CRYPTO CURRENCY Technical Competence & Rules of Professional Responsibility

Total Page:16

File Type:pdf, Size:1020Kb

CRYPTO CURRENCY Technical Competence & Rules of Professional Responsibility CRYPTO CURRENCY Technical Competence & Rules of Professional Responsibility Marc J. Randazza Rule 1.1 Comment 8 To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject. Crypto Currency 1. What is Crypto Currency? 2. How does it work? 3. How could you screw this up? Blockchain •Decentralized •Transparent •Immutable Blockchain Blockchain • Time-stamped series of immutable records of data • Managed by a cluster of de-centralized computers • Each block is secured and bound to another, cryptographically • Shared • Immutable • Open for all to see – how you keep it honest Blockchain Blockchain • Transparent but also pseudonymous • If you look on the ledger, you will not see “Darren sent 1 BTC to Trixie” • Instead you will see “1MF1bhsFLkBzzz9vpFYEmvwT2TbyCt7NZJ sent 1 BTC” • But, if you know someone’s wallet ID, you could trace their transactions Crypto Roller Coaster – 5 years Crypto Roller Coaster – 1 day How can you screw this up? Quadriga You can lose it & Bankruptcy Your mind • C$190 million turned to digital dust • Thrown away with no back up • Death of CEO turned death of • $127 million in the trash – gone business • 7,500 BTC – Fluctuates WILDLY Ethical Considerations You might be surprised at what violates Rule 1.8 Which Rules? Rule 1.2 (d) – Criminal or Fraudulent Activity Rule 1.5 (a) – Reasonable Fee Rule 1.6 – Confidentiality Rule 1.8 (a) – Business Dealings With Clients Rule 1.8(f) – Compensation From Other Than Your Client Rule 1.15 (a) – Safekeeping Property Rule 1.15 (c) – Trust Accounts Rule 1.2(d) – Criminal or Fraudulent Activity • Crypto *can* be used for criminal activity • Tends to be difficult, but not A lawyer shall not ... assist a impossible, to trace client, in conduct that the lawyer knows is criminal or fraudulent... • If it came from a criminal source, the Bar won't believe you • A lot of people use it to try and avoid taxation • Know your client Rule 1.5(a) – Reasonable Fee • Major flux • If you bill in BTC, you could make nothing one day and a fortune the next A lawyer shall not make an • To avoid fluctuation problems, bill agreement for, charge, or in stable currency collect an unreasonable fee • Why do you think the Bars are concerned about this? • Schedule payments when you can immediately convert – preferably while client is on the phone or nearby Rule 1.6(a)(c) – Confidentiality • Given the transparency, it is • (a) A lawyer shall not reveal information relating to the at least possible to have representation of a client unless blockchain transactions the client gives informed traceable consent, • Warn the client, in writing, of • (c) A lawyer shall make this potential reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client. Rule 1.8(a) – Business Dealing With Client A lawyer shall not enter into a business transaction with a client or knowingly acquire • Chances are, your client knows an ownership, possessory, security or other more than you pecuniary interest adverse to a client unless: 1. the transaction and terms on which the lawyer acquires the interest are fair and reasonable to the client and are fully • Nevertheless, this is property, disclosed and transmitted in writing in a with fluctuating value manner that can be reasonably understood by the client; 2. the client is advised in writing of the desirability of seeking and is given a • Bars consider this to be a reasonable opportunity to seek the advice "business dealing with a client" of independent legal counsel on the transaction; and 3. the client gives informed consent, in a • Provide written disclosure and writing signed by the client, to the essential terms of the transaction and the lawyer's advice to get advice from a role in the transaction, including whether second lawyer the lawyer is representing the client in the transaction. Rule 1.8(f) – Who Paid You A lawyer shall not accept • Again, know your client compensation for representing a client from one other than the client unless: • Payment could be 1. the client gives informed coming from third parties consent; 2. there is no interference with the lawyer's independence of • Difficult to know professional judgment or with the client-lawyer relationship; and 3. information relating to representation of a client is protected as required by Rule 1.6 Rule 1.15 (a) – Safekeeping Property 1. A lawyer shall hold property of • Crypto is property, not currency clients or third persons that is in a lawyer's possession in connection • You will screw this up with a representation separate from the lawyer's own property. • How to safely handle it? • Immediate conversion 2. Funds shall be kept in a separate account maintained in the state • IF you must hold it: where the lawyer's office is situated, • Use an external drive “cold or elsewhere with the consent of the wallet” client or third person. • Deactivate the ability to delete 3. Other property shall be identified • Put in a safe as such and appropriately • Log the property safeguarded. • Back it up (is this possible?) • Separate digital Wallet for 4. Complete records of such each client – Multi-Factor account funds and other property authentication shall be kept by the lawyer and shall be preserved for a period of • Better rule – convert it [five years] after termination of the representation. Rule 1.15(c) – Trust Accounts • There are no blockchain or crypto trust accounts A lawyer shall deposit into a client trust account legal fees and • Fluctuation in value will create expenses that have been paid in problems advance, to be withdrawn by the lawyer only as fees are earned or • If you must hold it, hold it in expenses incurred. cold storage [ CRYPTO CURRENCY ] Competence & Ethics [email protected] @MarcoRandazza Cryptocurrency: Competence and Ethics Table of Contents Man accidentally threw away $127 million in bitcoin and 2 officials won’t allow a search - Shawn Carter Quadriga bankruptcy: C$190 million may have turned into 7 digital dust - Hugo Margoc The Lawyer’s Cryptionary: A Resource for Talking to Clients 10 About Crypto-Transactions - Carol Goforth American Bar Association Rule 1.2 (d) 87 American Bar Association Rule 1.5 (a) 88 American Bar Association Rule 1.6 89 American Bar Association Rule 1.8 (a) 90 American Bar Association Rule 1.8 (f) 91 American Bar Association Rule 1.15 (a) 92 American Bar Association Rule 1.15 (c) 93 Nebraska Ethics Advisory Opinion for Lawyers NO. 17-03 94 North Carolina 2019 Formal Ethics Opinion 5 104 New York City Formal Opinion 2019-5: Requiring 107 Cryptocurrency in Payment for Legal Services Americans are struggling, even with a strong 4 things this millionaire CEO wishes more Michael J economy—Janet Yellen explains why employees knew before asking for a... million ho Help protect all devices with Comcast Business SecurityEdgeTM MONEY Man accidentally threw away $127 million in bitcoin and officials won’t allow a search Published Wed, Dec 20 2017•12:30 PM EST Updated Wed, Dec 20 2017•3:24 PM EST Shawn M. Carter @SHAWNCARTERM Share Discover the best credits cards to use for streaming services FIND OUT A bulldozer pushes trash into piles at the Miramar Landfill in San Diego, California. Sam Hodgson | Bloomberg | Getty Images James Howells, an IT worker living in the United Kingdom, knows exactly where his misplaced 7,500 bitcoins are but the city council where he lives won’t let him retrieve them. They say it’s against the law. According to a report published in The Telegraph, Howells began mining bitcoin on his personal laptop in 2009. In 2013, though, “after I had stopped mining, the laptop I had used was broken into parts and sold on eBay,” Howells tells The Telegraph. He kept the drive he used to collect the bitcoins, “so if bitcoin did become valuable one day, I would still have the coins I mined.” But, while cleaning his home in 2013, he mistakenly put it into a waste bin at his local landfill site in Newport, SouthDiscover Wales, wthehe bestre it credits got b ucardsried. to use for streaming services Now, with bitcoin’s value hovering just above $17,000 Wednesday, according to FIND OUT digital-currency website CoinDesk, Howells’ 7,500 lost bitcoins are worth more than g y , , $127 million. CoinDesk’s Bitcoin Price Index tracks prices from digital currency exchanges Bitfinex, Bitstamp, Coinbase and itBit. More than four years’ worth of garbage have poured into the dump since his mistake, which would make any recovery effort a significant undertaking. “A modern landfill is a complex engineering project and digging one up brings up all sorts of environmental issues, such as dangerous gasses and potential landfill fires,” Howells says. “It’s a big, expensive and risky project.” 1:10 Tony Robbins shares the mindset you need to invest in bitcoin He wants to try, regardless, but the Newport City Council won’t allow it. In an interview with tech website Wired, a council spokesperson said their offices have been “contacted in the past about the possibility of retrieving a piece of IT hardware said to contain bitcoins,” but digging up, storing and treating the waste could cause a “huge environmental impact on the surrounding area.” Discover the best credits cards to use for streaming services The landfill reportedly contains about 350,000 tons of waste and 50,000 more tons FIND OUT are added every year.
Recommended publications
  • Auditing Wallets in Cryptonote
    Auditing wallets in CryptoNote sowle <[email protected]> ​ ​ Zano project, https://zano.org ​ Cryptocurrency wallet auditing is the ability for a third party (the "auditor") to watch the transactions and to be able to calculate the correct balance without an ability to spend a coin. This article explores several possible implementations of expansion cryptocurrency protocol CryptoNote 2.0 [1] with such ability. In the original CryptoNote protocol auditing is only partially possible with the help of the tracking ​ ​ key, namely, an auditor is able to distinguish incoming transactions in the blockchain, but the full set of secret keys is required to filter out outgoing transactions. This article is intended for readers familiar with the general blockchain technology and “classic” cryptocurrencies, as well as with the basics of cryptography on elliptic curves. 1. Introduction What is CryptoNote? Surprisingly, most people interested in blockchain technology have never heard anything about CryptoNote, in spite of the fact that the technology has more than 300 forks, including Monero as the most famous. Back in 2014 in the cryptocurrency community there were mentions [2] about a project, titled Bytecoin. That project did not originate as a Bitcoin or other known project fork, having its own original codebase. It was very unusual at the time. Bytecoin general conception was to be an implementation of a privacy-technology named CryptoNote. There were two main privacy mechanisms: stealth-addresses and inputs` mixing-in with the ​ ​ help of ring signatures (at the time it was called "blockchain mixer"). Since Zcash existed only on paper / in theory at that time, CryptoNote became a competitive technology and has provoked much controversy in the cryptocurrency community.
    [Show full text]
  • Virtual Currencies and Terrorist Financing : Assessing the Risks And
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT FOR CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS COUNTER-TERRORISM Virtual currencies and terrorist financing: assessing the risks and evaluating responses STUDY Abstract This study, commissioned by the European Parliament’s Policy Department for Citizens’ Rights and Constitutional Affairs at the request of the TERR Committee, explores the terrorist financing (TF) risks of virtual currencies (VCs), including cryptocurrencies such as Bitcoin. It describes the features of VCs that present TF risks, and reviews the open source literature on terrorist use of virtual currencies to understand the current state and likely future manifestation of the risk. It then reviews the regulatory and law enforcement response in the EU and beyond, assessing the effectiveness of measures taken to date. Finally, it provides recommendations for EU policymakers and other relevant stakeholders for ensuring the TF risks of VCs are adequately mitigated. PE 604.970 EN ABOUT THE PUBLICATION This research paper was requested by the European Parliament's Special Committee on Terrorism and was commissioned, overseen and published by the Policy Department for Citizens’ Rights and Constitutional Affairs. Policy Departments provide independent expertise, both in-house and externally, to support European Parliament committees and other parliamentary bodies in shaping legislation and exercising democratic scrutiny over EU external and internal policies. To contact the Policy Department for Citizens’ Rights and Constitutional Affairs or to subscribe to its newsletter please write to: [email protected] RESPONSIBLE RESEARCH ADMINISTRATOR Kristiina MILT Policy Department for Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] AUTHORS Tom KEATINGE, Director of the Centre for Financial Crime and Security Studies, Royal United Services Institute (coordinator) David CARLISLE, Centre for Financial Crime and Security Studies, Royal United Services Institute, etc.
