Welcome to Inqilab Patel's Blog

Students' Resource centre, developed to facilitate students in their studies.

O/A Level Computer Studies with Inqilab Patel

A Highly experienced, well educated and self motivated computer teacher.

Ruknuddin Patel's Web portal

In touch with tomorrow

Inqilab Patel's Mag

Inqilab Patel's Magazine is a Students Resource Centre. It is developed to facilitate students of IT, O / A Level and Business Administration in their studies and to make them literate on current Global Political Issues.

RIC: Ruknuddin Institute of Computer

RIC: Ruknuddin Insitute of Computer (Management, IT) is established in April 15, 1995 by Inqilab Ruknuddin Patel. It is organising Skill Development Programmes (SDP) in the fields of Information Technology and Business Administration.

Monday 30 June 2014

Eating forgetfully during fast.

If a person who is fasting eats or drinks something forgetfully, his fast does not become invalid.

ورلڈ کپ فٹبال: کون روزہ رکھ رہا ہے؟

سوئٹزرلینڈ کی ٹیم میں چھ مسلمان کھلاڑی ہیں جن میں ڈیفینڈر فلپ سیندیوروس نے دو سال ہوئے مانچسٹر کے اسلامک سینٹرمیں اسلام قبول کیا ہے

1986 کے بعد برازیل میں جاری حالیہ فٹبال ورلڈ کپ پہلا ورلڈ کپ ہے جس کے دوران رمضان کا مہینہ آیا ہے، تاہم برطانیہ کے تقریباً 19 گھنٹے کے مقابلے برازیل میں یہ روزہ صرف 11 گھنٹے کا ہے۔

عالمی کپ میں شرکت کرنے والی غیر مسلم ممالک کی ٹیموں میں بھی متعدد مسلمان کھلاڑی کھیل رہے ہیں تاہم ورلڈ کپ جیسے سخت اور مشکل مقابلے کے دوران بعض کھلاڑیوں نے روزے نہ رکھنے کا فیصلہ کیا ہے، جن میں جرمنی کے مشہور فٹبالر مسعود اوزیل اور فرانس کے بکری سنیا شامل ہیں


 عالمی کپ میں شریک الجزائر کی ٹیم کے منیجر واحد خلیل ہودچ اس بات پر سخت برہم ہیں کہ ان سے بار بار یہ سوال کیوں کیا جارہا ہے کہ ان کی ٹیم کے کتنے کھلاڑی روزے رکھیں گے؟

ہودچ کا کہنا ہے کہ روزے رکھنا کسی بھی شخص کا ذاتی معاملہ ہے اور اس کا احترام کیا جانا ضروری ہے۔

بوسنیا سے تعلق رکھنے والے ہودچ نے الجزائر کے ان اخبارات کو آڑے ہاتھوں لیا ہے جنھوں نے ان پر تنقید کی ہے۔ان کا کہنا ہے کہ ان نقادوں کو یہ جان لینا چاہیے کہ وہ بھی مسلمان ہیں۔


بیلجیئم کی ٹیم میں مروین فلیانی، موسی دمبیلے اور عدنان جنوزاد تین مسلمان کھلاڑی شامل ہیں

آئیوری کوسٹ کی ٹیم اگرچہ عالمی کپ سے باہر ہو چکی ہے لیکن اس کے کھلاڑی کولو طورے نے یہ طے کر رکھا تھا کہ وہ میچوں کے دوران بھی روزے رکھیں گے۔

کولو طورے کا کہنا ہے کہ رمضان کے ابتدائی چند روزے مشکل ہوتے ہیں لیکن پھر آپ کا جسم عادی ہو جاتا ہے۔

طورے کہتے ہیں کہ ان کے لیے روزہ رکھ کر فٹبال کھیلنا نئی بات نہیں ہے البتہ وہ رمضان کے دوران ڈاکٹر اور ٹرینر کی خاص ہدایات پرسختی سے عمل کرتے ہیں۔

کولو طورے کے بھائی یحییٰ طورے بھی آئیوری کوسٹ سے کھیلتے ہیں اور ان کا خیال بھی اپنے بھائی سے مختلف نہیں۔

فرانس کی ٹیم میں شامل مسلمان کھلاڑیوں میں کریم بینزیما، مامدو سکو، بکری سنیا اور موسیٰ سیسو کو شامل ہیں۔

فرانس کی ٹیم میں کریم بینزیما کے علاوہ بھی مسلمان کھلاڑی ہیں

بوسنیا کی ٹیم میں اکثریت مسلمان کھلاڑیوں کی ہے جن میں قابل ذکر مانچسٹرسٹی سے کھیلنے والے ایڈن زیکو ہیں تاہم یہ ٹیم بھی عالمی کپ سے باہر ہو چکی ہے۔

بیلجیم کی ٹیم میں تین مسلمان کھلاڑی مروین فیلیانی، موسی دمبیلے اور عدنان جنوزاد شامل ہیں۔فیلیانی اور جنوزاد انگلش کلب مانچسٹر یونائیٹڈ کی نمائندگی کرتے ہیں۔

بیلجیئم کا پری کوارٹرفائنل میں امریکہ سے مقابلہ ہونے والا ہے۔

سوئٹزرلینڈ کی ٹیم میں بھی چھ مسلمان کھلاڑی موجود ہیں جن میں دفاعی کھلاڑی فلپ سیندیروس نے دو سال ہوئے مانچسٹر کے اسلامک سینٹر میں اسلام قبول کیا تھا۔

سوئٹزر لینڈ کی ٹیم پری کوارٹر فائنل میں ارجنٹائن کے مد مقابل ہوگی۔


الجزائر کی ٹیم کے تمام کھلاڑی جبکہ بوسنیا کی ٹیم میں بیشتر کھلاڑی مسلمان ہیں

Sunday 29 June 2014

Beware of brain-eating amoeba

AT least eight people died in Karachi due to primary amoebic meningo-encephelitis (PAM) this year. This is a micro-organism which lives in bodies of warm fresh water like swimming pools, rivers, lakes and storage of water supply.

It is also found in soil, near warm water discharges of industrial plants, and unchlorinated swimming pools in an amoeboid or temporary flagellate stage.

It is a heat-resistant organism and survives even at 46 degrees of temperature. It is observed in the months of July, August and September.

The disease starts with fever, headache, nausea and vomiting. It progresses in three to seven days and affects the brain. A patient develops a symptom of confusion, hallucinations and fits. The mortality rate is 98 per cent because the drugs available are not so effective. Amphotericin B is used which is not completely effective and, therefore, a combination of drugs play a little role if administered in time.

Naegleria enters the nose of a person while swimming, diving, taking a bath in the river and the lake. It causes necrosis of nasal mucosa and reaches brain by climbing along nerves through the cribriform plate via the floor of cranium and starts affecting the brain.

The organism begins to consume cells of the brain piecemeal by means of a unique sucking apparatus extended from its cell surface. Hence called as ‘brain eating amoeba’.

This infection is diagnosed by the examination of cerebrospinal fluid on microscope by staining and culture. Culture takes time and, hence the delay in diagnosis: the fast method nowadays to diagnose this disease is PCR test.

How to prevent it? The answer is to avoid the entry of water into nose while swimming, taking a bath and cleaning the nose. If unavoidable, then do not clean it by forceful sucking of water into the nose.

