The Anatomy of a Money-Like Informational Commodity: a Study of Bitcoin by Tim Swanson

Total Page:16

File Type:pdf, Size:1020Kb

The Anatomy of a Money-Like Informational Commodity: a Study of Bitcoin by Tim Swanson The Anatomy of a Money-like Informational Commodity: A Study of Bitcoin By Tim Swanson 1 © Copyright 2014 by Tim Swanson Cover art credit: Matt Thomas and Invisible Order This manuscript is released under the Creative Commons - Attribution 4.0 International license: to copy, transmit, share, adapt, remix, make commercial use of and freely distribute this work. 2 Table of Contents Preface .......................................................................................................................................................... 4 Acknowledgements ...................................................................................................................................... 5 Introduction .................................................................................................................................................. 6 Chapter 1: Bitcoin in theory and practice .................................................................................................... 9 Chapter 2: Public goods.............................................................................................................................. 24 Chapter 3: The Red Queen of Mining ........................................................................................................ 40 Chapter 4: A Bitcoin Gap ............................................................................................................................ 78 Chapter 5: Bitcoins made in China ............................................................................................................. 91 Chapter 6: Living in a trusted, post-51% world ....................................................................................... 105 Chapter 7: Network effects ...................................................................................................................... 117 Chapter 8: TCPIPcoin and User Adoption ................................................................................................ 122 Chapter 9: Deflation in theory and practice ............................................................................................ 137 Chapter 10: Bitcoin’s command economy and knock-on effects ........................................................... 163 Chapter 11: Zero-sum Entrepreneurship ................................................................................................. 176 Chapter 12: Token movements and token safety ................................................................................... 188 Chapter 13: Social engineering and groupthink ...................................................................................... 208 Chapter 14: Separating activity from growth on Bitcoin’s network ....................................................... 224 Chapter 15: What Altplatforms can teach Bitcoin .................................................................................. 236 Chapter 16: Potential alternatives and solutions ................................................................................... 250 Chapter 17: Legal specialization .............................................................................................................. 267 Chapter 18: Conclusions ........................................................................................................................... 281 About the author ...................................................................................................................................... 285 Endnotes ................................................................................................................................................... 