APPLICATION of BLOCKCHAIN NETWORK for the USE of INFORMATION SHARING by Linir Zamir

Total Page:16

File Type:pdf, Size:1020Kb

APPLICATION of BLOCKCHAIN NETWORK for the USE of INFORMATION SHARING by Linir Zamir APPLICATION OF BLOCKCHAIN NETWORK FOR THE USE OF INFORMATION SHARING by Linir Zamir A Thesis Submitted to the Faculty of The College of Engineering and Computer Science in Partial Fulfillment of the Requirements for the Degree of Master of Science Florida Atlantic University Boca Raton, FL August 2019 Copyright 2019 by Linir Zamir ii ACKNOWLEDGEMENTS I would like to thank my committee members: Dr. Feng-Hao Liu, my commit- tee chair; Dr. Mehrdad Nojoumian and Dr. Elias Bou-Harb for their encouragement, insightful comments and hard questions. I would also like to thank my mother, who supported me with love and understanding. Without you, I could never have made it this far in my academical studies and generally in life. iv ABSTRACT Author: Linir Zamir Title: Application of Blockchain networkfor the use of Information Sharing Institution: Florida Atlantic University Thesis Advisor: Dr. Feng-Hao Liu Degree: Master of Science Year: 2019 The Blockchain concept was originally developed to provide security in the Bitcoin cryptocurrency network, where trust is achieved through the provision of an agreed-upon and immutable record of transactions between parties. The use of a Blockchain as a secure, publicly distributed ledger is applicable to fields beyond finance, and is an emerging area of research across many other fields in the industry. This thesis considers the feasibility of using a Blockchain to facilitate secured infor- mation sharing between parties, where a lack of trust and absence of central control are common characteristics. Implementation of a Blockchain Information Sharing system will be designed on an existing Blockchain network with as a communicative party members sharing secured information. The benefits and risks associated with using a public Blockchain for information sharing will also be discussed. v APPLICATION OF BLOCKCHAIN NETWORK FOR THE USE OF INFORMATION SHARING 1 Introduction .............................. 1 1.1 Preliminaries...............................2 1.1.1 Digital Currency and Cryptocurrency..............2 1.1.2 Blockchain Technology......................2 1.1.3 Bitcoin...............................6 1.1.4 Ethereum.............................8 1.1.5 EOSIO...............................9 1.1.6 Byzantine Generals Problem................... 10 1.1.7 Proof of Work (PoW)....................... 14 1.1.8 Proof of Stake (PoS)....................... 16 1.1.9 Smart Contracts......................... 16 1.1.10 Information Sharing....................... 18 1.2 Problem Definition............................ 20 2 Literature Review ........................... 21 2.1 Protecting Personal Data......................... 21 2.2 Medical Implementation......................... 24 2.3 Technology Implementations....................... 27 2.3.1 Mobile Technology........................ 27 2.3.2 Smart Cars............................ 29 2.3.3 Cybersecurity........................... 30 2.3.4 Big Data.............................. 32 vi 3 Research Methods and Analysis ................... 35 3.1 Prerequisites................................ 35 3.2 Design................................... 37 3.2.1 System Design.......................... 37 3.2.2 Implementation.......................... 39 3.2.3 Testing............................... 41 3.2.4 Types of Data........................... 43 3.3 Analysis.................................. 43 3.3.1 Resources............................. 44 3.3.2 Performance............................ 46 3.3.3 CIA Model............................ 47 3.3.4 STRIDE Model.......................... 48 4 Concluding remarks and future directions . 51 4.1 Conclusion................................. 51 4.2 Future Work................................ 52 Bibliography .............................. 53 vii CHAPTER 1 INTRODUCTION Secured Information Sharing has always been an interest in the Crypto Security community, especially in the recent years with the increase in exposure technology. There are many industries that need to have efficient, and secured Information Sharing as part of their activities. Solving This problem is not an easy task, and it is good to look at different technologies as a possible solution for secured sharing platform. One such platform is the Blockchain. Blockchain technology is an open, decentralized digital ledger where transactions are recorded between people so that the record can't be altered without the alternation of all subsequent blocks on the network. This technology was first introduce in 2008 by a Satashi Nakamoto [1] to serve as the public transaction ledge of the cryptocurrency Bitcoin, a digital currency that has been used ever since. Bitcoin, the decentralized peer-to-peer digital currency, is the most popular example that uses Blockchain technology, but Blockchain technology has worked flawlessly and found wide range of applications in both