Blockchain for Dummies

Total Page:16

File Type:pdf, Size:1020Kb

Blockchain for Dummies Blockchain For Dummies® Published by: John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, www.wiley.com Copyright © 2017 by John Wiley & Sons, Inc., Hoboken, New Jersey Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions . Trademarks: Wiley, For Dummies, the Dummies Man logo, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ. For general information on our other products and services, please contact our Customer Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002. For technical support, please visit https://hub.wiley.com/community/support/dummies . Wiley publishes in a variety of print and electronic formats and by print-on- demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com . For more information about Wiley products, visit www.wiley.com . Library of Congress Control Number: 2017936813 ISBN 978-1-119-36559-4 (pbk); ISBN 978-1-119-36561-7 (ebk); ISBN 978- 1-119-36560-0 (ebk) Blockchain For Dummies® To view this book's Cheat Sheet, simply go to www.dummies.com and search for “Blockchain For Dummies Cheat Sheet” in the Search box. Table of Contents Cover Introduction About This Book Foolish Assumptions Icons Used in This Book Beyond the Book Where to Go from Here Part 1: Getting Started with Blockchain Chapter 1: Introducing Blockchain Beginning at the Beginning: What Blockchains Are The Structure of Blockchains Blockchain Applications The Blockchain Life Cycle Consensus: The Driving Force of Blockchains Blockchains in Use Chapter 2: Picking a Blockchain Where Blockchains Add Substance Choosing a Solution Chapter 3: Getting Your Hands on Blockchain Diving into the Bitcoin Blockchain Using Smart Contracts with Bitcoin Building a Private Blockchain with Docker and Ethereum Part 2: Developing Your Knowledge Chapter 4: Beholding the Bitcoin Blockchain Getting a Brief History of the Bitcoin Blockchain Debunking Some Common Bitcoin Misconceptions Bitcoin: The New Wild West Mining for Bitcoins Making Your First Paper Wallet Chapter 5: Encountering the Ethereum Blockchain Exploring the Brief History of Ethereum Ethereum: The Open-Source World Wide Computer Hacking a Blockchain Getting Up and Running on Ethereum Building Your First Decentralized Autonomous Organization Uncovering the Future of DAOs Chapter 6: Regarding the Ripple Blockchain Getting a Brief History of the Ripple Blockchain Ripple: It’s All About Trust Seeing How Ripple Differs from Other Blockchains Unleashing the Full Power of Ripple Exercising Caution with Ripple Chapter 7: Finding the Factom Blockchain A Matter of Trust Building on Factom Chapter 8: Digging into DigiByte Getting Familiar with DigiByte: The Fast Blockchain Mining on DigiByte Signing Documents on DigiByte’s DiguSign Earning DigiBytes While Gaming Part 3: Powerful Blockchain Platforms Chapter 9: Getting Your Hands on Hyperledger Getting to Know Hyperledger: Dreams of a Hyper Future Focusing on Fabric Investigating the Iroha Project Diving into Sawtooth Lake Chapter 10: Applying Microsoft Azure Bletchley: The Modular Blockchain Fabric Building in the Azure Ecosystem Getting Started with Chain on Azure Deploying Blockchain Tools on Azure Chapter 11: Getting Busy on IBM Bluemix Business Blockchain on Bluemix Watson’s Smart Blockchain Building Your Starter Network on Big Blue Part 4: Industry Impacts Chapter 12: Financial Technology Hauling Out Your Crystal Ball: Future Banking Trends Going International: Global Financial Products Squeezing Out Fraud Chapter 13: Real Estate Eliminating Title Insurance Mortgages in the Blockchain World Forecasting Regional Trends Chapter 14: Insurance Precisely Tailoring Coverage Witnessing for You: The Internet of Things Taking Out the Third Party in Insurance Chapter 15: Government The Smart Cities of Asia The Battle for the Financial Capital of the World Securing the World’s Borders Chapter 16: Other Industries Lean Governments The Trust Layer for the Internet Oracle of the Blockchain Part 5: The Part of Tens Chapter 17: Ten Free Blockchain Resources Factom University Ethereum 101 Build on Ripple Programmable Money by Ripple DigiKnow Blockchain University Bitcoin Core Blockchain Alliance Multichain Blog HiveMind Chapter 18: The Ten Rules to Never Break on the Blockchain Don’t Use Cryptocurrency or Blockchains to Skirt the Law Keep Your Contracts as Simple as Possible Publish with Great Caution Back Up, Back Up, Back Up Your Private Keys Triple-Check the Address Before Sending Currency Take Care When Using Exchanges Beware