A Privacy-Preserving Decentralized Storage with Payments Based on a Blockchain

Total Page:16

File Type:pdf, Size:1020Kb

A Privacy-Preserving Decentralized Storage with Payments Based on a Blockchain A Privacy-preserving Decentralized Storage with Payments Based on a Blockchain Dissertation zur Erlangung des Doktorgrades Dr. rer. nat. der Fakultat¨ fur¨ Ingenieurwissenschaften, Informatik und Psychologie der Universitat¨ Ulm Henning Johannes Gustav Kopp aus Villingen-Schwenningen 2018 Institut f¨urVerteilte Systeme Universit¨atUlm, Deutschland Amtierender Dekan: Prof. Maurits Ortmanns Gutachter: Prof. Frank Kargl Gutachter: Prof. Frederik Armknecht Tag der Promotion: 20.12.2018 Summary Recently, the paradigm of cloud storage has seen wide acceptance in industry and for personal use. One of its core principles is to outsource storage, such that users can be billed flexibly by their actual demand. However, outsourcing storage such as private data or business secrets leads to privacy problems, as control over the data is lost to the storage provider. This is intensified by the fact that often privacy is considered only as an afterthought in these systems and not integrated into the design from the beginning. Privacy-preserving alternatives to these centralized cloud storage providers are peer-to-peer systems like Freenet or GNUnet. In these systems, participants can donate storage to other users of the system. Privacy plays a vital role in these systems, as, e. g., participants are unable to access data of other users if they are not authorized to do so, even if the data of the other users resides on their own hard disk. However, these decentralized systems suffer from limited contribution due to a lack of incentives to participate. Naively enhancing these systems with the possibility of payments such that storage providers can earn money, infringes privacy, since tracing of payment flows provides links between users and their storage providers. Consequently, a form of anonymous payment needs to be considered when enhancing such storage systems with remuneration. A very similar problem of providing incentives for protocol adoption is solved by the digital currency Bitcoin which rewards participants by uncloneable currency units which are themselves called bitcoins. Although Bitcoin is not privacy-preserving, the scenario of such blockchain architectures is very similar to a peer-to-peer storage platform and thus provides a good starting point. We provide two designs of a decentralized storage system with incentives for the participants to contribute. Our first design exchanges the proof of work mining process of a blockchain by publicly verifiable proofs of storage. These are cryptographic proofs that allow a storage provider to convince a verifier that it has stored some data of another participant. While this approach leads to a working system, it is not able to provide the envisioned privacy and security guarantees. Although the link between storage provider and user is severed, the link between a storage provider and its stored file is still observable. Further, the sender and receiver are revealed for transfers of digital cash which are unrelated to a file, as in Bitcoin. i ii Improving on our first design, we provide a second design of a privacy- preserving storage. Here, the senders and receivers of transactions are anony- mous due to our use of linkable ring signatures and one-time payment addresses. The storage is managed via smart storage contracts which are special transac- tions that grant the storage provider a financial reward if the storage provider is able to provide proofs of storage at predetermined times. Since storage contracts constitute a special form of transactions, linkable ring signatures and one-time payment addresses are applicable to storage smart contracts as well, where they provide anonymity of the user and storage provider. After introducing our two designs of a privacy-preserving storage system, we focus on selected building blocks of our architecture. We provide a thorough comparison between different publicly verifiable proof of storage schemes. Further, we design a new publicly verifiable proof of storage scheme from a modification of the Guillou-Quisquater identification protocol whose security is based on the RSA-assumption. We implemented all discussed proof of storage schemes and provide benchmarks regarding their real-world performance. Since our second storage system design relies on the wasteful proof of work mining process of Bitcoin, we propose a novel mining algorithm based on proofs of human work. These are solutions to problems that only humans are able to solve efficiently and thus prove cryptographically that an amount of human work has been performed. In contrast to a CAPTCHA, these proofs of human work are publicly verifiable. Our