financial and non-financial world. The wide range of applications include Authentications, Electronic music industry, storage and much more [2]. One possible application for the Blockchain technology is to use it as the platform for Secured Information Sharing. This application has only recently been discussed, and there is much more to learn in that area. 1 1.1 PRELIMINARIES 1.1.1 Digital Currency and Cryptocurrency Digital currency is a payment method which exists only in electronic form and is not tangible. Digital currency is transferred between parties with the help of some algorithm in order to make the transaction secured. Digital currencies can be used to purchase goods and services but can also be restricted to certain online communities such as a gaming or social networks. Digital Currency is the term used to describe all electronic money, that includes both virtual currency and cryptocurrency. It is only available in digital or electronic form and unlike a bill or a coin, it is intangible. This currency is usually decentralized, and the lack of intermediaries means transactions are typically instantaneous and have no or very little fees. Cryptocurrency are currencies that have encryption algorithm as part of its creation. Now a days, many cryptocurrencies operate on a Blockchain decentralized systems without the need for a trusted third-party. Unlike cash, which is entirely anonymous, transactions carried out with cryptocurrencies are stored. 1.1.2 Blockchain Technology Blockchain, as the name suggests, is a chain of blocks that contains information. The first time this type of data structure was introduced was in 1990 by Stuart Habert and W.Scott Strornetta [3] and was originally intended to timestamp digital documents so that it is not possible to temper with them. However, it was mostly unused until it was adapted by an unknown person goes by the name of Satoshi Nakamoto in 2008 [1] as a core component to support transactions of the digital currency, specifically Bitcoin. These transactions are stored on a constantly growing ledger, as new transactions, or blocks, are added to it. Each block includes the 2 cryptographic hash of the prior block (a timestamp and a link), linking the two. The linked blocks form a chain, hence the name 'Blockchain'. Blockchain Technology is based on the idea that each participant has access to a shared ledger. This system provided a reasonable solution to the problem of establishing trust in an unsecured environment without relying on a third-party. This technology gives a solution to a problem with digital cash, the double-spend problem [4], a case where an individual can use the same 'coin' for more than one purchases. Blockchain technology solves the double-spend problem by combining the P2P (peer-to-peer) file sharing technology with public-key cryptography [5] to make a new form of digital money. Coin ownership is recorded in the public ledger and confirmed by cryptographic protocols and the mining community. The Blockchain is trustless in the sense that a user does not need to trust the other party in the transaction, or a central interme- diary, but does need to trust the system: the Blockchain protocol software system. The "blocks" in the chain are groups of transactions posted sequentially to the ledger, that is, added to the "chain". The basic idea behind the Blockchain Technology is that it allows parties to transact digital assets using a P2P network that stores these transactions in a distributed way across the network. The owners of the assets, and the transactions involving change of ownership, are registered on the ledger by the use of public key cryptography and digital signatures. Every transaction is validated by the nodes in the network by employing some kind of a 'consensus mechanism' (a consensus protocol). This works as follows. Whenever a transaction is entered into the P2P network, the nodes first validate the transaction. If the nodes agree on its legitimacy, they confirm the transaction and this decision is laid down in a block. This new block is added to the previous chain of blocks and is then locked. In this way, the latest block maintains a shared, agreed-upon view of the current state of the Blockchain. All transactions are stored in a ledger which all involved nodes hold a copy of. For security reasons, 3 Figure 1.1: Example of Blockchain [6] each block includes the hash of the prior block. The hash is used to identify the information and to ensure the integrity of the data. The linked blocks form a chain, hence the name Blockchain. A ledger contains the shared and agreed-upon state of the Blockchain and the list of transactions that were processed by the nodes. Every
Recommended publications
  • Characterizing Ethereum's Mining Power Decentralization at a Deeper
