SlideShare a Scribd company logo
1 of 69
Buckets of Permissioned,
Permissionless, and Permissioned
Permissionlessness Ledgers
Who is developing shared, replicated ledgers and why
Brief outline
• Characteristics of a distributed ledger
• Motivations for building non-proof-of-work ledgers / private blockchains
• Known, trusted parties versus unknown, untrusted parties
• Unclear governance
• Scalability challenges
• Disproportional rewards from metacoins
• Where has VC funding gone?
• Opportunities for professional service firms
Questions to consider this session
• What are the design assumptions and goals for using new
technology?
• What are the client business requirements?
• Are entities and actors on the network known or unknown, trusted or
untrusted?
• Who is allowed or not allowed to validate transactions?
• e.g., mintettes as defined by Laurie (2011) and Meiklejohn (2015)
• Are the validators spread around globally?
• Is communication between them synchronous or asynchronous?
• Are faults tolerated? How are Byzantine faults handled?
• What type of consensus is needed? Or none at all?
Why distributed ledgers?
• There are many reasons for why companies, institutions and organizations
are interested in shared, replicated ledgers and disinterested in existing
networks or systems.
• What do financial institutions want?
• Cryptographically verifiable settlement and clearing systems that are globally
distributed for resiliency and compliant with various reporting requirements. And
the governance / versioning changes of both the network and software is clear and
explicit.
• What don’t certain organizations always need?
• Censorship resistance-as-a-service and artificially expensive anti-Sybil mechanisms.
What is a “block chain” anyways?
• Neither the term “block chain” nor “blockchain” were used in the
original Satoshi whitepaper
• Many projects, both permissioned and permissionless, use the
following tech pieces:
• Public key cryptography
• Cryptographic signatures
• Cryptographic hash functions
• Hash tree
• Cryptographic time-stamps
• Resilient peer-to-peer networks
What cont’d
• Some projects (both permissioned and permissionless) use a type of
consensus algorithm that works by using blocks of transactions organized
in a chain
• Permissionless ledgers attempt to do so via pseudonymous/anonymous consensus
(validation); permissioned via known/trusted validators
• Some permissioned ledgers do not chain blocks as there are no blocks at all
(such as Hyperledger)
• Fun fact: Hyperledger was originally called “Mintet.com” named after Ben Laurie’s
term (mintettes) coined in 2011
• Some permissioned ledgers are explicitly “decentralized” not “distributed”
as the pieces of the ledger are not actually distributed but instead wholly
replicated
“Who defines a term? The community, the creator, the market? The
market knows 'blockchain' as a catch-all term and that's how language
evolves, by common usage.”
- Dan O’Prey, co-founder of Hyperledger (now part of DA)
Three Bucket Mental Model
Types
of
ledgers
Permissioned
ledgers
Permissionless
ledgers
Permissioned
permissionlessness
hydrabinocoin
What comprises a permissioned blockchain?
Permissioned
blockchain
Legally
accountable
validators
(mintettes)
Settlement
finality
(irreversible)
Suitable for
off-chain
assets
(securities,
fiat, titles)
What are the characteristics of a distributed
ledger?
Distributed
Ledger
Independent
permissioned
blockchain
Distributed
virtual
machine
(Turing-
complete)
Smart
contracts
govern off-
chain assets
Network
achieves
settlement
finality
Permissioned distributed ledgers / blockchains
• Blockstack (formerly CryptoCorp)
• Ldger (formerly Tillit)
• Clearmatics
• Hyperledger (acquired by DAH)
• Eris Industries
• Tezos
• Tembusu (TRUST)
• DAH
• Guardtime (KSI)
• PeerNova
• SKUChain* (PurchaseChain/PPOW)
• MultiChain* (Coin Sciences)
• Ripple* (discontinued Codius)
• Stellar* (potentially with their new SCP)
• Traditional tech enterprises as well (e.g., IBM)
Each is targeting different use-cases
• Syndicated loans
• Trade finance
• Supply chain provenance
• US Treasury repo
• Clearing / settling OTC derivatives and FX
• Cross-border payments
• Identity / data authentication
• Private stock / equity issuance
• Commonality: participants in these networks – including the validators
themselves – are known (via KYC or KYB) and have legal or contractual obligations
with other participants
What attracts or repels use-cases?
• Folk law: “Anything that needs censorship-resistance will gravitate
towards censorship-resistant systems.”
• Sams' law: “Anything that doesn't need censorship-resistance will
gravitate towards non censorship-resistant systems.”
• Banks are currently focused on: fulfilling compliance requirements,
reducing cost (centers), downscaling branching and implementing
digital channels. None of this requires censorship-resistance.
What cont’d
• In conversations with decision makers at financial institutions, three common questions
that have arisen regarding potentially using a public chain:
• What happens if you pay a fee to a Bitcoin or Litecoin miner/mining pool in a sanctioned
country (e.g., EBA concerns in July 2014)?
• In February 2015 according to Free Beacon, Coinbase was on “the hot seat” for explicitly
highlighting this use-case in an older pitch deck
• “Immune to country-specific sanctions (e.g. Russia-Visa)”
• What if the Bitcoin or Litecoin miner that processes transactions for financial institutions
(e.g., watermarked tokens) also processes transactions for illicit goods and services from
dark net markets? Any liability?
• How to identify and contact the miner/mining pool in the event something happens
(e.g., slow confirmation time, accidentally sent the wrong instruction, double-spend
attempt, etc.)?
• Need to be able to influence upgrades, maintenance, uptime (i.e., typical vendor relationship)
What is one opportunity for professional service
firms that build core banking infrastructure?
Finding ways to reduce cost centers for
financial institutions
• According to Deutsche Bank in 2012:
• “Measured as a percentage of revenues, financial services firms spend more on IT
than any other industry. Banks’ IT costs equal 7.3% of their revenue’s, compared to
an average of 3.7% across all other industries surveyed”
• According to a 2015 report from Celent:
• “Total bank IT spending across North America, Europe, and Asia-Pacific will grow to
US$196.7 billion in 2015, an increase of approximately 4.6% over 2014.”
• According to a 2015 report from Oliver Wyman / Santander:
• “[D]istributed ledger technology could reduce banks’ infrastructure costs attributable
to cross-border payments, securities trading and regulatory compliance by between
$15-20 billion per annum by 2022”
What are opportunities for Finacle?
“Finacle relies on a system of traditional accounting ledgers to serve as core banking
systems. If they want to jump into the next field of vision around innovating back end
banking system then it is an urgent imperative they understand and lead the effort to
understand this technology. Capital markets, traditional lending, trade finance, loan sales
and syndication, asset-backed finance, to loan processing and servicing using singular back
end systems for the whole of processing will see its full sunset in 10-15 years utilizing
Blockchain and ledger technology. It could effectively put them out of business.
The other advantage by utilizing Blockchain ledger technologies is that allows Finacle a
significant competitive advantage in that it allows Finacle bank customer implementations
to examine and offer new digital wallet based solutions for its retail base. It also allows for
partnership opportunities with companies in the "Internet of Things" space to help
revolutionize supply chain finance, letters of credit, factoring, export import finance and
bankers acceptance business to one of vitality to match the third world’s smaller
companies thirst to operate on scale resulting from the ledgers ability to enable a
synchronous just-in-time financing model matched to their often challenged logistics
operations and documentation to meet complicated and ever competitive global customer
demand for hard to get goods and supply.”
- Raja Ramachandran, founder of eFXPath and R3 advisor
Importance of data integrity for Finacle
“Once every generation we reach a point in which hardware capabilities evolve to make
practical, things that were previously unthinkable. When that happens the challenge is to
recognise these new possibilities, and to see that they can fundamentally change the way
we think about the world. New models of computation arise that redefine the way in
which ever-more complex systems can be constructed; they don't solve the problems of
the previous generations so much as make them irrelevant.
The last 25 years have seen a sea change in our lives, as first the Internet, and then mobile
devices, have provided us with the mechanisms to access and share information. What's
remarkable is that all this has been achieved with a model for computational information
that has barely evolved in 70 years. Fundamentally we have to trust that the data we have,
and the data held by everyone else that affects us, is correct. Our information seemingly
floats through servers, routers and switches like driftwood in a stormy sea until it
eventually reaches us. We have little or no hope of verifying its accuracy or veracity (*).
This then is the opportunity now afforded by blockchain or other crypto-ledger technology.
We can establish a new model for the way we manage our data, one that can make
information integrity and trustworthiness checking the norm rather than a questionable
afterthought.
(*) You might ask how in the current informational world that you can be confident you're
reading my original quote?”
- Dave Hudson, VP of Software Development at Peernova
What financial institutions are looking into
distributed ledgers?
• Based on public news releases, there are at least 17 different FIs independently looking at ways to use a blockchain / distributed ledger. Note: it bears
mentioning that these are all pilot programs and does not necessarily mean any of the tech will ultimately be used. According to CoinGecko:
• CBW Bank
• ANZ
• Westpac
• Commonwealth Bank of Australia
• BNY Mellon
• LHV Bank
• Barclays
• UBS
• Goldman Sachs
• ABN Amro
• ING
• Rabobank
• Santander
• DBS
• USAA
• BBVA
• Citibank
What about proof-of-work-based
permissionless networks?
What comprises a permissionless
blockchain?
Permissionless
blockchain
DMMS
validators
Censorship
resistant
(anonymous
consensus)
Suitable for
on-chain
assets
(virtual
bearer asset)
Distributed databases / key value / hash table
• BigTable
• Druid
• Dynamo
• HyperDex
• Voldemort
• HBase (Hadoop/Chubby)
• Redis
• Cassandra
• MongoDB
• CouchDB
• MemCache
• IPFS
Check boxes
• One common rejoinder in social media is that all organizations need is a
simple database but…
• Does anything currently in existence provide the necessary set of
cryptographic features all in one system?
• Currently, no.
• For instance, financial institutions already operate in a environment where they send
value between trusted/known participants (e.g., interbank ‘trust’ is not a core issue).
In such a private network with 15 participants each sharing and replicating the
ledger, participants cryptographically sign transactions (and/or blocks); thus ordering
and timestamps verifiable by all 15 participants.
• In the case of contracts, all code will be executed by all nodes and will be visible to
participants based on granular permissions
• (Git does not provide consensus, is a specialized Merkle tree, involves only a chain (no blocks) that
provides signing, history and distribution. Forking results in new repo.)
Blockchain does not mean Bitcoin
• Many VCs, reporters and Bitcoin entrepreneurs are ‘talking their
book’ and ‘revising history’ when they euphemistically equate a
blockchain solely with Bitcoin
• Nakamoto-style consensus is just one way to “skin a consensus cat”
• Over 30 years of academic research on Merkle trees, hash tables and
arriving at consensus in distributed computing
• Technology is iterative and Bitcoin may just remain a proof-of-concept
due to its limitations and primary focus on being censorship-resistant
