A Security Assessment Model for Crypto Asset Safekeeping

Total Page:16

File Type:pdf, Size:1020Kb

A Security Assessment Model for Crypto Asset Safekeeping UTRECHT UNIVERSITY MASTER THESIS A Security Assessment Model for Crypto Asset Safekeeping First Supervisor: Dr. R.L. Slinger JANSEN Author: Second Supervisor: Tim Braam Dr. F. Fabiano DALPIAZ External Supervisor: Henk Brink A thesis submitted in fulfillment of the requirements for the degree of Master of Science in the Graduate School in Natural Sciences, Business Informatics November 7, 2019 UTRECHT UNIVERSITY Abstract Graduate School in Natural Sciences, Business Informatics Master of Science A security assessment model for crypto asset safekeeping by Tim Braam In this study we research crypto asset security by dissecting existing se- curity systems, reviewing academic and grey literature and interviewing experts. We then propose a model on crypto asset security and employ it on well-knwown crypto asset safekeeping solutions. We validate the re- sults with experts and elicit mass evaluation with our demonstrations and release to the public. Keywords: Cryptocurrency, Cryptocurrency security, Cryptocurrency exchange, Cryptocurrency custodian, Cryptocurrency wallet, Blockchain Acknowledgements A year ago I started this project, which at that time had a different subject that is, however, closely related to the current one. It is the second time I am writing a thesis, the first being for my bachelor, but the first time I enjoyed doing so. I would like to thank dr. Slinger Jansen for letting and helping me write about a relatively uncharted subject I was passionate about. I would also like to thank my external supervisor, Henk Brink, for believing in the project and supporting me every step of the way. Another huge pillar of support has been my girlfriend and her family, my family-in- law and especially my father-in-law helping me with whatever they could think of. And finally, my own family and friends, thank you all for listening to my blockchain rambling that may have taken up one too many an hour. Contents 1 Introduction1 2 Context3 2.1 Different wallet providers..................3 2.2 Different cryptocurrencies.................4 2.3 Cryptocurrency governance.................5 3 Research Method6 3.1 Problem identification and motivation...........6 3.2 Define the objectives for a solution.............7 3.3 Design and development..................8 3.3.1 Design.......................8 3.3.2 Development....................8 3.4 Demonstration........................ 15 3.5 Evaluation.......................... 15 3.6 Communication....................... 15 4 Model Development 16 4.1 Feature Modeling...................... 16 4.1.1 Escrow two out of three feature model....... 16 4.2 Literature Review...................... 19 4.2.1 General perspective................. 19 4.3 Technical perspective.................... 24 4.3.1 Authentication protocol.............. 24 4.3.2 Encryption..................... 27 4.3.3 Digital Signature.................. 28 4.3.4 Hashing function.................. 29 4.3.5 Social hacking or social engineering........ 30 4.4 Attacker perspective..................... 32 4.5 Governance perspective................... 36 4.6 Candidate key process area shortlist............ 40 5 Expert Evaluation 41 i 6 The crypto-asset safekeeping security maturity assessment model (CSSMAM) 43 6.1 Level one : Unsafe..................... 43 6.2 Level two : Unsafe..................... 43 6.3 Level three : Lacking.................... 44 6.4 Level four : Lacking.................... 44 6.5 Level five : Relatively safe................. 46 6.6 Level six : Relatively Safe................. 47 6.7 Level seven : Safe...................... 48 6.8 Level eight : Safe...................... 49 6.9 Level nine : Optimal.................... 49 6.10 Level ten : Optimal..................... 50 6.11 Mass evaluation of the crypto asset safekeeping security maturity assessment model................. 50 7 Demonstration 52 7.1 Largest VCEPs by volume................. 52 7.2 Top Custodian Wallet Providers (CWPs).......... 55 7.3 Top wallet providers.................... 57 8 Discussion 62 8.1 Major Findings....................... 62 8.2 Model Validity....................... 62 8.2.1 Validity of literature review............ 62 8.2.2 Validity of model creation............. 63 8.2.3 Validity of model evaluation and adaption..... 63 8.3 Model Accuracy....................... 64 8.4 Practicality......................... 65 8.5 Accumulation of information................ 68 8.6 Suggestions for future research.............. 68 9 Conclusion 70 Bibliography........................... 70 A 79 B 80 C 84 List of Figures 1.1 A private key........................1 3.1 The DSRM process model.................6 3.2 A maturity model with 10 maturity levels and example ca- pabilities...........................8 3.3 The Information Systems Research Framework......9 3.4 Example of a feature model concerning an e-shop..... 10 4.1 A complex crypto asset security setup using escrow 2 out of 3 feature model...................... 18 4.2 The value of Bitcoin (BTC) over its entire lifespan.... 20 4.3 The largest drop in BTC history, December 2017 to Febru- ary 2018........................... 21 4.4 A soft fork.......................... 22 4.5 A hard fork......................... 23 4.6 AML legislation rollout 2018-2020............. 36 4.7 Coverage of major financial task forces worldwide.... 37 4.8 Countries on the FATF blacklist.............. 