Water in swimming pools, water- supply storage tanks, water parks at entertainment places should be thoroughly chlorinated and this is not a difficult job. The government should act on time before hundreds and thousands die.

DR MURLIDHAR Karachi

Wednesday 25 June 2014

Android and Windows to get 'kill switch'

Google and Microsoft will add a "kill-switch" feature to their Android and Windows phone operating systems.

The feature is a method of making a handset completely useless if it is stolen, rendering a theft pointless.

Authorities have been urging tech firms to take steps to help curb phone theft and argued that a kill-switch feature can help resolve the problem.

Apple and Samsung, two of the biggest phone makers, offer a similar feature on some of their devices.

The move by Google and Microsoft means that kill switches will now be a part of the three most popular phone operating systems in the world.
Growing problem
Smartphone theft has become a big problem across the world. According to a report by US authorities:
Some 3.1 million mobile devices were stolen in the US in 2013, nearly double the number of devices stolen in 2012
One in three Europeans experienced the theft or loss of a mobile device in 2013
In South Korea mobile device theft increased five-fold between 2009 and 2012
In Colombia criminals stole over one million devices in 2013

In an attempt to tackle the issue, policymakers have launched an initiative called Secure our Smartphones.

As part of it, they have urged technology firms to take steps to make it less attractive for robbers to steal mobile devices.

"An activated kill switch converts an easy-to-sell, high-value multimedia device into a jumble of plastic and glass, drastically reducing its street value," the report by New York Attorney General said.


Explainer: How a kill switch works
A "hard" kill switch would render a stolen device permanently unusable and is favoured by legislators who want to give stolen devices the "value of a paperweight"
A "soft" kill switch only make a phone unusable to "an unauthorised user"
Some argue that the only way to permanently disable a phone is to physically damage it
Experts worry that hackers could find a way to hijack a kill signal and turn off phones
If a phone is turned off or put into aeroplane mode, it might not receive the kill signal at all, warn experts


Authorities claim that Apple's feature - dubbed Activation Lock - which it introduced on all iPhones running the iOS 7 operating system in September last year, has helped reduce theft substantially.

According to a report by the New York State Attorney General, in the first five months of 2014 the theft of Apple devices fell by 17% in New York City.

Meanwhile iPhone robberies fell 24% in London and 38% in San Francisco in the six months after Apple introduced the feature, compared to the previous six months.

"During the same period, thefts of other popular mobile devices increased," the report says.

Manoj Menon, managing director of consulting firm Frost & Sullivan said the move was a step in the right direction.

"This is a fantastic move and will go a long way in helping authorities come one step closer to realising a vision of zero theft of mobile phone," he told the BBC.

But he added that it was "not a foolproof system" as thieves "will find a way to monetise the accessories and parts of a phone".

However, he said the market for parts and accessories was relatively small and the kill switch "does substantially reduce the financial incentive of stealing a device".

Tuesday 24 June 2014

Microsoft to release Android-powered Nokia X2 handset


The operating system, developed by Google, is usually seen as a rival to Microsoft's own Windows Phone OS.
Microsoft said the Nokia X2 offered it a way to hook users into its cloud-based services, several of which come pre-installed as apps.
One expert said the alternative would have been leaving "money on the table".

"I still find it astounding that Microsoft is making Android phones, but there seems to be a steely determination to take a more open approach for the greater good of the whole company rather than just the Windows Phone platform," said Ben Wood, from the telecoms consultancy CCS Insight.
"If they don't do this, then someone else is going to get the business.
"I also think it's a reflection of the fact that Nokia's budget Asha line of feature phones was unable to compete with entry-level Android mobiles."
Microsoft completed its takeover of Nokia's handset division on 25 April at a cost of 5.4bn euros ($7.4bn; £4.4bn).
'App gap'
The X2 is the follow-up to the original X, launched in February before Nokia sold its mobile business.
The original model became the best-selling mobile in Pakistan and the third best-selling handset in India - according to market-research company GfK - as well as achieving strong sales in Russia, Kenya and Nigeria.
  • a slightly bigger 4.3in (11cm) screen
  • 1GB of RAM - double the amount of memory previously included
  • a more powerful battery
  • the addition of a front-facing camera for selfies
It will cost 99 euro ($135; £80) when released in July.
Microsoft's video chat app Skype, its Outlook email service and its OneDrive internet storage apps all come pre-loaded.
The firm is also promoting some of its other apps - including Bing Search, the Yammer business-focused social network and the OneNote idea jotting service - as optional free downloads for the device.
"The whole idea of bringing more people into Microsoft Cloud through these services is the very core of the strategy," Jussi Nevanlinna, vice-president of mobile phones product marketing at Microsoft, told the BBC.
Nokia X2Microsoft says that it has used a new two-layer coating that makes the phone's case appear to "glow"
"In fact we're ahead of other Android devices [in this respect].
"But I want to stress that Lumia remains our primary smartphone strategy and that Nokia X is a stepping stone to it."
Missing apps
The tile-based homescreen and ability to see apps displayed as a scrollable list on the X2 mirrors the Window Phone user interface, which might help encourage consumers to later make the leap to Microsoft's more expensive Lumia range.
However, Mr Wood said there was a risk that the users would instead switch to other Android models since Windows Phone still lags behind its rival in terms of the amount of third-party software it offers.
"That's the calculated risk that Microsoft is taking," he explained.
"The firm needs to rapidly close the app gap between the experience on an Android phone and the experience on a Windows Phone.
"But by going down this route it will at least inform Microsoft as to which apps it had better urgently get if it wants to secure people on the upgrade cycle."
Windows Phone now boasts over 250,000 apps including Instagram and Vine, which were high-profile absentees until November.
But several banking apps, games, video on-demand software, and apps used to control wearable fitness trackers - all available on Android - remain absent.
The Nokia X2 can run the bigger library of Android apps, but unless users hack the device they can only browse available software via the Nokia Store - which excludes some programs - rather than the more fully-stocked Google Play.