286 3 Preface This book is a compilation of research I have written and presented over the past four months, revised, updated and corrected relative to the original source material. The purpose of this manuscript is to continue the dialogue on issues that are increasingly important to the direction of cryptoprotocols, specifically Bitcoin, and decentralized applications in the near future. This book is divided into three sections. The first third describes the current state of software and hardware development. The middle portion reflects on the economic conditions within the Bitcoin network as well as user adoption. The last third covers alternative platforms and legal considerations that could impact the on-boarding of users onto the Bitcoin network. While there is some repetition and overlapping throughout the following chapters the redundancy is necessary as this field of study is simply put: hard. Tim Swanson San Francisco, August 2014 4 Acknowledgements I would like to thank the following people for providing encouragement, feedback, constructive criticism, contrarian views and anecdotes over the past several months: Cal Abel, Derek Au, Dave Babbitt, Kevin Barnett, Isaac Bergman, Gwern Branwen, Austin Brister, Richard Brown, Oliver Bruce, Anton Bolotinsky, Vitalik Buterin, Preston Byrne, Hudson Cashdan, DC, Joseph Chow, Ben Coleman, Nicolas Courtois, Zavain Dar, Wendell Davis, Robby Dermody, Mark DeWeaver, Ray Dillinger, Tom Ding, John Dreyzehner, James Duchenne, Dan Forster, Byron Gibson, Philipp Gühring, Brian Hanley, Martin Harrigan, Marshall Hayner, Alexander Hirner, Karl Holmqvist, Ron Hose, Petri Kajander, Zennon Kapron, CukeKing, John Komkov, Andrew Lapp, Sergio Lerner, Jonathan Levin, Adam Levine, Matt Lewis, Taariq Lewis, Adam Marsh, Andrew Mackenzie, Andrew Miller, Alex Mizrahi, Pamela Morgan, Massimo Morini, Marco Montes Neri, PN, Pieter Nooren, Dan O’Prey, Ryan Orr, Jackson Palmer, Andrew Poelstra, Antonis Polemitis, John Ratcliff, Robert Sams, David Shin, Greg Simon, Peter Surda, Koen Swinkels, Ryan Terribilini, Peter Todd, Eddy Travia, Chris Turlica, Bryan Vu, Jack Wang, Dominic Williams, Andrew White, Yanli Xiao, Joshua Zeidner and Weiwu Zhang. Throughout the book I refer to their insights. This is not an explicit endorsement of their opinions or services but rather serves as an on-the-ground reference point. Nor by providing me with quotes do they endorse this book or my opinions. Furthermore, in the interest of financial disclosure, I do not currently have any equity positions in the firms or companies discussed throughout, nor was I provided any financial compensation for the inclusion of companies or projects. This book was entirely self-funded; no government, organization, company, institution or individual provided financial compensation or remuneration for the creation or direction of its content. 5 Introduction My title comes from a paper, Bitcoin: a Money-like Informational Commodity, by Jan Bergstra and Peter Weijland who attempted to classify Bitcoin through an ontological analysis, showing that it is not even “near money” only “money-like.” The paper analyzed existing literature and clarifies why we cannot technically call Bitcoin the various things it is now popularly labeled – such as a “cryptocurrency.” More specifically, Bergstra and Weijland mention the disadvantage of calling Bitcoin a Candidate cryptocurrency (CCC) is that “there is no known procedure for leaving the candidate status.”1 However in a recently published paper, Formalising the Bitcoin protocol: Making it a bit better, W.J.B. Beukema claims that by specifying the protocol in mCRL2 (a formal specification language used for modelling concurrent protocols) and verifying that it “satisfies a number of requirements under various scenarios” we have just such a procedure:2 These findings contribute to the position of Bitcoin as a (crypto)currency, as we have to some extent proven that Bitcoin satisfies properties it should at least have in order to be safe to be used as currency. According to Dave Babbitt, a Predictive Analytics graduate student at Northwestern University, “it sounds like there is sufficient justification to call Bitcoin a crypto-currency, right?3 The problem with that, according to Bergstra and Weijland, is that confirming its status ‘depends on a plurality of observers, some of whom may require that a certain acceptance or usage must have been arrived at’ before it can be classified as such: Upon its inception Bitcoin did not possess that level of acceptance, and for that reason Bitcoin has not started its existence as a cryptocurrency. Being a cryptocurrency is a status that a system may or may not acquire over time. Assuming that Bitcoin is considered to be a cryptocurrency at some stage then there will most likely be variations (alternative designs and systems) of Bitcoin around (perhaps hardly used any more) which have not been that successful. Such alternative systems