SlideShare a Scribd company logo
We thank our annual sponsors
for their support!
Blockchain Bootcamp
Susan Okin Goldsmith
sgoldsmith@mccarter.com @Susan_Goldsmith
Ash Yadav
ashyadav@gmail.com @ashyadav
Introduction
• Internet 1.0 – where we were
• Internet 2.0 (2.5?) – where we are
• Internet 3.0 – where we are going, driven by
AI, IoT and BLOCKCHAIN
• The technology
• Some applications
• The legal framework
A system
“[Blockchain] is to Bitcoin, what the internet is
to email. A big electronic system, on top of
which you can build applications. Currency is
just one.”
Sally Davies, FT Technology Reporter
How does it work?
“Any sufficiently advanced technology is
indistinguishable from magic.”
Arthur C. Clarke
Blockchain Basics
• An append-only database - data in a block cannot be altered
retroactively, as the chain breaks.
• A continuously growing list of records, called blocks, which are
linked to one another and secured using cryptography.
• Each block contains a unique link to a previous block (a
“hash”), a timestamp and transaction data.
• “Miners” are in a peer-to-peer network, using an agreed
protocol to validate transactions and generate new blocks in
the chain.
Software History
• Internet protocols
– HTTP / HTTPS
• Security measures and encryption
– Transaction is secure
– Data is not secure
• Ownership of digital assets
Hashcash – c. 1992 -1997
• Hashcash is a proof-of-work
algorithm, which has been used
as a denial-of-service counter
measure technique in a
number of systems.
• Hashcash was originally
proposed as a mechanism to
throttle systematic abuse of un-
metered internet resources
such as email, and anonymous
remailers in May 1997.
#
b-money – c. 1998
A scheme for a group of untraceable digital pseudonyms to
pay each other with money and to enforce contracts
amongst themselves without outside help
“I am fascinated by Tim May's crypto-anarchy. Unlike the
communities traditionally associated with the word
"anarchy", in a crypto-anarchy the government is not
temporarily destroyed but permanently forbidden and
permanently unnecessary. It's a community where the
threat of violence is impotent because violence is
impossible, and violence is impossible because its
participants cannot be linked to their true names or
physical locations.” - Wei Dai
http://www.weidai.com/bmoney.txt
SHA-256 – c. 2011
• Cryptographic hashing
• Digital Signatures
Merkle Tree c. 1979
Hash trees allow efficient and secure
verification of the contents of large data
structures. Hash trees are a generalization of
hash lists and hash chains.
Hash trees can be used to verify any kind of
data stored, handled and transferred in and
between computers. They can help ensure
that data blocks received from other peers in
a peer-to-peer network are received
undamaged and unaltered, and even to
check that the other peers do not lie and
send fake blocks.
https://en.wikipedia.org/wiki/Merkle_tree
Bitcoin
A purely peer-to-peer version of
electronic cash would allow online
payments to be sent directly from
one party to another without going
through a financial institution.
Requiring a proof of work to provide the
signature for the blockchain was Satoshi
Nakamoto's key innovation.
White paper 2009:
https://bitcoin.org/bitcoin.pdf
Blockchain
Demo
Genesis Block
1st Transaction Block
Satoshi Nakamoto -> Hal Finney
On Jan 12, 2009
https://bitcointalk.org/index.php?topic=15
5054.0
On 22 May 2010, Laszlo Hanyecz made the
first real-world transaction by buying two
pizzas in Jacksonville, Florida for 10,000
BTC.
Bitcoin – BTC or
• Non-governmental currency
• No bank laws protect you, no government controls it
• Stored value but recently used mostly for speculation
• About 20% of all Bitcoin (4M coins) is lost as cyber
key/security codes have been forgotten, lost or
abandoned
Coinbase – Bitcoin price 4/17/2018
Coinbase – Ethereum price 4/17/18
Ethereum: Smart Contracts, Tokens
• Open software platform based on blockchain
technology that enables developers to build and
deploy decentralized applications (DAPPS).
• Uses a crypocurrency (ether) which is also used for
smart contracts.
• Enables creation of utility tokens [ERC20 standard]
• Ether is also used by developers to pay for
transaction fees and services on the platform.
Internet 3.0
• Cryptonetworks
– Open and public (but decentralized)
– Closed and private (but centralized)
• Tokens
– Cryptocurrency / Cryptoassets
• Usage
– Utility token provides digital service
– Investment in service provider
Few Applications Actually Available
• Email: Earn.com (purchased by Coinbase)
• Browser: Brave.com
• Insurance: Fizzy.AXA – flight insurance (beta)
• Diamonds – Everledger.com (being replaced
by DeBeers initiative)
• Yahoo! Google ?
• MySpace Facebook ?
Many Applications Being Developed
www.icotracker.net
Cambrian Explosion?
• It will solve all your problems!
• Not yet: high fees, long confirmation times,
impractical exchanges, fraud, stolen wallets,
government interference.
• Over 1,000 cryptocurrencies exist (“altcoins"); 600+
have market capitalizations of over $100K.
• There’s something happening here, what it is ain’t
exactly clear.
• Cambrian Explosion ended with extinction event.
Smart Contracts
• Can be used for self-executing agreements,
e.g., payment distributions among musicians,
compensation to artist in ticket resales.
• Retailers can use smart contracts for issuing
loyalty points / rewards.
• Streaming money while something happens.
• Third party can see something happened but
not know who was involved.
Supply Chain Management
• Software programs automate performance through
connectivity (IoT) – IBM working hard on this
• Example: Seller ships product? Funds automatically
transferred from buyer
• How will current contracts law be applied?
• Example: Error in the code? Unilateral mistake;
mutual mistake; or no mistake at all if the actions
taken were consistent with the code
More Implementation Worries
• More features and complexity more potential vulnerabilities
• What is the strategic goal? What functionality do you really need?
• Blockchain vendors disclaim as much risk and liability as possible, robust
testing environment must validate and debug before launch.
• What happens when something goes wrong? Need real-time monitoring
and auditing? Plan B: unwind transactions or manually correct entries?
• In customer and vendor agreements, allocate risks and liabilities under
dispute and failure scenarios, attention to termination provisions.
• Consider cross-border transactions, different laws and regulatory
schemes; move to permission-based structure, compliance with GDPR.
• Regulatory Compliance: what processes are being supplanted?
• Transaction Due Diligence – need to include tech specialists / coders.
Legal Issues
OMG
Short Portion of a Very Long List
• Taxes
• Money laundering / Patriot Act
• Data privacy including GDPR, HIPPA
• Property records (real and IP)
• Inheritance and wealth transfer
• Theft by trusted people (or hackers)
• Effect on Uniform Commercial Code
• International trade
Some IP Issues
• Algorithms, ledgers and contracts are not patentable.
• Business methods as such are not patentable.
• Many patent applications in the pipeline, next front
in litigation, many from large banks and insurers.
• Role of whitepapers and prior disclosures.
• Open source code is often used for the platforms,
each has its own terms.
• Who gets sued?
Cryptocurrency for Capital Raising
• Initial Coin Offering – ICO
• Lure of raising money non-dilutively, perhaps
without constraints imposed by securities laws and
other regulatory requirements
• Democratization of access to these investments
empowered by crowdfunding
• $1.7 billion raised by selling cryptocurrencies in Q4
2017 alone/more than the dollars invested in
venture capital financings
• Lots of scams, many fraudulent deals
43
Cryptocurrency Capital Raising (cont’d)
• Utility v. security tokens
o Utility tokens: narrowly defined to permit coin holder to
buy issuer’s goods or services, usually at a discount or with
rewards or other benefits (analogize to prepaid gift cards)
o Security tokens: broader and more generalized in usage,
often include revenue share, profit share, distributions or
interest
• SEC issuing warnings about crypto, applying “facts and
circumstances” test based on the characteristics of the coin to
determine if a coin is a security or a token
• March 2018: SEC says register or seek exemption
44
Securities Laws Plus Other Agencies
o Utility tokens – sell like a gift card, possibly exempt
o Security tokens – compliance required
− Reg. D – private placements, usually SAFTS (Simple Agreement for
Future Tokens), but narrow distribution/limited numbers of non-
accredited investors, not freely tradeable
− Reg A+ - mini IPO, elegant solution for capital raises of around $8 to
$10M, up to $50M
− Registered Public Offering
o Commodities Futures Trading Commission – requiring compliance for
utility tokens as futures contracts?
o Money transmission license required for “most” ICO issuers (recent letter
of Treasury Dept. Financial Crimes Enforcement Network (FinCEN))
45
State Law Compliance
• NY – June 2015 Department of Financial Services (DFS)
enacted BitLicense framework, licensing regime covers
substantially all "virtual currency business activity" that
touches New York or its residents
• Massachusetts taking aim at ICOs
• BUT: Utility tokens exempt in Wyoming
https://www.coindesk.com/wyoming-house-approves-utility-token-securities-exemptions-bill/
46
Markets Start to Mature
• Emerging - professionalized, financially disciplined entities:
o Crypto hedge funds
o Venture capital funds are entering the market
o Will crypto be legitimate asset class for investors’
diversified portfolio?
47
Warning Signals
• https://icotracker.net/
• Markets can go offshore
National Sovereignty Issues
• Japan, Singapore, Switzerland, Malta, Liechtenstein, some
others emerging as nation states strongly embracing crypto
• China, South Korea, India take hard negative stance (but are
furiously submitting patent applications)
• Facebook may issue its own currency, but won’t accept ads for
others. Does Amazon issue crypto?
• Existential threat to state sovereignty?
oTax enforcement
oMonetary policy
oPrimacy of the US $ subject to threat?
Security
• Protect your keys!
• Hardware wallets, hard copies
• Authentication
• Recovery keys
• Possession is 100% of the law?
Confused? Exhilarated?
Questions and Answers
(Questions? Yes. Answers? Some.)
51

