Bitcoin uses SHA-256 encryption for both its Proof-of-Work (PoW) system and transaction verification. The security of the bitcoin protocol lies in one of its fundamental characteristics, the transaction blockchain.

The blockchain is basically a chain of multiple "blocks" containing transaction history. The blockchain starts with the initial block, known as the genesis block. Transactions and solved hashes add new blocks after this genesis block, creating a blockchain.

Within the bitcoin protocol, the blockchain that has seen the most work put into it is considered to be the best blockchain and the one that the entire protocol refers to when verifying transactions. Bitcoins are considered spent once a transaction has been verified.

new york blockchain conference
What is Crypto?

Security above everything

We’ve assembled a global team of top security professionals who take a risk-based approach to ensuring our clients’ assets are protected at the highest levels while maintaining exceptional performance and an unparalleled client experience. Our team has decades of experience building security programs for the world’s top brands, investigating the largest consumer data breaches, developing security technology trusted by millions of businesses and discovering vulnerabilities in the technology used by billions of people every day.

How do blockchains work?

To ensure that the network’s transaction history is not manipulated by anyone, the community behind the network has to agree on a common “reality”.

In a blockchain, transactions are stored in blocks, with each newly generated block referring to the block before it with a unique identifying number called a “hash.” These blocks constitute a chain, hence the name “blockchain”. This chain continues on indefinitely.


Security Features


Email confirmations for withdrawals with self-serve account lock


Configurable account timeout for another layer of protection


Global settings time lock for extreme security when you're away


SSL encryption to protect you when browsing Bitglobals


Constant, real-time monitoring for suspicious activity


Sensitive data is fully encrypted at rest and in transit