The Blockchain
Bitcoin is a network that runs on a protocol known as the blockchain. While it does not mention the word blockchain, a 2008 paper by a person or people calling themselves Satoshi Nakamoto first described the use of a chain of blocks to verify transactions and engender trust in a network.2
The blockchain has since evolved into a separate concept, and thousands of blockchains have been created using similar cryptographic techniques. This history can make the nomenclature confusing. Blockchain sometimes refers to the original Bitcoin blockchain. At other times, it refers to blockchain technology in general, or to any other specific blockchain, such as the one that powers Ethereum.
Any given blockchain consists of a single chain of discrete blocks of information, arranged chronologically. In principle, this information could include emails, contracts, land titles, marriage certificates, or bond trades. In theory, any type of contract between two parties can be established on a blockchain as long as both parties agree on the contract. This takes away any need for a third party to be involved in any contract and opens up a world of possibilities including peer-to-peer financial products, such as loans or decentralized savings and checking accounts, wherein banks or any intermediary are irrelevant.
Blockchain’s versatility has caught the eye of governments and private corporations; indeed, some analysts believe that blockchain technology will ultimately be the most impactful aspect of the cryptocurrency craze.
In Bitcoin’s case, the information on the blockchain is mostly transactions. Bitcoin is really just a list. Person A sent X bitcoin to person B, who sent Y bitcoin to person C, etc. By tallying these transactions up, everyone knows where individual users stand. It’s important to note that these transactions do not necessarily need to take place between humans.
Bitcoin’s blockchain network creates vast possibilities for the Internet of things. In the future, we could see systems in which self-driving taxis or Uber vehicles have their own blockchain wallets. The passenger would send cryptocurrency directly to the car, which would not move until the funds were received. The vehicle would be able to assess when it needs fuel and use its wallet to facilitate a refill.
Another name for a blockchain is a “distributed ledger,” which emphasizes the key difference between this technology and a well-kept Word document. Bitcoin’s blockchain is distributed, meaning that it is public. Anyone can download it in its entirety or go to any number of sites that parse it. This means that the record is publicly available, but it also means that there are complicated measures in place for updating the blockchain ledger. There is no central authority to keep tabs on all Bitcoin transactions, so the participants themselves do so by creating and verifying “blocks” of transaction data. See the section on mining below for more information.
You can see the status of blocks, and their associated transactions, on sites. Such sites list the address identifier for the transacting parties, dates, the date on which the transaction took place, and the time of the transaction.3
The long strings of numbers and letters are addresses, and if you were in law enforcement or just very well informed, you could probably figure out who controlled them. It is a misconception that Bitcoin’s network is totally anonymous, although taking certain precautions can make it very hard to link individuals to transactions.
Post-Trust
Despite being absolutely public, or rather because of that fact, Bitcoin is extremely resistant to tampering. A bitcoin has no physical presence, so you can’t protect it by locking it in a safe or burying it in the woods. In theory, all a thief would need to do to take it from you would be to add a line to the ledger that translates to “you paid me everything you have.”
A related worry is double-spending. If a bad actor could spend some bitcoin, then spend it again, confidence in the currency’s value would quickly evaporate. To achieve a double-spend, the bad actor would need to make up 51% of the mining power of Bitcoin. The larger the Bitcoin network grows, the less realistic this becomes as the computing power required would be astronomical and extremely expensive.
To further prevent either from happening, you need trust. In this case, the accustomed solution with traditional currency would be to transact through a central, neutral arbiter such as a bank. Bitcoin has made that unnecessary, however. (It is probably no coincidence that Nakamoto’s original description was published in October 2008, when trust in banks was at a multigenerational low.) Rather than having a reliable authority to keep the ledger and preside over the network, the Bitcoin network is decentralized. Everyone keeps an eye on everyone else.
No one needs to know or trust anyone in particular in order for the system to operate correctly. Assuming everything is working as intended, the cryptographic protocols ensure that each block of transactions is bolted onto the last in a long, transparent, and immutable chain.
BITCOIN Mining
The process that maintains this trustless public ledger is known as mining. Undergirding the network of Bitcoin users who trade the cryptocurrency among themselves is a network of miners who record these transactions on the blockchain.
