Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware

Total Page:16

File Type:pdf, Size:1020Kb

Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware Iddo Bentov Yan Ji Fan Zhang Yunqi Li Xueyuan Zhao Cornell University Cornell University Cornell University SJTU SJTU Lorenz Breidenbach Philip Daian Ari Juels ETH Zurich¨ and Cornell Tech Cornell Tech Cornell Tech Abstract Section 3.1). In a number of high-profile incidents, funds have been stolen when exchanges were breached or other We propose Tesseract, a secure real-time cryptocurrency forms of malfeasance took place, e.g., [25,6, 38, 52]. exchange service. Existing centralized exchange Permissionless blockchains, however, are designed designs are vulnerable to theft of funds, while specifically to eliminate trust assumptions between decentralized exchanges cannot offer real-time cross- transacting parties by avoiding centralization. A chain trades. All currently deployed exchanges are trust-free cryptocurrency exchange can be realized for also vulnerable to frontrunning attacks. Tesseract transactions across such blockchains in the form of overcomes these flaws and achieves a best-of-both- atomic intra-chain or cross-chain swaps (ACCSs) [16], worlds design by using Intel SGX as a trusted transactions that exchange cryptocurrencies between execution environment. Furthermore, by running pairs (or among sets) of users in a fair, all-or-nothing a consensus protocol among SGX-enabled servers, manner. ACCSs, though, require users to wait many Tesseract mitigates denial-of-service attacks. Tesseract minutes (in fact, often hours) for a trade to execute. supports not only real-time cross-chain cryptocurrency Additionally, atomic swaps in general aren’t sufficient trades, but also secure tokenization of assets pegged to realize an exchange: A mechanism for matching to cryptocurrencies. For instance, Tesseract-tokenized orders or otherwise performing price discovery is also bitcoins can circulate on the Ethereum blockchain necessary. (Since ACCSs serve as a useful reference for use in smart contracts. We provide a reference point, we elaborate on the concept and its limitations in implementation of Tesseract that supports Bitcoin, Section2.) Ethereum, and similar cryptocurrencies. The systemic risk of theft in centralized exchanges has led to the rising popularity of decentralized exchanges 1 Introduction such as EtherDelta [64] and the soon-to-be-implemented 0x [81], AirSwap [57], and Kyber Network [46]. The rise of Bitcoin [54] has spawned many hundreds These systems hold traders’ funds and settle transactions of other cryptocurrencies as well as application-specific in smart contracts, eliminating the risk of theft in units of value known as crypto “tokens.” This diverse centralized exchanges. Unfortunately, they have other ecosystem of assets has in turn led to a large and dynamic drawbacks. Their on-chain settlement means that they array of cryptocurrency exchanges, platforms that allow cannot support real-time trading. Additionally, while users to trade different cryptocurrencies against one their use of smart contracts conveys an appearance another and/or for fiat currencies. At the time of writing, of trustworthiness, they are vulnerable to various the aggregate daily trading volume of cryptocurrency frontrunning attacks by exchanges and other users. exchanges exceeds $25 billion. Achieving the best of both worlds has been a standing Unfortunately, cryptocurrency exchanges suffer from challenge, but a seemingly elusive one. An ideal a variety of security problems. Currently, the cryptocurrency exchange would be real-time like a most popular exchanges are centralized, meaning that centralized exchange, meaning that participants can they hold traders’ assets while trades are executed. respond to price fluctuations and alter their positions with Such exchanges support real-time trading and often low latency. It would support even traders that choose to automatically match buy and sell orders. They are utilize automated programs for high frequency trading vulnerable, however, to theft of traders’ funds (cf. and arbitrage (cf. [7]), who may wish to modify their 1 positions in milliseconds. At the same time, such an funds. We express a theoretical solution to these exchange would be trust-free, protecting against theft network attacks in terms of an ideal functionality in the way that decentralized exchanges do, but also called a refundable multi-input transaction (RMIT). eliminating frontrunning attacks that