Exploring the Use of Zcash Cryptocurrency for Illicit Or Criminal Purposes

Total Page:16

File Type:pdf, Size:1020Kb

Exploring the Use of Zcash Cryptocurrency for Illicit Or Criminal Purposes Exploring the use of Zcash cryptocurrency for illicit or criminal purposes Erik Silfversten, Marina Favaro, Linda Slapakova, Sascha Ishikawa, James Liu, Adrian Salas For more information on this publication, visit www.rand.org/t/RR4418 Published by the RAND Corporation, Santa Monica, Calif., and Cambridge, UK © Copyright 2020 RAND Corporation R® is a registered trademark. RAND Europe is a not-for-profit research organisation that helps to improve policy and decision making through research and analysis. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org www.randeurope.org III Preface Cryptocurrencies are currencies that only exist decision making through objective research digitally, usually have no central issuing or and analysis. RAND’s evidence-based regulating authority, and rely on cryptography publications do not reflect the opinions of its to prevent counterfeiting and fraudulent research clients and sponsors. transactions. While today they are increasingly This report should be of interest to used for legitimate purposes, cryptocurrencies criminologists, law enforcement professionals, have also attracted the attention of individuals policymakers, regulators and others with an and organisations that are engaged in criminal interest in cryptocurrencies. or illicit activities both on and off the dark web. To inform public debate, this report explores For more information on the study, or RAND, the illicit or criminal use of cryptocurrencies, please contact: with a particular focus on Zcash. Erik Silfversten This independent research study was Senior Analyst sponsored by the Electric Coin Company RAND Europe (ECC)—the creator of Zcash. It was conducted Westbrook Centre, Milton Road by the not-for-profit research institute Cambridge CB4 1YG RAND – comprising both RAND Europe and United Kingdom the US-based RAND Corporation. RAND [email protected] is an independent, non-partisan research www.rand.org organisation that helps to improve policy and V Summary This measured and evidence-based study proportional and evidence-based response evaluates the potential risks and benefits is required to balance the potential risks and of new and existing cryptocurrencies. A benefits of novel cryptocurrencies. cryptocurrency is a form of currency that Within this context, the Electric Coin Company only exists digitally, usually without a central (ECC) commissioned not-for-profit research issuing or regulating authority, and which relies institute RAND – comprising both RAND Europe on cryptography to prevent counterfeiting and the US-based RAND Corporation – to and fraudulent transactions. The creation undertake a study exploring the use of its Zcash of cryptocurrencies has been recognised cryptocurrency for illicit or criminal purposes. as a promising financial innovation and a Zcash is a digital currency invented and built potential new vehicle for increased economic with the stated aim to ‘empower everyone freedom and opportunities, including with economic freedom and opportunity’. facilitating global remittances and payments, Since its launch in 2016, Zcash has become preventing unlawful seizures of wealth, and supported by several regulated exchanges and helping to hedge against hyperinflation of providers, including New York State Department local currencies.1 However, cryptocurrencies of Financial Services-regulated Gemini, have also been subject to criticism and Coinbase and Bitgo.3 The study focused on two recognised as a potential vehicle for fraud, overarching aspects to examine the evidence organised crime and other illicit activities base on: if the underlying technologies are not appropriately implemented and managed.2 • How cryptocurrencies may be used for While there are widespread suspicions of the illicit or criminal purposes, and how this use of cryptocurrencies for illicit purposes, the use materialises. specific nature and scale of the connections • To what extent Zcash is used for illicit or between cryptocurrencies and criminal or illicit criminal purposes, and how such usage use remain poorly understood both in research compares with other cryptocurrencies such and the wider public awareness. As such, a as Bitcoin, Ethereum, Litecoin and Monero. 1 Leonard & Treiblmaier (2019), Dorofeyev et al. (2018). 2 Foley et al (2019), Aldridge & Décary-Hétu (2016). 3 See https://z.cash/ VI Exploring the use of Zcash cryptocurrency for illicit or criminal purposes The research included an extensive literature While the majority of transactions made with review of academic sources and news reports virtual coins are legitimate, this study has on cryptocurrencies and their illicit uses, as shown that cryptocurrencies are also used well as key informant interviews with a range for a wide range of illicit or criminal purposes of academic and industry cryptocurrency by a diverse group of malicious actors. Most experts. In addition, the research team also commonly this includes: collected and examined primary data on dark 1. Money laundering: Though national web4 marketplaces and forums in order to currencies and other digital technologies identify ways in which cryptocurrencies are present equal if not greater money used for or in support of illicit activities, as well laundering challenges, cryptocurrencies as to identify the nature and estimated scope are often perceived to represent attractive of the illicit use of Zcash compared to other opportunities for money laundering. This cryptocurrencies. Finally, factors that may is due to their decentralised and (pseudo-) influence future illicit use of Zcash were also anonymous characteristics. In contrast identified and examined. to conventional mechanisms, the benefit of cryptocurrency money laundering, or Research into the use of ‘cryptolaundering’, is that it circumvents cryptocurrencies for illicit or geographic constraints and exploits the criminal purposes highlights its gaps or overlaps between heterogeneous suitability for money laundering, regulatory frameworks. trade in illicit goods and services, 2. Trade in illicit goods and services: The and terrorism financing advent of