نابیناؤں کے لیے ’اسمارٹ چشمہ‘

آکسفورڈ یونیورسٹی کے محققین کا کہنا ہے کہ انہوں نے شدید کمزور نظر والوں کے لیے سمارٹ چشمے بنانے کی سمت میں اہم کامیابی حاصل کی ہے۔
یہ چشمے اپنے نزدیک موجود لوگوں اور چیزوں کی تصویر کا سائز بڑھا دیتے ہیں جو اپنے ارد گرد کے ماحول کی زیادہ صاف تصویر مہیا کرتا ہے۔
اس چشمے کے استعمال کے نتیجے میں کچھ لوگ اپنے ’گائیڈ ڈاگ‘ کو پہلی بار دیکھنے کے قابل ہو سکے ہیں۔
رائل نیشنل انسٹی ٹیوٹ آف بلائنڈ پیپل کا کہنا ہے کہ یہ چشمہ ’انتہائی اہم‘ ہو سکتا ہے۔
لین اولیور کو آنکھ کی بیماری ’پروگریسیو آئی ڈذيز‘ ہے جس کی وجہ سے وہ بہت کم دیکھ پاتی ہیں۔ ابھی وہ 70 سال کی ہے لیکن جب وہ بيس سال کی عمر میں ہی انہیں ریٹنا ٹس پگمیٹوسا کے بارے میں پتہ چلا تھا۔
وہ ارد گرد میں ہو رہی حرکتوں کو بھانپ لیتی ہیں لیکن ان کے مطابق ان کی نظر ’دھبا نما اور دھندلائی‘ ہوئی ہوتی ہے۔
اس چشمے کے استعمال کے نتیجے میں کچھ لوگ اپنے ’گائیڈ ڈاگ‘ کو پہلی بار دیکھنے کے قابل ہو سکے ہیں
ان کا گائیڈ ڈاگ جیس رکاوٹوں اور خطرات سے بچاتے ہوئے انہیں راستہ تلاش میں مدد کرتا ہے لیکن ارد گرد کے بارے میں وہ دیگر معلومات کو نہیں دے سکتا ہے۔
لِن برطانیہ میں ان دو لاکھ لوگوں میں سے ایک ہے جن کی روز مرہ کی زندگی سنگین نظر مسئلہ کی وجہ سے متاثر ہوتی ہے۔ ان میں سے زیادہ تر میں تھوڑی بہت نظر بچی ہے۔
رائل نیشنل انسٹی ٹیوٹ آف بلائنڈ پیپل کا کہنا ہے کہ یہ چشمہ ’انتہائی اہم‘ ہو سکتا ہے
آکسفورڈ یونیورسٹی میں محققین نے سمارٹ چشمے کا استعمال کر اسے بڑھانے کا طریقہ تیار کیا ہے۔ ان چشموں میں ایک خاص طرح کا 3 ڈی کیمرے لگے ہے۔
اس چشمہ سے نظر آنے والی تصاویر کے کمپیوٹر کی مدد سے عمل ہو کر اسی وقت لوگوں کو ارد گرد کی چیزوں کی واضح تصویر فراہم کرتی ہے۔
ان چشموں کو اس سے پہلے دیگر ماڈلز بھی آزما چکے ہیں لیکن ماڈل اس منصوبے میں ایک اہم مرحلہ ہے۔
یہ چشمے اپنے نزدیک موجود لوگوں اور چیزوں کی تصویر کا سائز بڑھا دیتے ہیں
یہ زیادہ وضاحت کے ساتھ دیکھنے میں مدد کرتی ہے۔ آکسفورڈ یونیورسٹی کے ڈاکٹر سٹیفن ہِكس جو اس منصوبے کی قیادت کر رہے ہیں کا کہنا ہے کہ وہ ان کی تحقیق کو گھر میں استعمال کرنے کے لیے تیار ہیں۔
ان کا کہنا ہے کہ اس کو استعمال کرنے والوں نے بہت اچھی رائے دی ہے۔
رائل نیشنل انسٹی ٹیوٹ آف بلائنڈ پیپل اس منصوبہ پر نظر رکھے ہوئے ہے۔ ادارے کے جان ورسفولڈ کا کہنا ہے کہ یہ لوگوں کی زندگی میں ایک بڑا فرق پیدا کر سکتا ہے۔

Monday 23 June 2014

Computer Architecture & Fetch-Execute Cycle

http://web.eecs.utk.edu/research/cs100modules/module1/index.html
Although computers can have many different forms, there are four functional components that all computers must have:
(1) Input/Output (I/O)
(2) Memory
(3)A Control Unit
(4)An Arithmetic Logic Unit (ALU)
This idea about how computers should be built, called the von Neumann Architecture after mathematician John von Neumann who proposed it in 1945, is still the basis for computers today. Using these four components, a von Neumann computer will execute a series of instructions, called a program, which are stored in the computer's memory. This is called the stored program concept.
Click here for detailed presentation:
http://web.eecs.utk.edu/research/cs100modules/module1/index.html


Saturday 21 June 2014

'پوری دنیا کیلئے مفت انٹرنیٹ

ذرائع ابلاغ کے مطابق دنیا بھر میں انٹرنیٹ کی مفت سہولت وائی فائی کے ذریعے فراہم کی جائے گی۔
کمپنی کا کہنا ہے کہ وہ سیٹلائٹ کے ذریعے دنیا بھر میں انٹرنیٹ فراہم کرے گی جسے مفت استعمال کیا جا سکے گا۔
اس ٹیکنالوجی کے بعد افریقہ کے گھنے جنگلوں میں بیٹھا انسان بھی انٹرنیٹ کو بالکل اسی طرح استعمال کر سکے گا جس طرح کوئی شخص امریکا کے کسی ترقیاتی شہر میں بیٹھ کر انٹرنیٹ کی سہولت سے مستفید ہو رہا ہو۔
کمپنی کے حکام کا کہنا ہے کہ یہ پراجیکٹ کافی مہنگا ہے لیکن جلد ہی اس پر کام شروع کر دیا جائے گا جس کے بعد مفت انٹرنیٹ سب کی دسترس میں ہوگا۔

Wednesday 18 June 2014

Amazon Fire Phone offers 3D views and gesture controls


Amazon has unveiled its first handset, offering 3D visuals - thanks to four face-tracking cameras on its front - and gesture controls.
The Fire Phone allows its user to change an image's perspective by moving their head, rather than creating "pop-out" effects.
The owner can also scroll through a webpage or bring up menus by tilting the smartphone in their hand.
Chief executive Jeff Bezos announced the phone at a press event in Seattle.
One industry watcher had doubts about what was on show.
"We've seen similar gesture controls on Samsung's Galaxy range, and not many people use them," said Francisco Jeronimo, a mobile devices analyst at market research firm IDC.
"Unless the experience is extraordinary it can come across as a gimmick. I'd be surprised if Amazon has succeeded when Samsung hasn't, but I'll need to try it.
Fire Phone 3D effectMr Bezos showed how the "dynamic perspective" effect could be used to help navigate maps by looking around the side of landmarks
The launch comes at a time when Amazon's tablet sales appear to be on the wane, despite recent price promotions.

The basic version of the Fire Phone, with 32 gigabytes (GB) of storage, will cost $199 (£117) on top of a two-year contract with AT&T - the only network to offer it initially - on 25 July.


That is the same price AT&T charges for the 16GB versions of Apple's iPhone 5S and Samsung's Galaxy S5.
The "dynamic perspective" effect is made possible by the inclusion of four "ultra-low power" cameras coupled with four infrared LEDs, which permit the device to keep tracking the position of the user's eyes and mouth in the dark.
The process only requires two cameras, but the firm said the extra two meant users would not need to worry how they held the handset.
Mr Bezos gave the example of looking at a dress' design from different angles as an example of how the effect could be used, and showed how a handset could be tilted afterwards to make it move onto another garment.
Another innovation introduced by the Fire Phone is a dedicated side-button to activate Firefly, an app that allows it recognise text, images and sound in the smartphone's immediate vicinity.
It can be used to bring up information - for example details of a wine, the name of a song, or information about a painting - and when relevant, the chance to buy the same or a related product from Amazon.
The facility relies on Amazon's computer servers, so will not be available when the phone is offline.
"Firefly is not just about taking you back to the Amazon store, it's about knowing so much more about consumers - things Amazon would not have known before," noted Carolina Milanesi, from research firm Kantar Worldpanel Comtech.
FireflyThe Firefly facility could encourage owners to make impulse purchases from Amazon
The device also takes advantage of several other online services the company offers, including:
  • Mayday - the ability to call up an Amazon adviser via a video feed, with a promise of a response within 15 seconds
  • ASAP - a facility that pre-loads video content to the phone from the firm's Prime Instant Video‎ collection, basing its choices on the user's past viewing behaviour
  • Cloud Drive - the firm's internet based storage facility, which is being used to offer "unlimited" space for the photos it takes
  • Prime Music - access to more than a million songs that can be downloaded or streamed, although new releases are not included
Several of these services will only remain available if the owner renews their Amazon Prime membership after a year, at an annual cost of $99.
line