Wi-Fi Identify Your Blockchain Dev Don’t Get Suckered Don’t Trade Tokens Unless You Know What You’re Doing Chapter 19: Ten Top Blockchain Projects The R3 Consortium T ZERO: Overstocking the Stock Market Blockstream’s Distributed Systems OpenBazaar’s Blockchain Code Valley: Find Your Coder Bitfury’s Digital Assets Any Coin Can ShapeShift Machine-Payable Apps on 21 Anonymous Transactions on Dash ConsenSys: Decentralized Applications About the Author Advertisement Page Connect with Dummies End User License Agreement Guide Cover Table of Contents Begin Reading Introduction Welcome to Blockchain For Dummies! If you want to find out what blockchains are and the basics of how to use them, this is the book for you. Many people think blockchains are difficult to understand. They might also think that blockchains are just about cryptocurrencies like Bitcoin, but they’re are so much more. Anyone can master the basics of blockchains. In this book, you find helpful advice for navigating the blockchain world and cryptocurrencies that run them. You also find practical step-by-step tutorials that will build your understanding of how blockchains work and where they add value. You don’t need a background in programming, economics, or world affairs to understand this book, but I do touch on all these subjects because blockchain technology intersects all of them. About This Book This book explains the basics of blockchains, smart contracts, and cryptocurrencies. You probably picked up this book because you’ve heard about blockchains, know they’re important, but have no idea what they are, how they work, or why you should care. This book answers all these questions in easy-to-understand terms. This book is a bit different than just about any other blockchain book on the market. It provides a survey of all the key blockchains in the public market, how they work, what they do, and something useful you can try with them today. This book also covers the landscape of blockchain technology and points out some of the key things to be aware of for your own blockchain projects. Here, you find out how to install an Ethereum wallet, create and execute a smart contract, make entries into Bitcoin and Factom, and earn cryptocurrencies. You don’t have to read the book cover to cover. Just flip to the subject that you’re interested in. Finally, within this book, you may note that some web addresses break across two lines of text. If you’re reading this book in print and want to visit one of these web pages, simply key in the web address exactly as it’s noted in the text, pretending as though the line break doesn’t exist. If you’re reading this as an e-book, you’ve got it easy — just click the web address to be taken directly to the web page. Foolish Assumptions I don’t make many assumptions about you and your experience with cryptocurrency, programing, and legal matters but I do assume the following: You have a computer and access to the Internet. You know the basics of how to use your computer and the Internet. You know how to navigate through menus within programs.
Recommended publications
  • The Internet and Drug Markets
    INSIGHTS EN ISSN THE INTERNET AND DRUG MARKETS 2314-9264 The internet and drug markets 21 The internet and drug markets EMCDDA project group Jane Mounteney, Alessandra Bo and Alberto Oteo 21 Legal notice This publication of the European Monitoring Centre for Drugs and Drug Addiction (EMCDDA) is protected by copyright. The EMCDDA accepts no responsibility or liability for any consequences arising from the use of the data contained in this document. The contents of this publication do not necessarily reflect the official opinions of the EMCDDA’s partners, any EU Member State or any agency or institution of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). More information on the European Union is available on the internet (http://europa.eu). Luxembourg: Publications Office of the European Union, 2016 ISBN: 978-92-9168-841-8 doi:10.2810/324608 © European Monitoring Centre for Drugs and Drug Addiction, 2016 Reproduction is authorised provided the source is acknowledged. This publication should be referenced as: European Monitoring Centre for Drugs and Drug Addiction (2016), The internet and drug markets, EMCDDA Insights 21, Publications Office of the European Union, Luxembourg. References to chapters in this publication should include, where relevant, references to the authors of each chapter, together with a reference to the wider publication. For example: Mounteney, J., Oteo, A. and Griffiths, P.
