SlideShare uma empresa Scribd logo
1 de 12
Moscow, 23 May 2013
Bitcoin: Lights and Shadows of Virtual Money
Moscow, 23 May 2013
Over the last decade, according to the evolution of the Internet, attempts
to achieve a coin cybernetics (cybercoin) or digital money, were numerous
and mainly related to the growing use of the network for electronic
commerce (E-commerce).
But in recent years, more precisely since 2009, a new attempt to market
a new virtual electronic money, seems to have taken the right direction
and the sudden escalation of its use, seems to confirm success.
It's called Bitcoin (digital currency) and its major peculiarity reside in
anonymity and non-traceability.
Bitcoin: Lights and Shadows of Virtual Money
Moscow, 23 May 2013
Born a few years ago, is being heralded as a Bitcoin virtual currency
whose success is surrounded by numerous oddities. The first is its
creator: Satoshi Nakamoto.
In an article published in October 2011 by The New Yorker, journalist
Joshua Davis, who for years have started searching for the elusive
inventor of Bitcoin, asserts that "Satoshi Nakamoto" is nothing more than
just a pseudonym behind which lurks a group consisting of hundreds of
experts in cryptography, peer-to-peer systems and techniques for
transaction banking network.
Bitcoin: Lights and Shadows of Virtual Money
Moscow, 23 May 2013
The project has its origins in the architecture peer-to-peer (P2P),
designed for applications requiring very high data transmission speed,
allowing at the same time, sharing the same data among multiple users
(nodes) on the same network.
With this type of architecture, any node is able to initiate or complete any
transaction.
The nodes can differ among themselves in the local configuration,
processing speed, in bandwidth and in the amount of stored data.
The database that contains the information is distributed among the
nodes of the network.
The transactions are all tracked and transfers of bitcoin, including public
accounts of the nodes are encrypted through the use of the system of
public key cryptography, mathematical algorithm that provides security
and protection to the transmitted data
Bitcoin: Lights and Shadows of Virtual Money
Moscow, 23 May 2013
The purpose of Bitcoin is essentially to allow the possession and the
anonymous transfer of digital money.
Another important feature is that Bitcoin addresses do not contain any
information that could bring back to its rightful owner, which guarantees
the anonymity function at any level.
Regarding how to use Bitcoin, anyone can acquire the appropriate
software at no cost and downloading it from the network.
After the download and installation is automatic and program, it
autonomously proceeds to update all transactions on different nodes of
the network. The application also provides the generation of a bitcoin
address in readable form, with random sequences of digits long and on
average 33 characters, which always start by 1, of the form
1Ai83aafRLWYtMDNbP8b3uiWyquun6ot46..
Bitcoin: Lights and Shadows of Virtual Money
Moscow, 23 May 2013
Image of the software installation ...
Bitcoin: Lights and Shadows of Virtual Money
Moscow, 23 May 2013
Image generation of the address (in this case, for example, was added
the name of Luigi Rossi, but the field can be left blank)
Bitcoin: Lights and Shadows of Virtual Money
Moscow, 23 May 2013
The Bitcoin you can buy on the Internet with any currency.
The value of Bitcoin increases exponentially.
In May, 2012, a Bitcoin was quoted at 03.05 U.S. dollars. In April
2013, the value of a Bitcoin has come to 229 U.S. dollars.
Bitcoin: Lights and Shadows of Virtual Money
Moscow, 23 May 2013
The benefits of Bitcoin are:
1. Limited. The amount of bitcoins in circulation is limited, and this allows you to
maintain the value. The higher value, the coin is more convenient to use in
terms of its exchange ratio. Moreover, being a coin "strong" can also be
regarded as a "reserve" to be set aside. The most direct comparison is with the
gold: there is less gold in circulation, the higher its value.
2. Network Management software. The currency is exchanged on the
Internet, directly in a peer-to-peer and without any supervisory
authorities, banking and government.
3. Forgery impossible. Contrary to what happens for the other currencies, bitcoin
can not be falsified. The maximum amount outstanding is fixed and
transactions, with regard to the quantities of currency, are all checked and
verified.
4. Exchange and methods of use facilitated. The bitcoin can be exchanged easily
and quickly on the net.
5. Custody and simplified reserved. The bitcoin may be stored individually (in their
own personal computers) without the aid of banks or bodies to ensure the
housing.
6. Store of value. Being a very stable currency value (contrary to what happens in
other currencies), can be a "safe haven."
Bitcoin: Lights and Shadows of Virtual Money
Moscow, 23 May 2013
Since bitcoins are routed through a
peer-to-peer, it remains impossible
to trace the movements of
electronic money and to disclose
the identity of those who carry out
transactions.
These features make the currency
of bitcoins privileged for all those
transactions illegal and criminal
activities, such as the sale of
weapons and drugs.
For example, on-site Silk Road, you
can buy drugs using Bitcoin
(everything is handled in a
completely anonymous)
Bitcoin address
Bitcoin: Lights and Shadows of Virtual Money
Moscow, 23 May 2013
Very few would have bet on the simple existence in the life of this virtual
money. Indeed, many had announced that its value would be returned to
zero within a few months.
Although the global economic scenario, more and more confused and
chaotic, does not bode well for the near future, the existence of a
cryptomoneta as a form of payment and investment, it may be winning
And not just because of the uncertainty in the currency markets, as well
as for the possibility of trade and financial transactions that might escape
the controls that government institutions in many countries are working
to combat rampant tax evasion.
Bitcoin may actually represent a revolutionary tool in the world scenario.
Last year, some have even claimed that if Bin Laden had been available at
the time of this prodigious cryptomoneta, would be able to equip
themselves with better weapons and a wider chain of acquisition of
infrastructure and equipment!
Bitcoin: Lights and Shadows of Virtual Money
Moscow, 23 May 2013