construction of a proof of human work relies on secure multiparty computation, which is a well-known cryptographic primitive with multiple known feasible instantiations. The only other instantiation of a proof of human-work known to date relies on indistinguishability obfuscation|a cryptographic primitive that is only speculated to exist and where no secure instantiation is currently known. As a third building block, we turn our attention to routing in payment channels. Payment channels are widely regarded as a solution to the low transaction throughput of blockchains. As an example, Bitcoin allows for around 7 transactions per second globally. Payment channels are bilateral channels, which include a balance that can be updated. Only the opening and the closing of the channel is written to the blockchain. Inside the channel, there can be multiple updates to the payment which are not written to the blockchain. The design of payment channels guarantees that no participant can cheat by persisting older transaction states to the blockchain. A network of payment channels operates as an overlay network to the blockchain and allows for routing of transactions over multiple hops. Up to now, routing algorithms in this setting have only been discussed from a purely technological perspective without taking into account the economical impact, like capacity constraints, routing fees, cost of locked capital, and the focus on the cheapest route (as opposed to the shortest route). Our treatment provides the first economic-technical analysis of routing in payment channels. We provide measurements of the cheapest route and the number of failed transactions due to capacity constraints using our custom simulator. In summary, our results show that it is possible to design a decentralized privacy-preserving storage system with remuneration for it participants. With the addition of anonymous payments we hope to increase participation beyond that of traditional decentralized storage systems. Short contents 1 Introduction 1 2 Background 9 3 Basic Design 37 4 Privacy Enhanced Design 59 5 A Comparison of Publicly Verifiable Proofs of Storage 85 6 uMine: A Mining Algorithm based on Human Work 113 7 The Economical Impact on Routing in Payment Channel Networks 133 8 Conclusion & Outlook 149 Author's Publications 157 Bibliography 159 iii Contents 1 Introduction 1 1.1 Research Questions and Contribution . 2 1.2 Outline . 6 1.3 Notation . 8 2 Background 9 2.1 Privacy . 9 2.1.1 Privacy by Design . 9 2.1.2 Privacy Patterns . 11 2.1.3 Privacy Design Strategies . 11 2.1.4 Privacy Enhancing Technologies (PETs) . 13 2.2 Blockchain Technology . 13 2.2.1 Bitcoin and the Blockchain . 13 2.2.2 Beyond Bitcoin . 19 2.3 Proofs of Storage . 28 2.4 Related Work . 31 2.4.1 Permacoin and Retricoin . 32 2.4.2 Filecoin . 32 2.4.3 Anonymous Storage Systems . 34 2.4.4 Summary . 35 3 Basic Design 37 3.1 Our Scheme . 38 3.1.1 Overview . 39 3.1.2 The Blockchain and Mining Process . 41 3.1.3 The Store Transaction . 44 3.1.4 Fetching Files . 45 3.2 Security and Privacy Analysis . 48 3.2.1 Security . 48 3.2.2 Privacy . 51 3.3 Conclusion . 58 4 Privacy Enhanced Design 59 4.1 Building Blocks . 61 iv CONTENTS v 4.1.1 Linkable Ring Signatures . 61 4.1.2 One-time Payment Addresses . 66 4.2 Roles . 68 4.3 Design of our System . 68 4.3.1 Mining . 69 4.3.2 Anonymous Payments . 70 4.3.3 File Handling . 72 4.4 Security and Privacy Analysis . 76 4.4.1 Privacy Properties . 76 4.4.2 Security Analysis . 79 4.5 Additional Considerations . 81 4.5.1 Files . 81 4.5.2 Blockchain Transmissions . 81 4.5.3 File Transmissions . 82 4.5.4 Summary . 82 4.6 Conclusion . 82 5 A Comparison of Publicly Verifiable Proofs of Storage 85 5.1 Preliminaries . 88 5.1.1 Identification Protocol . 88 5.1.2 Proof of Storage . 90 5.2 Proofs of Storage . 94 5.2.1 Proof of Storage from Guillou-Quisquater . 94 5.2.2 Shoup Proof of Storage . 98 5.2.3 Shacham-Waters Proof of Storage . 99 5.3 Evaluation . 103 5.3.1 Method . 103 5.3.2 Results and Discussion . 104 5.3.3 Verification Preprocessing . 105 5.4 Modifications for Use in our Storage System . 107 5.5 Future Work . 109 5.5.1 Anonymous Proofs of Storage . 110 5.5.2 Post-quantum Security . 110 5.6 Conclusion . 112 6 uMine: A Mining Algorithm based on Human Work 113 6.1 Building Blocks . 114 6.1.1 Slow Hash Functions . 114 6.1.2 Captchas . 115 6.1.3 Proof of Human-work Puzzles . 118 6.1.4 Multiparty Computation Protocol . 119 6.2 Our Construction . 120 6.2.1 Overview . 120 6.2.2 Our Proof of Human-Work . 120 6.2.3 Block Generation . 124 6.2.4 Choosing the Captcha Generators . 126 6.3 Security . 128 6.4 Notes on Implementing our Scheme . 130 6.5 Related Work . 131 6.6 Conclusion . 132 vi CONTENTS 7 The Economical Impact on Routing in Payment Channel Networks 133 7.1 Background . 135 7.2 Challenges . 137 7.3 Our Approach . 138 7.3.1 Notation .
