Section VI: Bitcoin Framework
April 9, 2026
So far, we have studied the history that led to Bitcoin, the cryptographic primitives it depends on, the principles of distributed computing, consensus protocols, and how blockchains work in permissioned systems.
This section develops Bitcoin as a technical system: blocks, transactions, mining, networking, and security.

In this lesson, we assemble everything we have learned so far into a coherent picture of how Bitcoin works.
In 2008, trust in traditional financial intermediaries was collapsing, which sharpened interest in alternatives to bank-centered digital money.
Earlier digital cash systems still depended on trusted intermediaries or assumptions that did not hold on the open internet.
A successful internet-native cash system also needed global access and censorship resistance.
Double‑spending digital money was the central technical problem without a shared ledger or trusted arbiter.
On October 31, 2008, a paper titled Bitcoin: A Peer-to-Peer Electronic Cash System, authored by Satoshi Nakamoto, appeared on the Cryptography Mailing List.
The paper entered a community already debating privacy, digital cash, and whether cryptography could replace trust in centralized institutions.
It gained traction because it did more than criticize the old model: it offered a concrete technical design for decentralized digital cash.
The real identity behind the pseudonym Satoshi Nakamoto remains unknown today.
Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution… We propose a solution to the double-spending problem using a peer-to-peer network.
Introduction. What is needed is an electronic payment system based on cryptographic proof instead of trust, allowing any two willing parties to transact directly with each other without the need for a trusted third party. Transactions that are computationally impractical to reverse would protect sellers from fraud….
Every phrase here is a design requirement: purely peer-to-peer, no trusted third party, cryptographic proof instead of trust, and computationally impractical to reverse.
| Feature | DigiCash (Chaum) 1980s–1990s |
Hashcash (Back) 1997 |
b-money / bit gold 1998 |
E-Gold Early 2000s |
Bitcoin (Nakamoto) 2008–2009 |
|---|---|---|---|---|---|
| Trust Model | Centralized issuer | No issuer; standalone PoW scheme | Decentralized (theory) | Centralized company | |
| Double-Spend Prevention | Central ledger | No ledger | Proposed distributed accounting, but consensus unresolved | Central ledger | |
| Scarcity / Costliness | Bank-issued digital cash | Computational work stamps | Work-based money concepts | Gold-backed balances | |
| Point of Failure | Company and issuing bank | Not designed as a full payment network | Consensus and implementation never operationalized | Legal and operational shutdown |
| Feature | DigiCash (Chaum) 1980s–1990s |
Hashcash (Back) 1997 |
b-money / bit gold 1998 |
E-Gold Early 2000s |
Bitcoin (Nakamoto) 2008–2009 |
|---|---|---|---|---|---|
| Trust Model | Centralized issuer | No issuer; standalone PoW scheme | Decentralized (theory) | Centralized company | Decentralized in practice |
| Double-Spend Prevention | Central ledger | No ledger | Proposed distributed accounting, but consensus unresolved | Central ledger | |
| Scarcity / Costliness | Bank-issued digital cash | Computational work stamps | Work-based money concepts | Gold-backed balances | |
| Point of Failure | Company and issuing bank | Not designed as a full payment network | Consensus and implementation never operationalized | Legal and operational shutdown |
| Feature | DigiCash (Chaum) 1980s–1990s |
Hashcash (Back) 1997 |
b-money / bit gold 1998 |
E-Gold Early 2000s |
Bitcoin (Nakamoto) 2008–2009 |
|---|---|---|---|---|---|
| Trust Model | Centralized issuer | No issuer; standalone PoW scheme | Decentralized (theory) | Centralized company | Decentralized in practice |
| Double-Spend Prevention | Central ledger | No ledger | Proposed distributed accounting, but consensus unresolved | Central ledger | PoW consensus plus network verification |
| Scarcity / Costliness | Bank-issued digital cash | Computational work stamps | Work-based money concepts | Gold-backed balances | |
| Point of Failure | Company and issuing bank | Not designed as a full payment network | Consensus and implementation never operationalized | Legal and operational shutdown |
| Feature | DigiCash (Chaum) 1980s–1990s |
Hashcash (Back) 1997 |
b-money / bit gold 1998 |
E-Gold Early 2000s |
Bitcoin (Nakamoto) 2008–2009 |
|---|---|---|---|---|---|
| Trust Model | Centralized issuer | No issuer; standalone PoW scheme | Decentralized (theory) | Centralized company | Decentralized in practice |
| Double-Spend Prevention | Central ledger | No ledger | Proposed distributed accounting, but consensus unresolved | Central ledger | PoW consensus plus network verification |
| Scarcity / Costliness | Bank-issued digital cash | Computational work stamps | Work-based money concepts | Gold-backed balances | PoW secures issuance and history |
| Point of Failure | Company and issuing bank | Not designed as a full payment network | Consensus and implementation never operationalized | Legal and operational shutdown |
| Feature | DigiCash (Chaum) 1980s–1990s |
Hashcash (Back) 1997 |
b-money / bit gold 1998 |
E-Gold Early 2000s |
Bitcoin (Nakamoto) 2008–2009 |
|---|---|---|---|---|---|
| Trust Model | Centralized issuer | No issuer; standalone PoW scheme | Decentralized (theory) | Centralized company | Decentralized in practice |
| Double-Spend Prevention | Central ledger | No ledger | Proposed distributed accounting, but consensus unresolved | Central ledger | PoW consensus plus network verification |
| Scarcity / Costliness | Bank-issued digital cash | Computational work stamps | Work-based money concepts | Gold-backed balances | PoW secures issuance and history |
| Point of Failure | Company and issuing bank | Not designed as a full payment network | Consensus and implementation never operationalized | Legal and operational shutdown | Majority attack economics (difficult) |
| Feature | DigiCash (Chaum) 1980s–1990s |
Hashcash (Back) 1997 |
b-money / bit gold 1998 |
E-Gold Early 2000s |
Bitcoin (Nakamoto) 2008–2009 |
|---|---|---|---|---|---|
| Trust Model | Centralized issuer | No issuer; standalone PoW scheme | Decentralized (theory) | Centralized company | Decentralized in practice |
| Double-Spend Prevention | Central ledger | No ledger | Proposed distributed accounting, but consensus unresolved | Central ledger | PoW consensus plus network verification |
| Scarcity / Costliness | Bank-issued digital cash | Computational work stamps | Work-based money concepts | Gold-backed balances | PoW secures issuance and history |
| Point of Failure | Company and issuing bank | Not designed as a full payment network | Consensus and implementation never operationalized | Legal and operational shutdown | Majority attack economics (difficult) |
Think of Bitcoin as a global append‑only ledger shared by peers.
Anyone can propose the next page (block) by showing work; others verify and accept.
The chain with the most cumulative work is the canonical history.
Ownership of funds is control of private keys
Incentives (block reward + fees) promote security and honest participation.