Mais conteúdo relacionado

Mais procurados

EVERY TIME BITCOIN PRICE UPS $1000 LEVEL, PBOC MEDDLES TO HOLD IT OFF
EVERY TIME BITCOIN PRICE UPS $1000 LEVEL, PBOC MEDDLES TO HOLD IT OFFEVERY TIME BITCOIN PRICE UPS $1000 LEVEL, PBOC MEDDLES TO HOLD IT OFF
EVERY TIME BITCOIN PRICE UPS $1000 LEVEL, PBOC MEDDLES TO HOLD IT OFFSteven Rhyner
 
Cryptocurrency Exchanges - An Introduction
Cryptocurrency Exchanges - An IntroductionCryptocurrency Exchanges - An Introduction
Cryptocurrency Exchanges - An IntroductionChristian Kameir
 
Beyond Bitcoin – Cryptocurrencies and Altcoins to Watch in 2017
Beyond Bitcoin – Cryptocurrencies and Altcoins to Watch in 2017Beyond Bitcoin – Cryptocurrencies and Altcoins to Watch in 2017
Beyond Bitcoin – Cryptocurrencies and Altcoins to Watch in 2017Firoz Patel
 
A Challenger Appears: Ethereum Approaches Bitcoin Market Capitalization
A Challenger Appears: Ethereum Approaches Bitcoin Market CapitalizationA Challenger Appears: Ethereum Approaches Bitcoin Market Capitalization
A Challenger Appears: Ethereum Approaches Bitcoin Market CapitalizationFiroz Patel
 
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAY
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAYTERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAY
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAYSteven Rhyner
 

Mais procurados (6)

EVERY TIME BITCOIN PRICE UPS $1000 LEVEL, PBOC MEDDLES TO HOLD IT OFF
EVERY TIME BITCOIN PRICE UPS $1000 LEVEL, PBOC MEDDLES TO HOLD IT OFFEVERY TIME BITCOIN PRICE UPS $1000 LEVEL, PBOC MEDDLES TO HOLD IT OFF
EVERY TIME BITCOIN PRICE UPS $1000 LEVEL, PBOC MEDDLES TO HOLD IT OFF
 
Cryptocurrency Exchanges - An Introduction
Cryptocurrency Exchanges - An IntroductionCryptocurrency Exchanges - An Introduction
Cryptocurrency Exchanges - An Introduction
 
PCM_MA15_BitcoinFeature
PCM_MA15_BitcoinFeaturePCM_MA15_BitcoinFeature
PCM_MA15_BitcoinFeature
 
Beyond Bitcoin – Cryptocurrencies and Altcoins to Watch in 2017
Beyond Bitcoin – Cryptocurrencies and Altcoins to Watch in 2017Beyond Bitcoin – Cryptocurrencies and Altcoins to Watch in 2017
Beyond Bitcoin – Cryptocurrencies and Altcoins to Watch in 2017
 
