Questions tagged [security]

Security issues with the design or implementation of Bitcoin.

Security in Bitcoin encompasses many topics. These include wallet encryption, ECDSA, signing and encryption algorithms used elsewhere, etc.

923 questions
149
votes
8 answers

What can an attacker with 51% of hash power do?

Suppose organization X has 51% of the hash power for a period of 1 week. In this week, what exactly can and can't X do?
ripper234
  • 26,452
  • 30
  • 111
  • 246
140
votes
11 answers

Is it possible to brute force bitcoin address creation in order to steal money?

Bitcoin users frequently generate new addresses for each transaction they make, which greatly increases the number of bitcoin addresses being used to receive money. Would it be possible (and profitable) for someone to find collisions in the bitcoin…
nmat
  • 11,479
  • 14
  • 50
  • 78
122
votes
5 answers

Why is 6 the number of confirms that is considered secure?

Why is 6 is the number of confirmations that is considered secure? I haven't found any mathematical explanation or otherwise that explains why it is 6 and not 5 or 7. Is there a historical reason for 6? Is there a specific way to calculate it so 6…
osmosis
  • 5,481
  • 5
  • 23
  • 28
60
votes
4 answers

What keeps the average block time at 10 minutes?

I've been told "the network" sets the difficulty level such that there will be one new block mined every ten minutes. I imagine the rich would instead prefer to keep difficulty as high as possible to prevent other people winning their 50 BTC and…
billpg
  • 2,030
  • 3
  • 21
  • 22
58
votes
8 answers

What effects would a scalable Quantum Computer have on Bitcoin?

A scalable quantum computer is a quantum computer that is easy to extend - adding more (q)bits of memory is not a fundamentally hard problem, and will happen. Or, alternatively, that it follows Moore's Law - its memory capacity and speed will…
ripper234
  • 26,452
  • 30
  • 111
  • 246
57
votes
4 answers

Have any cryptography experts vetted the bitcoin source code?

Theoretically, bitcoin's open source nature makes it more resistant to bugs and exploits. However, due to the specialized nature of the code, even many programmers don't fully understand the cryptography pieces. Have any well-regarded cryptography…
lemonginger
  • 5,392
  • 4
  • 36
  • 55
57
votes
10 answers

What methods could a government use to shutdown Bitcoin?

Let's say that a government decided to shut down the Bitcoin network. What options would they have to achieve this? Would they need to convince other governments? All governments? Let's set as a precondition that they were able to scare away all the…
David
  • 3,444
  • 2
  • 27
  • 37
57
votes
7 answers

Can bitcoins be counterfeited?

Traditional currencies have anti-counterfeiting features designed to make them hard to copy, but despite this attempt counterfeit money is a real threat. Since bitcoins are digital, it's trivial to copy them. Does this mean that bitcoins can be…
eMansipater
  • 14,376
  • 10
  • 50
  • 79
53
votes
5 answers

Why was the target block time chosen to be 10 minutes?

According to the wiki, 10 minutes was chosen as a 'tradeoff'. Why ten minutes specifically? It is a tradeoff chosen by Satoshi between propagation time of new blocks in large networks and the amount of work wasted due to chain splits. However in…
z7sg Ѫ
  • 2,465
  • 3
  • 17
  • 9
46
votes
8 answers

How long would it take a large computer to crack a private key?

I am doing a presentation on Bitcoins and I was looking for some calculations to make people feel safe about the private key encryption. Please first answer, how long in bytes the private key is, then how many combinations of numbers it will…
shoeless joe
  • 2,237
  • 3
  • 20
  • 26
44
votes
10 answers

How can I keep my wallet secure?

The standard Bitcoin client does not encrypt wallet files, so any malicious user that gains access to this file will be able to transfer all the coins to their own wallet. Furthermore, if I lose the wallet file then I lose access to those coins. …
Michael McGowan
  • 3,364
  • 3
  • 24
  • 23
40
votes
2 answers

What is a Finney attack?

What is a Finney attack? Extra points for explaining its purpose, the prerequisites for it to be possible, how the attack can be performed and the origin of the name "Finney attack".
Dr.Haribo
  • 8,409
  • 10
  • 43
  • 62
40
votes
5 answers

How do I accept bitcoin payments at a real world store?

From what I understand, there are some requirements for using bitcoins at a physical store: Both the store owner and the client must have Internet access The client must have a cellphone or a laptop to issue the payment The seller must have a way…
nmat
  • 11,479
  • 14
  • 50
  • 78
39
votes
5 answers

What is a deterministic wallet?

It sounds as if it's a process that enables a wallet to be rebuilt from a passphrase, or from several fragments scattered about. Could someone provide a detailed technical explanation?
Gary
  • 7,543
  • 3
  • 33
  • 59
39
votes
4 answers

What are checkpoints?

I often read that checkpoints protect the network from a 51% attack because an attacker cannot reverse transactions made before the last checkpoint. How exactly does this checkpoint mechanism work? And who creates the checkpoints?
nmat
  • 11,479
  • 14
  • 50
  • 78
1
2 3
61 62