Decentralized cryptocurrency
\n' + '\n' + '\n' + '
Prevailing bitcoin logoBitcoin
Prevailing bitcoin logo
DenominationsPluralbitcoinsSymbol₿ (Unicode: U+20BF BITCOIN SIGN (HTML ₿))[a]Ticker symbolBTC, XBT[b]Precision10−8Subunits11000millibitcoin1100000000satoshi[2]DevelopmentOriginal author(s)Satoshi NakamotoWhite paper"Bitcoin: A Peer-to-Peer Electronic Cash System"[4]Implementation(s)Bitcoin CoreInitial release0.1.0 / 9 January 2009 (12 years ago) (2009-01-09)Latest release0.21.1 / 2 May 2021 (25 days ago) (2021-05-02)[3]Code repositoryhttps://github.com/bitcoin/bitcoinDevelopment statusActiveWebsitebitcoin.orgLedgerLedger start3 January 2009 (12 years ago) (2009-01-03)Timestamping schemeProof-of-work (partial hash inversion)Hash functionSHA-256Issuance scheduleDecentralized (block reward)
Initially ₿50 per block, halved every 210,000 blocks[7]Block reward₿6.25[c]Block time10 minutesBlock explorerMany implementationsCirculating supply₿18,660,000 (as of 20 March 2021[update])Supply limit₿21,000,000[5][d]
\n' + '
    \n' + '
  1. ^ The symbol was encoded in Unicode version 10.0 at position U+20BF BITCOIN SIGN in the Currency Symbols block in June 2017.[1]\n' + '
  2. \n' + '
  3. ^ Compatible with ISO 4217.\n' + '
  4. \n' + '
  5. ^ May 2020 to approximately 2024, halved approximately every four years\n' + '
  6. \n' + '
  7. ^ The supply will approach, but never reach, ₿21 million. Issuance will permanently halt c. 2140 at ₿20,999,999.9769.[6]:ch. 8\n' + '
  8. \n' + '
\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '

Bitcoin () is a decentralized digital currency, without a central bank or single administrator, that can be sent from user to user on the peer-to-peer bitcoin network without the need for intermediaries.[7] Transactions are verified by network nodes through cryptography and recorded in a public distributed ledger called a blockchain. The cryptocurrency was invented in 2008 by an unknown person or group of people using the name Satoshi Nakamoto.[8] The currency began use in 2009[9] when its implementation was released as open-source software.[6]:ch. 1\n' + '

Bitcoins are created as a reward for a process known as mining. They can be exchanged for other currencies, products, and services,[10] but the real-world value of the coins is extremely volatile.[11] Research produced by the University of Cambridge estimated that in 2017, there were 2.9 to 5.8 million unique users using a cryptocurrency wallet, most of them using bitcoin.[12] Users choose to participate in the digital currency for a number of reasons: ideologies such as commitment to anarchism, decentralization and libertarianism, convenience, using the currency as an investment and pseudonymity of transactions. Increased use has led to a desire among governments for regulation in order to tax, facilitate legal use in trade and for other reasons (such as investigations for money laundering and price manipulation).\n' + '

Bitcoin has been criticized for its use in illegal transactions, the large amount of electricity (and thus carbon footprint) used by mining, price volatility, and thefts from exchanges. Some economists and commentators have characterized it as a speculative bubble at various times. Bitcoin has also been used as an investment, although several regulatory agencies have issued investor alerts about bitcoin.[11][13][14]\n' + '

The word bitcoin was defined in a white paper published on 31 October 2008.[4][15] It is a compound of the words bit and coin.[16] No uniform convention for bitcoin capitalization exists; some sources use Bitcoin, capitalized, to refer to the technology and network and bitcoin, lowercase, for the unit of account.[17] The Wall Street Journal,[18] The Chronicle of Higher Education,[19] and the Oxford English Dictionary[16] advocate the use of lowercase bitcoin in all cases.\n' + '

\n' + '\n' + '\n' + '

History

\n' + '\n' + '

Creation

\n' + '

The domain name bitcoin.org was registered on 18 August 2008.[20] On 31 October 2008, a link to a paper authored by Satoshi Nakamoto titled Bitcoin: A Peer-to-Peer Electronic Cash System[4] was posted to a cryptography mailing list.[21] Nakamoto implemented the bitcoin software as open-source code and released it in January 2009.[22][23][9] Nakamoto's identity remains unknown.[8]\n' + '

On 3 January 2009, the bitcoin network was created when Nakamoto mined the starting block of the chain, known as the genesis block.[24][25] Embedded in the coinbase of this block was the text "The Times 03/Jan/2009 Chancellor on brink of second bailout for banks".[9] This note references a headline published by The Times and has been interpreted as both a timestamp and a comment on the instability caused by fractional-reserve banking.[26]:18\n' + '

The receiver of the first bitcoin transaction was cypherpunk Hal Finney, who had created the first reusable proof-of-work system (RPoW) in 2004.[27] Finney downloaded the bitcoin software on its release date, and on 12 January 2009 received ten bitcoins from Nakamoto.[28][29] Other early cypherpunk supporters were creators of bitcoin predecessors: Wei Dai, creator of b-money, and Nick Szabo, creator of bit gold.[24] In 2010, the first known commercial transaction using bitcoin occurred when programmer Laszlo Hanyecz bought two Papa John's pizzas for ₿10,000.[30]\n' + '

Blockchain analysts estimate that Nakamoto had mined about one million bitcoins[31] before disappearing in 2010 when he handed the network alert key and control of the code repository over to Gavin Andresen. Andresen later became lead developer at the Bitcoin Foundation.[32][33] Andresen then sought to decentralize control. This left opportunity for controversy to develop over the future development path of bitcoin, in contrast to the perceived authority of Nakamoto's contributions.[34][33]\n' + '

\n' + '

2011–2012

\n' + '

After early "proof-of-concept" transactions, the first major users of bitcoin were black markets, such as Silk Road. During its 30 months of existence, beginning in February 2011, Silk Road exclusively accepted bitcoins as payment, transacting 9.9 million in bitcoins, worth about $214 million.[35]:222\n' + '

In 2011, the price started at $0.30 per bitcoin, growing to $5.27 for the year. The price rose to $31.50 on 8 June. Within a month, the price fell to $11.00. The next month it fell to $7.80, and in another month to $4.77.[36]\n' + '

In 2012, bitcoin prices started at $5.27, growing to $13.30 for the year.[36] By 9 January the price had risen to $7.38, but then crashed by 49% to $3.80 over the next 16 days. The price then rose to $16.41 on 17 August, but fell by 57% to $7.10 over the next three days.[37]\n' + '

The Bitcoin Foundation was founded in September 2012 to promote bitcoin's development and uptake.[38]\n' + '

On 1 November 2011, the reference implementation Bitcoin-Qt version 0.5.0 was released. It introduced a front end that used the Qt user interface toolkit.[39] The software previously used Berkeley DB for database management. Developers switched to LevelDB in release 0.8 in order to reduce blockchain synchronization time.[citation needed] The update to this release resulted in a minor blockchain fork on 11 March 2013. The fork was resolved shortly afterwards.[citation needed] Seeding nodes through IRC was discontinued in version 0.8.2. From version 0.9.0 the software was renamed to Bitcoin Core. Transaction fees were reduced again by a factor of ten as a means to encourage microtransactions.[citation needed] Although Bitcoin Core does not use OpenSSL for the operation of the network, the software did use OpenSSL for remote procedure calls. Version 0.9.1 was released to remove the network's vulnerability to the Heartbleed bug.[citation needed]\n' + '

\n' + '

2013–2016

\n' + '

In 2013, prices started at $13.30 rising to $770 by 1 January 2014.[36]\n' + '

In March 2013 the blockchain temporarily split into two independent chains with different rules due to a bug in version 0.8 of the bitcoin software. The two blockchains operated simultaneously for six hours, each with its own version of the transaction history from the moment of the split. Normal operation was restored when the majority of the network downgraded to version 0.7 of the bitcoin software, selecting the backwards-compatible version of the blockchain. As a result, this blockchain became the longest chain and could be accepted by all participants, regardless of their bitcoin software version.[40] During the split, the Mt. Gox exchange briefly halted bitcoin deposits and the price dropped by 23% to $37[40][41] before recovering to the previous level of approximately $48 in the following hours.[42]\n' + '

The US Financial Crimes Enforcement Network (FinCEN) established regulatory guidelines for "decentralized virtual currencies" such as bitcoin, classifying American bitcoin miners who sell their generated bitcoins as Money Service Businesses (MSBs), that are subject to registration or other legal obligations.[43][44][45]\n' + '

In April, exchanges BitInstant and Mt. Gox experienced processing delays due to insufficient capacity[46] resulting in the bitcoin price dropping from $266 to $76 before returning to $160 within six hours.[47] The bitcoin price rose to $259 on 10 April, but then crashed by 83% to $45 over the next three days.[37]\n' + '

On 15 May 2013, US authorities seized accounts associated with Mt. Gox after discovering it had not registered as a money transmitter with FinCEN in the US.[48][49] On 23 June 2013, the US Drug Enforcement Administration listed ₿11.02 as a seized asset in a United States Department of Justice seizure notice pursuant to 21 U.S.C. § 881. This marked the first time a government agency had seized bitcoin.[50] The FBI seized about ₿30,000[51] in October 2013 from the dark web website Silk Road, following the arrest of Ross William Ulbricht.[52][53][54] These bitcoins were sold at blind auction by the United States Marshals Service to venture capital investor Tim Draper.[51] Bitcoin's price rose to $755 on 19 November and crashed by 50% to $378 the same day. On 30 November 2013, the price reached $1,163 before starting a long-term crash, declining by 87% to $152 in January 2015.[37]\n' + '

On 5 December 2013, the People's Bank of China prohibited Chinese financial institutions from using bitcoins.[55] After the announcement, the value of bitcoins dropped,[56] and Baidu no longer accepted bitcoins for certain services.[57] Buying real-world goods with any virtual currency had been illegal in China since at least 2009.[58]\n' + '

In 2014, prices started at $770 and fell to $314 for the year.[36] On 30 July 2014, the Wikimedia Foundation started accepting donations of bitcoin.[59]\n' + '

In 2015, prices started at $314 and rose to $434 for the year. In 2016, prices rose and climbed up to $998 by 1 January 2017.[36]\n' + '

Release 0.10 of the software was made public on 16 February 2015. It introduced a consensus library which gave programmers easy access to the rules governing consensus on the network. In version 0.11.2 developers added a new feature which allowed transactions to be made unspendable until a specific time in the future.[60] Bitcoin Core 0.12.1 was released on 15 April 2016, and enabled multiple soft forks to occur concurrently.[61] Around 100 contributors worked on Bitcoin Core 0.13.0 which was released on 23 August 2016.\n' + '

In July 2016, the CheckSequenceVerify soft fork activated.[62]\n' + '

In October 2016, Bitcoin Core's 0.13.1 release featured the "Segwit" soft fork that included a scaling improvement aiming to optimize the bitcoin blocksize.[citation needed] The patch which was originally finalised in April, and 35 developers were engaged to deploy it.[citation needed] This release featured Segregated Witness (SegWit) which aimed to place downward pressure on transaction fees as well as increase the maximum transaction capacity of the network.[63][non-primary source needed] The 0.13.1 release endured extensive testing and research leading to some delays in its release date.[citation needed] SegWit prevents various forms of transaction malleability.[64][non-primary source needed]\n' + '

\n' + '

2017–2019

\n' + '

On 15 July 2017, the controversial Segregated Witness [SegWit] software upgrade was approved ("locked-in"). Segwit was intended to support the Lightning Network as well as improve scalability.[65] SegWit was subsequently activated on the network on 24 August 2017. The bitcoin price rose almost 50% in the week following SegWit's approval.[65] On 21 July 2017, bitcoin was trading at $2,748, up 52% from 14 July 2017's $1,835.[65] Supporters of large blocks who were dissatisfied with the activation of SegWit forked the software on 1 August 2017 to create Bitcoin Cash, becoming one of many forks of bitcoin such as Bitcoin Gold.[66] \n' + '

Prices started at $998 in 2017 and rose to $13,412.44 on 1 January 2018,[36] after reaching its all-time high of $19,783.06 on 17 December 2017.[67]\n' + '

China banned trading in bitcoin, with first steps taken in September 2017, and a complete ban that started on 1 February 2018. Bitcoin prices then fell from $9,052 to $6,914 on 5 February 2018.[37] The percentage of bitcoin trading in the Chinese renminbi fell from over 90% in September 2017 to less than 1% in June 2018.[68]\n' + '

Throughout the rest of the first half of 2018, bitcoin's price fluctuated between $11,480 and $5,848. On 1 July 2018, bitcoin's price was $6,343.[69][70] The price on 1 January 2019 was $3,747, down 72% for 2018 and down 81% since the all-time high.[69][71]\n' + '

In September 2018, an anonymous party discovered and reported an invalid-block denial-of-server vulnerability to developers of Bitcoin Core, Bitcoin ABC and Bitcoin Unlimited. Further analysis by bitcoin developers showed the issue could also allow the creation of blocks violating the 21 million coin limit and CVE-2018-17144 was assigned and the issue resolved.[72][non-primary source needed]\n' + '

Bitcoin prices were negatively affected by several hacks or thefts from cryptocurrency exchanges, including thefts from Coincheck in January 2018, Bithumb in June, and Bancor in July. For the first six months of 2018, $761 million worth of cryptocurrencies was reported stolen from exchanges.[73] Bitcoin's price was affected even though other cryptocurrencies were stolen at Coinrail and Bancor as investors worried about the security of cryptocurrency exchanges.[74][75][76] In September 2019 the Intercontinental Exchange (the owner of the NYSE) began trading of bitcoin futures on its exchange called Bakkt.[77] Bakkt also announced that it would launch options on bitcoin in December 2019.[78] In December 2019, YouTube removed bitcoin and cryptocurrency videos, but later restored the content after judging they had "made the wrong call."[79]\n' + '

In February 2019, Canadian cryptocurrency exchange Quadriga Fintech Solutions failed with approximately $200 million missing.[80] By June 2019 the price had recovered to $13,000.[81]\n' + '

\n' + '

2020–present

\n' + '

According to CoinMetrics and Forbes, on 11 March 281,000 bitcoins were sold by owners who held them for only thirty days. This compared to ₿4,131 that had laid dormant for a year or more, indicating that the vast majority of the bitcoin volatility on that day was from recent buyers.[81] During the week of 11 March 2020 as a result of the COVID-19 pandemic, cryptocurrency exchange Kraken experienced an 83% increase in the number of account signups over the week of bitcoin's price collapse, a result of buyers looking to capitalize on the low price.[81] On 13 March 2020, bitcoin fell below $4000 during a broad COVID-19 pandemic related market selloff, after trading above $10,000 in February 2020.[82]\n' + '

In August 2020, MicroStrategy invested $250 million in bitcoin as a treasury reserve asset.[83] In October 2020, Square, Inc. put approximately 1% of their total assets ($50 million) in bitcoin.[84] In November 2020, PayPal announced that all users in the US could buy, hold, or sell bitcoin using PayPal.[85] On 30 November 2020, bitcoin hit a new all-time high of $19,860 topping the previous high from December 2017.[86] Alexander Vinnik, founder of BTC-e, was convicted and sentenced to 5 years in prison for money laundering in France while refusing to testify during his trial.[87] In December 2020 Massachusetts Mutual Life Insurance Company announced it has purchased $100 million in bitcoin, or roughly 0.04% of its general investment account.[88]\n' + '

On 19 January 2021, Elon Musk placed #Bitcoin in his Twitter profile tweeting "In retrospect, it was inevitable", which caused the price to briefly rise about $5000 in an hour to $37,299.[89] On 25 January 2021 Microstrategy announced it continued to buy bitcoin and as of the same date it had holdings of ₿70,784 worth $2.38 billion.[90] On 8 February 2021 Tesla's announcement that it had purchased $1.5 billion in bitcoin and planned to start accepting bitcoin as payment for vehicles pushed the bitcoin price to an all-time high of $44,141.[91] On 18 February 2021, Elon Musk said that "owning bitcoin was only a little better than holding conventional cash, but that the slight difference made it a better asset to hold".[92]\n' + '

It was announced in September 2020, that the Canton of Zug (in Switzerland) will start to accept tax payments in bitcoin from February 2021.[93][94]\n' + '

\n' + '

Design

\n' + '
Graph of the elliptic curve named secp256k1 over the algebraic number field of real numbers, \n' + ' \n' + ' \n' + ' \n' + ' R\n' + ' \n' + ' \n' + ' {\\displaystyle R}\n' + ' \n' + 'R2
\n' + '

Bitcoin is based on an elliptic curve called secp256k1 and encrypted with the ECDSA algorithm.[95][better source needed] The equation for the Bitcoin secp256k1 curve is \n' + ' \n' + ' \n' + ' \n' + ' y\n' + ' \n' + ' \n' + ' {\\displaystyle y}\n' + ' \n' + 'y2=\n' + ' \n' + ' \n' + ' \n' + ' x\n' + ' \n' + ' \n' + ' {\\displaystyle x}\n' + ' \n' + 'x3+7.[96][better source needed] Bitcoin has a proposed Bitcoin Improvement Proposal (BIP) that would add support for Schnorr signatures.[97]:101\n' + '

\n' + '

Units and divisibility

\n' + '

The unit of account of the bitcoin system is a bitcoin. Ticker symbols used to represent bitcoin are BTC[a] and XBT.[b][101]:2 Its Unicode character is ₿.[1] Small amounts of bitcoin used as alternative units are millibitcoin (mBTC), and satoshi (sat). Named in homage to bitcoin's creator, a satoshi is the smallest amount within bitcoin representing 1100000000 bitcoins, one hundred millionth of a bitcoin.[2] A millibitcoin equals 11000 bitcoins; one thousandth of a bitcoin or 100,000 satoshis.[102]\n' + '

\n' + '

Blockchain

\n' + '
Data structure of blocks in the ledger.
\n' + '
Number of bitcoin transactions per month, semilogarithmic plot[103]
\n' + '\n' + '

The bitcoin blockchain is a public ledger that records bitcoin transactions.[105] It is implemented as a chain of blocks, each block containing a hash of the previous block up to the genesis block[c] of the chain. A network of communicating nodes running bitcoin software maintains the blockchain.[35]:215–219 Transactions of the form payer X sends Y bitcoins to payee Z are broadcast to this network using readily available software applications.\n' + '

Network nodes can validate transactions, add them to their copy of the ledger, and then broadcast these ledger additions to other nodes. To achieve independent verification of the chain of ownership each network node stores its own copy of the blockchain.[106] At varying intervals of time averaging to every 10 minutes, a new group of accepted transactions, called a block, is created, added to the blockchain, and quickly published to all nodes, without requiring central oversight. This allows bitcoin software to determine when a particular bitcoin was spent, which is needed to prevent double-spending. A conventional ledger records the transfers of actual bills or promissory notes that exist apart from it, but the blockchain is the only place that bitcoins can be said to exist in the form of unspent outputs of transactions.[6]:ch. 5\n' + '

Individual blocks, public addresses and transactions within blocks can be examined using a blockchain explorer.[citation needed]\n' + '

\n' + '

Supply

\n' + '
Total bitcoins in circulation.[104]
\n' + '

The successful miner finding the new block is allowed by the rest of the network to reward themselves with newly created bitcoins and transaction fees.[107] As of 11 May 2020[update],[citation needed] the reward amounted to 6.25 newly created bitcoins per block added to the blockchain,[citation needed] plus any transaction fees from payments processed by the block. To mine half of the supply of bitcoins took four years but the remainder will take another 120 years, because of an artificial process called "bitcoin halving" according to which miners are compensated by fewer BTC as time goes on.[citation needed] To claim the reward, a special transaction called a coinbase is included with the processed payments.[6]:ch. 8 All bitcoins in existence have been created in such coinbase transactions. The bitcoin protocol specifies that the reward for adding a block will be halved every 210,000 blocks (approximately every four years). Eventually, the reward will decrease to zero, and the limit of 21 million bitcoins[d] will be reached c. 2140; the record keeping will then be rewarded solely by transaction fees.[108]\n' + '

In other words, Nakamoto set a monetary policy based on artificial scarcity at bitcoin's inception that the total number of bitcoins could never exceed 21 million. New bitcoins are created roughly every ten minutes and the rate at which they are generated drops by half about every four years until all will be in circulation.[109]\n' + '

\n' + '

Transactions

\n' + '\n' + '

Transactions are defined using a Forth-like scripting language.[6]:ch. 5 Transactions consist of one or more inputs and one or more outputs. When a user sends bitcoins, the user designates each address and the amount of bitcoin being sent to that address in an output. To prevent double spending, each input must refer to a previous unspent output in the blockchain.[110] The use of multiple inputs corresponds to the use of multiple coins in a cash transaction. Since transactions can have multiple outputs, users can send bitcoins to multiple recipients in one transaction. As in a cash transaction, the sum of inputs (coins used to pay) can exceed the intended sum of payments. In such a case, an additional output is used, returning the change back to the payer.[110] Any input satoshis not accounted for in the transaction outputs become the transaction fee.[110]\n' + '

Though transaction fees are optional, miners can choose which transactions to process and prioritize those that pay higher fees.[110] Miners may choose transactions based on the fee paid relative to their storage size, not the absolute amount of money paid as a fee. These fees are generally measured in satoshis per byte (sat/b). The size of transactions is dependent on the number of inputs used to create the transaction, and the number of outputs.[6]:ch. 8\n' + '

The blocks in the blockchain were originally limited to 32 megabytes in size. The block size limit of one megabyte was introduced by Satoshi Nakamoto in 2010. Eventually the block size limit of one megabyte created problems for transaction processing, such as increasing transaction fees and delayed processing of transactions.[111] Andreas Antonopoulos has stated Lightning Network is a potential scaling solution and referred to lightning as a second layer routing network.[6]:ch. 8\n' + '

\n' + '

Ownership

\n' + '
Simplified chain of ownership as illustrated in the bitcoin whitepaper.[4] In practice, a transaction can have more than one input and more than one output.[110]
\n' + '

In the blockchain, bitcoins are registered to bitcoin addresses. Creating a bitcoin address requires nothing more than picking a random valid private key and computing the corresponding bitcoin address. This computation can be done in a split second. But the reverse, computing the private key of a given bitcoin address, is practically unfeasible.[6]:ch. 4 Users can tell others or make public a bitcoin address without compromising its corresponding private key. Moreover, the number of valid private keys is so vast that it is extremely unlikely someone will compute a key-pair that is already in use and has funds. The vast number of valid private keys makes it unfeasible that brute force could be used to compromise a private key. To be able to spend their bitcoins, the owner must know the corresponding private key and digitally sign the transaction. The network verifies the signature using the public key; the private key is never revealed.[6]:ch. 5\n' + '

If the private key is lost, the bitcoin network will not recognize any other evidence of ownership;[35] the coins are then unusable, and effectively lost. For example, in 2013 one user claimed to have lost 7,500 bitcoins, worth $7.5 million at the time, when he accidentally discarded a hard drive containing his private key.[112] About 20% of all bitcoins are believed to be lost -they would have had a market value of about $20 billion at July 2018 prices.[113]\n' + '

To ensure the security of bitcoins, the private key must be kept secret.[6]:ch. 10 If the private key is revealed to a third party, e.g. through a data breach, the third party can use it to steal any associated bitcoins.[114] As of December 2017[update], around 980,000 bitcoins have been stolen from cryptocurrency exchanges.[115]\n' + '

Regarding ownership distribution, as of 16 March 2018, 0.5% of bitcoin wallets own 87% of all bitcoins ever mined.[116]\n' + '

\n' + '

Mining

\n' + '\n' + '
Early bitcoin miners used GPUs for mining, as they were better suited to the proof-of-work algorithm than CPUs.[117]
Later amateurs mined bitcoins with specialized FPGA and ASIC chips. The chips pictured have become obsolete due to increasing difficulty.
Today, bitcoin mining companies dedicate facilities to housing and operating large amounts of high-performance mining hardware.[118]
\n' + '
Semi-log plot of relative mining difficulty[e][104]
\n' + '