above all else
Needing a token is likely a red herring
• Energy conversion (mining) may only be a requisite if validators are
unknown and untrusted; staking and surety bonds may be an alternative too
for a public network
• There are other methods of securely validating transactions based on
different design goals and assumptions that do not involve burning coal in
China or running a consumer device-based Tom Sawyer botnet
• In general, why don’t permissioned shared, replicated ledgers necessarily
need a token?
• Because they incentivize security through legally binding contracts with
validators whom have real-world identities and reputations
• Validation on proof-of-work networks involves actors who are – in the
design model – not contractually obligated to fulfill a terms of service (using
the network is caveat emptor); the marginal costs on a public network are
higher and thus the compensation model has to be different
Why not (re)use one communal chain for
everything?
Trying to turn a communal chain into a “one-
size fits all” buffet is like using a clown car
Because these are (economic) networks, not
just software
• For the same reason organizations use different types of airplanes, boats
and automobiles – they have different needs and business requirements.
• Blockchain size is an ongoing challenge to the “one-size fits all approach” that will be
discussed later below. Impacts other chains too: Ethereum testnet is already at 30
GB, Bitcoin mainnet is 36 GB.
• And because as more value is added to a public blockchain, the more
incentives there are to attack it without going through the fan fiction
Maginot Line narrative (brute force by hashrate).
• Because of increased block maker centralization it is much easier to use
other techniques (rubber hose cryptanalysis, denial-of-service) to disrupt
participation
• Blatant bribery / hacking of pool
• ‘An attacker can sniff the cleartext credentials in the “mining.authorize” message, credentials
may be used elsewhere across the internet and may lead to account compromise’
• Canadian router hacked via Border Gateway Protocol fooling miners ($84,000 stolen)
Block makers, by design, lack terms of service
• In the event of a block reversal or censored
transaction, there is no terms of service that mining
pools (validators) must adhere to.
• On April 25, 2015 a BitGo user, due to a software glitch,
accidentally sent 85 BTC as a mining fee to AntPool
(Bitmain’s pool operated in China)
• To resolve this problem, the user spent several days
publicly conversing with tech support (and the community)
on Reddit.
• Eventually the glitch was fixed and AntPool – to be viewed
as a “good member of the community” yet defeating the
purpose of a proof-of-work blockchain – sent the user back
85 BTC
• “Who” do you call in the future? Why bother with pseudonymity?
Unintended in 2009: knowing the pseudonoymous
validators on an untrusted network?
• Below is a list of the first time a pool publicly claimed a block:
• Pool | Height
1: Slush 97838
2: bitcoinPool 110156
3: DeepBit 110322
4: Eligius 120630
5: BTC Guild 122608
And a list of the first time a pool signed a coinbase transaction:
• Pool | Height
1: Eligius 130635
2: BitMinter 152246
3: BTC Guild 152700
4: Nmcbit.com 153343
5: YourBTC 154967
A little history: Slush began publicly operating at the end of November 2010. Eligius was announced
on April 27, 2011. DeepBit publicly launched on February 26, 2011 and at one point was the most
popular pool, reaching for a short period in July 2011, more than 50% of the network hashrate.
Permissioned
permissionlessness
blockchain
Mostly
known
DMMS
validators
Neither
censorship
resistant nor
trade finality
Bearer asset
becomes a
registered
asset
Permissioned Permissionlessness, BINO-style
• One innovation in Bitcoin was anonymous/pseudonymous consensus
which comes with two large requirements: mining costs and block
reorganization risk
• Mining costs fluctuate in direct proportion to token value; more “energy efficient”
proofs-of-work is a contradiction in terms
• It was designed with anonymous consensus to resist censorship by trusted
third parties
• Today several startups and VC funds have (un)intentionally turned an
expensive permissionless system into a hydra gated permissioned network
without the full benefits of either
• Also turned a bearer asset into a registered asset with full costs of both
• Result: Bitcoin in name only (BINO)
Permissioned Permissionlessness cont’d
• If you are running a ledger between known parties who abide by
government regulations, there is no reason to pay that censorship-
resistance cost. Full stop.
• The commercial logic of this (largely) VC-backed endgame seems to be:
“privatize” Bitcoin through a dozen hard forks (the block size fork is the
start of a trend)
• Is it still Bitcoin if it is forked and privatized? It is BINO.
• All of the costs of Sybil-protected permissionlessness without the benefits
(e.g., speed, lower marginal costs) of actual permissioned
Permissioned Permissionlessness cont’d
• Nearly all of the startups creating hosted wallets (e.g., euphemism for
a “depository institution”), exchanges and ‘universal’ require users to
gain permission first before providing a service
• Similarly “middleware” projects like Symbiont and Chain/NASDAQ
appear to fit into the ‘permissioned permissionlessness’ bucket due
to identification / key holding requirements
• All told, more than half of all VC funding to date has gone into
building permissioned systems on top of a permissionless network
Raising funds for permissioned
permissionlessness
• Notable companies providing such ‘permissioned permissionlessness’ services include:
• Chain: ($13.7 million)
• Bitgo: ($14 million)
• Coinbase: ($106 million)
• Circle: ($76 million)
• Xapo: ($40 million)
• itBit: ($28.25 million)
• Bitstamp: ($10 million)
• Kraken: ($6.5 million)
• OKCoin : ($11 million)
• Mirror : ($12.8 million)
• Bitreserve: ($14.6 million)
• Coinplug: ($3.3 million)
Three “sins” with trade-offs
Sin of
Commission
(forgery of
transaction)
Sin of
Omission
(censorship of
transaction)
Sin of
Deletion
(reversal of
transaction)
Cryptocurrency systems prioritize mitigation of
omission (censorship-resistance) over deletion
(irreversibility)
• In contrast, any system of off-chain property titles will have to
prioritize deletion (irreversibility) over omission (censorship-
resistance)
• Consequently, existing legal systems will likely never recognize a
system of property titles that can be reversed by anonymous or
pseudonomyous validators (see EBA concerns)
Future-proofing hard forks
• Because technology and usage are not static, there needs to be a way to clearly
upgrade and update both the software and network
• The BIP process (“Bitcoin Improvement Proposals”) still largely depends on altruism and
charity, neither of which is necessarily sustainable and as shown empirically, beholden to
special interest groups and their stakeholders
• Devolves into “fork by social media,” “fork by populism,” “fork by upvotes”
• Other networks have learned from this situation:
• Built around version control (e.g., Peernova)
• Built-in, explicit governance:
• Tezos is a self-amending chain
• Ethereum is attempting to “bomb” the chain to switch to proof-of-stake at a later date
• Ripple, Stellar and others have clearer governance due to explicit chain-of-command, terms
of service, real-world reputations and contractual obligations.
• Different set of challenges (e.g., identity / KYC management, trying to run this in a decentralized and
secure way).
• A financial network is different than an information network.
“When it comes to long term survival, adaptability is more important
than strength. Seeing distributed ledger as mere technology is
shortsighted, they are first and foremost networks and, as such, their
governance model is paramount to their success. A decentralized
network that does not internalize its governance is condemned to
stagnation or centralization.”
- L.M. Goodman, creator of Tezos
The right tool for the right
job
There are trade-offs of using different types of networks
One short-term reason to hold hydrabinocoin
• Some of the stated use-cases make it self-defeating to use Xapo (e.g., using a DNM)
• But in the short-run, there are probably niche cases
• Why pay for a censorship resistant network and not use the utility?
• Because you are betting others will and you aren't personally concerned with censorship
• Example: a large US hedge fund wants to hold BTC because it believes its use will grow
on the Argentinian black market
• The hedge fund isn't particularly concerned with censorship, but they have no expertise
handling keys, so they use Xapo
• The Argentinian black marketeers are concerned with censorship, they use regular
bitcoin clients (Armory, Electrum, Breadwallet, etc.)
• Both uses make sense in this scenario
• Bearer assets are incredibly risky, that's why there's a whole industry of custodians that
tie them to identity
What about fintech funding and investments?
VS: Bitcoin-related funding as of 2015/04
VS: Fintech funding overall as of 2015/04
According to Accenture: $9.89 billion in
fintech deals done in 2014 in the US
Where has that $800+ million gone so far?
• Buying and holding cryptocurrencies (BitPay,
several hosted wallets)
• Currency conversion (any mining-related
company)
• Turning the on-and-off ramps into
permissioned-based entries and exits
• A dozen other areas that are typical cost
centers for most startups
• Very little has been spent on actual
decentralized, permissionless interactions
(e.g., OB1)
Other cost centers for these BTC-focused startups
• Domain name(s)
• Legal fees (company formation)
• Office rent/lease/mortgage
• Utilities and internet access: particularly important for mining farms/pools
• Attending events
• Event sponsorships
• Marketing and advertising: user acquisition, lead generation, brand awareness
• Front-end design
• Advisory fees to banks
• Lobbying special interest groups / policy makers
• Acquiring board of Directors and Advisors
• Company outings and vacations
• Money transmitter licenses
• Insurance of virtual currencies that a company may hold in custody
• Acquiring and maintaining an inventory of cryptocurrencies
• Customer service and bug bounties: reimbursing customer for problems with R values/RNGs
• Denial of service (DOS) vandalism and extortion: commonly happens with mining pools
• Ransomware (FBI: $18 million last year via Cryptowall and others)
Conclusions
• Many of the science fair projects that passed themselves off as
cryptocurrency “startups” will likely burn out of capital leaving behind
IP, software libraries and skilled developers
• These libraries and IP, if there is any utility to them, will likely be
forked and integrated into existing institutions, organizations and
enterprises
• Similarly, some skilled developers may benefit from labor arbitrage
due to their knowledge and experience which other larger firms lack
• In the end, just as PGP, OTR messaging and FOSS stacks like LAMP
were inspired in part by cypherpunks but ended up being used by a
bevy of non-ideologically oriented organizations, so too will some of
the moving pieces that comprise primordial blockchains
Conclusions cont’d
• There is room for both permissionless and permissioned systems to
coexist and grow
• Bitcoin-related startups have and will continue to teach the overall
fintech industry what works and what doesn’t
• These two different network designs are both specialized to handle
certain different types of activity and consequently have different cost
structures to secure their respective validation processes
• What permissionless enthusiasts probably should be cautious of:
attempts to turn their network into a permissioned, gated system which
is what has slowly happened to Bitcoin over the past six-and-a-half years
– all of the costs of both worlds without the benefits of either
• tswanson@gmail.com
• Follow: @ofnumbers
• Visit: OfNumbers.com
Contact
Appendix
“Long-chains”
• Agent-based modeling
results using historical
data
• Blue – agents that join a
pool
• Black – non-miners
(though potential)
• Red – Solo miners
• In the end, agents using
pooled mining are the
last remaining
participants
At current usage rates, blocks will be
consistently filled in 18 months