37 6.1 The crypto asset safekeeping security maturity assessment model............................ 51 8.1 Percentage of users per wallet type (Exceeds 100% be- cause of multiple answering options)............ 66 8.2 Number of cryptocurrency wallets............. 67 B.1 2-FA authentication using SMS feature model....... 80 B.2 2-factor authentication feature model........... 81 B.3 Identification method fingerpint or PINcode........ 82 B.4 Pincode verification feature model............. 83 C.1 Binance Model....................... 84 C.2 Okex Model......................... 85 C.3 Digifinex Model....................... 86 C.4 Dobi exchange Model.................... 87 C.5 Bitmax Model........................ 88 iii C.6 BitGo Model........................ 89 C.7 Xapo Model......................... 90 C.8 Trezor Model........................ 91 C.9 Ledger Model........................ 92 C.10 Exodus Model........................ 93 C.11 Electrum Model....................... 94 C.12 Bitcoin core Model..................... 95 C.13 Armory Model....................... 96 C.14 Edge Model......................... 97 C.15 Coinomi Model....................... 98 C.16 Greenadress Model..................... 99 List of Tables 3.1 General perspective queries................. 12 3.2 Technical perspective queries................ 12 3.3 Attackers perspective queries................ 13 3.4 Governance perspective queries.............. 13 3.5 Example kpa candidacy................... 14 4.1 Discovered features..................... 19 4.2 CKPA distribution of power................ 23 4.3 literature list of the technical perspective - authentication. 24 4.4 CKPA authentication protocol............... 26 4.5 literature list of the technical perspective – encryption... 27 4.6 CKPA encryption...................... 27 4.7 literature list of the technical perspective – digital signature 28 4.8 CKPA digital signature................... 28 4.9 literature list of the technical perspective – hashing.... 29 4.10 CKPA hashing function................... 30 4.11 literature list of the technical perspective – Instruction... 30 4.12 CKPA instruction...................... 32 4.13 CKPA webhost....................... 32 4.14 CKPA active development & CKPA open source..... 33 4.15 CKPA javascript cryptography............... 33 4.16 CKPA secure database management............ 35 4.17 Collection of user data................... 35 4.18 CKPA monitoring of supported cryptocurrencies..... 35 4.19 FATF blacklist 2019..................... 37 4.20 CKPA governance & CKPA legislation........... 39 4.21 Collected CKPAs...................... 40 5.1 Collected CKPAs...................... 42 7.1 Top VCEPs......................... 52 7.2 Top CWPs.......................... 55 7.3 Top wallet providers.................... 57 8.1 Providers, maturity levels and wallet type......... 66 v 8.2 KPAs and how to accumulate the necessary information to correctly asses them..................... 68 A.1 Maturity model question list................ 79 C.1 Binance review....................... 84 C.2 Okex.com review...................... 85 C.3 DigiFinex.com review.................... 86 C.4 DOBI exchange.com review................ 87 C.5 Bitmax review........................ 88 C.6 BitGo review........................ 89 C.7 Xapo review......................... 90 C.8 Trezor review........................ 91 C.9 Ledger review........................ 92 C.10 Exodus review........................ 93 C.11 Electrum review....................... 94 C.12 Bitcoin Core review..................... 95 C.13 Armory review....................... 96 C.14 Edge review......................... 97 C.15 Coinomi review....................... 98 C.16 Greenadress review..................... 99 Chapter 1 Introduction On 9 January 2009 Satoshi Nakamoto implemented and released the first bitcoin code. The code was released as open source. It would be the first “cryptocurrency”, which is a form of electronic cash. Fast forward to the present and the first cryptocurrency has become popular and valuable. With it thousands of new cryptocurrencies have sprouted, with a different degree of popularity and success. Bitcoin, and other cryptocurrencies, rely on
Recommended publications
  • CRYPTONAIRE WEEKLY CRYPTO Investment Journal
    CRYPTONAIRE WEEKLY CRYPTO investment journal CONTENTS WEEKLY CRYPTOCURRENCY MARKET ANALYSIS...............................................................................................................5 TOP 10 COINS ........................................................................................................................................................................................6 Top 10 Coins by Total Market Capitalisation ...................................................................................................................6 Top 10 Coins by Percentage Gain (Past 7 Days)...........................................................................................................6 Top 10 Coins added to Exchanges with the Highest Market Capitalisation (Past 30 Days) ..........................7 CRYPTO TRADE OPPORTUNITIES ...............................................................................................................................................9 PRESS RELEASE..................................................................................................................................................................................14 ZUMO BRINGS ITS CRYPTOCURRENCY WALLET TO THE PLATINUM CRYPTO ACADEMY..........................14 INTRODUCTION TO TICAN – MULTI-GATEWAY PAYMENT SYSTEM ......................................................................17 ADVERTISE WITH US........................................................................................................................................................................19