exploit blockchain RMIT provides a conceptual springboard for securely latencies. architecting a secure cross-chain exchange. We present In this work, we present Tesseract, a cryptocurrency a highly efficient realization of RMIT in Tesseract, in a exchange that achieves this ideal set of properties. protocol involving a network of multiple SGX-backed Tesseract is real time. Traders can rapidly observe the nodes running Paxos. While only one node handles alterations in the buy (a.k.a. “bid”) and sell (a.k.a. assets directly, others can execute or cancel transactions “ask”) orders on the exchange, as well as external should the main node fail. This protocol enforces a events (e.g., [85]), then modify their trading positions key fairness property we define called all-or-nothing in milliseconds. By performing fast price discovery, settlement. they can drive price convergence so that the gap (a.k.a. Our security assumptions around Tesseract are quite “spread”) between the bids and asks is small, leading to conservative. We assume that an adversary (potentially efficient markets like those in major financial systems. the exchange operator) can gain complete physical Tesseract also prevents theft of users’ funds by exchange access to the host in which the funds are stored and operators and hackers as well as a variety of frontrunning complete control of its network connections. We do attacks present in existing cryptocurrency exchanges. assume that the code that we run inside the SGX enclave Tesseract relies on SGX, a trusted execution is secure against side-channel attacks [84], but this code environment supported by an instruction-set architecture is constant-time and constant-memory. In a sense, the extension in recent-model Intel CPUs [1, 34, 51]. Tesseract exchange still relies on a trusted party in the SGX allows applications to execute within a form of the hardware manufacturer, because the private protected environment called an enclave that ensures key that resides inside CPU (and generates signatures for confidentiality and software integrity. It enables remote attestation) is provisioned by the manufacturer. It Tesseract to behave like a trusted third party, controlling can be argued that a weaker yet similar form of trust is funds without exposing them to theft while preventing required in a practical instantiation of any cryptographic frontrunning by the exchange operator. Additionally, protocol, since the manufacturer may be able to attack Tesseract provides mitigation against denial-of-service the protocol by embedding malicious logic into the (DoS) attacks via a consensus protocol among SGX- hardware. We also, however, incorporate a scheme of enabled nodes. double attestation (Section 4.3) that provides an extra Tesseract supports cross-chain trading in which assets layer of defense against a corrupt manufacturer. Thus, are exchanged across distinct blockchains. Trades within Tesseract still requires trust, but to a significantly lesser a single blockchain, e.g., exchange of tokens and Ether degree than centralized exchanges and other possible within Ethereum, can also be important (cf. [67, 18, 60, real-time exchange schemes (cf. Section3). 19, 15]). While this use case can be achieved at least In summary, our contributions in this paper are as in part using smart contracts, a significantly simplified follows: variant of Tesseract can offer the added benefit of real- time trading, which smart contracts cannot support. • We introduce Tesseract, an SGX-backed Tesseract also supports a tokenization scheme that allows cryptocurrency exchange that can support a pegged tokens to ciculate across blockchains, without wide variety of transaction types, with cross-chain relying on a human element for security (see Section7). trading as its primary application. The main challenge in the design of Tesseract is • We consider attacks by powerful network dealing with powerful network adversaries. Such adversaries that may seek to mount eclipse adversaries can perform an eclipse attack in which an attacks or suppress transactions to achieve unfair exchange is presented with fake blockchain data. We settlement and thus theft of funds. We define a key show how to address this problem by checkpointing fairness property called all-or-nothing settlement trustworthy blocks within the Tesseract application and and show how to realize an exchange that achieves having it monitor the cumulative difficulty of newly this property using as a conceptual building block furnished blocks. A network adversary can also suppress an ideal functionality called RMIT. messages / transactions issued by the exchange in an attempt to interfere in on-chain settlement of trades, e.g., • We present practical techniques to achieve all-or- permitting partial settlement in which cryptocurrency nothing settlement in Tesseract. These techniques flows to the adversary from a counterparty but not include within-enclave blockchain monitoring to from the adversary, resulting in the adversary stealing prevent eclipse attacks and use of a consensus 2 group of SGX-backed nodes that can enforce and/or Protocol P cancel