dark web marketplaces has offered sellers of illicit goods and services Research into the illicit or criminal use new distribution channels that enable of cryptocurrencies is fundamentally them to transact with customers globally challenged by the intrinsic characteristics of online. These marketplaces have been cryptocurrencies, and the concealed nature of found to offer a wide range of goods and the dark web in general and of many criminal services in exchange for cryptocurrencies, activities in particular. Data are oftentimes including drugs and controlled substances, difficult to access or insufficient, marketplaces explosives and weapons, ivory and wildlife may be taken offline due to law enforcement trafficking, antiquities, and child sexual action, and privacy-preserving technologies abuse material. Dark web marketplaces may render users, transactions or other additionally offer opportunities to purchase activities anonymous. By definition, too, the a wide range of online ‘crime-as-a-service’ most successful illicit or criminal uses of and cyber products such as exploit kits, cryptocurrencies or any other technology will Distributed Denial of Service (DDoS) be those that escape detection altogether by services, or phishing tools. victims, law enforcement and the research 3. Terrorism financing: The use of community. cryptocurrencies in terrorism financing 4 The dark web is a part of the Internet that is not indexed by search engines. Specific browsers like Tor are required to access dark web sites, which contain anonymous message boards, online marketplaces for the purchase of illicit goods and services, exchanges for stolen financial and private data, and other illegal content. VII has been a growing concern for regulators due to their purported anonymity-preserving and for wider counterterrorism efforts. features, there has been little research or A number of terrorist organisations have evidence to substantiate this claim. been reported to have increased their This study explored how and the extent to interest in cryptocurrencies and to have which Zcash is used for illicit or criminal used cryptocurrencies for soliciting funds purposes (i.e. the scope, scale and nature of from sponsors and supporters. Partly, this phenomenon). In doing so, a number of the use of cryptocurrencies represents a key findings emerged: new method of moving funds in a faster, more anonymous and global way that may • Zcash is relatively unknown in the be less constrained by international and academic research community and national Anti-Money Laundering (AML) the links between Zcash and illicit or and Countering the Financing of Terrorism criminal activities
Recommended publications
  • CRYPTONAIRE WEEKLY CRYPTO Investment Journal
    CRYPTONAIRE WEEKLY CRYPTO investment journal CONTENTS WEEKLY CRYPTOCURRENCY MARKET ANALYSIS...............................................................................................................5 TOP 10 COINS ........................................................................................................................................................................................6 Top 10 Coins by Total Market Capitalisation ...................................................................................................................6 Top 10 Coins by Percentage Gain (Past 7 Days)...........................................................................................................6 Top 10 Coins added to Exchanges with the Highest Market Capitalisation (Past 30 Days) ..........................7 CRYPTO TRADE OPPORTUNITIES ...............................................................................................................................................9 PRESS RELEASE..................................................................................................................................................................................14 ZUMO BRINGS ITS CRYPTOCURRENCY WALLET TO THE PLATINUM CRYPTO ACADEMY..........................14 INTRODUCTION TO TICAN – MULTI-GATEWAY PAYMENT SYSTEM ......................................................................17 ADVERTISE WITH US........................................................................................................................................................................19
    [Show full text]
  • CRYPTOCURRENCY: a PRIMER Accept Bitcoin3—Including Amazon.Com, What Is Cryptocurrency? Target, Paypal, Ebay, Dell, and Home
    CRYPTOCURRENCY: A PRIMER accept bitcoin3—including Amazon.com, What is cryptocurrency? Target, PayPal, eBay, Dell, and Home Depot—with anywhere from 80,000 to There is no one standard definition of 220,000 transactions occurring per day, cryptocurrency.1 At the most basic level representing over $50 million in estimated cryptocurrency—or digital currency or daily volume.4 virtual currency—is a medium of exchange that functions like money (in Cryptocurrencies allow for increased that it can be exchanged for goods and market efficiencies and reduced services) but, unlike traditional currency, transaction costs. At base, is untethered to, and independent from, cryptocurrency transactions are: national borders, central banks, sovereigns, or fiats. In other words, it . Private—no personal information is exists completely in the virtual world, required to complete a transaction;5 traded on multiple global platforms. These currencies are designed to . Fast—they are settled almost incorporate and exchange digital instantaneously, unlike credit card information through a process made transactions or wire transfers that possible by principles of cryptography, require days; which makes transactions secure and . Irrevocable—because transactions are verifiable. The most well-known settled almost immediately, there are cryptocurrency is bitcoin, which was no resulting chargebacks or possibility created back in 2009 and which still for disputes between buyer and seller; dominates the virtual currency market today.2 . Inexpensive—transaction costs are generally less than 1% if an intermediary is used, rather than the Why do they matter? customary credit card processing fee of roughly 2.5%; and Cryptocurrency is relevant to most . Global—neither buyer nor seller businesses and financial firms.
