions occurring daily that result in the transfer of Bitcoin ownership. If one were to create a simple system that could achieve the above functions, the resources required would actually be very minimal. A $100 laptop could do it without interfering with internet access. The reason Bitcoin was not designed this way is that relying on a single computer to record transactions would necessitate unconditional trust in the computer's owner, and that computer would easily become a target for attacks.
The security of all computer networks relies on preventing certain machines from being penetrated by attackers and treating their records as the final record. Bitcoin does not do this; it takes a completely different approach: it does not protect all computers individually and operates under the assumption that all nodes are malicious attackers. Bitcoin does not establish trust in any network member but verifies everything they do. The verification process completed through Proof of Work consumes a large amount of computational power, which has proven to be very effective because it establishes Bitcoin's security on the basis of computational power, simple and direct, unaffected by any access or certificate issues. Assuming every node is dishonest, any node wishing to submit a new block to the Bitcoin ledger must incur enormous costs; if fraud is discovered, the costs incurred will be wasted. The economic incentives designed in Bitcoin make dishonest behavior extremely expensive, thus very difficult to succeed.
To hack Bitcoin, that is, to disrupt the transaction ledger, fraudulently transfer certain Bitcoins to specific accounts, or make the Bitcoin ledger unavailable, a node would need to submit an invalid block on the blockchain and get the network to accept that invalid block, allowing the blockchain to continue extending after the invalid block. However, in the Bitcoin system, the cost of verifying fraud is very low, while the cost of submitting blocks is very high and continues to rise, and the common interest of most nodes in the network is to keep Bitcoin alive. Therefore, the probability of attackers winning this struggle is extremely slim. As the cost of submitting blocks continues to rise, the probability of attackers winning becomes even slimmer.
The core of Bitcoin's design is that the cost of submitting new blocks and the cost of verifying block validity are extremely asymmetric. This means that forging transactions is only theoretically feasible, but economically it is nearly impossible. Therefore, the Bitcoin blockchain constitutes the most indisputable effective transaction ledger to date.
51% Attack
A 51% attack is a type of attack where the attacker uses a large amount of computational power to generate two payment transactions for the same Bitcoin, ultimately causing one of the transactions to fail and deceiving the recipient. If a miner controls a large amount of computational power, they can complete Proof of Work first in a short period. This miner can send a Bitcoin transaction A to the blockchain, allowing transaction A to be packaged into the Bitcoin blockchain, so the recipient believes they have received the payment. At the same time, they can fork the Bitcoin blockchain in front of the block containing transaction A, constructing a forked chain that includes transaction B, transferring the same Bitcoin to another address. Since the miner possesses a large amount of computational power, once the length of the forked chain exceeds the original chain, the attack succeeds, and the Bitcoin received by the recipient of transaction A will vanish.
The more computational power the attacker controls, the greater the likelihood that the fraudulent chain will surpass the original chain, erasing the original transaction and profiting. The reasoning sounds simple, but achieving it is much more difficult. The longer the recipient waits for confirmation, the lower the probability of the attacker succeeding. If the recipient is willing to wait for six confirmations, the likelihood of the attacker succeeding is virtually nonexistent.
In theory, a 51% attack is feasible, but in practice, the economic incentive system of the Bitcoin system makes it nearly impossible. If a miner successfully implements a 51% attack, it would severely undermine everyone's economic motivation to use Bitcoin and the demand for Bitcoin. Currently, a large amount of capital is used for mining, and Bitcoin mining has become a capital-intensive industry; the value of the returns (Bitcoin) from this capital depends on the integrity of the network, and Bitcoin mining companies will maintain their long-term profits rather than shoot themselves in the foot. To date, no Bitcoin double-spending transaction has ever been confirmed, let alone a successful attack.
The closest successful double-spending attack against Bitcoin occurred in 2013 when the website BetCoin Dice suffered losses totaling approximately 1,000 Bitcoins due to a double-spending attack (equivalent to about $100,000 at the time). However, the success of that attack was largely due to BetCoin Dice accepting zero-confirmation transactions, which significantly lowered the cost of the attack. Even if they had waited for one confirmation, executing the attack would have been much more difficult. This is also why the Bitcoin blockchain is unsuitable for large-scale commercial payments: the time to wait for a new block to obtain one confirmation is about 10 minutes. If a large payment service provider disregards the risks of zero-confirmation for the sake of convenience, it will become a prime target for malicious actors to implement double-spending attacks using large computational power.