    [Show full text]
  • Beauty Is Not in the Eye of the Beholder
    Insight Consumer and Wealth Management Digital Assets: Beauty Is Not in the Eye of the Beholder Parsing the Beauty from the Beast. Investment Strategy Group | June 2021 Sharmin Mossavar-Rahmani Chief Investment Officer Investment Strategy Group Goldman Sachs The co-authors give special thanks to: Farshid Asl Managing Director Matheus Dibo Shahz Khatri Vice President Vice President Brett Nelson Managing Director Michael Murdoch Vice President Jakub Duda Shep Moore-Berg Harm Zebregs Vice President Vice President Vice President Shivani Gupta Analyst Oussama Fatri Yousra Zerouali Vice President Analyst ISG material represents the views of ISG in Consumer and Wealth Management (“CWM”) of GS. It is not financial research or a product of GS Global Investment Research (“GIR”) and may vary significantly from those expressed by individual portfolio management teams within CWM, or other groups at Goldman Sachs. 2021 INSIGHT Dear Clients, There has been enormous change in the world of cryptocurrencies and blockchain technology since we first wrote about it in 2017. The number of cryptocurrencies has increased from about 2,000, with a market capitalization of over $200 billion in late 2017, to over 8,000, with a market capitalization of about $1.6 trillion. For context, the market capitalization of global equities is about $110 trillion, that of the S&P 500 stocks is $35 trillion and that of US Treasuries is $22 trillion. Reported trading volume in cryptocurrencies, as represented by the two largest cryptocurrencies by market capitalization, has increased sixfold, from an estimated $6.8 billion per day in late 2017 to $48.6 billion per day in May 2021.1 This data is based on what is called “clean data” from Coin Metrics; the total reported trading volume is significantly higher, but much of it is artificially inflated.2,3 For context, trading volume on US equity exchanges doubled over the same period.
    [Show full text]
  • Pwc I 2Nd Global Crypto M&A and Fundraising Report
    2nd Global Crypto M&A and Fundraising Report April 2020 2 PwC I 2nd Global Crypto M&A and Fundraising Report Dear Clients and Friends, We are proud to launch the 2nd edition of our Global Crypto M&A and Fundraising Report. We hope that the market colour and insights from this report will be useful data points. We will continue to publish this report twice a year to enable you to monitor the ongoing trends in the crypto ecosystem. PwC has put together a “one stop shop” offering, focused on crypto services across our various lines of services in over 25 jurisdictions, including the most active crypto jurisdictions. Our goal is to service your needs in the best possible way leveraging the PwC network and allowing you to make your project a success. Our crypto clients include crypto exchanges, crypto investors, crypto asset managers, ICOs/IEOs/STOs/stable and asset backed tokens, traditional financial institutions entering the crypto space as well as governments, central banks, regulators and other policy makers looking at the crypto ecosystem. As part of our “one stop shop” offering, we provide an entire range of services to the crypto ecosystem including strategy, legal, regulatory, accounting, tax, governance, risk assurance, audit, cybersecurity, M&A advisory as well as capital raising. More details are available on our global crypto page as well as at the back of this report. 2nd Global Crypto M&A and Fundraising Report April 2020 PwC 2 3 PwC I 2nd Global Crypto M&A and Fundraising Report 5 Key takeaways when comparing 2018 vs 2019 There
    [Show full text]
  • Keys Are, As Their Name Suggests, a Key Part of a Relational Database
    The key is defined as the column or attribute of the database table. For example if a table has id, name and address as the column names then each one is known as the key for that table. We can also say that the table has 3 keys as id, name and address. The keys are also used to identify each record in the database table . Primary Key:- • Every database table should have one or more columns designated as the primary key . The value this key holds should be unique for each record in the database. For example, assume we have a table called Employees (SSN- social security No) that contains personnel information for every employee in our firm. We’ need to select an appropriate primary key that would uniquely identify each employee. Primary Key • The primary key must contain unique values, must never be null and uniquely identify each record in the table. • As an example, a student id might be a primary key in a student table, a department code in a table of all departments in an organisation. Unique Key • The UNIQUE constraint uniquely identifies each record in a database table. • Allows Null value. But only one Null value. • A table can have more than one UNIQUE Key Column[s] • A table can have multiple unique keys Differences between Primary Key and Unique Key: • Primary Key 1. A primary key cannot allow null (a primary key cannot be defined on columns that allow nulls). 2. Each table can have only one primary key. • Unique Key 1. A unique key can allow null (a unique key can be defined on columns that allow nulls.) 2.
