Manual Re CS Covered Bond Issuance

Total Page:16

File Type:pdf, Size:1020Kb

Manual Re CS Covered Bond Issuance Hany Rashwan Chairman of the Board Supplement to Base Prospectus FIRST SUPPLEMENT DATED APRIL 15, 2019 TO THE BASE PROSPECTUS DATED NOVEMBER 13, 2018 A M (I N Amun AG (incorporated in Switzerland) Exchange Traded Products Programme This supplement (the Supplement) to the Base Prospectus dated November 13, 2018 (the Base Prospectus), is prepared in connection with the Exchange Traded Products Programme established by Amun AG (the Issuer or Amun). Capitalized terms used but not defined herein have the meanings assigned to such terms in the Base Prospectus. The Base Prospectus has been registered as an issuance program for the listing of exchange traded products (the ETPs or the Products) on the SIX Swiss Exchange in accordance with the listing rules of the SIX Swiss Exchange. This Supplement constitutes a supplement to the Base Prospectus for purposes of Article 12 of the Directive on the Procedures for Exchange Traded Products (DPETP) issued by SIX Exchange Regulation AG. This Supplement is supplemental to and should be read in conjunction with the Base Prospectus. To the extent that there is any inconsistency between (i) any statement in this Supplement and (ii) any other statement in or incorporated by reference into the Base Prospectus, the statements in this Supplement will prevail. The Issuer assumes responsibility pursuant to article 27 of the listing rules of the SIX Swiss Exchange and section 5 of Scheme G thereunder for the content of this Supplement and declares that the information contained in the Base Prospectus, as supplemented by this Supplement, is, to the best of its knowledge, correct and no material facts or circumstances have been omitted therefrom. AMENDMENTS TO PAGE iii OF THE BASE PROSPECTUS On page iii of the Base Prospectus the sentence "each Investor shall bear the solvency risks of the Kingdom Trust Company (Custodian or Kingdom Trust)" shall be deleted and replaced by the following: each Investor shall bear the solvency risks of The Kingdom Trust Company (Kingdom Trust), Coinbase Custody Trust Company, LLC (Coinbase) or any other custodian of the Underlying or Underlying Components (Kingdom Trust, Coinbase or such other custodian, the Custodian) AMENDMENTS TO THE "RISK FACTORS" SECTION Under the heading "Recognition of Security and Choice of Law in Other Jurisdictions" on page 30 of the Base Prospectus the second paragraph shall be deleted and replaced by the following: In addition, while the terms and conditions of the Products and the Paying Agency Agreement are governed by Swiss Law, the Security Documents are governed by the laws of the State of South Dakota or by the laws of the State of New York, as applicable, the Collateral Agent Agreement is governed by the laws of England and Wales, with certain provisions of the Collateral Agent Agreement being governed by the laws of Switzerland as stated within the Collateral Agent Agreement, and the Administration Agreement is governed by the laws of the State of Colorado. Any agreements with an additional paying agent (including a Swiss Paying Agent), any calculation agent or any other service provider or agent may also be governed by the laws in different jurisdictions. There can be no assurance that, upon enforcement or otherwise, a court will recognise the choice of law or apply foreign law principles in the same way as a domestic court would in respect of any Transaction Document. Under the heading "Risk Factors Relating to Specific Underlyings or Underlying Components" and prior to "Risk Factors Relating to the Amun Index As An Underlying" on page 43 of the Base Prospectus the following shall be inserted: Risks Specific to NEO (NEO) Usage Risks: NEO is designed as a next-generation smart contract platform for, among other things, decentralized applications (dApps). It therefore competes against other smart contract crypto networks, including, but not limited to, DFINITY, Ethereum, Ethereum Classic, Hyperledger, Lisk, Tron, QTUM, EOS, and Tezos. NEO is a new platform and has not yet achieved widespread use. There are other platforms, in particular Ethereum, which continue to command a large percent of smart-contract-powered applications. Failure to capture a greater share of the smart contract market might detrimentally impact the value of the NEO token. Increased Technology Risks: Unlike Bitcoin and Ethereum, NEO uses a consensus mechanism called Delegated Byzantine Fault Tolerant