SlideShare a Scribd company logo
Get It Together: ChainLink Securely
Tying Smart Contracts to the Data
They Require
Link Score: 33 out of 50 Summary
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5
1. Cryptoeconomics
2. Investability
3. Distribution
4. Team
5. Project
6. Scalability
7. Securability
8. Decentralization
9. Engagement
10. Risk Management
ChainLink is a project with a
clear use case driven by
market demand. Supported
by a strong team and an
engaged community. These
positive factors are
undermined by opaque
distribution and minimal
decentralization.
Overview
• ChainLink’s focus is securely connecting smart contracts to off-chain
data sources. Referring to itself as decentralized oracle middleware.
• Payment to providers of data services is made in the project’s native
cryptoasset, LINK. Which the providers must stake to ensure the
quality and timeliness of information delivered.
Cryptoeconomics: 4 out of 5
Defensible Tokenziation
Properly aligns incentives across stakeholders
Mechanism to maintain scarcity
Mechanism to generate value
×Mechanism to generate network effects
Investability: 3 out of 5
½ Disciplined well structured capital allocation process
½ Mechanism to capture value
Proven natural demand (Adoption increasing over time)
½ Brand
½ Defensibility
Distribution: 1.5 out of 5
× Insider skin in the game (allocations subject to vestings and lock ups
reflecting preferred status obatining tokens)
× Optimized for long term usage of product
× Equitable token sale (At least 80% pre-product / 50% if product is live)
½ Broad Distribution (Should not be accredited / institutional only)
Limited Supply
Team: 4 out of 5
Track record of historical achievements
Distinctive combination of skills
Unique qualifications for tackling problem
Experience building distributed computer systems
×Transparent and consistent ethical behavior
Project: 5 out of 5
Project is live and has existing users
Well written high quality white paper
Demonstrated understanding of landscape of possible competitors,
substitutes
Unique Value Proposition
Open Source
Scalability: 3 out of 5
Project leads can hire and develop
×Clearly defined roadmap to obtain share of market
Continually Improving Developer Experience
½ Sustainable burn rate
½ Geographically distributed usage
Securability: 2.5 out of 5
×Widespread distribution of miners / stakers
Systematic approach to dealing with bugs
Easily Stored Securely
×High volume of nodes
½ Untiered Rewards
Decentralization: 1.5 out of 5
Widespread Developer Contributions
×Roadmap for decentralized governance
×Lack of concentrated holders
×Would function normally without creators
½ Global
Engagement: 5 out of 5
Developer adoption protocol
Active commenting reddit
Long lasting ongoing discussions in Slack, Telegram, Discord, etc…
Positive Twitter sentiment
Uptrend in Google Trends
Risk Management: X out of 5
Code Audit
×Anti fragile - gets stronger when stressed
1
2
Low funding risk (fiat)
Attack Risk
Regulatory Risk
Continue Reading
Crypto Jungle Write Up on the Link Token
Full ChainLink Report in PDF
Stay up to date on Steve’s latest Cryptoasset Research
About the Author
sign up for his newsletter
Visit the Author at Cryptojungle.io
Steve Miller
Steve is a CFA® Charterholder and founder of Crypto Jungle. A site devoted to
helping people hack through the weeds to find the gems. The CFA designation
is globally recognized and attests to a charterholder’s success in a rigorous and
comprehensive study program in the field of investment management and
research analysis.
CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
On Twitter @TokenAuditor
Disclaimer
• Information in this presentation is presented solely for educational and entertainment
purposes although every effort has been made to ensure the information in the
presentation is correct. The author does not assume and hereby disclaims any liability to
any party for any loss, damage, or disrupt in any matter whatsoever caused by any errors
or omissions whether such errors or omissions result from negligence, accident, or any
other cause. The information provided should not be taken as expert instruction or
commands. The information contained therein as legal, financial, tax, or other
professional services advice. While all attempts have been made to verify the
information provided in the presentation, neither the authors, nor the publisher assumes
any responsibility for errors, omissions, or contrary interpretations of the subject matter
herein. Neither the authors, nor the publisher assumes any responsibility or liability
whatsoever on the behalf of the user of these materials. Every circumstance is different
and the advice and strategies contained herein may not be suitable for your situation.
You are responsible for your own choices, actions, and results. Please seek the services
of competent professionals as needed. Any perceived slight of any individual or
organization is purely unintentional.