should be given the same type, so that Bitcoin might be considered a successful instance of that type. Clearly CC cannot be that type as it contains only systems that have already become successful to a significant extent. Because being a cryptocurrency is the primary success criterion for Bitcoin its classification as a cryptocurrency amounts to a value judgment or a quality assessment rather than as an initial type. Thus in line with Babbitt’s reasoning, it is okay to assess the quality of Bitcoin as that of a cryptocurrency, but initially it was something else. And that something is a Money-Like Informational Commodity (MLIC) – viewing Bitcoin as a system providing a platform offering the following features: 1. a system for giving agents access, and 6 2. facilitating the exchange of that access, to 3. informationally given amounts measured in BTC (the unit of Bitcoin), through 4. the scarce
Recommended publications
  • White Paper of Bitcoin Ultimatum Introduction
    White Paper of Bitcoin Ultimatum Introduction 1. Problematic of the Blockchain 4. Bitcoin Ultimatum Architecture industry 4.1. Network working principle 1.1. Transactions Anonymity 4.1.1. Main Transaction Types 1.2. Insufficient Development of Key Aspects of the 4.1.1.1. Public transactions Technology 4.1.1.2. Private transactions 1.3. Centralization 4.1.2. Masternode Network 1.4. Mining pools and commission manipulation 4.2. How to become a validator or masternode in 1.5. Decrease in Transaction Speeds BTCU 4.3. Network Scaling Principle 2. BTCU main solutions and concepts 4.4. Masternodes and Validators Ranking System 4.5. Smart Contracts 2.1. Consensus algorithm basis 4.6. Anonymization principle 2.2. Leasing and Staking 4.7. Staking and Leasing 2.3. Projects tokenization and DeFi 4.7.1. Staking 2.4. Transactions Privacy 4.7.2. Leasing 2.5. Atomic Swaps 4.7.2 Multileasing 4.8. BTCU Technical Specifications 3. Executive Summary 4.8.1. Project Stack 4.8.2. Private key generation algorithm 5. Bitcoin Ultimatum Economy 5.1. Initial Supply and Airdrop 5.2. Leasing Economy 5.3. Masternodes and Validators Commission 5.4. Transactions Fee 6. Project Roadmap 7. Legal Introduction The cryptocurrency market is inextricably tied to the blockchain – its fundamental and underlying technology. The modern market is brimming with an abundance of blockchain protocols, algorithms, and concepts, all of which have fostered the development of a wide variety of services and applications. The modern blockchain market offers users an alternative to both established financial systems and ecosystems/infrastructures of applications and services.
    [Show full text]
  • Moneylab Reader: an Intervention in Digital Economy
    READER A N INTERVENTION IN DIGITAL ECONOMY FOREWORD BY SASKIA SASSEN EDITED BY GEERT LOVINK NATHANIEL TKACZ PATRICIA DE VRIES INC READER #10 MoneyLab Reader: An Intervention in Digital Economy Editors: Geert Lovink, Nathaniel Tkacz and Patricia de Vries Copy editing: Annie Goodner, Jess van Zyl, Matt Beros, Miriam Rasch and Morgan Currie Cover design: Content Context Design: Katja van Stiphout EPUB development: André Castro Printer: Drukkerij Tuijtel, Hardinxveld-Giessendam Publisher: Institute of Network Cultures, Amsterdam, 2015 ISBN: 978-90-822345-5-8 Contact Institute of Network Cultures phone: +31205951865 email: [email protected] web: www.networkcultures.org Order a copy or download this publication freely at: www.networkcultures.org/publications Join the MoneyLab mailing list at: http://listcultures.org/mailman/listinfo/moneylab_listcultures.org Supported by: Amsterdam University of Applied Sciences (Hogeschool van Amster- dam), Amsterdam Creative Industries Publishing and the University of Warwick Thanks to everyone at INC, to all of the authors for their contributions, Annie Goodner and Morgan Currie for their copy editing, and to Amsterdam Creative Industries Publishing for their financial support. This publication is licensed under Creative Commons Attribution NonCommercial ShareAlike 4.0 Unported (CC BY-NC-SA 4.0). To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/. EDITED BY GEERT LOVINK, NATHANIEL TKACZ AND PATRICIA DE VRIES INC READER #10 Previously published INC Readers The INC Reader series is derived from conference contributions and produced by the Institute of Network Cultures. They are available in print, EPUB, and PDF form. The MoneyLab Reader is the tenth publication in the series.