consensus(dBFT) where proxy voting is used to 2 decide which block is appended to the blockchain. However, dBFT comes with significant centralization risk as NEO holders delegate their voting rights to a much smaller group of entities called bookkeepers. Control Risks: NEO has been accused of being centralized due to its dBFT consensus mechanism and the limited number of nodes which have control over block production on NEO. For example, NEO has faced problems in the past where the blockchain has been rendered unusable due to one of the nodes going offline. NEO aims to eventually move closer to decentralization by allowing commercial projects and community entities to run nodes. Risks Specific to Tron (TRX) Commercial Risk: Tron, or entities affiliated with Tron’s management team, purchased the company behind the BitTorrent protocol, which is a peer-to-peer file sharing (p2p) protocol and application to distribute data and files over the Internet. The TRX token’s valuation may be closely tied to the performance of the for-profit entities affiliated with this transaction or the non- profit entities affiliated with Tron. Age Risk: The launch of the Tron Foundation was in September 2017 by current CEO Justin Sun. The Tron main-net, its own proprietary blockchain, was launched in June 2018. Accordingly, Tron has had less time in live production compared with other Crypto Assets of similar market capitalization. As a result, there can be a significantly lower usage of Tron compared to other, larger and smaller Crypto Assets. Lower usage could result in deteriorating value and liquidity adversely impact the valuation of the asset. A significant reduction in usage could also result in a complete loss of investment. Usage Risks: Tron is designed as a next-generation smart contract platform for, among other things, decentralized applications (dApps). It therefore competes against other smart contract crypto networks, including, but not limited to, DFINITY, Ethereum, Ethereum Classic, Hyperledger, Lisk, NEO, QTUM, EOS, and Tezos. Tron is a new platform and has not yet achieved widespread use. There are other platforms, in particular Ethereum, which continue to command a large percent of smart-contract-powered applications. Failure to capture a greater share of smart contract development might detrimentally impact the value of the TRX token. Further Usage Risks: According to an April 2019 report by analytics firm Dapp Review, up to 64% of Tron is being used for gaming, a portion of which include gaming apps linked to gambling. Regulations for gambling vary from country to country and Tron has indicated they will collaborate with local regulators. An example is that on April 1, Tron has pledged to restrict gambling dApps in Japan, where gambling is prohibited. the Tron network’s reputation, and the value of the underlying TRX token, may be negatively affected. 3 Technology Risks: TRON uses a Delegated Proof of Stake (DPoS) consensus mechanism wherein 27 Super Representatives (SRs) are chosen to produce blocks for the networks; these SRs are voted in by TRX holders. However, given that within any voting block the identities of the chosen SRs are limited, this exposes TRON to some amount of centralization risk. Control Risks: The TRON Independent Group (TIG) has control over large amount of TRX tokens, having been entrusted with the tokens held by TRON foundation and therefore can exercise a large amount of control through voting power over the network. TIG is composed of the 27 SRs chosen at the genesis block. Risks Specific to Ethereum Classic (ETC) Production Risk: Ethereum Classic is a mined currency, which required significant use of energy, space, and computing power. Should the incentives for miners of the Crypto Asset be insufficient or the costs of validating transactions grow disproportionately, miners could transition to other networks, which could, in turn, slow transaction validation and usage. Any disruption to the production of Ethereum Classic or the validation of Ethereum Classic transactions could adversely impact the price of the asset. Usage Risks: Given the amount of competition amongst the smart contract platforms, Ethereum Classic is exposed to some non-negligible amount of usage risk due to its competitors Ethereum, EOS, NEO, TRON, & Tezos. Moreover, the usage of Ethereum Classic as a smart contract platform lags behind that of its competitors. A large drop in usage could result in deteriorating value and liquidity for Ethereum Classic which would in turn negatively affect the valuation of the asset – posing a risk to a given investment. Increased Technology Risks: Because the network for Ethereum Classic is smaller than that of its competitors, it may be at greater risk for certain technology risks, including Double-spending attempts, block reorganization, selfish mining, or 51% attacks. Indeed, Ethereum Classic was subjected to a 51% attack in January 2019. Risks Specific to Cardano (ADA) Usage Risks: Given the amount of competition amongst the smart contract platforms Cardano is exposed to some non-negligible amount of usage risk due to its competitors