More Related Content

What's hot

Blockchain for Executives, Entrepreneurs and Investors
Blockchain for Executives, Entrepreneurs and InvestorsBlockchain for Executives, Entrepreneurs and Investors
Blockchain for Executives, Entrepreneurs and Investors
Fenbushi Capital
 
Blockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable ThingsBlockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable Things
Tim Lackey
 
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | CryptocurrencyBlockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Unbiased Technolab
 
Blockchain
BlockchainBlockchain
Blockchain
Vivek Upadhyay
 
Week 2 - Blockchain and Cryptocurrencies: Key Technical (and Historical) Conc...
Week 2 - Blockchain and Cryptocurrencies: Key Technical (and Historical) Conc...Week 2 - Blockchain and Cryptocurrencies: Key Technical (and Historical) Conc...
Week 2 - Blockchain and Cryptocurrencies: Key Technical (and Historical) Conc...
Roger Royse
 
Introduction to blockchain & cryptocurrencies
Introduction to blockchain & cryptocurrenciesIntroduction to blockchain & cryptocurrencies
Introduction to blockchain & cryptocurrencies
Aurobindo Nayak
 
Blockchains
BlockchainsBlockchains
Blockchains
Ian Blum
 
Block Chain Basics
Block Chain BasicsBlock Chain Basics
Block Chain Basics
University of Hertfordshire
 
Webinar: Blockchain – A Revolution You Can’t Stop | by Intellectsoft
Webinar: Blockchain – A Revolution You Can’t Stop | by IntellectsoftWebinar: Blockchain – A Revolution You Can’t Stop | by Intellectsoft
Webinar: Blockchain – A Revolution You Can’t Stop | by Intellectsoft
Intellectsoft
 
Blockchain: Real World Use Cases
Blockchain: Real World Use CasesBlockchain: Real World Use Cases
Blockchain: Real World Use Cases
Capgemini
 
Exploring Blockchain Technology, Risks, and Emerging Trends
Exploring Blockchain Technology, Risks, and Emerging TrendsExploring Blockchain Technology, Risks, and Emerging Trends
Exploring Blockchain Technology, Risks, and Emerging Trends
Amazon Web Services
 
Token Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsToken Governance in Blockchain Ecosystems
Token Governance in Blockchain Ecosystems
Dr. Nikolaus Lipusch
 