Nakamoto defines an electronic coin as a “chain of digital signatures.”
The Limitation: This mechanism proves who can spend a coin, but not whether that coin was already spent somewhere else.
To solve double-spending, the network needs a single, global history of all transactions. Nakamoto’s solution is radical transparency:
Bitcoin orders blocks by making miners prove computational work before a new block is accepted.

Mempool: every node keeps a local copy of the network’s known pending transactions waiting to be included in a block.
Recall the Byzantine Generals Problem (BGP) as a classic thought experiment in distributed computing.
If Bitcoin can solve the Byzantine Generals Problem in practice, it can solve double-spending by converging on one accepted transaction history:
In practice, the probability of a successful attacker catching up diminishes exponentially with each new block added on top of the transaction.
Why would anyone expend electricity and computing power to do all this work?
Together, these incentives make it more profitable for a rational actor to follow the protocol than to attack it. An attack would be extraordinarily expensive, and even if successful, would likely destroy the very value the attacker is trying to steal.
Incentives provide security by rewarding miners for honest participation in block production.
Bitcoin also enforces scarcity through a hard cap of about 21 million bitcoin, limiting total issuance rather than allowing open-ended creation.
New bitcoin enters through the coinbase transaction, which awards the block subsidy to the miner who adds a valid block.
A halving cuts the block subsidy in half every 210,000 blocks, or roughly every four years.
Over time, miner compensation shifts away from newly issued bitcoin and toward transaction fees, tying long-run security more closely to demand for block space.
Assumes majority of honest work; 51% attacker can rewrite recent history.
Selfish mining, eclipse attacks, network partitions are notable risks.
Full nodes mitigate many risks by enforcing validity and rejecting bad blocks.
Confirmations reduce reorg risk; fee incentives align honest behavior.
Security is economic and probabilistic, not absolute.
This first transaction was a critical proof-of-concept, demonstrating that the system described in the whitepaper actually worked in practice.
On May 22, 2010, Laszlo Hanyecz offered 10,000 BTC on Bitcointalk for two large pizzas.
Another user arranged the order from a Papa John’s in Florida and had the pizzas delivered to Hanyecz.
Hanyecz then transferred 10,000 BTC, marking the first documented Bitcoin purchase of a physical good.
At the time, the transaction was worth about $41 total.
The event is now remembered as Bitcoin Pizza Day, a proof-of-concept that gave Bitcoin an early real-world price.

From its inception, Bitcoin was met with intense criticism on multiple fronts.
Decentralization: no single point of control/failure; open participation.
Censorship resistance: hard to block valid transactions; permissionless access.
Verifiability: anyone can run a node and independently check rules/history.
Predictable monetary policy: transparent issuance; 21M cap.
Robustness: resilient to outages/attacks; conservative governance and upgrades.
Scalability: mining difficulty and limited block size restrict throughput, while multiple confirmations add latency before a block is treated as secure.
Energy use: PoW consumes substantial electricity; debated but integral to security model.
UX & key management: self‑custody is powerful but difficult for many users.
Privacy: transparent ledger yields pseudonymity, not strong anonymity.
Protocol governance friction: new features can have slow adoption.
Bitcoin combines three primitives into one working system: digital signatures for ownership, a public ledger shared across nodes, and proof-of-work for consensus.
Together, these primitives let the network verify transactions, agree on their order, and resist double-spending without a central intermediary.
What makes Bitcoin important is not any one part alone, but the way these pieces reinforce one another through incentives, verification, and network participation.
Next lesson, we focus on Bitcoin’s two core actions: transactions and mining.

Bitcoin — Origins and Mechanics — Army Cyber Institute — April 9, 2026