A Challenger Appears: Ethereum Approaches Bitcoin Market Capitalization
A Challenger Appears: Ethereum Approaches Bitcoin Market CapitalizationA Challenger Appears: Ethereum Approaches Bitcoin Market Capitalization
A Challenger Appears: Ethereum Approaches Bitcoin Market Capitalization
 
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAY
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAYTERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAY
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAY
 

Destaque

Sicurezza Informatica Nelle Aziende Installfest2007
Sicurezza Informatica Nelle Aziende Installfest2007Sicurezza Informatica Nelle Aziende Installfest2007
Sicurezza Informatica Nelle Aziende Installfest2007jekil
 
L'intervento di Barbara Bruschi
L'intervento di Barbara BruschiL'intervento di Barbara Bruschi
L'intervento di Barbara BruschiVittorio Canavese
 
L'intervento di Adriano Gallea
L'intervento di Adriano GalleaL'intervento di Adriano Gallea
L'intervento di Adriano GalleaVittorio Canavese
 
L'intervento di Matteo Lo Bue
L'intervento di Matteo Lo BueL'intervento di Matteo Lo Bue
L'intervento di Matteo Lo BueVittorio Canavese
 
Cyber-Crime, un problema crescente
Cyber-Crime, un problema crescenteCyber-Crime, un problema crescente
Cyber-Crime, un problema crescenteManager.it
 
La presentazione di Raoul Chiesa
La presentazione di Raoul ChiesaLa presentazione di Raoul Chiesa
La presentazione di Raoul ChiesaVittorio Canavese
 
Data Breach e Garante Privacy: Problemi e soluzioni
Data Breach e Garante Privacy: Problemi e soluzioniData Breach e Garante Privacy: Problemi e soluzioni
Data Breach e Garante Privacy: Problemi e soluzioniDFLABS SRL
 
WHITEPAPER: L’Azienda Cyber Resilient: come sfruttare i vantaggi della Securi...
WHITEPAPER: L’Azienda Cyber Resilient: come sfruttare i vantaggi della Securi...WHITEPAPER: L’Azienda Cyber Resilient: come sfruttare i vantaggi della Securi...
WHITEPAPER: L’Azienda Cyber Resilient: come sfruttare i vantaggi della Securi...Symantec
 
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFiLinux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFiAndrea Draghetti
 
TorinoIn 16 febbraio 2016 presentazione Raoul (Nobody) Chiesa
TorinoIn 16 febbraio 2016  presentazione Raoul (Nobody) ChiesaTorinoIn 16 febbraio 2016  presentazione Raoul (Nobody) Chiesa
TorinoIn 16 febbraio 2016 presentazione Raoul (Nobody) ChiesaFulvio Solinas ✔
 
2016FRAMEWORK NAZIONALEBALDONIXWEB
2016FRAMEWORK NAZIONALEBALDONIXWEB2016FRAMEWORK NAZIONALEBALDONIXWEB
2016FRAMEWORK NAZIONALEBALDONIXWEBRoberto Baldoni
 
Continui attacchi informatici : coinvolgere i business leader per la nuova n...
Continui attacchi informatici : coinvolgere i business leader per la nuova n...Continui attacchi informatici : coinvolgere i business leader per la nuova n...
Continui attacchi informatici : coinvolgere i business leader per la nuova n...Accenture Italia
 
Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...
Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...
Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...Accenture Italia
 
ICT Security Forum 2013 - Prevenzione degli attacchi informatici che coinvolg...
ICT Security Forum 2013 - Prevenzione degli attacchi informatici che coinvolg...ICT Security Forum 2013 - Prevenzione degli attacchi informatici che coinvolg...
ICT Security Forum 2013 - Prevenzione degli attacchi informatici che coinvolg...acaporro
 
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendaliPrevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendaliConsulthinkspa
 
Nella mente dell'hacker: da Wargames all'Underground Economy
Nella mente dell'hacker: da Wargames all'Underground EconomyNella mente dell'hacker: da Wargames all'Underground Economy
Nella mente dell'hacker: da Wargames all'Underground Economymadero
 
Attacchi informatici
Attacchi informaticiAttacchi informatici
Attacchi informaticiBhuwan Sharma
 
Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...
Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...
Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...at MicroFocus Italy ❖✔
 

Destaque (20)

Sicurezza Informatica Nelle Aziende Installfest2007
Sicurezza Informatica Nelle Aziende Installfest2007Sicurezza Informatica Nelle Aziende Installfest2007
Sicurezza Informatica Nelle Aziende Installfest2007
 
L'intervento di Barbara Bruschi
L'intervento di Barbara BruschiL'intervento di Barbara Bruschi
L'intervento di Barbara Bruschi
 
L'intervento di Adriano Gallea
L'intervento di Adriano GalleaL'intervento di Adriano Gallea
L'intervento di Adriano Gallea
 
L'intervento di Matteo Lo Bue
L'intervento di Matteo Lo BueL'intervento di Matteo Lo Bue
L'intervento di Matteo Lo Bue
 
Cyber-Crime, un problema crescente
Cyber-Crime, un problema crescenteCyber-Crime, un problema crescente
Cyber-Crime, un problema crescente
 
Joshua mendez
Joshua mendezJoshua mendez
Joshua mendez
 
La presentazione di Raoul Chiesa
La presentazione di Raoul ChiesaLa presentazione di Raoul Chiesa
La presentazione di Raoul Chiesa
 
Data Breach e Garante Privacy: Problemi e soluzioni
Data Breach e Garante Privacy: Problemi e soluzioniData Breach e Garante Privacy: Problemi e soluzioni
Data Breach e Garante Privacy: Problemi e soluzioni
 
WHITEPAPER: L’Azienda Cyber Resilient: come sfruttare i vantaggi della Securi...
WHITEPAPER: L’Azienda Cyber Resilient: come sfruttare i vantaggi della Securi...WHITEPAPER: L’Azienda Cyber Resilient: come sfruttare i vantaggi della Securi...
WHITEPAPER: L’Azienda Cyber Resilient: come sfruttare i vantaggi della Securi...
 
Attacchi e difese
Attacchi e difeseAttacchi e difese
Attacchi e difese
 
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFiLinux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
 
TorinoIn 16 febbraio 2016 presentazione Raoul (Nobody) Chiesa
TorinoIn 16 febbraio 2016  presentazione Raoul (Nobody) ChiesaTorinoIn 16 febbraio 2016  presentazione Raoul (Nobody) Chiesa
TorinoIn 16 febbraio 2016 presentazione Raoul (Nobody) Chiesa
 
2016FRAMEWORK NAZIONALEBALDONIXWEB
2016FRAMEWORK NAZIONALEBALDONIXWEB2016FRAMEWORK NAZIONALEBALDONIXWEB
2016FRAMEWORK NAZIONALEBALDONIXWEB
 
Continui attacchi informatici : coinvolgere i business leader per la nuova n...
Continui attacchi informatici : coinvolgere i business leader per la nuova n...Continui attacchi informatici : coinvolgere i business leader per la nuova n...
Continui attacchi informatici : coinvolgere i business leader per la nuova n...
 
Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...
Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...
Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...
 
ICT Security Forum 2013 - Prevenzione degli attacchi informatici che coinvolg...
ICT Security Forum 2013 - Prevenzione degli attacchi informatici che coinvolg...ICT Security Forum 2013 - Prevenzione degli attacchi informatici che coinvolg...
ICT Security Forum 2013 - Prevenzione degli attacchi informatici che coinvolg...
 
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendaliPrevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
 
Nella mente dell'hacker: da Wargames all'Underground Economy
Nella mente dell'hacker: da Wargames all'Underground EconomyNella mente dell'hacker: da Wargames all'Underground Economy
Nella mente dell'hacker: da Wargames all'Underground Economy
 
Attacchi informatici
Attacchi informaticiAttacchi informatici
Attacchi informatici
 
Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...
Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...
Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...
 

Semelhante a Antonio Teti. Bitcoin: Lights and Shadows of Virtual Money.