More Related Content

What's hot

Blockchain and the investment industry stack
Blockchain and the investment industry stackBlockchain and the investment industry stack
Blockchain and the investment industry stackDavid Taylor
 
Blockchain Finance
Blockchain FinanceBlockchain Finance
Blockchain Financermsams
 
By the numbers: understanding value transfers to and from China
By the numbers: understanding value transfers to and from ChinaBy the numbers: understanding value transfers to and from China
By the numbers: understanding value transfers to and from ChinaTim Swanson
 
Introduction to blockchain & cryptocurrencies
Introduction to blockchain & cryptocurrenciesIntroduction to blockchain & cryptocurrencies
Introduction to blockchain & cryptocurrenciesAurobindo Nayak
 
Blockchains and Insurance: Opportunities and Challenges
Blockchains and Insurance: Opportunities and ChallengesBlockchains and Insurance: Opportunities and Challenges
Blockchains and Insurance: Opportunities and ChallengesChristopher Brewster
 
Cryptocurrencies: The Mechanics Economic and Finance
Cryptocurrencies: The Mechanics Economic and FinanceCryptocurrencies: The Mechanics Economic and Finance
Cryptocurrencies: The Mechanics Economic and FinanceErnie Teo
 
Dgw birch eris_presentation
Dgw birch eris_presentationDgw birch eris_presentation
Dgw birch eris_presentationPreston J. Byrne
 
FirstPartner 2016 Blockchain Ecosystem Market Map
FirstPartner 2016 Blockchain Ecosystem Market MapFirstPartner 2016 Blockchain Ecosystem Market Map
FirstPartner 2016 Blockchain Ecosystem Market MapRichard Warren
 
Case Studies of Blockchain Technology | Blockchain Developments USA
Case Studies of Blockchain Technology | Blockchain Developments USACase Studies of Blockchain Technology | Blockchain Developments USA
Case Studies of Blockchain Technology | Blockchain Developments USABlockchain Developments
 
Why distributed ledgers
Why distributed ledgersWhy distributed ledgers
Why distributed ledgersChris Skinner
 
Blockchain, Finance & Regulatory Development
Blockchain, Finance & Regulatory DevelopmentBlockchain, Finance & Regulatory Development
Blockchain, Finance & Regulatory DevelopmentAlex Makosz
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalDavid Lee Kuo Chuen 李国权
 
Moving Beyond BINO Beta
Moving Beyond BINO BetaMoving Beyond BINO Beta
Moving Beyond BINO BetaTim Swanson
 
Blockchain in Trade Finance
Blockchain in Trade FinanceBlockchain in Trade Finance
Blockchain in Trade FinanceAurobindo Nayak
 
Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralization
Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of DecentralizationCryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralization
Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of DecentralizationRaffaele Mauro
 
Cybernetic Economy Report 2015
Cybernetic Economy Report 2015Cybernetic Economy Report 2015
Cybernetic Economy Report 2015cyber•Fund
 
Blockchain use cases
Blockchain use casesBlockchain use cases
Blockchain use casesManav Gupta
 
Blockchain - A New Disruptive Technology
Blockchain - A New Disruptive TechnologyBlockchain - A New Disruptive Technology
Blockchain - A New Disruptive TechnologyRenita M. Rhodes
 
Blockchain case study powerpoints: Brief intro
Blockchain case study powerpoints: Brief introBlockchain case study powerpoints: Brief intro
Blockchain case study powerpoints: Brief introShane Ninai
 

What's hot (20)

Blockchain and the investment industry stack
Blockchain and the investment industry stackBlockchain and the investment industry stack
Blockchain and the investment industry stack
 
Blockchain Finance
Blockchain FinanceBlockchain Finance
Blockchain Finance
 
By the numbers: understanding value transfers to and from China
By the numbers: understanding value transfers to and from ChinaBy the numbers: understanding value transfers to and from China
By the numbers: understanding value transfers to and from China
 
Introduction to blockchain & cryptocurrencies
Introduction to blockchain & cryptocurrenciesIntroduction to blockchain & cryptocurrencies
Introduction to blockchain & cryptocurrencies
 
Blockchains and Insurance: Opportunities and Challenges
Blockchains and Insurance: Opportunities and ChallengesBlockchains and Insurance: Opportunities and Challenges
Blockchains and Insurance: Opportunities and Challenges
 
Cryptocurrencies: The Mechanics Economic and Finance
Cryptocurrencies: The Mechanics Economic and FinanceCryptocurrencies: The Mechanics Economic and Finance
Cryptocurrencies: The Mechanics Economic and Finance
 
Dgw birch eris_presentation
Dgw birch eris_presentationDgw birch eris_presentation
Dgw birch eris_presentation
 
FirstPartner 2016 Blockchain Ecosystem Market Map
FirstPartner 2016 Blockchain Ecosystem Market MapFirstPartner 2016 Blockchain Ecosystem Market Map
FirstPartner 2016 Blockchain Ecosystem Market Map
 
Case Studies of Blockchain Technology | Blockchain Developments USA
Case Studies of Blockchain Technology | Blockchain Developments USACase Studies of Blockchain Technology | Blockchain Developments USA
Case Studies of Blockchain Technology | Blockchain Developments USA
 
Why distributed ledgers
Why distributed ledgersWhy distributed ledgers
Why distributed ledgers
 
Blockchain, Finance & Regulatory Development
Blockchain, Finance & Regulatory DevelopmentBlockchain, Finance & Regulatory Development
Blockchain, Finance & Regulatory Development
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_Final
 
Moving Beyond BINO Beta
Moving Beyond BINO BetaMoving Beyond BINO Beta
Moving Beyond BINO Beta
 
Blockchain Assignment
Blockchain AssignmentBlockchain Assignment
Blockchain Assignment
 
Blockchain in Trade Finance
Blockchain in Trade FinanceBlockchain in Trade Finance
Blockchain in Trade Finance
 
Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralization
Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of DecentralizationCryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralization
Cryptocurrencies, Blockchain & Smart Contracts: The New Wave of Decentralization
 
Cybernetic Economy Report 2015
Cybernetic Economy Report 2015Cybernetic Economy Report 2015
Cybernetic Economy Report 2015
 
Blockchain use cases
Blockchain use casesBlockchain use cases
Blockchain use cases
 
Blockchain - A New Disruptive Technology
Blockchain - A New Disruptive TechnologyBlockchain - A New Disruptive Technology
Blockchain - A New Disruptive Technology
 
Blockchain case study powerpoints: Brief intro
Blockchain case study powerpoints: Brief introBlockchain case study powerpoints: Brief intro
Blockchain case study powerpoints: Brief intro
 

Similar to Buckets of Permissioned, Permissionless, and Permissioned Permissionlessness Ledgers

Blockchain in Healthcare
Blockchain in Healthcare Blockchain in Healthcare
Blockchain in Healthcare Alex Tsado
 
How to raise $100M for your healthcare startup via ICO: Breaking the myths of...
How to raise $100M for your healthcare startup via ICO: Breaking the myths of...How to raise $100M for your healthcare startup via ICO: Breaking the myths of...
How to raise $100M for your healthcare startup via ICO: Breaking the myths of...VSee
 
NYS Forum - Blockchain
NYS Forum - BlockchainNYS Forum - Blockchain
NYS Forum - BlockchainJoel Binn
 
Blockchain Introduction - Canada Nov 2017.pptx
Blockchain Introduction - Canada Nov 2017.pptxBlockchain Introduction - Canada Nov 2017.pptx
Blockchain Introduction - Canada Nov 2017.pptxAntony Welfare
 
Demystifying blockchain
Demystifying blockchainDemystifying blockchain
Demystifying blockchainAjay Bhadauria
 
Musings from: The Real Business of Blockchain
Musings from: The Real Business of BlockchainMusings from: The Real Business of Blockchain
Musings from: The Real Business of BlockchainJames Cracknell
 
Blockchain technology in financial institutions
Blockchain technology in financial institutionsBlockchain technology in financial institutions
Blockchain technology in financial institutionsCegeka
 
An Introduction to Blockchain for Finance Professionals
An Introduction to Blockchain for Finance ProfessionalsAn Introduction to Blockchain for Finance Professionals
An Introduction to Blockchain for Finance ProfessionalsSrinath Perera
 
Blockchain & Islamic Finance
Blockchain & Islamic FinanceBlockchain & Islamic Finance
Blockchain & Islamic FinanceFarrukh Habib
 
DCG Digital Currency Infrastructure Workshop Oct 2017
DCG Digital Currency Infrastructure Workshop Oct 2017DCG Digital Currency Infrastructure Workshop Oct 2017
DCG Digital Currency Infrastructure Workshop Oct 2017Digital Currency Group
 
Intro To Blockchain For YU Fintech Hackathon 2019
Intro To Blockchain For YU Fintech Hackathon 2019Intro To Blockchain For YU Fintech Hackathon 2019
Intro To Blockchain For YU Fintech Hackathon 2019Menajem Benchimol
 
Innovation potential of the blockchain, and of decentralized applications
Innovation potential of the blockchain, and of decentralized applicationsInnovation potential of the blockchain, and of decentralized applications
Innovation potential of the blockchain, and of decentralized applicationsJan Brejcha
 
Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Floyd DCosta
 
The Future of Fintech: Crystal balls and tasseography
The Future of Fintech: Crystal balls and tasseographyThe Future of Fintech: Crystal balls and tasseography
The Future of Fintech: Crystal balls and tasseographyTim Swanson
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018🔗Audrey Chaing
 
Business Opportunities in Fintech and Blockchain
Business Opportunities in Fintech and BlockchainBusiness Opportunities in Fintech and Blockchain
Business Opportunities in Fintech and BlockchainSaeed Al Dhaheri
 
Centigo presents Blockchain Explored (public version)
Centigo presents Blockchain Explored (public version)Centigo presents Blockchain Explored (public version)
Centigo presents Blockchain Explored (public version)Centigo
 

Similar to Buckets of Permissioned, Permissionless, and Permissioned Permissionlessness Ledgers (20)

Blockchain in Healthcare
Blockchain in Healthcare Blockchain in Healthcare
Blockchain in Healthcare
 
How to raise $100M for your healthcare startup via ICO: Breaking the myths of...
How to raise $100M for your healthcare startup via ICO: Breaking the myths of...How to raise $100M for your healthcare startup via ICO: Breaking the myths of...
How to raise $100M for your healthcare startup via ICO: Breaking the myths of...
 