Amazon promised us something "a little bit different" - and on that front Jeff Bezos has delivered with a phone with a "wow factor" sporting several differentiators.
Sure, established phone makers LG and HTC had 3D displays back in 2011, but they used filters on top of the screen, a far cry from the "dynamic perspective" take on 3D Amazon is bringing us here.
The Firefly object recognition might prove more immediately useful for many users, and for Amazon itself, providing yet another virtually seamless route for purchases to be made through the retailer itself.
Fire PhoneThe basic Fire Phone offers more storage than the entry-level iPhone 5S and Galaxy S5, but its included Prime subscription only lasts for one year
Yet despite these unique features, Mr Bezos is treading into territory where other more established tech names have stumbled.
Amazon's recent foray into tablets has barely made a dent in the Apple-Samsung duopoly.
Consumers also do not appear to have warmed to Amazon's own software, a "forked" version of Google Android.
Its own app store may have some 240,000 apps, but many are poorly-rated third-party versions of popular apps found in Google Play, which has more than 1.2 million apps.
Even so, Amazon's offer of 12 months of free membership to its Prime services - including fast free deliveries of physical goods - will undoubtedly help this handset gain market traction, especially amongst price-sensitive customers.
And for those that do buy the Fire Phone, it will undoubtedly create a "halo effect" on the rest of Amazon's businesses; the big unknown is just how far it will stretch.
line

Amazon shipped one million Kindle Fire-branded devices in the first three months of this year, down from 1.8 million the same period in 2013,according to IDC.
Fire PhoneThe Fire Phone can scroll through documents by being tilted up and down
Its data indicates that Amazon's market share of the tablet sector now stands at 1.9%, about half what it was a year ago.
The handset market is an even more crowded space with several existing manufacturers failing to profit from the hardware they sell.
But with the number of global smartphone users approaching the two billion-mark, grabbing even a small fraction of the market could still prove valuable to the US firm.
"Most of the value Amazon will accrue from these handsets will be made over the following years after the initial sale," said Chris Green, principal technology analyst at the Davies Murphy Group consultancy.
"That's partly selling you follow-up annual subscriptions to its Prime services after the first 12 months.
"But it's also about one-off purchases such as paying for the rental of a movie that's not included in the subscription package and also buying apps from it store.

"I wouldn't say Amazon has tied everything together as well as Apple, but it's certainly done it much better than Google."

Monday 16 June 2014

Who’s using your data?

New Web technology would let you track how your private data is used online.

By now, most people feel comfortable conducting financial transactions on the Web. Thecryptographic schemes that protect online banking and credit card purchases have proven their reliability over decades.
As more of our data moves online, a more pressing concern may be its inadvertent misuse by people authorized to access it. Every month seems to bring another story of private information accidentally leaked by governmental agencies or vendors of digital products or services.
At the same time, tighter restrictions on access could undermine the whole point of sharing data. Coordination across agencies and providers could be the key to quality medical care; you may want your family to be able to share the pictures you post on a social-networking site.
Researchers in the Decentralized Information Group (DIG) at MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) believe the solution may be transparency rather than obscurity. To that end, they’re developing a protocol they call “HTTP with Accountability,” or HTTPA, which will automatically monitor the transmission of private data and allow the data owner to examine how it’s being used.
At the IEEE’s Conference on Privacy, Security and Trust in July, Oshani Seneviratne, an MIT graduate student in electrical engineering and computer science, and Lalana Kagal, a principal research scientist at CSAIL, will present a paper that gives an overview of HTTPA and presents a sample application, involving a health-care records system that Seneviratne implemented on the experimental network PlanetLab.
DIG is directed by Tim Berners-Lee, the inventor of the Web and the 3Com Founders Professor of Engineering at MIT, and it shares office space with the World Wide Web Consortium (W3C), the organization, also led by Berners-Lee, that oversees the development of Web protocols like HTTP, XML, and CSS. DIG’s role is to develop new technologies that exploit those protocols.
With HTTPA, each item of private data would be assigned its own uniform resource identifier (URI), a key component of the Semantic Web, a new set of technologies, championed by W3C, that would convert the Web from, essentially, a collection of searchable text files into a giant database.
Remote access to a Web server would be controlled much the way it is now, through passwords and encryption. But every time the server transmitted a piece of sensitive data, it would also send a description of the restrictions on the data’s use. And it would log the transaction, using only the URI, somewhere in a network of encrypted, special-purpose servers.
HTTPA would be voluntary: It would be up to software developers to adhere to its specifications when designing their systems. But HTTPA compliance could become a selling point for companies offering services that handle private data.
“It’s not that difficult to transform an existing website into an HTTPA-aware website,” Seneviratne says. “On every HTTP request, the server should say, ‘OK, here are the usage restrictions for this resource,’ and log the transaction in the network of special-purpose servers.”
An HTTPA-compliant program also incurs certain responsibilities if it reuses data supplied by another HTTPA-compliant source. Suppose, for instance, that a consulting specialist in a network of physicians wishes to access data created by a patient’s primary-care physician, and suppose that she wishes to augment the data with her own notes. Her system would then create its own record, with its own URI. But using standard Semantic Web techniques, it would mark that record as “derived” from the PCP’s record and label it with the same usage restrictions.
The network of servers is where the heavy lifting happens. When the data owner requests an audit, the servers work through the chain of derivations, identifying all the people who have accessed the data, and what they’ve done with it.
Seneviratne uses a technology known as distributed hash tables — the technology at the heart of peer-to-peer networks like BitTorrent — to distribute the transaction logs among the servers. Redundant storage of the same data on multiple servers serves two purposes: First, it ensures that if some servers go down, data will remain accessible. And second, it provides a way to determine whether anyone has tried to tamper with the transaction logs for a particular data item — such as to delete the record of an illicit use. A server whose logs differ from those of its peers would be easy to ferret out.
To test the system, Seneviratne built a rudimentary health-care records system from scratch and filled it with data supplied by 25 volunteers. She then simulated a set of transactions — pharmacy visits, referrals to specialists, use of anonymized data for research purposes, and the like — that the volunteers reported as having occurred over the course of a year.
Seneviratne used 300 servers on PlanetLab to store the transaction logs; in experiments, the system efficiently tracked down data stored across the network and handled the chains of inference necessary to audit the propagation of data across multiple providers. In practice, audit servers could be maintained by a grassroots network, much like the servers that host BitTorrent files or log Bitcoin transactions.

Saturday 14 June 2014

BitCoins

What is Bitcoin?

Bitcoin is a consensus network that enables a new payment system and a completely digital money. It is the first decentralized peer-to-peer payment network that is powered by its users with no central authority or middlemen. From a user perspective, Bitcoin is pretty much like cash for the Internet. Bitcoin can also be seen as the most prominent triple entry bookkeeping system in existence.

Who created Bitcoin?