    [Show full text]
  • Virtual Currencies and Terrorist Financing : Assessing the Risks And
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT FOR CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS COUNTER-TERRORISM Virtual currencies and terrorist financing: assessing the risks and evaluating responses STUDY Abstract This study, commissioned by the European Parliament’s Policy Department for Citizens’ Rights and Constitutional Affairs at the request of the TERR Committee, explores the terrorist financing (TF) risks of virtual currencies (VCs), including cryptocurrencies such as Bitcoin. It describes the features of VCs that present TF risks, and reviews the open source literature on terrorist use of virtual currencies to understand the current state and likely future manifestation of the risk. It then reviews the regulatory and law enforcement response in the EU and beyond, assessing the effectiveness of measures taken to date. Finally, it provides recommendations for EU policymakers and other relevant stakeholders for ensuring the TF risks of VCs are adequately mitigated. PE 604.970 EN ABOUT THE PUBLICATION This research paper was requested by the European Parliament's Special Committee on Terrorism and was commissioned, overseen and published by the Policy Department for Citizens’ Rights and Constitutional Affairs. Policy Departments provide independent expertise, both in-house and externally, to support European Parliament committees and other parliamentary bodies in shaping legislation and exercising democratic scrutiny over EU external and internal policies. To contact the Policy Department for Citizens’ Rights and Constitutional Affairs or to subscribe to its newsletter please write to: [email protected] RESPONSIBLE RESEARCH ADMINISTRATOR Kristiina MILT Policy Department for Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] AUTHORS Tom KEATINGE, Director of the Centre for Financial Crime and Security Studies, Royal United Services Institute (coordinator) David CARLISLE, Centre for Financial Crime and Security Studies, Royal United Services Institute, etc.
    [Show full text]
  • Crypto Research Report ‒ April 2019 Edition
    April 2019 Edition VI. “When the Tide Goes Out…” Investments: Gold and Bitcoin, Stronger Together Technical Analysis: Spring Awakening? Cryptocurrency Mining in Theory and Practice Demelza Kelso Hays Mark J. Valek We would like to express our profound gratitude to our premium partners for supporting the Crypto Research Report: www.cryptofunds.li Contents Editorial ............................................................................................................................................... 4 In Case You Were Sleeping: When the Tide Goes Out…............................................................... 5 Back to the Roots ............................................................................................................................................. 6 How Long Will This Bear Market Last .............................................................................................................. 7 A Tragic Story Traverses the World ................................................................................................................. 9 When the tide goes out… ............................................................................................................................... 10 A State Cryptocurrency? ................................................................................................................................ 12 Support is Increasing ..................................................................................................................................... 14
    [Show full text]
  • Beauty Is Not in the Eye of the Beholder
    Insight Consumer and Wealth Management Digital Assets: Beauty Is Not in the Eye of the Beholder Parsing the Beauty from the Beast. Investment Strategy Group | June 2021 Sharmin Mossavar-Rahmani Chief Investment Officer Investment Strategy Group Goldman Sachs The co-authors give special thanks to: Farshid Asl Managing Director Matheus Dibo Shahz Khatri Vice President Vice President Brett Nelson Managing Director Michael Murdoch Vice President Jakub Duda Shep Moore-Berg Harm Zebregs Vice President Vice President Vice President Shivani Gupta Analyst Oussama Fatri Yousra Zerouali Vice President Analyst ISG material represents the views of ISG in Consumer and Wealth Management (“CWM”) of GS. It is not financial research or a product of GS Global Investment Research (“GIR”) and may vary significantly from those expressed by individual portfolio management teams within CWM, or other groups at Goldman Sachs. 2021 INSIGHT Dear Clients, There has been enormous change in the world of cryptocurrencies and blockchain technology since we first wrote about it in 2017. The number of cryptocurrencies has increased from about 2,000, with a market capitalization of over $200 billion in late 2017, to over 8,000, with a market capitalization of about $1.6 trillion. For context, the market capitalization of global equities is about $110 trillion, that of the S&P 500 stocks is $35 trillion and that of US Treasuries is $22 trillion. Reported trading volume in cryptocurrencies, as represented by the two largest cryptocurrencies by market capitalization, has increased sixfold, from an estimated $6.8 billion per day in late 2017 to $48.6 billion per day in May 2021.1 This data is based on what is called “clean data” from Coin Metrics; the total reported trading volume is significantly higher, but much of it is artificially inflated.2,3 For context, trading volume on US equity exchanges doubled over the same period.