Blockchain
Blockchain Blockchain
Blockchain
 
NYS Forum - Blockchain
NYS Forum - BlockchainNYS Forum - Blockchain
NYS Forum - Blockchain
 
Blockchain Introduction - Canada Nov 2017.pptx
Blockchain Introduction - Canada Nov 2017.pptxBlockchain Introduction - Canada Nov 2017.pptx
Blockchain Introduction - Canada Nov 2017.pptx
 
Demystifying blockchain
Demystifying blockchainDemystifying blockchain
Demystifying blockchain
 
Musings from: The Real Business of Blockchain
Musings from: The Real Business of BlockchainMusings from: The Real Business of Blockchain
Musings from: The Real Business of Blockchain
 
Blockchain technology in financial institutions
Blockchain technology in financial institutionsBlockchain technology in financial institutions
Blockchain technology in financial institutions
 
An Introduction to Blockchain for Finance Professionals
An Introduction to Blockchain for Finance ProfessionalsAn Introduction to Blockchain for Finance Professionals
An Introduction to Blockchain for Finance Professionals
 
Blockchain & Islamic Finance
Blockchain & Islamic FinanceBlockchain & Islamic Finance
Blockchain & Islamic Finance
 
Block chain A Paradigm Shift
Block chain A Paradigm ShiftBlock chain A Paradigm Shift
Block chain A Paradigm Shift
 
DCG Digital Currency Infrastructure Workshop Oct 2017
DCG Digital Currency Infrastructure Workshop Oct 2017DCG Digital Currency Infrastructure Workshop Oct 2017
DCG Digital Currency Infrastructure Workshop Oct 2017
 
Intro To Blockchain For YU Fintech Hackathon 2019
Intro To Blockchain For YU Fintech Hackathon 2019Intro To Blockchain For YU Fintech Hackathon 2019
Intro To Blockchain For YU Fintech Hackathon 2019
 
Innovation potential of the blockchain, and of decentralized applications
Innovation potential of the blockchain, and of decentralized applicationsInnovation potential of the blockchain, and of decentralized applications
Innovation potential of the blockchain, and of decentralized applications
 
Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking
 
The Future of Fintech: Crystal balls and tasseography
The Future of Fintech: Crystal balls and tasseographyThe Future of Fintech: Crystal balls and tasseography
The Future of Fintech: Crystal balls and tasseography
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
 
Alpaca NFT Field Study
Alpaca NFT Field StudyAlpaca NFT Field Study
Alpaca NFT Field Study
 
Business Opportunities in Fintech and Blockchain
Business Opportunities in Fintech and BlockchainBusiness Opportunities in Fintech and Blockchain
Business Opportunities in Fintech and Blockchain
 
Centigo presents Blockchain Explored (public version)
Centigo presents Blockchain Explored (public version)Centigo presents Blockchain Explored (public version)
Centigo presents Blockchain Explored (public version)
 

More from Tim Swanson

The Fed and FDIC bailed out “crypto friendly” banks.pptx
The Fed and FDIC bailed out “crypto friendly” banks.pptxThe Fed and FDIC bailed out “crypto friendly” banks.pptx
The Fed and FDIC bailed out “crypto friendly” banks.pptxTim Swanson
 
8 areas for PMF and IMF with blockchains_.pptx
8 areas for PMF and IMF with blockchains_.pptx8 areas for PMF and IMF with blockchains_.pptx
8 areas for PMF and IMF with blockchains_.pptxTim Swanson
 
The Nuances of Tokenization: A brief explanation on attempts from this past d...
The Nuances of Tokenization: A brief explanation on attempts from this past d...The Nuances of Tokenization: A brief explanation on attempts from this past d...
The Nuances of Tokenization: A brief explanation on attempts from this past d...Tim Swanson
 
Collateral-backed stablecoin landscape
Collateral-backed stablecoin landscapeCollateral-backed stablecoin landscape
Collateral-backed stablecoin landscapeTim Swanson
 
DeFi's dependency on the U.S. banking system
DeFi's dependency on the U.S. banking systemDeFi's dependency on the U.S. banking system
DeFi's dependency on the U.S. banking systemTim Swanson
 
Exchange-related chains such as BSC
Exchange-related chains such as BSCExchange-related chains such as BSC
Exchange-related chains such as BSCTim Swanson
 
Regtech in the era of intermediaries
Regtech in the era of intermediariesRegtech in the era of intermediaries
Regtech in the era of intermediariesTim Swanson
 
B-words and financial market infrastructures
B-words and financial market infrastructuresB-words and financial market infrastructures
B-words and financial market infrastructuresTim Swanson
 
Color around Dead Token Litigation
Color around Dead Token LitigationColor around Dead Token Litigation
Color around Dead Token LitigationTim Swanson
 
Clouds and Chains
Clouds and ChainsClouds and Chains
Clouds and ChainsTim Swanson
 
Distributed Ledger Technology as Financial Market Infrastructure
Distributed Ledger Technology as Financial Market InfrastructureDistributed Ledger Technology as Financial Market Infrastructure
Distributed Ledger Technology as Financial Market InfrastructureTim Swanson
 
The tech landscape surrounding distributed ledgers
The tech landscape surrounding distributed ledgersThe tech landscape surrounding distributed ledgers
The tech landscape surrounding distributed ledgersTim Swanson
 
Defining Smart Contracts
Defining Smart ContractsDefining Smart Contracts
Defining Smart ContractsTim Swanson
 
Brief overview of cryptoeconomics
Brief overview of cryptoeconomicsBrief overview of cryptoeconomics
Brief overview of cryptoeconomicsTim Swanson
 
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experiment
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experimentMaking Lemonade out of Lemons: Squeezing utility from a proof-of-work experiment
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experimentTim Swanson
 
The Continued Existence of Altcoins, Appcoins and Commodity coins
The Continued Existence of Altcoins, Appcoins and Commodity coinsThe Continued Existence of Altcoins, Appcoins and Commodity coins
The Continued Existence of Altcoins, Appcoins and Commodity coinsTim Swanson
 
Sidechains and Bitcoin security
Sidechains and Bitcoin securitySidechains and Bitcoin security
Sidechains and Bitcoin securityTim Swanson
 
Primer to smart contracts, smart property, trustless asset management
Primer to smart contracts, smart property, trustless asset managementPrimer to smart contracts, smart property, trustless asset management
Primer to smart contracts, smart property, trustless asset managementTim Swanson
 

More from Tim Swanson (19)

The Fed and FDIC bailed out “crypto friendly” banks.pptx
The Fed and FDIC bailed out “crypto friendly” banks.pptxThe Fed and FDIC bailed out “crypto friendly” banks.pptx
The Fed and FDIC bailed out “crypto friendly” banks.pptx
 
8 areas for PMF and IMF with blockchains_.pptx
8 areas for PMF and IMF with blockchains_.pptx8 areas for PMF and IMF with blockchains_.pptx
8 areas for PMF and IMF with blockchains_.pptx
 
The Nuances of Tokenization: A brief explanation on attempts from this past d...
The Nuances of Tokenization: A brief explanation on attempts from this past d...The Nuances of Tokenization: A brief explanation on attempts from this past d...
The Nuances of Tokenization: A brief explanation on attempts from this past d...
 
