wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Bit Coins

profile
103 Sakshi Janaskar
May 19, 2022
8 Likes
6 Discussions
144 Reads

Bitcoin is a cryptocurrency created in 2009. Marketplaces called “bitcoin exchanges” allow people to buy or sell bitcoins using different currencies.

Bitcoin is a new currency that was created in 2009 by an unknown person using the alias Satoshi Nakamoto. Transactions are made with no middle men – meaning, no banks! Bitcoin can be used to book hotels on Expedia, shop for furniture on Overstock and buy Xbox games. But much of the hype is about getting rich by trading it. The price of bitcoin skyrocketed into the thousands in 2017.

Buying bitcoins

Buy on an Exchange

Many marketplaces called “bitcoin exchanges” allow people to buy or sell bitcoins using different currencies. Coinbase is a leading exchange, along with Bitstamp and Bitfinex. But security can be a concern: bitcoins worth tens of millions of dollars were stolen from Bitfinex when it was hacked in 2016.

Transfers

People can send bitcoins to each other using mobile apps or their computers. It’s similar to sending cash digitally.

Mining

People compete to “mine” bitcoins using computers to solve complex math puzzles. This is how bitcoins are created. Currently, a winner is rewarded with 12.5 bitcoins roughly every 10 minutes.

Bitcoin wallet

Bitcoins are stored in a “digital wallet,” which exists either in the cloud or on a user’s computer. The wallet is a kind of virtual bank account that allows users to send or receive bitcoins, pay for goods or save their money. Unlike bank accounts, bitcoin wallets are not insured by the FDIC.

Though each bitcoin transaction is recorded in a public log, names of buyers and sellers are never revealed – only their wallet IDs. While that keeps bitcoin users’ transactions private, it also lets them buy or sell anything without easily tracing it back to them. That’s why it has become the currency of choice for people online buying drugs or other illicit activities.

 

Comments ()


Sign in

Read Next

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

security controls

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Kernel in Operating System

Blog banner

Deadlock and Starvation

Blog banner

File management

Blog banner

Linux

Blog banner

Self-love: Being the reason of your own smile

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Man In The Middle Attack

Blog banner

Data Mining

Blog banner

Why Data Security Is Important

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

Deadlock and Starvation

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

Vikrant’s first blog

Blog banner

Quality check in IT services

Blog banner

Real Time Scheduling

Blog banner

INSTAGRAM

Blog banner

USES OF WHATSAPP

Blog banner

Wiretapping

Blog banner

Old age lifestyle

Blog banner

Evolution of Operating Sytems

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

Royal enfield

Blog banner

Wedding photographer

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

Virtual Memory

Blog banner

Processing Crime and Incident Scenes

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

DURGA POOJA

Blog banner

Explaining Buffer Overflow with Example

Blog banner

BUFFER OVERFLOW_142

Blog banner

Loneliness

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Data Mapping

Blog banner

Short note on Microsoft office

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner