2.5 Introducing the Tools (Short Overview) We Discussed the Field, the Positions in the Field and the Different Players That Are Active in the Game

Total Page:16

File Type:pdf, Size:1020Kb

2.5 Introducing the Tools (Short Overview) We Discussed the Field, the Positions in the Field and the Different Players That Are Active in the Game 2.5 Introducing the tools (short overview) We discussed the field, the positions in the field and the different players that are active in the game. Let’s now discuss the different tools they can use during the game. An entire overview of the hardware and software can be found here, but here is a quick overview of the most commonly used tools. 1. Keys 2. Wallets 3. Clients 4. Nodes 5. Mining tools 6. Github 7. Internet protocol & communication Side note: in level 3 will we do a deeper dive per tool! 1. Keys Nothing new here: we discussed the keys already so a short recap (details in level 3). We have, as you know, public/private key pairs. The private key is nothing more than a very, very, very (!!!!!!!!!!!!!!!!!!!!) big number (approx. between 1^77 = 2^256 in case of Bitcoin). For competition: current science states that there are between 1078 to 1082 atoms in the known, observable universe. The public key is nothing more than a hash of a hash of a hash, often using different hashing formulas, rendering is virtually impossible to calculate back to the original number. (“chances of succeeding are as big as being hit by a comet within 2 seconds”). But….what do we do with this key pair? Send (private) and receive (public) data transactions (often this data presents some form of value, like a bitcoin). So tool #1 is like the bat you need in baseball to move the ball. No keys = no bat = no game. 2. Wallets In short: the game of blockchain is played with as many keys as you like. Wallets offer the service of keeping your keys together and often ordened. A wallet is software that holds all your addresses. Use it to send bitcoins and manage your keys. Ownership is established through digital keys and digital signatures. These keys are generated locally on Bitcoin end-users’ computers using special software called a Bitcoin client. They can be stored in a file, in a database, or just printed on a piece of paper, but most commonly they are stored in a Bitcoin wallet. The keys within each user’s wallet allow the user to sign transactions, thereby providing cryptographic proof of the ownership of the bitcoins sourced by the transaction. Keep in mind that if you don’t know who generates your private keys, where they are stored, or if someone else has them (as when using a cryptocurrency exchange), they are not actually yours, as seen in the case of MtGox, which discontinued operations in February 2014. “Like email addresses, Bitcoin addresses can be shared with other Bitcoin users who can use them to send bitcoins directly to your wallet. Unlike email addresses, you can create new addresses as often as you like, all of which will direct funds to your wallet. A wallet is simply a collection of addresses and the keys that unlock the funds within. There is practically no limit to the number of addresses a user can create.” (from Antonopoulos, Mastering Bitcoin). Different wallets for different scenario’s, but most importantly: pick your wallet very carefully! In level 3 will we discuss and show you the different types, mainly categorized in hot wallets (created online) and cold wallets (created offline, stored away from internet). 3. Client In short: the client, also known as client software, is software that lets the wallet communicate with the network. In other words: it connects the wallet, that holds your keys, with the miners that records your transactions. Side note: this also enables to participate without becoming a full node (we rely on the client software of the wallet to connect to the SSOT). Check out the work Wikipedia did for us https://en.bitcoin.it/wiki/Clients 4. Nodes Catching up with the digital time (ledger) itself…downloading the bitcoin ledger (blockchain). Bitcoin “client” software - downloads the blockchain (transaction history). You know become a recordkeeper, just another copy of the distributed ledger among “client nodes” But…which blocks does the software pick? How does it (do I) reach consensus with other clients = BGP = longest chain principle Integrity check: do we have the same hash as others nodes?) A node is hardware (or an entity, just like a “miner”). It is quite easy to become a node (instructions), but it does require a lot of bandwidth and memory storage on your hardware device. (Bitcoin, n.d.) 5. Mining hardware The hardware we already discussed. Here is a comprehensive overview of the different kind of software. Students will explain in level 3 how to set up a rig in detail, will be an awesome session! (Beigel, 2019) 6. Github Developers Playground in the blockchain realm in short Github is a platform to co-work on projects together and to share data and code. Nowadays owned by Microsoft, www.github.com. More info on the platform can be found here, explained visually here. Get used to it, we will be working intensively with it in further levels. Here is your pick of tutorials (oooow what beautiful things did the internet for us teachers ). (Wikipedia, 2019) (GitHub, 2016) 7. Internet protocol & communication software Bitcoin uses a simple broadcast network to propagate transactions and blocks. All communications are done over TCP. Bitcoin is fully able to use ports other than 8333 via the -port parameter. IPv6 is supported with Bitcoind/Bitcoin-Qt v0.7. Using bitcoin over tor is also supported. (Bitcointalk, 2012) (Bitcoin, 2019)In general: Source (Bitcoin, 2018) The Transmission Control Protocol is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol. Therefore, the entire suite is commonly referred to as TCP/IP. Always wanted to know how the internet works? Click here. Perhaps also interesting: here you can find how your phone communicates. (Engineering, 2019) (Learn Engineering , 2018) Further readings - Overview tools: https://en.bitcoin.it/wiki/Main_Page - Clients explained: https://en.bitcoin.it/wiki/Clients - Instructions on how to become a node: https://bitcoin.org/en/full-node - A comprehensive overview of the different kind of mining software: https://99bitcoins.com/bitcoin-mining/software/ - Github explained https://en.wikipedia.org/wiki/GitHub - Github explained visually: https://www.youtube.com/watch?v=w3jLJU7DT5E - Github Tutorial: https://www.youtube.com/results?search_query=github+website+tut orial - Bitcoin communications: https://bitcointalk.org/index.php?topic=81378.0 - Tor explained: https://en.bitcoin.it/wiki/Tor - Bitcoin Network Tech: https://en.bitcoin.it/wiki/Network - How does the internet work (short?): https://www.youtube.com/watch?v=x3c1ih2NJEg - How does the internet work (Harvard, long): https://www.youtube.com/watch?v=U6hkOAnFJxM&feature=emb_logo - How does your mobile phone works: https://www.youtube.com/watch?v=1JZG9x_VOwA 2.6 I Transactions This session is all about the ball in the game, no ball = no game. With blockchains it is all about sending value from one to another, hard to do without transacting. We first start with a minor overview of transactions and the different accounting ways on how to record them (which we will do an entirely separate course about later, this is like in the crypto flower, an entire field on its own called accounting & auditing). After you have learned the very basic elements we will explain how transactions work on Bitcoin and on Ethereum. This way we have covered most of the different types of transactions being send around the world We of course invite you to dig out other variants as well on your own! So let’s start with the beginning, what were the transactions again? In short. As you know we use transactions to send value from entity a to for example entity b. Value in the digital realm is represented by data (bits & bytes), and blockchain either fully transfers the data (= processed in totality) or nothing at all. If a transaction is deemed valid by the protocol the miners and minters record them as you know now, it they aren’t valid they are ignored (but you are always able to try to send invalid transactions, they just don’t record them). No recording = no transfer. An abbreviation a transactions = “tx”. Where the internet enabled us to transfer information, a blockchain additionally enables us to transfer value. By solving the BGP, we can create a global Single Source of Truth without Trusted Third Parties = creating a digital ledger we can use to send unique pieces of data representing value. It is unique, because we all agree about who owns that data (we will discuss “the how” of this later on). This article explains why bitcoin is an accounting revolution. It portrays a good overview and history of accounting & audit, all the way leading up to lightning network. A must read for our students as you may have seen in the portfolio already ! In short: it explains the migration from single entry accounting to “triple entry accounting”. 2.6.1 Single Entry Single entry accounting = profit & loss recording. Did not work optimally because you could not determine balance positions (needed for example for stock positions etc.). Single-entry accounting is a form of bookkeeping and accounting in which each financial transaction is a single entry in a journal or transaction log (system is called single- entry system, the approach single-entry bookkeeping). Easy approach, does not require training in accounting. A few (small!) businesses choose single-entry accounting instead of the more common double-entry system. With the single-entry approach, each financial event calls for just one accounting system transaction.
Recommended publications
  • Steem an Incentivized, Blockchain-Based Social Media Platform
    Steem An incentivized, blockchain-based social media platform. Daniel Larimer, Ned Scott, Valentine Zavgorodnev, Benjamin Johnson, James Calfee, Michael Vandeberg March 2016 Abstract Steem is a blockchain database that supports community building and social interaction with cryptocurrency rewards. Steem combines concepts from social media with lessons learned from building cryptocurrencies and their communities. An important key to inspiring participation in any community, currency or free market economy is a fair accounting system that consistently reflects each person's contribution. Steem is the first cryptocurrency that attempts to accurately and transparently reward an unbounded number of individuals who make subjective contributions to its community. ​ ​ ​ ​ 2 of 44 Table of Contents Abstract Table of Contents Introduction Recognizing Contribution Ways to Contribute Capital Contributions Steem (STEEM) ​ ​ Steem Power (SP) Steem Dollars (SMD) Minimizing Fraudulent Feeds Mitigating Timing Attacks Minimizing Abuse of Conversions Liquidity Sustainable Debt to Ownership Ratios Interest Setting Price Feeds Subjective Contributions Distributing Currency Voting on Distribution of Currency Voting Collusion The Story of the Crab Bucket Rate Limited Voting Delayed Payouts Payout Distribution Rewarding Parent Posts Payouts Consensus Algorithm Consensus in Steem Mining in Steem Mining Rewards require Steem Power ​ Mining Algorithm Botnet Resistant Mining Pool Resistant Eliminating Transaction Fees The Problem With Fees Micropayments Don’t Work Fees are a Barrier to Entry Changing Fees Sybil Attacks Full Reserve vs Fractional Reserve 3 of 44 Iterating Beyond Micropayments Example Implementation Case Study: Bitcoin Impact of Capacity Maximum Number of Unique Users Comparison to Fees Account Creation Justifying Minimum Balances Adjusting the Reserve Ratio Effectiveness Relative to Fees Renting vs.
    [Show full text]
  • Blockchain Based Daily Pixel Art Competition
    The Blockchain Based Daily Pixel Art Competition Bachelor Thesis Kees Fani Manuel Borba da Silva Falcão Ferreira Pavel Hoogland 25/06/2018 TU Coach: Dr. Ir. Rafael Bidarra Client adviser: MSc. Marco van Etten Coordinator: Dr. Ir. Otto Visser 1 Table of Contents Table of Contents 1 PREFACE 8 Summary 9 Introduction 10 Blockchain Developments 10 New possibilities 10 Client and Supervision 11 Structure 12 Problem Definition 13 Decentralized vs Centralized 13 Conflicts in Gaming 13 Creation of a Blockchain Game 14 Problem Analysis 15 Cost of Centralization 15 Persistent Games 15 Other Benefits of Decentralization 16 Challenges of the Problem 16 Blockchain 17 Bitcoin 17 Mining 18 Ethereum and Smart Contracts 18 Flaws and possible solutions 18 Mining pools 18 Bitcoin Scalability 19 Proof of Stake 19 Steem & EOS 20 Steem 20 Delegated Proof of Stake 20 EOS 21 Current Activity 22 2 Game Design Phase 24 Client Requirements 24 Search-Space Reduction 25 No fast-paced games 25 No games relying on asymmetric information 25 No games relying on randomness 25 Game must rely on a token 25 Casual gameplay 25 No Complex games 25 Search-Space Exploration 26 Deposit Based Play 26 Collaborative Content Creation 26 Deathmatch Free For All 26 Turn Based Strategy 26 Category Elimination 27 Deposit Based Play 27 Deathmatch Free For All 27 Turn based strategy 27 Collaborative Content Creation 27 Search-Space Exploitation 28 Collaborative Music Creation 28 Collaborative Sculpting 28 Collaborative Drawing 28 Our Preference 28 Refined Game Concept 29 Drawing Mechanism
    [Show full text]
  • CRYPTO CURRENCY Technical Competence & Rules of Professional Responsibility
    CRYPTO CURRENCY Technical Competence & Rules of Professional Responsibility Marc J. Randazza Rule 1.1 Comment 8 To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject. Crypto Currency 1. What is Crypto Currency? 2. How does it work? 3. How could you screw this up? Blockchain •Decentralized •Transparent •Immutable Blockchain Blockchain • Time-stamped series of immutable records of data • Managed by a cluster of de-centralized computers • Each block is secured and bound to another, cryptographically • Shared • Immutable • Open for all to see – how you keep it honest Blockchain Blockchain • Transparent but also pseudonymous • If you look on the ledger, you will not see “Darren sent 1 BTC to Trixie” • Instead you will see “1MF1bhsFLkBzzz9vpFYEmvwT2TbyCt7NZJ sent 1 BTC” • But, if you know someone’s wallet ID, you could trace their transactions Crypto Roller Coaster – 5 years Crypto Roller Coaster – 1 day How can you screw this up? Quadriga You can lose it & Bankruptcy Your mind • C$190 million turned to digital dust • Thrown away with no back up • Death of CEO turned death of • $127 million in the trash – gone business • 7,500 BTC – Fluctuates WILDLY Ethical Considerations You might be surprised at what violates Rule 1.8 Which Rules? Rule 1.2 (d) – Criminal or Fraudulent Activity Rule 1.5 (a) – Reasonable Fee Rule 1.6 – Confidentiality Rule 1.8 (a) – Business Dealings With Clients Rule 1.8(f) – Compensation From Other Than Your Client Rule 1.15 (a) – Safekeeping Property Rule 1.15 (c) – Trust Accounts Rule 1.2(d) – Criminal or Fraudulent Activity • Crypto *can* be used for criminal activity • Tends to be difficult, but not A lawyer shall not ..
    [Show full text]
  • The Anatomy of a Cryptocurrency Pump-And-Dump Scheme
    The Anatomy of a Cryptocurrency Pump-and-Dump Scheme Jiahua Xu, École polytechnique fédérale de Lausanne (EPFL); Benjamin Livshits, Imperial College London https://www.usenix.org/conference/usenixsecurity19/presentation/xu-jiahua This paper is included in the Proceedings of the 28th USENIX Security Symposium. August 14–16, 2019 • Santa Clara, CA, USA 978-1-939133-06-9 Open access to the Proceedings of the 28th USENIX Security Symposium is sponsored by USENIX. The Anatomy of a Cryptocurrency Pump-and-Dump Scheme Jiahua Xu Benjamin Livshits École Polytechnique Fédérale de Lausanne (EPFL) Imperial College London Imperial College London UCL Centre for Blockchain Technologies Harvard University Brave Software Abstract Regulation: In February 2018, the CFTC (Commodity Fu- tures Trading Commission) issued warnings to consumers [8] While pump-and-dump schemes have attracted the atten- about the possibility of cryptocurrency pump-and-dump tion of cryptocurrency observers and regulators alike, this schemes. It also offered a substantial reward to whistle- paper represents the first detailed empirical query of pump- blowers around the same time [12]. and-dump activities in cryptocurrency markets. We present In October 2018, the SEC (Securities and Exchange Com- a case study of a recent pump-and-dump event, investigate mission) filed a subpoena enforcement against an investment 412 pump-and-dump activities organized in Telegram chan- company trust and trustee for an alleged pump-and-dump ICO nels from June 17, 2018 to February 26, 2019, and discover scheme [27]. patterns in crypto-markets associated with pump-and-dump Clearly, regulators are aiming to find perpetrators of pump- schemes.
    [Show full text]
  • XTRD Whitepaper
    Version 1.5 WHITE PAPER VERSION 1.5 1 3 / 07/3/07/20182018 Version 1.4 Disclaimer PLEASE READ THIS DISCLAIMER SECTION CAREFULLY. IF YOU ARE IN ANY DOUBT AS TO THE ACTION YOU SHOULD TAKE, YOU SHOULD CONSULT YOUR LEGAL, FINANCIAL, TAX, OR OTHER PROFESSIONAL ADVISOR(S). This white paper is for informational purposes only. The information set forth below and elsewhere in this white paper may not be exhaustive and does not imply any elements of a contractual relationship. While we make every effort to ensure that any material in this white paper is accurate and up to date, such material in no way constitutes the provision of professional advice. XTRD Digital Assets Inc. does not guarantee, and accepts no legal liability whatsoever arising from or connected to the accuracy, reliability, currency, or completeness of any material contained in this white paper. Any potential XTRD token holders or investors should seek appropriate independent professional advice prior to relying on, or entering into any commitment or transaction based on, material published in this white paper, which material is purely published for reference purposes alone. XTRD tokens will not be intended to constitute securities in any jurisdiction. This white paper does not constitute a prospectus or offer document of any sort and is not intended to constitute an offer of securities or a solicitation for investment in securities in any jurisdiction. TRD Digital Assets, Inc. does not provide any opinion on any advice to purchase, sell, or otherwise transact with XTRD tokens and the fact of presentation of this white paper shall not form the basis of, or be relied upon in connection with, any contract or investment decision.