Recommended publications
  • Realising Blockchain's Surge in Mass Adoption with Unlimited Scaling, Speed and Cross-Chain Interope
    THE NuGENESIS REVOLUTION: REALISING BLOCKCHAIN’S SURGE IN MASS ADOPTION WITH UNLIMITED SCALING, SPEED AND CROSS-CHAIN INTEROPERABILITY; and, BRIDGING WITH LEGAL AND MAINSTEAM ECONOMIC SUPPORT PART A INTRODUCTION AND SUMMARY INTRODUCTION NuGenesis is a fully completed native blockchain originally built for Government and transnational corporate applications. In the context of building a blockchain for Central Bank Digital Currencies (CBDC’s), and an exchange clearing house for settlement, limitations to scaling and speed, latency and reliance on human miners and validators had to be eliminated. Security had to be enhanced, its integrity underscored by Artificial Intelligence (AI) and carbon neutral in its efficiency. We have now made the NuGenesis gasless network of cross-chain blockchains available for commercial and social application for use by modifying it to maximise its efficacy for the up-coming tidal wave of mass adoption. This has meant not only the most advanced next-generation layer 1 multi-chain blockchain configuration system that is cross-chain interoperable, but which it easy and cost effective for developers to customise their own version which can run as a parallel network and accessing explosive new potential capabilities for Smart Contracts, NFTs, virtual reality innovation. The NuGenesis multi-cross chain network provides: 1. The Most Advanced Tech The NuGenesis blockchain network currently consists of a quad cross chain configuration interoperability: (a) The NuGenesis Main blockchain, built on Substrate; (b) The Ledger X (Exchange) chain based on C++ that is itself a parallel processing chain made of a tri blockchain configuration; (c) The Ethereum chain; and, (d) The Bitcoin Chain NuGenesis achieves unlimited scalability and speed through eliminating the validation bottleneck to data flow, uses consensus before packing and, currently implementing load balancers, with their own blockchain, to maximise block data, creation and speed.
    [Show full text]
  • Bitcoin Tumbles As Miners Face Crackdown - the Buttonwood Tree Bitcoin Tumbles As Miners Face Crackdown
    6/8/2021 Bitcoin Tumbles as Miners Face Crackdown - The Buttonwood Tree Bitcoin Tumbles as Miners Face Crackdown By Haley Cafarella - June 1, 2021 Bitcoin tumbles as Crypto miners face crackdown from China. Cryptocurrency miners, including HashCow and BTC.TOP, have halted all or part of their China operations. This comes after Beijing intensified a crackdown on bitcoin mining and trading. Beijing intends to hammer digital currencies amid heightened global regulatory scrutiny. This marks the first time China’s cabinet has targeted virtual currency mining, which is a sizable business in the world’s second-biggest economy. Some estimates say China accounts for as much as 70 percent of the world’s crypto supply. Cryptocurrency exchange Huobi suspended both crypto-mining and some trading services to new clients from China. The plan is that China will instead focus on overseas businesses. BTC.TOP, a crypto mining pool, also announced the suspension of its China business citing regulatory risks. On top of that, crypto miner HashCow said it would halt buying new bitcoin mining rigs. Crypto miners use specially-designed computer equipment, or rigs, to verify virtual coin transactions. READ MORE: Sustainable Mineral Exploration Powers Electric Vehicle Revolution This process produces newly minted crypto currencies like bitcoin. “Crypto mining consumes a lot of energy, which runs counter to China’s carbon neutrality goals,” said Chen Jiahe, chief investment officer of Beijing-based family office Novem Arcae Technologies. Additionally, he said this is part of China’s goal of curbing speculative crypto trading. As result, bitcoin has taken a beating in the stock market.
