Acta Scientific Computer Sciences

Review Article Volume 4 Issue 8

Bitcoin Security Risks

Eve Thullen* and Joseph Gorfinkle

Claremont Graduate University, California, USA

*Corresponding Author: Eve Thullen, Claremont Graduate University, California, USA.

Received: January 08, 2022; Published: July 18, 2022


This paper introduces basic fundamentals of bitcoin and how Bitcoin transactions are performed over the Peer to Peer distributed network. Comparisons between the Bitcoin Proof of Transaction system and the traditional banking Trust model are outlined along with the advantages and disadvantages of each. In this paper, we explore several security risks of Bitcoin implementations, such as replay attacks, forking, private key security breaches, along with IP address tracking and linking to deanonymize transactions. Lastly, the paper provides proper security measures and risk management for Bitcoin users with the goal to raise awareness of potential pitfalls as this technology proliferates from an alternative payment system into mainstream business process applications and beyond.

Keywords: IP Address; Bitcoin; Security


  1. S Nakamoto. “Bitcoin: A Peer-to-Peer Electronic Cash System”, October 31, (2008): 1.
  2. P Swagel. “The Cost of the Financial Crisis: The Impact of the September 2008 Economic Collapse”. Financial Reform Project, Pew Economic Policy Group, March (2010): 1-19.
  4. “Will Blockchain Change Everything?”. Alliance Bernstein, LLP, New York, April 10, (2018):4.
  11. l-currency-extortion.html
  12. Biryukov Alex., et al. "Deanonymisation of clients in Bitcoin P2P network". ACM Conference on Computer and Communications Security (2014).
  14. Paul SECURITY. “Security analysis of the most popular cryptocurrency exchanges” (2018).
  15. Chuck Russell. “Blockchain 101”. Jul 12, (2017).
  16. Joseph Young. “How is Bitcoin Actually Stolen? Theft Prevention”. Aug 16, (2016).
  17. Fan Yu and Epoch Times. “Coinbase Charge Confusion Highlights Growing Pains of Digital Currency Industry”. February 24, (2018).
  18. “What is a replay attack?”. March 10, (2018).
  19. Anandhu KK. “Bitcoin block withholding attack”. Jan 21, (2018).
  20. Blockchain at Berkeley. “Game Theory and Network Attacks: How to Destroy Bitcoin”. Nov 1, (2016).


Citation: Eve Thullen and Joseph Gorfinkle. “Bitcoin Security Risks". Acta Scientific Computer Sciences 4.8 (2022): 68-74.


Copyright: © 2022 Eve Thullen and Joseph Gorfinkle. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Acceptance rate35%
Acceptance to publication20-30 days

Indexed In

News and Events

  • Certification for Review
    Acta Scientific certifies the Editors/reviewers for their review done towards the assigned articles of the respective journals.
  • Submission Timeline for Upcoming Issue
    The last date for submission of articles for regular Issues is July 10, 2024.
  • Publication Certificate
    Authors will be issued a "Publication Certificate" as a mark of appreciation for publishing their work.
  • Best Article of the Issue
    The Editors will elect one Best Article after each issue release. The authors of this article will be provided with a certificate of "Best Article of the Issue"
  • Welcoming Article Submission
    Acta Scientific delightfully welcomes active researchers for submission of articles towards the upcoming issue of respective journals.

Contact US