Recording a string of transactions is trivial for a modern computer, but mining is difficult because Bitcoin’s software makes the process artificially time-consuming. Without the added difficulty, people could spoof transactions to enrich themselves or bankrupt other people. They could log a fraudulent transaction in the blockchain and pile so many trivial transactions on top of it that untangling the fraud would become impossible.
By the same token, it would be easy to insert fraudulent transactions into past blocks. The network would become a sprawling, spammy mess of competing ledgers, and Bitcoin would be worthless.
Combining “proof of work” with other cryptographic techniques was Nakamoto’s breakthrough. Bitcoin’s software adjusts the difficulty miners face in order to limit the network to a new 1-megabyte block of transactions every 10 minutes. That way, the volume of transactions is digestible. The network has time to vet the new block and the ledger that precedes it, and everyone can reach a consensus about the status quo. Miners do not work to verify transactions by adding blocks to the distributed ledger purely out of a desire to see the Bitcoin network run smoothly; they are compensated for their work as well. We’ll take a closer look at mining compensation below.
Halving
As previously mentioned, miners are rewarded with Bitcoin for verifying blocks of transactions. This reward is cut in half every 210,000 blocks mined, or, about every four years. This event is called the halving or “the halvening.” The system is built-in as a deflationary one for the rate at which new Bitcoin is released into circulation.
This process is designed so that rewards for Bitcoin mining will continue until about 2140. When all Bitcoin is mined from the code and all halvings are finished, the miners will remain incentivized by fees that they will charge network users. The hope is that healthy competition will keep fees low.
This system drives up Bitcoin’s stock-to-flow ratio and lowers its inflation until it is eventually zero. After the third halving that took place on May 11, 2020, the reward for each block mined became 6.25 bitcoins.
BITCOIN Hashes
Here is a slightly more technical description of how mining works. The network of miners, who are scattered across the globe and not bound to each other by personal or professional ties, receives the latest batch of transaction data. They run the data through a cryptographic algorithm that generates a “hash”—a string of numbers and letters that verifies the information’s validity but does not reveal the information itself. (In reality, this ideal vision of decentralized mining is no longer accurate, with industrial-scale mining farms and powerful mining pools forming an oligopoly. More on that below.)
Given the hash 000000000000000000c2c4d562265f272bd55d64f1a7c22ffeb66e15e826ca30, you cannot know what transactions the relevant block (#480504) contains. You can, however, take a bunch of data purporting to be block #480504 and make sure that it hasn’t been subject to any tampering. If one number were out of place, no matter how insignificant, the data would generate a totally different hash. For example, if you were to run the Declaration of Independence through a hash calculator, you might get 839f561caa4b466c84e2b4809afe116c76a465ce5da68c3370f5c36bd3f67350. Delete the period after the words “submitted to a candid world,” though, and you get 800790e4fd445ca4c5e3092f9884cdcd4cf536f735ca958b93f60f82f23f97c4. This is a completely different hash, although you’ve only changed one character in the original text.
A hash allows the Bitcoin network to instantly check the validity of a block. It would be incredibly time-consuming to comb through the entire ledger to make sure that the person mining the most recent batch of transactions hasn’t tried anything funny. Instead, the previous block’s hash appears within the new block. If the most minute detail had been altered in the previous block, that hash would change. Even if the alteration was 20,000 blocks back in the chain, that block’s hash would set off a cascade of new hashes and tip off the network.
Generating a hash is not really work, though. The process is so quick and easy that bad actors could still spam the network and perhaps, given enough computing power, pass off fraudulent transactions a few blocks back in the chain. So the Bitcoin protocol requires proof of work.
It does so by throwing miners a curveball: Their hash must be below a certain target. That’s why block #480504’s hash starts with a long string of zeroes. It’s tiny. Because every string of data will generate one and only one hash, the quest for a sufficiently small one involves adding nonces (“numbers used once”) to the end of the data. So, a miner will run [thedata]. If the hash is too big, she will try again. [thedata]1. Still too big. [thedata]2. Finally, [thedata]93452 yields her a hash beginning with the requisite number of zeroes.
The mined block will be broadcast to the network to receive confirmations, which take another hour or so, although occasionally much longer, to process. (Again, this description is simplified. Blocks are not hashed in their entirety but broken up into more efficient structures called Merkle trees.)