Overall, if recipients do not wait for a few confirmations to ensure the validity of transactions, there is a theoretical possibility of a successful 51% attack. In fact, under the influence of economic incentives, those who possess large computational power will not use their power for a 51% attack. The result is that all who have waited for at least one confirmation have not suffered from a 51% attack.
If motivated by profit, a 51% attack is unlikely to succeed. However, such attacks may not always be motivated by profit; the attackers' goal may simply be to destroy Bitcoin. Governments or other entities could also build Bitcoin mining farms to gain control of the majority of the network's computational power and then use these devices to launch continuous double-spending attacks, destroying people's confidence in the network's security. However, the economic attributes of the mining industry would make such attacks unfeasible. Computational power is a highly competitive global market, and Bitcoin mining is the largest, most profitable, and fastest-growing use case for computational power worldwide. Attackers may calculate how much computational power they need to acquire to achieve 51% control and then invest the corresponding costs to purchase mining machines. However, this large-scale purchasing would only lead to a significant increase in equipment prices, benefiting existing miners, and more capital would be invested in mining. Large-scale purchasing would also lead mining machine manufacturers to increase investment, reducing the price of computational power per unit and causing the total computational power of the network to soar. As an outsider in the market, the attacker continuously purchases computational power but is always at a disadvantage because the growth of computational power not belonging to them is faster. As a result, the more resources invested in attacking Bitcoin, the faster Bitcoin's computational power grows, making it increasingly difficult to attack. Therefore, as stated before, although it is technically possible, the probability of a successful attack against the economic attributes of the Bitcoin network is virtually nonexistent.
Attackers, especially those backed by a nation, may attempt to control (seize) existing mining equipment and use these devices to attack the system, thereby reducing the security of the Bitcoin network. However, this strategy requires the cooperation of governments worldwide; the geographically highly distributed reality of Bitcoin mining poses significant challenges to this strategy. A more feasible method would be to control these devices not physically but through hardware backdoors.
Hardware Backdoors
Another possible way to disrupt or destroy the Bitcoin network is to compromise the hardware devices running Bitcoin software, allowing them to be infiltrated externally. For example, installing undetectable malware on mining nodes could enable outsiders to manipulate this hardware. When a 51% attack occurs, these devices could be shut down or remotely controlled.
Another possibility is to install spyware on users' computers to obtain their private keys and thereby control their Bitcoins. If such attacks become widespread, they would severely undermine the credibility of Bitcoin as an asset and reduce demand for Bitcoin.
Both types of attacks are theoretically feasible, and unlike the attack methods mentioned in the previous section, they do not need to be completely successful to create enough chaos to damage Bitcoin's reputation and demand. In a situation where there are only a few manufacturers of mining equipment, attacks on mining devices are more likely to succeed, which is one of the key points concerning Bitcoin's success or failure. However, as the Bitcoin mining industry develops, it will attract more manufacturers to produce mining equipment, reducing the likelihood of catastrophic impacts on the Bitcoin network due to the mistakes of a single manufacturer.
As for attacks on personal computers, such attacks are less likely to cause systemic impacts because there are countless manufacturers worldwide capable of producing various personal devices that can access the Bitcoin network. If a particular manufacturer encounters problems, the result is merely that consumers switch to another manufacturer. Moreover, users can generate private keys and addresses on offline computers that are never connected to the internet; a more paranoid approach would be to generate private keys and addresses on an offline device and then destroy that device. The Bitcoins contained in those private keys will be immune to any form of network attack.
The defense against these attacks is especially rooted in the anarchist and cypherpunk orientation deeply ingrained in Bitcoin enthusiasts, which leads them to believe that it is better to verify than to trust. Bitcoin enthusiasts are typically more technically skilled than the general public and will be very careful to check the software and hardware they use. The open-source nature of the code and peer review is also an important barrier against such attacks. Due to the distributed nature of the Bitcoin network, such attacks usually only cause significant losses to individual victims, at most causing temporary chaos in the system, but it is nearly impossible to paralyze the entire network or completely destroy people's demand for Bitcoin. It should be noted that it is economic incentives that give Bitcoin its value, not any hardware. No single device is indispensable for Bitcoin's operation; all can be replaced. That said, if the manufacturers of Bitcoin hardware become more diverse and no single manufacturer holds a significant influence over the overall situation, Bitcoin will survive better and be more robust.