More Related Content

What's hot

Justifying Utility Security Investments
 Justifying Utility Security Investments Justifying Utility Security Investments
Justifying Utility Security Investments
Black & Veatch
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
Resolver Inc.
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
Synack
 
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Measuring DDoS Risk using FAIR (Factor Analysis of Information RiskMeasuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Tony Martin-Vegue
 
Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!
Spiceworks Ziff Davis
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
Phil Huggins FBCS CITP
 
Countering Cyber Threats
Countering Cyber ThreatsCountering Cyber Threats
Countering Cyber Threats
Phil Huggins FBCS CITP
 
CIS13: FCCX and IDESG: An Industry Perspectives
CIS13: FCCX and IDESG: An Industry PerspectivesCIS13: FCCX and IDESG: An Industry Perspectives
CIS13: FCCX and IDESG: An Industry Perspectives
CloudIDSummit
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk Management
Deepak Bansal, CPA CISSP
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
Resolver Inc.
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model Roadmap
David Sweigert
 
The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field
Resolver Inc.
 
Quantifying Cyber Risk
Quantifying Cyber Risk Quantifying Cyber Risk
Quantifying Cyber Risk
Phil Huggins FBCS CITP
 
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
Levi Shapiro
 
PMN0713 Trenches
PMN0713 TrenchesPMN0713 Trenches
PMN0713 TrenchesLen Pannett
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
Scalar Decisions
 
How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
Resolver Inc.
 

What's hot (17)

Justifying Utility Security Investments
 Justifying Utility Security Investments Justifying Utility Security Investments
Justifying Utility Security Investments
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Measuring DDoS Risk using FAIR (Factor Analysis of Information RiskMeasuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
 
Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Countering Cyber Threats
Countering Cyber ThreatsCountering Cyber Threats
Countering Cyber Threats
 
CIS13: FCCX and IDESG: An Industry Perspectives
CIS13: FCCX and IDESG: An Industry PerspectivesCIS13: FCCX and IDESG: An Industry Perspectives
CIS13: FCCX and IDESG: An Industry Perspectives
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk Management
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model Roadmap
 
The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field
 
Quantifying Cyber Risk
Quantifying Cyber Risk Quantifying Cyber Risk
Quantifying Cyber Risk
 
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
 
PMN0713 Trenches
PMN0713 TrenchesPMN0713 Trenches
PMN0713 Trenches
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
 

Similar to Get it Together: ChainLink Securely Tying Smart Contracts to the Data They Require

Cryptoasset Investor's Seeking Exposure to Governance: Should Consider Decred
Cryptoasset Investor's Seeking Exposure to Governance: Should Consider DecredCryptoasset Investor's Seeking Exposure to Governance: Should Consider Decred
Cryptoasset Investor's Seeking Exposure to Governance: Should Consider Decred
Steve Miller, CFA
 
Augur: The Future of Prediction Markets
Augur: The Future of Prediction MarketsAugur: The Future of Prediction Markets
Augur: The Future of Prediction Markets
Steve Miller, CFA
 
Discussion- 11. How does efficient frontier analysis (EFA) dif.docx
Discussion- 11. How does efficient frontier analysis (EFA) dif.docxDiscussion- 11. How does efficient frontier analysis (EFA) dif.docx
Discussion- 11. How does efficient frontier analysis (EFA) dif.docx
madlynplamondon
 
Clextra e governance
Clextra e governanceClextra e governance
Clextra e governance
Edgevalue
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
OnRamp
 
eGovernance Whitepaper
eGovernance WhitepapereGovernance Whitepaper
eGovernance Whitepaper
Edgevalue
 
Global trends in AI and healthcare
Global trends in AI and healthcareGlobal trends in AI and healthcare
Global trends in AI and healthcare
Booster
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
NICSA
 
EmergentX Digital Asset Outlook 2022 - Consilience
EmergentX Digital Asset Outlook 2022 - ConsilienceEmergentX Digital Asset Outlook 2022 - Consilience
EmergentX Digital Asset Outlook 2022 - Consilience
EmergentXDigitalAsse
 