Crypto currency the bitcoin
Crypto currency the bitcoinCrypto currency the bitcoin
Crypto currency the bitcoinHector Jayat
 
bitcoin technology report
bitcoin technology reportbitcoin technology report
bitcoin technology reportShivani Darshan
 
“Emerging Investment Avenues: A new path for Financial Investors”
“Emerging Investment Avenues: A new path for Financial Investors”“Emerging Investment Avenues: A new path for Financial Investors”
“Emerging Investment Avenues: A new path for Financial Investors”Mohit Garg
 
Bitcoin price today BTC to USD market cap.pdf
Bitcoin price today BTC to USD market cap.pdfBitcoin price today BTC to USD market cap.pdf
Bitcoin price today BTC to USD market cap.pdfFranck La Rocca
 
Crypto Quantum Leap (1).pdf
Crypto Quantum Leap (1).pdfCrypto Quantum Leap (1).pdf
Crypto Quantum Leap (1).pdfMukeshbhaskar8
 
Bitcoin Final Year Seminar Report
Bitcoin Final Year Seminar ReportBitcoin Final Year Seminar Report
Bitcoin Final Year Seminar ReportShantanu Singh
 
Bitcoin Beginner_ A Step By Step Guide To Buying, Selling And Investing In Bi...
Bitcoin Beginner_ A Step By Step Guide To Buying, Selling And Investing In Bi...Bitcoin Beginner_ A Step By Step Guide To Buying, Selling And Investing In Bi...
Bitcoin Beginner_ A Step By Step Guide To Buying, Selling And Investing In Bi...vensanpublishing
 
IMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docxIMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docxMuskanRath1
 
BITCOIN TECHNOLOGY(AAappZZ)
BITCOIN TECHNOLOGY(AAappZZ)BITCOIN TECHNOLOGY(AAappZZ)
BITCOIN TECHNOLOGY(AAappZZ)Arun Nair
 
Seminarreportonbitcoinapp02
Seminarreportonbitcoinapp02Seminarreportonbitcoinapp02
Seminarreportonbitcoinapp02Mayuresh Singh
 
Expert Bitcoin Price Predictions From 20K to 38K in 2023.pdf
Expert Bitcoin Price Predictions From 20K to 38K in 2023.pdfExpert Bitcoin Price Predictions From 20K to 38K in 2023.pdf
Expert Bitcoin Price Predictions From 20K to 38K in 2023.pdfFranck La Rocca
 
Bitcoin Transparency Using Blockchain.pptx
Bitcoin Transparency Using Blockchain.pptxBitcoin Transparency Using Blockchain.pptx
Bitcoin Transparency Using Blockchain.pptxMuhammadHamza579668
 
What are Cryptocurrencies?
What are Cryptocurrencies?What are Cryptocurrencies?
What are Cryptocurrencies?JNC X
 
Unraveling the Bitcoin Breakthrough_ The Future of Cryptocurrency.pdf
Unraveling the Bitcoin Breakthrough_ The Future of Cryptocurrency.pdfUnraveling the Bitcoin Breakthrough_ The Future of Cryptocurrency.pdf
Unraveling the Bitcoin Breakthrough_ The Future of Cryptocurrency.pdfhk2635475
 

Semelhante a Antonio Teti. Bitcoin: Lights and Shadows of Virtual Money. (20)

Crypto currency the bitcoin
Crypto currency the bitcoinCrypto currency the bitcoin
Crypto currency the bitcoin
 
bitcoin technology report
bitcoin technology reportbitcoin technology report
bitcoin technology report
 
“Emerging Investment Avenues: A new path for Financial Investors”
“Emerging Investment Avenues: A new path for Financial Investors”“Emerging Investment Avenues: A new path for Financial Investors”
“Emerging Investment Avenues: A new path for Financial Investors”
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Bitcoin price today BTC to USD market cap.pdf
Bitcoin price today BTC to USD market cap.pdfBitcoin price today BTC to USD market cap.pdf
Bitcoin price today BTC to USD market cap.pdf
 
Bitcoin A General Overview
Bitcoin A General Overview Bitcoin A General Overview
Bitcoin A General Overview
 
Bitcoin News.pdf
Bitcoin News.pdfBitcoin News.pdf
Bitcoin News.pdf
 
Crypto Quantum Leap (1).pdf
Crypto Quantum Leap (1).pdfCrypto Quantum Leap (1).pdf
Crypto Quantum Leap (1).pdf
 
Bitcoin Final Year Seminar Report
Bitcoin Final Year Seminar ReportBitcoin Final Year Seminar Report
Bitcoin Final Year Seminar Report
 
Bitcoin.pg
Bitcoin.pgBitcoin.pg
Bitcoin.pg
 
Bitcoin Beginner_ A Step By Step Guide To Buying, Selling And Investing In Bi...
Bitcoin Beginner_ A Step By Step Guide To Buying, Selling And Investing In Bi...Bitcoin Beginner_ A Step By Step Guide To Buying, Selling And Investing In Bi...
Bitcoin Beginner_ A Step By Step Guide To Buying, Selling And Investing In Bi...
 
IMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docxIMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docx
 
BITCOIN TECHNOLOGY(AAappZZ)
BITCOIN TECHNOLOGY(AAappZZ)BITCOIN TECHNOLOGY(AAappZZ)
BITCOIN TECHNOLOGY(AAappZZ)
 
Seminarreportonbitcoinapp02
Seminarreportonbitcoinapp02Seminarreportonbitcoinapp02
Seminarreportonbitcoinapp02
 
Crypto guide 4 beginners
Crypto guide 4 beginnersCrypto guide 4 beginners
Crypto guide 4 beginners
 
Expert Bitcoin Price Predictions From 20K to 38K in 2023.pdf
Expert Bitcoin Price Predictions From 20K to 38K in 2023.pdfExpert Bitcoin Price Predictions From 20K to 38K in 2023.pdf
Expert Bitcoin Price Predictions From 20K to 38K in 2023.pdf
 
Bitcoin Transparency Using Blockchain.pptx
Bitcoin Transparency Using Blockchain.pptxBitcoin Transparency Using Blockchain.pptx
Bitcoin Transparency Using Blockchain.pptx
 
What are Cryptocurrencies?
What are Cryptocurrencies?What are Cryptocurrencies?
What are Cryptocurrencies?
 
Unraveling the Bitcoin Breakthrough_ The Future of Cryptocurrency.pdf
Unraveling the Bitcoin Breakthrough_ The Future of Cryptocurrency.pdfUnraveling the Bitcoin Breakthrough_ The Future of Cryptocurrency.pdf
Unraveling the Bitcoin Breakthrough_ The Future of Cryptocurrency.pdf
 
Yamato kasukawa
Yamato kasukawaYamato kasukawa
Yamato kasukawa
 

Mais de Positive Hack Days

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesPositive Hack Days
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerPositive Hack Days
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesPositive Hack Days
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikPositive Hack Days
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQubePositive Hack Days
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityPositive Hack Days
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Positive Hack Days
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для ApproofPositive Hack Days
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Positive Hack Days
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложенийPositive Hack Days
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложенийPositive Hack Days
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application SecurityPositive Hack Days
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летPositive Hack Days
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиPositive Hack Days
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОPositive Hack Days
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке СиPositive Hack Days
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CorePositive Hack Days
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опытPositive Hack Days
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterPositive Hack Days
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиPositive Hack Days
 

Mais de Positive Hack Days (20)

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQube
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для Approof
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложений
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application Security
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке Си
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Antonio Teti. Bitcoin: Lights and Shadows of Virtual Money.