Web3 summit 2019 Funkas Berlin(Report)
Web3 summit 2019  Funkas Berlin(Report)Web3 summit 2019  Funkas Berlin(Report)
Web3 summit 2019 Funkas Berlin(Report)
Masahiro Takeda
 
Blockchain technology amplify your enterprise / IBM
Blockchain technology amplify your enterprise / IBMBlockchain technology amplify your enterprise / IBM
Blockchain technology amplify your enterprise / IBM
Diego Alberto Tamayo
 
Ultimate guide to understand- What is Blockchain Technology
Ultimate guide to understand- What is Blockchain Technology Ultimate guide to understand- What is Blockchain Technology
Ultimate guide to understand- What is Blockchain Technology
Chapter247 Infotech
 
Blockchain and Cybersecurity
Blockchain and Cybersecurity Blockchain and Cybersecurity
Blockchain and Cybersecurity
gppcpa
 
Blockchain Finance
Blockchain FinanceBlockchain Finance
Blockchain Finance
rmsams
 
Blockchain : A Catalyst for New Approaches in Insurance
Blockchain : A Catalyst for New Approaches in Insurance Blockchain : A Catalyst for New Approaches in Insurance
Blockchain : A Catalyst for New Approaches in Insurance
VIJAY MUTHU
 
Initial Thoughts on Regulation for Bitcoin and Virtual Currencies
Initial Thoughts on Regulation for Bitcoin and Virtual CurrenciesInitial Thoughts on Regulation for Bitcoin and Virtual Currencies
Initial Thoughts on Regulation for Bitcoin and Virtual Currencies
Mark McKenzie, RHB
 

What's hot (20)

Blockchain for Executives, Entrepreneurs and Investors
Blockchain for Executives, Entrepreneurs and InvestorsBlockchain for Executives, Entrepreneurs and Investors
Blockchain for Executives, Entrepreneurs and Investors
 
Blockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable ThingsBlockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable Things
 
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | CryptocurrencyBlockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
Blockchain Technology | Bitcoin | Ethereum Coin | Cryptocurrency
 
Blockchain
BlockchainBlockchain
Blockchain
 
Week 2 - Blockchain and Cryptocurrencies: Key Technical (and Historical) Conc...
Week 2 - Blockchain and Cryptocurrencies: Key Technical (and Historical) Conc...Week 2 - Blockchain and Cryptocurrencies: Key Technical (and Historical) Conc...
Week 2 - Blockchain and Cryptocurrencies: Key Technical (and Historical) Conc...
 
Introduction to blockchain & cryptocurrencies
Introduction to blockchain & cryptocurrenciesIntroduction to blockchain & cryptocurrencies
Introduction to blockchain & cryptocurrencies
 
Blockchains
BlockchainsBlockchains
Blockchains
 
BlockChain Public
BlockChain PublicBlockChain Public
BlockChain Public
 
Block Chain Basics
Block Chain BasicsBlock Chain Basics
Block Chain Basics
 
Webinar: Blockchain – A Revolution You Can’t Stop | by Intellectsoft
Webinar: Blockchain – A Revolution You Can’t Stop | by IntellectsoftWebinar: Blockchain – A Revolution You Can’t Stop | by Intellectsoft
Webinar: Blockchain – A Revolution You Can’t Stop | by Intellectsoft
 
Blockchain: Real World Use Cases
Blockchain: Real World Use CasesBlockchain: Real World Use Cases
Blockchain: Real World Use Cases
 
Exploring Blockchain Technology, Risks, and Emerging Trends
Exploring Blockchain Technology, Risks, and Emerging TrendsExploring Blockchain Technology, Risks, and Emerging Trends
Exploring Blockchain Technology, Risks, and Emerging Trends
 
Token Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsToken Governance in Blockchain Ecosystems
Token Governance in Blockchain Ecosystems
 
Web3 summit 2019 Funkas Berlin(Report)
Web3 summit 2019  Funkas Berlin(Report)Web3 summit 2019  Funkas Berlin(Report)
Web3 summit 2019 Funkas Berlin(Report)
 
Blockchain technology amplify your enterprise / IBM
Blockchain technology amplify your enterprise / IBMBlockchain technology amplify your enterprise / IBM
Blockchain technology amplify your enterprise / IBM
 
Ultimate guide to understand- What is Blockchain Technology
Ultimate guide to understand- What is Blockchain Technology Ultimate guide to understand- What is Blockchain Technology
Ultimate guide to understand- What is Blockchain Technology
 
Blockchain and Cybersecurity
Blockchain and Cybersecurity Blockchain and Cybersecurity
Blockchain and Cybersecurity
 
Blockchain Finance
Blockchain FinanceBlockchain Finance
Blockchain Finance
 
Blockchain : A Catalyst for New Approaches in Insurance
Blockchain : A Catalyst for New Approaches in Insurance Blockchain : A Catalyst for New Approaches in Insurance
Blockchain : A Catalyst for New Approaches in Insurance
 
Initial Thoughts on Regulation for Bitcoin and Virtual Currencies
Initial Thoughts on Regulation for Bitcoin and Virtual CurrenciesInitial Thoughts on Regulation for Bitcoin and Virtual Currencies
Initial Thoughts on Regulation for Bitcoin and Virtual Currencies
 

Similar to blockchain bootcamp @WCNJ

How to raise $100M for your healthcare startup via ICO: Breaking the myths of...
How to raise $100M for your healthcare startup via ICO: Breaking the myths of...How to raise $100M for your healthcare startup via ICO: Breaking the myths of...
How to raise $100M for your healthcare startup via ICO: Breaking the myths of...
VSee
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
Jose L. Quiñones-Borrero
 
Blockchain
Blockchain Blockchain
Blockchain
Zefren Edior
 
Blockchain and Cryptocurrencies
Blockchain and CryptocurrenciesBlockchain and Cryptocurrencies
Blockchain and Cryptocurrencies
nimeshQ
 
Blockchain presentation to isaca (kemp)
Blockchain presentation to isaca (kemp)Blockchain presentation to isaca (kemp)
Blockchain presentation to isaca (kemp)
Milan Hazra
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
🔗Audrey Chaing
 
Blockchain - Primer for City CIOs v05 01 22.pdf
Blockchain - Primer for City CIOs v05 01 22.pdfBlockchain - Primer for City CIOs v05 01 22.pdf
Blockchain - Primer for City CIOs v05 01 22.pdf
ssusera441c2
 
Blockchain@next18 event
Blockchain@next18 eventBlockchain@next18 event
Blockchain@next18 event
PTT Bilgi Teknolojileri A.S.
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Ulf Mattsson
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
M Shamim Iqbal
 
“As a layperson -let us understand- cryptocurrency and how it works.pdf
“As a layperson -let us understand- cryptocurrency and how it works.pdf“As a layperson -let us understand- cryptocurrency and how it works.pdf
“As a layperson -let us understand- cryptocurrency and how it works.pdf
RAVI TIKU
 
Tokenomics: What Tokens, ICOs, Cryptography, and the Blockchain Mean for the ...
Tokenomics: What Tokens, ICOs, Cryptography, and the Blockchain Mean for the ...Tokenomics: What Tokens, ICOs, Cryptography, and the Blockchain Mean for the ...
Tokenomics: What Tokens, ICOs, Cryptography, and the Blockchain Mean for the ...
Stephen Peters
 
Blockchain.pptx
Blockchain.pptxBlockchain.pptx
Blockchain.pptx
manishchaitanya
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalDavid Lee Kuo Chuen 李国权
 
Blockchain presentation v0617
Blockchain presentation v0617Blockchain presentation v0617
Blockchain presentation v0617
Joaquim Pedro Antunes
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
Jan Baeriswyl
 
An Introduction to Blockchain
An Introduction to BlockchainAn Introduction to Blockchain
An Introduction to Blockchain
Thomvest Ventures
 
Blockchain - Primer for City CIOs v03 28 22
Blockchain - Primer for City CIOs v03 28 22Blockchain - Primer for City CIOs v03 28 22
Blockchain - Primer for City CIOs v03 28 22
ssusera441c2
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
Ingo Weber
 
NYS Forum - Blockchain
NYS Forum - BlockchainNYS Forum - Blockchain
NYS Forum - Blockchain
Joel Binn
 

Similar to blockchain bootcamp @WCNJ (20)

How to raise $100M for your healthcare startup via ICO: Breaking the myths of...
How to raise $100M for your healthcare startup via ICO: Breaking the myths of...How to raise $100M for your healthcare startup via ICO: Breaking the myths of...
How to raise $100M for your healthcare startup via ICO: Breaking the myths of...
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
 
Blockchain
Blockchain Blockchain
Blockchain
 
Blockchain and Cryptocurrencies
Blockchain and CryptocurrenciesBlockchain and Cryptocurrencies
Blockchain and Cryptocurrencies
 
Blockchain presentation to isaca (kemp)
Blockchain presentation to isaca (kemp)Blockchain presentation to isaca (kemp)
Blockchain presentation to isaca (kemp)
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
 
Blockchain - Primer for City CIOs v05 01 22.pdf
Blockchain - Primer for City CIOs v05 01 22.pdfBlockchain - Primer for City CIOs v05 01 22.pdf
Blockchain - Primer for City CIOs v05 01 22.pdf
 
Blockchain@next18 event
Blockchain@next18 eventBlockchain@next18 event
Blockchain@next18 event
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
“As a layperson -let us understand- cryptocurrency and how it works.pdf
“As a layperson -let us understand- cryptocurrency and how it works.pdf“As a layperson -let us understand- cryptocurrency and how it works.pdf
“As a layperson -let us understand- cryptocurrency and how it works.pdf
 
Tokenomics: What Tokens, ICOs, Cryptography, and the Blockchain Mean for the ...
Tokenomics: What Tokens, ICOs, Cryptography, and the Blockchain Mean for the ...Tokenomics: What Tokens, ICOs, Cryptography, and the Blockchain Mean for the ...
Tokenomics: What Tokens, ICOs, Cryptography, and the Blockchain Mean for the ...
 
Blockchain.pptx
Blockchain.pptxBlockchain.pptx
Blockchain.pptx
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_Final
 
Blockchain presentation v0617
Blockchain presentation v0617Blockchain presentation v0617
Blockchain presentation v0617
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
 
An Introduction to Blockchain
An Introduction to BlockchainAn Introduction to Blockchain
An Introduction to Blockchain
 
Blockchain - Primer for City CIOs v03 28 22
Blockchain - Primer for City CIOs v03 28 22Blockchain - Primer for City CIOs v03 28 22
Blockchain - Primer for City CIOs v03 28 22
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
 
NYS Forum - Blockchain
NYS Forum - BlockchainNYS Forum - Blockchain
NYS Forum - Blockchain
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