Recommended publications
  • Peer Co-Movement in Crypto Markets
    Peer Co-Movement in Crypto Markets G. Schwenkler and H. Zheng∗ February 4, 2021y Abstract We show that peer linkages induce significant price co-movement in crypto markets in excess of common risk factors and correlated demand shocks. When large abnormal return shocks hit one crypto, its peers experience unusually large abnormal returns of the opposite sign. These effects are primarily concentrated among smaller peers and revert after several weeks, resulting in predictable returns. We develop trading strategies that exploit this rever- sal, and show that they are profitable even after accounting for trading fees and frictions. We establish our results by identifying crypto peers through co-mentions in online news using novel natural language processing technologies. Keywords: Cryptocurrencies, peers, co-movement, competition, natural language pro- cessing. JEL codes: G12, G14, C82. ∗Schwenkler is at the Department of Finance, Santa Clara University Leavey School of Business. Zheng is at the Department of Finance, Boston University Questrom School of Business. Schwenkler is corresponding author. Email: [email protected], web: http://www.gustavo-schwenkler.com. yThis is a revision of a previous paper by the two authors called \Competition or Contagion: Evidence from Cryptocurrency Markets." We are grateful to Jawad Addoum (discussant), Daniele Bianchi (discussant), Will Cong, Tony Cookson, Sanjiv Das, Seoyoung Kim, Andreas Neuhierl, Farzad Saidi, and Antoinette Schoar, seminar participants at Boston University and the Society for Financial Econometrics, and the participants at the 2020 Finance in the Cloud III Virtual Conference, the 2020 MFA Annual Meeting, the 3rd UWA Blockchain, Cryptocurrency and FinTech Conference, and the 2020 INFORMS Annual Meeting for useful comments and suggestions.
    [Show full text]
  • The Magnificent Seven
    The Magnificent Seven A closer look at functional attributes of blockchain platforms The Magnificent Seven1 Following a whitepaper published in late 2008, the Bitcoin system came into being in 2009, and the underlying technology became what we refer to as Blockchain today. 1 The top seven cryptocurrencies covered a good variety of attributes that are essential to gain a more thorough understanding of the potentials offered by this new technology. The Magnificent Seven 1 Since then, a variety of different cryptocurrency platforms have been created, and based on data from CoinMarketCap (https://coinmarketcap.com/), as of 27 March 2021, there were 8,964 crypto tokens in existence, with a total Market Cap of over USD$1.6 Trillion. The top seven cryptocurrencies made up around 80% of the global market capitalisation: Market Cap Token Symbol (billion USD) % Bitcoin BTC 1,026.8 59.23 Ethereum ETH 0,196.2 11.32 Cardano ADA 0,040.2 02.32 Binance Coin BNB 0,039.1 02.25 Tether USDT 0,038.5 02.22 Polkadot DOT 0,030.4 01.75 XRP XRP 0,025.8 01.49 80.58 Rest of 8,957 tokens 19.42 Bitcoin alone represents nearly 60% of the total cryptocurrency value, with Ethereum being the second highest by value. However, these cryptocurrencies are not in fact the same: value aside, they differ in some interesting ways, which in turn affect their “function” and value proposition. Asset Smart Token Year Type Minable Consensus2 Limit Backed Contract BTC 2009 Native Yes POW No 21m ETH 2012 ERC-20 Yes / No3 POW | POS No Y none ADA 2017 Native No POS No Y 45bn BNB 2017 ERC-20 No Tendermint No 100m Multiple Forms: USDT-Omni, USDT 2014 USDT-TRON, No NA USD none USDT-ERC20 and USDT-EOS DOT 2017 Native NPOS No Y none Ripple XRP 2012 Native No Transaction No 100bn Protocol Source: https://icorating.com/ and https://coincodex.com/ 2 In simple terms, consensus mechanism is a means of authenticating and validating transactions on a Blockchain (or distributed ledger) without having to trust or rely on a central authority.