    [Show full text]
  • Blockchain Technology: Introduction
    Blockchain Technology: Introduction Ashley Lannquist World Economic Forum 0 Blockchain Technology • A record log with distributed ownership that can host and record transactions between multiple parties in a peer-to-peer, verifiable, and permanent way. 1 Features • Distributed and synchronized • Peer-to-Peer Transmission • Transparency • Traceability • Irreversibility of Records • Automated “smart contract” execution Features • Globally Shared Record Log ➢ Transactions continually synced across participants ➢ Common, shared view of transaction history ➢ Facilitates interparty reconciliation, agreement on transaction activity Transactions = transfer / sending of value, information, records, etc. ~ Main mode of interaction in blockchain networks Features • Distributed/decentralized functionality & data storage ➢ Record logs stored in distributed manner across computer “nodes” ➢ No single party controls data/info ➢ Reduces risk of fraud, corruption, other misbehavior by centralized database owners ➢ Database robustness from redundancy Features • Transaction Transparency ➢ Transactions visible to all network participants ➢ (Network can be public or permissioned) ➢ (Can overlay privacy features for confidentiality) Features • Transaction & Asset Traceability ➢ Movement of funds and goods across transactions visible and traceable ➢ Provenance/origin/supply chain tracking capability Features • Irreversibility of Records (“Immutability”) ➢ Using cryptography, data is tamper- proof ➢ Multiple parties can access and write to the ledger but no one
    [Show full text]
  • Consensus, Immutable Agreement for the Internet of Value
    Consensus Immutable agreement for the Internet of value kpmg.com Seizing opportunity – blockchain and beyond Contents ack in early 2009, the high-profile journey of the first About the authors Bitcoin overshadowed the ingenuity of its underlying The terms 1 Seizing opportunity – Blockchain and beyond Blockchain, distributed ledgers, Sigrid Seibold technology, the blockchain protocol. These days, however, B and consensus mechanisms are Principal, Advisory Capital 2 The basics behind blockchain blockchain is garnering its own share of headlines. Inspired by sometimes used interchangeably. Markets, KPMG LLP 3 Consensus the original blockchain protocol, a variety of new consensus For purposes of this paper, we use Sigrid looks back at 25 years mechanisms and new types of distributed ledger technologies the following definitions: of working in the banking 10 Key observations are continuing to emerge. As innovation accelerates, proponents and capital markets industry. 14 Is blockchain right for your organization Blockchain: A type of distributed She primarily focuses on are eagerly seeking solutions that may work within the current ledger database that maintains a the major investment banks, leveraging her areas of 15 Maneuvering the road ahead regulatory confines of financial services and other industries. continuously growing list of transaction specialization, such as data management and digital 17 Appendix 1: Key terminology records ordered into blocks with various technologies, including financial and blockchain. As a As a result, more and more financial services companies and venture capital (VC) firms protections against tampering and respected industry thought leader, she has published 19 Appendix 2: Consensus mechanism valuation are looking closely at blockchains and other distributed ledgers, and with good reason.