Mining is a record-keeping service done through the use of computer processing power.[f] Miners keep the blockchain consistent, complete, and unalterable by repeatedly grouping newly broadcast transactions into a block, which is then broadcast to the network and verified by recipient nodes.[105] Each block contains a SHA-256 cryptographic hash of the previous block,[105] thus linking it to the previous block and giving the blockchain its name.[6]:ch. 7[105]\n' + '

To be accepted by the rest of the network, a new block must contain a proof-of-work (PoW).[105] The system used is based on Adam Back's 1997 anti-spam scheme, Hashcash.[120][failed verification][4] The PoW requires miners to find a number called a nonce, such that when the block content is hashed along with the nonce, the result is numerically smaller than the network's difficulty target.[6]:ch. 8 This proof is easy for any node in the network to verify, but extremely time-consuming to generate, as for a secure cryptographic hash, miners must try many different nonce values (usually the sequence of tested values is the ascending natural numbers: 0, 1, 2, 3, ...[6]:ch. 8) before meeting the difficulty target.\n' + '

Every 2,016 blocks (approximately 14 days at roughly 10 min per block), the difficulty target is adjusted based on the network's recent performance, with the aim of keeping the average time between new blocks at ten minutes. In this way the system automatically adapts to the total amount of mining power on the network.[6]:ch. 8 Between 1 March 2014 and 1 March 2015, the average number of nonces miners had to try before creating a new block increased from 16.4 quintillion to 200.5 quintillion.[121]\n' + '

The proof-of-work system, alongside the chaining of blocks, makes modifications of the blockchain extremely hard, as an attacker must modify all subsequent blocks in order for the modifications of one block to be accepted.[122] As new blocks are mined all the time, the difficulty of modifying a block increases as time passes and the number of subsequent blocks (also called confirmations of the given block) increases.[105]\n' + '

Computing power is often bundled together by a Mining pool to reduce variance in miner income. Individual mining rigs often have to wait for long periods to confirm a block of transactions and receive payment. In a pool, all participating miners get paid every time a participating server solves a block. This payment depends on the amount of work an individual miner contributed to help find that block.[123]\n' + '

\n' + '

Wallets

\n' + '\n' + '
Bitcoin Core, a full client
Electrum, a lightweight client
\n' + '

The first wallet program, simply named Bitcoin, and sometimes referred to as the Satoshi client, was released in 2009 by Satoshi Nakamoto as open-source software.[9] In version 0.5 the client moved from the wxWidgets user interface toolkit to Qt, and the whole bundle was referred to as Bitcoin-Qt.[124] After the release of version 0.9, the software bundle was renamed Bitcoin Core to distinguish itself from the underlying network.[125][126] Bitcoin Core is, perhaps, the best known implementation or client. Alternative clients (forks of Bitcoin Core) exist, such as Bitcoin XT, Bitcoin Unlimited,[34] and Parity Bitcoin.[127]\n' + 'List of bitcoin forks\n' + '

A wallet stores the information necessary to transact bitcoins. While wallets are often described as a place to hold[128] or store bitcoins, due to the nature of the system, bitcoins are inseparable from the blockchain transaction ledger. A wallet is more correctly defined as something that "stores the digital credentials for your bitcoin holdings" and allows one to access (and spend) them.[6]:ch. 1, glossary Bitcoin uses public-key cryptography, in which two cryptographic keys, one public and one private, are generated.[129] At its most basic, a wallet is a collection of these keys.\n' + '

There are several modes which wallets can operate in. They have an inverse relationship with regards to trustlessness and computational requirements.\n' + '

\n' + '
  • Full clients verify transactions directly by downloading a full copy of the blockchain (over 150 GB as of January 2018[update]).[130] They are the most secure and reliable way of using the network, as trust in external parties is not required. Full clients check the validity of mined blocks, preventing them from transacting on a chain that breaks or alters network rules.[6]:ch. 1 Because of its size and complexity, downloading and verifying the entire blockchain is not suitable for all computing devices.
  • \n' + '
  • Lightweight clients consult full nodes to send and receive transactions without requiring a local copy of the entire blockchain (see simplified payment verificationSPV). This makes lightweight clients much faster to set up and allows them to be used on low-power, low-bandwidth devices such as smartphones. When using a lightweight wallet, however, the user must trust full nodes, as it can report faulty values back to the user. Lightweight clients follow the longest blockchain and do not ensure it is valid, requiring trust in full nodes.[131]
\n' + '

Third-party internet services called online wallets offer similar functionality but may be easier to use. In this case, credentials to access funds are stored with the online wallet provider rather than on the user's hardware.[132] As a result, the user must have complete trust in the online wallet provider. A malicious provider or a breach in server security may cause entrusted bitcoins to be stolen. An example of such a security breach occurred with Mt. Gox in 2011.[133]\n' + '

\n' + '
A paper wallet with a banknote-like design. Both the private key and the address are visible in text form and as 2D barcodes.
A paper wallet with the address visible for adding or checking stored funds. The part of the page containing the private key is folded over and sealed.
A brass token with a private key hidden beneath a tamper-evident security hologram. A part of the address is visible through a transparent part of the hologram.
A hardware wallet peripheral which processes bitcoin payments without exposing any credentials to the computer.
\n' + '

Physical wallets store the credentials necessary to spend bitcoins offline and can be as simple as a paper printout of the private key:[6]:ch. 10 a paper wallet or more advanced such as a hardware wallet. A paper wallet is created with a keypair generated on a computer with no internet connection; the private key is written or printed onto the paper[g] and then erased from the computer. The paper wallet can then be stored in a safe physical location for later retrieval. Bitcoins stored using a paper wallet are said to be in cold storage.[134]:39\n' + '

Cameron and Tyler Winklevoss, the founders of the Gemini Trust Co. exchange, reported that they had cut their paper wallets into pieces and stored them in envelopes distributed to safe deposit boxes across the United States.[135] Through this system, the theft of one envelope would neither allow the thief to steal any bitcoins nor deprive the rightful owners of their access to them.[136]\n' + '

Physical wallets can also take the form of metal token coins[137] with a private key accessible under a security hologram in a recess struck on the reverse side.[138]:38 The security hologram self-destructs when removed from the token, showing that the private key has been accessed.[139] Originally, these tokens were struck in brass and other base metals, but later used precious metals as bitcoin grew in value and popularity.[138]:80 Coins with stored face value as high as ₿1000 have been struck in gold.[138]:102–104 The British Museum's coin collection includes four specimens from the earliest series[138]:83 of funded bitcoin tokens; one is currently on display in the museum's money gallery.[140] In 2013, a Utahn manufacturer of these tokens was ordered by the Financial Crimes Enforcement Network (FinCEN) to register as a money services business before producing any more funded bitcoin tokens.[137][138]:80\n' + '

Another type of physical wallet called a hardware wallet keeps credentials offline while facilitating transactions.[141] The hardware wallet acts as a computer peripheral and signs transactions as requested by the user, who must press a button on the wallet to confirm that they intended to make the transaction. Hardware wallets never expose their private keys, keeping bitcoins in cold storage even when used with computers that may be compromised by malware.[134]:42–45\n' + '

\n' + '

Decentralization

\n' + '

Bitcoin is decentralized thus:[7]\n' + '

\n' + '
  • Bitcoin does not have a central authority.[7]
  • \n' + '
  • There is no central server; the bitcoin network is peer-to-peer.[9]
  • \n' + '
  • There is no central storage; the bitcoin ledger is distributed.[142]
  • \n' + '
  • The ledger is public; anybody can store it on their computer.[6]:ch. 1
  • \n' + '
  • There is no single administrator;[7] the ledger is maintained by a network of equally privileged miners.[6]:ch. 1
  • \n' + '
  • Anybody can become a miner.[6]:ch. 1
  • \n' + '
  • The additions to the ledger are maintained through competition. Until a new block is added to the ledger, it is not known which miner will create the block.[6]:ch. 1
  • \n' + '
  • The issuance of bitcoins is decentralized. They are issued as a reward for the creation of a new block.[107]
  • \n' + '
  • Anybody can create a new bitcoin address (a bitcoin counterpart of a bank account) without needing any approval.[6]:ch. 1
  • \n' + '
  • Anybody can send a transaction to the network without needing any approval; the network merely confirms that the transaction is legitimate.[143]:32
\n' + '

Conversely, researchers have pointed out at a "trend towards centralization". Although bitcoin can be sent directly from user to user, in practice intermediaries are widely used.[35]:220–222 Bitcoin miners join large mining pools to minimize the variance of their income.[35]:215, 219–222[144]:3[145] Because transactions on the network are confirmed by miners, decentralization of the network requires that no single miner or mining pool obtains 51% of the hashing power, which would allow them to double-spend coins, prevent certain transactions from being verified and prevent other miners from earning income.[146] As of 2013[update] just six mining pools controlled 75% of overall bitcoin hashing power.[146] In 2014 mining pool Ghash.io obtained 51% hashing power which raised significant controversies about the safety of the network. The pool has voluntarily capped their hashing power at 39.99% and requested other pools to act responsibly for the benefit of the whole network.[147] Around the year 2017, over 70% of the hashing power and 90% of transactions were operating from China.[148]\n' + '

According to researchers, other parts of the ecosystem are also "controlled by a small set of entities", notably the maintenance of the client software, online wallets and simplified payment verification (SPV) clients.[146]\n' + '

\n' + '

Privacy & Fungibility

\n' + '

Bitcoin is pseudonymous, meaning that funds are not tied to real-world entities but rather bitcoin addresses. Owners of bitcoin addresses are not explicitly identified, but all transactions on the blockchain are public. In addition, transactions can be linked to individuals and companies through "idioms of use" (e.g., transactions that spend coins from multiple inputs indicate that the inputs may have a common owner) and corroborating public transaction data with known information on owners of certain addresses.[149] Additionally, bitcoin exchanges, where bitcoins are traded for traditional currencies, may be required by law to collect personal information.[150] To heighten financial privacy, a new bitcoin address can be generated for each transaction.[151]\n' + '

Wallets and similar software technically handle all bitcoins as equivalent, establishing the basic level of fungibility. Researchers have pointed out that the history of each bitcoin is registered and publicly available in the blockchain ledger, and that some users may refuse to accept bitcoins coming from controversial transactions, which would harm bitcoin's fungibility.[152] For example, in 2012, Mt. Gox froze accounts of users who deposited bitcoins that were known to have just been stolen.[153]\n' + '

\n' + '

Ideology

\n' + '

Satoshi Nakamoto stated in his white paper that: "The root problem with conventional currencies is all the trust that's required to make it work. The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust."[154]\n' + '

\n' + '

Austrian economics roots

\n' + '

According to the European Central Bank, the decentralization of money offered by bitcoin has its theoretical roots in the Austrian school of economics, especially with Friedrich von Hayek in his book Denationalisation of Money: The Argument Refined,[155] in which Hayek advocates a complete free market in the production, distribution and management of money to end the monopoly of central banks.[156]:22\n' + '

\n' + '

Anarchism and libertarianism

\n' + '\n' + '

According to The New York Times, libertarians and anarchists were attracted to the philosophical idea behind bitcoin. Early bitcoin supporter Roger Ver said: "At first, almost everyone who got involved did so for philosophical reasons. We saw bitcoin as a great idea, as a way to separate money from the state."[154] The Economist describes bitcoin as "a techno-anarchist project to create an online version of cash, a way for people to transact without the possibility of interference from malicious governments or banks".[157] Economist Paul Krugman argues that cryptocurrencies like bitcoin are "something of a cult" based in "paranoid fantasies" of government power.[158]\n' + '

\n' + '
video iconExternal video The Declaration Of Bitcoin's Independence, BraveTheWorld, 4:38[159]

Nigel Dodd argues in The Social Life of Bitcoin that the essence of the bitcoin ideology is to remove money from social, as well as governmental, control.[160] Dodd quotes a YouTube video, with Roger Ver, Jeff Berwick, Charlie Shrem, Andreas Antonopoulos, Gavin Wood, Trace Meyer and other proponents of bitcoin reading The Declaration of Bitcoin's Independence. The declaration includes a message of crypto-anarchism with the words: "Bitcoin is inherently anti-establishment, anti-system, and anti-state. Bitcoin undermines governments and disrupts institutions because bitcoin is fundamentally humanitarian."[160][159]\n' + '

David Golumbia says that the ideas influencing bitcoin advocates emerge from right-wing extremist movements such as the Liberty Lobby and the John Birch Society and their anti-Central Bank rhetoric, or, more recently, Ron Paul and Tea Party-style libertarianism.[161] Steve Bannon, who owns a "good stake" in bitcoin, considers it to be "disruptive populism. It takes control back from central authorities. It's revolutionary."[162]\n' + '

A 2014 study of Google Trends data found correlations between bitcoin-related searches and ones related to computer programming and illegal activity, but not libertarianism or investment topics.[163]\n' + '

\n' + '

Economics

\n' + '\n' + '
Liquidity,[h] semilogarithmic plot.[104]
\n' + '

Bitcoin is a digital asset designed to work in peer-to-peer transactions as a currency.[4][164] Bitcoins have three qualities useful in a currency, according to The Economist in January 2015: they are "hard to earn, limited in supply and easy to verify."[165] Per some researchers, as of 2015[update], bitcoin functions more as a payment system than as a currency.[35]\n' + '

Economists define money as serving the following three purposes: a store of value, a medium of exchange, and a unit of account.[166] According to The Economist in 2014, bitcoin functions best as a medium of exchange.[166] However, this is debated, and a 2018 assessment by The Economist stated that cryptocurrencies met none of these three criteria.[157]\n' + 'Yale economist Robert J. Shiller writes that bitcoin has potential as a unit of account for measuring the relative value of goods, as with Chile's Unidad de Fomento, but that "Bitcoin in its present form [...] doesn't really solve any sensible economic problem".[167]\n' + '

According to research by Cambridge University, between 2.9 million and 5.8 million unique users used a cryptocurrency wallet in 2017, most of them for bitcoin. The number of users has grown significantly since 2013, when there were 300,000–1.3 million users.[12]\n' + '

\n' + '

Acceptance by merchants

\n' + '

The overwhelming majority of bitcoin transactions take place on a cryptocurrency exchange, rather than being used in transactions with merchants.[168] Delays processing payments through the blockchain of about ten minutes make bitcoin use very difficult in a retail setting. Prices are not usually quoted in units of bitcoin and many trades involve one, or sometimes two, conversions into conventional currencies.[35] Merchants that do accept bitcoin payments may use payment service providers to perform the conversions.[169]\n' + '

In 2017 and 2018 bitcoin's acceptance among major online retailers included only three of the top 500 U.S. online merchants, down from five in 2016.[168] Reasons for this decline include high transaction fees due to bitcoin's scalability issues and long transaction times.[170]\n' + '

Bloomberg reported that the largest 17 crypto merchant-processing services handled $69 million in June 2018, down from $411 million in September 2017. Bitcoin is "not actually usable" for retail transactions because of high costs and the inability to process chargebacks, according to Nicholas Weaver, a researcher quoted by Bloomberg. High price volatility and transaction fees make paying for small retail purchases with bitcoin impractical, according to economist Kim Grauer. However, bitcoin continues to be used for large-item purchases on sites such as Overstock.com, and for cross-border payments to freelancers and other vendors.[171]\n' + '

\n' + '

Financial institutions

\n' + '

Bitcoins can be bought on digital currency exchanges.\n' + '

Per researchers, "there is little sign of bitcoin use" in international remittances despite high fees charged by banks and Western Union who compete in this market.[35] The South China Morning Post, however, mentions the use of bitcoin by Hong Kong workers to transfer money home.[172]\n' + '

In 2014, the National Australia Bank closed accounts of businesses with ties to bitcoin,[173] and HSBC refused to serve a hedge fund with links to bitcoin.[174] Australian banks in general have been reported as closing down bank accounts of operators of businesses involving the currency.[175]\n' + '

On 10 December 2017, the Chicago Board Options Exchange started trading bitcoin futures,[176] followed by the Chicago Mercantile Exchange, which started trading bitcoin futures on 17 December 2017.[177]\n' + '

In September 2019 the Central Bank of Venezuela, at the request of PDVSA, ran tests to determine if bitcoin and ether could be held in central bank's reserves. The request was motivated by oil company's goal to pay its suppliers.[178]\n' + '

\n' + '

As an investment

\n' + '

The Winklevoss twins have purchased bitcoin. In 2013, The Washington Post reported a claim that they owned 1% of all the bitcoins in existence at the time.[179]\n' + '

Other methods of investment are bitcoin funds. The first regulated bitcoin fund was established in Jersey in July 2014 and approved by the Jersey Financial Services Commission.[180]\n' + '

Forbes named bitcoin the best investment of 2013.[181] In 2014, Bloomberg named bitcoin one of its worst investments of the year.[182] In 2015, bitcoin topped Bloomberg's currency tables.[183]\n' + '

According to bitinfocharts.com, in 2017 there are 9,272 bitcoin wallets with more than $1 million worth of bitcoins.[184] The exact number of bitcoin millionaires is uncertain as a single person can have more than one bitcoin wallet.\n' + '

In August 2020, MicroStrategy invested in Bitcoin.[185][186]\n' + '

In May 2021, the Bitcoin's market share on exchanges dropped from 70% to 45% as investors pursued altcoins.[187]\n' + '

\n' + '

Venture capital

\n' + '

Peter Thiel's Founders Fund invested US$3 million in BitPay.[188] In 2012, an incubator for bitcoin-focused start-ups was founded by Adam Draper, with financing help from his father, venture capitalist Tim Draper, one of the largest bitcoin holders after winning an auction of 30,000 bitcoins,[189] at the time called "mystery buyer".[190] The company's goal is to fund 100 bitcoin businesses within 2–3 years with $10,000 to $20,000 for a 6% stake.[189] Investors also invest in bitcoin mining.[191] According to a 2015 study by Paolo Tasca, bitcoin startups raised almost $1 billion in three years (Q1 2012 – Q1 2015).[192]\n' + '

\n' + '

Price and volatility

\n' + '
Price in US$, semilogarithmic plot.[104]
Annual volatility[103]
\n' + '

The price of bitcoins has gone through cycles of appreciation and depreciation referred to by some as bubbles and busts.[193] In 2011, the value of one bitcoin rapidly rose from about US$0.30 to US$32 before returning to US$2.[194] In the latter half of 2012 and during the 2012–13 Cypriot financial crisis, the bitcoin price began to rise,[195] reaching a high of US$266 on 10 April 2013, before crashing to around US$50. On 29 November 2013, the cost of one bitcoin rose to a peak of US$1,242.[196] In 2014, the price fell sharply, and as of April remained depressed at little more than half 2013 prices. As of August 2014[update] it was under US$600.[197]\n' + '

According to Mark T. Williams, as of 30 September 2014[update], bitcoin has volatility seven times greater than gold, eight times greater than the S&P 500, and 18 times greater than the US dollar.[198] Hodl is a meme created in reference to holding (as opposed to selling) during periods of volatility. Unusual for an asset, bitcoin weekend trading during December 2020 was higher than for weekdays.[199] Hedge funds (using high leverage and derivates)[200] have attempted to use the volatility to profit from downward price movements. At the end of January 2021, such positions were over $1 billion, their highest of all time.[201][202]\n' + 'As of 8 February 2021[update], the closing price of bitcoin equals US$44,797.[203]\n' + '

\n' + '

Legal status, tax and regulation

\n' + '\n' + '

Because of bitcoin's decentralized nature and its trading on online exchanges located in many countries, regulation of bitcoin has been difficult. However, the use of bitcoin can be criminalized, and shutting down exchanges and the peer-to-peer economy in a given country would constitute a de facto ban.[204] The legal status of bitcoin varies substantially from country to country and is still undefined or changing in many of them. Regulations and bans that apply to bitcoin probably extend to similar cryptocurrency systems.[192]\n' + '

According to the Library of Congress, an "absolute ban" on trading or using cryptocurrencies applies in nine countries: Algeria, Bolivia, Egypt, Iraq, Morocco, Nepal, Pakistan, Vietnam, and the United Arab Emirates. An "implicit ban" applies in another 15 countries, which include Bahrain, Bangladesh, China, Colombia, the Dominican Republic, Indonesia, Kuwait, Lesotho, Lithuania, Macau, Oman, Qatar, Saudi Arabia and Taiwan.[205]\n' + '

In October 2020, the Islamic Republic News Agency announced pending regulations that would require bitcoin miners in Iran to sell bitcoin to the Central Bank of Iran, and the central bank would use it for imports.[206] Iran, as of October 2020, had issued over 1,000 bitcoin mining licenses.[206] The Iranian government initially took a stance against cryptocurrency, but later changed it after seeing that digital currency could be used to circumvent sanctions.[207] The US Office of Foreign Assets Control listed two Iranians and their bitcoin addresses as part of its Specially Designated Nationals and Blocked Persons List for their role in the 2018 Atlanta cyberattack whose ransom was paid in bitcoin.[208]\n' + '

\n' + '

Regulatory warnings

\n' + '

The U.S. Commodity Futures Trading Commission has issued four "Customer Advisories" for bitcoin and related investments.[13] A July 2018 warning emphasized that trading in any cryptocurrency is often speculative, and there is a risk of theft from hacking, and fraud.[209] In May 2014 the U.S. Securities and Exchange Commission warned that investments involving bitcoin might have high rates of fraud, and that investors might be solicited on social media sites.[210] An earlier "Investor Alert" warned about the use of bitcoin in Ponzi schemes.[211]\n' + '

The European Banking Authority issued a warning in 2013 focusing on the lack of regulation of bitcoin, the chance that exchanges would be hacked, the volatility of bitcoin's price, and general fraud.[212] FINRA and the North American Securities Administrators Association have both issued investor alerts about bitcoin.[213][214]\n' + '

\n' + '

Price manipulation investigation

\n' + '

An official investigation into bitcoin traders was reported in May 2018.[215] The U.S. Justice Department launched an investigation into possible price manipulation, including the techniques of spoofing and wash trades.[216][217][218]\n' + '

The U.S. federal investigation was prompted by concerns of possible manipulation during futures settlement dates. The final settlement price of CME bitcoin futures is determined by prices on four exchanges, Bitstamp, Coinbase, itBit and Kraken. Following the first delivery date in January 2018, the CME requested extensive detailed trading information but several of the exchanges refused to provide it and later provided only limited data. The Commodity Futures Trading Commission then subpoenaed the data from the exchanges.[219][220]\n' + '

State and provincial securities regulators, coordinated through the North American Securities Administrators Association, are investigating "bitcoin scams" and ICOs in 40 jurisdictions.[221]\n' + '

Academic research published in the Journal of Monetary Economics concluded that price manipulation occurred during the Mt Gox bitcoin theft and that the market remains vulnerable to manipulation.[222] The history of hacks, fraud and theft involving bitcoin dates back to at least 2011.[223]\n' + '

Research by John M. Griffin and Amin Shams in 2018 suggests that trading associated with increases in the amount of the Tether cryptocurrency and associated trading at the Bitfinex exchange account for about half of the price increase in bitcoin in late 2017.[224][225]\n' + '

J.L. van der Velde, CEO of both Bitfinex and Tether, denied the claims of price manipulation: "Bitfinex nor Tether is, or has ever, engaged in any sort of market or price manipulation. Tether issuances cannot be used to prop up the price of bitcoin or any other coin/token on Bitfinex."[226]\n' + '

\n' + '

Analysis

\n' + '
video iconExternal video Cryptocurrencies: looking beyond the hype, Hyun Song Shin, Bank for International Settlements, 2:48[227]
\n' + '

The Bank for International Settlements summarized several criticisms of bitcoin in Chapter V of their 2018 annual report. The criticisms include the lack of stability in bitcoin's price, the high energy consumption, high and variable transactions costs, the poor security and fraud at cryptocurrency exchanges, vulnerability to debasement (from forking), and the influence of miners.[227][228][229]\n' + '

François R. Velde, Senior Economist at the Chicago Fed, described bitcoin as "an elegant solution to the problem of creating a digital currency".[230] David Andolfatto, Vice President at the Federal Reserve Bank of St. Louis, stated that bitcoin is a threat to the establishment, which he argues is a good thing for the Federal Reserve System and other central banks, because it prompts these institutions to operate sound policies.[119]:33[231][232]\n' + '

\n' + '

Economic concerns

\n' + '\n' + '
Bitcoin price bubbles in 2011, 2013 and 2017
\n' + '