    [Show full text]
  • YEUNG-DOCUMENT-2019.Pdf (478.1Kb)
    Useful Computation on the Block Chain The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Yeung, Fuk. 2019. Useful Computation on the Block Chain. Master's thesis, Harvard Extension School. Citable link https://nrs.harvard.edu/URN-3:HUL.INSTREPOS:37364565 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA 111 Useful Computation on the Block Chain Fuk Yeung A Thesis in the Field of Information Technology for the Degree of Master of Liberal Arts in Extension Studies Harvard University November 2019 Copyright 2019 [Fuk Yeung] Abstract The recent growth of blockchain technology and its usage has increased the size of cryptocurrency networks. However, this increase has come at the cost of high energy consumption due to the processing power needed to maintain large cryptocurrency networks. In the largest networks, this processing power is attributed to wasted computations centered around solving a Proof of Work algorithm. There have been several attempts to address this problem and it is an area of continuing improvement. We will present a summary of proposed solutions as well as an in-depth look at a promising alternative algorithm known as Proof of Useful Work. This solution will redirect wasted computation towards useful work. We will show that this is a viable alternative to Proof of Work. Dedication Thank you to everyone who has supported me throughout the process of writing this piece.
    [Show full text]
  • Motion Record of the Trustee (Returnable
    - 32 - cryptocurrency business. In its investigation and review of text and email communications, the Monitor noted that certain TPPs were instructed by Mr. Cotten to provide limited information to the financial institutions in relation to the intended use of the account and its association with the cryptocurrency industry to limit scrutiny by the financial institutions. 80. The Monitor identified a number of accounts that were frozen or closed subsequent to the financial institution becoming aware of the nature of the underlying transactions. The Monitor’s investigation indicates that frequently, Quadriga’s approach to addressing financial institution queries into the nature of the account usage was often to simply move on to another financial institution to avoid further questioning. 81. The Monitor’s investigation also identified many “cash” transactions where certain Users repeatedly funded their Accounts with large cash deposits. The Monitor has been advised that this involved the User physically handing cash in the form of legal tender to a representative of Quadriga. As an example, the Platform recorded $12.1 million of “In person Payments” received from one User through a series of nineteen (19) cash transactions over a 5-month period. The Monitor has been unable to verify how or if these cash deposits were appropriately deposited into the Quadriga treasury system through TPP accounts or other accounts. The Monitor has also reviewed communications which appear to indicate that Mr. Cotten sometimes credited a User’s account with a deposit with the understanding that the User would deliver cash at some point in the future. The deposits, once credited to the User’s Account, were subsequently used by the User to trade and remove Cryptocurrency off Platform.