Attacks on the Internet and Infrastructure
One of the most common misconceptions about Bitcoin is that if important communication infrastructure is shut down, or in other words, if the internet is shut down, the Bitcoin network will be killed. These misconceptions stem from the belief that the Bitcoin network is a traditional network composed of specialized hardware and infrastructure, which has vulnerabilities that attackers fear. However, Bitcoin is a software protocol that can run on any of the billions of computers distributed globally. Bitcoin has no single point of risk; any hardware device running the Bitcoin protocol is not indispensable. Any computer that can connect to the internet can run the Bitcoin network. From this perspective, Bitcoin is similar to the internet; it is the protocol that connects computers to become the internet, not specific hardware devices. The data flow transmitting Bitcoin information is not large, accounting for only a tiny fraction of the total internet traffic. The Bitcoin blockchain transmits only 1MB of data every 10 minutes, so it does not require a large amount of infrastructure like other networks. There are countless wired or wireless data transmission technologies worldwide; as long as one of them is available, Bitcoin nodes can connect to the network. To create a world where Bitcoin users cannot connect, one would have to completely destroy the global information, data, and communication infrastructure. This is clearly impossible; modern life relies heavily on information connectivity, and without the normal operation of communication infrastructure, many essential services and life-and-death matters cannot be accomplished. Attempting to simultaneously shut down the internet and infrastructure would cause significant harm to any society but would still not stop the flow of Bitcoin, as distributed machines can still connect with each other using their protocols and encrypted communications. There are too many computers and networks in the world, and too many people using them; no force can make them all stop working simultaneously. The only possible scenario for killing Bitcoin is an apocalyptic disaster, after which no one would care whether Bitcoin is alive or dead. Among the various threats to Bitcoin that people often mention, I believe this is the most alarmist.
There is no need for science fiction fantasies to kill Bitcoin, such as destroying the telecommunications infrastructure of all humanity; Bitcoin itself faces much more realistic threats that stem from its foundational design. The hard currency attribute of Bitcoin, which cannot be altered, and the censorship-resistant digital cash attribute that does not require a trusted third party, are all based on the consensus rules of the Bitcoin network, especially the rules governing the supply of currency, which are difficult to change. As discussed earlier, the reason for achieving the current stable state is that if network members want to deviate from the current consensus rules, it is likely to be filled with risks and unfavorable to themselves. The reason it is filled with risks and unfavorable is that there are so many nodes in the entire network that coordinated action is nearly impossible. Therefore, if the cost of running Bitcoin nodes rises significantly, more and more users will be unable to run Bitcoin nodes, leading to a decrease in the number of nodes in the Bitcoin network. A network with only a few dozen nodes is insufficient to be called a decentralized network; at that point, it is likely that a few nodes will collude to change network rules for their own benefit or even deliberately damage the network.
In my view, this remains a technical threat that Bitcoin must take seriously in the medium to long term. Currently, the main limitation for individuals running Bitcoin nodes is network bandwidth. With the block size limited to below 1MB, the situation is still manageable. Increasing the block size through a hard fork will raise the cost of running nodes, leading to a decrease in the number of nodes. However, like the previously mentioned threats, this threat exists only in theory; the actual implementation is unlikely due to the economic incentives of the system being unfavorable to such behavior. The past few attempts to increase block size have all failed, which is evidence of this.
Breaking the SHA-256 Hash Algorithm
The SHA-256 hash algorithm is an essential part of the Bitcoin system's operation. In simple terms, the input to the hashing process can be any data, and through irreversible mathematical calculations, an output is generated, which is a fixed-size string. In other words, it can easily generate a hash value for any data but cannot reverse-engineer the original data from the hash result. However, theoretically, if the computational power of computers rises to the point where these hash functions can be cracked, all Bitcoin addresses would face the risk of being compromised.
We cannot predict whether or when this scenario will occur, but if it does, it would pose a serious technical threat to Bitcoin. Bitcoin's response would be to switch to a stronger encryption algorithm, but the tricky part of changing encryption algorithms lies in how to coordinate the vast majority of nodes to abandon the old consensus rules and switch to the new consensus rules using the new hash function. All the difficulties previously discussed regarding forked Bitcoins will manifest here, but at this point, Bitcoin will face a real threat; holders continuing to use the old consensus rules will be at risk of being attacked. Therefore, we can expect an overwhelming majority of users to choose to hard fork. An interesting question remains: whether this migration will proceed in an orderly manner, whether users will migrate to the same new chain, or whether Bitcoin will split into several branches using different encryption algorithms. The only thing that can be certain is that once the SHA-256 algorithm is compromised, the economically rational choice for network users will be to switch to a stronger algorithm, and they will do so simultaneously.