Bitcoin, along with other cryptocurrencies, has been described as an economic bubble by at least eight Nobel Memorial Prize in Economic Sciences laureates at various times, including Robert Shiller on 1 March 2014,[167] Joseph Stiglitz on 29 November 2017,[233] and Richard Thaler on 21 December 2017.[234][235] On 29 January 2018, a noted Keynesian economist Paul Krugman has described bitcoin as "a bubble wrapped in techno-mysticism inside a cocoon of libertarian ideology",[158] on 2 February 2018, professor Nouriel Roubini of New York University has called bitcoin the "mother of all bubbles",[236] and on 27 April 2018, a University of Chicago economist James Heckman has compared it to the 17th-century tulip mania.[235]\n' + '

Journalists, economists, investors, and the central bank of Estonia have voiced concerns that bitcoin is a Ponzi scheme.[237][238][239][240] In April 2013, Eric Posner, a law professor at the University of Chicago, stated that "a real Ponzi scheme takes fraud; bitcoin, by contrast, seems more like a collective delusion."[241] A July 2014 report by the World Bank concluded that bitcoin was not a deliberate Ponzi scheme.[242]:7 In June 2014, the Swiss Federal Council examined concerns that bitcoin might be a pyramid scheme, and concluded that "since in the case of bitcoin the typical promises of profits are lacking, it cannot be assumed that bitcoin is a pyramid scheme."[243]:21\n' + '

\n' + '

Energy consumption and carbon footprint

\n' + '
Bitcoin electricity consumption
Electricity consumption of the bitcoin network since 2016 (annualized) and comparison with the electricity consumption of various countries in 2019. The upper and lower bounds (grey traces) are based on worst-case and best-case scenario assumptions, respectively. The red trace indicates an intermediate best-guess estimate. (data sources: Cambridge Bitcoin Electricity Consumption Index, US Energy Information Administration; for details, see methodology)
\n' + '

Bitcoin has been criticized for the amount of electricity consumed by mining.\n' + '

As of 2015[update], estimated combined electricity consumption attributed to mining was 166.7 megawatts and by 2017, was estimated to be between one and four gigawatts of electricity.[244][165] In 2018, bitcoin was estimated by to use 2.55 to 3.572 GW, or around 6% of the total power consumed by the global banking sector.[245][246][247] In July 2019 BBC reported bitcoin consumes about 7 gigawatts, 0.2% of the global total, or equivalent to that of Switzerland.[248] A 2021 estimate from the University of Cambridge suggests bitcoin consumes more than 178 (TWh) annually, ranking it in the top 30 energy consumers if it were a country.[249]\n' + '

Bitcoin is mined in places like Iceland where geothermal energy is cheap and cooling Arctic air is free.[250] Bitcoin miners are known to use hydroelectric power in Tibet, Quebec, Washington (state), and Austria to reduce electricity costs.[245][251] Miners are attracted to suppliers such as Hydro Quebec that have energy surpluses.[252] \n' + '

According to a University of Cambridge study, much of bitcoin mining is done in China, where electricity is subsidized by the government.[253][254] A significant part of Bitcoin mining is powered by cheap electricity in Xinjiang, which mostly comes from coal power.[255][256] In April 2021 a coal mine explosion in the province coincided with a 35% drop in hashing power and a flash crash in price.[257][255] In other provinces, such as Hunan and Sichuan, mining farms use more hydropower, however these account for at most 4% of hash power. According to Alex de Vries, renewable energy is not a good match for Bitcoin mining as 24/7 operations are best for ROI on mining devices.[257] In 2021, a US company purchased the Greenidge coal power plant and converted it to burn natural gas for the sole purpose of mining bitcoin, which has proven to be highly profitable, in spite of protests of local residents against air pollution and thermal pollution.[258]\n' + '

Concerns about bitcoin's environmental impact relate bitcoin's energy consumption to carbon emissions.[259][260] The difficulty of translating the energy consumption into carbon emissions lies in the decentralized nature of bitcoin impeding the localization of miners to examine the electricity mix used. The results of recent studies analyzing bitcoin's carbon footprint vary.[261][262][263][264] A study published in Nature Climate Change in 2018 claims that bitcoin "could alone produce enough CO
2
emissions to push warming above 2 °C within less than three decades."[263] However, other researchers criticized this analysis, arguing the underlying scenarios were inadequate, leading to overestimations.[265][266][267] According to studies published in Joule and American Chemical Society in 2019, bitcoin's annual energy consumption results in annual carbon emission ranging from 17[247] to 22.9 MtCO
2
which is comparable to the level of emissions of countries as Jordan and Sri Lanka or Kansas City.[264] George Kamiya, writing for the International Energy Agency, says that "predictions about bitcoin consuming the entire world's electricity" are sensational, but that the area "requires careful monitoring and rigorous analysis".[268]\n' + '

\n' + '

Use in illegal transactions

\n' + '\n' + '

Bitcoin held at exchanges are vulnerable to theft through phishing, scamming, and hacking. As of December 2017[update], around 980,000 bitcoins have been stolen from cryptocurrency exchanges.[115]\n' + '

The use of bitcoin by criminals has attracted the attention of financial regulators, legislative bodies, law enforcement, and the media.[269] Bitcoin gained early notoriety for its use on the Silk Road. The U.S. Senate held a hearing on virtual currencies in November 2013.[270] The U.S. government claimed that bitcoin was used to facilitate payments related to Russian interference in the 2016 United States elections.[271] However, a 2021 study led by former CIA director Michael Morell showed that broad generalizations about the use of bitcoin in illicit finance are significantly overstated and that blockchain analysis is an effective crime fighting and intelligence gathering tool.[272]\n' + '

Several news outlets have asserted that the popularity of bitcoins hinges on the ability to use them to purchase illegal goods.[164][273] Nobel-prize winning economist Joseph Stiglitz says that bitcoin's anonymity encourages money laundering and other crimes.[274][275]\n' + '

In 2014, researchers at the University of Kentucky found "robust evidence that computer programming enthusiasts and illegal activity drive interest in bitcoin, and find limited or no support for political and investment motives".[163] Australian researchers have estimated that 25% of all bitcoin users and 44% of all bitcoin transactions are associated with illegal activity as of April 2017[update]. There were an estimated 24 million bitcoin users primarily using bitcoin for illegal activity. They held $8 billion worth of bitcoin, and made 36 million transactions valued at $72 billion.[276][277]\n' + '

\n' + '

Software implementation

\n' + '
Bitcoin-core-v0.10.0.png
Bitcoin Core
The start screen under Fedora
Original author(s)Satoshi NakamotoInitial release2009Stable release0.20.1 (2 August 2020; 9 months ago (2020-08-02)) [±]\n' + 'Repositorygithub.com/bitcoin/bitcoinWritten inC++Operating systemLinux, Windows, macOSTypeCryptocurrencyLicenseMIT LicenseWebsitebitcoincore.org
\n' + '

Bitcoin Core is free and open-source software that serves as a bitcoin node (the set of which form the bitcoin network) and provides a bitcoin wallet which fully verifies payments. It is considered to be bitcoin's reference implementation.[278] Initially, the software was published by Satoshi Nakamoto under the name "Bitcoin", and later renamed to "Bitcoin Core" to distinguish it from the network.[279] It is also known as the Satoshi client.[280]\n' + '

The MIT Digital Currency Initiative funds some of the development of Bitcoin Core.[281] The project also maintains the cryptography library libsecp256k1.[282]\n' + '

Bitcoin Core includes a transaction verification engine and connects to the bitcoin network as a full node.[280] Moreover, a cryptocurrency wallet, which can be used to transfer funds, is included by default.[282] The wallet allows for the sending and receiving of bitcoins. It does not facilitate the buying or selling of bitcoin. It allows users to generate QR codes to receive payment.\n' + '

The software validates the entire blockchain, which includes all bitcoin transactions ever. This distributed ledger which has reached more than 235 gigabytes in size as of Jan 2019, must be downloaded or synchronized before full participation of the client may occur.[280] Although the complete blockchain is not needed all at once since it is possible to run in pruning mode. A command line-based daemon with a JSON-RPC interface, bitcoind, is bundled with Bitcoin Core. It also provides access to testnet, a global testing environment that imitates the bitcoin main network using an alternative blockchain where valueless "test bitcoins" are used. Regtest or Regression Test Mode creates a private blockchain which is used as a local testing environment.[283] Finally, bitcoin-cli, a simple program which allows users to send RPC commands to bitcoind, is also included.\n' + '

Checkpoints which have been hard coded into the client are used only to prevent Denial of Service attacks against nodes which are initially syncing the chain. For this reason the checkpoints included are only as of several years ago.[284][285][failed verification] A one megabyte block size limit was added in 2010 by Satoshi Nakamoto. This limited the maximum network capacity to about three transactions per second.[286] Since then, network capacity has been improved incrementally both through block size increases and improved wallet behavior. A network alert system was included by Satoshi Nakamoto as a way of informing users of important news regarding bitcoin.[287] In November 2016 it was retired. It had become obsolete as news on bitcoin is now widely disseminated.\n' + '

Bitcoin Core includes a scripting language inspired by Forth that can define transactions and specify parameters.[288] ScriptPubKey is used to "lock" transactions based on a set of future conditions. scriptSig is used to meet these conditions or "unlock" a transaction. Operations on the data are performed by various OP_Codes. Two stacks are used - main and alt. Looping is forbidden.\n' + '

Bitcoin Core uses OpenTimestamps to timestamp merge commits.[289]\n' + '

The original creator of the bitcoin client has described their approach to the software's authorship as it being written first to prove to themselves that the concept of purely peer-to-peer electronic cash was valid and that a paper with solutions could be written. The lead developer is Wladimir J. van der Laan, who took over the role on 8 April 2014.[290] Gavin Andresen was the former lead maintainer for the software client. Andresen left the role of lead developer for bitcoin to work on the strategic development of its technology.[290] Bitcoin Core in 2015 was central to a dispute with Bitcoin XT, a competing client that sought to increase the blocksize.[291] Over a dozen different companies and industry groups fund the development of Bitcoin Core.\n' + '

\n' + '

In popular culture

\n' + '

Term "HODL"

\n' + '

Hodl (/ˈhɒdəl/ HOD-əl; often written HODL) is slang in the cryptocurrency community for holding a cryptocurrency rather than selling it.[292] A person who does this is known as a Hodler. It originated in a December 2013 post on the Bitcoin Forum message board by an apparently inebriated user who posted with a typo in the subject, "I AM HODLING."[293] It is often humorously suggested to be a backronym to "hold on for dear life".[294] In 2017, Quartz listed it as one of the essential slang terms in Bitcoin culture, and described it as a stance, "to stay invested in bitcoin and not to capitulate in the face of plunging prices."[295] TheStreet.com referred to it as the "favorite mantra" of Bitcoin holders.[296] Bloomberg News referred to it as a "mantra" for holders during market routs.[297]\n' + '

\n' + '

Literature

\n' + '

In Charles Stross' 2013 science fiction novel, Neptune's Brood, the universal interstellar payment system is known as "bitcoin" and operates using cryptography.[298] Stross later blogged that the reference was intentional, saying "I wrote Neptune's Brood in 2011. Bitcoin was obscure back then, and I figured had just enough name recognition to be a useful term for an interstellar currency: it'd clue people in that it was a networked digital currency."[299]\n' + '

\n' + '

Film

\n' + '

The 2014 documentary The Rise and Rise of Bitcoin portrays the diversity of motives behind the use of bitcoin by interviewing people who use it. These include a computer programmer and a drug dealer.[300] The 2016 documentary Banking on Bitcoin is an introduction to the beginnings of bitcoin and the ideas behind cryptocurrency today.[301]\n' + '

\n' + '

Academia

\n' + '

In September 2015, the establishment of the peer-reviewed academic journal Ledger (ISSN 2379-5980) was announced. It covers studies of cryptocurrencies and related technologies, and is published by the University of Pittsburgh.[302] The journal encourages authors to digitally sign a file hash of submitted papers, which will then be timestamped into the bitcoin blockchain. Authors are also asked to include a personal bitcoin address in the first page of their papers.[303][304]\n' + '

\n' + '

See also

\n' + '\n' + '\n' + '

Notes

\n' + '
\n' + '
    \n' + '
  1. ^ As of 2014[update], BTC is a commonly used code. It does not conform to ISO 4217 as BT is the country code of Bhutan, and ISO 4217 requires the first letter used in global commodities to be 'X'.\n' + '
  2. \n' + '
  3. ^ As of 2014[update], XBT, a code that conforms to ISO 4217 though is not officially part of it, is used by Bloomberg L.P.,[98] CNNMoney,[99] and xe.com.[100]\n' + '
  4. \n' + '
  5. ^ The genesis block is the block number 0. The timestamp of the block is 2009-01-03 18:15:05. This block is unlike all other blocks in that it does not have a previous block to reference.\n' + '
  6. \n' + '
  7. ^ The exact number is 20,999,999.9769 bitcoins.[6]:ch. 8\n' + '
  8. \n' + '
  9. ^ Relative mining difficulty is defined as the ratio of the difficulty target on 9 January 2009 to the current difficulty target.\n' + '
  10. \n' + '
  11. ^ It is misleading to think that there is an analogy between gold mining and bitcoin mining. The fact is that gold miners are rewarded for producing gold, while bitcoin miners are not rewarded for producing bitcoins; they are rewarded for their record-keeping services.[119]\n' + '
  12. \n' + '
  13. ^ The private key can be printed as a series of letters and numbers, a seed phrase, or a 2D barcode. Usually, the public key or bitcoin address is also printed, so that a holder of a paper wallet can check or add funds without exposing the private key to a device.\n' + '
  14. \n' + '
  15. ^ Liquidity is estimated by a 365-day running sum of transaction outputs in USD.\n' + '
  16. \n' + '
\n' + '