    Characterizing Ethereum’s Mining Power Decentralization at a Deeper Level Liyi Zeng∗§, Yang Chen†§, Shuo Chen†, Xian Zhang†, Zhongxin Guo†, Wei Xu∗, Thomas Moscibroda‡ ∗Institute for Interdisciplinary Information Sciences, Tsinghua University †Microsoft Research ‡Microsoft Azure §Contacts: [email protected], [email protected] Abstract—For proof-of-work blockchains such as Ethereum, than 50% of the total power has grown from several the mining power decentralization is an important discussion hundred to several thousand. Overall, the power is more point in the community. Previous studies mostly focus on the decentralized at the participant level than 4 years ago. aggregated power of the mining pools, neglecting the pool participants who are the source of the pools’ power. In this paper, However, we also find that this number varied signif- we present the first large-scale study of the pool participants icantly over time, which means it requires continuous in Ethereum’s mining pools. Pool participants are not directly tracking. Additionally, as our current data and method- observable because they communicate with their pools via private ology cannot de-anonymize the participants, it’s possible channels. However, they leave “footprints” on chain as they that some participants split themselves into many smaller use Ethereum accounts to anonymously receive rewards from mining pools. For this study, we combine several data sources ones for various reasons, which could make our estima- to identify 62,358,646 pool reward transactions sent by 47 tion inaccurate if not completely off the target. Further pools to their participants over Ethereum’s entire near 5-year study to improve the estimation accuracy is important.
    [Show full text]
  • Crypto Research Report ‒ April 2019 Edition
    April 2019 Edition VI. “When the Tide Goes Out…” Investments: Gold and Bitcoin, Stronger Together Technical Analysis: Spring Awakening? Cryptocurrency Mining in Theory and Practice Demelza Kelso Hays Mark J. Valek We would like to express our profound gratitude to our premium partners for supporting the Crypto Research Report: www.cryptofunds.li Contents Editorial ............................................................................................................................................... 4 In Case You Were Sleeping: When the Tide Goes Out…............................................................... 5 Back to the Roots ............................................................................................................................................. 6 How Long Will This Bear Market Last .............................................................................................................. 7 A Tragic Story Traverses the World ................................................................................................................. 9 When the tide goes out… ............................................................................................................................... 10 A State Cryptocurrency? ................................................................................................................................ 12 Support is Increasing ..................................................................................................................................... 14
    [Show full text]
  • Beauty Is Not in the Eye of the Beholder
    Insight Consumer and Wealth Management Digital Assets: Beauty Is Not in the Eye of the Beholder Parsing the Beauty from the Beast. Investment Strategy Group | June 2021 Sharmin Mossavar-Rahmani Chief Investment Officer Investment Strategy Group Goldman Sachs The co-authors give special thanks to: Farshid Asl Managing Director Matheus Dibo Shahz Khatri Vice President Vice President Brett Nelson Managing Director Michael Murdoch Vice President Jakub Duda Shep Moore-Berg Harm Zebregs Vice President Vice President Vice President Shivani Gupta Analyst Oussama Fatri Yousra Zerouali Vice President Analyst ISG material represents the views of ISG in Consumer and Wealth Management (“CWM”) of GS. It is not financial research or a product of GS Global Investment Research (“GIR”) and may vary significantly from those expressed by individual portfolio management teams within CWM, or other groups at Goldman Sachs. 2021 INSIGHT Dear Clients, There has been enormous change in the world of cryptocurrencies and blockchain technology since we first wrote about it in 2017. The number of cryptocurrencies has increased from about 2,000, with a market capitalization of over $200 billion in late 2017, to over 8,000, with a market capitalization of about $1.6 trillion. For context, the market capitalization of global equities is about $110 trillion, that of the S&P 500 stocks is $35 trillion and that of US Treasuries is $22 trillion. Reported trading volume in cryptocurrencies, as represented by the two largest cryptocurrencies by market capitalization, has increased sixfold, from an estimated $6.8 billion per day in late 2017 to $48.6 billion per day in May 2021.1 This data is based on what is called “clean data” from Coin Metrics; the total reported trading volume is significantly higher, but much of it is artificially inflated.2,3 For context, trading volume on US equity exchanges doubled over the same period.
