Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

WIRED magazine reported on the fall of Bitcoin, stating that it can be directly attributed to two major events: 1) the fall of Mt. Gox, a major Bitcoin exchange, and 2) the fall of Silk Road, the online drug trafficking market for which Bitcoin was heavily utilized. Mt. Gox, which was based in Tokyo, Japan, was responsible for handling nearly 70 percent of all Bitcoin transactions. An immense hacking attack rendered Mt. Gox bankrupt following the disappearance of over $450 million worth of Bitcoins, some of which were stolen. Mt. Gox was forced to declare bankruptcy in 2014. Authorities claim that the screw-up was caused by a relative lack of management and experience, as well as an overwhelming amount of apathy toward the business.

That’s a ton of missing Bitcoins; well over 850,000. What’s shocking, though, is that nobody knew where they went for the longest time. Some were stolen and recovered over time, but the fact remains that a $450 million heist is enough to cripple even the most profitable company. Considering how Bitcoin is so often associated with scandal and corruption, you’d think it would have sunk into the past. Yet, Bitcoin is currently being used more than it ever has been before. Its usage per day peaked toward the end of December 2015, proving that there’s still a desire to use Bitcoin.

ib graph 1

Beyond the average consumer, Bitcoin’s main attraction for investors is the technology behind how it works. This is known as the blockchain. WIRED explains how the blockchain works, as well as how it can be used for more than just a simple currency:

The blockchain is essentially a database running across a vast array of independent machines. With Bitcoin, it oversees the exchange of money. But it can oversee the exchange of anything that holds value, including stocks, bonds, and futures as well as houses and car titles.

Among these investors are Bitcoin startups and veteran organizations who want to use the blockchain technology to help Bitcoin transactions become easier to use. One in particular, Coinbase, a Bitcoin exchange company in San Francisco, California, is involved in developing a Bitcoin debit card, which can be used to spend Bitcoin anywhere a VISA card is accepted. The concept behind doing this is that businesses won’t have to worry about processing fees associated with credit card transactions. This might prompt companies to adopt Bitcoin as a quality payment feature in the future.

With all kinds of new developments taking advantage of Bitcoin technology, we might see a resurgence in Bitcoin’s popularity in the general public, and not just by the crooks who sell illegal goods on the black market. Maybe we’ll even see an increase in use of other kinds of cryptocurrency, including everyone’s favorite, Dogecoin-- the adorable cryptocurrency based on the derpy charm of a goofy Shiba Inu dog.

ib doge 1

If Bitcoin makes a return, would you want to give it a shot? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 02 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money AI Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Artificial Intelligence Facebook Automation Miscellaneous Compliance Cloud Computing Covid-19 Training Gadgets Outsourced IT Server Managed Service Provider Remote Work IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Bandwidth Business Technology Virtualization Apps Data Security Two-factor Authentication Mobile Office Vendor Managed Services Employer-Employee Relationship Networking BYOD Mobile Device Management Chrome Gmail Budget WiFi Apple Tip of the week App Voice over Internet Protocol Managed IT Services Computing How To Hacker BDR Information Technology Avoiding Downtime Marketing HIPAA Office 365 Physical Security Applications Access Control Conferencing Healthcare Operating System Computers Risk Management Website 2FA Office Tips Analytics Router Augmented Reality Virtual Private Network Storage Password Health Help Desk Bring Your Own Device Big Data Retail Going Green Telephone Scam Data loss Customer Service Cybercrime Cooperation Free Resource Project Management Windows 7 Windows 11 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Excel Firewall Display Printer Paperless Office Infrastructure The Internet of Things Monitoring Document Management Social Managed IT Service Remote Workers Maintenance Downloads Customer Relationship Management Antivirus Settings iPhone Printing Licensing Wireless Content Filtering Vulnerabilities Entertainment Hacking Presentation YouTube Images 101 Cryptocurrency Wireless Technology Robot Mobility Telephone System Multi-Factor Authentication Cost Management Virtual Desktop Supply Chain Data storage LiFi IT Management Word Outlook VPN Employees Meetings Integration Money Humor User Tip Modem Computer Repair Mobile Security Processor Safety Holidays Sports Mouse Data Storage Smart Technology Video Conferencing Data Privacy Administration Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Download Net Neutrality Twitter Alerts SQL Server Vendors Be Proactive Financial Data Error History Cortana Connectivity IT Social Engineering Break Fix Workforce Browsers Smartwatch Alt Codes Competition Upload Procurement Downtime Remote Computing Azure Threats Multi-Factor Security Tech Workplace Strategies Social Network Telework Hosted Solution Cyber security Tablet IoT Communitications Dark Web Meta CES Typing Trends Supply Chain Management Alert Amazon Dark Data Google Calendar Term Google Drive Managed IT Customer Resource management FinTech User File Sharing Regulations Knowledge Star Wars IT Assessment How To Microsoft Excel Outsource IT Data Analysis Gamification Flexibility Notifications Staff Value 5G Environment Media Legislation IP Address Google Docs Organization Unified Communications Travel Social Networking Experience Google Maps Smart Devices Running Cable Small Businesses Techology Fileless Malware Digital Security Cameras Bitcoin Google Wallet Content Remote Working Wearable Technology Memory Displays Comparison Google Play Health IT Recovery Unified Threat Management Motherboard Data Breach Hard Drives Windows 8 Assessment Electronic Health Records Laptop Permissions Outsourcing Unified Threat Management Directions Videos Domains Drones Wasting Time Network Congestion Specifications Security Cameras Workplace Trend Micro Refrigeration Internet Exlporer Software as a Service Halloween Fraud Hiring/Firing User Error Microchip Paperless Public Speaking Username Managing Costs Black Friday SSID Co-managed IT Lithium-ion battery Point of Sale eCommerce Hacks Database Surveillance Entrepreneur Scary Stories Virtual Assistant Technology Care Business Communications Network Management Tech Support IT Technicians Virtual Machine Fun Monitors Cyber Monday Medical IT Scams Proxy Server Reviews Deep Learning Cookies Undo Tactics Development Hotspot Transportation Hybrid Work Human Resources Education Websites Mirgation Hypervisor PowerPoint Cables Shopping Nanotechnology Optimization SharePoint Mobile Computing Addiction Electronic Medical Records Language Employer/Employee Relationships Google Apps Management PCI DSS Chatbots Search Navigation Screen Reader Writing Distributed Denial of Service IT Maintenance Lenovo Gig Economy Application Best Practice Service Level Agreement Internet Service Provider Buisness Virtual Reality Computing Infrastructure Teamwork Business Intelligence Evernote Shortcuts IBM Legal Server Management Regulations Compliance IT solutions Private Cloud Identity Identity Theft Smart Tech Memes Ransmoware Superfish Bookmark Business Growth

Blog Archive