Bitcoin is the first implementation of a concept called "crypto-currency", which was first described in 1998 by Wei Dai on the cypherpunks mailing list, suggesting the idea of a new form of money that uses cryptography to control its creation and transactions, rather than a central authority. The first Bitcoin specification and proof of concept was published in 2009 in a cryptography mailing list by Satoshi Nakamoto. Satoshi left the project in late 2010 without revealing much about himself. The community has since grown exponentially with many developers working on Bitcoin.
Satoshi's anonymity often raised unjustified concerns, many of which are linked to misunderstanding of the open-source nature of Bitcoin. The Bitcoin protocol and software are published openly and any developer around the world can review the code or make their own modified version of the Bitcoin software. Just like current developers, Satoshi's influence was limited to the changes he made being adopted by others and therefore he did not control Bitcoin. As such, the identity of Bitcoin's inventor is probably as relevant today as the identity of the person who invented paper.

Who controls the Bitcoin network?

Nobody owns the Bitcoin network much like no one owns the technology behind email. Bitcoin is controlled by all Bitcoin users around the world. While developers are improving the software, they can't force a change in the Bitcoin protocol because all users are free to choose what software and version they use. In order to stay compatible with each other, all users need to use software complying with the same rules. Bitcoin can only work correctly with a complete consensus among all users. Therefore, all users and developers have a strong incentive to protect this consensus.

How does Bitcoin work?

From a user perspective, Bitcoin is nothing more than a mobile app or computer program that provides a personal Bitcoin wallet and allows a user to send and receive bitcoins with them. This is how Bitcoin works for most users.
Behind the scenes, the Bitcoin network is sharing a public ledger called the "block chain". This ledger contains every transaction ever processed, allowing a user's computer to verify the validity of each transaction. The authenticity of each transaction is protected by digital signatures corresponding to the sending addresses, allowing all users to have full control over sending bitcoins from their own Bitcoin addresses. In addition, anyone can process transactions using the computing power of specialized hardware and earn a reward in bitcoins for this service. This is often called "mining". To learn more about Bitcoin, you can consult the dedicated page and the original paper.

Is Bitcoin really used by people?

Yes. There is a growing number of businesses and individuals using Bitcoin. This includes brick and mortar businesses like restaurants, apartments, law firms, and popular online services such as Namecheap, WordPress, Reddit and Flattr. While Bitcoin remains a relatively new phenomenon, it is growing fast. At the end of August 2013, the value of all bitcoins in circulation exceeded US$ 1.5 billion with millions of dollars worth of bitcoins exchanged daily.
Screenshot

How does one acquire bitcoins?

While it may be possible to find individuals who wish to sell bitcoins in exchange for a credit card or PayPal payment, most exchanges do not allow funding via these payment methods. This is due to cases where someone buys bitcoins with PayPal, and then reverses their half of the transaction. This is commonly referred to as a chargeback.

How difficult is it to make a Bitcoin payment?

Bitcoin payments are easier to make than debit or credit card purchases, and can be received without a merchant account. Payments are made from a wallet application, either on your computer or smartphone, by entering the recipient's address, the payment amount, and pressing send. To make it easier to enter a recipient's address, many wallets can obtain the address by scanning a QR code or touching two phones together with NFC technology.
Screenshot Screenshot

What are the advantages of Bitcoin?

  • Payment freedom - It is possible to send and receive any amount of money instantly anywhere in the world at any time. No bank holidays. No borders. No imposed limits. Bitcoin allows its users to be in full control of their money.
  • Very low fees - Bitcoin payments are currently processed with either no fees or extremely small fees. Users may include fees with transactions to receive priority processing, which results in faster confirmation of transactions by the network. Additionally, merchant processors exist to assist merchants in processing transactions, converting bitcoins to fiat currency and depositing funds directly into merchants' bank accounts daily. As these services are based on Bitcoin, they can be offered for much lower fees than with PayPal or credit card networks.
  • Fewer risks for merchants - Bitcoin transactions are secure, irreversible, and do not contain customers’ sensitive or personal information. This protects merchants from losses caused by fraud or fraudulent chargebacks, and there is no need for PCI compliance. Merchants can easily expand to new markets where either credit cards are not available or fraud rates are unacceptably high. The net results are lower fees, larger markets, and fewer administrative costs.
  • Security and control - Bitcoin users are in full control of their transactions; it is impossible for merchants to force unwanted or unnoticed charges as can happen with other payment methods. Bitcoin payments can be made without personal information tied to the transaction. This offers strong protection against identity theft. Bitcoin users can also protect their money with backup and encryption.
  • Transparent and neutral - All information concerning the Bitcoin money supply itself is readily available on the block chain for anybody to verify and use in real-time. No individual or organization can control or manipulate the Bitcoin protocol because it is cryptographically secure. This allows the core of Bitcoin to be trusted for being completely neutral, transparent and predictable.

What are the disadvantages of Bitcoin?

  • Degree of acceptance - Many people are still unaware of Bitcoin. Every day, more businesses accept bitcoins because they want the advantages of doing so, but the list remains small and still needs to grow in order to benefit from network effects.
  • Volatility - The total value of bitcoins in circulation and the number of businesses using Bitcoin are still very small compared to what they could be. Therefore, relatively small events, trades, or business activities can significantly affect the price. In theory, this volatility will decrease as Bitcoin markets and the technology matures. Never before has the world seen a start-up currency, so it is truly difficult (and exciting) to imagine how it will play out.
  • Ongoing development - Bitcoin software is still in beta with many incomplete features in active development. New tools, features, and services are being developed to make Bitcoin more secure and accessible to the masses. Some of these are still not ready for everyone. Most Bitcoin businesses are new and still offer no insurance. In general, Bitcoin is still in the process of maturing.

Why do people trust Bitcoin?

Much of the trust in Bitcoin comes from the fact that it requires no trust at all. Bitcoin is fully open-source and decentralized. This means that anyone has access to the entire source code at any time. Any developer in the world can therefore verify exactly how Bitcoin works. All transactions and bitcoins issued into existence can be transparently consulted in real-time by anyone. All payments can be made without reliance on a third party and the whole system is protected by heavily peer-reviewed cryptographic algorithms like those used for online banking. No organization or individual can control Bitcoin, and the network remains secure even if not all of its users can be trusted.

Can I make money with Bitcoin?

You should never expect to get rich with Bitcoin or any emerging technology. It is always important to be wary of anything that sounds too good to be true or disobeys basic economic rules.
Bitcoin is a growing space of innovation and there are business opportunities that also include risks. There is no guarantee that Bitcoin will continue to grow even though it has developed at a very fast rate so far. Investing time and resources on anything related to Bitcoin requires entrepreneurship. There are various ways to make money with Bitcoin such as mining, speculation or running new businesses. All of these methods are competitive and there is no guarantee of profit. It is up to each individual to make a proper evaluation of the costs and the risks involved in any such project.

Is Bitcoin fully virtual and immaterial?

Bitcoin is as virtual as the credit cards and online banking networks people use everyday. Bitcoin can be used to pay online and in physical stores just like any other form of money. Bitcoins can also be exchanged in physical form such as theCasascius coins, but paying with a mobile phone usually remains more convenient. Bitcoin balances are stored in a large distributed network, and they cannot be fraudulently altered by anybody. In other words, Bitcoin users have exclusive control over their funds and bitcoins cannot vanish just because they are virtual.

Is Bitcoin anonymous?