    [Show full text]
  • Cryptocurrency: a Primer for Policy-Makers
    August 2019 Cryptocurrency: A Primer for Policy-Makers Zack Gold and Megan McBride Approved for public release. Unlimited distribution. CRM-2019-U-020185-Final Abstract This primer is an effort to address a gap in knowledge about cryptocurrencies and the cryptocurrency ecosystem among the policymaking community and advance the understanding of cryptocurrencies and consideration of their national security implications. Cryptocurrencies are strictly digital currencies, are typically overseen by a decentralized peer-to-peer community, and are secured through cryptography. We use clear, non-technical language to describe complex concepts and demystify overly technical terms in order to explain the technical and economic aspects of cryptocurrency, why they are used, and the benefits and drawbacks to cryptocurrencies compared to conventional currencies—like the US dollar. We conclude by considering some cryptocurrency-related issues of which greater exploration would benefit US national security. This document contains the best opinion of CNA at the time of issue. It does not necessarily represent the opinion of the sponsor or client. Distribution Approved for public release. Unlimited distribution. Cover image credit: “Photo of a mobile phone with a Bitcoin Cash wallet, Bitcoin whitepaper by Satoshi Nakamoto and Bitcoin.com pen.” BitcoinXio, Apr. 15, 2018. Approved by: August 2019 Jonathan Schroden, Research Program Director Special Operations Program Center for Stability & Development Strategy, Policy, Plans, and Programs Division (SP3) Request additional copies of this document through [email protected]. Copyright © 2019 CNA. All rights reserved Executive Summary In 2017, the value of one Bitcoin skyrocketed to more than $20,000. Media coverage increased, and even people who did not join the investment frenzy became aware of so-called “cryptocurrencies.” Despite this familiarity, few actually understand cryptocurrencies and the implications they may have on US interests, from global finance to national security to good governance.
    [Show full text]
  • Defining an Ico Securities Safe Harbor in the Cryptocurrency “Wild West”
    THE SEC RIDES INTO TOWN: DEFINING AN ICO SECURITIES SAFE HARBOR IN THE CRYPTOCURRENCY “WILD WEST” C. Daniel Lockaby This Note recommends a viable way for the Securities and Exchange Commission (SEC) to apply the Regulation S foreign-issuer safe harbor to Initial Coin Offerings (ICOs). In the last two years, cryptocurrencies and blockchain-based companies have witnessed dramatic rises in price and value. New entrants to the crypto-markets often use ICOs as virtual public offerings to earn capital and develop their projects. The SEC has signaled that they plan to fold ICOs and blockchain offerings into existing securities law. How these new virtual capital-raising mechanisms will fit into this framework is still largely unknown. As a defensive measure, many ICOs have banned US investors in an attempt to become foreign offerings that are outside the SEC's reach. Regulation S is the existing safe harbor that conventional securities offerings utilize to ensure that they are "foreign offerings." While ICOs are novel and do not fit perfectly into Regulation S's language, the safe harbor can be adapted to appropriately set parameters for ICOs. This Note suggests the correct interpretation that both protects US consumers and sets acceptable requirements for corporations seeking to fall within Regulation S. J.D. Candidate, University of Georgia School of Law, 2019. 335 336 GEORGIA LAW REVIEW [Vol. 53:335 TABLE OF CONTENTS I. INTRODUCTION.......................................................................... 337 II. THE BRAVE NEW CRYPTO WORLD ........................................... 339 A. WHAT IS BLOCKCHAIN? ................................................... 339 B. HOW ICOS WORK ............................................................. 342 C. THE PRE-2017 “WILD WEST” ............................................ 343 III. SEC INVOLVEMENT .........................................................................346 A.