References

\n' + '
\n' + '
    \n' + '
  1. ^ a b "Unicode 10.0.0". Unicode Consortium. 20 June 2017. Archived from the original on 20 June 2017. Retrieved 20 June 2017.\n' + '
  2. \n' + '
  3. ^ a b Mick, Jason (12 June 2011). "Cracking the Bitcoin: Digging Into a $131M USD Virtual Currency". Daily Tech. Archived from the original on 20 January 2013. Retrieved 30 September 2012.\n' + '
  4. \n' + '
  5. ^ "Releases - bitcoin/bitcoin". Retrieved 9 May 2021 – via GitHub.\n' + '
  6. \n' + '
  7. ^ a b c d e f Nakamoto, Satoshi (31 October 2008). "Bitcoin: A Peer-to-Peer Electronic Cash System" (PDF). bitcoin.org. Archived (PDF) from the original on 20 March 2014. Retrieved 28 April 2014.\n' + '
  8. \n' + '
  9. ^ Nakamoto; et al. (1 April 2016). "Bitcoin source code - amount constraints". Archived from the original on 1 July 2018.\n' + '
  10. \n' + '
  11. ^ a b c d e f g h i j k l m n o p q r s t u v w Antonopoulos, Andreas M. (April 2014). Mastering Bitcoin: Unlocking Digital Crypto-Currencies. O'Reilly Media. ISBN 978-1-4493-7404-4.\n' + '
  12. \n' + '
  13. ^ a b c d e "Statement of Jennifer Shasky Calvery, Director Financial Crimes Enforcement Network United States Department of the Treasury Before the United States Senate Committee on Banking, Housing, and Urban Affairs Subcommittee on National Security and International Trade and Finance Subcommittee on Economic Policy" (PDF). fincen.gov. Financial Crimes Enforcement Network. 19 November 2013. Archived (PDF) from the original on 9 October 2016. Retrieved 1 June 2014.\n' + '
  14. \n' + '
  15. ^ a b S., L. (2 November 2015). "Who is Satoshi Nakamoto?". The Economist. The Economist Newspaper Limited. Archived from the original on 21 August 2016. Retrieved 23 September 2016.\n' + '
  16. \n' + '
  17. ^ a b c d e Davis, Joshua (10 October 2011). "The Crypto-Currency: Bitcoin and its mysterious inventor". The New Yorker. Archived from the original on 1 November 2014. Retrieved 31 October 2014.\n' + '
  18. \n' + '
  19. ^ "What is Bitcoin?". CNN Money. Archived from the original on 31 October 2015. Retrieved 16 November 2015.\n' + '
  20. \n' + '
  21. ^ a b GmbH, finanzen net. "Bitcoin's limited real-world use and extreme volatility show its recent surge is still a speculative bubble, UBS Global Wealth Management says". markets.businessinsider.com. Retrieved 28 March 2021.\n' + '
  22. \n' + '
  23. ^ a b Hileman, Garrick; Rauchs, Michel. "Global Cryptocurrency Benchmarking Study" (PDF). Cambridge University. Archived (PDF) from the original on 10 April 2017. Retrieved 14 April 2017.\n' + '
  24. \n' + '
  25. ^ a b "Bitcoin". U.S. Commodity Futures Trading Commission. Archived from the original on 1 July 2018. Retrieved 17 July 2018.\n' + '
  26. \n' + '
  27. ^ "SEC.gov | INVESTOR ALERT: BITCOIN AND OTHER VIRTUAL CURRENCY-RELATED INVESTMENTS". www.sec.gov. Archived from the original on 3 June 2019. Retrieved 1 June 2019.\n' + '
  28. \n' + '
  29. ^ Vigna, Paul; Casey, Michael J. (January 2015). The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order (1 ed.). New York: St. Martin's Press. ISBN 978-1-250-06563-6.\n' + '
  30. \n' + '
  31. ^ a b "bitcoin". OxfordDictionaries.com. Archived from the original on 2 January 2015. Retrieved 28 December 2014.\n' + '
  32. \n' + '
  33. ^ Bustillos, Maria (2 April 2013). "The Bitcoin Boom". The New Yorker. Condé Nast. Archived from the original on 27 July 2014. Retrieved 22 December 2013. Standards vary, but there seems to be a consensus forming around Bitcoin, capitalized, for the system, the software, and the network it runs on, and bitcoin, lowercase, for the currency itself.\n' + '
  34. \n' + '
  35. ^ Vigna, Paul (3 March 2014). "BitBeat: Is It Bitcoin, or bitcoin? The Orthography of the Cryptography". WSJ. Archived from the original on 19 April 2014. Retrieved 21 April 2014.\n' + '
  36. \n' + '
  37. ^ Metcalf, Allan (14 April 2014). "The latest style". Lingua Franca blog. The Chronicle of Higher Education (chronicle.com). Archived from the original on 16 April 2014. Retrieved 19 April 2014.\n' + '
  38. \n' + '
  39. ^ Bernard, Zoë (2 December 2017). "Everything you need to know about Bitcoin, its mysterious origins, and the many alleged identities of its creator". Business Insider. Archived from the original on 15 June 2018. Retrieved 15 June 2018.\n' + '
  40. \n' + '
  41. ^ Finley, Klint (31 October 2018). "After 10 Years, Bitcoin Has Changed Everything—And Nothing". Wired. Archived from the original on 5 November 2018. Retrieved 9 November 2018.\n' + '
  42. \n' + '
  43. ^ Nakamoto, Satoshi (3 January 2009). "Bitcoin". Archived from the original on 21 July 2017.\n' + '
  44. \n' + '
  45. ^ Nakamoto, Satoshi (9 January 2009). "Bitcoin v0.1 released". Archived from the original on 26 March 2014.\n' + '
  46. \n' + '
  47. ^ a b Wallace, Benjamin (23 November 2011). "The Rise and Fall of Bitcoin". Wired. Archived from the original on 31 October 2013. Retrieved 13 October 2012.\n' + '
  48. \n' + '
  49. ^ "Block 0 – Bitcoin Block Explorer". Archived from the original on 15 October 2013.\n' + '
  50. \n' + '
  51. ^ Pagliery, Jose (2014). Bitcoin: And the Future of Money. Triumph Books. ISBN 9781629370361. Archived from the original on 21 January 2018. Retrieved 20 January 2018.\n' + '
  52. \n' + '
  53. ^ "Here's The Problem with the New Theory That A Japanese Math Professor Is The Inventor of Bitcoin". San Francisco Chronicle. 19 May 2013. Archived from the original on 4 January 2015. Retrieved 24 February 2015.\n' + '
  54. \n' + '
  55. ^ Peterson, Andrea (3 January 2014). "Hal Finney received the first Bitcoin transaction. Here's how he describes it". The Washington Post. Archived from the original on 27 February 2015.\n' + '
  56. \n' + '
  57. ^ Popper, Nathaniel (30 August 2014). "Hal Finney, Cryptographer and Bitcoin Pioneer, Dies at 58". NYTimes. Archived from the original on 3 September 2014. Retrieved 2 September 2014.\n' + '
  58. \n' + '
  59. ^ Kharpal, Arjun (18 June 2018). "Everything you need to know about the blockchain". CNBC. Archived from the original on 13 September 2018. Retrieved 13 September 2018.\n' + '
  60. \n' + '
  61. ^ McMillan, Robert. "Who Owns the World's Biggest Bitcoin Wallet? The FBI". Wired. Condé Nast. Archived from the original on 21 October 2016. Retrieved 7 October 2016.\n' + '
  62. \n' + '
  63. ^ Simonite, Tom. "Meet Gavin Andresen, the most powerful person in the world of Bitcoin". MIT Technology Review. Retrieved 6 December 2017.\n' + '
  64. \n' + '
  65. ^ a b Odell, Matt (21 September 2015). "A Solution To Bitcoin's Governance Problem". TechCrunch. Archived from the original on 26 January 2016. Retrieved 24 January 2016.\n' + '
  66. \n' + '
  67. ^ a b Vigna, Paul (17 January 2016). "Is Bitcoin Breaking Up?". The Wall Street Journal. Archived from the original on 20 August 2016. Retrieved 8 November 2016.\n' + '
  68. \n' + '
  69. ^ a b c d e f g h Rainer Böhme; Nicolas Christin; Benjamin Edelman; Tyler Moore (2015). "Bitcoin: Economics, Technology, and Governance". Journal of Economic Perspectives. 29 (2): 213–238. doi:10.1257/jep.29.2.213.\n' + '
  70. \n' + '
  71. ^ a b c d e f "Bitcoin Historical Prices". OfficialData.org. Archived from the original on 4 July 2018. Retrieved 3 July 2018.\n' + '
  72. \n' + '
  73. ^ a b c d French, Sally (9 February 2017). "Here's proof that this bitcoin crash is far from the worst the cryptocurrency has seen". Market Watch. Archived from the original on 3 July 2018. Retrieved 3 July 2018.\n' + '
  74. \n' + '
  75. ^ Bustillos, Maria (1 April 2013). "The Bitcoin Boom". The New Yorker. Archived from the original on 2 July 2018. Retrieved 30 July 2018.\n' + '
  76. \n' + '
  77. ^ "Bitcoin-Qt version 0.5.0 released". Bitcoin Project. 1 November 2011. Retrieved 13 November 2016.\n' + '
  78. \n' + '
  79. ^ a b Lee, Timothy (11 March 2013). "Major glitch in Bitcoin network sparks sell-off; price temporarily falls 23%". arstechnica.com. Archived from the original on 22 April 2013. Retrieved 15 February 2015.\n' + '
  80. \n' + '
  81. ^ Blagdon, Jeff (12 March 2013). "Technical problems cause Bitcoin to plummet from record high, Mt. Gox suspends deposits". The Verge. Archived from the original on 22 April 2013. Retrieved 12 March 2013.\n' + '
  82. \n' + '
  83. ^ "Bitcoin Charts". Archived from the original on 9 May 2014.\n' + '
  84. \n' + '
  85. ^ Lee, Timothy (20 March 2013). "US regulator Bitcoin Exchanges Must Comply With Money Laundering Laws". Arstechnica. Archived from the original on 21 October 2013. Retrieved 28 July 2017. Bitcoin miners must also register if they trade in their earnings for dollars.\n' + '
  86. \n' + '
  87. ^ "US govt clarifies virtual currency regulatory position". Finextra. 19 March 2013. Archived from the original on 26 March 2014.\n' + '
  88. \n' + '
  89. ^ "Application of FinCEN's Regulations to Persons Administering, Exchanging, or Using Virtual Currencies" (PDF). Department of the Treasury Financial Crimes Enforcement Network. Archived from the original (PDF) on 28 March 2013. Retrieved 19 March 2013.\n' + '
  90. \n' + '
  91. ^ Roose, Kevin (8 April 2013) "Inside the Bitcoin Bubble: BitInstant's CEO – Daily Intelligencer". Archived from the original on 9 April 2014.. Nymag.com. Retrieved on 20 April 2013.\n' + '
  92. \n' + '
  93. ^ "Bitcoin Exchange Rate". Bitcoinscharts.com. Archived from the original on 24 June 2012. Retrieved 15 August 2013.\n' + '
  94. \n' + '
  95. ^ Dillet, Romain. "Feds Seize Assets From Mt. Gox's Dwolla Account, Accuse It Of Violating Money Transfer Regulations". Archived from the original on 9 October 2013. Retrieved 15 May 2013.\n' + '
  96. \n' + '
  97. ^ Berson, Susan A. (2013). "Some basic rules for using 'bitcoin' as virtual money". American Bar Association. Archived from the original on 29 October 2013. Retrieved 26 June 2013.\n' + '
  98. \n' + '
  99. ^ Sampson, Tim (2013). "U.S. government makes its first-ever Bitcoin seizure". The Daily Dot. Archived from the original on 30 June 2013. Retrieved 15 October 2013.\n' + '
  100. \n' + '
  101. ^ a b Ember, Sydney (2 July 2014). "Winner of Bitcoin Auction, Tim Draper, Plans to Expand Currency's Use". The New York Times DealBook. Archived from the original on 28 August 2019. Retrieved 13 June 2019.\n' + '
  102. \n' + '
  103. ^ "After Silk Road seizure, FBI Bitcoin wallet identified and pranked". Archived from the original on 5 April 2014.\n' + '
  104. \n' + '
  105. ^ "Silkroad Seized Coins". Archived from the original on 9 January 2014. Retrieved 2 November 2013.\n' + '
  106. \n' + '
  107. ^ Hill, Kashmir. "The FBI's Plan For The Millions Worth Of Bitcoins Seized From Silk Road". Forbes. Archived from the original on 2 May 2014.\n' + '
  108. \n' + '
  109. ^ Kelion, Leo (18 December 2013). "Bitcoin sinks after China restricts yuan exchanges". bbc.com. BBC. Archived from the original on 19 December 2013. Retrieved 20 December 2013.\n' + '
  110. \n' + '
  111. ^ "China bans banks from bitcoin transactions". The Sydney Morning Herald. Reuters. 6 December 2013. Archived from the original on 23 March 2014. Retrieved 31 October 2014.\n' + '
  112. \n' + '
  113. ^ "Baidu Stops Accepting Bitcoins After China Ban". Bloomberg. New York. 7 December 2013. Archived from the original on 10 December 2013. Retrieved 11 December 2013.\n' + '
  114. \n' + '
  115. ^ "China bars use of virtual money for trading in real goods". English.mofcom.gov.cn. 29 June 2009. Archived from the original on 29 November 2013. Retrieved 10 January 2014.\n' + '
  116. \n' + '
  117. ^ Rayman, Noah (30 July 2014). "You Can Now Donate to Wikipedia in Bitcoin". TIME. Archived from the original on 30 July 2014. Retrieved 27 April 2019.\n' + '
  118. \n' + '
  119. ^ "Bitcoin Core version 0.11.2 released". Bitcoin Project. 13 November 2015. Retrieved 14 November 2016.\n' + '
  120. \n' + '
  121. ^ Kyle Torpey (15 April 2016). "Bitcoin Core 0.12.1 Released, Major Step Forward for Scalability". Bitcoin Magazine. NASDAQ.com. Retrieved 7 November 2016.\n' + '
  122. \n' + '
  123. ^ Antonopoulos, Andreas (2017). Mastering Bitcoin: Programming the Open Blockchain (2nd ed.). O'Reilly Media. ISBN 978-1491954386. BIP-68 and BIP-112 were activated in May 2016 as a soft fork upgrade to the consensus rules.\n' + '
  124. \n' + '
  125. ^ "Bitcoin Core 0.13.1". Bitcoin Core. Retrieved 25 October 2016.\n' + '
  126. \n' + '
  127. ^ "Segregated Witness Benefits". Bitcoin Core. 26 January 2016. Retrieved 20 October 2018.\n' + '
  128. \n' + '
  129. ^ a b c Vigna, Paul (21 July 2017). "Bitcoin Rallies Sharply After Vote Resolves Bitter Scaling Debate". The Wall Street Journal. Archived from the original on 26 January 2020. Retrieved 26 January 2020.\n' + '
  130. \n' + '
  131. ^ Selena Larson (1 August 2017). "Bitcoin split in two, here's what that means". CNN Tech. Cable News Network. Archived from the original on 27 February 2018. Retrieved 2 April 2018.\n' + '
  132. \n' + '
  133. ^ "Bitcoin Hits a New Record High, But Stops Short of $20,000". Fortune. Archived from the original on 14 November 2018. Retrieved 16 April 2019.\n' + '
  134. \n' + '
  135. ^ "RMB Bitcoin trading falls below 1 pct of world total". Xinhuanet. Xinhua. 7 July 2018. Archived from the original on 10 July 2018. Retrieved 10 July 2018.\n' + '
  136. \n' + '
  137. ^ a b "Bitcoin USD". Yahoo Finance!. Archived from the original on 28 January 2019. Retrieved 27 January 2019.\n' + '
  138. \n' + '
  139. ^ Dawkins, David (10 July 2018). "Has CHINA burst the bitcoin BUBBLE? Trading in RMB drops from 90% to 1%". Express. Archived from the original on 10 July 2018. Retrieved 10 July 2018.\n' + '
  140. \n' + '
  141. ^ "Bitcoin turns 10: The obscure technology that became a household name". CNBC. 4 January 2019. Archived from the original on 19 January 2019. Retrieved 18 January 2019.\n' + '
  142. \n' + '
  143. ^ "CVE-2018-17144 Full Disclosure". Bitcoin Core. Retrieved 23 September 2018.\n' + '
  144. \n' + '
  145. ^ Chavez-Dreyfuss, Gertrude (3 July 2018). "Cryptocurrency exchange theft surges in first half of 2018: report". Reuters. Archived from the original on 4 July 2018. Retrieved 10 July 2018.\n' + '
  146. \n' + '
  147. ^ "Cryptocurrencies Tumble After $32 Million South Korea Exchange Hack". Fortune. Bloomberg. 20 July 2018. Archived from the original on 11 July 2018. Retrieved 10 July 2018.\n' + '
  148. \n' + '
  149. ^ Shane, Daniel (11 June 2018). "Billions in cryptocurrency wealth wiped out after hack". CNN. Archived from the original on 11 July 2018. Retrieved 10 July 2018.\n' + '
  150. \n' + '
  151. ^ Russell, Jon (10 July 2018). "The crypto world's latest hack sees Israel's Bancor lose $23.5M". TechCrunch. Archived from the original on 10 July 2018. Retrieved 10 July 2018.\n' + '
  152. \n' + '
  153. ^ Osipovich, Alexander (22 September 2019). "NYSE Owner Launches Long-Awaited Bitcoin Futures". The Wall Street Journal. Archived from the original on 24 September 2019. Retrieved 24 September 2019.\n' + '
  154. \n' + '
  155. ^ Olga Kharif (24 October 2019). "Bakkt Plans First Regulated Options Contracts on Bitcoin Futures". bloomberg.com. Bloomberg. Archived from the original on 24 October 2019. Retrieved 5 November 2019.\n' + '
  156. \n' + '
  157. ^ "YouTube admits error over Bitcoin video purge". bbc.com. BBC. 28 December 2019. Archived from the original on 28 December 2019. Retrieved 28 December 2019.\n' + '
  158. \n' + '
  159. ^ Alexander, Doug (4 February 2019). "Crypto CEO Dies Holding Only Passwords That Can Unlock Millions in Customer Coins". bloomberg.com. Bloomberg. Archived from the original on 16 December 2019. Retrieved 27 January 2020.\n' + '
  160. \n' + '
  161. ^ a b c del Castillo, Michael (19 March 2020). "Bitcoin's Magic Is Fading, And That's A Good Thing". Forbes.com. Archived from the original on 20 March 2020. Retrieved 21 March 2020.\n' + '
  162. \n' + '
  163. ^ "Bitcoin loses half of its value in two-day plunge". CNBC. 13 March 2020. Retrieved 9 December 2020.\n' + '
  164. \n' + '
  165. ^ "MicroStrategy buys $250M in Bitcoin as CEO says it's superior to cash". Washington Business Journal. 11 August 2020. Retrieved 11 August 2020.\n' + '
  166. \n' + '
  167. ^ Business, Oliver Effron, CNN. "Square just bought $50 million in bitcoin". CNN. Retrieved 22 October 2020.\n' + '
  168. \n' + '
  169. ^ "PayPal says all users in US can now buy, hold and sell cryptocurrencies". Techcrunch. 13 November 2020. Retrieved 26 November 2020.\n' + '
  170. \n' + '
  171. ^ "Bitcoin hits an all-time high of just under $20,000". CNN. 30 November 2020. Retrieved 1 December 2020.\n' + '
  172. \n' + '
  173. ^ Catalin Cimpanu (7 December 2020). "BTC-e founder sentenced to five years in prison for laundering ransomware funds". ZDNet. Retrieved 9 December 2020.\n' + '
  174. \n' + '
  175. ^ Olga Kharif (11 December 2020). "169-Year-Old MassMutual Invests $100 Million in Bitcoin". Bloomberg. Retrieved 26 December 2020.\n' + '
  176. \n' + '
  177. ^ Ryan Browne (29 January 2021). "Bitcoin spikes 20% after Elon Musk adds #bitcoin to his Twitter bio". CNBC. Retrieved 2 February 2021.\n' + '
  178. \n' + '
  179. ^ Will Daniel (26 January 2021). "Crypto miner Marathon Patent Group pours $150 million into bitcoin as the token pulls back from record highs". Business Insider. Retrieved 1 February 2021.\n' + '
  180. \n' + '
  181. ^ Yun Li (8 February 2021). "Bitcoin surges above $44,000 to record after Elon Musk's Tesla buys $1.5 billion worth". CNBC. Retrieved 9 February 2021.\n' + '
  182. \n' + '
  183. ^ "Elon Musk says bitcoin is slightly better than holding cash". The Economic Times. Retrieved 19 February 2021.\n' + '
  184. \n' + '
  185. ^ "Canton Zug to accept cryptocurrencies for tax payment beginning in 2021". Canton of Zug. 3 September 2020. Retrieved 24 January 2021.\n' + '
  186. \n' + '
  187. ^ "Kanton Zug akzeptiert Kryptowährungen bei Steuern" (in German). Schweizerischen Radio- und Fernsehgesellschaft. 3 September 2020. Retrieved 24 January 2021.\n' + '
  188. \n' + '
  189. ^ "Secp256k1". Bitcoin Wiki. 24 April 2019. Retrieved 4 February 2021.\n' + '
  190. \n' + '
  191. ^ Knutson, Hans (6 April 2018). "What is the math behind elliptic curve cryptography?". Hacker Noon.\n' + '
  192. \n' + '
  193. ^ Van Hijfte, Stijn (2020). Blockchain Platforms: A Look at the Underbelly of Distributed Platforms. Morgan & Claypool Publishers. ISBN 9781681738925.\n' + '
  194. \n' + '
  195. ^ Romain Dillet (9 August 2013). "Bitcoin Ticker Available On Bloomberg Terminal For Employees". TechCrunch. Archived from the original on 1 November 2014. Retrieved 2 November 2014.\n' + '
  196. \n' + '
  197. ^ "Bitcoin Composite Quote (XBT)". CNN Money. CNN. Archived from the original on 27 October 2014. Retrieved 2 November 2014.\n' + '
  198. \n' + '
  199. ^ "XBT – Bitcoin". xe.com. Archived from the original on 2 November 2014. Retrieved 2 November 2014.\n' + '
  200. \n' + '
  201. ^ "Regulation of Bitcoin in Selected Jurisdictions" (PDF). The Law Library of Congress, Global Legal Research Center. January 2014. Archived (PDF) from the original on 14 October 2014. Retrieved 26 August 2014.\n' + '
  202. \n' + '
  203. ^ Katie Pisa & Natasha Maguder (9 July 2014). "Bitcoin your way to a double espresso". cnn.com. CNN. Archived from the original on 18 June 2015. Retrieved 23 April 2015.\n' + '
  204. \n' + '
  205. ^ a b "Blockchair". Blockchair.com. Archived from the original on 13 October 2019. Retrieved 13 October 2019.\n' + '
  206. \n' + '
  207. ^ a b c d e "Charts". Blockchain.info. Archived from the original on 3 November 2014. Retrieved 2 November 2014.\n' + '
  208. \n' + '
  209. ^ a b c d e f "The great chain of being sure about things". The Economist. The Economist Newspaper Limited. 31 October 2015. Archived from the original on 3 July 2016. Retrieved 3 July 2016.\n' + '
  210. \n' + '
  211. ^ Sparkes, Matthew (9 June 2014). "The coming digital anarchy". The Daily Telegraph. London. Archived from the original on 23 January 2015. Retrieved 7 January 2015.\n' + '
  212. \n' + '
  213. ^ a b Ashlee Vance (14 November 2013). "2014 Outlook: Bitcoin Mining Chips, a High-Tech Arms Race". Businessweek. Archived from the original on 21 November 2013. Retrieved 24 November 2013.\n' + '
  214. \n' + '
  215. ^ Ritchie S. King; Sam Williams; David Yanofsky (17 December 2013). "By reading this article, you're mining bitcoins". qz.com. Atlantic Media Co. Archived from the original on 17 December 2013. Retrieved 17 December 2013.\n' + '
  216. \n' + '
  217. ^ Shin, Laura (24 May 2016). "Bitcoin Production Will Drop By Half In July, How Will That Affect The Price?". Forbes. Archived from the original on 24 May 2016. Retrieved 13 July 2016.\n' + '
  218. \n' + '
  219. ^ a b c d e Joshua A. Kroll; Ian C. Davey; Edward W. Felten (11–12 June 2013). "The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries" (PDF). The Twelfth Workshop on the Economics of Information Security (WEIS 2013). Archived (PDF) from the original on 9 May 2016. Retrieved 26 April 2016. A transaction fee is like a tip or gratuity left for the miner.\n' + '
  220. \n' + '
  221. ^ Orcutt, Mike (19 May 2015). "Leaderless Bitcoin Struggles to Make Its Most Crucial Decision". MIT Technology Review. Archived from the original on 18 October 2017. Retrieved 22 June 2017.\n' + '
  222. \n' + '
  223. ^ "Man Throws Away 7,500 Bitcoins, Now Worth $7.5 Million". CBS DC. 29 November 2013. Archived from the original on 15 January 2014. Retrieved 23 January 2014.\n' + '
  224. \n' + '
  225. ^ Krause, Elliott (5 July 2018). "A Fifth of All Bitcoin Is Missing. These Crypto Hunters Can Help". The Wall Street Journal. Archived from the original on 9 July 2018. Retrieved 8 July 2018.\n' + '
  226. \n' + '
  227. ^ Jeffries, Adrianne (19 December 2013). "How to steal Bitcoin in three easy steps". The Verge. Archived from the original on 27 July 2019. Retrieved 17 January 2014.\n' + '
  228. \n' + '
  229. ^ a b Harney, Alexandra; Stecklow, Steve (16 November 2017). "Twice burned - How Mt. Gox's bitcoin customers could lose again". Reuters. Archived from the original on 29 August 2019. Retrieved 6 September 2018.\n' + '
  230. \n' + '
  231. ^ Martindale, Jon (16 March 2018). "Who owns all the Bitcoin? A few billionaire whales in a small pond". Digital Trends. Archived from the original on 30 June 2019. Retrieved 1 July 2019.\n' + '
  232. \n' + '
  233. ^ "Bitcoin mania is hurting PC gamers by pushing up GPU prices". Archived from the original on 2 February 2018. Retrieved 2 February 2018.\n' + '
  234. \n' + '
  235. ^ "Cryptocurrency mining operation launched by Iron Bridge Resources". World Oil. 26 January 2018. Archived from the original on 30 January 2018.\n' + '
  236. \n' + '
  237. ^ a b Andolfatto, David (31 March 2014). "Bitcoin and Beyond: The Possibilities and Pitfalls of Virtual Currencies" (PDF). Dialogue with the Fed. Federal Reserve Bank of St. Louis. Archived (PDF) from the original on 9 April 2014. Retrieved 16 April 2014.\n' + '
  238. \n' + '
  239. ^ Sherman, Alan; Javani, Farid; Golaszewski, Enis (25 March 2019). "On the Origins and Variations of Blockchain Technologies". IEEE Security and Policy. 17 (1): 72–77. arXiv:1810.06130. doi:10.1109/MSEC.2019.2893730. S2CID 53114747.\n' + '
  240. \n' + '
  241. ^ "Difficulty History" (The ratio of all hashes over valid hashes is D x 4,295,032,833, where D is the published "Difficulty" figure.). Blockchain.info. Archived from the original on 8 April 2015. Retrieved 26 March 2015.\n' + '
  242. \n' + '
  243. ^ Hampton, Nikolai (5 September 2016). "Understanding the blockchain hype: Why much of it is nothing more than snake oil and spin". Computerworld. IDG. Archived from the original on 6 September 2016. Retrieved 5 September 2016.\n' + '
  244. \n' + '
  245. ^ Biggs, John (8 April 2013). "How To Mine Bitcoins". Techcrunch. Archived from the original on 6 July 2017.\n' + '
  246. \n' + '
  247. ^ Skudnov, Rostislav (2012). Bitcoin Clients (PDF) (Bachelor's Thesis). Turku University of Applied Sciences. Archived (PDF) from the original on 18 January 2014. Retrieved 16 January 2014.\n' + '
  248. \n' + '
  249. ^ "Bitcoin Core version 0.9.0 released". bitcoin.org. Archived from the original on 27 February 2015. Retrieved 8 January 2015.\n' + '
  250. \n' + '
  251. ^ Metz, Cade (19 August 2015). "The Bitcoin Schism Shows the Genius of Open Source". Wired. Condé Nast. Archived from the original on 30 June 2016. Retrieved 3 July 2016.\n' + '
  252. \n' + '
  253. ^ Allison, Ian (28 April 2017). "Ethereum co-founder Dr Gavin Wood and company release Parity Bitcoin". International Business Times. Archived from the original on 28 April 2017. Retrieved 28 April 2017.\n' + '
  254. \n' + '
  255. ^ Adam Serwer & Dana Liebelson (10 April 2013). "Bitcoin, Explained". motherjones.com. Mother Jones. Archived from the original on 27 April 2014. Retrieved 26 April 2014.\n' + '
  256. \n' + '
  257. ^ "Bitcoin: Bitcoin under pressure". The Economist. 30 November 2013. Archived from the original on 30 November 2013. Retrieved 30 November 2013.\n' + '
  258. \n' + '
  259. ^ "Blockchain Size". Blockchain.info. Archived from the original on 27 May 2017. Retrieved 16 January 2018.\n' + '
  260. \n' + '
  261. ^ Gervais, Arthur; O. Karame, Ghassan; Gruber, Damian; Capkun, Srdjan. "On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients" (PDF). Archived (PDF) from the original on 5 October 2016. Retrieved 3 September 2016.\n' + '
  262. \n' + '
  263. ^ Bill Barhydt (4 June 2014). "3 reasons Wall Street can't stay away from bitcoin". NBCUniversal. Archived from the original on 3 April 2015. Retrieved 2 April 2015.\n' + '
  264. \n' + '
  265. ^ "MtGox gives bankruptcy details". bbc.com. BBC. 4 March 2014. Archived from the original on 12 March 2014. Retrieved 13 March 2014.\n' + '
  266. \n' + '
  267. ^ a b Barski, Conrad; Wilmer, Chris (2015). Bitcoin for the Befuddled. No Starch Press. ISBN 978-1-59327-573-0.\n' + '
  268. \n' + '
  269. ^ Popper, Nathaniel (19 December 2017). "How the Winklevoss Twins Found Vindication in a Bitcoin Fortune". The New York Times. Archived from the original on 20 June 2019. Retrieved 19 June 2019.\n' + '
  270. \n' + '
  271. ^ Alexander, Doug (15 February 2019). "Quadriga's late founder used to store clients' Bitcoin passwords on paper so they wouldn't get lost". Bloomberg News. Financial Post. Archived from the original on 20 June 2019. Retrieved 19 June 2019.\n' + '
  272. \n' + '
  273. ^ a b Staff, Verge (13 December 2013). "Casascius, maker of shiny physical bitcoins, shut down by Treasury Department". The Verge. Archived from the original on 10 January 2014. Retrieved 10 January 2014.\n' + '
  274. \n' + '
  275. ^ a b c d e Ahonen, Elias; Rippon, Matthew J.; Kesselman, Howard (15 April 2016). Encyclopedia of Physical Bitcoins and Crypto-Currencies. ISBN 978-0-9950-8990-7.\n' + '
  276. \n' + '
  277. ^ Mack, Eric (25 October 2011). "Are physical Bitcoins legal?". CNET. Archived from the original on 26 June 2019. Retrieved 19 May 2019.\n' + '
  278. \n' + '
  279. ^ British Museum (2012). "Bitcoin token with digital code for bitcoin currency". Retrieved 17 May 2019.\n' + '
  280. \n' + '
  281. ^ Roberts, Daniel (15 December 2017). "How to send bitcoin to a hardware wallet". Yahoo Finance. Archived from the original on 17 February 2018. Retrieved 17 February 2018.\n' + '
  282. \n' + '
  283. ^ Meola, Andrew (5 October 2017). "How distributed ledger technology will change the way the world works". Business Insider. Archived from the original on 27 April 2018. Retrieved 26 July 2018.\n' + '
  284. \n' + '
  285. ^ Jerry Brito & Andrea Castillo (2013). "Bitcoin: A Primer for Policymakers" (PDF). Mercatus Center. George Mason University. Archived (PDF) from the original on 21 September 2013. Retrieved 22 October 2013.\n' + '
  286. \n' + '
  287. ^ Tschorsch, Florian; Scheuermann, Björn (2016). "Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies". IEEE Communications Surveys & Tutorials. 18 (3): 2084–2123. doi:10.1109/comst.2016.2535718. S2CID 5115101.\n' + '
  288. \n' + '
  289. ^ Beikverdi, A.; Song, J. (June 2015). Trend of centralization in Bitcoin's distributed network. 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). pp. 1–6. doi:10.1109/SNPD.2015.7176229. ISBN 978-1-4799-8676-7. S2CID 15516195.\n' + '
  290. \n' + '
  291. ^ a b c Gervais, Arthur; Karame, Ghassan O.; Capkun, Vedran; Capkun, Srdjan. "Is Bitcoin a Decentralized Currency?". InfoQ. InfoQ & IEEE Computer Society. Archived from the original on 10 October 2016. Retrieved 11 October 2016.\n' + '
  292. \n' + '
  293. ^ Wilhelm, Alex. "Popular Bitcoin Mining Pool Promises To Restrict Its Compute Power To Prevent Feared '51%' Fiasco". TechCrunch. Archived from the original on 5 December 2017. Retrieved 25 January 2018.\n' + '
  294. \n' + '
  295. ^ Chan, Edwin. "China Plans to Ban Cryptocurrency Mining in Renewed Clampdown". www.bloomberg.com. Archived from the original on 18 December 2019. Retrieved 10 April 2019. While China was once home to about 70 percent of Bitcoin mining and 90 percent of trades, authorities have waged a nearly two-year campaign to shrink the crypto industry amid concerns over speculative bubbles, fraud and wasteful energy consumption.\n' + '
  296. \n' + '
  297. ^ Simonite, Tom (5 September 2013). "Mapping the Bitcoin Economy Could Reveal Users' Identities". MIT Technology Review. Retrieved 2 April 2014.\n' + '
  298. \n' + '
  299. ^ Lee, Timothy (21 August 2013). "Five surprising facts about Bitcoin". The Washington Post. Archived from the original on 12 October 2013. Retrieved 2 April 2014.\n' + '
  300. \n' + '
  301. ^ McMillan, Robert (6 June 2013). "How Bitcoin lets you spy on careless companies". wired.co.uk. Conde Nast. Archived from the original on 9 February 2014. Retrieved 3 April 2020.\n' + '
  302. \n' + '
  303. ^ Ben-Sasson, Eli; Chiesa, Alessandro; Garman, Christina; Green, Matthew; Miers, Ian; Tromer, Eran; Virza, Madars (2014). "Zerocash: Decentralized Anonymous Payments from Bitcoin" (PDF). 2014 IEEE Symposium on Security and Privacy. IEEE computer society. Archived (PDF) from the original on 14 October 2014. Retrieved 31 October 2014.\n' + '
  304. \n' + '
  305. ^ Möser, Malte; Böhme, Rainer; Breuker, Dominic (2013). An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem (PDF). 2013 APWG eCrime Researchers Summit. IEEE. ISBN 978-1-4799-1158-5. Archived (PDF) from the original on 26 June 2018. Retrieved 19 June 2019.\n' + '
  306. \n' + '
  307. ^ a b Feuer, Alan (14 December 2013). "The Bitcoin Ideology". The New York Times. Archived from the original on 1 July 2018. Retrieved 1 July 2018.\n' + '
  308. \n' + '
  309. ^ Friedrich von Hayek (October 1976). Denationalisation of Money: The Argument Refined. 2 Lord North Street, Westminster, London SWIP 3LB: The institute of economic affairs. ISBN 978-0-255-36239-9. Archived from the original on 11 January 2020. Retrieved 10 September 2015.CS1 maint: location (link)\n' + '
  310. \n' + '
  311. ^ European Central Bank (October 2012). Virtual Currency Schemes (PDF). Frankfurt am Main: European Central Bank. ISBN 978-92-899-0862-7. Archived (PDF) from the original on 6 November 2012.\n' + '
  312. \n' + '
  313. ^ a b "Bitcoin and other cryptocurrencies are useless". The Economist. 30 August 2018. Archived from the original on 4 September 2018. Retrieved 4 September 2018. Lack of adoption and loads of volatility mean that cryptocurrencies satisfy none of those criteria.\n' + '