    [Show full text]
  • 1 BIDDER BEWARE TOWARD a FRAUD-FREE MARKETPLACE – BEST PRACTICES for the ONLINE AUCTION INDUSTRY Paula Selis Anita Ramasastry
    BIDDER BEWARE TOWARD A FRAUD-FREE MARKETPLACE – BEST PRACTICES FOR THE ONLINE AUCTION INDUSTRY Paula Selis* Anita Ramasastry** Charles S. Wright*** Abstract: This report presents to businesses, consumers and government officials (including law enforcement) a “menu of options” for combating fraud in the online auction industry. By directly interviewing several major online auction sites and cataloging the features of other sites, the Washington Attorney General’s Office, in conjunction with the Center for Law Commerce and Technology at the University of Washington Law School, has attempted to identify a series of “best practices” in the online auction industry. The results of these interviews as well as findings from investigation of current practices on the Web are presented here. By identifying the most successful, innovative, and feasible practices, this report seeks to maximize the reach of industry solutions and thereby promote industry-wide self-regulation. Standardization is a powerful tool for eradicating fraud across the industry. However, divergent business models and differing consumer needs mean that there is no one size that fits all models. This report presents a pro-active collaboration between enforcement agencies, industry, and academia. It also suggests a menu of best practices from which users might choose to suit their needs, and invites comment, critique and improvement upon those practices. INTRODUCTION Produced by the Washington State Attorney General’s office and the Center for Law Commerce and Technology at the University of Washington Law School, this report surveys the current range of responses to the problem of online auction fraud. This report presents the results of that survey in the form of a menu of options for businesses and consumers.
    [Show full text]
  • RISL) Procurement
    Draft RFP for Selection201 of System7 Integrator for Rate Contract for establishment of IT Infrastructure for enabling Digital Payments cument History Overview Procurement PolicyRajCOMP Manual for RajCOMP Info Info Services Services Limited Limited Document Title RajCOMP Info Services Limited- Manual on Policies and Procedures for(RISL) Procurement Document Final Status Abstract This documentDraft provides RFP a forbroad Selection framework and ofguidelines System for RajCOMP Integrator Info for Services LimitedRate Staff inContract carrying out various for procurement establishment activities. of IT Infrastructure for enabling Digital Payments based on Open Competitive Bidding through e- Document Publication HistoryProcurement/ e-Tender Date Author Version Remark th 17 February 2011 Dr. S.S. Vaishnava V3 Final Version Distribution Version Name Location Final MD RajComp Info Services Limited RajComp Info Services Limited office, Jaipur Secretary (IT) RajComp Info Services Limited office, Jaipur Table of Contents Page 1 of 95 Draft RFP for Selection of System Integrator for Rate Contract for establishment of IT Infrastructure for enabling Digital Payments TABLE OF CONTENTS ABBREVIATIONS & DEFINITIONS ................................................................................................................................. 6 1. INVITATION FOR BID (IFB)& NOTICE INVITING BID (NIB) ....................................................................................... 9 2. PROJECT PROFILE &BACKGROUND INFORMATION ...........................................................................................
