Home | Index | Title | Introduction | Security Concerns | Legal issues | Further Research | Syllabus | Bibliography |
It’s nearly impossible to pinpoint who or how many could have been involved in doing this malicious act let alone figuring out where and how the money was divined in the end. Obviously all the leaked pics were most likely not from the same hacker and probably acquired at different times from a variety of different methods and were shelved until they could release it all at once in effort to make the leak more viral. Merely calling this process successful is an understatement. Even with this system inadvertently violating rights of privacy and promoting other crimes, the bitcoin system makes it hard to track even the most conspicuous acts of transaction in order to protect those who use it. “At any given time, between twenty and thirty thousand computers are online making up the network. Every time a transaction is made. If someone tries to spend a Bitcoin twice, the one that occurred first in time is valid, and the second is not.” (Turpin)
Previous