    [Show full text]
  • CANDIDATE KEYS a Candidate Key of a Relation Schema R Is a Subset X
    CANDIDATEKEYS A candidate key of a relation schema R is a subset X of the attributes of R with the following twoproperties: 1. Every attribute is functionally dependent on X, i.e., X + =all attributes of R (also denoted as X + =R). 2. No proper subset of X has the property (1), i.e., X is minimal with respect to the property (1). A sub-key of R: asubset of a candidate key; a super-key:aset of attributes containing a candidate key. We also use the abbreviation CK to denote "candidate key". Let R(ABCDE) be a relation schema and consider the fol- lowing functional dependencies F = {AB → E, AD → B, B → C, C → D}. Since (AC)+ =ABCDE, A+ =A,and C+ =CD, we knowthat ACisacandidate key,both A and C are sub-keys, and ABC is a super-key.The only other candidate keysare AB and AD. Note that since nothing determines A, A is in every can- didate key. -2- Computing All Candidate Keys of a Relation R. Givenarelation schema R(A1, A2,..., An)and a set of functional dependencies F which hold true on R, howcan we compute all candidate keysofR? Since each candidate key must be a minimal subset Z of {A1,..., + An}such that Z =R,wehav e the following straightforward (and brute-force) algorithm: (1) Construct alist L consisting of all non-empty subsets of {A1, n − ..., An}(there are 2 1ofthem). These subsets are arranged in L in ascending order of the size of the subset: 〈 〉 ≤ We get L = Z1, Z2,..., Z2n−1 ,such that |Zi| |Zi+1|.
    [Show full text]
  • A Behavioral Economics Approach to Regulating Initial Coin Offerings
    A Behavioral Economics Approach to Regulating Initial Coin Offerings NATHAN J. SHERMAN* INTRODUCTION Initial coin offerings (ICOs) are an outgrowth of the cryptocurrency space in which companies raise capital by issuing their own cryptocurrency coin to investors. Although ICOs are an innovative method of raising capital, the growth of the ICO market is troubling considering no investor protection regulations govern the ICO process. Investors pour large amounts of money into these offerings, which are issued by companies that typically have no history of producing a product or revenue, and the prices of coins issued in ICOs are only rising because other investors also funnel money into them.1 This pattern is markedly similar to that of a speculative bubble. A speculative bubble occurs when there are “‘unsustainable increases’ in asset prices caused by investors trading on a pattern of price increases rather than information on fundamental values.”2 In a bubble, “smart money”—informed investors—bid up prices in anticipation of “noise traders” entering the market.3 The noise traders then enter the market due to the psychological biases they encounter in making their investment decisions.4 Eventually, the smart money investors sell their holdings and the bubble bursts. 5 Thus, regulators should create a framework that adequately protects investors in ICOs. The behavioral economics theory of bounded rationality provides insights for building this regulatory framework. Bounded rationality implies that humans make suboptimal choices.6 By understanding the psychological biases that influence investors’ choices, regulators will be able to help investors adopt habits that reduce the harmful effects of speculative bubbles.
