Tag Archive for: Bitcoin

Bitcoin and Geopolitical Rivalry | Geopolitical Monitor


Bitcoin, the flagship stateless cryptocurrency, is a double-edged sword that can either strengthen or harm national power. As financial warfare becomes increasingly complex, this decentralized cybercurrency is acting as a versatile strategic instrument of statecraft that can play various roles under confrontational geopolitical circumstances. This under-researched subject matter needs to be clarified because it entails meaningful implications for national security, strategic intelligence, foreign policy and grand strategy, but also for the domain of high finance. In order to provide a sharper sense of situational awareness, the following article integrates strategic forecasts that attempt to predict the hypothetical usefulness of Bitcoin for conflicts with scrutiny of illustrative contemporary examples that point in a similar direction.

 

Analysis of Hypothetical Applications

BTC circuits as conduits to bypass sanctions

Bitcoin can offer a potential lifeline for states under sanctions that need to ensure the continuity of their international economic exchanges. Since the BTC grid cannot be controlled by the coercive or restrictive power of national states, its borderless circuitry provides secondary financial arteries worth harnessing to bypass sanctions that limit the ability to carry out cross-border transactions and transfer wealth through more conventional platforms ‒ anchored to major reserve currencies ‒ that enable international payments. An additional advantage of decentralized virtual currencies for sanctioned states is their discretion. They offer covert gateways to engage formal financial systems or even to avoid them altogether if necessary. In other words, it is difficult to determine if sanctions are being neutralized through cryptocurrencies like BTC.

Furthermore, despite their drawbacks ‒ including wildly volatile exchange rates ‒ nonstate cryptocurrencies like BTC are helpful to evade sanctions thanks to their growing transnational projection, their unsupervised channels, and their lack of centralized nerve centers that could be politically threatened, co-opted, or influenced. An academic essay written by US military officer Deane Konowicz for the US…

Source…

5 crypto facts you probably didn't know with @Gen Z Money | Aden Rao #okx #shorts



Secure your crypto Bitcoin. Privacy. Self-custody. ZK Rollups. Jameson Lopp co-Founder Casa wallet



Bitcoin developer loses $3.3 million in massive hack


Published: 2023-01-02T15:33:29

Updated: 2023-01-02T15:33:41

A Bitcoin core developer has had his server hacked after his security key was compromised. The hacker has supposedly stolen over 200 BTC, worth around 3.3 million dollars.

Luke Dashjr, a developer who works on Bitcoin Core, the technology and security behind the cryptocurrency, has lost over 200 Bitcoins in an apparent hack.

According to Dashjr’s Twitter, the PGP key (Pretty Good Privacy) was compromised and allowed the hacker to loot his Bitcoin from the computer they were being stored on.

A PGP key is an encryption method that utilizes two different keys to lock away information. Dashjr has identified the Bitcoin wallets that some of the money was sent to, but as of yesterday, claims it has all gone.

Article continues after ad

Dashjr had been targeted in an attempted smash-and-grab on his Bitcoin stash earlier in the year but brushed it off after investigating. On his Mastodon, Dashjr stated he had “purged the backdoors” implemented in the attack, but couldn’t find any evidence of it being used.

Dashjr also deleted a tweet in regards to his “cold wallet”. This is a type of Bitcoin wallet that is kept offline to ensure maximum security. Dashjr questioned whether or not it was “Maybe not as cold as intended?”

According to another developer, Peter Todd, Dashjr’s active PC runs a Linux distro called Gentoo. This was also where he stored his “hot” Bitcoin wallet. A hot wallet is one that is actively connected to the internet and can be accessed at any time.

Article continues after ad

If a compromised piece of software made it on, as Dashjr suspects, then it was an inevitability of it getting stolen and not a targeted attack.

Source…