Double-spending is the risk that a digital currency can be spent twice. It is a potential problem unique to digital currencies because digital information can be reproduced relatively easily by savvy individuals who understand the blockchain network and the computing power necessary to manipulate it.
Physical currencies do not have this issue because they cannot be easily replicated, and the parties involved in a transaction can immediately verify the authenticity and past ownership of the physical currency. That is of course excluding matters involving cash transactions.
With digital currency, there is a risk that the holder could make a copy of the digital token and send it to a merchant or another party while retaining the original.
This was a concern initially with bitcoin, the most popular digital currency or “cryptocurrency,” since it is a decentralized currency with no central agency to verify that it is spent only once. However, bitcoin has a mechanism based on transaction logs, known as the blockchain, to verify the authenticity of each transaction and prevent double-counting.
- Double-spending occurs when a blockchain network is disrupted and cryptocurrency is essentially stolen. The thief would send a copy of the currency transaction to make it look legitimate, or might erase the transaction altogether.
- Although it is not common, double-spending does occur. What is much more likely, however, is cryptocurrency being stolen from a wallet that wasn’t properly secured.
- The most common method of double-spending is when a blockchain thief will send multiple packets to the network, reversing the transactions so that it looks like they never happened.
Bitcoin requires that all transactions, without exception, be included in the blockchain. This mechanism ensures that the party spending the bitcoins really owns them and also prevents double-counting and other fraud. The blockchain of verified transactions is built up over time as more and more transactions are added to it.
Bitcoin transactions take some time to verify because the process involves intensive number-crunching and complex algorithms that take up a great deal of computing power. It is, therefore, exceedingly difficult to duplicate or falsify the blockchain because of the immense amount of computing power that would be required to do so.
Hackers have tried to get around the bitcoin verification system by using methods such as out-computing the blockchain security mechanism or using a double-spending technique that involves sending a fraudulent transaction log to a seller and another to the rest of the bitcoin network.
These ploys have met with only limited success. In fact, most bitcoin thefts so far have not involved double-counting but rather have been due to users storing bitcoins without adequate safety measures.
The greatest risk for double-spending comes in the form of a 51% attack, which can occur if a user controls more than 50% of the computing power maintaining the distributed ledgers of a cryptocurrency. If this user controls the blockchain they will be able to process transfer bitcoins to their wallet multiple times by reversing the blockchain ledger as though the initial transactions had never occurred.