  314. \n' + '
  315. ^ a b Krugman, Paul (29 January 2018). "Bubble, Bubble, Fraud and Trouble". The New York Times. Archived from the original on 4 June 2018.\n' + '
  316. \n' + '
  317. ^ a b Tourianski, Julia. "The Declaration Of Bitcoin's Independence". Archive.org. Archived from the original on 23 March 2019. Retrieved 1 July 2018.\n' + '
  318. \n' + '
  319. ^ a b Dodd, Nigel (2017). "The social life of Bitcoin" (PDF). LSE Research Online. Archived (PDF) from the original on 1 July 2018. Retrieved 1 July 2018.\n' + '
  320. \n' + '
  321. ^ Golumbia, David (2015). Lovink, Geert (ed.). Bitcoin as Politics: Distributed Right-Wing Extremism. Institute of Network Cultures, Amsterdam. pp. 117–131. ISBN 978-90-822345-5-8. SSRN 2589890.\n' + '
  322. \n' + '
  323. ^ Peters, Jeremy W.; Popper, Nathaniel (14 June 2018). "Stephen Bannon Buys Into Bitcoin". The New York Times. Archived from the original on 1 July 2018. Retrieved 1 July 2018.\n' + '
  324. \n' + '
  325. ^ a b Matthew Graham Wilson & Aaron Yelowitz (November 2014). "Characteristics of Bitcoin Users: An Analysis of Google Search Data". Social Science Research Network. Working Papers Series. SSRN 2518603.\n' + '
  326. \n' + '
  327. ^ a b "Monetarists Anonymous". The Economist. The Economist Newspaper Limited. 29 September 2012. Archived from the original on 20 October 2013. Retrieved 21 October 2013.\n' + '
  328. \n' + '
  329. ^ a b "The magic of mining". The Economist. 13 January 2015. Archived from the original on 12 January 2015. Retrieved 13 January 2015.\n' + '
  330. \n' + '
  331. ^ a b "Free Exchange. Money from nothing. Chronic deflation may keep Bitcoin from displacing its rivals". The Economist. 15 March 2014. Archived from the original on 25 March 2014. Retrieved 25 March 2014.\n' + '
  332. \n' + '
  333. ^ a b Shiller, Robert (1 March 2014). "In Search of a Stable Electronic Currency". The New York Times. Archived from the original on 24 October 2014.\n' + '
  334. \n' + '
  335. ^ a b Murphy, Hannah (8 June 2018). "Who really owns bitcoin now?". Financial Times. Archived from the original on 10 June 2018. Retrieved 10 June 2018.\n' + '
  336. \n' + '
  337. ^ Karkaria, Urvaksh (23 September 2014). "Atlanta-based BitPay hooks up with PayPal to expand bitcoin adoption". Atlanta Business Chronicle. Archived from the original on 26 October 2014.\n' + '
  338. \n' + '
  339. ^ Katz, Lily (12 July 2017). "Bitcoin Acceptance Among Retailers Is Low and Getting Lower". Bloomberg. Archived from the original on 25 January 2018. Retrieved 25 January 2018.\n' + '
  340. \n' + '
  341. ^ Kharif, Olga (1 August 2018). "Bitcoin's Use in Commerce Keeps Falling Even as Volatility Eases". Bloomberg. Archived from the original on 2 August 2018. Retrieved 2 August 2018.\n' + '
  342. \n' + '
  343. ^ Chan, Bernice (16 January 2015). "Bitcoin transactions cut the cost of international money transfers". South China Morning Post. Archived from the original on 31 May 2019. Retrieved 31 May 2019.\n' + '
  344. \n' + '
  345. ^ "Bitcoin firms dumped by National Australia Bank as 'too risky'". The Guardian. Australian Associated Press. 10 April 2014. Archived from the original on 23 February 2015. Retrieved 23 February 2015.\n' + '
  346. \n' + '
  347. ^ Weir, Mike (1 December 2014). "HSBC severs links with firm behind Bitcoin fund". bbc.com. BBC. Archived from the original on 3 February 2015. Retrieved 9 January 2015.\n' + '
  348. \n' + '
  349. ^ "ACCC investigating why banks are closing bitcoin companies' accounts". Financial Review. Archived from the original on 11 February 2016. Retrieved 28 January 2016.\n' + '
  350. \n' + '
  351. ^ "Bitcoin futures surge in first day of trading". CBS News. 11 December 2017. Archived from the original on 31 May 2019. Retrieved 31 May 2019.\n' + '
  352. \n' + '
  353. ^ "Chicago Mercantile Exchange jumps into bitcoin futures". CBS News. 18 December 2017. Archived from the original on 31 May 2019. Retrieved 31 May 2019.\n' + '
  354. \n' + '
  355. ^ "Venezuela Has Bitcoin Stash and Doesn't Know What to Do With It". Bloomberg. 26 September 2019. Archived from the original on 26 September 2019. Retrieved 26 September 2019.\n' + '
  356. \n' + '
  357. ^ Lee, Timothy B. "The $11 million in bitcoins the Winklevoss brothers bought is now worth $32 million". The Switch. The Washington Post. Archived from the original on 6 July 2017. Retrieved 11 August 2017.\n' + '
  358. \n' + '
  359. ^ "Jersey approve Bitcoin fund launch on island". BBC news. 10 July 2014. Archived from the original on 10 July 2014. Retrieved 10 July 2014.\n' + '
  360. \n' + '
  361. ^ Hill, Kashmir. "How You Should Have Spent $100 In 2013 (Hint: Bitcoin)". Forbes. Archived from the original on 19 February 2015. Retrieved 16 February 2015.\n' + '
  362. \n' + '
  363. ^ Steverman, Ben (23 December 2014). "The Best and Worst Investments of 2014". bloomberg.com. Bloomberg LP. Archived from the original on 9 January 2015. Retrieved 9 January 2015.\n' + '
  364. \n' + '
  365. ^ Gilbert, Mark (29 December 2015). "Bitcoin Won 2015. Apple ... Did Not". Bloomberg. Archived from the original on 29 December 2015. Retrieved 29 December 2015.\n' + '
  366. \n' + '
  367. ^ "Top 100 Richest Bitcoin Addresses and Bitcoin distribution". bitinfocharts.com. Archived from the original on 15 October 2017. Retrieved 14 October 2017.\n' + '
  368. \n' + '
  369. ^ "MicroStrategy Buys $50 Million Worth Of Bitcoin, Topping Up Holdings To $766M".\n' + '
  370. \n' + '
  371. ^ "MicroStrategy buys $250M in Bitcoin as CEO says it's superior to cash". Washington Business Journal. 11 August 2020. Retrieved 11 August 2020.\n' + '
  372. \n' + '
  373. ^ Wilson, Tom (18 May 2021). "Buyers beware as "altcoin" frenzy bruises bitcoin". Reuters. Retrieved 19 May 2021.\n' + '
  374. \n' + '
  375. ^ Simonite, Tom (12 June 2013). "Bitcoin Millionaires Become Investing Angels". Computing News. MIT Technology Review. Retrieved 13 June 2013.\n' + '
  376. \n' + '
  377. ^ a b Robin Sidel (1 December 2014). "Ten-hut! Bitcoin Recruits Snap To". The Wall Street Journal. Dow Jones & Company. Retrieved 9 December 2014.[dead link]\n' + '
  378. \n' + '
  379. ^ Alex Hern (1 July 2014). "Silk Road's legacy 30,000 bitcoin sold at auction to mystery buyers". The Guardian. Archived from the original on 23 October 2014. Retrieved 31 October 2014.\n' + '
  380. \n' + '
  381. ^ "CoinSeed raises $7.5m, invests $5m in Bitcoin mining hardware – Investment Round Up". Red Herring. 24 January 2014. Archived from the original on 9 March 2014. Retrieved 9 March 2014.\n' + '
  382. \n' + '
  383. ^ a b Tasca, Paolo (7 September 2015), Digital Currencies: Principles, Trends, Opportunities, and Risks, Social Science Research Network, SSRN 2657598\n' + '
  384. \n' + '
  385. ^ Moore, Heidi (3 April 2013). "Confused about Bitcoin? It's 'the Harlem Shake of currency'". The Guardian. Archived from the original on 1 March 2014. Retrieved 2 May 2014.\n' + '
  386. \n' + '
  387. ^ Lee, Timothy (5 November 2013). "When will the people who called Bitcoin a bubble admit they were wrong". The Washington Post. Archived from the original on 11 January 2014. Retrieved 10 January 2014.\n' + '
  388. \n' + '
  389. ^ Liu, Alec (19 March 2013). "When Governments Take Your Money, Bitcoin Looks Really Good". Motherboard. Archived from the original on 7 February 2014. Retrieved 7 January 2014.\n' + '
  390. \n' + '
  391. ^ Ben Rooney (29 November 2013). "Bitcoin worth almost as much as gold". CNN. Archived from the original on 26 October 2014. Retrieved 31 October 2014.\n' + '
  392. \n' + '
  393. ^ "Bitcoin prices remain below $600 amid bearish chart signals". nasdaq.com. August 2014. Archived from the original on 14 October 2014. Retrieved 31 October 2014..\n' + '
  394. \n' + '
  395. ^ Williams, Mark T. (21 October 2014). "Virtual Currencies – Bitcoin Risk" (PDF). World Bank Conference Washington DC. Boston University. Archived (PDF) from the original on 11 November 2014. Retrieved 11 November 2014.\n' + '
  396. \n' + '
  397. ^ Irrera, Tom Wilson, Anna (11 January 2021). "Analysis: Cancel your weekends! Bitcoin doesn't rest, and neither can you". Reuters. Archived from the original on 6 February 2021. Trading volumes across six major cryptocurrency exchanges have been 10% higher at weekends than weekdays in that period\n' + '
  398. \n' + '
  399. ^ Zaki, Myret (14 January 2021). "Bitcoin: The Derivative Bomb". The Market (in German). Archived from the original on 15 January 2021. the lion’s share of institutional trading in bitcoin is being done without owning any single bitcoin. The bitcoin derivative boom was encouraged by the fact that you can get 2 to 3 times leverage on the CME, and more than 100 x leverage on native crypto derivative exchanges. In 2020, the ratio between bitcoin futures and spot volumes has increased from 2,3 to 4,6 in 2019\n' + '
  400. \n' + '
  401. ^ Bambrough, Billy (30 January 2021). "Data Reveals Bitcoin Could Be About To Become The New GameStop After Huge Price Spike". Forbes. Archived from the original on 9 February 2021. Retrieved 9 February 2021. The net short position in bitcoin futures is now the biggest it has ever been, according to the CFTC's latest Traders in Financial Futures report. .. hedge funds increasingly bet against the bitcoin price\n' + '
  402. \n' + '
  403. ^ "CFTC Commitments of Traders Short Report - Financial Traders in Markets (Futures Only)". cftc.gov. Commodity Futures Trading Commission (CFTC). 2–5 February 2021. Archived from the original on 8 February 2021. BITCOIN - CHICAGO MERCANTILE EXCHANGE, CFTC Code #133741\n' + '
  404. \n' + '
  405. ^ "WSJ Markets Bitcoin USD". Retrieved 8 February 2021.\n' + '
  406. \n' + '
  407. ^ "China May Be Gearing Up to Ban Bitcoin". pastemagazine.com. Archived from the original on 3 October 2017. Retrieved 6 October 2017. The decentralized nature of bitcoin is such that it is impossible to "ban" the cryptocurrency, but if you shut down exchanges and the peer-to-peer economy running on bitcoin, it's a de facto ban.\n' + '
  408. \n' + '
  409. ^ "Regulation of Cryptocurrency Around the World" (PDF). Library of Congress. The Law Library of Congress, Global Legal Research Center. June 2018. pp. 4–5. Archived (PDF) from the original on 14 August 2018. Retrieved 15 August 2018.\n' + '
  410. \n' + '
  411. ^ a b "Iran: New Crypto Law Requires Selling Bitcoin Directly to Central Bank to Fund Imports". aawsat.com. 31 October 2020. Retrieved 1 November 2020.\n' + '
  412. \n' + '
  413. ^ "Iran Is Pivoting to Bitcoin". vice.com. 3 November 2020. Retrieved 10 November 2020.\n' + '
  414. \n' + '
  415. ^ "Iran Has a Bitcoin Strategy to Beat Trump". foreignpolicy.com. 24 January 2020. Retrieved 10 November 2020.\n' + '
  416. \n' + '
  417. ^ "Customer Advisory: Use Caution When Buying Digital Coins or Tokens" (PDF). U.S.Commodity Futures Trading Commission. Archived (PDF) from the original on 17 July 2018. Retrieved 17 July 2018.\n' + '
  418. \n' + '
  419. ^ "Investor Alert: Bitcoin and Other Virtual Currency-related Investments". Investor.gov. U.S. Securities and Exchange Commission. 7 May 2014. Archived from the original on 30 June 2018. Retrieved 17 July 2018.\n' + '
  420. \n' + '
  421. ^ "Ponzi schemes Using virtual Currencies" (PDF). sec.gov. U.S. Securities and Exchange Commission. Archived (PDF) from the original on 16 June 2018. Retrieved 17 July 2018.\n' + '
  422. \n' + '
  423. ^ "Warning to consumers on virtual currencies" (PDF). European Banking Authority. 12 December 2013. Archived from the original (PDF) on 28 December 2013. Retrieved 23 December 2013.\n' + '
  424. \n' + '
  425. ^ "Investor Alerts Don't Fall for Cryptocurrency-Related Stock Scams". FINRA.org. Financial Industry Regulatory Authority. 21 December 2017. Archived from the original on 1 July 2018. Retrieved 23 July 2018.\n' + '
  426. \n' + '
  427. ^ "Informed Investor Advisory: Cryptocurrencies". North American Securities Administrators Association. April 2018. Archived from the original on 23 July 2018. Retrieved 23 July 2018.\n' + '
  428. \n' + '
  429. ^ Dean, James (25 May 2018). "Bitcoin investigation to focus on British traders, US officials examine manipulation of cryptocurrency prices". The Times. Archived from the original on 25 May 2018. Retrieved 25 May 2018.\n' + '
  430. \n' + '
  431. ^ Cornish, Chloe (24 May 2018). "Bitcoin slips again on reports of US DoJ investigation". Financial Times. Archived from the original on 24 May 2018. Retrieved 24 May 2018.\n' + '
  432. \n' + '
  433. ^ Robinson, Matt; Schoenberg, Tom (24 May 2018). "U.S. Launches Criminal Probe into Bitcoin Price Manipulation". Bloomberg. Archived from the original on 24 May 2018. Retrieved 24 May 2018.\n' + '
  434. \n' + '
  435. ^ McCoy, Kevin (24 May 2018). "Bitcoin value gyrates amid report of Department of Justice manipulation investigation". USA Today. Archived from the original on 24 May 2018. Retrieved 25 May 2018.\n' + '
  436. \n' + '
  437. ^ Rubin, Gabriel T.; Michaels, Dave; Osipovich, Alexander (8 June 2018). "U.S. regulators demand trading data from bitcoin exchanges in manipulation probe". MarketWatch. Archived from the original on 8 June 2018. Retrieved 9 June 2018. Note:this is a short open access version of a Wall Street Journal article\n' + '
  438. \n' + '
  439. ^ Rubin, Gabriel T.; Michaels, Dave; Osipovich, Alexander (8 June 2018). "U.S. regulators demand trading data from bitcoin exchanges in manipulation probe". The Wall Street Journal. Archived from the original on 8 June 2018. Retrieved 9 June 2018. (paywalled)\n' + '
  440. \n' + '
  441. ^ Fung, Brian (21 May 2018). "State regulators unveil nationwide crackdown on suspicious cryptocurrency investment schemes". The Washington Post. Archived from the original on 27 May 2018. Retrieved 27 May 2018.\n' + '
  442. \n' + '
  443. ^ Gandal, Neil; Hamrick, J.T.; Moore, Tyler; Oberman, Tali (May 2018). "Price manipulation in the Bitcoin ecosystem". Journal of Monetary Economics. 95: 86–96. doi:10.1016/j.jmoneco.2017.12.004. S2CID 26358036.\n' + '
  444. \n' + '
  445. ^ Lee, Tim (12 December 2017). "A brief history of Bitcoin hacks and frauds". Ars Technica. Archived from the original on 28 May 2018. Retrieved 27 May 2018.\n' + '
  446. \n' + '
  447. ^ Griffin, John M.; Shams, Amin (13 June 2018). "Is Bitcoin Really Un-Tethered?". Social Science Research Network. SSRN 3195066.\n' + '
  448. \n' + '
  449. ^ Popper, Nathaniel (13 June 2018). "Bitcoin's Price Was Artificially Inflated Last Year, Researchers Say". The New York Times. Archived from the original on 13 June 2018. Retrieved 13 June 2018.\n' + '
  450. \n' + '
  451. ^ Shaban, Hamza (14 June 2018). "Bitcoin's astronomical rise last year was buoyed by market manipulation, researchers say". The Washington Post. Archived from the original on 15 June 2018. Retrieved 14 June 2018.\n' + '
  452. \n' + '
  453. ^ a b Janda, Michael (18 June 2018). "Cryptocurrencies like bitcoin cannot replace money, says Bank for International Settlements". ABC (Australia). Archived from the original on 18 June 2018. Retrieved 18 June 2018.\n' + '
  454. \n' + '
  455. ^ Hyun Song Shin (June 2018). "Chapter V. Cryptocurrencies: looking beyond the hype" (PDF). BIS 2018 Annual Economic Report. Bank for International Settlements. Archived (PDF) from the original on 18 June 2018. Retrieved 19 June 2018. Put in the simplest terms, the quest for decentralised trust has quickly become an environmental disaster.\n' + '
  456. \n' + '
  457. ^ Hiltzik, Michael (18 June 2018). "Is this scathing report the death knell for bitcoin?". Los Angeles Times. Archived from the original on 18 June 2018. Retrieved 19 June 2018.\n' + '
  458. \n' + '
  459. ^ Velde, François (December 2013). "Bitcoin: A primer" (PDF). Chicago Fed letter. Federal Reserve Bank of Chicago. p. 4. Archived (PDF) from the original on 26 October 2014. Retrieved 3 September 2016.\n' + '
  460. \n' + '
  461. ^ Wile, Rob (6 April 2014). "St. Louis Fed Economist: Bitcoin Could Be A Good Threat To Central Banks". businessinsider.com. Business Insider. Archived from the original on 24 September 2015. Retrieved 16 April 2014.\n' + '
  462. \n' + '
  463. ^ Andolfatto, David (24 December 2013). "In gold we trust?". MacroMania. David Andolfatto. Archived from the original on 12 April 2017. Retrieved 17 April 2014. Also, note that I am not against gold or bitcoin (or whatever) as a currency. In fact, I think that the threat that they pose as alternate currency can serve as a useful check on a central bank.\n' + '
  464. \n' + '
  465. ^ Costelloe, Kevin (29 November 2017). "Bitcoin 'Ought to Be Outlawed,' Nobel Prize Winner Stiglitz Says". Bloomberg. Archived from the original on 12 June 2018. Retrieved 5 June 2018. It doesn't serve any socially useful function.\n' + '
  466. \n' + '
  467. ^ "Economics Nobel prize winner, Richard Thaler: "The market that looks most like a bubble to me is Bitcoin and its brethren"". ECO Portuguese Economy. 22 January 2018. Archived from the original on 12 June 2018. Retrieved 7 June 2018.\n' + '
  468. \n' + '
  469. ^ a b Wolff-Mann, Ethan (27 April 2018). "'Only good for drug dealers': More Nobel prize winners snub bitcoin". Yahoo Finance. Archived from the original on 12 June 2018. Retrieved 7 June 2018.\n' + '
  470. \n' + '
  471. ^ "Bitcoin biggest bubble in history, says economist who predicted 2008 crash". Archived from the original on 12 June 2018.\n' + '
  472. \n' + '
  473. ^ Braue, David (11 March 2014). "Bitcoin confidence game is a Ponzi scheme for the 21st century". ZDNet. Archived from the original on 6 October 2016. Retrieved 5 October 2016.\n' + '
  474. \n' + '
  475. ^ Clinch, Matt (10 March 2014). "Roubini launches stinging attack on bitcoin". CNBC. Archived from the original on 6 October 2014. Retrieved 2 July 2014.\n' + '
  476. \n' + '
  477. ^ "This Billionaire Just Called Bitcoin a 'Pyramid Scheme'". Archived from the original on 24 September 2017. Retrieved 23 September 2017.\n' + '
  478. \n' + '
  479. ^ Ott Ummelas & Milda Seputyte (31 January 2014). "Bitcoin 'Ponzi' Concern Sparks Warning From Estonia Bank". bloomberg.com. Bloomberg. Archived from the original on 29 March 2014. Retrieved 1 April 2014.\n' + '
  480. \n' + '
  481. ^ Posner, Eric (11 April 2013). "Fool's Gold: Bitcoin is a Ponzi scheme—the Internet's favorite currency will collapse". Slate. Archived from the original on 26 March 2014. Retrieved 1 April 2014.\n' + '
  482. \n' + '
  483. ^ Kaushik Basu (July 2014). "Ponzis: The Science and Mystique of a Class of Financial Frauds" (PDF). World Bank Group. Archived (PDF) from the original on 31 October 2014. Retrieved 30 October 2014.\n' + '
  484. \n' + '
  485. ^ "Federal Council report on virtual currencies in response to the Schwaab (13.3687) and Weibel (13.4070) postulates" (PDF). Federal Council (Switzerland). Swiss Confederation. 25 June 2014. Archived (PDF) from the original on 5 December 2014. Retrieved 28 November 2014.\n' + '
  486. \n' + '
  487. ^ Mooney, Chris; Mufson, Steven (19 December 2017). "Why the bitcoin craze is using up so much energy". The Washington Post. Archived from the original on 9 January 2018. Retrieved 11 January 2018. several experts told The Washington Post that bitcoin probably uses as much as 1 to 4 gigawatts, or billion watts, of electricity, roughly the output of one to three nuclear reactors.\n' + '
  488. \n' + '
  489. ^ a b Roberts, Paul (9 March 2018). "This Is What Happens When Bitcoin Miners Take Over Your Town - Eastern Washington had cheap power and tons of space. Then the suitcases of cash started arriving". Politico. Archived from the original on 9 March 2018. Retrieved 16 March 2018.\n' + '
  490. \n' + '
  491. ^ de Vries, Alex (May 2018). "Bitcoin's Growing Energy Problem". Joule. 2 (5): 801–805. doi:10.1016/j.joule.2018.04.016.\n' + '
  492. \n' + '
  493. ^ a b Köhler, Susanne; Pizzol, Massimo (20 November 2019). "Life Cycle Assessment of Bitcoin Mining". Environmental Science & Technology. 53 (23): 13598–13606. Bibcode:2019EnST...5313598K. doi:10.1021/acs.est.9b05687. PMID 31746188.\n' + '
  494. \n' + '
  495. ^ Baraniuk, Chris (3 July 2019). "Bitcoin's global energy use 'equals Switzerland'". BBC News. Archived from the original on 16 January 2020. Retrieved 2 February 2020.\n' + '
  496. \n' + '
  497. ^ "How bad is Bitcoin for the environment really?". Independent. 12 February 2021. Retrieved 15 February 2021. requires nearly as much energy as the entire country of Argentina\n' + '
  498. \n' + '
  499. ^ O'Brien, Matt (13 June 2015). "The scam called Bitcoin". Daily Herald. Archived from the original on 16 June 2015. Retrieved 20 September 2016.\n' + '
  500. \n' + '
  501. ^ Potenza, Alessandra (21 December 2017). "Can renewable power offset bitcoin's massive energy demands?". TheVerge News. Archived from the original on 12 January 2018. Retrieved 12 January 2018.\n' + '
  502. \n' + '
  503. ^ Lampert, Allison (12 January 2018). "Chinese bitcoin miners eye sites in energy-rich Canada". Reuters. Archived from the original on 14 January 2018. Retrieved 14 January 2018.\n' + '
  504. \n' + '
  505. ^ "Bitcoin is literally ruining the earth, claim experts". The Independent. 6 December 2017. Archived from the original on 19 January 2018. Retrieved 23 January 2018.\n' + '
  506. \n' + '
  507. ^ "The Hard Math Behind Bitcoin's Global Warming Problem". WIRED. 15 December 2017. Archived from the original on 21 January 2018. Retrieved 23 January 2018.\n' + '
  508. \n' + '
  509. ^ a b Ponciano, Jonathan (18 April 2021). "Crypto Flash Crash Wiped Out $300 Billion In Less Than 24 Hours, Spurring Massive Bitcoin Liquidations". Forbes. Retrieved 24 April 2021.\n' + '
  510. \n' + '
  511. ^ Murtaugh, Dan (9 February 2021). "The Possible Xinjiang Coal Link in Tesla's Bitcoin Binge". Bloomberg.com. Retrieved 24 April 2021.\n' + '
  512. \n' + '
  513. ^ a b Tully, Shawn (20 April 2021). "Commentary: How much Bitcoin comes from dirty coal? A flooded mine in China just spotlighted the issue". Fortune. Retrieved 23 April 2021.\n' + '
  514. \n' + '
  515. ^ Chant, Tim De (10 May 2021). "Private-equity firm revives zombie fossil-fuel power plant to mine bitcoin". Ars Technica. Retrieved 10 May 2021.\n' + '
  516. \n' + '
  517. ^ Hern, Alex (17 January 2018). "Bitcoin's energy usage is huge – we can't afford to ignore it". The Guardian. Archived from the original on 23 January 2018. Retrieved 18 September 2019.\n' + '
  518. \n' + '
  519. ^ Ethan, Lou (17 January 2019). "Bitcoin as big oil: the next big environmental fight?". The Guardian. Archived from the original on 29 August 2019. Retrieved 18 September 2019.\n' + '
  520. \n' + '
  521. ^ Foteinis, Spyros (2018). "Bitcoin's alarming carbon footprint". Nature. 554 (7691): 169. Bibcode:2018Natur.554..169F. doi:10.1038/d41586-018-01625-x.\n' + '
  522. \n' + '
  523. ^ Krause, Max J.; Tolaymat, Thabet (2018). "Quantification of energy and carbon costs for mining cryptocurrencies". Nature Sustainability. 1 (11): 711–718. doi:10.1038/s41893-018-0152-7. S2CID 169170289.\n' + '
  524. \n' + '
  525. ^ a b Mora, Camilo; et al. (2018). "Bitcoin emissions alone could push global warming above 2°C". Nature Climate Change. 8 (11): 931–933. Bibcode:2018NatCC...8..931M. doi:10.1038/s41558-018-0321-8. S2CID 91491182.\n' + '
  526. \n' + '
  527. ^ a b Stoll, Christian; Klaaßen, Lena; Gallersdörfer, Ulrich (2019). "The Carbon Footprint of Bitcoin". Joule. 3 (7): 1647–1661. doi:10.1016/j.joule.2019.05.012.\n' + '
  528. \n' + '
  529. ^ Masanet, Eric; et al. (2019). "Implausible projections overestimate near-term Bitcoin CO
    2
    emissions". Nature Climate Change. 9 (9): 653–654. Bibcode:2019NatCC...9..653M. doi:10.1038/s41558-019-0535-4. hdl:2066/207817. OSTI 1561950.
    \n' + '
  530. \n' + '
  531. ^ Dittmar, Lars; Praktiknjo, Aaron (2019). "Could Bitcoin emissions push global warming above 2°C?". Nature Climate Change. 9 (9): 656–657. Bibcode:2019NatCC...9..656D. doi:10.1038/s41558-019-0534-5.\n' + '
  532. \n' + '
  533. ^ Houy, Nicolas (2019). "Rational mining limits Bitcoin emissions". Nature Climate Change. 9 (9): 655. Bibcode:2019NatCC...9..655H. doi:10.1038/s41558-019-0533-6.\n' + '
  534. \n' + '
  535. ^ Kamiya, George. "Commentary: Bitcoin energy use - mined the gap". iea.org. Archived from the original on 3 March 2020. Retrieved 5 December 2019.\n' + '
  536. \n' + '
  537. ^ Lavin, Tim (8 August 2013). "The SEC Shows Why Bitcoin Is Doomed". bloomberg.com. Bloomberg LP. Archived from the original on 25 March 2014. Retrieved 20 October 2013.\n' + '
  538. \n' + '
  539. ^ Lee, Timothy B. (21 November 2013). "Here's how Bitcoin charmed Washington". The Washington Post. Archived from the original on 1 January 2017. Retrieved 10 October 2016.\n' + '
  540. \n' + '
  541. ^ Popper, Nathaniel (13 July 2018). "How Russian Spies Hid Behind Bitcoin in Hacking Campaign". NYT. Archived from the original on 14 July 2018. Retrieved 14 July 2018.\n' + '
  542. \n' + '
  543. ^ Ehrlich, Steven. "Janet Yellen, Bitcoin And Crypto Fearmongers Get Pushback From Former CIA Director". Forbes.\n' + '
  544. \n' + '
  545. ^ Ball, James (22 March 2013). "Silk Road: the online drug marketplace that officials seem powerless to stop". theguardian.com. Guardian News and Media Limited. Archived from the original on 12 October 2013. Retrieved 20 October 2013.\n' + '
  546. \n' + '
  547. ^ Montag, Ali (9 July 2018). "Nobel-winning economist: Authorities will bring down 'hammer' on bitcoin". CNBC. Archived from the original on 11 July 2018. Retrieved 11 July 2018.\n' + '
  548. \n' + '
  549. ^ Newlands, Chris (9 July 2018). "Stiglitz, Roubini and Rogoff lead joint attack on bitcoin". Financial News. Archived from the original on 11 July 2018. Retrieved 11 July 2018.\n' + '
  550. \n' + '
  551. ^ Foley, Sean; Karlsen, Jonathan R.; Putniņš, Tālis J. (19 February 2018). "Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies?". University of Oxford Faculty of Law. Oxford Business Law Blog. Archived from the original on 10 June 2018. Retrieved 11 June 2018.\n' + '
  552. \n' + '
  553. ^ Foley, Sean; Karlsen, Jonathan R.; Putniņš, Tālis J. (30 January 2018). "Sex, Drugs, and Bitcoin: How Much Illegal Activity Is Financed Through Cryptocurrencies?". Social Science Research Network. SSRN 3102645.\n' + '
  554. \n' + '
  555. ^ Antonopoulos, Andreas (2017). "3". Mastering Bitcoin: Programming the Open Blockchain (2nd ed.). O'Reilly Media. ISBN 978-1491954386. Bitcoin Core is the reference implementation of the bitcoin system, meaning that it is the authoritative reference on how each part of the technology should be implemented. Bitcoin Core implements all aspects of bitcoin, including wallets, a transaction and block validation engine, and a full network node in the peer-to-peer bitcoin network.\n' + '
  556. \n' + '
  557. ^ "Bitcoin Core version 0.9.0 released". Bitcoin Core. 19 March 2014. Retrieved 21 October 2018.\n' + '
  558. \n' + '
  559. ^ a b c Antonopoulos, Andreas M. (2014). Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O'Reilly Media, Inc. pp. 31–32. ISBN 978-1491902646. Retrieved 6 November 2016.\n' + '
  560. \n' + '
  561. ^ "MIT Announces $900,000 Bitcoin Developer Fund". Inc. 29 March 2016. Retrieved 21 October 2018.\n' + '
  562. \n' + '
  563. ^ a b "About". Bitcoin Core. Retrieved 21 October 2018.\n' + '
  564. \n' + '
  565. ^ "Bitcoin Developer Examples". Bitcoin. Retrieved 21 October 2018.\n' + '
  566. \n' + '
  567. ^ "checkpoints.cpp". Repository source code. GitHub, Inc. Retrieved 13 November 2016.\n' + '
  568. \n' + '
  569. ^ "bitcoin/chainparams.cpp". GitHub. Retrieved 21 October 2018.\n' + '
  570. \n' + '
  571. ^ Mike Orcutt (19 May 2015). "Leaderless Bitcoin Struggles to Make Its Most Crucial Decision". MIT Technology Review. Retrieved 15 November 2016.\n' + '
  572. \n' + '
  573. ^ "Alert System Retirement". Bitcoin Project. 1 November 2016. Retrieved 16 November 2016.\n' + '
  574. \n' + '
  575. ^ Antonopoulos, Andreas (29 May 2013). "Bitcoin is a money platform with many APIs". Radar. O'Reilly. Retrieved 19 November 2016.\n' + '
  576. \n' + '
  577. ^ "Bitcoin Core devtools README - Create and verify timestamps of merge commits". GitHub. Retrieved 5 May 2018.\n' + '
  578. \n' + '
  579. ^ a b Preukschat, Alex; Josep Busquet (2015). Bitcoin: The Hunt of Satoshi Nakamoto. Europe Comics. p. 87. ISBN 9791032800201. Retrieved 16 November 2016.\n' + '
  580. \n' + '
  581. ^ Maria Bustillos (25 August 2015). "Inside the Fight Over Bitcoin's Future". New Yorker. Retrieved 29 June 2020.\n' + '
  582. \n' + '
  583. ^ Shin, Laura. "Bitcoin And Taxes: If Not HODLing, Consider Donating". Forbes. Archived from the original on 22 December 2017. Retrieved 22 December 2017.\n' + '
  584. \n' + '
  585. ^ Kaminska, Izabella (22 December 2017). "The HODL". Financial Times. Retrieved 21 November 2018.\n' + '
  586. \n' + '
  587. ^ Montag, Ali (26 August 2018). "'HODL,' 'whale' and 5 other cryptocurrency slang terms explained". CNBC. Retrieved 12 November 2020.\n' + '
  588. \n' + '
  589. ^ Wong, Joon Ian. "Buy and hodl, just don't get #rekt: The slang that gets you taken seriously as a bitcoin trader". Quartz. Archived from the original on 22 December 2017. Retrieved 22 December 2017.\n' + '
  590. \n' + '
  591. ^ Akhtar, Tanzeel (22 December 2017). "As Bitcoin plunges, cryptocurrency fans chant 'HODL' for comfort". TheStreet. Archived from the original on 23 December 2017. Retrieved 22 December 2017.\n' + '
  592. \n' + '
  593. ^ Hajric, Vildana (19 November 2020). "All the Bitcoin Lingo You Need to Know as Crypto Heats Up". Bloomberg. Retrieved 1 December 2020.\n' + '
  594. \n' + '
  595. ^ Stross, Charles (2013). Neptune's Brood (First ed.). New York: Penguin Group USA. ISBN 978-0-425-25677-0. It's theft-proof too – for each bitcoin is cryptographically signed by the mind of its owner.\n' + '
  596. \n' + '
  597. ^ "Crib Sheet: Neptune's Brood – Charlie's Diary". www.antipope.org. Archived from the original on 14 June 2017. Retrieved 5 December 2017. I wrote Neptune's Brood in 2011. Bitcoin was obscure back then, and I figured had just enough name recognition to be a useful term for an interstellar currency: it'd clue people in that it was a networked digital currency.\n' + '
  598. \n' + '
  599. ^ Kenigsberg, Ben (2 October 2014). "Financial Wild West". The New York Times. Archived from the original on 18 May 2015. Retrieved 8 May 2015.\n' + '
  600. \n' + '
  601. ^ Michel, Lincoln (16 December 2017). "What the Hell Is Bitcoin? Let This Documentary on Netflix Explain". GQ. Archived from the original on 18 November 2018. Retrieved 10 October 2018.\n' + '
  602. \n' + '
  603. ^ "Introducing Ledger, the First Bitcoin-Only Academic Journal". Motherboard. Archived from the original on 10 January 2017.\n' + '
  604. \n' + '
  605. ^ "Editorial Policies". ledgerjournal.org. Archived from the original on 23 December 2016. Retrieved 10 January 2017.\n' + '
  606. \n' + '
  607. ^ "How to Write and Format an Article for Ledger" (PDF). Ledger. 2015. doi:10.5195/LEDGER.2015.1 (inactive 19 January 2021). Archived (PDF) from the original on 22 September 2015.CS1 maint: DOI inactive as of January 2021 (link)\n' + '
  608. \n' + '
\n' + '

