The Bitcoin business: Securing your crypto-currency

For many, Bitcoin remains clouded in confusion. Davey Winder explores what it is and how to use it securely.

Likely to increase, that is, because being a virtual currency and outside of traditional financial regulatory controls, people seem to have a problem grasping that it still needs to be secured properly if they don't want hackers and dishonest vault operators to simply run off with your money.

People continue to throw all their Bitcoin 'savings' into online exchanges for ease of use, without ever considering this fundamental insecurity flaw by doing so. Far better to keep your own wallet, suitably encrypted, offline (cold storage) and stuffed with your stash, only releasing a small amount of ready-spending money into an exchange at any given time. That way, if the service is compromised you only lose a given and controllable sum rather than everything you own.

With more than $1 billion worth of Bitcoins out there in the virtual market already, we are not talking chump-change and only a chump would leave a big pile of 50 notes on their desk in an unsecured office for anyone to steal. Yet, hackers have made off with more than a million dollars worth of Bitcoins from Bitcoin exchanges and vault services on more than one occasion already. One exchange service in Hong Kong was reported to have gone offline in 'mysterious circumstances' with as much as $5 million worth of Bitcoins going missing as a result.

Another concern to some is that Bitcoin mining itself has become a compromised affair, with cyber criminals using dedicated botnets of zombie PCs in order to achieve the kind of processing power required to make it a profitable exercise. One toolbar utility app even included terms in the EULA giving it permission to use the hist computer to "do mathematical calculations for our affiliated networks" and went on to add that "Any rewards or fees collected by xxxxx or our affiliates are the sole property of xxxxx and our affiliates."

Yes, this toolbar installed a Bitcoin miner and actually got the end users to agree to it being used to make money for someone else with their resources. But there's not a lot that you, as an existing or potential user of Bitcoins, can do about that other than more carefully reading what you are agreeing to. You can, though, do something about making the Bitcoins you possess more secure and less vulnerable to theft.

How can you keep your Bitcoins safe?

So how can you better secure your Bitcoin wallet? The first thing that needs to be done is to understand that Bitcoins may only exist in the digital ether, but they have a very real value. Because Bitcoin transactions are irreversible (by design) with no buyer refund options (just like 'real' cash if you think about it), if someone manages to hack into your wallet and help themselves you will have lost everything.

That said, people continue to throw all their Bitcoin 'savings' into online exchanges for ease of use, without ever considering this fundamental insecurity flaw by doing so. Far better to keep your own wallet, suitably encrypted, offline (cold storage) and stuffed with your stash, only releasing a small amount of ready-spending money into an exchange at any given time. That way, if the service is compromised you only lose a given and controllable sum rather than everything you own.

Secure your wallet in the same way you would secure other valuable data. Use two-factor authentication, use encryption, use your head! And using your head means backing up your wallet as well, because if it is lost (stolen laptop, corrupted hard drive whatever) then you've lost your money otherwise.

Oh, and it goes without saying - but I will say it anyway - encrypt your backup. Business users may want to investigate the multi-signature function that the Bitcoin protocol allows, enabling transactions to require more than one private key in order to be processed.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
Google blocked record-breaking 2.5Tbps DDoS attack in 2017
Security

Google blocked record-breaking 2.5Tbps DDoS attack in 2017

19 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020