blockchain bootcamp @WCNJ

  • 1. We thank our annual sponsors for their support!
  • 2. Blockchain Bootcamp Susan Okin Goldsmith sgoldsmith@mccarter.com @Susan_Goldsmith Ash Yadav ashyadav@gmail.com @ashyadav
  • 3. Introduction • Internet 1.0 – where we were • Internet 2.0 (2.5?) – where we are • Internet 3.0 – where we are going, driven by AI, IoT and BLOCKCHAIN • The technology • Some applications • The legal framework
  • 4. A system “[Blockchain] is to Bitcoin, what the internet is to email. A big electronic system, on top of which you can build applications. Currency is just one.” Sally Davies, FT Technology Reporter
  • 5. How does it work? “Any sufficiently advanced technology is indistinguishable from magic.” Arthur C. Clarke
  • 6. Blockchain Basics • An append-only database - data in a block cannot be altered retroactively, as the chain breaks. • A continuously growing list of records, called blocks, which are linked to one another and secured using cryptography. • Each block contains a unique link to a previous block (a “hash”), a timestamp and transaction data. • “Miners” are in a peer-to-peer network, using an agreed protocol to validate transactions and generate new blocks in the chain.
  • 7. Software History • Internet protocols – HTTP / HTTPS • Security measures and encryption – Transaction is secure – Data is not secure • Ownership of digital assets
  • 8. Hashcash – c. 1992 -1997 • Hashcash is a proof-of-work algorithm, which has been used as a denial-of-service counter measure technique in a number of systems. • Hashcash was originally proposed as a mechanism to throttle systematic abuse of un- metered internet resources such as email, and anonymous remailers in May 1997. #
  • 9. b-money – c. 1998 A scheme for a group of untraceable digital pseudonyms to pay each other with money and to enforce contracts amongst themselves without outside help “I am fascinated by Tim May's crypto-anarchy. Unlike the communities traditionally associated with the word "anarchy", in a crypto-anarchy the government is not temporarily destroyed but permanently forbidden and permanently unnecessary. It's a community where the threat of violence is impotent because violence is impossible, and violence is impossible because its participants cannot be linked to their true names or physical locations.” - Wei Dai http://www.weidai.com/bmoney.txt
  • 10. SHA-256 – c. 2011 • Cryptographic hashing • Digital Signatures
  • 11. Merkle Tree c. 1979 Hash trees allow efficient and secure verification of the contents of large data structures. Hash trees are a generalization of hash lists and hash chains. Hash trees can be used to verify any kind of data stored, handled and transferred in and between computers. They can help ensure that data blocks received from other peers in a peer-to-peer network are received undamaged and unaltered, and even to check that the other peers do not lie and send fake blocks. https://en.wikipedia.org/wiki/Merkle_tree
  • 12. Bitcoin A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Requiring a proof of work to provide the signature for the blockchain was Satoshi Nakamoto's key innovation. White paper 2009: https://bitcoin.org/bitcoin.pdf
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 28. 1st Transaction Block Satoshi Nakamoto -> Hal Finney On Jan 12, 2009 https://bitcointalk.org/index.php?topic=15 5054.0 On 22 May 2010, Laszlo Hanyecz made the first real-world transaction by buying two pizzas in Jacksonville, Florida for 10,000 BTC.
  • 29. Bitcoin – BTC or • Non-governmental currency • No bank laws protect you, no government controls it • Stored value but recently used mostly for speculation • About 20% of all Bitcoin (4M coins) is lost as cyber key/security codes have been forgotten, lost or abandoned
  • 30. Coinbase – Bitcoin price 4/17/2018
  • 31. Coinbase – Ethereum price 4/17/18
  • 32. Ethereum: Smart Contracts, Tokens • Open software platform based on blockchain technology that enables developers to build and deploy decentralized applications (DAPPS). • Uses a crypocurrency (ether) which is also used for smart contracts. • Enables creation of utility tokens [ERC20 standard] • Ether is also used by developers to pay for transaction fees and services on the platform.
  • 33. Internet 3.0 • Cryptonetworks – Open and public (but decentralized) – Closed and private (but centralized) • Tokens – Cryptocurrency / Cryptoassets • Usage – Utility token provides digital service – Investment in service provider
  • 34. Few Applications Actually Available • Email: Earn.com (purchased by Coinbase) • Browser: Brave.com • Insurance: Fizzy.AXA – flight insurance (beta) • Diamonds – Everledger.com (being replaced by DeBeers initiative) • Yahoo! Google ? • MySpace Facebook ?
  • 35. Many Applications Being Developed www.icotracker.net
  • 36. Cambrian Explosion? • It will solve all your problems! • Not yet: high fees, long confirmation times, impractical exchanges, fraud, stolen wallets, government interference. • Over 1,000 cryptocurrencies exist (“altcoins"); 600+ have market capitalizations of over $100K. • There’s something happening here, what it is ain’t exactly clear. • Cambrian Explosion ended with extinction event.