    [Show full text]
  • Pwc I 2Nd Global Crypto M&A and Fundraising Report
    2nd Global Crypto M&A and Fundraising Report April 2020 2 PwC I 2nd Global Crypto M&A and Fundraising Report Dear Clients and Friends, We are proud to launch the 2nd edition of our Global Crypto M&A and Fundraising Report. We hope that the market colour and insights from this report will be useful data points. We will continue to publish this report twice a year to enable you to monitor the ongoing trends in the crypto ecosystem. PwC has put together a “one stop shop” offering, focused on crypto services across our various lines of services in over 25 jurisdictions, including the most active crypto jurisdictions. Our goal is to service your needs in the best possible way leveraging the PwC network and allowing you to make your project a success. Our crypto clients include crypto exchanges, crypto investors, crypto asset managers, ICOs/IEOs/STOs/stable and asset backed tokens, traditional financial institutions entering the crypto space as well as governments, central banks, regulators and other policy makers looking at the crypto ecosystem. As part of our “one stop shop” offering, we provide an entire range of services to the crypto ecosystem including strategy, legal, regulatory, accounting, tax, governance, risk assurance, audit, cybersecurity, M&A advisory as well as capital raising. More details are available on our global crypto page as well as at the back of this report. 2nd Global Crypto M&A and Fundraising Report April 2020 PwC 2 3 PwC I 2nd Global Crypto M&A and Fundraising Report 5 Key takeaways when comparing 2018 vs 2019 There
    [Show full text]
  • Asymmetric Proof-Of-Work Based on the Generalized Birthday Problem
    Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem Alex Biryukov Dmitry Khovratovich University of Luxembourg University of Luxembourg [email protected] [email protected] Abstract—The proof-of-work is a central concept in modern Long before the rise of Bitcoin it was realized [20] that cryptocurrencies and denial-of-service protection tools, but the the dedicated hardware can produce a proof-of-work much requirement for fast verification so far made it an easy prey for faster and cheaper than a regular desktop or laptop. Thus the GPU-, ASIC-, and botnet-equipped users. The attempts to rely on users equipped with such hardware have an advantage over memory-intensive computations in order to remedy the disparity others, which eventually led the Bitcoin mining to concentrate between architectures have resulted in slow or broken schemes. in a few hardware farms of enormous size and high electricity In this paper we solve this open problem and show how to consumption. An advantage of the same order of magnitude construct an asymmetric proof-of-work (PoW) based on a compu- is given to “owners” of large botnets, which nowadays often tationally hard problem, which requires a lot of memory to gen- accommodate hundreds of thousands of machines. For prac- erate a proof (called ”memory-hardness” feature) but is instant tical DoS protection, this means that the early TLS puzzle to verify. Our primary proposal Equihash is a PoW based on the schemes [8], [17] are no longer effective against the most generalized birthday problem and enhanced Wagner’s algorithm powerful adversaries.
    [Show full text]
  • Piecework: Generalized Outsourcing Control for Proofs of Work
    (Short Paper): PieceWork: Generalized Outsourcing Control for Proofs of Work Philip Daian1, Ittay Eyal1, Ari Juels2, and Emin G¨unSirer1 1 Department of Computer Science, Cornell University, [email protected],[email protected],[email protected] 2 Jacobs Technion-Cornell Institute, Cornell Tech [email protected] Abstract. Most prominent cryptocurrencies utilize proof of work (PoW) to secure their operation, yet PoW suffers from two key undesirable prop- erties. First, the work done is generally wasted, not useful for anything but the gleaned security of the cryptocurrency. Second, PoW is natu- rally outsourceable, leading to inegalitarian concentration of power in the hands of few so-called pools that command large portions of the system's computation power. We introduce a general approach to constructing PoW called PieceWork that tackles both issues. In essence, PieceWork allows for a configurable fraction of PoW computation to be outsourced to workers. Its controlled outsourcing allows for reusing the work towards additional goals such as spam prevention and DoS mitigation, thereby reducing PoW waste. Meanwhile, PieceWork can be tuned to prevent excessive outsourcing. Doing so causes pool operation to be significantly more costly than today. This disincentivizes aggregation of work in mining pools. 1 Introduction Distributed cryptocurrencies such as Bitcoin [18] rely on the equivalence \com- putation = money." To generate a batch of coins, clients in a distributed cryp- tocurrency system perform an operation called mining. Mining requires solving a computationally intensive problem involving repeated cryptographic hashing. Such problem and its solution is called a Proof of Work (PoW) [11]. As currently designed, nearly all PoWs suffer from one of two drawbacks (or both, as in Bitcoin).