    [Show full text]
  • Cryptocurrency: the Economics of Money and Selected Policy Issues
    Cryptocurrency: The Economics of Money and Selected Policy Issues Updated April 9, 2020 Congressional Research Service https://crsreports.congress.gov R45427 SUMMARY R45427 Cryptocurrency: The Economics of Money and April 9, 2020 Selected Policy Issues David W. Perkins Cryptocurrencies are digital money in electronic payment systems that generally do not require Specialist in government backing or the involvement of an intermediary, such as a bank. Instead, users of the Macroeconomic Policy system validate payments using certain protocols. Since the 2008 invention of the first cryptocurrency, Bitcoin, cryptocurrencies have proliferated. In recent years, they experienced a rapid increase and subsequent decrease in value. One estimate found that, as of March 2020, there were more than 5,100 different cryptocurrencies worth about $231 billion. Given this rapid growth and volatility, cryptocurrencies have drawn the attention of the public and policymakers. A particularly notable feature of cryptocurrencies is their potential to act as an alternative form of money. Historically, money has either had intrinsic value or derived value from government decree. Using money electronically generally has involved using the private ledgers and systems of at least one trusted intermediary. Cryptocurrencies, by contrast, generally employ user agreement, a network of users, and cryptographic protocols to achieve valid transfers of value. Cryptocurrency users typically use a pseudonymous address to identify each other and a passcode or private key to make changes to a public ledger in order to transfer value between accounts. Other computers in the network validate these transfers. Through this use of blockchain technology, cryptocurrency systems protect their public ledgers of accounts against manipulation, so that users can only send cryptocurrency to which they have access, thus allowing users to make valid transfers without a centralized, trusted intermediary.
    [Show full text]
  • Blockchain & Cryptocurrency Regulation
    Blockchain & Cryptocurrency Regulation Third Edition Contributing Editor: Josias N. Dewey Global Legal Insights Blockchain & Cryptocurrency Regulation 2021, Third Edition Contributing Editor: Josias N. Dewey Published by Global Legal Group GLOBAL LEGAL INSIGHTS – BLOCKCHAIN & CRYPTOCURRENCY REGULATION 2021, THIRD EDITION Contributing Editor Josias N. Dewey, Holland & Knight LLP Head of Production Suzie Levy Senior Editor Sam Friend Sub Editor Megan Hylton Consulting Group Publisher Rory Smith Chief Media Officer Fraser Allan We are extremely grateful for all contributions to this edition. Special thanks are reserved for Josias N. Dewey of Holland & Knight LLP for all of his assistance. Published by Global Legal Group Ltd. 59 Tanner Street, London SE1 3PL, United Kingdom Tel: +44 207 367 0720 / URL: www.glgroup.co.uk Copyright © 2020 Global Legal Group Ltd. All rights reserved No photocopying ISBN 978-1-83918-077-4 ISSN 2631-2999 This publication is for general information purposes only. It does not purport to provide comprehensive full legal or other advice. Global Legal Group Ltd. and the contributors accept no responsibility for losses that may arise from reliance upon information contained in this publication. This publication is intended to give an indication of legal issues upon which you may need advice. Full legal advice should be taken from a qualified professional when dealing with specific situations. The information contained herein is accurate as of the date of publication. Printed and bound by TJ International, Trecerus Industrial Estate, Padstow, Cornwall, PL28 8RW October 2020 PREFACE nother year has passed and virtual currency and other blockchain-based digital assets continue to attract the attention of policymakers across the globe.
    [Show full text]
  • Cointelegraph Security Token Report
    The Security Token Report 2021 Research Partners We thank our research partners for their support of this report. Authors Demelza Hays, Ph.D. Demelza Hays is the director of research at Cointelegraph, and formerly was a Forbes 30 Under 30, U.S. Department of State Fulbright Scholar, and fund manager of two regulated crypto funds. Katharina Gehra Katharina Gehra is the CEO & Co-Founder of Immutable Insight GmbH and the fund manager of the first German crypto hedge fund, a 3-times Capital Top 40 under 40 and a supervisory board member at Fürstlich Castell’sche Bank. She is the co-host of the blockchain pod- cast Block52. Silvan Thoma and Martin Liebi Silvan Thoma ([email protected]) / Martin Liebi ([email protected]) both PwC Legal, Switzerland advise and have advised multiple digital assets operators in the legal aspects of the issuance of digital assets and the set-up and licensing process of the operation of mul- tilateral trading facilities. Urszula McCormack Partner, Cross-Border Finance and Technology, King & Wood Mallesons. Urszula McCormack is one of Asia’s leading regulatory and digital economy lawyers, with a focus on emerging technologies. Urszula advises global banks, payment institutions, large technology com- panies, virtual asset issuers and innovators on new products, compliance and financial services licensing. She also advises on privacy regulation, digital transformation and algorith- mic design. Urszula is a member of multiple advisory bodies and is regularly invited to brief governments, regulators and transnational policymakers. Urszula is admitted to practice law in Hong Kong, Australia and England & Wales. © Crypto Research Report, © Cointelegraph Research, Security Token Report, 2021 3 Rika Khurdayan and Lee Schneider Rika Khurdayan is a lawyer and strategist, with a particular focus on blockchain and DLT.