    [Show full text]
  • Asymmetric Proof-Of-Work Based on the Generalized Birthday Problem
    Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem Alex Biryukov Dmitry Khovratovich University of Luxembourg University of Luxembourg [email protected] [email protected] Abstract—The proof-of-work is a central concept in modern Long before the rise of Bitcoin it was realized [20] that cryptocurrencies and denial-of-service protection tools, but the the dedicated hardware can produce a proof-of-work much requirement for fast verification so far made it an easy prey for faster and cheaper than a regular desktop or laptop. Thus the GPU-, ASIC-, and botnet-equipped users. The attempts to rely on users equipped with such hardware have an advantage over memory-intensive computations in order to remedy the disparity others, which eventually led the Bitcoin mining to concentrate between architectures have resulted in slow or broken schemes. in a few hardware farms of enormous size and high electricity In this paper we solve this open problem and show how to consumption. An advantage of the same order of magnitude construct an asymmetric proof-of-work (PoW) based on a compu- is given to “owners” of large botnets, which nowadays often tationally hard problem, which requires a lot of memory to gen- accommodate hundreds of thousands of machines. For prac- erate a proof (called ”memory-hardness” feature) but is instant tical DoS protection, this means that the early TLS puzzle to verify. Our primary proposal Equihash is a PoW based on the schemes [8], [17] are no longer effective against the most generalized birthday problem and enhanced Wagner’s algorithm powerful adversaries.
    [Show full text]
  • Zcash Protocol Speci Cation
    Zcash Protocol Specication Version 2018.0-beta-14 Daira Hopwood† Sean Bowe† — Taylor Hornby† — Nathan Wilcox† March 11, 2018 Abstract. Zcash is an implementation of the Decentralized Anonymous Payment scheme Zerocash, with security xes and adjustments to terminology, functionality and performance. It bridges the exist- ing transparent payment scheme used by Bitcoin with a shielded payment scheme secured by zero- knowledge succinct non-interactive arguments of knowledge (zk-SNARKs). It attempts to address the problem of mining centralization by use of the Equihash memory-hard proof-of-work algorithm. This specication denes the Zcash consensus protocol and explains its differences from Zerocash and Bitcoin. Keywords: anonymity, applications, cryptographic protocols, electronic commerce and payment, nancial privacy, proof of work, zero knowledge. Contents 1 1 Introduction 5 1.1 Caution . .5 1.2 High-level Overview . .5 2 Notation 7 3 Concepts 8 3.1 Payment Addresses and Keys . .8 3.2 Notes...........................................................9 3.2.1 Note Plaintexts and Memo Fields . .9 3.3 The Block Chain . 10 3.4 Transactions and Treestates . 10 3.5 JoinSplit Transfers and Descriptions . 11 3.6 Note Commitment Trees . 11 3.7 Nullier Sets . 12 3.8 Block Subsidy and Founders’ Reward . 12 3.9 Coinbase Transactions . 12 † Zerocoin Electric Coin Company 1 4 Abstract Protocol 12 4.1 Abstract Cryptographic Schemes . 12 4.1.1 Hash Functions . 12 4.1.2 Pseudo Random Functions . 13 4.1.3 Authenticated One-Time Symmetric Encryption . 13 4.1.4 Key Agreement . 13 4.1.5 Key Derivation . 14 4.1.6 Signature . 15 4.1.6.1 Signature with Re-Randomizable Keys .