Bitcoin is designed to allow its users to send and receive payments with an acceptable level of privacy as well as any other form of money. However, Bitcoin is not anonymous and cannot offer the same level of privacy as cash. The use of Bitcoin leaves extensive public records. Various mechanisms exist to protect users' privacy, and more are in development. However, there is still work to be done before these features are used correctly by most Bitcoin users.
Some concerns have been raised that private transactions could be used for illegal purposes with Bitcoin. However, it is worth noting that Bitcoin will undoubtedly be subjected to similar regulations that are already in place inside existing financial systems. Bitcoin cannot be more anonymous than cash and it is not likely to prevent criminal investigations from being conducted. Additionally, Bitcoin is also designed to prevent a large range of financial crimes.

What happens when bitcoins are lost?

When a user loses his wallet, it has the effect of removing money out of circulation. Lost bitcoins still remain in the block chain just like any other bitcoins. However, lost bitcoins remain dormant forever because there is no way for anybody to find the private key(s) that would allow them to be spent again. Because of the law of supply and demand, when fewer bitcoins are available, the ones that are left will be in higher demand and increase in value to compensate.

Can Bitcoin scale to become a major payment network?

The Bitcoin network can already process a much higher number of transactions per second than it does today. It is, however, not entirely ready to scale to the level of major credit card networks. Work is underway to lift current limitations, and future requirements are well known. Since inception, every aspect of the Bitcoin network has been in a continuous process of maturation, optimization, and specialization, and it should be expected to remain that way for some years to come. As traffic grows, more Bitcoin users may use lightweight clients, and full network nodes may become a more specialized service. For more details, see the Scalability page on the Wiki.

Legal

Is Bitcoin legal?

To the best of our knowledge, Bitcoin has not been made illegal by legislation in most jurisdictions. However, some jurisdictions (such as Argentina and Russia) severely restrict or ban foreign currencies. Other jurisdictions (such as Thailand) may limit the licensing of certain entities such as Bitcoin exchanges.
Regulators from various jurisdictions are taking steps to provide individuals and businesses with rules on how to integrate this new technology with the formal, regulated financial system. For example, the Financial Crimes Enforcement Network (FinCEN), a bureau in the United States Treasury Department, issued non-binding guidance on how it characterizes certain activities involving virtual currencies.

Is Bitcoin useful for illegal activities?

Bitcoin is money, and money has always been used both for legal and illegal purposes. Cash, credit cards and current banking systems widely surpass Bitcoin in terms of their use to finance crime. Bitcoin can bring significant innovation in payment systems and the benefits of such innovation are often considered to be far beyond their potential drawbacks.
Bitcoin is designed to be a huge step forward in making money more secure and could also act as a significant protection against many forms of financial crime. For instance, bitcoins are completely impossible to counterfeit. Users are in full control of their payments and cannot receive unapproved charges such as with credit card fraud. Bitcoin transactions are irreversible and immune to fraudulent chargebacks. Bitcoin allows money to be secured against theft and loss using very strong and useful mechanisms such as backups, encryption, and multiple signatures.
Some concerns have been raised that Bitcoin could be more attractive to criminals because it can be used to make private and irreversible payments. However, these features already exist with cash and wire transfer, which are widely used and well-established. The use of Bitcoin will undoubtedly be subjected to similar regulations that are already in place inside existing financial systems, and Bitcoin is not likely to prevent criminal investigations from being conducted. In general, it is common for important breakthroughs to be perceived as being controversial before their benefits are well understood. The Internet is a good example among many others to illustrate this.

Can Bitcoin be regulated?

The Bitcoin protocol itself cannot be modified without the cooperation of nearly all its users, who choose what software they use. Attempting to assign special rights to a local authority in the rules of the global Bitcoin network is not a practical possibility. Any rich organization could choose to invest in mining hardware to control half of the computing power of the network and become able to block or reverse recent transactions. However, there is no guarantee that they could retain this power since this requires to invest as much than all other miners in the world.
It is however possible to regulate the use of Bitcoin in a similar way to any other instrument. Just like the dollar, Bitcoin can be used for a wide variety of purposes, some of which can be considered legitimate or not as per each jurisdiction's laws. In this regard, Bitcoin is no different than any other tool or resource and can be subjected to different regulations in each country. Bitcoin use could also be made difficult by restrictive regulations, in which case it is hard to determine what percentage of users would keep using the technology. A government that chooses to ban Bitcoin would prevent domestic businesses and markets from developing, shifting innovation to other countries. The challenge for regulators, as always, is to develop efficient solutions while not impairing the growth of new emerging markets and businesses.

What about Bitcoin and taxes?

Bitcoin is not a fiat currency with legal tender status in any jurisdiction, but often tax liability accrues regardless of the medium used. There is a wide variety of legislation in many different jurisdictions which could cause income, sales, payroll, capital gains, or some other form of tax liability to arise with Bitcoin.

What about Bitcoin and consumer protection?

Bitcoin is freeing people to transact on their own terms. Each user can send and receive payments in a similar way to cash but they can also take part in more complex contracts. Multiple signatures allow a transaction to be accepted by the network only if a certain number of a defined group of persons agree to sign the transaction. This allows innovative dispute mediation services to be developed in the future. Such services could allow a third party to approve or reject a transaction in case of disagreement between the other parties without having control on their money. As opposed to cash and other payment methods, Bitcoin always leaves a public proof that a transaction did take place, which can potentially be used in a recourse against businesses with fraudulent practices.
It is also worth noting that while merchants usually depend on their public reputation to remain in business and pay their employees, they don't have access to the same level of information when dealing with new consumers. The way Bitcoin works allows both individuals and businesses to be protected against fraudulent chargebacks while giving the choice to the consumer to ask for more protection when they are not willing to trust a particular merchant.

Economy

How are bitcoins created?

New bitcoins are generated by a competitive and decentralized process called "mining". This process involves that individuals are rewarded by the network for their services. Bitcoin miners are processing transactions and securing the network using specialized hardware and are collecting new bitcoins in exchange.
The Bitcoin protocol is designed in such a way that new bitcoins are created at a fixed rate. This makes Bitcoin mining a very competitive business. When more miners join the network, it becomes increasingly difficult to make a profit and miners must seek efficiency to cut their operating costs. No central authority or developer has any power to control or manipulate the system to increase their profits. Every Bitcoin node in the world will reject anything that does not comply with the rules it expects the system to follow.
Bitcoins are created at a decreasing and predictable rate. The number of new bitcoins created each year is automatically halved over time until bitcoin issuance halts completely with a total of 21 million bitcoins in existence. At this point, Bitcoin miners will probably be supported exclusively by numerous small transaction fees.

Why do bitcoins have value?

Bitcoins have value because they are useful as a form of money. Bitcoin has the characteristics of money (durability, portability, fungibility, scarcity, divisibility, and recognizability) based on the properties of mathematics rather than relying on physical properties (like gold and silver) or trust in central authorities (like fiat currencies). In short, Bitcoin is backed by mathematics. With these attributes, all that is required for a form of money to hold value is trust and adoption. In the case of Bitcoin, this can be measured by its growing base of users, merchants, and startups. As with all currency, bitcoin's value comes only and directly from people willing to accept them as payment.

What determines bitcoin’s price?

