Unique properties of Bitcoin

Bitcoin is not a singular thing. It is a multifaceted system that can be viewed from various angles: computer science, distributed computing, finance, money, record-keeping, etc. In the following, the unique characteristics of the Bitcoin network will be explored, along with the design philosophy behind them and the challenges facing the network to maintain these properties.


Network-token duality

Bitcoin newcomers may be confused by the distinction between the Bitcoin network and the Bitcoin currency. After all, the initial use case of the Bitcoin blockchain was to facilitate a digital cash system, and it is this application, in particular, that has become a global phenomenon. While they are inextricably linked by design, it can help provide a more comprehensive, whole-systems perspective to distinguish the two. 


The Bitcoin network is an open-source, multistakeholder system that maintains and facilitates a global settlement layer and accounting system for borderless, peer-to-peer transactions. The stakeholders consist of miners, developers, merchants/companies and users all working in concert to provide security and up-time to the network, improve the protocol, build services on the network, and ultimately, use the network. 


Miners are nodes that validate transactions broadcasted to the network and record them onto a distributed ledger of transaction data that is cryptographically secure and verifiable. This computationally expensive process not only secures the network from various attacks but also serves as the minting process of the Bitcoin currency in the form of block rewards.


Bitcoin Core is an open-source software project developed by numerous teams and individuals around the world. Some of these developers are paid members of established teams, while others contribute freely to the protocol. The Bitcoin Core development process mirrors the Request for Comments proposal system that built the protocols that comprise the internet today. Anyone can submit a Bitcoin Improvement Proposal and receive feedback from the open-source community. If there is clear social consensus that a proposal should be implemented, the developers will update the software accordingly at a future date. 


Just as a host of companies have been built atop the bundle of protocols we call the internet over the years, many companies have formed to provide services to Bitcoin’s users. These services can range from wallets that allow users to transact Bitcoin through an intuitive user interface, exchanges that allow users to trade Bitcoin between fiat and other cryptocurrencies, Bitcoin-based escrow systems for P2P commerce, to secure document timestamping, and more. Businesses that utilize Bitcoin in their technical stack often face unique challenges and risks not shared by traditional tech ventures, such as asset custody, non-repudiation, data immutability and more.


Users comprise the above and everyone else, from the most die-hard cypherpunk hodler, to the day trader, to the newcomer simply wanting to see what all the fuss is about. All of these players are integral to the success of Bitcoin; therefore, it is critical that the incentives are aligned throughout the ecosystem. A cryptocurrency is incredibly useful in this regard. 


Part of the innovation of Bitcoin is that it is a financial infrastructure in the form of globally accessible commons built, maintained and used by a network of peers. The economic incentives inherent in the system by virtue of it also being an autonomous network that mints the Bitcoin digital currency allow it to evolve and persist into the future.


Decentralization


When talking about decentralization in the context of Bitcoin and other crypto/blockchain networks, this is not a singular concept. In many ways, it is simply the abstraction of an ideal state of affairs: a future in which the critical systems that sustain our lives, such as the current financial system, are not maintained by trusted administrators but by a resilient, capable network of peers. To many, it is the whole point of systems like Bitcoin and other blockchains — its raison d’etre.


Despite the abstract nature of the term, decentralization has become a core part of the messaging in the cryptocurrency industry and is often one of the first things a newcomer encounters when they explore the space. Yet, ironically or appropriately, there is lack of clarity and consensus regarding what the term actually means, in vision and practice. For the purposes of this guide, we’ll briefly unpack the complex notion and hopefully provide some useful context for the Bitcoin novice.


Firstly, it is important to establish that decentralization has both technical and social components, which can often be inextricably linked. For example, a thorough analysis of Bitcoin’s decentralization would have to assess the entire protocol stack, from top to bottom — the various subsystems within it, how the network adapts over time, the distribution of power among the various stakeholders, and the influence of external forces outside of the Bitcoin network like corporations and governments.


Evidence seems to indicate that Bitcoin is technically decentralized from a fundamental architecture point of view, given that the network has yet to be compromised since its inception. Socially, the network is quite resilient to overreaching internal or external influence. While many players have attempted to exert power or influence on the network for their own purposes, the system has remained credibly neutral and resilient throughout the years.


Externally, if any particular government or abbreviated agency really wanted to shut down the network, it would not be outside the realm of possibility to track the energy consumption of mining operations and outlaw the use of Bitcoin in commerce. Without a robust network of stewards to maintain the network and with the inability to use the currency as intended, the viability of it as a widely adopted monetary system would certainly be threatened. Yet despite the hypotheticals and the naysayers, Bitcoin has persisted. China has outlawed Bitcoin at least five times, yet a great percentage of the network’s hashing power originates from the country. According to 99Bitcoin’s curated list of Bitcoin obituaries, Bitcoin has died around 400 times. 