    [Show full text]
  • Security Distributed and Networking Systems (507 Pages)
    Security in ................................ i Distri buted and /Networking.. .. Systems, . .. .... SERIES IN COMPUTER AND NETWORK SECURITY Series Editors: Yi Pan (Georgia State Univ., USA) and Yang Xiao (Univ. of Alabama, USA) Published: Vol. 1: Security in Distributed and Networking Systems eds. Xiao Yang et al. Forthcoming: Vol. 2: Trust and Security in Collaborative Computing by Zou Xukai et al. Steven - Security Distributed.pmd 2 5/25/2007, 1:58 PM Computer and Network Security Vol. 1 Security in i Distri buted and /Networking . Systems Editors Yang Xiao University of Alabama, USA Yi Pan Georgia State University, USA World Scientific N E W J E R S E Y • L O N D O N • S I N G A P O R E • B E I J I N G • S H A N G H A I • H O N G K O N G • TA I P E I • C H E N N A I Published by World Scientific Publishing Co. Pte. Ltd. 5 Toh Tuck Link, Singapore 596224 USA office: 27 Warren Street, Suite 401-402, Hackensack, NJ 07601 UK office: 57 Shelton Street, Covent Garden, London WC2H 9HE British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. SECURITY IN DISTRIBUTED AND NETWORKING SYSTEMS Series in Computer and Network Security — Vol. 1 Copyright © 2007 by World Scientific Publishing Co. Pte. Ltd. All rights reserved. This book, or parts thereof, may not be reproduced in any form or by any means, electronic or mechanical, including photocopying, recording or any information storage and retrieval system now known or to be invented, without written permission from the Publisher.
    [Show full text]
  • State of the Art: the Monero Cryptocurrency Mining Malware Detection Using Supervised Machine Learning Algorithms
    International Journal of Applied Science and Engineering State of the art: The monero cryptocurrency mining malware detection using supervised machine learning algorithms Wilfridus Bambang Triadi Handaya1*, Mohd Najwadi Yusoff 2, Aman Jantan2 1 Department of Informatics, Universitas Atma Jaya Yogyakarta, Daerah Istimewa Yogyakarta, Indonesia 2 School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia ABSTRACT Today’s evolving information technology trend is fuelling increasingly various cybercrime. Various cybercrime types, such as malware attacks and data breach activities, organizations, and countries, occur every day. Malware is one of the biggest cyber threats on the Internet today. Every year, the number of data breaches continues to increase. Mining is a complete cryptocurrency network’s computing process to verify transaction records, called blockchains, and receive digital coins in return. This mining process requires severe hardware and significant CPU resources to create cryptocurrencies. A statistic published by Statista in mid-2020 about the most detected crypto-mining malware types influencing corporate networks global from January to June 2020, it can be seen that cryptocurrency mining activity leading to the pool of Monero amounts to 46% derived from the use of XMRig. Malware detection is like an endless war between malware authors and malware prevention vendors. This trend change also makes the procedures and forms of analysis must adapt. From previously done manually with various tools for static analysis, to be OPEN ACCESS subsequently replaced with automatic analysis through the application of machine learning algorithms. Received: October 9, 2020 Revised: December 20, 2020 Keywords: Malware detection, XMRig, Monero, Cryptocurrencies, Mining. Accepted: January 6, 2021 Corresponding Author: Wilfridus Bambang Triadi Handaya 1.