    [Show full text]
  • CASP) Software-Only, Ledger Agnostic, Platform Agnostic, Crypto Agile Bank-Grade Security for Crypto Assets
    Protect Your Crypto Assets with Unbound’s Crypto Assets Security Platform (CASP) Software-Only, Ledger Agnostic, Platform Agnostic, Crypto Agile Bank-Grade Security for Crypto Assets Mathematically proven security Cryptography is one of the foundational security elements used by guarantee – the key material never organizations to protect sensitive data, transactions, services and identities. exists in the clear throughout its At the core of any cryptography implementation is the management of lifecycle including creation, in-use cryptographic keys and their protection from compromise and misuse. and at-rest With crypto assets, the protection of private keys is top priority, since the Any currency, any ledger, any private key is used to sign each transaction. It is therefore mandatory platform, any client to keep the key secure – not only from compromise, but also from any Programmatically derived malicious usage – as it takes only one fraudulent transaction (i.e. a single sign addresses (BIP 32/44) that are operation, to empty a wallet). cryptographically protected Backed by proven mathematical guarantees of security, Unbound’s Crypto Stronger and more flexible than Asset Security Platform (CASP) provides its customers with a software-only multi-signature – ledger-agnostic support of flexible quorum security platform that is as safe as hardware. With CASP, one can fully manage structures, any number of human the keys’ lifecycle, define cryptographically-based approval policies, while and/or servers, internal and supporting any currency, any ledger, any platform and any client type. external, that are required to sign a transaction Any Currency, Any Ledger, Any Platform Infinite scalability – easily scale capacity when and where it is Traditionally, securing the keys and secrets that guard the organizations’ most needed valuable assets required the use of dedicated hardware, such as hardware Intuitive and easy to use SDK – security modules (HSMs) and smartcards.
    [Show full text]
  • Linking Wallets and Deanonymizing Transactions in the Ripple Network
    Proceedings on Privacy Enhancing Technologies ; 2016 (4):436–453 Pedro Moreno-Sanchez*, Muhammad Bilal Zafar, and Aniket Kate* Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network Abstract: The decentralized I owe you (IOU) transac- 1 Introduction tion network Ripple is gaining prominence as a fast, low- cost and efficient method for performing same and cross- In recent years, we have observed a rather unexpected currency payments. Ripple keeps track of IOU credit its growth of IOU transaction networks such as Ripple [36, users have granted to their business partners or friends, 40]. Its pseudonymous nature, ability to perform multi- and settles transactions between two connected Ripple currency transactions across the globe in a matter of wallets by appropriately changing credit values on the seconds, and potential to monetize everything [15] re- connecting paths. Similar to cryptocurrencies such as gardless of jurisdiction have been pivotal to their suc- Bitcoin, while the ownership of the wallets is implicitly cess so far. In a transaction network [54, 55, 59] such as pseudonymous in Ripple, IOU credit links and transac- Ripple [10], users express trust in each other in terms tion flows between wallets are publicly available in an on- of I Owe You (IOU) credit they are willing to extend line ledger. In this paper, we present the first thorough each other. This online approach allows transactions in study that analyzes this globally visible log and charac- fiat money, cryptocurrencies (e.g., bitcoin1) and user- terizes the privacy issues with the current Ripple net- defined currencies, and improves on some of the cur- work.
    [Show full text]
  • Beauty Is Not in the Eye of the Beholder
    Insight Consumer and Wealth Management Digital Assets: Beauty Is Not in the Eye of the Beholder Parsing the Beauty from the Beast. Investment Strategy Group | June 2021 Sharmin Mossavar-Rahmani Chief Investment Officer Investment Strategy Group Goldman Sachs The co-authors give special thanks to: Farshid Asl Managing Director Matheus Dibo Shahz Khatri Vice President Vice President Brett Nelson Managing Director Michael Murdoch Vice President Jakub Duda Shep Moore-Berg Harm Zebregs Vice President Vice President Vice President Shivani Gupta Analyst Oussama Fatri Yousra Zerouali Vice President Analyst ISG material represents the views of ISG in Consumer and Wealth Management (“CWM”) of GS. It is not financial research or a product of GS Global Investment Research (“GIR”) and may vary significantly from those expressed by individual portfolio management teams within CWM, or other groups at Goldman Sachs. 2021 INSIGHT Dear Clients, There has been enormous change in the world of cryptocurrencies and blockchain technology since we first wrote about it in 2017. The number of cryptocurrencies has increased from about 2,000, with a market capitalization of over $200 billion in late 2017, to over 8,000, with a market capitalization of about $1.6 trillion. For context, the market capitalization of global equities is about $110 trillion, that of the S&P 500 stocks is $35 trillion and that of US Treasuries is $22 trillion. Reported trading volume in cryptocurrencies, as represented by the two largest cryptocurrencies by market capitalization, has increased sixfold, from an estimated $6.8 billion per day in late 2017 to $48.6 billion per day in May 2021.1 This data is based on what is called “clean data” from Coin Metrics; the total reported trading volume is significantly higher, but much of it is artificially inflated.2,3 For context, trading volume on US equity exchanges doubled over the same period.
    [Show full text]
  • Crypto-Asset Markets: Potential Channels for Future Financial Stability
    Crypto-asset markets Potential channels for future financial stability implications 10 October 2018 The Financial Stability Board (FSB) is established to coordinate at the international level the work of national financial authorities and international standard-setting bodies in order to develop and promote the implementation of effective regulatory, supervisory and other financial sector policies. Its mandate is set out in the FSB Charter, which governs the policymaking and related activities of the FSB. These activities, including any decisions reached in their context, shall not be binding or give rise to any legal rights or obligations under the FSB’s Articles of Association. Contacting the Financial Stability Board Sign up for e-mail alerts: www.fsb.org/emailalert Follow the FSB on Twitter: @FinStbBoard E-mail the FSB at: [email protected] Copyright © 2018 Financial Stability Board. Please refer to: www.fsb.org/terms_conditions/ Contents Executive Summary ................................................................................................................... 1 1. Introduction ......................................................................................................................... 3 2. Primary risks in crypto-asset markets ................................................................................. 5 2.1 Market liquidity risks ............................................................................................... 5 2.2 Volatility risks .........................................................................................................
    [Show full text]
  • Asymmetric Proof-Of-Work Based on the Generalized Birthday Problem
    Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem Alex Biryukov Dmitry Khovratovich University of Luxembourg University of Luxembourg [email protected] [email protected] Abstract—The proof-of-work is a central concept in modern Long before the rise of Bitcoin it was realized [20] that cryptocurrencies and denial-of-service protection tools, but the the dedicated hardware can produce a proof-of-work much requirement for fast verification so far made it an easy prey for faster and cheaper than a regular desktop or laptop. Thus the GPU-, ASIC-, and botnet-equipped users. The attempts to rely on users equipped with such hardware have an advantage over memory-intensive computations in order to remedy the disparity others, which eventually led the Bitcoin mining to concentrate between architectures have resulted in slow or broken schemes. in a few hardware farms of enormous size and high electricity In this paper we solve this open problem and show how to consumption. An advantage of the same order of magnitude construct an asymmetric proof-of-work (PoW) based on a compu- is given to “owners” of large botnets, which nowadays often tationally hard problem, which requires a lot of memory to gen- accommodate hundreds of thousands of machines. For prac- erate a proof (called ”memory-hardness” feature) but is instant tical DoS protection, this means that the early TLS puzzle to verify. Our primary proposal Equihash is a PoW based on the schemes [8], [17] are no longer effective against the most generalized birthday problem and enhanced Wagner’s algorithm powerful adversaries.
    [Show full text]
  • An Anonymous Trust-Marking Scheme on Blockchain Systems
    An Anonymous Trust-Marking Scheme on Blockchain Systems Teppei Sato Keita Emura Tomoki Fujitani Kazumasa Omote University of Tsukuba National Institute of University of Tsukuba University of Tsukuba Japan Information and National Institute of National Institute of Communications Technology Information and Information and Japan Communications Technology Communications Technology Japan Japan Abstract—During the Coincheck incident, which recorded During the Coincheck incident, which recorded the largest the largest damages in cryptocurrency history in 2018, it was damages in cryptocurrency history in 2018, some volun- demonstrated that using Mosaic token can have a certain effect. teers tracked leaked New Economy Movement (NEM) cryp- Although it seems attractive to employ tokens as countermea- sures for cryptocurrency leakage, Mosaic is a specific token tocurrencies using Mosaic, which is a NEM-specific fea- for the New Economy Movement (NEM) cryptocurrency and ture allowing a self-made token to be sent on the NEM is not employed for other blockchain systems or cryptocurren- blockchain. These volunteers sent Mosaic to addresses that cies. Moreover, although some volunteers tracked leaked NEM received leaked NEMs from Coincheck addresses and warned using Mosaic in the CoinCheck incident, it would be better the recipients that these should not be exchanged for other to verify that the volunteers can be trusted. Simultaneously, if someone (e.g., who stole cryptocurrencies) can identify the cryptocurrencies or legal currencies. A criminal can discard volunteers, then that person or organization may be targets of such marked addresses, so it can be seen as a cat-and- them. In this paper, we propose an anonymous trust-marking mouse game.
    [Show full text]
  • Banking on Bitcoin: BTC As Collateral
    Banking on Bitcoin: BTC as Collateral Arcane Research Bitstamp Arcane Research is a part of Arcane Crypto, Bitstamp is the world’s longest-running bringing data-driven analysis and research cryptocurrency exchange, supporting to the cryptocurrency space. After launch in investors, traders and leading financial August 2019, Arcane Research has become institutions since 2011. With a proven track a trusted brand, helping clients strengthen record, cutting-edge market infrastructure their credibility and visibility through and dedication to personal service with a research reports and analysis. In addition, human touch, Bitstamp’s secure and reliable we regularly publish reports, weekly market trading venue is trusted by over four million updates and articles to educate and share customers worldwide. Whether it’s through insights. their intuitive web platform and mobile app or industry-leading APIs, Bitstamp is where crypto enters the world of finance. For more information, visit www.bitstamp.net 2 Banking on Bitcoin: BTC as Collateral Banking on bitcoin The case for bitcoin as collateral The value of the global market for collateral is estimated to be close to $20 trillion in assets. Government bonds and cash-based securities alike are currently the most important parts of a well- functioning collateral market. However, in that, there is a growing weakness as rehypothecation creates a systemic risk in the financial system as a whole. The increasing reuse of collateral makes these assets far from risk-free and shows the potential instability of the financial markets and that it is more fragile than many would like to admit. Bitcoin could become an important part of the solution and challenge the dominating collateral assets in the future.
    [Show full text]
  • Vulnerability of Blockchain Technologies to Quantum Attacks
    Vulnerability of Blockchain Technologies to Quantum Attacks Joseph J. Kearneya, Carlos A. Perez-Delgado a,∗ aSchool of Computing, University of Kent, Canterbury, Kent CT2 7NF United Kingdom Abstract Quantum computation represents a threat to many cryptographic protocols in operation today. It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048. Blockchain technologies rely on cryptographic protocols for many of their essential sub- routines. Some of these protocols, but not all, are open to quantum attacks. Here we analyze the major blockchain-based cryptocurrencies deployed today—including Bitcoin, Ethereum, Litecoin and ZCash, and determine their risk exposure to quantum attacks. We finish with a comparative analysis of the studied cryptocurrencies and their underlying blockchain technologies and their relative levels of vulnerability to quantum attacks. Introduction exist to allow the legitimate owner to recover this account. Blockchain systems are unlike other cryptosys- tems in that they are not just meant to protect an By contrast, in a blockchain system, there is no information asset. A blockchain is a ledger, and as central authority to manage users’ access keys. The such it is the asset. owner of a resource is by definition the one hold- A blockchain is secured through the use of cryp- ing the private encryption keys. There are no of- tographic techniques. Notably, asymmetric encryp- fline backups. The blockchain, an always online tion schemes such as RSA or Elliptic Curve (EC) cryptographic system, is considered the resource— cryptography are used to generate private/public or at least the authoritative description of it.