  • 2. Bitcoin: Lights and Shadows of Virtual Money Moscow, 23 May 2013 Over the last decade, according to the evolution of the Internet, attempts to achieve a coin cybernetics (cybercoin) or digital money, were numerous and mainly related to the growing use of the network for electronic commerce (E-commerce). But in recent years, more precisely since 2009, a new attempt to market a new virtual electronic money, seems to have taken the right direction and the sudden escalation of its use, seems to confirm success. It's called Bitcoin (digital currency) and its major peculiarity reside in anonymity and non-traceability.
  • 3. Bitcoin: Lights and Shadows of Virtual Money Moscow, 23 May 2013 Born a few years ago, is being heralded as a Bitcoin virtual currency whose success is surrounded by numerous oddities. The first is its creator: Satoshi Nakamoto. In an article published in October 2011 by The New Yorker, journalist Joshua Davis, who for years have started searching for the elusive inventor of Bitcoin, asserts that "Satoshi Nakamoto" is nothing more than just a pseudonym behind which lurks a group consisting of hundreds of experts in cryptography, peer-to-peer systems and techniques for transaction banking network.
  • 4. Bitcoin: Lights and Shadows of Virtual Money Moscow, 23 May 2013 The project has its origins in the architecture peer-to-peer (P2P), designed for applications requiring very high data transmission speed, allowing at the same time, sharing the same data among multiple users (nodes) on the same network. With this type of architecture, any node is able to initiate or complete any transaction. The nodes can differ among themselves in the local configuration, processing speed, in bandwidth and in the amount of stored data. The database that contains the information is distributed among the nodes of the network. The transactions are all tracked and transfers of bitcoin, including public accounts of the nodes are encrypted through the use of the system of public key cryptography, mathematical algorithm that provides security and protection to the transmitted data
  • 5. Bitcoin: Lights and Shadows of Virtual Money Moscow, 23 May 2013 The purpose of Bitcoin is essentially to allow the possession and the anonymous transfer of digital money. Another important feature is that Bitcoin addresses do not contain any information that could bring back to its rightful owner, which guarantees the anonymity function at any level. Regarding how to use Bitcoin, anyone can acquire the appropriate software at no cost and downloading it from the network. After the download and installation is automatic and program, it autonomously proceeds to update all transactions on different nodes of the network. The application also provides the generation of a bitcoin address in readable form, with random sequences of digits long and on average 33 characters, which always start by 1, of the form 1Ai83aafRLWYtMDNbP8b3uiWyquun6ot46..
  • 6. Bitcoin: Lights and Shadows of Virtual Money Moscow, 23 May 2013 Image of the software installation ...
  • 7. Bitcoin: Lights and Shadows of Virtual Money Moscow, 23 May 2013 Image generation of the address (in this case, for example, was added the name of Luigi Rossi, but the field can be left blank)
  • 8. Bitcoin: Lights and Shadows of Virtual Money Moscow, 23 May 2013 The Bitcoin you can buy on the Internet with any currency. The value of Bitcoin increases exponentially. In May, 2012, a Bitcoin was quoted at 03.05 U.S. dollars. In April 2013, the value of a Bitcoin has come to 229 U.S. dollars.
  • 9. Bitcoin: Lights and Shadows of Virtual Money Moscow, 23 May 2013 The benefits of Bitcoin are: 1. Limited. The amount of bitcoins in circulation is limited, and this allows you to maintain the value. The higher value, the coin is more convenient to use in terms of its exchange ratio. Moreover, being a coin "strong" can also be regarded as a "reserve" to be set aside. The most direct comparison is with the gold: there is less gold in circulation, the higher its value. 2. Network Management software. The currency is exchanged on the Internet, directly in a peer-to-peer and without any supervisory authorities, banking and government. 3. Forgery impossible. Contrary to what happens for the other currencies, bitcoin can not be falsified. The maximum amount outstanding is fixed and transactions, with regard to the quantities of currency, are all checked and verified. 4. Exchange and methods of use facilitated. The bitcoin can be exchanged easily and quickly on the net. 5. Custody and simplified reserved. The bitcoin may be stored individually (in their own personal computers) without the aid of banks or bodies to ensure the housing. 6. Store of value. Being a very stable currency value (contrary to what happens in other currencies), can be a "safe haven."
  • 10. Bitcoin: Lights and Shadows of Virtual Money Moscow, 23 May 2013 Since bitcoins are routed through a peer-to-peer, it remains impossible to trace the movements of electronic money and to disclose the identity of those who carry out transactions. These features make the currency of bitcoins privileged for all those transactions illegal and criminal activities, such as the sale of weapons and drugs. For example, on-site Silk Road, you can buy drugs using Bitcoin (everything is handled in a completely anonymous) Bitcoin address
  • 11. Bitcoin: Lights and Shadows of Virtual Money Moscow, 23 May 2013 Very few would have bet on the simple existence in the life of this virtual money. Indeed, many had announced that its value would be returned to zero within a few months. Although the global economic scenario, more and more confused and chaotic, does not bode well for the near future, the existence of a cryptomoneta as a form of payment and investment, it may be winning And not just because of the uncertainty in the currency markets, as well as for the possibility of trade and financial transactions that might escape the controls that government institutions in many countries are working to combat rampant tax evasion. Bitcoin may actually represent a revolutionary tool in the world scenario. Last year, some have even claimed that if Bin Laden had been available at the time of this prodigious cryptomoneta, would be able to equip themselves with better weapons and a wider chain of acquisition of infrastructure and equipment!
  • 12. Bitcoin: Lights and Shadows of Virtual Money Moscow, 23 May 2013