There has yet to be a widely accepted model for quantifying the decentralization of these unique techno-social systems. In time, this will likely change not only for the benefit of having industry standards but also for defending Bitcoin and similar value networks from shifting regulatory frameworks. Whether in acknowledgment of or in spite of the regulatory structures of the world, the ongoing decentralization of Bitcoin is critical for it to persist in any meaningful way.


Immutability


To create a peer-to-peer transaction system that does not rely on trusted third parties, Satoshi realized that nonrepudiable — i.e., nonreversible — payments had to be a core feature of the protocol. While such features are part of the established financial system in order to handle disputes between parties or resolve human or technical errors, the capability to edit a transaction record on the administrative side will inevitably be exploited. For a digital currency system without central authorities to be viable and resistant to confiscation, censorship and forgery, it must be immutable.


Bitcoin achieves this immutability using the ongoing proof-of-work consensus process. Once a transaction is processed by miners and appended to the blockchain data structure, every subsequent block reinforces the certainty and validity of that transaction by exponential orders of magnitude. 


In an interview with Tim Ferriss, cryptocurrency pioneer Nick Szabo compares this process to “a fly trapped in amber” — the fly being the transaction and the amber being the accumulated proof-of-work. This relationship between time and transactional certainty is an important element to Bitcoin. While a new block is validated roughly every 10 minutes, it is considered in good practice to wait up to six additional block times for full confirmation of a transaction. This is also known as “finality.”


Security


When we can secure the most important functionality of a financial network by computer science rather than by the traditional accountants, regulators, investigators, police, and lawyers, we go from a system that is manual, local, and of inconsistent security to one that is automated, global, and much more secure. — Nick Szabo, “Money, Blockchains, and Social Scalability”

 

Security is essential for large-scale information and communication systems. The internet was originally conceived to be a communications network capable of withstanding nuclear war. While the geopolitical context and core intentions are quite different, Bitcoin was also designed to operate in an adversarial, unstable environment. 


The network’s security model was inspired by decades of research and development around securing the integrity and uptime of distributed systems. Truly peer-to-peer computer systems present unique challenges and risks in this area because there are no central administrators that can be trusted to right the ship. Robust security is incredibly important for the Bitcoin network because it facilitates an entire monetary system with immense value at stake. 


Bitcoin’s proof-of-work consensus system safeguards the network from Sybil attacks (the creation of numerous fake accounts to swarm and overwhelm the network) and intermittent or faulty nodes (from power outages or poor maintenance), resulting in a Byzantine fault-tolerant system. 


Byzantine fault tolerance is the capacity of a distributed system to maintain consensus with imperfect information, partial network failure or even malicious agents. The term is a reference to the scenario articulated by Leslie Lamport, Robert Shostak and Marshall Pease in their influential paper “The Byzantine Generals Problem,” in which they use the example of a group of army generals coordinating in a battlefield environment with limited means of communication. 


With imperfect information and situational awareness, how can the generals agree and execute on a shared strategy or even trust that another general will not turn traitor and single-handedly turn the tide of battle? Their conclusion: As long as at least two-thirds of the generals are loyal, the effort will not be self-defeating.


As discussed previously, Bitcoin’s decentralization is made possible by a clever alignment of incentives between the network’s stakeholders: miners, developers, merchants and users. Simply put, any concerted attempt to capture the network or reorganize the chain would result in the value of the currency plummeting, thus rendering any intended benefit completely worthless.


The cost of being a bad actor significantly outweighs any possible reward. Thus, it is in every participant’s best interest to simply play by the rules and collectively work toward the maturation and adoption of the Bitcoin ecosystem. 


Since its launch in January 2009, the Bitcoin network has never been compromised at the base layer and has had effectively 0% downtime, making it one of the most secure computer systems on the planet. 


Anonymity/pseudonymity


One of Bitcoin’s core characteristics is that it forgoes the account-based model of identifying participants in the network and substitutes it for a public key cryptosystem where entities are represented by cryptographic key pairs rather than assigned names. Bitcoin addresses are strings of 26 to 35 alphanumeric characters that begin in either 1, 3 or bc1. While there are services that allow users to map names to their public key addresses to make them more user-friendly, the default user experience of Bitcoin involves interacting with these cryptographic key pairs.


Cryptographic keys are essential to privacy online and have been a fundamental building block of privacy-preserving systems ranging from digital cash, to email, to routing protocols such as Tor. They are omnipresent throughout the numerous information and communication technologies that permeate our lives, but many systems abstract the experience with the keys managed and coordinated by trusted third parties rather than directly by users. 