    [Show full text]
  • Steem an Incentivized, Blockchain-Based Social Media Platform
    Steem An incentivized, blockchain-based social media platform. Daniel Larimer, Ned Scott, Valentine Zavgorodnev, Benjamin Johnson, James Calfee, Michael Vandeberg March 2016 Abstract Steem is a blockchain database that supports community building and social interaction with cryptocurrency rewards. Steem combines concepts from social media with lessons learned from building cryptocurrencies and their communities. An important key to inspiring participation in any community, currency or free market economy is a fair accounting system that consistently reflects each person's contribution. Steem is the first cryptocurrency that attempts to accurately and transparently reward an unbounded number of individuals who make subjective contributions to its community. ​ ​ ​ ​ 2 of 44 Table of Contents Abstract Table of Contents Introduction Recognizing Contribution Ways to Contribute Capital Contributions Steem (STEEM) ​ ​ Steem Power (SP) Steem Dollars (SMD) Minimizing Fraudulent Feeds Mitigating Timing Attacks Minimizing Abuse of Conversions Liquidity Sustainable Debt to Ownership Ratios Interest Setting Price Feeds Subjective Contributions Distributing Currency Voting on Distribution of Currency Voting Collusion The Story of the Crab Bucket Rate Limited Voting Delayed Payouts Payout Distribution Rewarding Parent Posts Payouts Consensus Algorithm Consensus in Steem Mining in Steem Mining Rewards require Steem Power ​ Mining Algorithm Botnet Resistant Mining Pool Resistant Eliminating Transaction Fees The Problem With Fees Micropayments Don’t Work Fees are a Barrier to Entry Changing Fees Sybil Attacks Full Reserve vs Fractional Reserve 3 of 44 Iterating Beyond Micropayments Example Implementation Case Study: Bitcoin Impact of Capacity Maximum Number of Unique Users Comparison to Fees Account Creation Justifying Minimum Balances Adjusting the Reserve Ratio Effectiveness Relative to Fees Renting vs.
    [Show full text]
  • Review Articles
    review articles DOI:10.1145/3372115 system is designed to achieve common Software weaknesses in cryptocurrencies security goals: transaction integrity and availability in a highly distributed sys- create unique challenges in responsible tem whose participants are incentiv- revelations. ized to cooperate.38 Users interact with the cryptocurrency system via software BY RAINER BÖHME, LISA ECKEY, TYLER MOORE, “wallets” that manage the cryptograph- NEHA NARULA, TIM RUFFING, AND AVIV ZOHAR ic keys associated with the coins of the user. These wallets can reside on a local client machine or be managed by an online service provider. In these appli- cations, authenticating users and Responsible maintaining confidentiality of crypto- graphic key material are the central se- curity goals. Exchanges facilitate trade Vulnerability between cryptocurrencies and between cryptocurrencies and traditional forms of money. Wallets broadcast cryptocur- Disclosure in rency transactions to a network of nodes, which then relay transactions to miners, who in turn validate and group Cryptocurrencies them together into blocks that are ap- pended to the blockchain. Not all cryptocurrency applications revolve around payments. Some crypto- currencies, most notably Ethereum, support “smart contracts” in which general-purpose code can be executed with integrity assurances and recorded DESPITE THE FOCUS on operating in adversarial on the distributed ledger. An explosion of token systems has appeared, in environments, cryptocurrencies have suffered a litany which particular functionality is ex- of security and privacy problems. Sometimes, these pressed and run on top of a cryptocur- rency.12 Here, the promise is that busi- issues are resolved without much fanfare following ness logic can be specified in the smart a disclosure by the individual who found the hole.
    [Show full text]