Recommended publications
  • IPFS and Friends: a Qualitative Comparison of Next Generation Peer-To-Peer Data Networks Erik Daniel and Florian Tschorsch
    1 IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks Erik Daniel and Florian Tschorsch Abstract—Decentralized, distributed storage offers a way to types of files [1]. Napster and Gnutella marked the beginning reduce the impact of data silos as often fostered by centralized and were followed by many other P2P networks focusing on cloud storage. While the intentions of this trend are not new, the specialized application areas or novel network structures. For topic gained traction due to technological advancements, most notably blockchain networks. As a consequence, we observe that example, Freenet [2] realizes anonymous storage and retrieval. a new generation of peer-to-peer data networks emerges. In this Chord [3], CAN [4], and Pastry [5] provide protocols to survey paper, we therefore provide a technical overview of the maintain a structured overlay network topology. In particular, next generation data networks. We use select data networks to BitTorrent [6] received a lot of attention from both users and introduce general concepts and to emphasize new developments. the research community. BitTorrent introduced an incentive Specifically, we provide a deeper outline of the Interplanetary File System and a general overview of Swarm, the Hypercore Pro- mechanism to achieve Pareto efficiency, trying to improve tocol, SAFE, Storj, and Arweave. We identify common building network utilization achieving a higher level of robustness. We blocks and provide a qualitative comparison. From the overview, consider networks such as Napster, Gnutella, Freenet, BitTor- we derive future challenges and research goals concerning data rent, and many more as first generation P2P data networks, networks.
    [Show full text]
  • A Decentralized Cloud Storage Network Framework
    Storj: A Decentralized Cloud Storage Network Framework Storj Labs, Inc. October 30, 2018 v3.0 https://github.com/storj/whitepaper 2 Copyright © 2018 Storj Labs, Inc. and Subsidiaries This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 license (CC BY-SA 3.0). All product names, logos, and brands used or cited in this document are property of their respective own- ers. All company, product, and service names used herein are for identification purposes only. Use of these names, logos, and brands does not imply endorsement. Contents 0.1 Abstract 6 0.2 Contributors 6 1 Introduction ...................................................7 2 Storj design constraints .......................................9 2.1 Security and privacy 9 2.2 Decentralization 9 2.3 Marketplace and economics 10 2.4 Amazon S3 compatibility 12 2.5 Durability, device failure, and churn 12 2.6 Latency 13 2.7 Bandwidth 14 2.8 Object size 15 2.9 Byzantine fault tolerance 15 2.10 Coordination avoidance 16 3 Framework ................................................... 18 3.1 Framework overview 18 3.2 Storage nodes 19 3.3 Peer-to-peer communication and discovery 19 3.4 Redundancy 19 3.5 Metadata 23 3.6 Encryption 24 3.7 Audits and reputation 25 3.8 Data repair 25 3.9 Payments 26 4 4 Concrete implementation .................................... 27 4.1 Definitions 27 4.2 Peer classes 30 4.3 Storage node 31 4.4 Node identity 32 4.5 Peer-to-peer communication 33 4.6 Node discovery 33 4.7 Redundancy 35 4.8 Structured file storage 36 4.9 Metadata 39 4.10 Satellite 41 4.11 Encryption 42 4.12 Authorization 43 4.13 Audits 44 4.14 Data repair 45 4.15 Storage node reputation 47 4.16 Payments 49 4.17 Bandwidth allocation 50 4.18 Satellite reputation 53 4.19 Garbage collection 53 4.20 Uplink 54 4.21 Quality control and branding 55 5 Walkthroughs ...............................................
    [Show full text]
  • Osiris Secure Social Backup
    James Bown Osiris Secure Social Backup Computer Science Tripos, Part II Project St John’s College May 17, 2011 The cover page image is the hieroglyphic representation of the Ancient Egyptian god of the underworld, Osiris. His legend tells of how he was torn into pieces and later resurrected by bringing them together once again. The font used to generate this image was used with the kind permission of Mark-Jan Nederhof (http://www.cs.st-andrews.ac.uk/~mjn/). Proforma Name: James Bown College: St John’s College Project Title: Osiris – Secure Social Backup Examination: Computer Science Tripos, Part II Project Date: May 17, 2011 Word Count: 11,841 Project Originator: Malte Schwarzkopf Supervisor: Malte Schwarzkopf Original Aims of the Project To produce a distributed system enabling mutually beneficial peer-to-peer backup between groups of friends. Each user provides storage space on their personal machine for other users to back up their data. In exchange, they have the right to back up their own files onto their friends’ machines. I focus on the challenges of space efficient distribution and fault tolerant retrieval of data. The use of convergent encryption and a strict security policy maintains confidentiality of data. Work Completed All success criteria specified in the proposal have been not only fulfilled, but exceeded. I have implemented a concurrent and distributed peer-to-peer backup system that is able to send, retrieve and remove files from the network, recover from node failure or loss, and provide high security supporting convergent encryption. Finally, I have completed a number of additional extensions.
    [Show full text]
  • Henry Jenkins Convergence Culture Where Old and New Media
    Henry Jenkins Convergence Culture Where Old and New Media Collide n New York University Press • NewYork and London Skenovano pro studijni ucely NEW YORK UNIVERSITY PRESS New York and London www.nyupress. org © 2006 by New York University All rights reserved Library of Congress Cataloging-in-Publication Data Jenkins, Henry, 1958- Convergence culture : where old and new media collide / Henry Jenkins, p. cm. Includes bibliographical references and index. ISBN-13: 978-0-8147-4281-5 (cloth : alk. paper) ISBN-10: 0-8147-4281-5 (cloth : alk. paper) 1. Mass media and culture—United States. 2. Popular culture—United States. I. Title. P94.65.U6J46 2006 302.230973—dc22 2006007358 New York University Press books are printed on acid-free paper, and their binding materials are chosen for strength and durability. Manufactured in the United States of America c 15 14 13 12 11 p 10 987654321 Skenovano pro studijni ucely Contents Acknowledgments vii Introduction: "Worship at the Altar of Convergence": A New Paradigm for Understanding Media Change 1 1 Spoiling Survivor: The Anatomy of a Knowledge Community 25 2 Buying into American Idol: How We are Being Sold on Reality TV 59 3 Searching for the Origami Unicorn: The Matrix and Transmedia Storytelling 93 4 Quentin Tarantino's Star Wars? Grassroots Creativity Meets the Media Industry 131 5 Why Heather Can Write: Media Literacy and the Harry Potter Wars 169 6 Photoshop for Democracy: The New Relationship between Politics and Popular Culture 206 Conclusion: Democratizing Television? The Politics of Participation 240 Notes 261 Glossary 279 Index 295 About the Author 308 V Skenovano pro studijni ucely Acknowledgments Writing this book has been an epic journey, helped along by many hands.
    [Show full text]
  • How to Invest in Filecoin
    How to Invest in Filecoin Part I: Preparing to Invest Filecoin investments will be made on CoinList (coinlist.co), a US-based funding platform that connects investors to promising early-stage token sales. Created by Protocol Labs in partnership with AngelList, CoinList simplifies the token sale process and implements robust legal frameworks for token sales in the U.S. Before the sale begins, you will need to complete several preparation steps. Note that some steps include wait time of several days. For this reason, we recommend getting started as soon as possible and working in parallel while waiting for other steps to be reviewed or confirmed. Step 1: Create a CoinList account (5 min) Visit https://coinlist.co. Sign in with your AngelList account, or create a new account if needed. Step 2: Become a US accredited investor through AngelList (30 min + 1-3 day review) All token investors will need to meet US accredited investor requirements. Non-US investors can invest, but must meet the same requirements. You will be prompted to submit accreditation evidence. Step 3: Submit information for KYC/AML checks (15 min + instant review if no issues) You will be prompted to submit the details required for KYC/AML (Know Your Customer/Anti-Money Laundering) checks as soon as accreditation evidence has been submitted. You do not need to wait until accreditation review is complete. Step 4: Transfer funds to relevant accounts (10min + 1-5 day wait) You can invest with your choice of the following currencies: US Dollars, Bitcoin, Ether, and Zcash. To invest using US Dollars: Go to https://coinlist.co/settings/wallet.
    [Show full text]
  • Filecoin Token Sale Economics
    Filecoin Token Sale Economics This document describes various aspects of the Filecoin Network, the Filecoin Token Sale, and the economics of both. Any updates to this document will be posted on the CoinList webpage for the Filecoin Token Sale: https://coinlist.co/currencies/filecoin. LEGAL DISCLAIMER: This document contains forward-looking statements, ​ ​ ​ ​ ​ subject to risks and uncertainties that could cause actual results to differ materially. 1. Token Allocation The Filecoin Token will be distributed to the 4 major participating groups in the Filecoin Network. This allocation is written into the protocol itself and the Filecoin blockchain’s Genesis block. Each group is critical to the network’s creation, development, growth, and maintenance: ● 70% to Filecoin Miners (Mining block reward) ​ For providing data storage service, maintaining the blockchain, distributing data, running contracts, and more. ● 15% to Protocol Labs (Genesis allocation, 6-year linear vesting) ​ For research, engineering, deployment, business development, marketing, distribution, and more. ● 10% to Investors (Genesis allocation, 6 month to 3 year linear vesting) ​ ​ For funding network development, business development, partnerships, support, and more. ● 5% to Filecoin Foundation (Genesis allocation, 6-year linear vesting) ​ ​ For long-term network governance, partner support, academic grants, public works, community building, et cetera. 2. The Filecoin Token Sale Fundraising. Protocol Labs requires significant funding to develop, launch, and grow the Filecoin network. We ​ ​ ​ must develop all the software required: the mining software, the client software, user interfaces and apps, network infrastructure and monitoring, software that third-party wallets and exchanges need to support Filecoin, integrations with other data storage software, tooling for web applications and dapps to use Filecoin, and much more.
    [Show full text]
  • Defense Against the Dark Arts of Copyright Trolling Matthew As G
    Loyola University Chicago, School of Law LAW eCommons Faculty Publications & Other Works 2018 Defense Against the Dark Arts of Copyright Trolling Matthew aS g Jake Haskell Follow this and additional works at: https://lawecommons.luc.edu/facpubs Part of the Civil Procedure Commons, and the Intellectual Property Law Commons Defense Against the Dark Arts of Copyright Trolling Matthew Sag &Jake Haskell * ABSTRACT: In this Article, we offer both a legal and a pragmaticframework for defending against copyright trolls. Lawsuits alleging online copyright infringement by John Doe defendants have accounted for roughly half of all copyright casesfiled in the United States over the past threeyears. In the typical case, the plaintiffs claims of infringement rely on a poorly substantiatedform pleading and are targeted indiscriminately at noninfringers as well as infringers. This practice is a subset of the broaderproblem of opportunistic litigation, but it persists due to certain unique features of copyright law and the technical complexity of Internet technology. The plaintiffs bringing these cases target hundreds or thousands of defendants nationwide and seek quick settlements pricedjust low enough that it is less expensive for the defendant to pay rather than to defend the claim, regardless of the claim's merits. We report new empirical data on the continued growth of this form of copyright trolling in the United States. We also undertake a detailed analysis of the legal andfactual underpinnings of these cases. Despite theirunderlying weakness, plaintiffs have exploited information asymmetries, the high cost of federal court litigation, and the extravagant threat of statutory damages for copyright infringement to leverage settlementsfrom the guilty and the innocent alike.