Collateral-backed stablecoin landscape
Collateral-backed stablecoin landscapeCollateral-backed stablecoin landscape
Collateral-backed stablecoin landscape
 
DeFi's dependency on the U.S. banking system
DeFi's dependency on the U.S. banking systemDeFi's dependency on the U.S. banking system
DeFi's dependency on the U.S. banking system
 
Exchange-related chains such as BSC
Exchange-related chains such as BSCExchange-related chains such as BSC
Exchange-related chains such as BSC
 
Regtech in the era of intermediaries
Regtech in the era of intermediariesRegtech in the era of intermediaries
Regtech in the era of intermediaries
 
B-words and financial market infrastructures
B-words and financial market infrastructuresB-words and financial market infrastructures
B-words and financial market infrastructures
 
Color around Dead Token Litigation
Color around Dead Token LitigationColor around Dead Token Litigation
Color around Dead Token Litigation
 
Blockchain 2040
Blockchain 2040Blockchain 2040
Blockchain 2040
 
Clouds and Chains
Clouds and ChainsClouds and Chains
Clouds and Chains
 
Distributed Ledger Technology as Financial Market Infrastructure
Distributed Ledger Technology as Financial Market InfrastructureDistributed Ledger Technology as Financial Market Infrastructure
Distributed Ledger Technology as Financial Market Infrastructure
 
The tech landscape surrounding distributed ledgers
The tech landscape surrounding distributed ledgersThe tech landscape surrounding distributed ledgers
The tech landscape surrounding distributed ledgers
 
Defining Smart Contracts
Defining Smart ContractsDefining Smart Contracts
Defining Smart Contracts
 
Brief overview of cryptoeconomics
Brief overview of cryptoeconomicsBrief overview of cryptoeconomics
Brief overview of cryptoeconomics
 
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experiment
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experimentMaking Lemonade out of Lemons: Squeezing utility from a proof-of-work experiment
Making Lemonade out of Lemons: Squeezing utility from a proof-of-work experiment
 
The Continued Existence of Altcoins, Appcoins and Commodity coins
The Continued Existence of Altcoins, Appcoins and Commodity coinsThe Continued Existence of Altcoins, Appcoins and Commodity coins
The Continued Existence of Altcoins, Appcoins and Commodity coins
 
Sidechains and Bitcoin security
Sidechains and Bitcoin securitySidechains and Bitcoin security
Sidechains and Bitcoin security
 
Primer to smart contracts, smart property, trustless asset management
Primer to smart contracts, smart property, trustless asset managementPrimer to smart contracts, smart property, trustless asset management
Primer to smart contracts, smart property, trustless asset management
 

Recently uploaded

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 

Recently uploaded (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 

Buckets of Permissioned, Permissionless, and Permissioned Permissionlessness Ledgers