External links

\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '
\n' + '

Page 2

\n' + '
Optical machine-readable representation of data
\n' + '\n' + '
A UPC-A barcode
\n' + '

A barcode or bar code is a method of representing data in a visual, machine-readable form. Initially, barcodes represented data by varying the widths and spacings of parallel lines. These barcodes, now commonly referred to as linear or one-dimensional (1D), can be scanned by special optical scanners, called barcode readers, of which there are several types. Later, two-dimensional (2D) variants were developed, using rectangles, dots, hexagons and other patterns, called matrix codes or 2D barcodes, although they do not use bars as such. 2D barcodes can be read using purpose-built 2D optical scanners, which exist in a few different forms. 2D barcodes can also be read by a digital camera connected to a microcomputer running software that takes a photographic image of the barcode and analyzes the image to deconstruct and decode the 2D barcode. A mobile device with an inbuilt camera, such as smartphone, can function as the latter type of 2D barcode reader using specialized application software. (The same sort of mobile device could also read 1D barcodes, depending on the application software.)\n' + '

The barcode was invented by Norman Joseph Woodland and Bernard Silver and patented in the US in 1951.[1] The invention was based on Morse code[2] that was extended to thin and thick bars. However, it took over twenty years before this invention became commercially successful. An early use of one type of barcode in an industrial context was sponsored by the Association of American Railroads in the late 1960s. Developed by General Telephone and Electronics (GTE) and called KarTrak ACI (Automatic Car Identification), this scheme involved placing colored stripes in various combinations on steel plates which were affixed to the sides of railroad rolling stock. Two plates were used per car, one on each side, with the arrangement of the colored stripes encoding information such as ownership, type of equipment, and identification number.[3] The plates were read by a trackside scanner, located for instance, at the entrance to a classification yard, while the car was moving past.[4] The project was abandoned after about ten years because the system proved unreliable after long-term use.[3]\n' + '

Barcodes became commercially successful when they were used to automate supermarket checkout systems, a task for which they have become almost universal. The Uniform Grocery Product Code Council had chosen, in 1973, the barcode design developed by George Laurer. Laurer's barcode, with vertical bars, printed better than the circular barcode developed by Woodland and Silver.[5] Their use has spread to many other tasks that are generically referred to as automatic identification and data capture (AIDC). The first scanning of the now-ubiquitous Universal Product Code (UPC) barcode was on a pack of Wrigley Company chewing gum in June 1974 at a Marsh supermarket in Troy, Ohio, using scanner produced by Photographic Sciences Corporation.[6][5] QR codes, a specific type of 2D barcode, have recently become very popular due to the growth in smartphone ownership.[7]\n' + '

Other systems have made inroads in the AIDC market, but the simplicity, universality and low cost of barcodes has limited the role of these other systems, particularly before technologies such as radio-frequency identification (RFID) became available after 1995.\n' + '

\n' + '\n' + '\n' + '

History

\n' + '\n' + '

In 1948 Bernard Silver, a graduate student at Drexel Institute of Technology in Philadelphia, Pennsylvania, US overheard the president of the local food chain, Food Fair, asking one of the deans to research a system to automatically read product information during checkout.[8] Silver told his friend Norman Joseph Woodland about the request, and they started working on a variety of systems. Their first working system used ultraviolet ink, but the ink faded too easily and was expensive.[9]\n' + '

Convinced that the system was workable with further development, Woodland left Drexel, moved into his father's apartment in Florida, and continued working on the system. His next inspiration came from Morse code, and he formed his first barcode from sand on the beach. "I just extended the dots and dashes downwards and made narrow lines and wide lines out of them."[9] To read them, he adapted technology from optical soundtracks in movies, using a 500-watt incandescent light bulb shining through the paper onto an RCA935 photomultiplier tube (from a movie projector) on the far side. He later decided that the system would work better if it were printed as a circle instead of a line, allowing it to be scanned in any direction.\n' + '

On 20 October 1949, Woodland and Silver filed a patent application for "Classifying Apparatus and Method", in which they described both the linear and bull's eye printing patterns, as well as the mechanical and electronic systems needed to read the code. The patent was issued on 7 October 1952 as US Patent 2,612,994.[1] In 1951, Woodland moved to IBM and continually tried to interest IBM in developing the system. The company eventually commissioned a report on the idea, which concluded that it was both feasible and interesting, but that processing the resulting information would require equipment that was some time off in the future.\n' + '

IBM offered to buy the patent, but the offer was not accepted. Philco purchased the patent in 1962 and then sold it to RCA sometime later.[9]\n' + '

\n' + '

Collins at Sylvania

\n' + '

During his time as an undergraduate, David Jarrett Collins worked at the Pennsylvania Railroad and became aware of the need to automatically identify railroad cars. Immediately after receiving his master's degree from MIT in 1959, he started work at GTE Sylvania and began addressing the problem. He developed a system called KarTrak using blue and red reflective stripes attached to the side of the cars, encoding a six-digit company identifier and a four-digit car number.[9] Light reflected off the colored stripes was read by photomultiplier vacuum tubes.[10]\n' + '

The Boston and Maine Railroad tested the KarTrak system on their gravel cars in 1961. The tests continued until 1967, when the Association of American Railroads (AAR) selected it as a standard, Automatic Car Identification, across the entire North American fleet. The installations began on 10 October 1967. However, the economic downturn and rash of bankruptcies in the industry in the early 1970s greatly slowed the rollout, and it was not until 1974 that 95% of the fleet was labeled. To add to its woes, the system was found to be easily fooled by dirt in certain applications, which greatly affected accuracy. The AAR abandoned the system in the late 1970s, and it was not until the mid-1980s that they introduced a similar system, this time based on radio tags.[11]\n' + '

The railway project had failed, but a toll bridge in New Jersey requested a similar system so that it could quickly scan for cars that had purchased a monthly pass. Then the U.S. Post Office requested a system to track trucks entering and leaving their facilities. These applications required special retroreflector labels. Finally, Kal Kan asked the Sylvania team for a simpler (and cheaper) version which they could put on cases of pet food for inventory control.\n' + '

\n' + '

Computer Identics Corporation

\n' + '

In 1967, with the railway system maturing, Collins went to management looking for funding for a project to develop a black-and-white version of the code for other industries. They declined, saying that the railway project was large enough, and they saw no need to branch out so quickly.\n' + '

Collins then quit Sylvania and formed the Computer Identics Corporation.[9] As its first innovations, Computer Identics moved from using incandescent light bulbs in its systems, replacing them with helium–neon lasers, and incorporated a mirror as well, making it capable of locating a barcode up to several feet in front of the scanner. This made the entire process much simpler and more reliable, and typically enabled these devices to deal with damaged labels, as well, by recognizing and reading the intact portions.\n' + '

Computer Identics Corporation installed one of its first two scanning systems in the spring of 1969 at a General Motors (Buick) factory in Flint, Michigan.[9] The system was used to identify a dozen types of transmissions moving on an overhead conveyor from production to shipping. The other scanning system was installed at General Trading Company's distribution center in Carlstadt, New Jersey to direct shipments to the proper loading bay.\n' + '

\n' + '

Universal Product Code

\n' + '\n' + '

In 1966, the National Association of Food Chains (NAFC) held a meeting on the idea of automated checkout systems. RCA, who had purchased the rights to the original Woodland patent, attended the meeting and initiated an internal project to develop a system based on the bullseye code. The Kroger grocery chain volunteered to test it.\n' + '

In the mid-1970s, the NAFC established the Ad-Hoc Committee for U.S. Supermarkets on a Uniform Grocery-Product Code to set guidelines for barcode development. In addition, it created a symbol-selection subcommittee to help standardize the approach. In cooperation with consulting firm, McKinsey & Co., they developed a standardized 11-digit code for identifying products. The committee then sent out a contract tender to develop a barcode system to print and read the code. The request went to Singer, National Cash Register (NCR), Litton Industries, RCA, Pitney-Bowes, IBM and many others.[12] A wide variety of barcode approaches was studied, including linear codes, RCA's bullseye concentric circle code, starburst patterns and others.\n' + '

In the spring of 1971, RCA demonstrated their bullseye code at another industry meeting. IBM executives at the meeting noticed the crowds at the RCA booth and immediately developed their own system. IBM marketing specialist Alec Jablonover remembered that the company still employed Woodland, and he[who?] established a new facility in Raleigh-Durham Research Triangle Park to lead development.\n' + '

In July 1972, RCA began an 18-month test in a Kroger store in Cincinnati. Barcodes were printed on small pieces of adhesive paper, and attached by hand by store employees when they were adding price tags. The code proved to have a serious problem; the printers would sometimes smear ink, rendering the code unreadable in most orientations. However, a linear code, like the one being developed by Woodland at IBM, was printed in the direction of the stripes, so extra ink would simply make the code "taller" while remaining readable. So on 3 April 1973, the IBM UPC was selected as the NAFC standard. IBM had designed five versions of UPC symbology for future industry requirements: UPC A, B, C, D, and E.[13]\n' + '

NCR installed a testbed system at Marsh's Supermarket in Troy, Ohio, near the factory that was producing the equipment. On 26 June 1974, Clyde Dawson pulled a 10-pack of Wrigley's Juicy Fruit gum out of his basket and it was scanned by Sharon Buchanan at 8:01 am. The pack of gum and the receipt are now on display in the Smithsonian Institution. It was the first commercial appearance of the UPC.[14]\n' + '

In 1971, an IBM team was assembled for an intensive planning session, threshing out, 12 to 18 hours a day, how the technology would be deployed and operate cohesively across the system, and scheduling a roll-out plan. By 1973, the team were meeting with grocery manufacturers to introduce the symbol that would need to be printed on the packaging or labels of all of their products. There were no cost savings for a grocery to use it, unless at least 70% of the grocery's products had the barcode printed on the product by the manufacturer. IBM projected that 75% would be needed in 1975. Yet, although this was achieved, there were still scanning machines in fewer than 200 grocery stores by 1977.[15]\n' + '

Economic studies conducted for the grocery industry committee projected over $40 million in savings to the industry from scanning by the mid-1970s. Those numbers were not achieved in that time-frame and some predicted the demise of barcode scanning. The usefulness of the barcode required the adoption of expensive scanners by a critical mass of retailers while manufacturers simultaneously adopted barcode labels. Neither wanted to move first and results were not promising for the first couple of years, with Business Week proclaiming "The Supermarket Scanner That Failed" in a 1976 article.[14][16]\n' + '

On the other hand, experience with barcode scanning in those stores revealed additional benefits. The detailed sales information acquired by the new systems allowed greater responsiveness to customer habits, needs and preferences. This was reflected in the fact that about 5 weeks after installing barcode scanners, sales in grocery stores typically started climbing and eventually leveled off at a 10–12% increase in sales that never dropped off. There was also a 1–2% decrease in operating cost for those stores, and this enabled them to lower prices and thereby to increase market share. It was shown in the field that the return on investment for a barcode scanner was 41.5%. By 1980, 8,000 stores per year were converting.[15]\n' + '