Takeaways from a Simulated Cyber Attack
Takeaways from a Simulated Cyber AttackTakeaways from a Simulated Cyber Attack
Takeaways from a Simulated Cyber Attack
Boston Consulting Group
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
Aronson LLC
 
Financial valuation of alliances and partnership
Financial valuation of alliances and partnershipFinancial valuation of alliances and partnership
Financial valuation of alliances and partnership
Alfred Griffioen
 
A6 pragmatic journey into cyber security
A6 pragmatic journey into cyber securityA6 pragmatic journey into cyber security
A6 pragmatic journey into cyber security
Jorge Sebastiao
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
Globus
 
ALPHA BLUE OCEAN COMMITS TO A BETTER TOMORROW
ALPHA BLUE OCEAN COMMITS TO A BETTER TOMORROWALPHA BLUE OCEAN COMMITS TO A BETTER TOMORROW
ALPHA BLUE OCEAN COMMITS TO A BETTER TOMORROW
Alpha Blue Ocean
 
Deepening Client Relationships in Financial Services
Deepening Client Relationships in Financial ServicesDeepening Client Relationships in Financial Services
Deepening Client Relationships in Financial Services
NexJ Systems Inc.
 
Enterprise 360 degree risk management
Enterprise 360 degree risk managementEnterprise 360 degree risk management
Enterprise 360 degree risk management
Infosys
 
Super Session- A Day in the Life of a Nonprofit Fundraiser
Super Session- A Day in the Life of a Nonprofit FundraiserSuper Session- A Day in the Life of a Nonprofit Fundraiser
Super Session- A Day in the Life of a Nonprofit Fundraiser
Salesforce.org
 
Startup InsurTech Award - Atidot
Startup InsurTech Award - AtidotStartup InsurTech Award - Atidot
Startup InsurTech Award - Atidot
The Digital Insurer
 
The Total Economic Impact of Using ThoughtWorks' Agile Development Approach
The Total Economic Impact of Using ThoughtWorks' Agile Development ApproachThe Total Economic Impact of Using ThoughtWorks' Agile Development Approach
The Total Economic Impact of Using ThoughtWorks' Agile Development Approach
Thoughtworks
 

Similar to Get it Together: ChainLink Securely Tying Smart Contracts to the Data They Require (20)

Cryptoasset Investor's Seeking Exposure to Governance: Should Consider Decred
Cryptoasset Investor's Seeking Exposure to Governance: Should Consider DecredCryptoasset Investor's Seeking Exposure to Governance: Should Consider Decred
Cryptoasset Investor's Seeking Exposure to Governance: Should Consider Decred
 
Augur: The Future of Prediction Markets
Augur: The Future of Prediction MarketsAugur: The Future of Prediction Markets
Augur: The Future of Prediction Markets
 
Discussion- 11. How does efficient frontier analysis (EFA) dif.docx
Discussion- 11. How does efficient frontier analysis (EFA) dif.docxDiscussion- 11. How does efficient frontier analysis (EFA) dif.docx
Discussion- 11. How does efficient frontier analysis (EFA) dif.docx
 
Clextra e governance
Clextra e governanceClextra e governance
Clextra e governance
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
 
eGovernance Whitepaper
eGovernance WhitepapereGovernance Whitepaper
eGovernance Whitepaper
 
Global trends in AI and healthcare
Global trends in AI and healthcareGlobal trends in AI and healthcare
Global trends in AI and healthcare
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
 
EmergentX Digital Asset Outlook 2022 - Consilience
EmergentX Digital Asset Outlook 2022 - ConsilienceEmergentX Digital Asset Outlook 2022 - Consilience
EmergentX Digital Asset Outlook 2022 - Consilience
 
Takeaways from a Simulated Cyber Attack
Takeaways from a Simulated Cyber AttackTakeaways from a Simulated Cyber Attack
Takeaways from a Simulated Cyber Attack
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 
Financial valuation of alliances and partnership
Financial valuation of alliances and partnershipFinancial valuation of alliances and partnership
Financial valuation of alliances and partnership
 
