3 reasons bitcoins aren't in your wallet yet
Security and flexibility are among several big challenges, experts said
IDG News Service - As Bitcoin's popularity grows, so does talk about its standing as legal tender, but there are lingering issues that need to be sorted out before people start using Bitcoin to buy everyday things, experts said Monday.
Bitcoin has been described both as a store of value and a currency, but it's debatable whether it is either of those things. Its price can swing wildly from day to day, if not the hour, and its reputation has been tarnished by its connection to the sale of illegal goods and other illicit activity such as money laundering.
For those reasons and more, Bitcoin has a long way to go before it becomes a mainstream form of payment. Here are three challenges that generated some discussion at The Future of Money and Technology, a conference in San Francisco.
1. Buyer beware
For starters, Bitcoin transactions are designed to be irreversible. So if you buy something online from a merchant that accepts Bitcoin and the transaction turns out to be a scam, or the payment is sent to the wrong place, or any number of other things happen, the buyer will probably lose that money.
"You're dealing with the honesty of the vendor," said Steve Kirsch, CEO of OneID, a startup that provides encryption services to protect people's data. "It's like giving people cash," he said during a panel discussion at the conference.
Other panelists, all Bitcoin supporters, agreed that in 2014 more services could appear designed to address this problem, such as escrow accounts that could channel money back to the buyer in the case of fraudulent transactions. The Bitcoin system is built using an open-source framework, so those types of developments could actually happen.
New companies could crop up next year to address this problem. Existing players such as Bitcoin payment processors might also add new features to their services in this area, panelists said.
2. Keeping your bitcoins safe
Every bitcoin has a private key associated with it that, if decrypted, allows the bitcoin to be sent to another computer using peer-to-peer software. Because these private keys are often stored on personal computers or within Web-based services, bitcoins are vulnerable to theft.
"All of the existing mechanisms for security, including its [verification] signatures, are problematic," OneID's Kirsch said. Any kind of malware attack can be directed at someone's computer to steal their bitcoins, he said.
There are different ways of storing this private key. Coinbase and others offer digital wallets. Other companies have "offline" or paper-based wallets to put key ownership back into the user's hands, literally: The Bitcoin addresses and private keys are printed on a piece of paper. And the Winklevoss twins of Facebook fame have even offered up a solution with so-called vaults.
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva.
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Data Security White Papers | Webcasts