3 reasons bitcoins aren't in your wallet yet
Security and flexibility are among several big challenges, experts said
IDG News Service - As Bitcoin's popularity grows, so does talk about its standing as legal tender, but there are lingering issues that need to be sorted out before people start using Bitcoin to buy everyday things, experts said Monday.
Bitcoin has been described both as a store of value and a currency, but it's debatable whether it is either of those things. Its price can swing wildly from day to day, if not the hour, and its reputation has been tarnished by its connection to the sale of illegal goods and other illicit activity such as money laundering.
For those reasons and more, Bitcoin has a long way to go before it becomes a mainstream form of payment. Here are three challenges that generated some discussion at The Future of Money and Technology, a conference in San Francisco.
1. Buyer beware
For starters, Bitcoin transactions are designed to be irreversible. So if you buy something online from a merchant that accepts Bitcoin and the transaction turns out to be a scam, or the payment is sent to the wrong place, or any number of other things happen, the buyer will probably lose that money.
"You're dealing with the honesty of the vendor," said Steve Kirsch, CEO of OneID, a startup that provides encryption services to protect people's data. "It's like giving people cash," he said during a panel discussion at the conference.
Other panelists, all Bitcoin supporters, agreed that in 2014 more services could appear designed to address this problem, such as escrow accounts that could channel money back to the buyer in the case of fraudulent transactions. The Bitcoin system is built using an open-source framework, so those types of developments could actually happen.
New companies could crop up next year to address this problem. Existing players such as Bitcoin payment processors might also add new features to their services in this area, panelists said.
2. Keeping your bitcoins safe
Every bitcoin has a private key associated with it that, if decrypted, allows the bitcoin to be sent to another computer using peer-to-peer software. Because these private keys are often stored on personal computers or within Web-based services, bitcoins are vulnerable to theft.
"All of the existing mechanisms for security, including its [verification] signatures, are problematic," OneID's Kirsch said. Any kind of malware attack can be directed at someone's computer to steal their bitcoins, he said.
There are different ways of storing this private key. Coinbase and others offer digital wallets. Other companies have "offline" or paper-based wallets to put key ownership back into the user's hands, literally: The Bitcoin addresses and private keys are printed on a piece of paper. And the Winklevoss twins of Facebook fame have even offered up a solution with so-called vaults.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Top tips for securing big data environments - Why big data doesn't have to mean big security challenges Organizations don't have to feel overwhelmed when it comes to securing big data environments. The same security fundamentals for securing databases, data warehouses...
- Top 3 Myths about Big Data Security : Debunking common misconceptions about big data security Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are...
- Three guiding principles for data security and compliance Data security is a moving target-as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it...
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva.
- How SIEM Addresses the Challenges of Big Security Data This webcast will help you understand today's big data security challenges and how intelligent and scalable SIEM solutions give IT the tools and... All Data Security White Papers | Webcasts