    [Show full text]
  • Central Banks and Alternative Monetary Alternative Monetary
    Central Banks and Alternative Monetary Systems Christopher J. Neely AittViPAssistant Vice Presid idtent, Federal Reserve Bank of St. Louis Annual Educators Conference October 19, 2011 The opinions expressed are my own and not necessarily those of the Federal Reserve Bank of Saint Louis or the Federal Reserve System. 2 Today’sTopics s Topics Central Banks and Alternative Money Systems o What is Money? o Methods of Monetary Policy o ClBkCentral Banks o Central Banks vs. Commodity Standard 3 What is Money? Money • Money: That which can be exchanged for goods and services. – Functions: • Medium of exchange • Store of value • Unit of measure Why Do We Need Money? • Money solves the mutual coincidence of wants problem. • Greatly reduces transactions costs/shopping time. – My grocer does not want a lecture on economics in exchange for Cheerios. Historical Forms of Money • Commodities: cigarettes, furs, gold, Rai stones (Yap island) • Fiat money: Money whose vvuesoalue is not intrins sc.ic. – Introduced during wartime in the United States • Charac ter is tics of usef ul money – Durable, transportable, divisible, homogenous, easily produced (?) Historical Forms of Money Rai stone Historical Forms of Money • What are the advantages and disadvantages of having a currency that is easily produced? Money Supply • Monetary base: Currency and reserves with the central bank. • Narrow to broad definitions of money – Currency – Demand deposits – Time deposits, CDs, – Shor t-tbdterm bonds • Money and bonds are close to a continuum now – M0, M1, MZM, M2 Money Supply Monetary Base 3000 2500 ars ll 2000 1500 ns of US Dol 1000 Billio 500 Monetary Base (BASE) 0 2/1/1984 2/1/1989 2/1/1994 2/1/1999 2/1/2004 2/1/2009 Money Supply Money supply levels go up and up.
    [Show full text]
  • Aggregate Cash System: a Cryptographic Investigation Of
    Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble Georg Fuchsbauer1,2, Michele Orrù2,1, and Yannick Seurin3 1 Inria 2 École normale supérieure, CNRS, PSL University, Paris, France 3 ANSSI, Paris, France {georg.fuchsbauer, michele.orru}@ens.fr [email protected] Abstract. Mimblewimble is an electronic cash system proposed by an anonymous author in 2016. It combines several privacy-enhancing techniques initially envisioned for Bitcoin, such as Confidential Transactions (Maxwell, 2015), non-interactive merging of transactions (Saxena, Misra, Dhar, 2014), and cut-through of transaction inputs and outputs (Maxwell, 2013). As a remarkable consequence, coins can be deleted once they have been spent while maintaining public verifiability of the ledger, which is not possible in Bitcoin. This results in tremendous space savings for the ledger and efficiency gains for new users, who must verify their view of the system. In this paper, we provide a provable-security analysis for Mimblewimble. We give a precise syntax and formal security definitions for an abstraction of Mimblewimble that we call an aggregate cash system. We then formally prove the security of Mimblewimble in this definitional framework. Our results imply in particular that two natural instantiations (with Pedersen commitments and Schnorr or BLS signatures) are provably secure against inflation and coin theft under standard assumptions. Keywords: Mimblewimble, Bitcoin, commitments, aggregate signatures. 1 Introduction Bitcoin and the UTXO model. Proposed in 2008 and launched early 2009, Bitcoin [Nak08] is a decentralized payment system in which transactions are registered in a distributed and publicly verifiable ledger called a blockchain. Bitcoin departs from traditional account-based payment systems where transactions specify an amount moving from one account to another.
    [Show full text]
  • CY19 January a Collection of Bitcoin Commentary from the Brightest
    CY19 January A collection of Bitcoin commentary from the brightest minds in the crypto community. Crypto Words CY19 January Contents Goals and Scope ......................................................................................................................................................................... 2 Support Crypto Words .......................................................................................................................................................... 3 Cryptocurrency: The Canary in the Coal Mine.................................................................................................. 4 Tweetstorm: Bitcoin’s 10 Year Anniversary ......................................................................................................... 6 Bitcoin: Two Parts Math, One Part Biology .......................................................................................................... 8 Planting Bitcoin - Season (2/4) .................................................................................................................................... 12 Planting Bitcoin - Gardening (4/4) ............................................................................................................................ 18 Planting Bitcoin — Soil (3/4) .......................................................................................................................................... 25 Planting Bitcoin — Species (1/4) ...............................................................................................................................
