Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

WIRED magazine reported on the fall of Bitcoin, stating that it can be directly attributed to two major events: 1) the fall of Mt. Gox, a major Bitcoin exchange, and 2) the fall of Silk Road, the online drug trafficking market for which Bitcoin was heavily utilized. Mt. Gox, which was based in Tokyo, Japan, was responsible for handling nearly 70 percent of all Bitcoin transactions. An immense hacking attack rendered Mt. Gox bankrupt following the disappearance of over $450 million worth of Bitcoins, some of which were stolen. Mt. Gox was forced to declare bankruptcy in 2014. Authorities claim that the screw-up was caused by a relative lack of management and experience, as well as an overwhelming amount of apathy toward the business.

That’s a ton of missing Bitcoins; well over 850,000. What’s shocking, though, is that nobody knew where they went for the longest time. Some were stolen and recovered over time, but the fact remains that a $450 million heist is enough to cripple even the most profitable company. Considering how Bitcoin is so often associated with scandal and corruption, you’d think it would have sunk into the past. Yet, Bitcoin is currently being used more than it ever has been before. Its usage per day peaked toward the end of December 2015, proving that there’s still a desire to use Bitcoin.

ib graph 1

Beyond the average consumer, Bitcoin’s main attraction for investors is the technology behind how it works. This is known as the blockchain. WIRED explains how the blockchain works, as well as how it can be used for more than just a simple currency:

The blockchain is essentially a database running across a vast array of independent machines. With Bitcoin, it oversees the exchange of money. But it can oversee the exchange of anything that holds value, including stocks, bonds, and futures as well as houses and car titles.

Among these investors are Bitcoin startups and veteran organizations who want to use the blockchain technology to help Bitcoin transactions become easier to use. One in particular, Coinbase, a Bitcoin exchange company in San Francisco, California, is involved in developing a Bitcoin debit card, which can be used to spend Bitcoin anywhere a VISA card is accepted. The concept behind doing this is that businesses won’t have to worry about processing fees associated with credit card transactions. This might prompt companies to adopt Bitcoin as a quality payment feature in the future.

With all kinds of new developments taking advantage of Bitcoin technology, we might see a resurgence in Bitcoin’s popularity in the general public, and not just by the crooks who sell illegal goods on the black market. Maybe we’ll even see an increase in use of other kinds of cryptocurrency, including everyone’s favorite, Dogecoin-- the adorable cryptocurrency based on the derpy charm of a goofy Shiba Inu dog.

ib doge 1

If Bitcoin makes a return, would you want to give it a shot? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 01 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Google Computer Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Cloud Computing Compliance Covid-19 Gadgets Training Remote Work Server Outsourced IT Managed Service Provider IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Government Business Continuity Data Management Bandwidth Virtualization Blockchain Business Technology Wi-Fi Windows 10 Apps Vendor Managed Services Mobile Office Two-factor Authentication Data Security WiFi Budget BYOD Apple Employer-Employee Relationship App Tip of the week Voice over Internet Protocol Mobile Device Management Networking Gmail Chrome Physical Security Access Control Hacker HIPAA Applications Avoiding Downtime Computing Information Technology Marketing Managed IT Services How To Office 365 BDR Conferencing Storage Password Big Data Bring Your Own Device Virtual Private Network Health Computers Router Operating System Retail Website Risk Management Healthcare Help Desk 2FA Analytics Office Tips Augmented Reality Remote Monitoring The Internet of Things End of Support Microsoft 365 Telephone Vulnerability Vendor Management Social Solutions Cooperation Display Printer Paperless Office Infrastructure Customer Service Going Green Document Management Cybercrime Remote Workers Scam Data loss Windows 11 Monitoring Firewall Free Resource Excel Project Management Windows 7 Patch Management Managed IT Service Save Money Multi-Factor Authentication Mobility Downloads Sports IT Management Licensing Meetings Mouse VPN Entertainment Employees Integration Administration Data Privacy Computer Repair Customer Relationship Management Telephone System Cost Management Holidays Hacking Settings Presentation Data Storage Machine Learning Printing Wireless Content Filtering Video Conferencing Managed Services Provider Wireless Technology Virtual Machines Professional Services YouTube User Tip Modem Cryptocurrency Processor Maintenance Mobile Security Antivirus Word iPhone Virtual Desktop LiFi Smart Technology Data storage Supply Chain Vulnerabilities Saving Time Outlook Safety Images 101 Robot Money Humor Organization Paperless Hacks Scary Stories Download Alerts Fun Unified Threat Management Digital Security Cameras Co-managed IT Smart Devices Memory Deep Learning Browsers Unified Threat Management Connectivity Technology Care Break Fix Remote Working Business Communications Data Breach Google Play Upload Videos Scams Application Multi-Factor Security Network Congestion Electronic Health Records Education Social Network Wasting Time User Error IoT Hybrid Work Dark Web Human Resources Trend Micro Mobile Computing Security Cameras Trends IBM Customer Resource management Search Regulations Point of Sale Cables Google Calendar Software as a Service Managing Costs Best Practice Data Analysis Star Wars Microsoft Excel Staff Tech Support Google Apps eCommerce SSID Buisness Gamification Network Management Social Networking IT Maintenance Legislation Monitors Surveillance Legal Virtual Assistant IT solutions Virtual Machine Business Growth Fileless Malware Business Intelligence Competition Wearable Technology Websites Reviews Shortcuts Medical IT Content Health IT Cortana Motherboard Ransmoware Comparison Development Transportation Hypervisor Alt Codes Directions SharePoint Assessment Vendors Permissions Electronic Medical Records Shopping Be Proactive User Optimization PowerPoint Downtime Hosted Solution Lenovo Workforce Specifications Writing Employer/Employee Relationships Typing Microchip Navigation Internet Exlporer Threats Fraud Virtual Reality PCI DSS IP Address Private Cloud Gig Economy Workplace Strategies Username Server Management Superfish Knowledge Identity Theft Meta Black Friday Internet Service Provider Google Drive Teamwork Regulations Compliance Evernote Database Amazon Twitter 5G IT Technicians Error Recovery Memes SQL Server Unified Communications Proxy Server Experience Cookies Outsource IT Hard Drives Cyber Monday Social Engineering Net Neutrality Google Docs Financial Data Media History Bitcoin Running Cable Tactics Environment Domains Hotspot Remote Computing Mirgation Smartwatch IT Google Wallet Azure Nanotechnology Tablet Small Businesses Refrigeration Procurement Telework Cyber security Windows 8 Tech Laptop Addiction Displays Public Speaking Language Alert Lithium-ion battery Chatbots File Sharing CES Dark Data Communitications Drones Management Managed IT Screen Reader Outsourcing Distributed Denial of Service How To Supply Chain Management Entrepreneur FinTech Term Halloween Service Level Agreement Computing Infrastructure Notifications Identity Travel Workplace IT Assessment Value Bookmark Techology Smart Tech Google Maps Hiring/Firing Undo Flexibility

Blog Archive