    [Show full text]
  • There Are Only Four Types of Relational Keys Candidate Key As Stated
    There are only four types of relational keys Candidate Key As stated above, a candidate key is any set of one or more columns whose combined values are unique among all occurrences (i.e., tuples or rows). Since a null value is not guaranteed to be unique, no component of a candidate key is allowed to be null. There can be any number of candidate keys in a table . Relational pundits are not in agreement whether zero candidate keys is acceptable, since that would contradict the (debatable) requirement that there must be a primary key. Primary Key The primary key of any table is any candidate key of that table which the database designer arbitrarily designates as "primary". The primary key may be selected for convenience, comprehension, performance, or any other reasons. It is entirely proper (albeit often inconvenient) to change the selection of primary key to another candidate key. As we will see below, there is no property of a primary key which is not shared by all other candidate keys in of the table except this arbitrary designation. Unfortunately E-R methodologies and RDBMS products have come to rely on the primary key almost to the exclusion of the concept of candidate keys, which are rarely supported by software. Alternate Key The alternate key s of any table are simply those candidate keys which are not currently selected as the primary key. According to { Date95 } (page 115), "... exactly one of those candidate keys [is] chosen as the primary key [and] the remainder, if any, are then called alternate keys ." An alternate key is a function of all candidate keys minus the primary key.
    [Show full text]
  • An Investigative Study of Cryptocurrency Abuses in the Dark Web
    Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web Seunghyeon Leeyz Changhoon Yoonz Heedo Kangy Yeonkeun Kimy Yongdae Kimy Dongsu Hany Sooel Sony Seungwon Shinyz yKAIST zS2W LAB Inc. {seunghyeon, kangheedo, yeonk, yongdaek, dhan.ee, sl.son, claude}@kaist.ac.kr {cy}@s2wlab.com Abstract—The Dark Web is notorious for being a major known as one of the major drug trading sites [13], [22], and distribution channel of harmful content as well as unlawful goods. WannaCry malware, one of the most notorious ransomware, Perpetrators have also used cryptocurrencies to conduct illicit has actively used the Dark Web to operate C&C servers [50]. financial transactions while hiding their identities. The limited Cryptocurrency also presents a similar situation. Apart from coverage and outdated data of the Dark Web in previous studies a centralized server, cryptocurrencies (e.g., Bitcoin [58] and motivated us to conduct an in-depth investigative study to under- Ethereum [72]) enable people to conduct peer-to-peer trades stand how perpetrators abuse cryptocurrencies in the Dark Web. We designed and implemented MFScope, a new framework which without central authorities, and thus it is hard to identify collects Dark Web data, extracts cryptocurrency information, and trading peers. analyzes their usage characteristics on the Dark Web. Specifically, Similar to the case of the Dark Web, cryptocurrencies MFScope collected more than 27 million dark webpages and also provide benefits to our society in that they can redesign extracted around 10 million unique cryptocurrency addresses for Bitcoin, Ethereum, and Monero. It then classified their usages to financial trading mechanisms and thus motivate new business identify trades of illicit goods and traced cryptocurrency money models, but are also adopted in financial crimes (e.g., money flows, to reveal black money operations on the Dark Web.
    [Show full text]
  • Fraud & White Collar Crime 2019
    FRAUD & WHITE COLLAR CRIME 2019 EXPERT GUIDE www.corporatelivewire.com 33 CHANCERY LANE Expert Guide | Fraud & White Collar Crime 2019 Alma Angotti United Kingdom | United States [email protected] UK: +44 (0) 20 7550 4604 | US: +1 202 481 8398 www.navigant.com The ability to trace transactions on the blockchain allows for the identification of the originating cryptocurrency wallet address and the beneficiary cryptocurrency wallet address. Elizabeth Sisul Bitcoin is said to offer “pseudo-anonymity” because it United States [email protected] is often difficult to connect the cryptocurrency wallet +1 646 227 4725 www.navigant.com addresses with real-world individuals and entities. Brandy Schindler United States 1. Money Laundering Risks ability to move private keys across borders with a piece of paper [email protected] in his or her pocket, or by handing off that piece of paper to a co- +1 646 227 4881 I. Pseudo-anonymity/Anonymity conspirator crossing a border. www.navigant.com Many erroneously believe that the most popular cryptocurren- The ability to easily move money across borders facilitates the cies, including bitcoin, offer complete anonymity to its users. In layering3 stage of money laundering. Bad actors may leverage reality, bitcoin transactions can be traced on the bitcoin block- the ability to conduct cross-border transactions in order to direct chain. The ability to trace transactions on the blockchain allows complex transactions through multiple countries and/or through Key Considerations and Risk Management Practices in Building for the identification of the originating cryptocurrency wallet countries with weak regulatory frameworks. In addition, the in- address and the beneficiary cryptocurrency wallet address.