This emphasis on cryptographic keys as a primitive for private communications and transactions online was heavily influenced by the cypherpunks. Timothy May’s manifesto, in particular, highlights the revolutionary capacity of giving individuals the ability to anonymously transact with and message each other on communications networks with digital signatures being the sole method of verification — no identities needed. 


In the context of Bitcoin, cryptographic key pairs are not simply a substitute for identity but also an asset in and of themselves. Commonly referred to as wallets, as they allow one to send and receive Bitcoin between other public key addresses, these keys are digital bearer assets that grant the holder sole ownership of the underlying assets. As the motto goes: “Not your keys, not your crypto.” One of Bitcoin’s most revolutionary qualities is the realization of true ownership and management of one’s assets without relying on custodial services provided by trusted third parties.


But how does Bitcoin’s privacy model fares against modern-day solutions? While Bitcoin’s privacy has been one of the currency’s defining traits over the years and a frequent point of friction with regulators, data analytics of blockchains has advanced enough that casual use of Bitcoin has effectively become de-anonymized. 


Because all transaction data is publicly available, applying sophisticated analytics techniques to a transaction graph can link public key addresses to various external accounts, including exchanges and other fiat on/off-ramps. Solutions for securing anonymity, such as cryptocurrency mixers, can help obfuscate the transaction flow and prevent linkage to external accounts and real-world identities, but these tools have begun to face active government shutdown. Much of the Bitcoin protocol’s forward development is focused on reinforcing its privacy features.


Transparency


The Bitcoin newcomer may be thrown off guard by Bitcoin’s qualities as both a (mostly) privacy-preserving system and a transparent one. Aren’t these two characteristics mutually exclusive? Not necessarily. In fact, it is the equilibrium of these two qualities that makes Bitcoin and blockchain particularly effective and useful as an open financial system. 


We’ve established that Bitcoin’s privacy model is founded by substituting names and accounts with cryptographic key pairs. These key pairs are the tools by which users transact with one another securely on the network via digital signatures. If we don’t know the identity of those we’re transacting with, then how do we trust that the record is true?


With blockchain, these transaction flows and the chains of ownership of these valuable bits are preserved in a shared ledger of cryptographically verifiable, secure data. The combination of a mutual ledger of secure yet open data and a consensus system that allows the peers on the network to continuously agree on the valid state of this ledger results in one of blockchain’s core value propositions: data verification. 


If all the peers on the network share a transaction record going back to the genesis block and the cost of reverting previously timestamped transactions outweighs any benefits by an exponential degree, then participants in the Bitcoin network can trust the validity of the ledger rather than each other or a trusted third party. 


While there is much emphasis on financial transactions on the Bitcoin network for obvious reasons, the blockchain has proven quite useful for other applications as well. The first nonfinancial application of the Bitcoin blockchain was proof-of-existence, a method of using the Bitcoin blockchain to timestamp documents and other digital files by associating the hash of a piece of data with an owner’s private key, denoting ownership, agreement or consent around a certain action or bit of information. 


The use cases range from the documentation and enforcement of legal contracts, to the provenance of data surrounding a digital or physical asset, to the implementation of a global, automated notary public.


Speed


When we talk about Bitcoin’s speed, there is an important distinction to make. Are we talking about the number of transactions Bitcoin can process over a certain amount of time or the amount of time required to process a single transaction? These are related but distinct observations in assessing the value proposition of Bitcoin in relation to time.


A common measurement for quantifying a cryptocurrency’s speed and scalability is transactions per second. At the time of writing this guide, the Bitcoin network averages merely 4 tx/s, an incredibly small sum that pales in comparison to Visa’s roughly 1,700 tx/s. The discourse around Bitcoin’s scalability and viability as digital cash tends to refer to this number.


On the other hand, how long does it take for Alice to send Bitcoin to Bob? While this depends on the amount in transaction fees paid by Alice to incentivize priority validation by miners, the average block time is roughly 10 minutes, with transaction finality certain after 6 blocks, or 60 minutes. 


While there is much room for improvement in Bitcoin’s transaction throughput and confirmation times, it is important to keep in mind that these are peer-to-peer transactions executed and secured by a global network operating beyond borders. This is key to understanding Bitcoin’s value proposition. While it is currently lacking in raw speed, Bitcoin foregoes the central clearinghouses necessary for processing Visa and ACH bank transfers in favor of an ultra-secure global settlement layer. Within an hour, millions of dollars in value can be sent across the world and verified with minimal fees and without the use of trusted third parties. 


In the short to medium term, maturing layer-two scaling solutions like Lightning will provide a trust-minimized means for conducting high-frequency Bitcoin transactions off-chain with the security of the Bitcoin blockchain.

Post a Comment

0 Comments