    [Show full text]
  • Review Articles
    review articles DOI:10.1145/3372115 system is designed to achieve common Software weaknesses in cryptocurrencies security goals: transaction integrity and availability in a highly distributed sys- create unique challenges in responsible tem whose participants are incentiv- revelations. ized to cooperate.38 Users interact with the cryptocurrency system via software BY RAINER BÖHME, LISA ECKEY, TYLER MOORE, “wallets” that manage the cryptograph- NEHA NARULA, TIM RUFFING, AND AVIV ZOHAR ic keys associated with the coins of the user. These wallets can reside on a local client machine or be managed by an online service provider. In these appli- cations, authenticating users and Responsible maintaining confidentiality of crypto- graphic key material are the central se- curity goals. Exchanges facilitate trade Vulnerability between cryptocurrencies and between cryptocurrencies and traditional forms of money. Wallets broadcast cryptocur- Disclosure in rency transactions to a network of nodes, which then relay transactions to miners, who in turn validate and group Cryptocurrencies them together into blocks that are ap- pended to the blockchain. Not all cryptocurrency applications revolve around payments. Some crypto- currencies, most notably Ethereum, support “smart contracts” in which general-purpose code can be executed with integrity assurances and recorded DESPITE THE FOCUS on operating in adversarial on the distributed ledger. An explosion of token systems has appeared, in environments, cryptocurrencies have suffered a litany which particular functionality is ex- of security and privacy problems. Sometimes, these pressed and run on top of a cryptocur- rency.12 Here, the promise is that busi- issues are resolved without much fanfare following ness logic can be specified in the smart a disclosure by the individual who found the hole.
    [Show full text]
  • Electronic Cash, Decentralized Exchange, and the Constitution
    Electronic Cash, Decentralized Exchange, and the Constitution Peter Van Valkenburgh March 2019 coincenter.org Peter Van Valkenburgh, Electronic Cash, Decentralized Exchange, and the Constitution, ​ ​ Coin Center Report, Mar. 2019, available at https://coincenter.org/entry/e-cash-dex-constitution Abstract Regulators, law enforcement, and the general public have come to expect that cryptocurrency transactions will leave a public record on a blockchain, and that most cryptocurrency exchanges will take place using centralized businesses that are regulated and surveilled through the Bank Secrecy Act. The emergence of electronic cash and decentralized exchange software challenges these expectations. Transactions need not leave any public record and exchanges can be accomplished peer to peer without using a regulated third party in between. Faced with diminished visibility into cryptocurrency transactions, policymakers may propose new approaches to financial surveillance. Regulating cryptocurrency software developers and individual users of that software under the Bank Secrecy Act would be unconstitutional under the Fourth Amendment because it would be a warrantless search and seizure of information private to cryptocurrency users. Furthermore, any law or regulation attempting to ban, require licensing for, or compel the altered publication (e.g. backdoors) of cryptocurrency software ​ ​ would be unconstitutional under First Amendment protections for speech. Author Peter Van Valkenburgh Coin Center [email protected] About Coin Center Coin Center is a non-profit research and advocacy center focused on the public policy issues facing open blockchain technologies such as Bitcoin. Our mission is to build a better understanding of these technologies and to promote a regulatory climate that preserves the freedom to innovate using blockchain technologies.