Depending on the kind of traffic the network is receiving, Bitcoin’s protocol will require a longer or shorter string of zeroes, adjusting the difficulty to hit a rate of one new block every 10 minutes. As of November 2021, the current difficulty is around 22.465 trillion, up from 1 in 2009. As this suggests, it has become significantly more difficult to mine Bitcoin since the cryptocurrency launched a decade ago.4
Mining is intensive, requiring big, expensive rigs and a lot of electricity to power them. And it’s competitive. There’s no telling what nonce will work, so the goal is to plow through them as quickly as possible.
Early on, miners recognized that they could improve their chances of success by combining into mining pools, sharing computing power, and divvying the rewards up among themselves. Even when multiple miners split these rewards, there is still ample incentive to pursue them. Every time a new block is mined, the successful miner receives a bunch of newly created bitcoins. At first, it was 50, but then it halved to 25, and then it became 12.5. The fourth halving in bitcoin’s history occurred on May 11, 2020, and now the reward is set at 6.25.
The reward will continue to halve every 210,000 blocks, or about every four years, until it hits zero. At that point, all 21 million bitcoins will have been mined, and miners will depend solely on fees to maintain the network. When Bitcoin was launched, it was planned that the total supply of the cryptocurrency would be 21 million tokens.5
The fact that miners have organized themselves into pools worries some. If a pool exceeds 50% of the network’s mining power, its members could potentially spend coins, reverse the transactions, and spend them again. They could also block others’ transactions. Simply put, this pool of miners would have the power to overwhelm the distributed nature of the system, verifying fraudulent transactions by virtue of the majority power it would hold.
That could spell the end of Bitcoin, but even a so-called 51% attack would probably not enable the bad actors to reverse old transactions because the proof of work requirement makes that process so labor-intensive. To go back and alter the blockchain, a pool would need to control such a large majority of the network that it would probably be pointless. When you control the whole currency, with whom can you trade?
A 51% attack is a financially suicidal proposition from the miners’ perspective. When GHash.io, a mining pool, reached 51% of the network’s computing power in 2014, it voluntarily promised to not exceed 39.99% of the Bitcoin hash rate in order to maintain confidence in the cryptocurrency’s value. Other actors, such as governments, might find the idea of such an attack interesting, though. But again, the sheer size of Bitcoin’s network would make this overwhelmingly expensive, even for a world power.
Another source of concern related to miners is the practical tendency to concentrate in parts of the world where electricity is cheap, such as China, or, following a Chinese crackdown in early 2018, Quebec. Bitcoin mining consumes massive amounts of electricity, and this has led some governments to curtail access to power or designate special rates for Bitcoin miners. This, coupled with the Chinese government’s repeated attempts to crack down on mining systems located in that country, has led to a dispersion of miners across the globe. As of October 2021, the United States had surpassed China to become the world’s biggest global hub for Bitcoin mining.6
Bitcoin Transactions
For most individuals participating in the Bitcoin network, the ins and outs of the blockchain, hash rates, and mining are not particularly relevant. Outside of the mining community, Bitcoin owners usually purchase their cryptocurrency supply through a Bitcoin exchange. These are online platforms that facilitate transactions of Bitcoin and, often, other digital currencies.
El Salvador made Bitcoin legal tender on June 9, 2021. It is the first country to do so. The cryptocurrency can be used for any transaction where the business can accept it. The U.S. dollar continues to be El Salvador’s primary currency.7
Bitcoin exchanges such as Coinbase bring together market participants from around the world to buy and sell cryptocurrencies. These exchanges have been both increasingly popular (as Bitcoin’s popularity itself has grown in recent years) and fraught with regulatory, legal, and security challenges. With governments around the world viewing cryptocurrencies in various ways—as currency, as an asset class, or any number of other classifications—the regulations governing the buying and selling of bitcoins are complex and constantly shifting.
Perhaps even more important for Bitcoin exchange participants than the threat of changing regulatory oversight, however, is that of theft and other criminal activity. Although the Bitcoin network itself has largely been secure throughout its history, individual exchanges are not necessarily the same. Many thefts have targeted high-profile cryptocurrency exchanges, often resulting in the loss of millions of dollars worth of tokens.