    [Show full text]
  • User Manual Ledger Nano S
    User Manual Ledger Nano S Version control 4 Check if device is genuine 6 Buy from an official Ledger reseller 6 Check the box contents 6 Check the Recovery sheet came blank 7 Check the device is not preconfigured 8 Check authenticity with Ledger applications 9 Summary 9 Learn more 9 Initialize your device 10 Before you start 10 Start initialization 10 Choose a PIN code 10 Save your recovery phrase 11 Next steps 11 Update the Ledger Nano S firmware 12 Before you start 12 Step by step instructions 12 Restore a configuration 18 Before you start 19 Start restoration 19 Choose a PIN code 19 Enter recovery phrase 20 If your recovery phrase is not valid 20 Next steps 21 Optimize your account security 21 Secure your PIN code 21 Secure your 24-word recovery phrase 21 Learn more 22 Discover our security layers 22 Send and receive crypto assets 24 List of supported applications 26 Applications on your Nano S 26 Ledger Applications on your computer 27 Third-Party applications on your computer 27 If a transaction has two outputs 29 Receive mining proceeds 29 Receiving a large amount of small transactions is troublesome 29 In case you received a large amount of small payments 30 Prevent problems by batching small transactions 30 Set up and use Electrum 30 Set up your device with EtherDelta 34 Connect with Radar Relay 36 Check the firmware version 37 A new Ledger Nano S 37 A Ledger Nano S in use 38 Update the firmware 38 Change the PIN code 39 Hide accounts with a passphrase 40 Advanced Passphrase options 42 How to best use the passphrase feature 43
    [Show full text]
  • GJR-GARCH Volatility Modeling Under NIG and ANN for Predicting Top Cryptocurrencies
    Journal of Risk and Financial Management Article GJR-GARCH Volatility Modeling under NIG and ANN for Predicting Top Cryptocurrencies Fahad Mostafa 1,* , Pritam Saha 2, Mohammad Rafiqul Islam 3 and Nguyet Nguyen 4,* 1 Department of Mathematics and Statistics, Texas Tech University, Lubbock, TX 79409, USA 2 Rawls College of Business, Texas Tech University, Lubbock, TX 79409, USA; [email protected] 3 Department of Mathematics, Florida State University, Tallahassee, FL 32306, USA; [email protected] 4 Department of Mathematics and Statistics, Youngstown State University, Youngstown, OH 44555, USA * Correspondence: [email protected] (F.M.); [email protected] (N.N.) Abstract: Cryptocurrencies are currently traded worldwide, with hundreds of different currencies in existence and even more on the way. This study implements some statistical and machine learning approaches for cryptocurrency investments. First, we implement GJR-GARCH over the GARCH model to estimate the volatility of ten popular cryptocurrencies based on market capitalization: Bitcoin, Bitcoin Cash, Bitcoin SV, Chainlink, EOS, Ethereum, Litecoin, TETHER, Tezos, and XRP. Then, we use Monte Carlo simulations to generate the conditional variance of the cryptocurrencies using the GJR-GARCH model, and calculate the value at risk (VaR) of the simulations. We also estimate the tail-risk using VaR backtesting. Finally, we use an artificial neural network (ANN) for predicting the prices of the ten cryptocurrencies. The graphical analysis and mean square errors (MSEs) from the ANN models confirmed that the predicted prices are close to the market prices. For some cryptocurrencies, the ANN models perform better than traditional ARIMA models. Citation: Mostafa, Fahad, Pritam Saha, Mohammad Rafiqul Islam, and Keywords: artificial neural network; cryptocurrency; GJR-GARCH; NIG; Monte Carlo simulation; Nguyet Nguyen.