    [Show full text]
  • “P2P Lending As an Alternative to Bank Lending in Ukraine”
    “P2P lending as an alternative to bank lending in Ukraine” AUTHORS Alexander Lavryk Alexander Lavryk (2016). P2P lending as an alternative to bank lending in ARTICLE INFO Ukraine . Banks and Bank Systems, 11(4), 20-30. doi:10.21511/bbs.11(4).2016.02 DOI http://dx.doi.org/10.21511/bbs.11(4).2016.02 RELEASED ON Friday, 09 December 2016 JOURNAL "Banks and Bank Systems" FOUNDER LLC “Consulting Publishing Company “Business Perspectives” NUMBER OF REFERENCES NUMBER OF FIGURES NUMBER OF TABLES 0 0 0 © The author(s) 2021. This publication is an open access article. businessperspectives.org Banks and Bank Systems, Volume 11, Issue 4, 2016 Alexander Lavryk (Ukraine) P2P lending as an alternative to bank lending in Ukraine Abstract The goal of the article is to consider peer-to-peer lending and its interaction with bank lending that creates an aggregate hybrid lending. The article’s objective is the research of development of P2P lending on the financial market and beyond, which is particularly relevant today. This goal is achieved by using the methods of evaluation and comparative analysis of different principles, which makes it possible to structure the general scientific understanding of P2P lending with the help of statistical methods. The study of the dynamics and structure of peer-to-peer lending in various coun- tries for the period 2005-2016 led to the conclusion that in Ukraine, there is a decline in the share of bank lending in favor of peer-to-peer lending in the total amount of loans with an increasing role of non-bank and hybrid forms of len- ding in ensuring economic growth.
    [Show full text]
  • One-Out-Of-Many Proofs: Or How to Leak a Secret and Spend a Coin
    One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin Jens Groth1? and Markulf Kohlweiss2 1 University College London 2 Microsoft Research Abstract. We construct a 3-move public coin special honest verifier zero-knowledge proof, a so-called Sigma-protocol, for a list of commit- ments having at least one commitment that opens to 0. It is not required for the prover to know openings of the other commitments. The proof system is efficient, in particular in terms of communication requiring only the transmission of a logarithmic number of commitments. We use our proof system to instantiate both ring signatures and zerocoin, a novel mechanism for bitcoin privacy. We use our Sigma-protocol as a (linkable) ad-hoc group identification scheme where the users have public keys that are commitments and demonstrate knowledge of an opening for one of the commitments to unlinkably identify themselves (once) as belonging to the group. Applying the Fiat-Shamir transform on the group identification scheme gives rise to ring signatures, applying it to the linkable group identification scheme gives rise to zerocoin. Our ring signatures are very small compared to other ring signature schemes and we only assume the users' secret keys to be the discrete logarithms of single group elements so the setup is quite realistic. Sim- ilarly, compared with the original zerocoin protocol we only rely on a weak cryptographic assumption and do not require a trusted setup. A third application of our Sigma protocol is an efficient proof of mem- bership of a secret committed value belonging to a public list of values.
    [Show full text]
  • Jana Vembunarayanan Lin Yang Stones Used As Money in the Yap Island
    Money Jana Vembunarayanan Lin Yang Stones used as money in the Yap Island Rai stones were used as money in Yap island, today a part of the Federated States of Micronesia. The typical Rai stone is carved out of crystalline limestone, and shaped like a disk with a hole in the center. Some of the stones weighed four metric tons, the weight of a typical elephant. Limestones are not native to Yap Island. They had to quarry and canoe from the neighboring island of Palau or Guam, requiring hundreds of people to transport them. These rocks are placed in a prominent location on the Yap island for everyone to see. The owner of the stone could use it as a payment method without moving the stone. All they had to do was to announce to all townsfolk that the stone’s ownership had now moved to the recipient. The very high cost of procuring Rai stones made it a sound form of money. That soundness changed in 1871 when an Irish-American captain by the name of David O’Keefe was shipwrecked on the shores of Yap island and revived by the locals. O’Keefe immediately saw a profit opportunity by selling coconuts found on Yap island to producers of coconut oil. He couldn’t entice the locals to work for him as they were content with their lives. O’Keefe wouldn’t take no for an answer. He sailed to Hong Kong, procured a large boat and explosives. Using modern tools, O’Keefe was able to easily procure huge quantities of Rai stones into Yap island.
