A condition in which more than half the computing power on a cryptocurrency network is controlled by a single miner or group of miners. That amount of power theoretically makes them the authority on the network. This means that every client on the network believes the attacker’s hashed transaction block. This gives them control over the network, including the power to:
A bitcoin address is used to receive and send transactions on the bitcoin network. It contains a string of alphanumeric characters, but can also be represented as a scannable QR code. A bitcoin address is also the public key in the pair of keys used by bitcoin holders to digitally sign transactions (see Public key).
Anti-Money Laundering techniques are used to stop people converting illegally obtained funds, to appear as though they have been earned legally. AML mechanisms can be legal or technical in nature. Regulators frequently apply AML techniques to bitcoin exchanges.
An Application Specific Integrated Circuit is a silicon chip specifically designed to do a single task. In the case of bitcoin, they are designed to process SHA-256 hashing problems to mine new bitcoins.
A piece of equipment containing an ASIC chip, configured to mine for bitcoins. They can come in the form of boards that plug into a backplane, devices with a USB connector, or standalone devices including all of the necessary software, that connect to a network via a wireless link or ethernet cable.
A Cryptocoin created by a German Beavercoin Wallet.
This private, open-ended trust invests exclusively in bitcoins and uses a state-of-the-art protocol to store them safely on behalf of its shareholders.
The full list of blocks that have been mined since the beginning of the bitcoin cryptocurrency. The block chain is designed so that each block contains a hash drawing on the blocks that came before it. This is designed to make it more tamperproof.
The reward given to a miner which has successfully hashed a transaction block. This can be a mixture of coins and transaction fees, depending on the policy used by the cryptocurrency in question, and whether all of the coins have already been successfully mined. Bitcoin currently awards 25 bitcoins for each block. The block reward halves when a certain number of blocks have been mined. In bitcoin’s case, the threshold is every 210,000 blocks.
A project founded by bitcoin enthusiast Josh Rossi, to form a public outcry bitcoin exchange in New York’s Union Square. Named after the Buttonwood agreement, which formed the basis for the New York Stock Exchange in 1792.
The act of hashing a bitcoin transaction successfully into a transaction block, and cementing its validity. A single confirmation will take around 10 minutes, which is the average length of time for a transaction block to be hashed. However, some more sensitive or larger transactions may require multiple confirmations, meaning that more blocks must be hashed and added to the block chain after the transaction’s block has been hashed. Each time another block is added to the block chain after the transaction’s block, the transaction is confirmed again.
A proposed add-on function for bitcoin that would enable bitcoin users to give them additional attributes. These attributes could be user-defined, enabling you to mark a bitcoin as a share of stock, or a physical asset. This would enable bitcoins to be traded as tokens for other property.
Central Processing Unit – the ‘brain’ of a computer. In the early days, these were used to hash bitcoin transactions, but are now no longer powerful enough. They are still sometimes used to hash transactions for altcoins.
Another name for the input used in a bitcoin’s generation transaction. When a bitcoin is mined, it doesn’t come from another bitcoin user, but is generated as a reward for the miner. That reward is recorded as a transaction, but instead of another user’s bitcoin address, some arbitrary data is used as the input.
Coinbase is also the name of a bitcoin wallet service that also offers payment processing services for merchants and acts as an intermediary for purchasing bitcoins from exchanges.
A distributed denial of service attack uses large numbers of computers under an attacker’s control to drain the resources of a central target. They often send small amounts of network traffic across the Internet to tie up computing and bandwidth resources at the target, which prevents it from providing services to legitimate users. Bitcoin exchanges have sometimes been hit with DDoS attacks.
The reduction of prices in an economy over time. It happens when the supply of a good or service increases faster than the supply of money, or when the supply of money is finite, and decreases. This leads to more goods or services per unit of currency, meaning that less currency is needed to purchase them. This carries some downsides. When people expect prices to fall, it causes them to stop spending and hoard money, in the hope that their money will go further later. This can depress an economy.
A Cryptocoin created from Germans for Germany. Max 210 Million Proof of Work Coins DEM Wallet (Deutsche Elektronische Mark
This number determines how difficult it is to hash a new block. It is related to the maximum allowed number in a given numerical portion of a transaction block’s hash. The lower the number, the more difficult it is to produce a hash value that fits it. Difficulty varies based on the amount of computing power used by miners on the bitcoin network. If large numbers of miners leave a network, the difficulty would decrease. Thus far, however, bitcoin’s growing popularity has attracted more computing power to the network, meaning that the difficulty has increased.
The act of spending bitcoins twice. It happens when someone makes a transaction using bitcoins, and then makes a second purchase from someone else, using the same bitcoins. They then convince the rest of the network to confirm only one of the transactions by hashing it in a block. Double spending is not easy to do, thanks to the way that the bitcoin network operates, but it is nevertheless a risk run by those accepting zero-confirmation transactions.
A transaction for an extremely small amount of bitcoins, which offers little financial value, but takes up space in the block chain. The bitcoin developer team has taken efforts to eliminate dust transactions by increasing the minimum transaction amount that will be relayed by the network.
The act of holding funds or assets in a third-party account to protect them during an asynchronous transaction. If Bob wants to send money to Alice in exchange for a file, but they cannot conduct the exchange in person, then how can they trust each other to send the money and file to each other at the same time? Instead, Bob sends the money to Eve, a trusted party who holds the funds until Bob confirms that he has received the file from Alice. She then sends Alice the money.
A currency, conjured out of thin air, which only has value because people say it does. Constantly under close scrutiny by regulators due to its known application in money laundering and terrorist activities. Not to be confused with bitcoin.