    [Show full text]
  • OCC Interpretive Letter 1174: DLT and Stable Coins
    OCC interpretive letter 1174: DLT and stable coins Author: Ousmène Jacques Mandeng, Senior Advisor, Blockchain and Multiparty Systems, Accenture Table of Contents OCC interpretive letter 1174: DLT and stable coins .................................................. 2 OCC’s position on DLT and stable coins ................................................................. 2 DLT-platforms .......................................................................................................... 3 Tokens ..................................................................................................................... 4 Stable coins ............................................................................................................. 4 Token payments ...................................................................................................... 5 Token networks ....................................................................................................... 5 Bank balance sheet tokenization ............................................................................ 6 Next steps ................................................................................................................. 7 Copyright © 2021 Accenture. All rights reserved. 1 United States OCC interpretive letter 1174: DLT and stable coins The United States Office of the Comptroller of the Currency (OCC), a federal supervisor of national banks and cooperative banks, issued new general guidance about stable coins and distributed ledger technology (DLT)
    [Show full text]
  • Defending Against Malicious Reorgs in Tezos Proof-Of-Stake
    Defending Against Malicious Reorgs in Tezos Proof-of-Stake Michael Neuder Daniel J. Moroz Harvard University Harvard University [email protected] [email protected] Rithvik Rao David C. Parkes Harvard University Harvard University [email protected] [email protected] ABSTRACT Conference on Advances in Financial Technologies (AFT ’20), October 21– Blockchains are intended to be immutable, so an attacker who is 23, 2020, New York, NY, USA. ACM, New York, NY, USA , 13 pages. https: //doi.org/10.1145/3419614.3423265 able to delete transactions through a chain reorganization (a ma- licious reorg) can perform a profitable double-spend attack. We study the rate at which an attacker can execute reorgs in the Tezos 1 INTRODUCTION Proof-of-Stake protocol. As an example, an attacker with 40% of the Blockchains are designed to be immutable in order to protect against staking power is able to execute a 20-block malicious reorg at an attackers who seek to delete transactions through chain reorga- average rate of once per day, and the attack probability increases nizations (malicious reorgs). Any attacker who causes a reorg of super-linearly as the staking power grows beyond 40%. Moreover, the chain could double-spend transactions, meaning they commit an attacker of the Tezos protocol knows in advance when an at- a transaction to the chain, receive some goods in exchange, and tack opportunity will arise, and can use this knowledge to arrange then delete the transaction, effectively robbing their counterparty. transactions to double-spend. We show that in particular cases, the Nakamoto [15] demonstrated that, in a Proof-of-Work (PoW) setting, Tezos protocol can be adjusted to protect against deep reorgs.
    [Show full text]
  • Governance in Decentralized Networks
    Governance in decentralized networks Risto Karjalainen* May 21, 2020 Abstract. Effective, legitimate and transparent governance is paramount for the long-term viability of decentralized networks. If the aim is to design such a governance model, it is useful to be aware of the history of decision making paradigms and the relevant previous research. Towards such ends, this paper is a survey of different governance models, the thinking behind such models, and new tools and structures which are made possible by decentralized blockchain technology. Governance mechanisms in the wider civil society are reviewed, including structures and processes in private and non-profit governance, open-source development, and self-managed organisations. The alternative ways to aggregate preferences, resolve conflicts, and manage resources in the decentralized space are explored, including the possibility of encoding governance rules as automatically executed computer programs where humans or other entities interact via a protocol. Keywords: Blockchain technology, decentralization, decentralized autonomous organizations, distributed ledger technology, governance, peer-to-peer networks, smart contracts. 1. Introduction This paper is a survey of governance models in decentralized networks, and specifically in networks which make use of blockchain technology. There are good reasons why governance in decentralized networks is a topic of considerable interest at present. Some of these reasons are ideological. We live in an era where detailed information about private individuals is being collected and traded, in many cases without the knowledge or consent of the individuals involved. Decentralized technology is seen as a tool which can help protect people against invasions of privacy. Decentralization can also be viewed as a reaction against the overreach by state and industry.
