The Bitcoin business: Securing your crypto-currency

For many, Bitcoin remains clouded in confusion. Davey Winder explores what it is and how to use it securely.

Likely to increase, that is, because being a virtual currency and outside of traditional financial regulatory controls, people seem to have a problem grasping that it still needs to be secured properly if they don't want hackers and dishonest vault operators to simply run off with your money.

People continue to throw all their Bitcoin 'savings' into online exchanges for ease of use, without ever considering this fundamental insecurity flaw by doing so. Far better to keep your own wallet, suitably encrypted, offline (cold storage) and stuffed with your stash, only releasing a small amount of ready-spending money into an exchange at any given time. That way, if the service is compromised you only lose a given and controllable sum rather than everything you own.

With more than $1 billion worth of Bitcoins out there in the virtual market already, we are not talking chump-change and only a chump would leave a big pile of 50 notes on their desk in an unsecured office for anyone to steal. Yet, hackers have made off with more than a million dollars worth of Bitcoins from Bitcoin exchanges and vault services on more than one occasion already. One exchange service in Hong Kong was reported to have gone offline in 'mysterious circumstances' with as much as $5 million worth of Bitcoins going missing as a result.

Another concern to some is that Bitcoin mining itself has become a compromised affair, with cyber criminals using dedicated botnets of zombie PCs in order to achieve the kind of processing power required to make it a profitable exercise. One toolbar utility app even included terms in the EULA giving it permission to use the hist computer to "do mathematical calculations for our affiliated networks" and went on to add that "Any rewards or fees collected by xxxxx or our affiliates are the sole property of xxxxx and our affiliates."

Advertisement
Advertisement - Article continues below

Yes, this toolbar installed a Bitcoin miner and actually got the end users to agree to it being used to make money for someone else with their resources. But there's not a lot that you, as an existing or potential user of Bitcoins, can do about that other than more carefully reading what you are agreeing to. You can, though, do something about making the Bitcoins you possess more secure and less vulnerable to theft.

How can you keep your Bitcoins safe?

So how can you better secure your Bitcoin wallet? The first thing that needs to be done is to understand that Bitcoins may only exist in the digital ether, but they have a very real value. Because Bitcoin transactions are irreversible (by design) with no buyer refund options (just like 'real' cash if you think about it), if someone manages to hack into your wallet and help themselves you will have lost everything.

That said, people continue to throw all their Bitcoin 'savings' into online exchanges for ease of use, without ever considering this fundamental insecurity flaw by doing so. Far better to keep your own wallet, suitably encrypted, offline (cold storage) and stuffed with your stash, only releasing a small amount of ready-spending money into an exchange at any given time. That way, if the service is compromised you only lose a given and controllable sum rather than everything you own.

Secure your wallet in the same way you would secure other valuable data. Use two-factor authentication, use encryption, use your head! And using your head means backing up your wallet as well, because if it is lost (stolen laptop, corrupted hard drive whatever) then you've lost your money otherwise.

Oh, and it goes without saying - but I will say it anyway - encrypt your backup. Business users may want to investigate the multi-signature function that the Bitcoin protocol allows, enabling transactions to require more than one private key in order to be processed.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Most Popular

Visit/business-strategy/digital-transformation/354201/boston-dynamics-dog-like-robots-sniff-out-bombs-for
digital transformation

Boston Dynamics dog-like robots sniff out bombs for Massachusetts police

26 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019
Visit/mobile/mobile-phones/354222/samsung-sails-past-apples-market-share-despite-smartphone-market-slump
Mobile Phones

Samsung sails past Apple's market share despite smartphone market slump

28 Nov 2019
Visit/business-strategy/mergers-and-acquisitions/354191/xerox-to-pursue-hostile-hp-takeover-after-30bn
mergers and acquisitions

Xerox to pursue hostile HP takeover after $30bn gambit fails

28 Nov 2018