    [Show full text]
  • The Book of Swarm Storage and Communication Infrastructure for Self-Sovereign Digital Society Back-End Stack for the Decentralised Web
    the book of Swarm storage and communication infrastructure for self-sovereign digital society back-end stack for the decentralised web Viktor Trón v1.0 pre-release 7 - worked on November 17, 2020 the swarm is headed toward us Satoshi Nakamoto ii CONTENTS Prolegomena xi Acknowledgments xii i prelude 1 the evolution2 1.1 Historical context 2 1.1.1 Web 1.02 1.1.2 Web 2.03 1.1.3 Peer-to-peer networks 6 1.1.4 The economics of BitTorrent and its limits 7 1.1.5 Towards Web 3.08 1.2 Fair data economy 12 1.2.1 The current state of the data economy 12 1.2.2 The current state and issues of data sovereignty 13 1.2.3 Towards self-sovereign data 15 1.2.4 Artificial intelligence and self-sovereign data 16 1.2.5 Collective information 17 1.3 The vision 18 1.3.1 Values 18 1.3.2 Design principles 19 1.3.3 Objectives 19 1.3.4 Impact areas 20 1.3.5 The future 21 ii design and architecture 2 network 25 2.1 Topology and routing 25 2.1.1 Requirements for underlay network 25 2.1.2 Overlay addressing 26 2.1.3 Kademlia routing 27 2.1.4 Bootstrapping and maintaining Kademlia topology 32 2.2 Swarm storage 35 2.2.1 Distributed immutable store for chunks 35 2.2.2 Content addressed chunks 38 2.2.3 Single-owner chunks 41 2.2.4 Chunk encryption 42 2.2.5 Redundancy by replication 43 2.3 Push and pull: chunk retrieval and syncing 47 iii 2.3.1 Retrieval 47 2.3.2 Push syncing 51 2.3.3 Pull syncing 53 2.3.4 Light nodes 55 3 incentives 57 3.1 Sharing bandwidth 58 3.1.1 Incentives for serving and relaying 58 3.1.2 Pricing protocol for chunk retrieval 59 3.1.3 Incentivising push-syncing
    [Show full text]
  • Proofs of Replication Are Also Relevant in the Private-Verifier Setting of Proofs of Data Replication
    PoReps: Proofs of Space on Useful Data Ben Fisch Stanford University, Protocol Labs Abstract A proof-of-replication (PoRep) is an interactive proof system in which a prover defends a publicly verifiable claim that it is dedicating unique resources to storing one or more retrievable replicas of a data file. In this sense a PoRep is both a proof of space (PoS) and a proof of retrievability (PoR). This paper establishes a foundation for PoReps, exploring both their capabilities and their limitations. While PoReps may unconditionally demonstrate possession of data, they fundamentally cannot guarantee that the data is stored redundantly. Furthermore, as PoReps are proofs of space, they must rely either on rational time/space tradeoffs or timing bounds on the online prover's runtime. We introduce a rational security notion for PoReps called -rational replication based on the notion of an -Nash equilibrium, which captures the property that a server does not gain any significant advantage by storing its data in any other (non-redundant) format. We apply our definitions to formally analyze two recently proposed PoRep constructions based on verifiable delay functions and depth robust graphs. Lastly, we reflect on a notable application of PoReps|its unique suitability as a Nakamoto consensus mechanism that replaces proof-of-work with PoReps on real data, simultaneously incentivizing and subsidizing the cost of file storage. 1 Introduction A proof-of-replication (PoRep) builds on the two prior concepts of proofs-of-retrievability (PoR) [30] and proofs-of-space (PoS) [24]. In the former a prover demonstrates that it can retrieve a file and in the latter the prover demonstrates that it is using some minimum amount of space to store information.