  • 1. Buckets of Permissioned, Permissionless, and Permissioned Permissionlessness Ledgers Who is developing shared, replicated ledgers and why
  • 2. Brief outline • Characteristics of a distributed ledger • Motivations for building non-proof-of-work ledgers / private blockchains • Known, trusted parties versus unknown, untrusted parties • Unclear governance • Scalability challenges • Disproportional rewards from metacoins • Where has VC funding gone? • Opportunities for professional service firms
  • 3.
  • 4. Questions to consider this session • What are the design assumptions and goals for using new technology? • What are the client business requirements? • Are entities and actors on the network known or unknown, trusted or untrusted? • Who is allowed or not allowed to validate transactions? • e.g., mintettes as defined by Laurie (2011) and Meiklejohn (2015) • Are the validators spread around globally? • Is communication between them synchronous or asynchronous? • Are faults tolerated? How are Byzantine faults handled? • What type of consensus is needed? Or none at all?
  • 5. Why distributed ledgers? • There are many reasons for why companies, institutions and organizations are interested in shared, replicated ledgers and disinterested in existing networks or systems. • What do financial institutions want? • Cryptographically verifiable settlement and clearing systems that are globally distributed for resiliency and compliant with various reporting requirements. And the governance / versioning changes of both the network and software is clear and explicit. • What don’t certain organizations always need? • Censorship resistance-as-a-service and artificially expensive anti-Sybil mechanisms.
  • 6. What is a “block chain” anyways? • Neither the term “block chain” nor “blockchain” were used in the original Satoshi whitepaper • Many projects, both permissioned and permissionless, use the following tech pieces: • Public key cryptography • Cryptographic signatures • Cryptographic hash functions • Hash tree • Cryptographic time-stamps • Resilient peer-to-peer networks
  • 7. What cont’d • Some projects (both permissioned and permissionless) use a type of consensus algorithm that works by using blocks of transactions organized in a chain • Permissionless ledgers attempt to do so via pseudonymous/anonymous consensus (validation); permissioned via known/trusted validators • Some permissioned ledgers do not chain blocks as there are no blocks at all (such as Hyperledger) • Fun fact: Hyperledger was originally called “Mintet.com” named after Ben Laurie’s term (mintettes) coined in 2011 • Some permissioned ledgers are explicitly “decentralized” not “distributed” as the pieces of the ledger are not actually distributed but instead wholly replicated
  • 8. “Who defines a term? The community, the creator, the market? The market knows 'blockchain' as a catch-all term and that's how language evolves, by common usage.” - Dan O’Prey, co-founder of Hyperledger (now part of DA)
  • 11. What comprises a permissioned blockchain?
  • 13. What are the characteristics of a distributed ledger?
  • 15.
  • 16. Permissioned distributed ledgers / blockchains • Blockstack (formerly CryptoCorp) • Ldger (formerly Tillit) • Clearmatics • Hyperledger (acquired by DAH) • Eris Industries • Tezos • Tembusu (TRUST) • DAH • Guardtime (KSI) • PeerNova • SKUChain* (PurchaseChain/PPOW) • MultiChain* (Coin Sciences) • Ripple* (discontinued Codius) • Stellar* (potentially with their new SCP) • Traditional tech enterprises as well (e.g., IBM)
  • 17. Each is targeting different use-cases • Syndicated loans • Trade finance • Supply chain provenance • US Treasury repo • Clearing / settling OTC derivatives and FX • Cross-border payments • Identity / data authentication • Private stock / equity issuance • Commonality: participants in these networks – including the validators themselves – are known (via KYC or KYB) and have legal or contractual obligations with other participants
  • 18. What attracts or repels use-cases? • Folk law: “Anything that needs censorship-resistance will gravitate towards censorship-resistant systems.” • Sams' law: “Anything that doesn't need censorship-resistance will gravitate towards non censorship-resistant systems.” • Banks are currently focused on: fulfilling compliance requirements, reducing cost (centers), downscaling branching and implementing digital channels. None of this requires censorship-resistance.
  • 19. What cont’d • In conversations with decision makers at financial institutions, three common questions that have arisen regarding potentially using a public chain: • What happens if you pay a fee to a Bitcoin or Litecoin miner/mining pool in a sanctioned country (e.g., EBA concerns in July 2014)? • In February 2015 according to Free Beacon, Coinbase was on “the hot seat” for explicitly highlighting this use-case in an older pitch deck • “Immune to country-specific sanctions (e.g. Russia-Visa)” • What if the Bitcoin or Litecoin miner that processes transactions for financial institutions (e.g., watermarked tokens) also processes transactions for illicit goods and services from dark net markets? Any liability? • How to identify and contact the miner/mining pool in the event something happens (e.g., slow confirmation time, accidentally sent the wrong instruction, double-spend attempt, etc.)? • Need to be able to influence upgrades, maintenance, uptime (i.e., typical vendor relationship)
  • 20. What is one opportunity for professional service firms that build core banking infrastructure?
  • 21. Finding ways to reduce cost centers for financial institutions • According to Deutsche Bank in 2012: • “Measured as a percentage of revenues, financial services firms spend more on IT than any other industry. Banks’ IT costs equal 7.3% of their revenue’s, compared to an average of 3.7% across all other industries surveyed” • According to a 2015 report from Celent: • “Total bank IT spending across North America, Europe, and Asia-Pacific will grow to US$196.7 billion in 2015, an increase of approximately 4.6% over 2014.” • According to a 2015 report from Oliver Wyman / Santander: • “[D]istributed ledger technology could reduce banks’ infrastructure costs attributable to cross-border payments, securities trading and regulatory compliance by between $15-20 billion per annum by 2022”
  • 22. What are opportunities for Finacle? “Finacle relies on a system of traditional accounting ledgers to serve as core banking systems. If they want to jump into the next field of vision around innovating back end banking system then it is an urgent imperative they understand and lead the effort to understand this technology. Capital markets, traditional lending, trade finance, loan sales and syndication, asset-backed finance, to loan processing and servicing using singular back end systems for the whole of processing will see its full sunset in 10-15 years utilizing Blockchain and ledger technology. It could effectively put them out of business. The other advantage by utilizing Blockchain ledger technologies is that allows Finacle a significant competitive advantage in that it allows Finacle bank customer implementations to examine and offer new digital wallet based solutions for its retail base. It also allows for partnership opportunities with companies in the "Internet of Things" space to help revolutionize supply chain finance, letters of credit, factoring, export import finance and bankers acceptance business to one of vitality to match the third world’s smaller companies thirst to operate on scale resulting from the ledgers ability to enable a synchronous just-in-time financing model matched to their often challenged logistics operations and documentation to meet complicated and ever competitive global customer demand for hard to get goods and supply.” - Raja Ramachandran, founder of eFXPath and R3 advisor
  • 23. Importance of data integrity for Finacle “Once every generation we reach a point in which hardware capabilities evolve to make practical, things that were previously unthinkable. When that happens the challenge is to recognise these new possibilities, and to see that they can fundamentally change the way we think about the world. New models of computation arise that redefine the way in which ever-more complex systems can be constructed; they don't solve the problems of the previous generations so much as make them irrelevant. The last 25 years have seen a sea change in our lives, as first the Internet, and then mobile devices, have provided us with the mechanisms to access and share information. What's remarkable is that all this has been achieved with a model for computational information that has barely evolved in 70 years. Fundamentally we have to trust that the data we have, and the data held by everyone else that affects us, is correct. Our information seemingly floats through servers, routers and switches like driftwood in a stormy sea until it eventually reaches us. We have little or no hope of verifying its accuracy or veracity (*). This then is the opportunity now afforded by blockchain or other crypto-ledger technology. We can establish a new model for the way we manage our data, one that can make information integrity and trustworthiness checking the norm rather than a questionable afterthought. (*) You might ask how in the current informational world that you can be confident you're reading my original quote?” - Dave Hudson, VP of Software Development at Peernova
  • 24. What financial institutions are looking into distributed ledgers? • Based on public news releases, there are at least 17 different FIs independently looking at ways to use a blockchain / distributed ledger. Note: it bears mentioning that these are all pilot programs and does not necessarily mean any of the tech will ultimately be used. According to CoinGecko: • CBW Bank • ANZ • Westpac • Commonwealth Bank of Australia • BNY Mellon • LHV Bank • Barclays • UBS • Goldman Sachs • ABN Amro • ING • Rabobank • Santander • DBS • USAA • BBVA • Citibank
  • 25. What about proof-of-work-based permissionless networks? What comprises a permissionless blockchain?
  • 27.
  • 28. Distributed databases / key value / hash table • BigTable • Druid • Dynamo • HyperDex • Voldemort • HBase (Hadoop/Chubby) • Redis • Cassandra • MongoDB • CouchDB • MemCache • IPFS
  • 29. Check boxes • One common rejoinder in social media is that all organizations need is a simple database but… • Does anything currently in existence provide the necessary set of cryptographic features all in one system? • Currently, no. • For instance, financial institutions already operate in a environment where they send value between trusted/known participants (e.g., interbank ‘trust’ is not a core issue). In such a private network with 15 participants each sharing and replicating the ledger, participants cryptographically sign transactions (and/or blocks); thus ordering and timestamps verifiable by all 15 participants. • In the case of contracts, all code will be executed by all nodes and will be visible to participants based on granular permissions • (Git does not provide consensus, is a specialized Merkle tree, involves only a chain (no blocks) that provides signing, history and distribution. Forking results in new repo.)
  • 30. Blockchain does not mean Bitcoin • Many VCs, reporters and Bitcoin entrepreneurs are ‘talking their book’ and ‘revising history’ when they euphemistically equate a blockchain solely with Bitcoin • Nakamoto-style consensus is just one way to “skin a consensus cat” • Over 30 years of academic research on Merkle trees, hash tables and arriving at consensus in distributed computing • Technology is iterative and Bitcoin may just remain a proof-of-concept due to its limitations and primary focus on being censorship-resistant above all else
  • 31. Needing a token is likely a red herring • Energy conversion (mining) may only be a requisite if validators are unknown and untrusted; staking and surety bonds may be an alternative too for a public network • There are other methods of securely validating transactions based on different design goals and assumptions that do not involve burning coal in China or running a consumer device-based Tom Sawyer botnet • In general, why don’t permissioned shared, replicated ledgers necessarily need a token? • Because they incentivize security through legally binding contracts with validators whom have real-world identities and reputations • Validation on proof-of-work networks involves actors who are – in the design model – not contractually obligated to fulfill a terms of service (using the network is caveat emptor); the marginal costs on a public network are higher and thus the compensation model has to be different
  • 32. Why not (re)use one communal chain for everything?
  • 33. Trying to turn a communal chain into a “one- size fits all” buffet is like using a clown car
  • 34. Because these are (economic) networks, not just software • For the same reason organizations use different types of airplanes, boats and automobiles – they have different needs and business requirements. • Blockchain size is an ongoing challenge to the “one-size fits all approach” that will be discussed later below. Impacts other chains too: Ethereum testnet is already at 30 GB, Bitcoin mainnet is 36 GB. • And because as more value is added to a public blockchain, the more incentives there are to attack it without going through the fan fiction Maginot Line narrative (brute force by hashrate). • Because of increased block maker centralization it is much easier to use other techniques (rubber hose cryptanalysis, denial-of-service) to disrupt participation • Blatant bribery / hacking of pool • ‘An attacker can sniff the cleartext credentials in the “mining.authorize” message, credentials may be used elsewhere across the internet and may lead to account compromise’ • Canadian router hacked via Border Gateway Protocol fooling miners ($84,000 stolen)
  • 35. Block makers, by design, lack terms of service • In the event of a block reversal or censored transaction, there is no terms of service that mining pools (validators) must adhere to. • On April 25, 2015 a BitGo user, due to a software glitch, accidentally sent 85 BTC as a mining fee to AntPool (Bitmain’s pool operated in China) • To resolve this problem, the user spent several days publicly conversing with tech support (and the community) on Reddit. • Eventually the glitch was fixed and AntPool – to be viewed as a “good member of the community” yet defeating the purpose of a proof-of-work blockchain – sent the user back 85 BTC • “Who” do you call in the future? Why bother with pseudonymity?
  • 36. Unintended in 2009: knowing the pseudonoymous validators on an untrusted network? • Below is a list of the first time a pool publicly claimed a block: • Pool | Height 1: Slush 97838 2: bitcoinPool 110156 3: DeepBit 110322 4: Eligius 120630 5: BTC Guild 122608 And a list of the first time a pool signed a coinbase transaction: • Pool | Height 1: Eligius 130635 2: BitMinter 152246 3: BTC Guild 152700 4: Nmcbit.com 153343 5: YourBTC 154967 A little history: Slush began publicly operating at the end of November 2010. Eligius was announced on April 27, 2011. DeepBit publicly launched on February 26, 2011 and at one point was the most popular pool, reaching for a short period in July 2011, more than 50% of the network hashrate.
  • 38. Permissioned Permissionlessness, BINO-style • One innovation in Bitcoin was anonymous/pseudonymous consensus which comes with two large requirements: mining costs and block reorganization risk • Mining costs fluctuate in direct proportion to token value; more “energy efficient” proofs-of-work is a contradiction in terms • It was designed with anonymous consensus to resist censorship by trusted third parties • Today several startups and VC funds have (un)intentionally turned an expensive permissionless system into a hydra gated permissioned network without the full benefits of either • Also turned a bearer asset into a registered asset with full costs of both • Result: Bitcoin in name only (BINO)
  • 39. Permissioned Permissionlessness cont’d • If you are running a ledger between known parties who abide by government regulations, there is no reason to pay that censorship- resistance cost. Full stop. • The commercial logic of this (largely) VC-backed endgame seems to be: “privatize” Bitcoin through a dozen hard forks (the block size fork is the start of a trend) • Is it still Bitcoin if it is forked and privatized? It is BINO. • All of the costs of Sybil-protected permissionlessness without the benefits (e.g., speed, lower marginal costs) of actual permissioned
  • 40.
  • 41. Permissioned Permissionlessness cont’d • Nearly all of the startups creating hosted wallets (e.g., euphemism for a “depository institution”), exchanges and ‘universal’ require users to gain permission first before providing a service • Similarly “middleware” projects like Symbiont and Chain/NASDAQ appear to fit into the ‘permissioned permissionlessness’ bucket due to identification / key holding requirements • All told, more than half of all VC funding to date has gone into building permissioned systems on top of a permissionless network
  • 42. Raising funds for permissioned permissionlessness • Notable companies providing such ‘permissioned permissionlessness’ services include: • Chain: ($13.7 million) • Bitgo: ($14 million) • Coinbase: ($106 million) • Circle: ($76 million) • Xapo: ($40 million) • itBit: ($28.25 million) • Bitstamp: ($10 million) • Kraken: ($6.5 million) • OKCoin : ($11 million) • Mirror : ($12.8 million) • Bitreserve: ($14.6 million) • Coinplug: ($3.3 million)
  • 43. Three “sins” with trade-offs
  • 44. Sin of Commission (forgery of transaction) Sin of Omission (censorship of transaction) Sin of Deletion (reversal of transaction)
  • 45. Cryptocurrency systems prioritize mitigation of omission (censorship-resistance) over deletion (irreversibility) • In contrast, any system of off-chain property titles will have to prioritize deletion (irreversibility) over omission (censorship- resistance) • Consequently, existing legal systems will likely never recognize a system of property titles that can be reversed by anonymous or pseudonomyous validators (see EBA concerns)
  • 46. Future-proofing hard forks • Because technology and usage are not static, there needs to be a way to clearly upgrade and update both the software and network • The BIP process (“Bitcoin Improvement Proposals”) still largely depends on altruism and charity, neither of which is necessarily sustainable and as shown empirically, beholden to special interest groups and their stakeholders • Devolves into “fork by social media,” “fork by populism,” “fork by upvotes” • Other networks have learned from this situation: • Built around version control (e.g., Peernova) • Built-in, explicit governance: • Tezos is a self-amending chain • Ethereum is attempting to “bomb” the chain to switch to proof-of-stake at a later date • Ripple, Stellar and others have clearer governance due to explicit chain-of-command, terms of service, real-world reputations and contractual obligations. • Different set of challenges (e.g., identity / KYC management, trying to run this in a decentralized and secure way). • A financial network is different than an information network.
  • 47. “When it comes to long term survival, adaptability is more important than strength. Seeing distributed ledger as mere technology is shortsighted, they are first and foremost networks and, as such, their governance model is paramount to their success. A decentralized network that does not internalize its governance is condemned to stagnation or centralization.” - L.M. Goodman, creator of Tezos
  • 48. The right tool for the right job There are trade-offs of using different types of networks
  • 49. One short-term reason to hold hydrabinocoin • Some of the stated use-cases make it self-defeating to use Xapo (e.g., using a DNM) • But in the short-run, there are probably niche cases • Why pay for a censorship resistant network and not use the utility? • Because you are betting others will and you aren't personally concerned with censorship • Example: a large US hedge fund wants to hold BTC because it believes its use will grow on the Argentinian black market • The hedge fund isn't particularly concerned with censorship, but they have no expertise handling keys, so they use Xapo • The Argentinian black marketeers are concerned with censorship, they use regular bitcoin clients (Armory, Electrum, Breadwallet, etc.) • Both uses make sense in this scenario • Bearer assets are incredibly risky, that's why there's a whole industry of custodians that tie them to identity
  • 50. What about fintech funding and investments?
  • 52.
  • 53. VS: Fintech funding overall as of 2015/04
  • 54. According to Accenture: $9.89 billion in fintech deals done in 2014 in the US
  • 55. Where has that $800+ million gone so far? • Buying and holding cryptocurrencies (BitPay, several hosted wallets) • Currency conversion (any mining-related company) • Turning the on-and-off ramps into permissioned-based entries and exits • A dozen other areas that are typical cost centers for most startups • Very little has been spent on actual decentralized, permissionless interactions (e.g., OB1)
  • 56. Other cost centers for these BTC-focused startups • Domain name(s) • Legal fees (company formation) • Office rent/lease/mortgage • Utilities and internet access: particularly important for mining farms/pools • Attending events • Event sponsorships • Marketing and advertising: user acquisition, lead generation, brand awareness • Front-end design • Advisory fees to banks • Lobbying special interest groups / policy makers • Acquiring board of Directors and Advisors • Company outings and vacations • Money transmitter licenses • Insurance of virtual currencies that a company may hold in custody • Acquiring and maintaining an inventory of cryptocurrencies • Customer service and bug bounties: reimbursing customer for problems with R values/RNGs • Denial of service (DOS) vandalism and extortion: commonly happens with mining pools • Ransomware (FBI: $18 million last year via Cryptowall and others)
  • 57.
  • 58.
  • 59. Conclusions • Many of the science fair projects that passed themselves off as cryptocurrency “startups” will likely burn out of capital leaving behind IP, software libraries and skilled developers • These libraries and IP, if there is any utility to them, will likely be forked and integrated into existing institutions, organizations and enterprises • Similarly, some skilled developers may benefit from labor arbitrage due to their knowledge and experience which other larger firms lack • In the end, just as PGP, OTR messaging and FOSS stacks like LAMP were inspired in part by cypherpunks but ended up being used by a bevy of non-ideologically oriented organizations, so too will some of the moving pieces that comprise primordial blockchains
  • 60. Conclusions cont’d • There is room for both permissionless and permissioned systems to coexist and grow • Bitcoin-related startups have and will continue to teach the overall fintech industry what works and what doesn’t • These two different network designs are both specialized to handle certain different types of activity and consequently have different cost structures to secure their respective validation processes • What permissionless enthusiasts probably should be cautious of: attempts to turn their network into a permissioned, gated system which is what has slowly happened to Bitcoin over the past six-and-a-half years – all of the costs of both worlds without the benefits of either
  • 61. • tswanson@gmail.com • Follow: @ofnumbers • Visit: OfNumbers.com Contact
  • 63.
  • 64.
  • 65.
  • 67.
  • 68. • Agent-based modeling results using historical data • Blue – agents that join a pool • Black – non-miners (though potential) • Red – Solo miners • In the end, agents using pooled mining are the last remaining participants
  • 69. At current usage rates, blocks will be consistently filled in 18 months