Returning to Sound Money
Discussions about how Bitcoin could fail or be destroyed mostly focus on technical attacks. However, a more feasible means of attack is to undermine people's economic motivation to use Bitcoin. Any of the methods described earlier are unlikely to successfully attack or destroy Bitcoin because they conflict with the economic motivations driving people to use Bitcoin. Just as it is impossible to ban people from using wheels and knives, as long as these technologies are useful to people, bans cannot succeed; people will always find various legal or illegal ways to continue using them. The way to get people to abandon a technology is not to ban it but to invent better alternatives that eliminate the demand for it. We cannot eliminate typewriters through bans or legislation; it was the rise of personal computers that rendered them obsolete.
The demand for Bitcoin arises from the needs of people around the world; people need to conduct transactions that bypass political controls, and they need a means of storing value that is resistant to inflation. As long as political authorities prohibit and restrict people's transfer of funds, and as long as government currencies can be arbitrarily inflated according to the whims of politicians, the demand for Bitcoin will exist. The continuously slowing supply will cause the value of Bitcoin to appreciate, attracting more people to use Bitcoin to store wealth.
Suppose the world's banks and monetary systems suddenly reverted to the gold standard of the late 19th century, where personal freedom and hard currency are the supreme principles. In that case, the demand for Bitcoin might significantly decrease. The scenario might unfold like this: the world turns to the gold standard, leading to a substantial reduction in demand for Bitcoin, causing the price of Bitcoin to drop significantly, inflicting considerable harm on Bitcoin holders, further increasing the volatility of Bitcoin prices, and causing Bitcoin's development to regress for many years. As the volatility of Bitcoin increases, the international currency standard that emerges is a reliable and relatively stable hard currency, severely diminishing people's motivation to use Bitcoin. In a world where the desires of governments to control everything and to inflate are strictly limited by the gold standard, the first-mover advantage of gold and its relatively stable purchasing power would create an insurmountable barrier for Bitcoin, making it difficult for Bitcoin to quickly gain a large user base and thus unable to grow to a sufficiently large scale to achieve any form of stable price.
However, the possibility of a global return to sound money and free government is extremely slim; these concepts are largely at odds with the beliefs of the vast majority of politicians and voters worldwide, who have been indoctrinated for generations with the idea that government control over money and morality is essential for any society to function. Furthermore, even if such a political and monetary transformation were possible, due to the decreasing growth rate of Bitcoin's supply, it would still be an attractive speculative target for many people, which in itself would lead to further growth of Bitcoin and a greater monetary role. In my view, a global return to gold as a currency may be the greatest threat Bitcoin faces, but this is both unlikely to happen and unlikely to completely destroy Bitcoin.
Another possibility for eliminating Bitcoin is the invention of another sound currency that surpasses Bitcoin. Many people seem to believe that other cryptocurrencies that imitate Bitcoin can achieve this. However, I firmly believe that any cryptocurrency designed to imitate Bitcoin cannot compete with it, and the reasons will be elaborated in the next section. In short, Bitcoin is the only truly decentralized electronic currency, spontaneously forming a delicate balance between miners, developers, and users, with no single party able to control Bitcoin. The feasibility of recreating a currency based on such a design exists only in theory. Today, the feasibility of Bitcoin has become apparent; any imitation will inevitably be top-down and will inevitably become a centrally controlled network, forever unable to escape the control of its founders.
Therefore, when it comes to the structure or technology of Bitcoin, no imitation can replace it. Only a completely new design and technology that achieves a new form of digital cash and hard currency could compete with it. Until such technology is born, we cannot predict whether it will appear or when it will appear. Based on years of understanding the development process of digital cash, we all know that this invention is by no means easy.
[1] J.W. Weatherman initiated an open-source project to assess the threats faced by the Bitcoin network; see BTCthr-eats.com.
Not only is internet currency, but a key element of any fiat currency system is trust. While internet currency does not have a unified measure of value, it is still a form of currency based on credit, and its essence is the exchange of credit. From this perspective, internet currency and virtual financial assets represented do not subvert modern finance but rather accelerate the speed and process of modern finance returning to its original nature, strengthening the role of credit exchange and accelerating finance's return to its roots.
The emergence of this new phenomenon of internet currency has brought new vitality to the financial market. Internet currency is generated based on community credit, and new consumption behaviors can compensate for the existing financial credit deficiencies and shortcomings, reinforcing the entire society's concept of credit; internet currency primarily involves participation in consumption behavior, forming a value that accumulates through continuous participation in the virtual world, helping to guide the formation of consumption-driven economic growth.