    [Show full text]
  • Convergence-2020.Pdf
    A universal architecture to anonymize any application or protocol and turn it into an independent decentralized p2p network inside browsers and servers, with browsers acting as servers CONVERGENCE 1. Description This proposal is a complete redesign of our initial Convergence proposal from 2015 (http://www.peersm.com/Convergence.pdf ) which was intended as a research study for an EU call By “Convergence” in this proposal we don’t refer to a specific network or node but to methods using the Convergence principles 1.1 Background and rationale The initial Convergence proposal was written based on the observation that we must invent one network/system per need if we want to evade big data centralization and protect privacy/anonymity: to browse, to chat, to email, to exchange files, to do social networking or cooperative work, to do crypto currency, to protect the users from their connected objects, to handle peer identities. So it did envision the support of any type of applications and protocols on top of a secure anonymization system, inside browsers and servers The first part is very exactly what IPFS did, including the crypto currency concept in our proposal to sustain the network (Filecoin) But IPFS is not at all designed for privacy, the IPFS team knows that they will have to address the issue but it’s not even part of their roadmap And IPFS adoption is not for all protocols, many other networks will not use it and lack privacy too That’s why we are proposing the Convergence concepts, which are still very up to date, with a major novelty:
    [Show full text]
  • Initial Coin Offerings
    Initial Coin Offerings: Financing Growth with Cryptocurrency Token Sales Sabrina T. Howell, Marina Niessner, and David Yermack⇤ August, 2018 Abstract Initial coin offerings (ICOs) are a significant innovation in entrepreneurial finance. The sale of a blockchain-based digital token associated with a specific platform or venture is a new financing instrument with some parallels to IPOs, venture capital, and pre-sale crowdfunding. We examine the relationship between issuer characteristics and measures of success, with a focus on liquidity, using 453 ICOs that collectively raise $5.7 billion. We also employ proprietary transaction data in a case study of Filecoin, one of the most successful ICOs. We find that liquidity and trading volume are higher when issuers offer voluntary disclosure, credibly commit to the project, and signal quality. s s ss s ss ss ss s ⇤NYU Stern and NBER; AQR; NYU Stern, ECGI and NBER. Email: [email protected]. For helpful comments, we are grateful to Yakov Amihud, Bruno Biais, Will Cong, Darrell Duffie, Alex Edmans, seminar participants at the OECD Paris Workshop on Digital Financial Assets, Erasmus University, the Swedish House of Finance, the Munich Crowdfunding Symposium, the University of Adelaide, Deakin University, Melbourne University, Monash University, LaTrobe University, and the University of Western Australia. We thank Protocol Labs and particularly Evan Miyazono and Juan Benet for providing data. Sabrina Howell thanks the Kauffman Foundation for financial support. We are also grateful to all of our research assistants, especially Jae Hyung (Fred) Kim. Part of this paper was written while David Yermack was a visiting professor at Erasmus University Rotterdam.
    [Show full text]
  • The Perfect Way by Anna Bonus Kingsford and Edward Maitland the Perfect Way Or the Finding of Christ
    The Perfect Way by Anna Bonus Kingsford and Edward Maitland The Perfect Way or The Finding of Christ by Anna Bonus Kingsford and Edward Maitland Published in 1888 Boston, Mass.: ESOTERIC PUBLISHING COMPANY, 478 Shawmut Avenue. (Revised and Enlarged Edition.) Page 1 The Perfect Way by Anna Bonus Kingsford and Edward Maitland AUTHORS’ EXPLANATION These lectures were delivered in London, before a private audience, in the months of May, June, and July, 1881. The changes made in this edition calling for indication, are, – the substitution of another Lecture for No. V., and consequent omission of most of the plates; the rewriting, in the whole or part, of paragraphs 6 - 8 and 28 in No. I.; 34 - 36 in No. II.; 5 - 8, 12, 13, 22, 23, 42, 43, 54, and 55, in No. IX. (the latter paragraphs being replaced by a new one); the lengthening of Appendices II, and VI; the addition of a new Part to Appendix XIII. (formerly No. IX); and the substitution of eight new Appendices for Nos:. VII., and VIII. The alterations involve no change or withdrawal of doctrine, but only extension of scope, amplification of statement, or modification of expression. A certain amount of repetition being inseparable from the form adopted, – that of a series of expository lectures, each requiring to be complete in itself, – and the retention of that form being unavoidable, – no attempt has been made to deal with the instances in which repetition occurs. PREFACE TO THE AMERICAN EDITION In presenting an American edition of THE PERFECT WAY, or, The Finding of Christ, to the reading and inquiring public, we have been actuated by the conviction that a comprehensive textbook of the “new views,” or the restored wisdom and knowledge of the ages regarding religion or the perfect life, was imperatively required, wherein the subject was treated in a manner luminous, instructive, and entertaining, and which, without abridgement, or inferiority of material or workmanship, could yet be sold at a price that would bring the work within the means of the general public.
    [Show full text]