3 reasons bitcoins aren't in your wallet yet
Security and flexibility are among several big challenges, experts said
IDG News Service - As Bitcoin's popularity grows, so does talk about its standing as legal tender, but there are lingering issues that need to be sorted out before people start using Bitcoin to buy everyday things, experts said Monday.
Bitcoin has been described both as a store of value and a currency, but it's debatable whether it is either of those things. Its price can swing wildly from day to day, if not the hour, and its reputation has been tarnished by its connection to the sale of illegal goods and other illicit activity such as money laundering.
For those reasons and more, Bitcoin has a long way to go before it becomes a mainstream form of payment. Here are three challenges that generated some discussion at The Future of Money and Technology, a conference in San Francisco.
1. Buyer beware
For starters, Bitcoin transactions are designed to be irreversible. So if you buy something online from a merchant that accepts Bitcoin and the transaction turns out to be a scam, or the payment is sent to the wrong place, or any number of other things happen, the buyer will probably lose that money.
"You're dealing with the honesty of the vendor," said Steve Kirsch, CEO of OneID, a startup that provides encryption services to protect people's data. "It's like giving people cash," he said during a panel discussion at the conference.
Other panelists, all Bitcoin supporters, agreed that in 2014 more services could appear designed to address this problem, such as escrow accounts that could channel money back to the buyer in the case of fraudulent transactions. The Bitcoin system is built using an open-source framework, so those types of developments could actually happen.
New companies could crop up next year to address this problem. Existing players such as Bitcoin payment processors might also add new features to their services in this area, panelists said.
2. Keeping your bitcoins safe
Every bitcoin has a private key associated with it that, if decrypted, allows the bitcoin to be sent to another computer using peer-to-peer software. Because these private keys are often stored on personal computers or within Web-based services, bitcoins are vulnerable to theft.
"All of the existing mechanisms for security, including its [verification] signatures, are problematic," OneID's Kirsch said. Any kind of malware attack can be directed at someone's computer to steal their bitcoins, he said.
There are different ways of storing this private key. Coinbase and others offer digital wallets. Other companies have "offline" or paper-based wallets to put key ownership back into the user's hands, literally: The Bitcoin addresses and private keys are printed on a piece of paper. And the Winklevoss twins of Facebook fame have even offered up a solution with so-called vaults.
- Aberdeen: Securing the Evolving Datacenter This report highlights ways security technologies and services are evolving to provide the visibility and control needed to deploy workloads flexibly in the...
- Evolving Your Data Center? Evolve Your Data Center Security Your datacenter is evolving - your datacenter security should be evolving, too. Key security technologies and services are being adapted by leading solution...
- Agile Masking Transforms Data Security Most data masking products can create masked data copies but not distribute or update them, resulting in projects that fail to live up...
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Data Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!