The creation of an alternative ongoing version of the block chain, typically because one set of miners begins hashing a different set of transaction blocks from another. It can be caused maliciously, by a group of miners gaining too much control over the network (see 51% attack), accidentally, thanks to a bug in the system, or intentionally, when a core development team decides to introduce substantial new features into a new version of a client. A fork is successful if it becomes the longest version of the block chain, as defined by difficulty.
A Field Programmable Gate Array is a processing chip that can be configured with custom functions after it has been fabricated. Think of it as a blank silicon slate on which instructions can be written. Because FPGAs can be produced en masse and configured after fabrication, manufacturers benefit from economies of scale, making them cheaper than ASIC chips. However, they are usually far slower.
Graphical Processing Unit. A silicon chip specifically designed for the complex mathematical calculations needed to render millions of polygons in modern computer game graphics. They are also well suited to the cryptographic calculations needed in cryptocurrency mining.
A mathematical process that takes a variable amount of data and produces a shorter, fixed-length output. A hashing function has two important characteristics. Firstly, it is mathematically difficult to work out what the original input was by looking at the output. Secondly, changing even the tiniest part of the input will produce an entirely different output.
When the value of money drops over time, causing prices for goods to increase. The result is a drop in purchasing power. Effects include less motivation to hoard money, and more motivation to spend it quickly while the prices of goods are still low.
The part of a bitcoin transaction denoting where the bitcoin payment has come from. Typically, this will be a bitcoin address, unless the transaction is a generation transaction, meaning that the bitcoin has been freshly mined (see Coinbase).
In foreign currency trading, leverage multiplies the real funds in your account by a given factor, enabling you to make trades that result in significant profit. By giving leverage to a trader, the trading exchange is effectively lending them money, in the hope that it will earn back more than it loaned in commission. Leverage is also known as a margin requirement.
The ability to buy and sell an asset easily, with pricing that stays roughly similar between trades. A suitably large community of buyers and sellers is important for liquidity. The result of an illiquid market is price volatility, and the inability to easily determine the value of an asset.
An instruction given to an exchange, asking it to buy or sell an asset at the going market rate. In a bitcoin exchange, you would place a market order if you simply wanted to buy or sell bitcoins immediately, rather than holding them until a set market condition is triggered to try and make a profit.
Paying a tiny amount for an asset or service, primarily online. Micro-transactions are difficult to perform under conventional payment systems, because of the heavy commissions involved. It is difficult to pay two cents to read an online article using your credit card, for example.
A service that mixes your bitcoins with someone else’s, sending you back bitcoins with different inputs and outputs from the ones that you sent to it. A mixing service (also known as a tumbler) preserves your privacy because it stops people tracing a particular bitcoin to you. It also has the potential to be used for money laundering.
One of the first bitcoin exchanges, and historically the most popular, although it now faces challenges from other exchanges such as BitStamp. Based in Japan, Mt. Gox was started by Jed McCaleb in 2010.
A random string of data used as an input when hashing a transaction block. A nonce is used to try and produce a digest that fits the numerical parameters set by the bitcoin difficulty. A different nonce will be used with each hashing attempt, meaning that billions of nonces are generated when attempting to hash each transaction block.
Peer-to-peer. Decentralized interactions that happen between at least two parties in a highly interconnected network. An alternative system to a ‘hub-and-spoke’ arrangement, in which all participants in a transaction deal with each other through a single mediation point.
A printed sheet containing one or more public bitcoin addresses and their corresponding private keys. Often used to store bitcoins securely, instead of using software wallets, which can be corrupted, or web wallets, which can be hacked or simply disappear. A useful form of cold bitcoin storage.
A collection of mining clients which collectively mine a block, and then split the reward between them. Mining pools are a useful way to increase your probability of successfully mining a block as the difficulty rises.
The mining of coins by a cryptocurrency’s founder before that coin has been announced and details released to others who may wish to mine the coin. Pre-mining is a common technique used with scamcoins, although not all pre-mined coins are scamcoins (see Scamcoins).
An alphanumeric string kept secret by the user, and designed to sign a digital communication when hashed with a public key. In the case of bitcoin, this string is a private key designed to work with a public key. The public key is a bitcoin address (see Bitcoin address).
Inflating the value of a financial asset that has been produced or acquired cheaply, using aggressive publicity and often misleading statements. The publicity causes others to acquire the asset, forcing up its value. When the value is high enough, the perpetrator sells their assets, cashing in and flooding the market, which causes the value to crash.
A system that ties mining capability to computational power. Blocks must be hashed, which is in itself an easy computational process, but an additional variable is added to the hashing process to make it more difficult. When a block is successfully hashed, the hashing must have taken some time and computational effort. Thus, a hashed block is considered proof of work.
A two-dimensional graphical block containing a monochromatic pattern representing a sequence of data. QR codes are designed to be scanned by cameras, including those found in mobile phones, and are frequently used to encode bitcoin addresses.
A payment network that can be used to transfer any currency (including ad hoc currencies that have been created by users). The network consists of payment nodes and gateways operated by authorities. Payments are made using a series of IOUs, and the network is based on trust relationships.
An underground online marketplace, generally used for illicit purchases, often with cryptocurrencies such as bitcoin. Silk Road was shut down in early October 2013 by the FBI after owner Ross Ulbricht was arrested.
When a bitcoin block is successfully hashed, any others attempting to hash it may as well stop, because it is now ‘stale’. They would simply be repeating work that someone else has already done, for no reward. The term is also used in mining pools to describe a share of a hashing job that has already been completed.
An analysis of how closely related two addresses are when they have both held a particular bitcoin. A taint analysis could be used to determine how many steps it took for bitcoins to move from an address known for stolen coins, to the current address.
A transaction in which the merchant is happy to provide a product or service before the bitcoin’s transmission has been confirmed by a miner and added to the block chain. It can carry a risk of double spending.