    [Show full text]
  • Linking Wallets and Deanonymizing Transactions in the Ripple Network
    Proceedings on Privacy Enhancing Technologies ; 2016 (4):436–453 Pedro Moreno-Sanchez*, Muhammad Bilal Zafar, and Aniket Kate* Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network Abstract: The decentralized I owe you (IOU) transac- 1 Introduction tion network Ripple is gaining prominence as a fast, low- cost and efficient method for performing same and cross- In recent years, we have observed a rather unexpected currency payments. Ripple keeps track of IOU credit its growth of IOU transaction networks such as Ripple [36, users have granted to their business partners or friends, 40]. Its pseudonymous nature, ability to perform multi- and settles transactions between two connected Ripple currency transactions across the globe in a matter of wallets by appropriately changing credit values on the seconds, and potential to monetize everything [15] re- connecting paths. Similar to cryptocurrencies such as gardless of jurisdiction have been pivotal to their suc- Bitcoin, while the ownership of the wallets is implicitly cess so far. In a transaction network [54, 55, 59] such as pseudonymous in Ripple, IOU credit links and transac- Ripple [10], users express trust in each other in terms tion flows between wallets are publicly available in an on- of I Owe You (IOU) credit they are willing to extend line ledger. In this paper, we present the first thorough each other. This online approach allows transactions in study that analyzes this globally visible log and charac- fiat money, cryptocurrencies (e.g., bitcoin1) and user- terizes the privacy issues with the current Ripple net- defined currencies, and improves on some of the cur- work.
    [Show full text]
  • Project Jasper: Are Distributed Wholesale Payment Systems Feasible Yet? BANK of CANADA • Financial System Review • June 2017 1
    PROJECT JASPER: ARE DISTRIBUTED WHOLEsaLE PayMENT SysTEMS FEASIBLE YET? BANK OF CANADA • FiNANCIAL SYStem Review • JuNE 2017 1 Project Jasper: Are Distributed Wholesale Payment Systems Feasible Yet? James Chapman, Rodney Garratt,1 Scott Hendry, Andrew McCormack2 and Wade McMahon Distributed ledger technology (DLT)—most commonly known as the foun- dation of Bitcoin—offers a fundamentally different way to conduct and track financial transactions. Researchers are investigating its usefulness in all corners of the financial system. Project Jasper is a proof of concept of a DLT-based wholesale pay- ment system. The experiment provided significant insights into the relative strengths and weaknesses of using DLT for financial market infrastructures. For critical financial market infrastructures, such as wholesale payment systems, current versions of DLT may not provide an overall net benefit relative to current centralized systems. Recent versions of DLT have, however, made advances compared with initial cryptocurrency applica- tions of DLT. Benefits for the financial system of a DLT-based wholesale payment system could likely arise from its interaction with a larger DLT ecosystem of finan- cial market infrastructures, potentially including cross-border transactions. Introduction Financial technology (fintech) is defined as financial innovation enabled by technology that could result in new business models, applications, pro- cesses or products and that has an associated material effect on financial markets and institutions or the provision of financial services.3 One such innovation with significant potential is distributed ledger tech- nology (DLT), or blockchain, as a common variant of it is known (Box 1). DLT, introduced with the cryptocurrency Bitcoin in 2008 (Nakamoto 2008), enables the secure validation and recording of transactions.
    [Show full text]
  • On the Relationship of Cryptocurrency Price with US Stock and Gold Price Using Copula Models
    mathematics Article On the Relationship of Cryptocurrency Price with US Stock and Gold Price Using Copula Models Jong-Min Kim 1 , Seong-Tae Kim 2 and Sangjin Kim 3,* 1 Statistics Discipline, University of Minnesota at Morris, Morris, MN 56267, USA; [email protected] 2 Department of Mathematics, North Carolina A&T State University, Greensboro, NC 27411, USA; [email protected] 3 Department of Management and Information Systems, Dong-A University, Busan 49236, Korea * Correspondence: [email protected] Received: 15 September 2020; Accepted: 20 October 2020; Published: 23 October 2020 Abstract: This paper examines the relationship of the leading financial assets, Bitcoin, Gold, and S&P 500 with GARCH-Dynamic Conditional Correlation (DCC), Nonlinear Asymmetric GARCH DCC (NA-DCC), Gaussian copula-based GARCH-DCC (GC-DCC), and Gaussian copula-based Nonlinear Asymmetric-DCC (GCNA-DCC). Under the high volatility financial situation such as the COVID-19 pandemic occurrence, there exist a computation difficulty to use the traditional DCC method to the selected cryptocurrencies. To solve this limitation, GC-DCC and GCNA-DCC are applied to investigate the time-varying relationship among Bitcoin, Gold, and S&P 500. In terms of log-likelihood, we show that GC-DCC and GCNA-DCC are better models than DCC and NA-DCC to show relationship of Bitcoin with Gold and S&P 500. We also consider the relationships among time-varying conditional correlation with Bitcoin volatility, and S&P 500 volatility by a Gaussian Copula Marginal Regression (GCMR) model. The empirical findings show that S&P 500 and Gold price are statistically significant to Bitcoin in terms of log-return and volatility.