The price of a bitcoin is determined by supply and demand. When demand for bitcoins increases, the price increases, and when demand falls, the price falls. There is only a limited number of bitcoins in circulation and new bitcoins are created at a predictable and decreasing rate, which means that demand must follow this level of inflation to keep the price stable. Because Bitcoin is still a relatively small market compared to what it could be, it doesn't take significant amounts of money to move the market price up or down, and thus the price of a bitcoin is still very volatile.
Bitcoin price, 2011 to 2013:
chart

Can bitcoins become worthless?

Yes. History is littered with currencies that failed and are no longer used, such as the German Mark during the Weimar Republic and, more recently, the Zimbabwean dollar. Although previous currency failures were typically due to hyperinflation of a kind that Bitcoin makes impossible, there is always potential for technical failures, competing currencies, political issues and so on. As a basic rule of thumb, no currency should be considered absolutely safe from failures or hard times. Bitcoin has proven reliable for years since its inception and there is a lot of potential for Bitcoin to continue to grow. However, no one is in a position to predict what the future will be for Bitcoin.

Is Bitcoin a bubble?

A fast rise in price does not constitute a bubble. An artificial over-valuation that will lead to a sudden downward correction constitutes a bubble. Choices based on individual human action by hundreds of thousands of market participants is the cause for bitcoin's price to fluctuate as the market seeks price discovery. Reasons for changes in sentiment may include a loss of confidence in Bitcoin, a large difference between value and price not based on the fundamentals of the Bitcoin economy, increased press coverage stimulating speculative demand, fear of uncertainty, and old-fashioned irrational exuberance and greed.

Is Bitcoin a Ponzi scheme?

A Ponzi scheme is a fraudulent investment operation that pays returns to its investors from their own money, or the money paid by subsequent investors, instead of from profit earned by the individuals running the business. Ponzi schemes are designed to collapse at the expense of the last investors when there is not enough new participants.
Bitcoin is a free software project with no central authority. Consequently, no one is in a position to make fraudulent representations about investment returns. Like other major currencies such as gold, United States dollar, euro, yen, etc. there is no guaranteed purchasing power and the exchange rate floats freely. This leads to volatility where owners of bitcoins can unpredictably make or lose money. Beyond speculation, Bitcoin is also a payment system with useful and competitive attributes that are being used by thousands of users and businesses.

Doesn't Bitcoin unfairly benefit early adopters?

Some early adopters have large numbers of bitcoins because they took risks and invested time and resources in an unproven technology that was hardly used by anyone and that was much harder to secure properly. Many early adopters spent large numbers of bitcoins quite a few times before they became valuable or bought only small amounts and didn't make huge gains. There is no guarantee that the price of a bitcoin will increase or drop. This is very similar to investing in an early startup that can either gain value through its usefulness and popularity, or just never break through. Bitcoin is still in its infancy, and it has been designed with a very long-term view; it is hard to imagine how it could be less biased towards early adopters, and today's users may or may not be the early adopters of tomorrow.

Won't the finite amount of bitcoins be a limitation?

Bitcoin is unique in that only 21 million bitcoins will ever be created. However, this will never be a limitation because bitcoins can be divided up to 8 decimal places ( 0.000 000 01 BTC ) and potentially even smaller units if that is ever required in the future. As the average transaction size decreases, transactions can be denominated in sub-units of a bitcoin, such as millibitcoins ( 1 mBTC or 0.001 BTC ).

Won't Bitcoin fall in a deflationary spiral?

The deflationary spiral theory says that if prices are expected to fall, people will move purchases into the future in order to benefit from the lower prices. That fall in demand will in turn cause merchants to lower their prices to try and stimulate demand, making the problem worse and leading to an economic depression.
Although this theory is a popular way to justify inflation amongst central bankers, it does not appear to always hold true and is considered controversial amongst economists. Consumer electronics is one example of a market where prices constantly fall but which is not in depression. Similarly, the value of bitcoins has risen over time and yet the size of the Bitcoin economy has also grown dramatically along with it. Because both the value of the currency and the size of its economy started at zero in 2009, Bitcoin is a counterexample to the theory showing that it must sometimes be wrong.
Notwithstanding this, Bitcoin is not designed to be a deflationary currency. It is more accurate to say Bitcoin is intended to inflate in its early years, and become stable in its later years. The only time the quantity of bitcoins in circulation will drop is if people carelessly lose their wallets by failing to make backups. With a stable monetary base and a stable economy, the value of the currency should remain the same.

Isn't speculation and volatility a problem for Bitcoin?

This is a chicken and egg situation. For bitcoin's price to stabilize, a large scale economy needs to develop with more businesses and users. For a large scale economy to develop, businesses and users will seek for price stability.
Fortunately, volatility does not affect the main benefits of Bitcoin as a payment system to transfer money from point A to point B. It is possible for businesses to convert bitcoin payments to their local currency instantly, allowing them to profit from the advantages of Bitcoin without being subjected to price fluctuations. Since Bitcoin offers many useful and unique features and properties, many users choose to use Bitcoin. With such solutions and incentives, it is possible that Bitcoin will mature and develop to a degree where price volatility will become limited.

What if someone bought up all the existing bitcoins?

Only a fraction of bitcoins issued to date are found on the exchange markets for sale. Bitcoin markets are competitive, meaning the price of a bitcoin will rise or fall depending on supply and demand. Additionally, new bitcoins will continue to be issued for decades to come. Therefore even the most determined buyer could not buy all the bitcoins in existence. This situation isn't to suggest, however, that the markets aren't vulnerable to price manipulation; it still doesn't take significant amounts of money to move the market price up or down, and thus Bitcoin remains a volatile asset thus far.

What if someone creates a better digital currency?

That can happen. For now, Bitcoin remains by far the most popular decentralized virtual currency, but there can be no guarantee that it will retain that position. There is already a set of alternative currencies inspired by Bitcoin. It is however probably correct to assume that significant improvements would be required for a new currency to overtake Bitcoin in terms of established market, even though this remains unpredictable. Bitcoin could also conceivably adopt improvements of a competing currency so long as it doesn't change fundamental parts of the protocol.

Transactions

Why do I have to wait 10 minutes?

Receiving a payment is almost instant with Bitcoin. However, there is a 10 minutes delay on average before the network begins to confirm your transaction by including it in a block and before you can spend the bitcoins you receive. A confirmation means that there is a consensus on the network that the bitcoins you received haven't been sent to anyone else and are considered your property. Once your transaction has been included in one block, it will continue to be buried under every block after it, which will exponentially consolidate this consensus and decrease the risk of a reversed transaction. Every user is free to determine at what point they consider a transaction confirmed, but 6 confirmations is often considered to be as safe as waiting 6 months on a credit card transaction.

How much will the transaction fee be?

Most transactions can be processed without fees, but users are encouraged to pay a small voluntary fee for faster confirmation of their transactions and to remunerate miners. When fees are required, they generally don't exceed a few pennies in value. Your Bitcoin client will usually try to estimate an appropriate fee when required.
Transaction fees are used as a protection against users sending transactions to overload the network. The precise manner in which fees work is still being developed and will change over time. Because the fee is not related to the amount of bitcoins being sent, it may seem extremely low (0.0005 BTC for a 1,000 BTC transfer) or unfairly high (0.004 BTC for a 0.02 BTC payment). The fee is defined by attributes such as data in transaction and transaction recurrence. For example, if you are receiving a large number of tiny amounts, then fees for sending will be higher. Such payments are comparable to paying a restaurant bill using only pennies. Spending small fractions of your bitcoins rapidly may also require a fee. If your activity follows the pattern of conventional transactions, the fees should remain very low.