    [Show full text]
  • Detecting and Quantifying Wash Trading on Decentralized Cryptocurrency Exchanges
    Detecting and Quantifying Wash Trading on Decentralized Cryptocurrency Exchanges Friedhelm Victor Andrea Marie Weintraud Technische Universität Berlin Technische Universität Berlin Berlin, Germany Berlin, Germany [email protected] [email protected] ABSTRACT the umbrella term Decentralized Finance (DeFi) are establishing Cryptoassets such as cryptocurrencies and tokens are increasingly themselves as a key use case for distributed ledger technologies traded on decentralized exchanges. The advantage for users is that (DLTs) in general. The aim is to design financial products, that are the funds are not in custody of a centralized external entity. How- partly based on services from the traditional financial world yet ever, these exchanges are prone to manipulative behavior. In this completely new in other areas. The appeal lies in offering these paper, we illustrate how wash trading activity can be identified financial products in a decentralized way, excluding middlemen as on two of the first popular limit order book-based decentralized far as possible. exchanges on the Ethereum blockchain, IDEX and EtherDelta. We While the field now encompasses a multitude of services suchas identify a lower bound of accounts and trading structures that meet lending protocols, derivatives and insurances, so-called decentral- the legal definitions of wash trading, discovering that they arere- ized exchanges (DEX) were among the early drivers of the ecosys- sponsible for a wash trading volume in equivalent of 159 million tem. They allow for the exchange of virtual assets without having to U.S. Dollars. While self-trades and two-account structures are pre- rely on externally-controlled services such as centralized exchanges, dominant, complex forms also occur.
    [Show full text]
  • Decentralized Exchanges
    DECONSTRUCTING DECENTRALIZED EXCHANGES Lindsay X. Lin* INTRODUCTION Decentralized exchanges are becoming a critical tool for purchasing and selling an increasing percentage of cryptocurrencies. The term “decentralized exchange” generally refers to distributed ledger protocols and applications that enable users to transact cryptocurrencies without the need to trust a centralized entity to be an intermediary for the trade or a custodian for their cryptocurrencies. Decentralized exchanges provide a number of important benefits, including (1) lower counterparty risk (i.e., no need to trust a centralized exchange to secure and manage private keys),1 (2) the potential for lower transaction fees, and (3) a more diverse array of trading pairs that can unlock access to riskier or less liquid cryptocurrencies.2 As demand for these features increases, decentralized exchange technology may witness tremendous growth in usage, development, and adoption within the next couple of years. Additionally, decentralized exchange usage is being fueled by concurrent regulatory and industry trends, including (1) a surge in the quantity of distinct cryptocurrencies that makes comprehensive listing impractical,3 (2) regulatory risks of listing cryptocurrencies on centralized * Lindsay Lin is Legal Counsel at Interstellar and Stellar Development Foundation. This writing is not legal advice and is unaffiliated with Interstellar and Stellar Development Foundation. 1 Centralized exchanges have a history of significant security breaches, with many incidents resulting in tens or hundreds of millions of USD value of cryptocurrency stolen. See Julia Magas, Crypto Exchange Hacks in Review: Proactive Steps and Expert Advice, COINTELEGRAPH (Aug. 31, 2018), https://cointelegraph.com/news/crypto-exchange-hacks-in- review-proactive-steps-and-expert-advice.