  • 37. Smart Contracts • Can be used for self-executing agreements, e.g., payment distributions among musicians, compensation to artist in ticket resales. • Retailers can use smart contracts for issuing loyalty points / rewards. • Streaming money while something happens. • Third party can see something happened but not know who was involved.
  • 38. Supply Chain Management • Software programs automate performance through connectivity (IoT) – IBM working hard on this • Example: Seller ships product? Funds automatically transferred from buyer • How will current contracts law be applied? • Example: Error in the code? Unilateral mistake; mutual mistake; or no mistake at all if the actions taken were consistent with the code
  • 39. More Implementation Worries • More features and complexity more potential vulnerabilities • What is the strategic goal? What functionality do you really need? • Blockchain vendors disclaim as much risk and liability as possible, robust testing environment must validate and debug before launch. • What happens when something goes wrong? Need real-time monitoring and auditing? Plan B: unwind transactions or manually correct entries? • In customer and vendor agreements, allocate risks and liabilities under dispute and failure scenarios, attention to termination provisions. • Consider cross-border transactions, different laws and regulatory schemes; move to permission-based structure, compliance with GDPR. • Regulatory Compliance: what processes are being supplanted? • Transaction Due Diligence – need to include tech specialists / coders.
  • 41. Short Portion of a Very Long List • Taxes • Money laundering / Patriot Act • Data privacy including GDPR, HIPPA • Property records (real and IP) • Inheritance and wealth transfer • Theft by trusted people (or hackers) • Effect on Uniform Commercial Code • International trade
  • 42. Some IP Issues • Algorithms, ledgers and contracts are not patentable. • Business methods as such are not patentable. • Many patent applications in the pipeline, next front in litigation, many from large banks and insurers. • Role of whitepapers and prior disclosures. • Open source code is often used for the platforms, each has its own terms. • Who gets sued?
  • 43. Cryptocurrency for Capital Raising • Initial Coin Offering – ICO • Lure of raising money non-dilutively, perhaps without constraints imposed by securities laws and other regulatory requirements • Democratization of access to these investments empowered by crowdfunding • $1.7 billion raised by selling cryptocurrencies in Q4 2017 alone/more than the dollars invested in venture capital financings • Lots of scams, many fraudulent deals 43
  • 44. Cryptocurrency Capital Raising (cont’d) • Utility v. security tokens o Utility tokens: narrowly defined to permit coin holder to buy issuer’s goods or services, usually at a discount or with rewards or other benefits (analogize to prepaid gift cards) o Security tokens: broader and more generalized in usage, often include revenue share, profit share, distributions or interest • SEC issuing warnings about crypto, applying “facts and circumstances” test based on the characteristics of the coin to determine if a coin is a security or a token • March 2018: SEC says register or seek exemption 44
  • 45. Securities Laws Plus Other Agencies o Utility tokens – sell like a gift card, possibly exempt o Security tokens – compliance required − Reg. D – private placements, usually SAFTS (Simple Agreement for Future Tokens), but narrow distribution/limited numbers of non- accredited investors, not freely tradeable − Reg A+ - mini IPO, elegant solution for capital raises of around $8 to $10M, up to $50M − Registered Public Offering o Commodities Futures Trading Commission – requiring compliance for utility tokens as futures contracts? o Money transmission license required for “most” ICO issuers (recent letter of Treasury Dept. Financial Crimes Enforcement Network (FinCEN)) 45
  • 46. State Law Compliance • NY – June 2015 Department of Financial Services (DFS) enacted BitLicense framework, licensing regime covers substantially all "virtual currency business activity" that touches New York or its residents • Massachusetts taking aim at ICOs • BUT: Utility tokens exempt in Wyoming https://www.coindesk.com/wyoming-house-approves-utility-token-securities-exemptions-bill/ 46
  • 47. Markets Start to Mature • Emerging - professionalized, financially disciplined entities: o Crypto hedge funds o Venture capital funds are entering the market o Will crypto be legitimate asset class for investors’ diversified portfolio? 47
  • 49. National Sovereignty Issues • Japan, Singapore, Switzerland, Malta, Liechtenstein, some others emerging as nation states strongly embracing crypto • China, South Korea, India take hard negative stance (but are furiously submitting patent applications) • Facebook may issue its own currency, but won’t accept ads for others. Does Amazon issue crypto? • Existential threat to state sovereignty? oTax enforcement oMonetary policy oPrimacy of the US $ subject to threat?
  • 50. Security • Protect your keys! • Hardware wallets, hard copies • Authentication • Recovery keys • Possession is 100% of the law?
  • 51. Confused? Exhilarated? Questions and Answers (Questions? Yes. Answers? Some.) 51