    [Show full text]
  • Entrepreneurial Opportunities with Fintechs & Blockchain
    Bitcoins, Kryptowährung und Blockchain – was bringt die Zukunft? 23rd October 2018, 2. Forum „Das gute Geld – Investieren mit MehrWert“ Evgeniia Filippova, Senior Scientist @Cryptoeconomics Institute WU Vienna Ledgers Ledgers are used to: - record economic activities; - prove the ownership; - prove the transfer of value of assets (tangible / intangible) among various stakeholders Bank Accounts Land Registries Academic Certificates Every ledger you know is centralized with a ‚trusted‘ Hotel Reservations Medical Records Citizenship Records record-keeper If you had to define Blockchain in 3 words? A distributed ledger Curios case of the Rai Stones 500 AD, Island of Yap (now Micronesia) Yappies had a problem: a strange form of currency (fei stones) Solution: Decentralized Ledger: - Distribution of Fei stone ownership across all Yappies - When a Fei stone was spent, the new transaction was shared across everyone Basic Idea Behind (Bitcoin) Blockchain • Peer-to-peer electronic transactions and interactions • Without financial institution • Cryptographic proof instead of central trust • Put trust in the network instead of in a central institution BLOCKCHAIN So … What is Blockchain? Blockchain is a bundle of distributed ledger technologies that can be programmed to record and track anything of value without involvement of the third trusted party TECHNICAL Back-end database that maintains a distributed ledger, openly BUSINESS Exchange network for moving value between peers LEGAL A transaction validation mechanism, not requiring intermediary assistance What is Blockchain? NETWORK Layer DATABASE Layer STATE Layer time What is Blockchain? NETWORK Layer DATABASE Layer 1. Transaction event A B Digital signature STATE Layer time What is Blockchain? NETWORK Layer DATABASE Layer 1. Transaction event A B Digital signature 2.
    [Show full text]
  • Економічний Форум 4/2017 248 Удк 347.336.004 Поліщук В.Г., К.Е.Н
    Економічний форум 4/2017 УДК 347.336.004 Поліщук В.Г., к.е.н. Луцький національний технічний університет ЗАБЕЗПЕЧЕННЯ ФІНАНСОВОЇ БЕЗПЕКИ ПРИ ВИКОРИСТАННІ ІННОВАЦІЙНОЇ КРИПТОВАЛЮТИ BITCOIN У публікації досліджуються передумови виникнення криптовалют, визначено їх основні види. Проаналізовано складності функціонування криптовалют на території України. Визначено ризики, що впливають на фінансову безпеку країни. Ключові слова: криптовалюта, біткойн, біткойн гаманець, фінансова безпека. Polishchuk V. ENSURE FINANCIAL SECURITY BY USING INNOVATIVE CRYPTOCURRENCY BITCOIN In the publication, the premise of the emergence of cryptocurrencies are being investigated, their main types are determined. The complexity of the operation of cryptocurrencies in the territory of Ukraine is analyzed. The risks affecting the financial security of the country are determined. Key words: cryptocurrency, bitcoin, bitcoin wallet, financial security. Полищук В.Г. ОБЕСПЕЧЕНИЕ ФИНАНСОВОЙ БЕЗОПАСНОСТИ ПРИ ИСПОЛЬЗОВАНИИ ИННОВАЦИОННОЙ КРИПТОВАЛЮТЫ BITCOIN В публикации исследуются предпосылки возникновения криптовалют, определены их основные виды. Проанализированы сложности функционирования криптовалют на территории Украины. Определены риски, влияющие на финансовую безопасность страны. Ключевые слова: криптовалюта, биткойн, биткойн кошелек, финансовая безопасность. Постановка проблеми у загальному вигляді і її зв’язок з важливими науковими та практичними завданнями. Криптографія з метою конфіденційних платежів почала використовуватися з 1990 року в системі DigiCash Девіда
    [Show full text]