    [Show full text]
  • Distributed Computing Network System, Said to Be "Distributed" When the Computer Programming and the Data to Be Worked on Are Spread out Over More Than One Computer
    Praveen Balda et al, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.4, April- 2015, pg. 761-767 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 4, Issue. 4, April 2015, pg.761 – 767 RESEARCH ARTICLE Security Enhancement in Distributed Networking Praveen Balda, Sh. Matish Garg Distributed Networking is a distributed computing network system, said to be "distributed" when the computer programming and the data to be worked on are spread out over more than one computer. Usually, this is implemented over a network. Prior to the emergence of low-cost desktop computer power, computing was generally centralized to one computer. Although such centers still exist, distribution networking applications and data operate more efficiently over a mix of desktop workstations, local area network servers, regional servers, Web servers, and other servers. One popular trend is client/server computing. This is the principle that a client computer can provide certain capabilities for a user and request others from other computers that provide services for the clients. (The Web's Hypertext Transfer Protocol is an example of this idea.) Enterprises that have grown in scale over the years and those that are continuing to grow are finding it extremely challenging to manage their distributed network in the traditional client/server computing model. The recent developments in the field of cloud computing has opened up new possibilities. Cloud-based networking vendors have started to sprout offering solutions for enterprise distributed networking needs.
    [Show full text]
  • LIST of NOSQL DATABASES [Currently 150]
    Your Ultimate Guide to the Non - Relational Universe! [the best selected nosql link Archive in the web] ...never miss a conceptual article again... News Feed covering all changes here! NoSQL DEFINITION: Next Generation Databases mostly addressing some of the points: being non-relational, distributed, open-source and horizontally scalable. The original intention has been modern web-scale databases. The movement began early 2009 and is growing rapidly. Often more characteristics apply such as: schema-free, easy replication support, simple API, eventually consistent / BASE (not ACID), a huge amount of data and more. So the misleading term "nosql" (the community now translates it mostly with "not only sql") should be seen as an alias to something like the definition above. [based on 7 sources, 14 constructive feedback emails (thanks!) and 1 disliking comment . Agree / Disagree? Tell me so! By the way: this is a strong definition and it is out there here since 2009!] LIST OF NOSQL DATABASES [currently 150] Core NoSQL Systems: [Mostly originated out of a Web 2.0 need] Wide Column Store / Column Families Hadoop / HBase API: Java / any writer, Protocol: any write call, Query Method: MapReduce Java / any exec, Replication: HDFS Replication, Written in: Java, Concurrency: ?, Misc: Links: 3 Books [1, 2, 3] Cassandra massively scalable, partitioned row store, masterless architecture, linear scale performance, no single points of failure, read/write support across multiple data centers & cloud availability zones. API / Query Method: CQL and Thrift, replication: peer-to-peer, written in: Java, Concurrency: tunable consistency, Misc: built-in data compression, MapReduce support, primary/secondary indexes, security features.
    [Show full text]
  • High Performance with Distributed Caching
    High Performance with Distributed Caching Key Requirements For Choosing The Right Solution High Performance with Distributed Caching: Key Requirements for Choosing the Right Solution Table of Contents Executive summary 3 Companies are choosing Couchbase for their caching layer, and much more 3 Memory-first 4 Persistence 4 Elastic scalability 4 Replication 5 More than caching 5 About this guide 5 Memcached and Oracle Coherence – two popular caching solutions 6 Oracle Coherence 6 Memcached 6 Why cache? Better performance, lower costs 6 Common caching use cases 7 Key requirements for an effective distributed caching solution 8 Problems with Oracle Coherence: cost, complexity, capabilities 8 Memcached: A simple, powerful open source cache 10 Lack of enterprise support, built-in management, and advanced features 10 Couchbase Server as a high-performance distributed cache 10 General-purpose NoSQL database with Memcached roots 10 Meets key requirements for distributed caching 11 Develop with agility 11 Perform at any scale 11 Manage with ease 12 Benchmarks: Couchbase performance under caching workloads 12 Simple migration from Oracle Coherence or Memcached to Couchbase 13 Drop-in replacement for Memcached: No code changes required 14 Migrating from Oracle Coherence to Couchbase Server 14 Beyond caching: Simplify IT infrastructure, reduce costs with Couchbase 14 About Couchbase 14 Caching has become Executive Summary a de facto technology to boost application For many web, mobile, and Internet of Things (IoT) applications that run in clustered performance as well or cloud environments, distributed caching is a key requirement, for reasons of both as reduce costs. performance and cost. By caching frequently accessed data in memory – rather than making round trips to the backend database – applications can deliver highly responsive experiences that today’s users expect.