    [Show full text]
  • Mobile Decentralized Exchange
    Alttex D X Mobile Decentralized Exchange Elky Bachtiar February 22, 2018 [email protected] ABSTRACT Trading cryptocurrencies on centralized exchanges, where funds are stored on centralized servers, exposes users to hackers and regulatory risks. To date, decentralized exchanges are desktop oriented and difficult to use. While mobile usage has worked its way into daily life, blockchain companies mainly focus to advance blockchain users. However, decentralized exchanges focus only on one blockchain, such as Ethereum or NEO. This paper describes the technical side of the Alttex Decentralized Exchange (AltDEX), a brand new decentralized exchange that focus mainly on mobile users. AltDEX uses the latest technology such as Atomic swaps, the Ethereum blockchain, the open source decentralized platform of 0x Protocol, Dogethereum technology of Truebit, and Non-Interactive Proofs of Proof-of-Work (NIPOPOW), to allow the interchangeability between various blockchain tokens. ¹ Atomic swap is a proposed feature in cryptocurrencies, that allows for the exchange of one cryptocurrency for another cryptocurrency without the need for a trusted third party. ² Ethereum is an open software platform based on blockchain technology that enables developers to build and deploy decentralized applications. ³ 0x protocol is 0x is a protocol using Etheereum smart contracts for anyone in the world to operate a decentralized exchange. 4 Dogethereum will be a first-of-its-kind "bridge" between the Dogecoin and Ethereum blockchains. Once constructed, shibes will be able to send doge back-and-forth to Ethereum without using an exchange. This will allow shibes to trade dogecoin for other Ethereum-based tokens and use doge in smart contracts 5 Non-Interactive Proofs of Proof-of-Work: the ability to save and check the proof of work of an blockchain and put it to another blockchain CHAIN RELAY The first chainrelay, BTCRelay of Ethereum, was developed by Joseph Chow.
    [Show full text]
  • Electronic Cash, Decentralized Exchange, and the Constitution
    Electronic Cash, Decentralized Exchange, and the Constitution Peter Van Valkenburgh March 2019 coincenter.org Peter Van Valkenburgh, Electronic Cash, Decentralized Exchange, and the Constitution, ​ ​ Coin Center Report, Mar. 2019, available at https://coincenter.org/entry/e-cash-dex-constitution Abstract Regulators, law enforcement, and the general public have come to expect that cryptocurrency transactions will leave a public record on a blockchain, and that most cryptocurrency exchanges will take place using centralized businesses that are regulated and surveilled through the Bank Secrecy Act. The emergence of electronic cash and decentralized exchange software challenges these expectations. Transactions need not leave any public record and exchanges can be accomplished peer to peer without using a regulated third party in between. Faced with diminished visibility into cryptocurrency transactions, policymakers may propose new approaches to financial surveillance. Regulating cryptocurrency software developers and individual users of that software under the Bank Secrecy Act would be unconstitutional under the Fourth Amendment because it would be a warrantless search and seizure of information private to cryptocurrency users. Furthermore, any law or regulation attempting to ban, require licensing for, or compel the altered publication (e.g. backdoors) of cryptocurrency software ​ ​ would be unconstitutional under First Amendment protections for speech. Author Peter Van Valkenburgh Coin Center [email protected] About Coin Center Coin Center is a non-profit research and advocacy center focused on the public policy issues facing open blockchain technologies such as Bitcoin. Our mission is to build a better understanding of these technologies and to promote a regulatory climate that preserves the freedom to innovate using blockchain technologies.
    [Show full text]
  • An Investigative Study of Cryptocurrency Abuses in the Dark Web
    Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web Seunghyeon Leeyz Changhoon Yoonz Heedo Kangy Yeonkeun Kimy Yongdae Kimy Dongsu Hany Sooel Sony Seungwon Shinyz yKAIST zS2W LAB Inc. {seunghyeon, kangheedo, yeonk, yongdaek, dhan.ee, sl.son, claude}@kaist.ac.kr {cy}@s2wlab.com Abstract—The Dark Web is notorious for being a major known as one of the major drug trading sites [13], [22], and distribution channel of harmful content as well as unlawful goods. WannaCry malware, one of the most notorious ransomware, Perpetrators have also used cryptocurrencies to conduct illicit has actively used the Dark Web to operate C&C servers [50]. financial transactions while hiding their identities. The limited Cryptocurrency also presents a similar situation. Apart from coverage and outdated data of the Dark Web in previous studies a centralized server, cryptocurrencies (e.g., Bitcoin [58] and motivated us to conduct an in-depth investigative study to under- Ethereum [72]) enable people to conduct peer-to-peer trades stand how perpetrators abuse cryptocurrencies in the Dark Web. We designed and implemented MFScope, a new framework which without central authorities, and thus it is hard to identify collects Dark Web data, extracts cryptocurrency information, and trading peers. analyzes their usage characteristics on the Dark Web. Specifically, Similar to the case of the Dark Web, cryptocurrencies MFScope collected more than 27 million dark webpages and also provide benefits to our society in that they can redesign extracted around 10 million unique cryptocurrency addresses for Bitcoin, Ethereum, and Monero. It then classified their usages to financial trading mechanisms and thus motivate new business identify trades of illicit goods and traced cryptocurrency money models, but are also adopted in financial crimes (e.g., money flows, to reveal black money operations on the Dark Web.
