10.07.2015 Views

bitcoin final

bitcoin final

bitcoin final

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Bitcoin: risk factors for insurance 16papers/fc14_submission_71.pdf; Sarah Meiklejohn,et al. “A Fistful of Bitcoins: Characterizing PaymentsAmong Men with No Names” Proceedings ofthe 2013 conference on Internet measurementconference (ACM, 2013) available at http://cseweb.ucsd.edu/~smeiklejohn/files/imc13.pdf25. For example, after suffering $5 million in lossesfrom a local attack wherein private keys werecompromised, prominent Bitcoin exchange Bitstamprebuilt its platform utilising Amazon Web Servicesfor storage and computing.26. See Gavin Andresen, BIP 0011, https://github.com/<strong>bitcoin</strong>/bips/blob/master/bip-0011.mediawiki27. Bitstamp, Bitstamp is open for business - Better thanever! (Jan, 2015).28. Ben Davenport, No Sleep till Multi-Sig, Medium.com(Jan. 2015) https://medium.com/@bendavenport/nosleep-till-multi-sig-7db367998bc729. See Blockchain.info, http://blockchain.info/30. The ECDSA algorithm can be tested at this site:http://kjur.github.io/jsrsasign/sample-ecdsa.htmlKey pairs can be generated and signing ofdocuments tested out.31. See Bitcoin Wiki, Technical background of version1 Bitcoin addresses https://en.<strong>bitcoin</strong>.it/wiki/Technical_background_of_version_1_Bitcoin_addresses32. See Certicom, An Introduction to the Uses of ECCbasedCertificates https://www.certicom.com/index.php/an-introduction-to-the-uses-of-eccbased-certificates33. Giulio Prisco, Gentleman Hacker Returns StolenBitcoins to Blockchain.info, Cryptocoinsnews(Dec 2014) https://www.cryptocoinsnews.com/gentleman-hacker-returns-stolen-<strong>bitcoin</strong>sblockchain-info/34. Alyson Margaret, Blockchain.info SecurityDisclosure, Blockchain Blog (Dec 2014) (“Whenmaking a scheduled software update overnight toour web-wallet, our development team inadvertentlyaffected a part of our software that ensures privatekeys are generated in a strong and secure manner.The issue was present for a brief period of timebetween the hours of 12:00am and 2:30am GMTon December the 8th 2014. The issue was detectedquickly and immediately resolved. In total, this issueaffected less than 0.0002% of our user base and waslimited to a few hundred addresses.”)35. Ibid, note 33.36. Christian Decker and Roger Wattenhofer, BitcoinTransaction Malleability and MtGox, arXiv:1403.6676(Mar. 2014) http://arxiv.org/abs/1403.667637. Ibid, note 36.38. The mining pool GHash.io has crossed the 51% markfor brief periods although no exploitation of thispower has been authoritatively observed. GHash.io has promised to abstain from achieving suchdisproportionate power in the future. See http://bit.ly/1gMDDGb39. Gavin Andresen, Neutralizing a 51% attack,GavinTech (May 2012) http://gavintech.blogspot.com/2012/05/neutralizing-51-attack.html40. Gavin Andresen, “What’s the plan about the sybilattack?” BitcoinTalk.org (Comment #3, May 12,2011) https://<strong>bitcoin</strong>talk.org/index.php?topic=8051.msg117573#msg11757341. See Daniel Cawrey, “What are Bitcoin Nodes andWhy do we Need Them?” CoinDesk (May 2014)http://www.coindesk.com/<strong>bitcoin</strong>-nodes-need/42. See David Bradbury, “Bitcoin network recoveringfrom DDoS attack” CoinDesk (June 2013) http://www.coindesk.com/<strong>bitcoin</strong>-network-recoveringfrom-ddos-attack/(Bitcoin core developer Jeff Garzikexplains, “Operationally, network attacks are farcheaper. Any smart attacker is going to look for acheaper way to attack Bitcoin. Network attacks areone of the big worries right now.”).43. See Gavin Andresen, “BIP 50: March 2013 Chain ForkPost-Mortem” GitHub (Mar 2013) https://github.com/<strong>bitcoin</strong>/bips/blob/master/bip-0050.mediawiki44. See Ian Cutress, The Rush to Bitcoin ASICs: RaviIyengar launches CoinTerra, AnandTech (Aug 2013)http://www.anandtech.com/show/7246/the-rushto-<strong>bitcoin</strong>-asics-ravi-iyengar-launches-cointerra45. The vulnerability of the network to a large scaleDDoS attack at the hands of a state or other largeentity could, in theory, be minimised by increasingthe number of acceptor nodes (thereby increasingthe number of nodes that must be spammed) orby enhancing existing protocol protections againstspammy connections.46. Tyler Moore and Nicolas Christin, Beware theMiddleman: Empirical Analysis of Bitcoin-ExchangeRisk, 6859 Financial Cryptography and Data SecurityLecture Notes in Computer Science 25 (2013).47. Vitalik Buterin, Multisig: The Future of Bitcoin, BitcoinMagazine (Mar 2014) https://<strong>bitcoin</strong>magazine.com/11108/multisig-future-<strong>bitcoin</strong>/Lloyd’s Emerging Risk Report – 2015

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!