    [Show full text]
  • Can Ethereum Classic Reach 1000 Dollars Update [06-07-2021] 42 Loss in the Last 24 Hours
    1 Can Ethereum Classic Reach 1000 Dollars Update [06-07-2021] 42 loss in the last 24 hours. At that time Bitcoin reached its all-time high of 20,000 and so did Ethereum ETH which surpassed 1,000. 000 to reach 1; Tezos XTZ is priced at 2. In the unlikely event of a significant change for the worst, we expect the Bitcoin price to continue appreciating. ERC-721 started as a EIP draft written by dete and first came to life in the CryptoKitties project by Axiom Zen. ERC-721 A CLASS OF UNIQUE TOKENS. It does not mandate a standard for token metadata or restrict adding supplemental functions. Think of them like rare, one-of-a-kind collectables. The Standard. Institutions are mandating that they invest in clean green technologies and that s what ethereum is becoming, she said. Unlike bitcoin s so-called proof of work, which rewards miners who are competing against each other to use computers and energy to record and confirm transactions on its blockchain, ethereum plans to adopt the more efficient proof of stake model, which chooses a block validator at random based on how much ether it controls. Kaspar explained her thesis Friday on Yahoo Finance Live, citing new updates coming to the cryptocurrency s network later this year. 42 loss in the last 24 hours. At that time Bitcoin reached its all-time high of 20,000 and so did Ethereum ETH which surpassed 1,000. 000 to reach 1; Tezos XTZ is priced at 2. In the unlikely event of a significant change for the worst, we expect the Bitcoin price to continue appreciating.
    [Show full text]
  • Press Release: the Battle of Protocols
    Press Release: The Battle of Protocols Omenics cryptocurrency data analytics startup have teamed up with Bitassist, a Cryptoasset research firm, to ​ release a comprehensive report on the performance of popular blockchain protocols Ethereum, Tron, EOS and Tezos. A full version of the Battle of the Protocols PDF Report can be downloaded here: https://omenics.com/blog/the-battle-of-protocols-a-competitive-analysis-on-ethereum-eos-tron-and-tezos And an online PDF is available here: https://view.publitas.com/bitassist/the-battle-of-the-blockchain-protocols/ ​ Summary 1. A brief overview of the report 2. An analysis of the key findings In this report, Bitassist and Omenics collate and contrast key metrics for leading protocols to provide meaningful insights into the current state of competition. The metrics used in this report include the number of transactions per Second (TPS), the decentralization of governance, the number and distribution of nodes, various measures of on-chain activity or economic output and the community sentiment around the platform. As leading protocols compete for the top spot, developers, DApp users and investors eagerly observe the state of competition. This report leverages key blockchain metrics to highlight the respective strengths and weaknesses among Ethereum, EOS, Tron and Tezos. Omenics: Pierre-Alexandre Picard+33643035796, COO [email protected] Bitassist: James Bennett, CEO [email protected]. Key Takeaways from the Report Below are some of the key insights offered by the report indicating the overall performance of blockchain protocols. ● Transactions Per Second (TPS): This is one of the most important performance metrics to gauge the ​ relative strength of the blockchain protocol.
    [Show full text]
  • A Survey on Volatility Fluctuations in the Decentralized Cryptocurrency Financial Assets
    Journal of Risk and Financial Management Review A Survey on Volatility Fluctuations in the Decentralized Cryptocurrency Financial Assets Nikolaos A. Kyriazis Department of Economics, University of Thessaly, 38333 Volos, Greece; [email protected] Abstract: This study is an integrated survey of GARCH methodologies applications on 67 empirical papers that focus on cryptocurrencies. More sophisticated GARCH models are found to better explain the fluctuations in the volatility of cryptocurrencies. The main characteristics and the optimal approaches for modeling returns and volatility of cryptocurrencies are under scrutiny. Moreover, emphasis is placed on interconnectedness and hedging and/or diversifying abilities, measurement of profit-making and risk, efficiency and herding behavior. This leads to fruitful results and sheds light on a broad spectrum of aspects. In-depth analysis is provided of the speculative character of digital currencies and the possibility of improvement of the risk–return trade-off in investors’ portfolios. Overall, it is found that the inclusion of Bitcoin in portfolios with conventional assets could significantly improve the risk–return trade-off of investors’ decisions. Results on whether Bitcoin resembles gold are split. The same is true about whether Bitcoins volatility presents larger reactions to positive or negative shocks. Cryptocurrency markets are found not to be efficient. This study provides a roadmap for researchers and investors as well as authorities. Keywords: decentralized cryptocurrency; Bitcoin; survey; volatility modelling Citation: Kyriazis, Nikolaos A. 2021. A Survey on Volatility Fluctuations in the Decentralized Cryptocurrency Financial Assets. Journal of Risk and 1. Introduction Financial Management 14: 293. The continuing evolution of cryptocurrency markets and exchanges during the last few https://doi.org/10.3390/jrfm years has aroused sparkling interest amid academic researchers, monetary policymakers, 14070293 regulators, investors and the financial press.