    [Show full text]
  • Evmpatch: Timely and Automated Patching of Ethereum Smart Contracts
    EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts Michael Rodler Wenting Li Ghassan O. Karame University of Duisburg-Essen NEC Laboratories Europe NEC Laboratories Europe Lucas Davi University of Duisburg-Essen Abstract some of these contracts hold, smart contracts have become an appealing target for attacks. Programming errors in smart Recent attacks exploiting errors in smart contract code had contract code can have devastating consequences as an attacker devastating consequences thereby questioning the benefits of can exploit these bugs to steal cryptocurrency or tokens. this technology. It is currently highly challenging to fix er- rors and deploy a patched contract in time. Instant patching is Recently, the blockchain community has witnessed several especially important since smart contracts are always online incidents due smart contract errors [7, 39]. One especially due to the distributed nature of blockchain systems. They also infamous incident is the “TheDAO” reentrancy attack, which manage considerable amounts of assets, which are at risk and resulted in a loss of over 50 million US Dollars worth of often beyond recovery after an attack. Existing solutions to Ether [31]. This led to a highly debated hard-fork of the upgrade smart contracts depend on manual and error-prone pro- Ethereum blockchain. Several proposals demonstrated how to defend against reentrancy vulnerabilities either by means of cesses. This paper presents a framework, called EVMPATCH, to instantly and automatically patch faulty smart contracts. offline analysis at development time or by performing run-time validation [16, 23, 32, 42]. Another infamous incident is the EVMPATCH features a bytecode rewriting engine for the pop- ular Ethereum blockchain, and transparently/automatically parity wallet attack [39].
    [Show full text]
  • ARK​ ​​Whitepaper
    ARK Whitepaper ​ ​​ A Platform for Consumer Adoption ​ ​ ​ ​ ​ ​ ​ ​ v.1.0.3 The ARK Crew ARK Whitepaper v.1.0.3 ​ ​ ​ ​ ​ ​ ​ ​ Table Of Contents ​ ​ ​ ​ Overview………………………………………………………………...……………………………….……………….………………………………………………………….….3 ​ Purpose of this Whitepaper………………………………………………………………………………………………………………………..….……….3 ​ ​ ​ ​ ​ ​ ​ Why?…………………………………………………………………………………………………………………….…………………………………………………….…………..4 ​ ​ ARK…………………………………………………………………………………………………….……………….…………………………………………………………………..5 ​ ​ ARK IS………………………………………………………………………………………………....……………….………………………………………………………………..5 ​ ​ ​ ​ ARK: Technical Details……………………………………….…….…..…………………………...……………….………………...…………………………...6 ​ ​ ​ ​ ​ ​ - Delegated Proof of Stake…………………………….……………...………………………….……………………………………….………...…...6 ​ ​​ ​ ​ ​ ​ ​ ​ ​ - Hierarchical Deterministic (HD) Wallets ​ ​​ ​ ​ ​ ​ ​ ​ (BIP32)…………………………………………………….....…………………..…..8 ​ - Fees……………………………………………………………………………………………………………….……………….…...………………………………..……...8 ​ ​​ ​ - ARK Delegates and Delegate Voting.…………………………………………………………………………………...………………….9 ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ - Bridged Blockchains (SmartBridges)....................………………………………………………………………….………...…….10 ​ ​​ ​ ​ ​ ​ ​ - POST ARK-TEC Token Distribution …………………..…………………………………….………………….………..……..…..……….11 ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ - Testnet Release……………………………………………….…………………………………………………………………….………...….....12 ​ ​ ​ And Beyond?…………………………………………………………………….………...……………………………………….………………………...……….…12 ​ ​ ​ ​ Addendum 1: ARK IS…(Cont.)...……..……..…………....…..………...………………………………………...………………………......……12
    [Show full text]
  • Pdf [2] Popper, N
    Journal of Mathematical Finance, 2021, 11, 495-511 https://www.scirp.org/journal/jmf ISSN Online: 2162-2442 ISSN Print: 2162-2434 The Investors’ Behavior towards the Relationship between Bitcoin, Litcoin, Dash Coins, and Gold: A Portfolio Modeling Approach Asma Maghrebi, Fathi Abid Department of Management, Faculty of Economics and Management, Sfax, Tunisia How to cite this paper: Maghrebi, A. and Abstract Abid, F. (2021) The Investors’ Behavior towards the Relationship between Bitcoin, This study considers a market-based economy that is composed of two asset Litcoin, Dash Coins, and Gold: A Portfolio classes: one is a digital, cryptocurrency, and the other is real, gold. We dem- Modeling Approach. Journal of Mathemat- onstrated that coins like (BTC, LTC, and DASH) can substitute a traditional ical Finance, 11, 