    [Show full text]
  • Blockchain and Freedom of Expression
    Blockchain and freedom of expression 2019 Blockchain and freedom of expression 1 ARTICLE 19 Free Word Centre 60 Farringdon Road London EC1R 3GA United Kingdom T: +44 20 7324 2500 F: +44 20 7490 0566 E: [email protected] W: www.article19.org Tw: @article19org Fb: facebook.com/article19org © ARTICLE 19, 2019 This work is provided under the Creative Commons Attribution-Non-Commercial-ShareAlike 2.5 licence. You are free to copy, distribute and display this work and to make derivative works, provided you: 1) give credit to ARTICLE 19; 2) do not use this work for commercial purposes; 3) distribute any works derived from this publication under a licence identical to this one. To access the full legal text of this licence, please visit: http://creativecommons.org/licenses/ by-nc-sa/2.5/legalcode. ARTICLE 19 would appreciate receiving a copy of any materials in which information from this report is used. Contents Executive summary 4 Summary of recommendations 6 Introduction 9 Background to blockchains 12 Key terminology 12 Key characteristics of blockchains 14 International human rights standards and blockchains 16 Right to freedom of expression 16 Right to privacy 17 Internet governance 18 Intermediary liability 18 Blockchains and freedom of expression 20 Decentralisation, disintermediation and freedom of expression 20 Digital access and literacy 21 Security and vulnerability of access points 22 Governance 23 Use case: content dissemination 25 Dissemination of text 25 Dissemination of multimedia and the ‘permanent web’ 27 Blockchain-based social networks 29 Use case: authentication 32 Authentication of individuals 32 Authentication of content (digital notarisation) 37 Use case: personal data and storage of identity-linked information 39 Use case: cryptocurrencies 41 Conclusions and recommendations 43 Recommendations 44 About ARTICLE 19 48 Endnotes 49 Executive summary In this report, ARTICLE 19 examines the impact and implications of blockchain technology for the right to freedom of expression.
    [Show full text]
  • Law and the Blockchain
    Law and the Blockchain Usha 1K Rodrigues* ABSTRACT: All contracts are necessarily incomplete. The inefficiencies of bargainingover every contingency, coupled with humans' innate bounded rationality, mean that contracts cannot anticipate and address every potential eventuality. One role of law is to fill gaps in incomplete contracts with default rules. Emerging technologies have created new, yet equally incomplete, types of contracts that exist outside of this traditionalgapfilling legal role. The blockchain is a distributed ledger that allows the cryptographic recording of transactions and permits "smart" contracts that self-execute automatically if their conditions are met. Because humans code the contracts of the blockchain, gaps in these contracts will arise. Yet in the world of "smart contracting"on the blockchain, there is no placefor the law to step in to supply default rules-no "legal intervention point." The lack of a legal intervention point means that law on the blockchain works in a fundamentally different way from law in the corporealworld. Business organizationallaw provides a prime example of how the law uses default rules to fill gaps in an incomplete contract and how the law works differently in the blockchain context. I. INTRODU CTION ............................................................................. 68o II. ORGANIZATIONAL LAW AS A GAP FILLER ...................................... 686 A. THE FIRM AS AN INCOMPLETEFCONTRACT................................ 686 B. THEORIES OF, TimE CORPORATE FoRM ......................................
    [Show full text]
  • Cryptocurrency Exchange Option Is Among One of the Most Promising Areas (Figure 1)
    BDCENTER.DIGITAL CONTENTS Introduction 3 1. Jurisdictions 6 2. Exchanges possessing their own tokens 11 3. Profitability 17 4. Website versions (language and additional versions, landings) 23 5. Analysis of Fiat Gateways Capabilities 27 6. PR 34 7. Analysis of traffic sources 37 8. Social Networks 48 9. Social network activity shown by managers of the Exchanges 54 10. Forums activity 59 11. SEO, link mass, mentioning 60 12. Email marketing 73 13. Referral and affiliate programs 75 14. Visual style 79 15. Target Audiences 83 16. Opinion leaders 88 17. Brokers at Forex who work with cryptocurrency 90 Conclusion 99 2 BDCENTER.DIGITAL INTRODUCTION Nowadays, the Initial Coin Offering (ICO market) is experiencing a fundraising decline, that’s why many key market players have started to look for other high-yield cryptocurrency projects. Cryptocurrency exchange option is among one of the most promising areas (figure 1). Raised funds & Number of ICOs Check the amount of funds raised and number of ICOs finished by month for the past 12 months. Source: websites icobench.com/stats 3 BDCENTER.DIGITAL Figure 1. ICO funding has been declining from a record of 1.7 billion dollars in March to under 0.2 billion in October 2018. Binance Exchange turned out to be a huge success. Experts note that this exchange is the most successful unicorn startup in the history of cryptoprojects. In the last six months, Binance estimation of the market size was close to $ 2 billion. Moreover, the project is profitable. In a short period of time, the income of all cryptocurrency exchanges has grown rapidly.
    [Show full text]