What if I receive a bitcoin when my computer is powered off?

This works fine. The bitcoins will appear next time you start your wallet application. Bitcoins are not actually received by the software on your computer, they are appended to a public ledger that is shared between all the devices on the network. If you are sent bitcoins when your wallet client program is not running and you later launch it, it will download blocks and catch up with any transactions it did not already know about, and the bitcoins will eventually appear as if they were just received in real time. Your wallet is only needed when you wish to spend bitcoins.

What does "synchronizing" mean and why does it take so long?

Long synchronization time is only required with full node clients like Bitcoin Core. Technically speaking, synchronizing is the process of downloading and verifying all previous Bitcoin transactions on the network. For some Bitcoin clients to calculate the spendable balance of your Bitcoin wallet and make new transactions, it needs to be aware of all previous transactions. This step can be resource intensive and requires sufficient bandwidth and storage to accommodate the full size of the block chain. For Bitcoin to remain secure, enough people should keep using full node clients because they perform the task of validating and relaying transactions.

Mining

What is Bitcoin mining?

Mining is the process of spending computing power to process transactions, secure the network, and keep everyone in the system synchronized together. It can be perceived like the Bitcoin data center except that it has been designed to be fully decentralized with miners operating in all countries and no individual having control over the network. This process is referred to as "mining" as an analogy to gold mining because it is also a temporary mechanism used to issue new bitcoins. Unlike gold mining, however, Bitcoin mining provides a reward in exchange for useful services required to operate a secure payment network. Mining will still be required after the last bitcoin is issued.

How does Bitcoin mining work?

Anybody can become a Bitcoin miner by running software with specialized hardware. Mining software listens for transactions broadcast through the peer-to-peer network and performs appropriate tasks to process and confirm these transactions. Bitcoin miners perform this work because they can earn transaction fees paid by users for faster transaction processing, and newly created bitcoins issued into existence according to a fixed formula.
For new transactions to be confirmed, they need to be included in a block along with a mathematical proof of work. Such proofs are very hard to generate because there is no way to create them other than by trying billions of calculations per second. This requires miners to perform these calculations before their blocks are accepted by the network and before they are rewarded. As more people start to mine, the difficulty of finding valid blocks is automatically increased by the network to ensure that the average time to find a block remains equal to 10 minutes. As a result, mining is a very competitive business where no individual miner can control what is included in the block chain.
The proof of work is also designed to depend on the previous block to force a chronological order in the block chain. This makes it exponentially difficult to reverse previous transactions because this requires the recalculation of the proofs of work of all the subsequent blocks. When two blocks are found at the same time, miners work on the first block they receive and switch to the longest chain of blocks as soon as the next block is found. This allows mining to secure and maintain a global consensus based on processing power.
Bitcoin miners are neither able to cheat by increasing their own reward nor process fraudulent transactions that could corrupt the Bitcoin network because all Bitcoin nodes would reject any block that contains invalid data as per the rules of the Bitcoin protocol. Consequently, the network remains secure even if not all Bitcoin miners can be trusted.

Isn't Bitcoin mining a waste of energy?

Spending energy to secure and operate a payment system is hardly a waste. Like any other payment service, the use of Bitcoin entails processing costs. Services necessary for the operation of currently widespread monetary systems, such as banks, credit cards, and armored vehicles, also use a lot of energy. Although unlike Bitcoin, their total energy consumption is not transparent and cannot be as easily measured.
Bitcoin mining has been designed to become more optimized over time with specialized hardware consuming less energy, and the operating costs of mining should continue to be proportional to demand. When Bitcoin mining becomes too competitive and less profitable, some miners choose to stop their activities. Furthermore, all energy expended mining is eventually transformed into heat, and the most profitable miners will be those who have put this heat to good use. An optimally efficient mining network is one that isn't actually consuming any extra energy. While this is an ideal, the economics of mining are such that miners individually strive toward it.

How does mining help secure Bitcoin?

Mining creates the equivalent of a competitive lottery that makes it very difficult for anyone to consecutively add new blocks of transactions into the block chain. This protects the neutrality of the network by preventing any individual from gaining the power to block certain transactions. This also prevents any individual from replacing parts of the block chain to roll back their own spends, which could be used to defraud other users. Mining makes it exponentially more difficult to reverse a past transaction by requiring the rewriting of all blocks following this transaction.

What do I need to start mining?

In the early days of Bitcoin, anyone could find a new block using their computer's CPU. As more and more people started mining, the difficulty of finding new blocks increased greatly to the point where the only cost-effective method of mining today is using specialized hardware. You can visit BitcoinMining.com for more information.

Security

Is Bitcoin secure?

The Bitcoin technology - the protocol and the cryptography - has a strong security track record, and the Bitcoin network is probably the biggest distributed computing project in the world. Bitcoin's most common vulnerability is in user error. Bitcoin wallet files that store the necessary private keys can be accidentally deleted, lost or stolen. This is pretty similar to physical cash stored in a digital form. Fortunately, users can employ sound security practices to protect their money or use service providers that offer good levels of security and insurance against theft or loss.

Hasn't Bitcoin been hacked in the past?

The rules of the protocol and the cryptography used for Bitcoin are still working years after its inception, which is a good indication that the concept is well designed. However, security flaws have been found and fixed over time in various software implementations. Like any other form of software, the security of Bitcoin software depends on the speed with which problems are found and fixed. The more such issues are discovered, the more Bitcoin is gaining maturity.
There are often misconceptions about thefts and security breaches that happened on diverse exchanges and businesses. Although these events are unfortunate, none of them involve Bitcoin itself being hacked, nor imply inherent flaws in Bitcoin; just like a bank robbery doesn't mean that the dollar is compromised. However, it is accurate to say that a complete set of good practices and intuitive security solutions is needed to give users better protection of their money, and to reduce the general risk of theft and loss. Over the course of the last few years, such security features have quickly developed, such as wallet encryption, offline wallets, hardware wallets, and multi-signature transactions.

Could users collude against Bitcoin?

It is not possible to change the Bitcoin protocol that easily. Any Bitcoin client that doesn't comply with the same rules cannot enforce their own rules on other users. As per the current specification, double spending is not possible on the same block chain, and neither is spending bitcoins without a valid signature. Therefore, It is not possible to generate uncontrolled amounts of bitcoins out of thin air, spend other users' funds, corrupt the network, or anything similar.
However, a majority of miners could arbitrarily choose to block or reverse recent transactions. A majority of users can also put pressure for some changes to be adopted. Because Bitcoin only works correctly with a complete consensus between all users, changing the protocol can be very difficult and requires an overwhelming majority of users to adopt the changes in such a way that remaining users have nearly no choice but to follow. As a general rule, it is hard to imagine why any Bitcoin user would choose to adopt any change that could compromise their own money.

Is Bitcoin vulnerable to quantum computing?

Yes, most systems relying on cryptography in general are, including traditional banking systems. However, quantum computers don't yet exist and probably won't for a while. In the event that quantum computing could be an imminent threat to Bitcoin, the protocol could be upgraded to use post-quantum algorithms. Given the importance that this update would have, it can be safely expected that it would be highly reviewed by developers and adopted by all Bitcoin users.