495-511. https://doi.org/10.4236/jmf.2021.113028 safe haven “gold” in an intertemporal investment portfolio to become a new form of safe haven. The cryptocurrency follows a Jump-diffusion process. How- Received: June 29, 2021 ever, gold prices follow an Ornstein-Uhlenbek process to characterize the Accepted: August 16, 2021 stochastic nature of the market. The stochastic optimal control approach, Published: August 19, 2021 combined with the strategic asset allocation and the intertemporal utility Copyright © 2021 by author(s) and theory, are used through the derivation of a Hamilton-Jacobi-Bellman (HJB) Scientific Research Publishing Inc. equation to determine an explicit solution of the optimal allocation problem This work is licensed under the Creative for investors with CRRA utility function. We considered the Gamma Lévy Commons Attribution International process to solve the optimization problem.
    [Show full text]
  • Virtual Currency
    Office of Legislative Research Research Report December 12, 2014 2014-R-0290 BITCOINS - VIRTUAL CURRENCY By: Michelle Kirby, Associate Analyst ISSUE BITCOINS The use of bitcoins as virtual currency, the laws that Bitcoin is a form of virtual or digital currency. It is govern it, and other states’ attempts to regulate it. not legal tender and is not backed by any This report updates OLR Report 2014-R-0050. government. Federal agencies such as SUMMARY the U.S. Treasury “Bitcoin” is a form of virtual or digital currency, that Department, the Government Accountability allows financial transactions to be conducted on a Office, the Internal network using computer codes. It is a form of Revenue Service, and the exchange that operates like a currency but does not Congressional Research Services have issued have all the attributes of real currency. guidance on how existing laws apply to virtual There are no federal or state laws that specifically currency activities. govern bitcoins. However, many existing laws apply to A proposed federal law certain virtual currency activities. calls for a five-year moratorium on bitcoin The U.S. Treasury Department’s Financial Crimes regulation. Enforcement Network (FinCEN) has provided guidance New York has proposed indicating that, under federal law, a virtual currency regulation that would, user is not a money transmitter and is therefore not among other things, subject to the registration, reporting, and require firms engaged in virtual currency to have a recordkeeping regulations for money services BitLicense. businesses (MSBs). However, virtual currency California has enacted a administrators and exchangers may be regulated as law that allows the use of money transmitters but should not be considered alternative currency.
    [Show full text]
  • Vulnerability of Blockchain Technologies to Quantum Attacks
    Vulnerability of Blockchain Technologies to Quantum Attacks Joseph J. Kearneya, Carlos A. Perez-Delgado a,∗ aSchool of Computing, University of Kent, Canterbury, Kent CT2 7NF United Kingdom Abstract Quantum computation represents a threat to many cryptographic protocols in operation today. It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048. Blockchain technologies rely on cryptographic protocols for many of their essential sub- routines. Some of these protocols, but not all, are open to quantum attacks. Here we analyze the major blockchain-based cryptocurrencies deployed today—including Bitcoin, Ethereum, Litecoin and ZCash, and determine their risk exposure to quantum attacks. We finish with a comparative analysis of the studied cryptocurrencies and their underlying blockchain technologies and their relative levels of vulnerability to quantum attacks. Introduction exist to allow the legitimate owner to recover this account. Blockchain systems are unlike other cryptosys- tems in that they are not just meant to protect an By contrast, in a blockchain system, there is no information asset. A blockchain is a ledger, and as central authority to manage users’ access keys. The such it is the asset. owner of a resource is by definition the one hold- A blockchain is secured through the use of cryp- ing the private encryption keys. There are no of- tographic techniques. Notably, asymmetric encryp- fline backups. The blockchain, an always online tion schemes such as RSA or Elliptic Curve (EC) cryptographic system, is considered the resource— cryptography are used to generate private/public or at least the authoritative description of it.
    [Show full text]