    [Show full text]
  • Application-Of-Kraken-Financial-For
    October 5, 2020 SENT VIA E-MAIL Stephanie Martin, Esq. Senior Associate General Counsel Federal Reserve Board 20th & C Streets NW Washington, DC 20551 Re: Application of Kraken Financial for Access to Federal Reserve Account and Payments System Services Dear Ms. Martin: The Clearing House Payments Company (“The Clearing House”) and The Clearing House Association, American Bankers Association, Bank Policy Institute, Consumer Bankers Association, Credit Union National Association, Independent Community Bankers of America, Nacha, and National Association of Federally-Insured Credit Unions (collectively, the “Associations”) write to express concern over the potential application of Kraken Financial for access to a Federal Reserve account and payments system services. The Clearing House, as the private sector operator of the nation’s payments systems, and the Associations, as the trade associations representing users of the payments systems operated by both The Clearing House and the Federal Reserve Banks, are concerned that the nature of the business engaged in by Kraken Financial presents heightened risks that should be taken into consideration in determining whether the Federal Reserve should grant such access, and, if granted, on what conditions. Kraken Financial was formed as the result of a new and unique special purpose depository institution (“SPDI”) charter recently established under Wyoming law that appears to be targeted to cryptocurrency businesses.1 Kraken Financial presents a business model that is 1San Francisco based Kraken appears to have obtained the SPDI charter from Wyoming after previously running afoul of New York’s Virtual Currency Business Activity licensing requirements. Forbes, “New York Attorney General Warns that Kraken Cryptocurrency Exchange Could be Violating Regulations” (Sept.
    [Show full text]
  • Facilitating Cross-Chain Cryptocurrency Exchanges: an Inquiry Into Blockchain Technology and Interoperability with an Emphasis on Cryptocurrency Arbitrage
    Eastern Michigan University DigitalCommons@EMU Senior Honors Theses & Projects Honors College 2020 Facilitating cross-chain cryptocurrency exchanges: An inquiry into blockchain technology and interoperability with an emphasis on cryptocurrency arbitrage Samuel Grone Follow this and additional works at: https://commons.emich.edu/honors Part of the Computer Sciences Commons Facilitating cross-chain cryptocurrency exchanges: An inquiry into blockchain technology and interoperability with an emphasis on cryptocurrency arbitrage Abstract Since the introduction and proliferation of the blockchain-based cryptocurrency Bitcoin, alternative cryptocurrencies also based on blockchain technology have exploded in number. It was once believed that one, or very few, cryptocurrencies would eventually dominate the market and drive out competitors. This assumption, however, was incorrect. Thousands of cryptocurrencies exist concurrently. The vast number of cryptocurrencies leads to a problem—what if the cryptocurrency that an individual possesses does not meet their current needs as well as another cryptocurrency might? The attempt to solve this problem has led to the rise of many cryptocurrency exchanges and exchange schemes. In this paper, we will discuss the motivations for an individual to be interested in exchanging two or more cryptocurrencies by describing and comparing various popular cryptocurrencies with different desirable attributes. While we will discuss these attributes, this paper will give special focus to arbitrage in particular. In addition, we will describe various cryptocurrency exchange schemes and their advantages and disadvantages. Finally, we contribute to the understanding of cryptocurrency exchangeability and interoperability by comparing the historical price data of several cryptocurrencies to determine how often arbitrage has been possible in the past. Degree Type Open Access Senior Honors Thesis Department Computer Science First Advisor Weitian Tong Second Advisor S.
    [Show full text]