Sims Supermarkets were the first location in Australia to use barcodes, starting in 1979.[17]\n' + '

\n' + '

Industrial adoption

\n' + '

In 1981, the United States Department of Defense adopted the use of Code 39 for marking all products sold to the United States military. This system, Logistics Applications of Automated Marking and Reading Symbols (LOGMARS), is still used by DoD and is widely viewed as the catalyst for widespread adoption of barcoding in industrial uses.[18]\n' + '

\n' + '

Use

\n' + '\n' + '
Barcode on a patient identification wristband
\n' + '
Barcoded parcel
\n' + '

Barcodes are widely used around the world in many contexts. In stores, UPC barcodes are pre-printed on most items other than fresh produce from a grocery store. This speeds up processing at check-outs and helps track items and also reduces instances of shoplifting involving price tag swapping, although shoplifters can now print their own barcodes.[19] Barcodes that encode a book's ISBN are also widely pre-printed on books, journals and other printed materials. In addition, retail chain membership cards use barcodes to identify customers, allowing for customized marketing and greater understanding of individual consumer shopping patterns. At the point of sale, shoppers can get product discounts or special marketing offers through the address or e-mail address provided at registration.\n' + '

Barcodes are widely used in the healthcare and hospital settings, ranging from patient identification (to access patient data, including medical history, drug allergies, etc.) to creating SOAP Notes[20] with barcodes to medication management. They are also used to facilitate the separation and indexing of documents that have been imaged in batch scanning applications, track the organization of species in biology,[21] and integrate with in-motion checkweighers to identify the item being weighed in a conveyor line for data collection.\n' + '

They can also be used to keep track of objects and people; they are used to keep track of rental cars, airline luggage, nuclear waste, registered mail, express mail and parcels. Barcoded tickets (which may be printed by the customer on their home printer, or stored on their mobile device) allow the holder to enter sports arenas, cinemas, theatres, fairgrounds, and transportation, and are used to record the arrival and departure of vehicles from rental facilities etc. This can allow proprietors to identify duplicate or fraudulent tickets more easily. Barcodes are widely used in shop floor control applications software where employees can scan work orders and track the time spent on a job.\n' + '

Barcodes are also used in some kinds of non-contact 1D and 2D position sensors. A series of barcodes are used in some kinds of absolute 1D linear encoder. The barcodes are packed close enough together that the reader always has one or two barcodes in its field of view. As a kind of fiducial marker, the relative position of the barcode in the field of view of the reader gives incremental precise positioning, in some cases with sub-pixel resolution. The data decoded from the barcode gives the absolute coarse position. An "address carpet", such as Howell's binary pattern and the Anoto dot pattern, is a 2D barcode designed so that a reader, even though only a tiny portion of the complete carpet is in the field of view of the reader, can find its absolute X,Y position and rotation in the carpet.[22][23]\n' + '

2D barcodes can embed a hyperlink to a web page. A mobile device with an inbuilt camera might be used to read the pattern and browse the linked website, which can help a shopper find the best price for an item in the vicinity. Since 2005, airlines use an IATA-standard 2D barcode on boarding passes (Bar Coded Boarding Pass (BCBP)), and since 2008 2D barcodes sent to mobile phones enable electronic boarding passes.[24]\n' + '

Some applications for barcodes have fallen out of use. In the 1970s and 1980s, software source code was occasionally encoded in a barcode and printed on paper (Cauzin Softstrip and Paperbyte[25] are barcode symbologies specifically designed for this application), and the 1991 Barcode Battler computer game system used any standard barcode to generate combat statistics.\n' + '

Artists have used barcodes in art, such as Scott Blake's Barcode Jesus, as part of the post-modernism movement.\n' + '

\n' + '

Symbologies

\n' + '

The mapping between messages and barcodes is called a symbology. The specification of a symbology includes the encoding of the message into bars and spaces, any required start and stop markers, the size of the quiet zone required to be before and after the barcode, and the computation of a checksum.\n' + '

Linear symbologies can be classified mainly by two properties:\n' + '

\n' + '
Continuous vs. discrete
\n' + '
  • Characters in discrete symbologies are composed of n bars and n − 1 spaces. There is an additional space between characters, but it does not convey information, and may have any width as long as it is not confused with the end of the code.
  • \n' + '
  • Characters in continuous symbologies are composed of n bars and n spaces, and usually abut, with one character ending with a space and the next beginning with a bar, or vice versa. A special end pattern that has bars on both ends is required to end the code.
\n' + '
Two-width vs. many-width
\n' + '
  • A two-width, also called a binary bar code, contains bars and spaces of two widths, "wide" and "narrow". The precise width of the wide bars and spaces is not critical; typically it is permitted to be anywhere between 2 and 3 times the width of the narrow equivalents.
  • \n' + '
  • Some other symbologies use bars of two different heights (POSTNET), or the presence or absence of bars (CPC Binary Barcode). These are normally also considered binary bar codes.
  • \n' + '
  • Bars and spaces in many-width symbologies are all multiples of a basic width called the module; most such codes use four widths of 1, 2, 3 and 4 modules.
\n' + '

Some symbologies use interleaving. The first character is encoded using black bars of varying width. The second character is then encoded by varying the width of the white spaces between these bars. Thus characters are encoded in pairs over the same section of the barcode. Interleaved 2 of 5 is an example of this.\n' + '

Stacked symbologies repeat a given linear symbology vertically.\n' + '

The most common among the many 2D symbologies are matrix codes, which feature square or dot-shaped modules arranged on a grid pattern. 2D symbologies also come in circular and other patterns and may employ steganography, hiding modules within an image (for example, DataGlyphs).\n' + '

Linear symbologies are optimized for laser scanners, which sweep a light beam across the barcode in a straight line, reading a slice of the barcode light-dark patterns. Scanning at an angle makes the modules appear wider, but does not change the width ratios. Stacked symbologies are also optimized for laser scanning, with the laser making multiple passes across the barcode.\n' + '

In the 1990s development of charge-coupled device (CCD) imagers to read barcodes was pioneered by Welch Allyn. Imaging does not require moving parts, as a laser scanner does. In 2007, linear imaging had begun to supplant laser scanning as the preferred scan engine for its performance and durability.\n' + '

2D symbologies cannot be read by a laser, as there is typically no sweep pattern that can encompass the entire symbol. They must be scanned by an image-based scanner employing a CCD or other digital camera sensor technology.\n' + '

\n' + '

Barcode readers

\n' + '\n' + '
GTIN barcodes on Coke bottles. The images at right show how the laser of barcode readers "see" the images behind a red filter.
\n' + '

The earliest, and still the cheapest, barcode scanners are built from a fixed light and a single photosensor that is manually moved across the barcode. Barcode scanners can be classified into three categories based on their connection to the computer. The older type is the RS-232 barcode scanner. This type requires special programming for transferring the input data to the application program. Keyboard interface scanners connect to a computer using a PS/2 or AT keyboard–compatible adaptor cable (a "keyboard wedge"). The barcode's data is sent to the computer as if it had been typed on the keyboard.\n' + '

Like the keyboard interface scanner, USB scanners do not need custom code for transferring input data to the application program. On PCs running Windows the human interface device emulates the data merging action of a hardware "keyboard wedge", and the scanner automatically behaves like an additional keyboard.\n' + '

Most modern smartphones are able to decode barcode using their built-in camera. Google's mobile Android operating system can use their own Google Lens application to scan QR codes, or third party apps like Barcode Scanner to read both one-dimensional barcodes and QR codes. Nokia's Symbian operating system featured a barcode scanner,[26] while mbarcode[27] is a QR code reader for the Maemo operating system. In Apple iOS 11, the native camera app can decode QR codes and can link to URLs, join wireless networks, or perform other operations depending on the QR Code contents.[28] Other paid and free apps are available with scanning capabilities for other symbologies or for earlier iOS versions.[29] With BlackBerry devices, the App World application can natively scan barcodes and load any recognized Web URLs on the device's Web browser. Windows Phone 7.5 is able to scan barcodes through the Bing search app. However, these devices are not designed specifically for the capturing of barcodes. As a result, they do not decode nearly as quickly or accurately as a dedicated barcode scanner or portable data terminal.[citation needed]\n' + '

\n' + '

Quality control and verification

\n' + '

It is common for producers and users of bar codes to have a quality management system which includes verification and validation of bar codes.[30] Barcode verification examines scanability and the quality of the barcode in comparison to industry standards and specifications.[31] Barcode verifiers are primarily used by businesses that print and use barcodes. Any trading partner in the supply chain can test barcode quality. It is important to verify a barcode to ensure that any reader in the supply chain can successfully interpret a barcode with a low error rate. Retailers levy large penalties for non-compliant barcodes. These chargebacks can reduce a manufacturer's revenue by 2% to 10%.[32]\n' + '

A barcode verifier works the way a reader does, but instead of simply decoding a barcode, a verifier performs a series of tests. For linear barcodes these tests are:\n' + '

\n' + '
  • Edge contrast (EC)[33]\n' + '
    • The difference between the space reflectance (Rs) and adjoining bar reflectance (Rb). EC=Rs-Rb
  • \n' + '
  • Minimum bar reflectance (Rb)[33]\n' + '
    • The smallest reflectance value in a bar.
  • \n' + '
  • Minimum space reflectance (Rs)[33]\n' + '
    • The smallest reflectance value in a space.
  • \n' + '
  • Symbol contrast (SC)[33]\n' + '
    • Symbol Contrast is the difference in reflectance values of the lightest space (including the quiet zone) and the darkest bar of the symbol. The greater the difference, the higher the grade. The parameter is graded as either A, B, C, D, or F. SC=Rmax-Rmin
  • \n' + '
  • Minimum edge contrast (ECmin)[33]\n' + '
    • The difference between the space reflectance (Rs) and adjoining bar reflectance (Rb). EC=Rs-Rb
  • \n' + '
  • Modulation (MOD)[33]\n' + '
    • The parameter is graded either A, B, C, D, or F. This grade is based on the relationship between minimum edge contrast (ECmin) and symbol contrast (SC). MOD=ECmin/SC The greater the difference between minimum edge contrast and symbol contrast, the lower the grade. Scanners and verifiers perceive the narrower bars and spaces to have less intensity than wider bars and spaces; the comparison of the lesser intensity of narrow elements to the wide elements is called modulation. This condition is affected by aperture size.
  • \n' + '
  • Inter-character gap[33]\n' + '
    • In discrete barcodes, the space that disconnects the two contiguous characters. When present, inter-character gaps are considered spaces (elements) for purposes of edge determination and reflectance parameter grades.
  • \n' + '
  • Defects
  • \n' + '
  • Decode[33]\n' + '
    • Extracting the information which has been encoded in a bar code symbol.
  • \n' + '
  • Decodability[33]\n' + '
    • Can be graded as A, B, C, D, or F. The Decodability grade indicates the amount of error in the width of the most deviant element in the symbol. The less deviation in the symbology, the higher the grade. Decodability is a measure of print accuracy using the symbology reference decode algorithm.
\n' + '

2D matrix symbols look at the parameters:\n' + '

\n' + '
  • Symbol contrast[33]
  • \n' + '
  • Modulation[33]
  • \n' + '
  • Decode[33]
  • \n' + '
  • Unused error correction
  • \n' + '
  • Fixed (finder) pattern damage
  • \n' + '
  • Grid non-uniformity
  • \n' + '
  • Axial non-uniformity[34]
\n' + '

Depending on the parameter, each ANSI test is graded from 0.0 to 4.0 (F to A), or given a pass or fail mark. Each grade is determined by analyzing the scan reflectance profile (SRP), an analog graph of a single scan line across the entire symbol. The lowest of the 8 grades is the scan grade, and the overall ISO symbol grade is the average of the individual scan grades. For most applications a 2.5 (C) is the minimal acceptable symbol grade.[35]\n' + '

Compared with a reader, a verifier measures a barcode's optical characteristics to international and industry standards. The measurement must be repeatable and consistent. Doing so requires constant conditions such as distance, illumination angle, sensor angle and verifier aperture. Based on the verification results, the production process can be adjusted to print higher quality barcodes that will scan down the supply chain.\n' + '

Bar code validation may include evaluations after use (and abuse) testing such as sunlight, abrasion, impact, moisture, etc.[36]\n' + '

\n' + '

Barcode verifier standards

\n' + '

Barcode verifier standards are defined by the International Organization for Standardization (ISO), in ISO/IEC 15426-1 (linear) or ISO/IEC 15426-2 (2D).[citation needed] The current international barcode quality specification is ISO/IEC 15416 (linear) and ISO/IEC 15415 (2D).[citation needed] The European Standard EN 1635 has been withdrawn and replaced by ISO/IEC 15416. The original U.S. barcode quality specification was ANSI X3.182. (UPCs used in the US – ANSI/UCC5).[citation needed] As of 2011 the ISO workgroup JTC1 SC31 was developing a Direct Part Marking (DPM) quality standard: ISO/IEC TR 29158.[37]\n' + '

\n' + '

Benefits

\n' + '

In point-of-sale management, barcode systems can provide detailed up-to-date information on the business, accelerating decisions and with more confidence. For example:\n' + '

\n' + '
  • Fast-selling items can be identified quickly and automatically reordered.
  • \n' + '
  • Slow-selling items can be identified, preventing inventory build-up.
  • \n' + '
  • The effects of merchandising changes can be monitored, allowing fast-moving, more profitable items to occupy the best space.
  • \n' + '
  • Historical data can be used to predict seasonal fluctuations very accurately.
  • \n' + '
  • Items may be repriced on the shelf to reflect both sale prices and price increases.
  • \n' + '
  • This technology also enables the profiling of individual consumers, typically through a voluntary registration of discount cards. While pitched as a benefit to the consumer, this practice is considered to be potentially dangerous by privacy advocates.[which?]
\n' + '

Besides sales and inventory tracking, barcodes are very useful in logistics and supply chain management.\n' + '

\n' + '
  • When a manufacturer packs a box for shipment, a Unique Identifying Number (UID) can be assigned to the box.
  • \n' + '
  • A database can link the UID to relevant information about the box; such as order number, items packed, quantity packed, destination, etc.
  • \n' + '
  • The information can be transmitted through a communication system such as Electronic Data Interchange (EDI) so the retailer has the information about a shipment before it arrives.
  • \n' + '
  • Shipments that are sent to a Distribution Center (DC) are tracked before forwarding. When the shipment reaches its final destination, the UID gets scanned, so the store knows the shipment's source, contents, and cost.
\n' + '

Barcode scanners are relatively low cost and extremely accurate compared to key-entry, with only about 1 substitution error in 15,000 to 36 trillion characters entered.[38][unreliable source?] The exact error rate depends on the type of barcode.\n' + '

\n' + '

Types of barcodes

\n' + '

Linear barcodes

\n' + '

A first generation, "one dimensional" barcode that is made up of lines and spaces of various widths that create specific patterns.\n' + '

\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '
ExampleSymbologyContinuous or discreteBar widthsUses\n' + '
Australia Post 4-state barcode.pngAustralia Post barcodeDiscrete4 bar heightsAn Australia Post barcode as used on a business reply paid envelope and applied by automated sorting machines to other mail when initially processed in fluorescent ink .\n' + '
Codabar.svgCodabarDiscreteTwoOld format used in libraries and blood banks and on airbills (out of date, but still widely used in libraries)\n' + '
Code 25 – Non-interleaved 2 of 5ContinuousTwoIndustrial\n' + '
Barcode2of5example.svgCode 25 – Interleaved 2 of 5ContinuousTwoWholesale, libraries International standard ISO/IEC 16390\n' + '
Code11 barcode.pngCode 11DiscreteTwoTelephones (out of date)\n' + '
Code32 01234567.pngFarmacode or Code 32DiscreteTwoItalian pharmacode – use Code 39 (no international standard available)\n' + '
Code 3 of 9.svgCode 39DiscreteTwoVarious – international standard ISO/IEC 16388\n' + '
Code 49 wikipedia.pngCode 49ContinuousManyVarious\n' + '
Code 93 wikipedia.pngCode 93ContinuousManyVarious\n' + '
Code 128B-2009-06-02.svgCode 128ContinuousManyVarious – International Standard ISO/IEC 15417\n' + '
CPC BinaryDiscreteTwo\n' + '
Dx-film-edge-barcode.jpgDX film edge barcodeNeitherTall/shortColor print film\n' + '
Issn barcode.pngEAN 2ContinuousManyAddon code (magazines), GS1-approved – not an own symbology – to be used only with an EAN/UPC according to ISO/IEC 15420\n' + '
Isbn add5.pngEAN 5ContinuousManyAddon code (books), GS1-approved – not an own symbology – to be used only with an EAN/UPC according to ISO/IEC 15420\n' + '
EAN8.svgEAN-8, EAN-13ContinuousManyWorldwide retail, GS1-approved – International Standard ISO/IEC 15420\n' + '
Facing Identification MarkDiscreteTwoUSPS business reply mail\n' + '
Gs1-128 example.svgGS1-128 (formerly named UCC/EAN-128), incorrectly referenced as EAN 128 and UCC 128ContinuousManyVarious, GS1-approved – just an application of the Code 128 (ISO/IEC 15417) using the ANS MH10.8.2 AI Datastructures. It is not a separate symbology.\n' + '
Databar 14 00075678164125.pngGS1 DataBar, formerly Reduced Space Symbology (RSS)ContinuousManyVarious, GS1-approved\n' + '
Intelligent Mail Barcode Wiki22.pngIntelligent Mail barcodeDiscrete4 bar heightsUnited States Postal Service, replaces both POSTNET and PLANET symbols (formerly named OneCode)\n' + '
ITF-14.svgITF-14ContinuousTwoNon-retail packaging levels, GS1-approved – is just an Interleaved 2/5 Code (ISO/IEC 16390) with a few additional specifications, according to the GS1 General Specifications\n' + '
ITF-6 barcode.svgITF-6ContinuousTwoInterleaved 2 of 5 barcode to encode an addon to ITF-14 and ITF-16 barcodes. The code is used to encode additional data such as items quantity or container weight\n' + '
EAN-13-5901234123457.svgJANContinuousManyUsed in Japan, similar to and compatible with EAN-13 (ISO/IEC 15420)\n' + '
Japan Post barcode.pngJapan Post barcodeDiscrete4 bar heightsJapan Post\n' + '
KarTrak ACI codes.svgKarTrak ACIDiscreteColoured barsUsed in North America on railroad rolling equipment\n' + '
MSI-barcode.pngMSIContinuousTwoUsed for warehouse shelves and inventory\n' + '
Pharmacode example.svgPharmacodeDiscreteTwoPharmaceutical packaging (no international standard available)\n' + '
Planet Barcode Format.pngPLANETContinuousTall/shortUnited States Postal Service (no international standard available)\n' + '
Plessey barcode.svgPlesseyContinuousTwoCatalogs, store shelves, inventory (no international standard available)\n' + '
Canada Post d52.01 domestic barcode.pngPostBarDiscrete4 bar heightsCanadian Post office\n' + '
POSTNET BAR.svg POSTNET 1.svg POSTNET 2.svg POSTNET 3.svg POSTNET BAR.pngPOSTNETDiscreteTall/shortUnited States Postal Service (no international standard available)\n' + '
Address with RM4SCC barcode.svgRM4SCC / KIXDiscrete4 bar heightsRoyal Mail / PostNL\n' + '
Royal Mail mailmark C barcode.pngRM Mailmark CDiscrete4 bar heightsRoyal Mail\n' + '
Royal Mail mailmark L barcode.pngRM Mailmark LDiscrete4 bar heightsRoyal Mail\n' + '
Telepen barcode.pngTelepenContinuousTwoLibraries (UK)\n' + '
UPC A.svgUniversal Product Code (UPC-A and UPC-E)ContinuousManyWorldwide retail, GS1-approved – International Standard ISO/IEC 15420\n' + '
\n' + '

Matrix (2D) barcodes

\n' + '

A matrix code, also termed a 2D barcode or simply a 2D code, is a two-dimensional way to represent information. It is similar to a linear (1-dimensional) barcode, but can represent more data per unit area.\n' + '

\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '
ExampleNameNotes\n' + '
Ar code.pngAR CodeA type of marker used for placing content inside augmented reality applications. Some AR Codes can contain QR codes inside, so that content AR content can be linked to.[39] See also ARTag.\n' + '
Azteccodeexample.svgAztec CodeDesigned by Andrew Longacre at Welch Allyn (now Honeywell Scanning and Mobility). Public domain. – International Standard: ISO/IEC 24778\n' + '
A bCode matrix barcode encoding the identifier 1683\n' + 'bCode\n' + 'A barcode designed for the study of insect behavior.[40] Encodes an 11 bit identifier and 16 bits of read error detection and error correction information. Predominately used for marking honey bees, but can also be applied to other animals.\n' + '
\n' + 'BEEtag\n' + 'A 25 bit (5x5) code matrix of black and white pixels that is unique to each tag surrounded by a white pixel border and a black pixel border. The 25-bit matrix consists of a 15-bit identity code, and a 10-bit error check.[41] It is designed to be a low-cost, image-based tracking system for the study of animal behavior and locomotion.\n' + '
\n' + 'BeeTagg\n' + 'A 2D barcode with honeycomb structures suitable for mobile tagging and was developed by the Swiss company connvision AG.\n' + '
\n' + 'Bokode\n' + 'A type of data tag which holds much more information than a barcode over the same area. They were developed by a team led by Ramesh Raskar at the MIT Media Lab. The bokode pattern is a tiled series of Data Matrix codes.\n' + '
Boxing 4kv6 0.png\n' + 'Boxing\n' + 'A high-capacity 2D barcode is used on piqlFilm by Piql AS[42]\n' + '
Code 1Public domain. Code 1 is currently used in the health care industry for medicine labels and the recycling industry to encode container content for sorting.[43]\n' + '
Code 16K wikipedia.png\n' + 'Code 16K\n' + 'The Code 16K (1988) is a multi-row bar code developed by Ted Williams at Laserlight Systems (USA) in 1992. In the US and France, the code is used in the electronics industry to identify chips and printed circuit boards. Medical applications in the USA are well known. Williams also developed Code 128, and the structure of 16K is based on Code 128. Not coincidentally, 128 squared happened to equal 16,000 or 16K for short. Code 16K resolved an inherent problem with Code 49. Code 49's structure requires a large amount of memory for encoding and decoding tables and algorithms. 16K is a stacked symbology.[44][45]\n' + '
ColorCodeColorZip[46] developed colour barcodes that can be read by camera phones from TV screens; mainly used in Korea.[47]\n' + '
Color Construct CodeColor Construct Code is one of the few barcode symbologies designed to take advantage of multiple colors.[48][49]\n' + '
PhotoTAN mit Orientierungsmarkierungen.svgCronto Visual Cryptogram\n' + 'The Cronto Visual Cryptogram (also called photoTAN) is a specialized color barcode, spun out from research at the University of Cambridge by Igor Drokov, Steven Murdoch, and Elena Punskaya.[50] It is used for transaction signing in e-banking; the barcode contains encrypted transaction data which is then used as a challenge to compute a transaction authentication number using a security token.[51]\n' + '
CyberCodeFrom Sony.\n' + '
d-touchreadable when printed on deformable gloves and stretched and distorted[52][53]\n' + '
DataGlyphsFrom Palo Alto Research Center (also termed Xerox PARC).[54]\n' + '

Patented.[55]\n' + 'DataGlyphs can be embedded into a half-tone image or background shading pattern in a way that is almost perceptually invisible, similar to steganography.[56][57]\n' + '