    [Show full text]
  • Understanding the Motivations, Challenges and Needs of Blockchain Software Developers: a Survey
    Empirical Software Engineering manuscript No. (will be inserted by the editor) Understanding the Motivations, Challenges and Needs of Blockchain Software Developers: A Survey Amiangshu Bosu · Anindya Iqbal · Rifat Shahriyar · Partha Chakroborty Received: November 6, 2018 / Accepted: March 19, 2019 Abstract The blockchain technology has potential applications in various areas such as smart-contracts, Internet of Things (IoT), land registry, supply chain man- agement, storing medical data, and identity management. Although the Github currently hosts more than six thousand active Blockchain software (BCS) projects, few software engineering research has investigated these projects and its' contrib- utors. Although the number of BCS projects is growing rapidly, the motivations, challenges, and needs of BCS developers remain a puzzle. Therefore, the primary objective of this study is to understand the motivations, challenges, and needs of BCS developers and analyze the differences between BCS and non-BCS development. On this goal, we sent an online survey to 1,604 active BCS developers identified via mining the Github repositories of 145 popular BCS projects. The survey received 156 responses that met our criteria for analysis. The results suggest that the majority of the BCS developers are experienced in non-BCS development and are primarily motivated by the ideology of creating a decentralized financial system. Although most of the BCS projects are Open Source Software (OSS) projects by nature, more than 93% of our respondents found BCS development somewhat different from a non-BCS development as BCS projects have higher emphasis on security and reliability than most of the non- BCS projects. Other differences include: higher costs of defects, decentralized and hostile environment, technological complexity, and difficulty in upgrading the soft- ware after release.
    [Show full text]
  • Coinbase Explores Crypto ETF (9/6) Coinbase Spoke to Asset Manager Blackrock About Creating a Crypto ETF, Business Insider Reports
    Crypto Week in Review (9/1-9/7) Goldman Sachs CFO Denies Crypto Strategy Shift (9/6) GS CFO Marty Chavez addressed claims from an unsubstantiated report earlier this week that the firm may be delaying previous plans to open a crypto trading desk, calling the report “fake news”. Coinbase Explores Crypto ETF (9/6) Coinbase spoke to asset manager BlackRock about creating a crypto ETF, Business Insider reports. While the current status of the discussions is unclear, BlackRock is said to have “no interest in being a crypto fund issuer,” and SEC approval in the near term remains uncertain. Looking ahead, the Wednesday confirmation of Trump nominee Elad Roisman has the potential to tip the scales towards a more favorable cryptoasset approach. Twitter CEO Comments on Blockchain (9/5) Twitter CEO Jack Dorsey, speaking in a congressional hearing, indicated that blockchain technology could prove useful for “distributed trust and distributed enforcement.” The platform, given its struggles with how best to address fraud, harassment, and other misuse, could be a prime testing ground for decentralized identity solutions. Ripio Facilitates Peer-to-Peer Loans (9/5) Ripio began to facilitate blockchain powered peer-to-peer loans, available to wallet users in Argentina, Mexico, and Brazil. The loans, which utilize the Ripple Credit Network (RCN) token, are funded in RCN and dispensed to users in fiat through a network of local partners. Since all details of the loan and payments are recorded on the Ethereum blockchain, the solution could contribute to wider access to credit for the unbanked. IBM’s Payment Protocol Out of Beta (9/4) Blockchain World Wire, a global blockchain based payments network by IBM, is out of beta, CoinDesk reports.
    [Show full text]