The most famous exchange theft is likely from Mt. Gox, which dominated the Bitcoin transaction space up through 2014. Early in that year, the platform announced the probable theft of roughly 850,000 BTC worth close to $450 million at the time.8 Mt. Gox filed for bankruptcy and shuttered its doors;9 to this day, the majority of that stolen bounty (which would now be worth a total of about $8 billion) has not been recovered.
Keys and Wallets
For these reasons, it’s understandable that Bitcoin traders and owners will want to take any possible security measures to protect their holdings. To do so, they utilize keys and wallets.
Bitcoin ownership essentially boils down to two numbers, a public key and a private key. A rough analogy is a username (public key) and a password (private key). A hash of the public key called an address is the one displayed on the blockchain. Using the hash provides an extra layer of security.
To receive bitcoins, it’s enough for the sender to know your address. The public key is derived from the private key, which you need to send bitcoins to another address. The system makes it easy to receive money but requires verification of identity to send it.
To access bitcoins, you use a wallet, which is a set of keys. These can take different forms, from third-party web applications offering insurance and debit cards, to QR codes printed on pieces of paper. The most important distinction is between “hot” wallets, which are connected to the internet and therefore vulnerable to hacking, and “cold” wallets, which are not connected to the internet.
In the Mt. Gox case above, it is believed that most of the BTC stolen were taken from a hot wallet. Still, many users entrust their private keys to cryptocurrency exchanges, which is essentially a bet that those exchanges will have stronger defenses against the possibility of theft than one’s own computer would.
The Bottom Line
Bitcoin, the digital currency and payment network, is actually software and a purely digital phenomenon—a set of protocols and processes. The main component of Bitcoin is blockchain, a series of digital blocks that are linked together as a list and maintain records of all transactions occurring in its network. The use of a blockchain enables Bitcoin to function as a decentralized system that does not require a neutral central entity to confirm and process transactions.
The Bitcoin network is undergirded by mining operations that confirm and process transactions. Miners receive bitcoin as a reward for their effort, and the number of bitcoin awarded to miners is halved every four years in an event known as halving or halvening.
Cryptocurrency exchanges are also important to making Bitcoin work because they enable ordinary users to purchase or trade bitcoins, thereby increasing the number of transactions on its network. Finally, cryptographic keys and wallets are necessary to access and store bitcoin.
How does Bitcoin work?
The most important element to making Bitcoin work is its blockchain—a series of linked blocks that store a record of all transactions conducted in its network. Other important elements of Bitcoin include cryptographic keys and wallets that are essential for access to the cryptocurrency and processes like halving that induce inflation into its network by reducing the number of bitcoin in existence.
How does blockchain make Bitcoin trustless?
Bitcoin’s blockchain is a distributed ledger, a series of linked blocks containing transaction records, that is undergirded by complex mining processes to ensure the integrity of transactions. The blockchain is public, meaning anyone can view transactions occurring on it. In this way, in Bitcoin’s blockchain, everyone keeps an eye on everyone else, making it extremely difficult for fraud to occur unless there is large-scale collusion between transacting parties.
How does hashing ensure validity of a block?
A hash enables the Bitcoin network to instantly ascertain the validity of a block by checking for the previous block’s hash in a new block. The hash must be below a certain target, making it difficult and time-consuming for bad actors to spam the network and pass off fraudulent transactions a few blocks in the chain.
How are keys and wallets used in Bitcoin?
There are two types of keys in Bitcoin. A public key is used to identify an address on a blockchain and can be likened to a username. A private key is used to access your bitcoin and can be likened to a password that must not be shared with anyone. A wallet is a set of keys and can take on various forms such as QR codes. There are two types of wallets. A hot wallet is connected to the internet, while a cold wallet is not connected to any network.
Investing in cryptocurrencies and other Initial Coin Offerings (“ICOs”) is highly risky and speculative, and this article is not a recommendation by Investopedia or the writer to invest in cryptocurrencies or other ICOs. Since each individual’s situation is unique, a qualified professional should always be consulted before making any financial decisions. Investopedia makes no representations or warranties as to the accuracy or timeliness of the information contained herein.