    [Show full text]
  • Advance Warning an Introduction to Drop Catching
    2 Advance warning The Initial Coin Offering (“ICO”) project presented by the company DomRaider is an unregulated fundraising operation. It poses several risks to buyers, in particular, that of losing all amounts traded for tokens issued by DomRaider. Only people who are fully aware of these risks should participate in the ICO. Note also that the ICO excludes certain groups of people such as consumers and “U.S. Person” (within the meaning of “Regulation S” of the Securities Act 1933 in U.S. law), Canadian and Singapore citizen”. An introduction to Drop Catching The secondary market for domain names Presently, there are close to 330 million active domain names throughout the world (see: https://investor.verisign.com/releasedetail.cfm?releaseid=1015020). They are divided into approximately 2,500 domain name extensions or TLDs (Top-Level Domains). ICANN (The Internet Corporation for Assigned Names and Numbers), the non- profit regulatory organization, has delegated their management to different registries throughout the world, including: • 300 generic domain name extensions (.com, .net, .org,….) • 260 country code domain name extensions (.cn, .de, .co.uk, .fr,….) • 1,930 new domain name extensions (.club, .xyz, .global,….) created in 2012 by ICANN and launched since 2014. 3 DISTRIBUTION OF THE DOMAIN NAMES IN MILLIONS 400 350 28 11 300 38 4 36 35 250 131 200 127 119 150 100 141 141 124 50 0 2014 2015 2016 ccTLD’s .com Other historical TLD’s nTLD‘S The worldwide market has been driven by new gTLDs (Generic Top-Level Domains: which correspond to extensions such as .com, .net, etc…) wich grew by 6.8% in 2017.
    [Show full text]
  • TRUST, but VERIFY: WHY the BLOCKCHAIN NEEDS the LAW Kevin Werbach†
    TRUST, BUT VERIFY: WHY THE BLOCKCHAIN NEEDS THE LAW Kevin Werbach† ABSTRACT The blockchain could be the most consequential development in information technology since the Internet. Created to support the Bitcoin digital currency, the blockchain is actually something deeper: a novel solution to the age-old human problem of trust. Its potential is extraordinary. Yet, this approach may not promote trust at all without effective governance. Wholly divorced from legal enforcement, blockchain-based systems may be counterproductive or even dangerous. And they are less insulated from the law’s reach than it seems. The central question is not how to regulate blockchains but how blockchains regulate. They may supplement, complement, or substitute for legal enforcement. Excessive or premature application of rigid legal obligations will stymie innovation and forego opportunities to leverage technology to achieve public policy objectives. Blockchain developers and legal institutions can work together. Each must recognize the unique affordances of the other system. DOI: https://doi.org/10.15779/Z38H41JM9N © 2018 Kevin Werbach. † Associate Professor of Legal Studies and Business Ethics, The Wharton School, University of Pennsylvania. Email: [email protected]. Thanks to Dan Hunter for collaborating to develop the ideas that gave rise to this Article, and to Sarah Light, Patrick Murck, and participants in the 2017 Lastowka Cyberlaw Colloquium and 2016 TPRC Conference for comments on earlier drafts. 488 BERKELEY TECHNOLOGY LAW JOURNAL [Vol. 33:487
    [Show full text]
  • Using Blockchain Technology to Secure the Internet of Things
    Using Blockchain Technology to Secure the Internet of Things Presented by the Blockchain/ Distributed Ledger Working Group © 2018 Cloud Security Alliance – All Rights Reserved. You may download, store, display on your computer, view, print, and link to Using Blockchain Technology to Secure the Internet of Things subject to the following: (a) the Document may be used solely for your personal, informational, non- commercial use; (b) the Report may not be modified or altered in any way; (c) the Document may not be redistributed; and (d) the trademark, copyright or other notices may not be removed. You may quote portions of the Document as permitted by the Fair Use provisions of the United States Copyright Act, provided that you attribute the portions to the Using Blockchain Technology to Secure the Internet of Things paper. Blockchain/Distributed Ledger Technology Working Group | Using Blockchain Technology to Secure the Internet of Things 2 © Copyright 2018, Cloud Security Alliance. All rights reserved. ABOUT CSA The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, visit us at www.cloudsecurityalliance.org and follow us on Twitter @cloudsa. Blockchain/Distributed Ledger Technology Working Group | Using Blockchain Technology to Secure the Internet of Things 3 © Copyright 2018, Cloud Security Alliance. All rights reserved.
    [Show full text]