A6 pragmatic journey into cyber security
A6 pragmatic journey into cyber securityA6 pragmatic journey into cyber security
A6 pragmatic journey into cyber security
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 
ALPHA BLUE OCEAN COMMITS TO A BETTER TOMORROW
ALPHA BLUE OCEAN COMMITS TO A BETTER TOMORROWALPHA BLUE OCEAN COMMITS TO A BETTER TOMORROW
ALPHA BLUE OCEAN COMMITS TO A BETTER TOMORROW
 
Deepening Client Relationships in Financial Services
Deepening Client Relationships in Financial ServicesDeepening Client Relationships in Financial Services
Deepening Client Relationships in Financial Services
 
Enterprise 360 degree risk management
Enterprise 360 degree risk managementEnterprise 360 degree risk management
Enterprise 360 degree risk management
 
Super Session- A Day in the Life of a Nonprofit Fundraiser
Super Session- A Day in the Life of a Nonprofit FundraiserSuper Session- A Day in the Life of a Nonprofit Fundraiser
Super Session- A Day in the Life of a Nonprofit Fundraiser
 
Startup InsurTech Award - Atidot
Startup InsurTech Award - AtidotStartup InsurTech Award - Atidot
Startup InsurTech Award - Atidot
 
The Total Economic Impact of Using ThoughtWorks' Agile Development Approach
The Total Economic Impact of Using ThoughtWorks' Agile Development ApproachThe Total Economic Impact of Using ThoughtWorks' Agile Development Approach
The Total Economic Impact of Using ThoughtWorks' Agile Development Approach
 

Recently uploaded

SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptxSWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Analyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar modelAnalyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar model
ManthanBhardwaj4
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
DOT TECH
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
DOT TECH
 
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
obyzuk
 
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
University of Calabria
 
where can I find a legit pi merchant online
where can I find a legit pi merchant onlinewhere can I find a legit pi merchant online
where can I find a legit pi merchant online
DOT TECH
 
Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
shetivia
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
pchutichetpong
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
GRAPE
 
Introduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.pptIntroduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.ppt
VishnuVenugopal84
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
marketing367770
 
The Role of Non-Banking Financial Companies (NBFCs)
The Role of Non-Banking Financial Companies (NBFCs)The Role of Non-Banking Financial Companies (NBFCs)
The Role of Non-Banking Financial Companies (NBFCs)
nickysharmasucks
 
An Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault worksAn Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault works
Colin R. Turner
 
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdfTumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Henry Tapper
 
What price will pi network be listed on exchanges
What price will pi network be listed on exchangesWhat price will pi network be listed on exchanges
What price will pi network be listed on exchanges
DOT TECH
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
DOT TECH
 
APP I Lecture Notes to students 0f 4the year
APP I  Lecture Notes  to students 0f 4the yearAPP I  Lecture Notes  to students 0f 4the year
APP I Lecture Notes to students 0f 4the year
telilaalilemlem
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
egoetzinger
 

Recently uploaded (20)

SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptxSWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
 
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
 
Analyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar modelAnalyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar model
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
 
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
 
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
 
where can I find a legit pi merchant online
where can I find a legit pi merchant onlinewhere can I find a legit pi merchant online
where can I find a legit pi merchant online
 
Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
 
Introduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.pptIntroduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.ppt
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
 
The Role of Non-Banking Financial Companies (NBFCs)
The Role of Non-Banking Financial Companies (NBFCs)The Role of Non-Banking Financial Companies (NBFCs)
The Role of Non-Banking Financial Companies (NBFCs)
 
An Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault worksAn Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault works
 
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdfTumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
 
What price will pi network be listed on exchanges
What price will pi network be listed on exchangesWhat price will pi network be listed on exchanges
What price will pi network be listed on exchanges
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
 
APP I Lecture Notes to students 0f 4the year
APP I  Lecture Notes  to students 0f 4the yearAPP I  Lecture Notes  to students 0f 4the year
APP I Lecture Notes to students 0f 4the year
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
 

Get it Together: ChainLink Securely Tying Smart Contracts to the Data They Require