    [Show full text]
  • Distributed Self-Government in Protocol Communities an Introduction and Index of Examples
    SUBSCRIBE NOW AND RECEIVE CRISIS AND LEVIATHAN* FREE! “The Independent Review is a sparkling effervescence of views and insights on economics, history, and politics for people who don’t mind having their minds bent and blistered with high entropy ideas.” —GEORGE GILDER, bestselling author, Wealth and Poverty, Knowledge and Power, and Microcosm Subscribe to The Independent Review and receive a free book of your choice* such as the 25th Anniversary Edition of Crisis and Leviathan: Critical Episodes in the Growth of American Government, by Founding Editor Robert Higgs. This quarterly journal, guided by co-editors Christopher J. Coyne, and Michael C. Munger, and Robert M. Whaples offers leading-edge insights on today’s most critical issues in economics, healthcare, education, law, history, political science, philosophy, and sociology. Thought-provoking and educational, The Independent Review is blazing the way toward informed debate! Student? Educator? Journalist? Business or civic leader? Engaged citizen? This journal is for YOU! *Order today for more FREE book options Perfect for students or anyone on the go! The Independent Review is available on mobile devices or tablets: iOS devices, Amazon Kindle Fire, or Android through Magzter. INDEPENDENT INSTITUTE, 100 SWAN WAY, OAKLAND, CA 94621 • 800-927-8733 • [email protected] PROMO CODE IRA1703 Distributed Self-Government in Protocol Communities An Introduction and Index of Examples F TOM W. BELL e live in exciting times for governance. Large and powerful institutions used to come in only a few standardized types, such as nation-states and W commercial corporations. But the advent of distributed organizations, built on computer code and fueled by digital cash, has supercharged the evolution of social coordination systems.
    [Show full text]
  • Impossibility of Full Decentralization in Permissionless Blockchains
    Impossibility of Full Decentralization in Permissionless Blockchains Yujin Kwon*, Jian Liuy, Minjeong Kim*, Dawn Songy, Yongdae Kim* *KAIST {dbwls8724,mjkim9394,yongdaek}@kaist.ac.kr yUC Berkeley [email protected],[email protected] ABSTRACT between achieving good decentralization in the consensus protocol Bitcoin uses the proof-of-work (PoW) mechanism where nodes earn and not relying on a TTP exists. rewards in return for the use of their computing resources. Although this incentive system has attracted many participants, power has, CCS CONCEPTS at the same time, been significantly biased towards a few nodes, • Security and privacy → Economics of security and privacy; called mining pools. In addition, poor decentralization appears not Distributed systems security; only in PoW-based coins but also in coins that adopt proof-of-stake (PoS) and delegated proof-of-stake (DPoS) mechanisms. KEYWORDS In this paper, we address the issue of centralization in the consen- Blockchain; Consensus Protocol; Decentralization sus protocol. To this end, we first define ¹m; ε; δº-decentralization as a state satisfying that 1) there are at least m participants running 1 INTRODUCTION a node, and 2) the ratio between the total resource power of nodes Traditional currencies have a centralized structure, and thus there run by the richest and the δ-th percentile participants is less than exist several problems such as a single point of failure and corrup- or equal to 1 + ε. Therefore, when m is sufficiently large, and ε and tion. For example, the global financial crisis in 2008 was aggravated δ are 0, ¹m; ε; δº-decentralization represents full decentralization, by the flawed policies of banks that eventually led to many bank which is an ideal state.
    [Show full text]