    [Show full text]
  • All Keys in Dbms with Example
    All Keys In Dbms With Example Leigh usually fudging whithersoever or concertina ineffably when diachronic Dickey unbuilds eventually and catachrestically. Nocturnal Chane toast deafly or syllabify presumptively when Dirk is gratulatory. Muriatic and strawy Pavel feds almost algebraically, though Rolfe evolve his almahs hobnails. We would make the keys in all dbms example of attributes Is known s control key contains a database choosing a set to retrieve the same plant as with all in dbms keys in below. Keys with all you can be in all dbms keys with example to? This example to all the ad links and in all dbms keys with example: the minimum number also update operation that each tuple. Used for each employee, let us in the. Nulls in your experience platforms are two same first columns as primary key are required for this set to table roll_no, as demonstrated here. It would work as the keys with the foreign. What is referred table then the curve with all keys in dbms example, you would be a list? Ssis tutorial of your dbms keys by the tables suggests that is not simple words, driving license number field cannot be ignored during your preferred and in all dbms keys with example. Solution for me with databases and with all keys in example, various levels table. You with all keys in dbms example, andere brauche ich für statistiken zu verfolgen. The following example: roll number of the keys and design stage, and with all candidate key in all dbms keys with example might be in.
    [Show full text]
  • CSC 443 – Database Management Systems Data and Its Structure
    CSC 443 – Database Management Systems Lecture 3 –The Relational Data Model Data and Its Structure • Data is actually stored as bits, but it is difficult to work with data at this level. • It is convenient to view data at different levels of abstraction . • Schema : Description of data at some abstraction level. Each level has its own schema. • We will be concerned with three schemas: physical , conceptual , and external . 1 Physical Data Level • Physical schema describes details of how data is stored: tracks, cylinders, indices etc. • Early applications worked at this level – explicitly dealt with details. • Problem: Routines were hard-coded to deal with physical representation. – Changes to data structure difficult to make. – Application code becomes complex since it must deal with details. – Rapid implementation of new features impossible. Conceptual Data Level • Hides details. – In the relational model, the conceptual schema presents data as a set of tables. • DBMS maps from conceptual to physical schema automatically. • Physical schema can be changed without changing application: – DBMS would change mapping from conceptual to physical transparently – This property is referred to as physical data independence 2 Conceptual Data Level (con’t) External Data Level • In the relational model, the external schema also presents data as a set of relations. • An external schema specifies a view of the data in terms of the conceptual level. It is tailored to the needs of a particular category of users. – Portions of stored data should not be seen by some users. • Students should not see their files in full. • Faculty should not see billing data. – Information that can be derived from stored data might be viewed as if it were stored.
    [Show full text]
  • In Collaboration with CONTENTS
    QUARTERLY REPORT Q3 2018 in collaboration with CONTENTS FOREWORDS BITCOIN’S VALUE PROPOSITIONS TO INVESTORS CRYPTOASSET MCAPS OUTLOOK INDUSTRY EXCHANGES PEER-TO-PEER EXCHANGES DECENTRALIZED EXCHANGES ESCALATING TECH ADOPTION STABLECOINS TOKEN MARKET SUMMARY ASSET RISK-ADJUSTED RETURNS CORRELATIONS INDEXES NETWORK HEALTH LAYER 2 SOLUTIONS LIGHTNING NETWORK LINDY EFFECT REFERENCES FOREWORDS Bitcoin, the digital asset that just celebrated its 10 year anniversary, has been attracting investor attention by offering potentially high returns with relatively low correlation to other traditional asset classes. Bitcoin’s nature as digital payment method and its scarcity in terms of limited supply has also driven many investors to call bitcoin as “digital gold”. Bitcoin was founded shortly after the noto- rious 2008 subprime crisis and following reces- sion, by mysterious person or group called Satoshi Nakamoto. The following text included in bitcoin genesis block: “The Times 03/Jan/2009 Chancel- lor on brink of second bailout for banks”, can be interpreted as a statement questioning fractional- reserve banking system [1]. In summary, Satoshi’s core objective was to create “peer-to-peer elec- tronic cash system”. That objective was fulfilled completely and rest of the bitcoin’s developing story will be among significant financial innovations of our time. In the Q3 report we’ll dive deep into bitcoin & cryp- toassets, including topics within: Cryptocurrency market caps, exchanges, decentralized exchanges, and tech adoption. With Asset Summary, we’ll explore asset correlations, indices, network health, layer 2 solutions, and bitcoin fundamentals. The report aims to provide value for investors, clients, and individuals, by delivering a complete quarterly overview of the industry.
    [Show full text]