You are on page 1of 11

Pembayaran digital:

-Uang digital (tcash, indosat dompetku)


-virtual currency yg menggunakan teknologi kriptografi
(cryptocurrency). Untuk setiap transaksi data akan dilakukan
penyandian menggunakan algoritma kriptografi tertentu (Mulyanto
2015)
Cryptocurrencies are physical precomputed files utilizing a public key
/ private key pairs generated around a specific encryption algorithm.
The key assigns ownership of each key pair, or coin, to the person
who is in possession of the private key. These key pairs are are stored
in a file named wallet.dat, which resides in a default hidden
directory on the owners hard drive. The private keys are sent to users
using dynamic wallet addresses generated by the users engaged in
transactions. The destination payment address is the public key of the
cryptocurrency keypair. There is a finite amount of each cryptocoin
available on the network, and value of each unit is assigned based on
supply and demand, as well as the fluctuating difficulty levels
required for mining each coin.
Cryptocurrencies merupakan file precompute fisik yang menggunakan
pasangan kunci publik / kunci privat yang dihasilkan oleh algoritma
tertentu.
Kunci privat tersebut menunjukkan kepemilikan masing-masing pasangan
kunci atau koin.
Pasangan kunci ini disimpan dalam file bernama wallet.day yang berada
pada suatu direktori
Kunci privat dikirim ke user dengan menggunakan alamat wallet yang
dibangkitkan oleh user pada saat melakukan transaksi.
Alamat untuk pembayaran adalah kunci publik dari pasangan kunci
cryptocurrency.
Bitcoin cryptocurrency pertama yang diterapkan dan digunakan
the cryptocurrency was created in order to achieve a very clear goal:
to promote disintermediation in the execution of commercial
transactions on the Internet (implementation of a monetary
freedom), that is, to make it possible for sellers and buyers to carry
out their transactions independently, without needing financial
institutions, in a safe and fast way.
The study of cryptocurrency payment arrangements developed by the
European Financial and Administrative Authority (European Banking
Authority, 2015) may help us this time as it offers a way to classify
the payment arrangements involving cryptocurrencies, taking into
account the interaction between them and the global economy.
E-book Global Cryptocurrency benchmarking
study
Bitcoin januari 2009 cryptocurrency yang terdesentralisasi
Skrg udah banyak cryptocurrency.
April 2017:
Ethereum (ETH)
Dash
Monero (XMR)
Ripple (XRP)
Litecoin (LTC)
etc
Page 18
All cryptocurrency systems have an integrated payment
network to process transacions denominated in the naive
token. While the promise of these systems is that users can
independently transact on these networks, there are a variety
of reasons why users prefer using services provided by third-
party payment service providers.
1

RISK
Small and individual miners are concerned that mining
fees will not be able to compensate for decreasing block
rewards in the long run; data shows that the proporion
of transacion fees as a percentage of total bitcoin mining
revenues have signiicantly increased in 2016, and are
projected to reach 10% at the end of 2017
Small miners are generally more concerned about
operaional risk factors than large miners
The biggest concern for large miners is the ierce
compeiion amongst miners of the same cryptocurrency,
while small miners are most concerned by sudden large
cryptocurrency price drops
Total bitcoin mining revenues in 2016 have increased
compared to 2015 despite the July 2016 bitcoin block
reward halving
Miners are worried about the centralisaion of hashing
power, as well as the centralisaion of hashing power in a
paricular geographical area
Centralisaion of mining hardware manufacturing in
paricular geographical areas is not a major concern
Common Attacks against Cryptocurrency
As with any organized criminal, the target will be the location of money. In the case of
cryptocurrencies, the locations of value are in the form of mining pool servers, trading
platforms, third party wallet services, and end user computers.
Over the short history of cryptocurrency, each value location has experienced multiple
forms of attack that resulted in the direct theft of coins.
Data Breaches of Mining Pools/Trading Platforms/Third Party Wallet Storage
Many cryptocurrency web applications are often based on experimental concepts that
may have undisclosed vulnerabilities. Furthermore, many also rely on the end user to
set a secure password. As with any security control, it is only as strong as its weakest
link. Malicious actors have been known to attack web applications that manage
cryptocurrency wallets, as well as attack users who have reused breached passwords
and/or experienced compromised e-mail accounts and password resets.

You might also like