  • 1. Get It Together: ChainLink Securely Tying Smart Contracts to the Data They Require
  • 2. Link Score: 33 out of 50 Summary 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 1. Cryptoeconomics 2. Investability 3. Distribution 4. Team 5. Project 6. Scalability 7. Securability 8. Decentralization 9. Engagement 10. Risk Management ChainLink is a project with a clear use case driven by market demand. Supported by a strong team and an engaged community. These positive factors are undermined by opaque distribution and minimal decentralization.
  • 3. Overview • ChainLink’s focus is securely connecting smart contracts to off-chain data sources. Referring to itself as decentralized oracle middleware. • Payment to providers of data services is made in the project’s native cryptoasset, LINK. Which the providers must stake to ensure the quality and timeliness of information delivered.
  • 4. Cryptoeconomics: 4 out of 5 Defensible Tokenziation Properly aligns incentives across stakeholders Mechanism to maintain scarcity Mechanism to generate value ×Mechanism to generate network effects
  • 5. Investability: 3 out of 5 ½ Disciplined well structured capital allocation process ½ Mechanism to capture value Proven natural demand (Adoption increasing over time) ½ Brand ½ Defensibility
  • 6. Distribution: 1.5 out of 5 × Insider skin in the game (allocations subject to vestings and lock ups reflecting preferred status obatining tokens) × Optimized for long term usage of product × Equitable token sale (At least 80% pre-product / 50% if product is live) ½ Broad Distribution (Should not be accredited / institutional only) Limited Supply
  • 7. Team: 4 out of 5 Track record of historical achievements Distinctive combination of skills Unique qualifications for tackling problem Experience building distributed computer systems ×Transparent and consistent ethical behavior
  • 8. Project: 5 out of 5 Project is live and has existing users Well written high quality white paper Demonstrated understanding of landscape of possible competitors, substitutes Unique Value Proposition Open Source
  • 9. Scalability: 3 out of 5 Project leads can hire and develop ×Clearly defined roadmap to obtain share of market Continually Improving Developer Experience ½ Sustainable burn rate ½ Geographically distributed usage
  • 10. Securability: 2.5 out of 5 ×Widespread distribution of miners / stakers Systematic approach to dealing with bugs Easily Stored Securely ×High volume of nodes ½ Untiered Rewards
  • 11. Decentralization: 1.5 out of 5 Widespread Developer Contributions ×Roadmap for decentralized governance ×Lack of concentrated holders ×Would function normally without creators ½ Global
  • 12. Engagement: 5 out of 5 Developer adoption protocol Active commenting reddit Long lasting ongoing discussions in Slack, Telegram, Discord, etc… Positive Twitter sentiment Uptrend in Google Trends
  • 13. Risk Management: X out of 5 Code Audit ×Anti fragile - gets stronger when stressed 1 2 Low funding risk (fiat) Attack Risk Regulatory Risk
  • 14. Continue Reading Crypto Jungle Write Up on the Link Token Full ChainLink Report in PDF
  • 15. Stay up to date on Steve’s latest Cryptoasset Research About the Author sign up for his newsletter Visit the Author at Cryptojungle.io Steve Miller Steve is a CFA® Charterholder and founder of Crypto Jungle. A site devoted to helping people hack through the weeds to find the gems. The CFA designation is globally recognized and attests to a charterholder’s success in a rigorous and comprehensive study program in the field of investment management and research analysis. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute. On Twitter @TokenAuditor
  • 16. Disclaimer • Information in this presentation is presented solely for educational and entertainment purposes although every effort has been made to ensure the information in the presentation is correct. The author does not assume and hereby disclaims any liability to any party for any loss, damage, or disrupt in any matter whatsoever caused by any errors or omissions whether such errors or omissions result from negligence, accident, or any other cause. The information provided should not be taken as expert instruction or commands. The information contained therein as legal, financial, tax, or other professional services advice. While all attempts have been made to verify the information provided in the presentation, neither the authors, nor the publisher assumes any responsibility for errors, omissions, or contrary interpretations of the subject matter herein. Neither the authors, nor the publisher assumes any responsibility or liability whatsoever on the behalf of the user of these materials. Every circumstance is different and the advice and strategies contained herein may not be suitable for your situation. You are responsible for your own choices, actions, and results. Please seek the services of competent professionals as needed. Any perceived slight of any individual or organization is purely unintentional.