\n' + '
Datamatrix.svgData MatrixFrom Microscan Systems, formerly RVSI Acuity CiMatrix/Siemens. Public domain. Increasingly used throughout the United States. Single segment Data Matrix is also termed Semacode. – International Standard: ISO/IEC 16022.\n' + '
Datastrip CodeFrom Datastrip, Inc.\n' + '
\n' + 'Digimarc Barcode\n' + 'The Digimarc Barcode is a unique identifier, or code, based on imperceptible patterns that can be applied to marketing materials, including packaging, displays, ads in magazines, circulars, radio and television[58]\n' + '
digital paperpatterned paper used in conjunction with a digital pen to create handwritten digital documents. The printed dot pattern uniquely identifies the position coordinates on the paper.\n' + '
DotCode Wikipedia.pngDotCodeStandardized as AIM Dotcode Rev 3.0. Public domain. Used to track individual cigarette and pharmaceutical packages.\n' + '
Dot Code AAlso known as Philips Dot Code.[59] Patented in 1988.[60]\n' + '
\n' + 'DWCode\n' + 'Introduced by GS1 US and GS1 Germany, the DWCode is a unique, imperceptible data carrier that is repeated across the entire graphics design of a package[61]\n' + '
Example of an EZcode.EZcodeDesigned for decoding by cameraphones;[62] from ScanLife.[63]\n' + '
Han Xin 2D Barcode.svgHan Xin BarcodeBarcode designed to encode Chinese characters introduced by Association for Automatic Identification and Mobility in 2011.\n' + '
High Capacity Color Barcode Tag.svgHigh Capacity Color BarcodeHCCB was developed by Microsoft; licensed by ISAN-IA.\n' + '
HueCodeFrom Robot Design Associates. Uses greyscale or colour.[64]\n' + '
InterCodeFrom Iconlab, Inc. The standard 2D barcode in South Korea. All 3 South Korean mobile carriers put the scanner program of this code into their handsets to access mobile internet, as a default embedded program.\n' + '
\n' + '

JAB-code.png\n' + '

\n' + '
JAB Code\n' + 'Just Another Bar Code is a colored 2D barcode. Square or rectangle. License free\n' + '
MaxiCode.svgMaxiCodeUsed by United Parcel Service. Now public domain.\n' + '
\n' + 'mCode\n' + 'Designed by NextCode Corporation, specifically to work with mobile phones and mobile services.[65] It is implementing an independent error detection technique preventing false decoding, it uses a variable-size error correction polynomial, which depends on the exact size of the code.[66]\n' + '
MMCCDesigned to disseminate high capacity mobile phone content via existing colour print and electronic media, without the need for network connectivity\n' + '
NexCode.pngNexCodeNexCode is developed and patented by S5 Systems.\n' + '
Nintendo e-Reader#Dot codeDeveloped by Olympus Corporation to store songs, images, and mini-games for Game Boy Advance on Pokémon trading cards.\n' + '
Better Sample PDF417.pngPDF417Originated by Symbol Technologies. Public domain. – International standard: ISO/IEC 15438\n' + '
Qode example.QodeAmerican proprietary and patented 2D barcode from NeoMedia Technologies, Inc.[63]\n' + '
QR code for mobile English Wikipedia.svgQR codeInitially developed, patented and owned by Denso Wave for automotive components management; they have chosen not to exercise their patent rights. Can encode Latin and Japanese Kanji and Kana characters, music, images, URLs, emails. De facto standard for Japanese cell phones. Used with BlackBerry Messenger to pick up contacts rather than using a PIN code. The most frequently used type of code to scan with smartphones. Public Domain. – International Standard: ISO/IEC 18004\n' + '
ScreencodeDeveloped and patented[67][68] by Hewlett-Packard Labs. A time-varying 2D pattern using to encode data via brightness fluctuations in an image, for the purpose of high bandwidth data transfer from computer displays to smartphones via smartphone camera input. Inventors Timothy Kindberg and John Collomosse, publicly disclosed at ACM HotMobile 2008.[69]\n' + '
Shotcode.pngShotCodeCircular barcodes for camera phones. Originally from High Energy Magic Ltd in name Spotcode. Before that most likely termed TRIPCode.\n' + '
Snapcode, also called Boo-R codeused by Snapchat, Spectacles, etc. US9111164B1[70][71][72]\n' + '
\n' + 'Snowflake Code\n' + 'A proprietary code developed by Electronic Automation Ltd. in 1981. It is possible to encode more than 100 numeric digits in a space of only 5mm x 5mm. User selectable error correction allows up to 40% of the code to be destroyed and still remain readable. The code is used in the pharmaceutical industry and has an advantage that it can be applied to products and materials in a wide variety of ways, including printed labels, ink-jet printing, laser-etching, indenting or hole punching.[44][73][74]\n' + '
SPARQCode-sample.gifSPARQCodeQR code encoding standard from MSKYNET, Inc.\n' + '
\n' + 'Trillcode\n' + 'Designed for mobile phone scanning.[75] Developed by Lark Computer, a Romanian company.[66]\n' + '
VOICEYEDeveloped and patented by VOICEYE, Inc. in South Korea, it aims to allow blind and visually impaired people to access printed information. It also claims to be the 2D barcode that has the world's largest storage capacity.\n' + '
\n' + '

Example images

\n' + '\n' + '

In popular culture

\n' + '

In architecture, a building in Lingang New City by German architects Gerkan, Marg and Partners incorporates a barcode design,[77] as does a shopping mall called Shtrikh-kod (Russian for barcode) in Narodnaya ulitsa ("People's Street") in the Nevskiy district of St. Petersburg, Russia.[78]\n' + '

In media, in 2011, the National Film Board of Canada and ARTE France launched a web documentary entitled Barcode.tv, which allows users to view films about everyday objects by scanning the product's barcode with their iPhone camera.[79][80]\n' + '

In professional wrestling, the WWE stable D-Generation X incorporated a barcode into their entrance video, as well as on a T-shirt.[81][82]\n' + '

In the TV series Dark Angel, the protagonist and the other transgenics in the Manticore X-series have barcodes on the back of their necks.\n' + '

In video games, the protagonist of the Hitman video game series has a barcode tattoo on the back of his head. Also, QR codes can be scanned for an extra mission on Watch Dogs.\n' + '

In the films Back to the Future Part II and The Handmaid's Tale, cars in the future are depicted with barcode licence plates.\n' + '

In the Terminator films, Skynet burns barcodes onto the inside surface of the wrists of captive humans (in a similar location to the WW2 concentration camp tattoos) as a unique identifier.\n' + '

In music, Dave Davies of The Kinks released a solo album in 1980, AFL1-3603, which featured a giant barcode on the front cover in place of the musician's head. The album's name was also the barcode number.\n' + '

The April 1978 issue of Mad Magazine featured a giant barcode on the cover, with the blurb "[Mad] Hopes this issue jams up every computer in the country...for forcing us to deface our covers with this yecchy UPC symbol from now on!"\n' + '

The 2018 videogame Judgment features QR Codes that protagonist Takayuki Yagami can photograph with his phone camera. These are mostly to unlock parts for Yagami's Drone.[83]\n' + '

Interactive Textbooks were first published by Harcourt College Publishers to Expand Education Technology with Interactive Textbooks.[84]\n' + '

\n' + '

Designed barcodes

\n' + '

Some brands integrate custom designs into barcodes (while keeping them readable) on their consumer products.\n' + '

\n' + '\n' + '

Hoaxes about barcodes

\n' + '

There was minor skepticism from conspiracy theorists, who considered barcodes to be an intrusive surveillance technology, and from some Christians, pioneered by a 1982 book The New Money System 666 by Mary Stewart Relfe, who thought the codes hid the number 666, representing the "Number of the Beast".[85] Old Believers, a separation of the Russian Orthodox Church, believe barcodes are the stamp of the Antichrist.[86] Television host Phil Donahue described barcodes as a "corporate plot against consumers".[87]\n' + '

\n' + '

See also

\n' + '\n' + '

References

\n' + '
\n' + '
    \n' + '
  1. ^ a b US patent 2612994 \n' + '
  2. \n' + '
  3. ^ "How Barcodes Work". Stuff You Should Know. 4 June 2019. Retrieved 5 June 2019.\n' + '
  4. \n' + '
  5. ^ a b Cranstone, Ian. "A guide to ACI (Automatic Car Identification)/KarTrak". Canadian Freight Cars A resource page for the Canadian Freight Car Enthusiast. Retrieved 26 May 2013.\n' + '
  6. \n' + '
  7. ^ Keyes, John (22 August 2003). "KarTrak". John Keyes Boston photoblogger. Images from Boston, New England, and beyond. John Keyes. Archived from the original on 10 March 2014. Retrieved 26 May 2013.\n' + '
  8. \n' + '
  9. ^ a b Roberts, Sam (11 December 2019). "George Laurer, Who Developed the Bar Code, Is Dead at 94". New York Times. Retrieved 13 December 2019.\n' + '
  10. \n' + '
  11. ^ Fox, Margalit (15 June 2011). "Alan Haberman, Who Ushered in the Bar Code, Dies at 81". New York Times.\n' + '
  12. \n' + '
  13. ^ G. F. (2 November 2017). "Why QR codes are on the rise". The Economist. Retrieved 5 February 2018.\n' + '
  14. \n' + '
  15. ^ Fishman, Charles (1 August 2001). "The Killer App – Bar None". American Way. Archived from the original on 12 January 2010. Retrieved 19 April 2010.\n' + '
  16. \n' + '
  17. ^ a b c d e f Seideman, Tony (Spring 1993), "Barcodes Sweep the World", Wonders of Modern Technology, archived from the original on 16 October 2016\n' + '
  18. \n' + '
  19. ^ Dunn, Peter (20 October 2015). "David Collins, SM '59: Making his mark on the world with bar codes". technologyreview.com. MIT. Retrieved 2 December 2019.\n' + '
  20. \n' + '
  21. ^ Graham-White, Sean (August 1999). "Do You Know Where Your Boxcar Is?". Trains. 59 (8): 48–53.\n' + '
  22. \n' + '
  23. ^ Laurer, George. "Development of the U.P.C. Symbol". Archived from the original on 25 September 2008.\n' + '
  24. \n' + '
  25. ^ Nelson, Benjamin (1997). Punched Cards To Bar Codes: A 200-year journey. Peterborough, N.H.: Helmers. ISBN 9780911261127.\n' + '
  26. \n' + '
  27. ^ a b Varchaver, Nicholas (31 May 2004). "Scanning the Globe". Fortune. Archived from the original on 14 November 2006. Retrieved 27 November 2006.\n' + '
  28. \n' + '
  29. ^ a b Selmeier, Bill (2009). Spreading the Barcode. Lulu. pp. 26, 214, 236, 238, 244, 245, 236, 238, 244, 245. ISBN 978-0-578-02417-2.\n' + '
  30. \n' + '
  31. ^ Rawsthorn, Alice (23 February 2010). "Scan Artists". New York Times. Retrieved 31 July 2015.\n' + '
  32. \n' + '
  33. ^ "World hails barcode on important birthday". ATN. 1 July 2014.\n' + '
  34. \n' + '
  35. ^ "A Short History of Bar Code". BarCode 1. Adams Communications. Retrieved 28 November 2011.\n' + '
  36. \n' + '
  37. ^ "Barcode". iWatch Systems. 2 May 2011. Retrieved 28 November 2011.\n' + '
  38. \n' + '
  39. ^ Oberfield, Craig. "QNotes Barcode System". US Patented #5296688. Quick Notes Inc. Retrieved 15 December 2012.\n' + '
  40. \n' + '
  41. ^ National Geographic, May 2010, page 30\n' + '
  42. \n' + '
  43. ^ Hecht, David L. (March 2001). "Printed Embedded Data Graphical User Interfaces" (PDF). IEEE Computer. Xerox Palo Alto Research Center. 34 (3): 47–55. doi:10.1109/2.910893. Archived from the original (PDF) on 3 June 2013.\n' + '
  44. \n' + '
  45. ^ Howell, Jon; Kotay, Keith (March 2000). "Landmarks for absolute localization". Dartmouth Computer Science Technical Report TR2000-364.\n' + '
  46. \n' + '
  47. ^ "IATA.org". IATA.org. 21 November 2011. Retrieved 28 November 2011.\n' + '
  48. \n' + '
  49. ^ "Paperbyte Bar Codes for Waduzitdo". Byte magazine. September 1978. p. 172.\n' + '
  50. \n' + '
  51. ^ "Nokia N80 Support". Nokia Europe. Archived from the original on 14 July 2011.\n' + '
  52. \n' + '
  53. ^ "package overview for mbarcode". Maemo.org. Retrieved 28 July 2010.\n' + '
  54. \n' + '
  55. ^ Sargent, Mikah (24 September 2017). "How to use QR codes in iOS 11". iMore. Retrieved 1 October 2017.\n' + '
  56. \n' + '
  57. ^ "15+ Best Barcode Scanner iPhone Applications". iPhoneness. 3 March 2017. Retrieved 1 October 2017.\n' + '
  58. \n' + '
  59. ^ David, H (28 November 2018), "Barcodes – Validation vs Verification in GS1", Labeling News, retrieved 6 June 2020\n' + '
  60. \n' + '
  61. ^ "Layman's Guide to ANSI, CEN, and ISO Barcode Print Quality Documents" (PDF). Association for Automatic Identification and Data Capture Technologies (AIM). 2002. Retrieved 23 November 2017.\n' + '
  62. \n' + '
  63. ^ Zieger, Anne (October 2003). "Retailer chargebacks: is there an upside? Retailer compliance initiatives can lead to efficiency". Frontline Solutions. Archived from the original on 8 July 2012.\n' + '
  64. \n' + '
  65. ^ a b c d e f g h i j k l Corp, Express. "Barcode Glossary | Express". Express Corp. Retrieved 11 December 2019.\n' + '
  66. \n' + '
  67. ^ Bar Code Verification Best Practice work team (May 2010). "GS1 DataMatrix: An introduction and technical overview of the most advanced GS1 Application Identifiers compliant symbology" (PDF). Global Standards 1. 1 (17): 34–36. Archived (PDF) from the original on 20 July 2011. Retrieved 2 August 2011.\n' + '
  68. \n' + '
  69. ^ GS1 Bar Code Verification Best Practice work team (May 2009). "GS1 Bar Code Verification for Linear Symbols" (PDF). Global Standards 1. 4 (3): 23–32. Retrieved 2 August 2011.\n' + '
  70. \n' + '
  71. ^ Garner, J (2019), Results of Data Matrix Barcode Testing for Field Applications, Oak Ridge National Laboratory, retrieved 6 June 2020\n' + '
  72. \n' + '
  73. ^ "Technical committees – JTC 1/SC 31 – Automatic identification and data capture techniques". ISO. Retrieved 28 November 2011.\n' + '
  74. \n' + '
  75. ^ Harmon, Craig K.; Adams, Russ (1989). Reading Between The Lines:An Introduction to Bar Code Technology. Peterborough, NH: Helmers. p. 13. ISBN 0-911261-00-1.\n' + '
  76. \n' + '
  77. ^ "AR Code Generator"\n' + '
  78. \n' + '
  79. ^ Gernat, Tim; Rao, Vikyath D.; Middendorf, Martin; Dankowicz, Harry; Goldenfeld, Nigel; Robinson, Gene E. (13 February 2018). "Automated monitoring of behavior reveals bursty interaction patterns and rapid spreading dynamics in honeybee social networks". Proceedings of the National Academy of Sciences. 115 (7): 1433–1438. doi:10.1073/pnas.1713568115. ISSN 0027-8424. PMC 5816157. PMID 29378954.\n' + '
  80. \n' + '
  81. ^ Combes, Stacey A.; Mountcastle, Andrew M.; Gravish, Nick; Crall, James D. (2 September 2015). "BEEtag: A Low-Cost, Image-Based Tracking System for the Study of Animal Behavior and Locomotion". PLOS ONE. 10 (9): e0136487. Bibcode:2015PLoSO..1036487C. doi:10.1371/journal.pone.0136487. ISSN 1932-6203. PMC 4558030. PMID 26332211.\n' + '
  82. \n' + '
  83. ^ https://github.com/piql/boxing\n' + '
  84. \n' + '
  85. ^ Adams, Russ (15 June 2009). "2-Dimensional Bar Code Page". Archived from the original on 7 July 2011. Retrieved 6 June 2011.\n' + '
  86. \n' + '
  87. ^ a b "2-Dimensional Bar Code Page". www.adams1.com. Retrieved 12 January 2019.\n' + '
  88. \n' + '
  89. ^ "Code 16K Specs" (PDF). www.gomaro.ch. Retrieved 12 January 2019.\n' + '
  90. \n' + '
  91. ^ "Colorzip.com". Colorzip.com. Retrieved 28 November 2011.\n' + '
  92. \n' + '
  93. ^ "Barcodes for TV Commercials". Adverlab. 31 January 2006. Retrieved 10 June 2009.\n' + '
  94. \n' + '
  95. ^ "About". Colour Code Technologies. Archived from the original on 29 August 2012. Retrieved 4 November 2012.\n' + '
  96. \n' + '
  97. ^ "Frequently Asked Questions". ColorCCode. Archived from the original on 21 February 2013. Retrieved 4 November 2012.\n' + '
  98. \n' + '
  99. ^ "New system to combat online banking fraud". University of Cambridge. 18 April 2013. Retrieved 21 January 2020.\n' + '
  100. \n' + '
  101. ^ Cronto Visual Transaction Signing, OneSpan, retrieved 6 December 2019\n' + '
  102. \n' + '
  103. ^ d-touch topological fiducial recognition, MIT, archived from the original on 2 March 2008.\n' + '
  104. \n' + '
  105. ^ d-touch markers are applied to deformable gloves, MIT, archived from the original on 21 June 2008.\n' + '
  106. \n' + '
  107. ^ See Xerox.com for details.\n' + '
  108. \n' + '
  109. ^ "DataGlyphs: Embedding Digital Data". Microglyphs. 3 May 2006. Retrieved 10 March 2014.\n' + '
  110. \n' + '
  111. ^ ""DataGlyph" Embedded Digital Data". Tauzero. Retrieved 10 March 2014.\n' + '
  112. \n' + '
  113. ^ "DataGlyphs". Xerox. Retrieved 10 March 2014.\n' + '
  114. \n' + '
  115. ^ "Better Barcodes, Better Business" (PDF).\n' + '
  116. \n' + '
  117. ^ Dot Code A at barcode.ro\n' + '
  118. \n' + '
  119. ^ Dot Code A Patent\n' + '
  120. \n' + '
  121. ^ "GS1 Germany and Digimarc Announce Collaboration to Bring DWCode to the German Market".\n' + '
  122. \n' + '
  123. ^ "Scanbuy". Retrieved 28 November 2011.\n' + '
  124. \n' + '
  125. ^ a b Steeman, Jeroen. "Online QR Code Decoder". Archived from the original on 9 January 2014. Retrieved 9 January 2014.\n' + '
  126. \n' + '
  127. ^ "BarCode-1 2-Dimensional Bar Code Page". Adams. Archived from the original on 3 November 2008. Retrieved 10 June 2009.\n' + '
  128. \n' + '
  129. ^ "Global Research Solutions – 2D Barcodes". grs.weebly.com. Retrieved 12 January 2019.\n' + '
  130. \n' + '
  131. ^ a b Kato, Hiroko; Tan, Keng T.; Chai, Douglas (8 April 2010). Barcodes for Mobile Devices. Cambridge University Press. ISBN 9781139487511.\n' + '
  132. \n' + '
  133. ^ \n' + '"US Patent 9270846: Content encoded luminosity modulation"\n' + '
  134. \n' + '
  135. ^ \n' + '"US Patent 8180163: Encoder and decoder and methods of encoding and decoding sequence information with inserted monitor flags"\n' + '
  136. \n' + '
  137. ^ \n' + '"Screen Codes: Visual Hyperlinks for Displays"\n' + '
  138. \n' + '
  139. ^ \n' + '"Snapchat is changing the way you watch snaps and add friends"\n' + '
  140. \n' + '
  141. ^ \n' + '"Snapchat Lets You Add People Via QR Snaptags Thanks To Secret Scan.me Acquisition"\n' + '
  142. \n' + '
  143. ^ \n' + '"How Snapchat Made QR Codes Cool Again"\n' + '
  144. \n' + '
  145. ^ 5825015, Chan, John Paul & GB, "United States Patent: 5825015 – Machine readable binary codes", issued 20 October 1998 \n' + '
  146. \n' + '
  147. ^ "US Patent 5825015". pdfpiw.uspto.gov. 20 October 1998. Retrieved 12 January 2019.\n' + '
  148. \n' + '
  149. ^ "Trillcode Barcode". Barcoding, Inc. 17 February 2009. Retrieved 12 January 2019.\n' + '
  150. \n' + '
  151. ^ (株)デンソーウェーブ, denso-wave.com (in Japanese) Copyright\n' + '
  152. \n' + '
  153. ^ Barcode Halls – gmp Archived 18 October 2011 at the Wayback Machine\n' + '
  154. \n' + '
  155. ^ "image". Peterburg2.ru. Retrieved 28 November 2011.\n' + '
  156. \n' + '
  157. ^ Lavigne, Anne-Marie (5 October 2011). "Introducing Barcode.tv, a new interactive doc about the objects that surround us". NFB Blog. National Film Board of Canada. Retrieved 7 October 2011.\n' + '
  158. \n' + '
  159. ^ Anderson, Kelly (6 October 2011). "NFB, ARTE France launch 'Bar Code'". Reelscreen. Retrieved 7 October 2011.\n' + '
  160. \n' + '
  161. ^ [1] Archived 16 March 2015 at the Wayback Machine\n' + '
  162. \n' + '
  163. ^ "Dx theme song 2009–2010". YouTube. 19 December 2009. Retrieved 10 March 2014.\n' + '
  164. \n' + '
  165. ^ Diego Agruello (27 June 2019). "Judgment QR code locations to upgrade Drone Parts explained • Eurogamer.net". Retrieved 3 August 2019.\n' + '
  166. \n' + '
  167. ^ "CueCat History". CueCat History. Retrieved 12 November 2019.\n' + '
  168. \n' + '
  169. ^ "What about barcodes and 666: The Mark of the Beast?". Av1611.org. 1999. Retrieved 14 March 2014.\n' + '
  170. \n' + '
  171. ^ Serafino, Jay (26 July 2018). "The Russian Family That Cut Itself Off From Civilization for More Than 40 Years". Mental Floss. Retrieved 6 May 2020.\n' + '
  172. \n' + '
  173. ^ Bishop, Tricia (5 July 2004). "UPC bar code has been in use 30 years". SFgate.com. Archived from the original on 23 August 2004. Retrieved 22 December 2009.\n' + '
  174. \n' + '
\n' + '

Further reading

\n' + '
\n' + '
  • Automating Management Information Systems: Barcode Engineering and Implementation – Harry E. Burke, Thomson Learning, ISBN 0-442-20712-3
  • \n' + '
  • Automating Management Information Systems: Principles of Barcode Applications – Harry E. Burke, Thomson Learning, ISBN 0-442-20667-4
  • \n' + '
  • The Bar Code Book – Roger C. Palmer, Helmers Publishing, ISBN 0-911261-09-5, 386 pages
  • \n' + '
  • The Bar Code Manual – Eugene F. Brighan, Thompson Learning, ISBN 0-03-016173-8
  • \n' + '
  • Handbook of Bar Coding Systems – Harry E. Burke, Van Nostrand Reinhold Company, ISBN 978-0-442-21430-2, 219 pages
  • \n' + '
  • Information Technology for Retail:Automatic Identification & Data Capture Systems – Girdhar Joshi, Oxford University Press, ISBN 0-19-569796-0, 416 pages
  • \n' + '
  • Lines of Communication – Craig K. Harmon, Helmers Publishing, ISBN 0-911261-07-9, 425 pages
  • \n' + '
  • Punched Cards to Bar Codes – Benjamin Nelson, Helmers Publishing, ISBN 0-911261-12-5, 434 pages
  • \n' + '
  • Revolution at the Checkout Counter: The Explosion of the Bar Code – Stephen A. Brown, Harvard University Press, ISBN 0-674-76720-9
  • \n' + '
  • Reading Between The Lines – Craig K. Harmon and Russ Adams, Helmers Publishing, ISBN 0-911261-00-1, 297 pages
  • \n' + '
  • The Black and White Solution: Bar Code and the IBM PC – Russ Adams and Joyce Lane, Helmers Publishing, ISBN 0-911261-01-X, 169 pages
  • \n' + '
  • Sourcebook of Automatic Identification and Data Collection – Russ Adams, Van Nostrand Reinhold, ISBN 0-442-31850-2, 298 pages
  • \n' + '
  • Inside Out: The Wonders of Modern Technology – Carol J. Amato, Smithmark Pub, ISBN 0831746572, 1993
\n' + '
\n' + '

External links

\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '\n' + '
\n' + '