Editor's Notes

  1. Image source: http://blog.willis.com/2012/09/five-bucket-erm/ This was first presented on July 20, 2015 at Infosys in Mysore, India with the Blockchain University team. It is a heavily modified version of a previous presentation covering the distributed ledger landscape presented on June 27, 2015 for Blockchain University hosted at Pricewaterhouse Coopers in San Francisco. I would like to thank Arthur Breitman, Richard Brown, Alexandre Callea, Pinar Emirdag, Andrew Geyl, Dave Hudson, Hyder Jaffrey, Yakov Kofner, Antony Lewis, Todd McDonald, Piotr Piasecki, Robert Sams and John Whelan for their feedback.
  2. Original images from Dilbert.com Derivatives: https://twitter.com/jgarzik/status/598864366272806913/photo/1 And: https://twitter.com/jackgavigan/status/584413841649491970
  3. Source: http://www.links.org/files/distributed-currency.pdf And: http://arxiv.org/pdf/1505.06895.pdf
  4. Original whitepaper: https://bitcoin.org/bitcoin.pdf Types of tech used by ledgers: http://www.gwern.net/Bitcoin%20is%20Worse%20is%20Better Dan O’Prey quote, correspondence July 13, 2015 Sourece on mintettes: http://www.links.org/files/distributed-currency.pdf
  5. Posted on July 14, 2015.
  6. Source: http://www.ofnumbers.com/wp-content/uploads/2015/04/Permissioned-distributed-ledgers.pdf
  7. Source: http://www.ofnumbers.com/wp-content/uploads/2015/04/Permissioned-distributed-ledgers.pdf
  8. Source: http://gendal.me/2015/06/08/towards-a-unified-model-for-replicated-shared-ledgers/
  9. In theory, Ripple and Stellar would meet the criteria for “permissionless.” In practice however, they currently whitelist and blacklist validators so it is technically permissioned as are the other projects on top of it (as there is no defined KYC/KYB procedure (yet) the process is de facto because a node is only listened to if other nodes trust it, the process requires a public identity). As one reviewer noted, Ripple and Stellar: “Are kind of a hybrid between permissioned and permissionless. In essence, they are both entirely open. Anyone can operate a node and submit transactions, although the validators are likely to be known entities. Every single wallet has the capacity to issue any asset they want into the network. But each wallet that is created comes with a set of configuration tools where the holders of its issued assets can be very tightly controlled OR not controlled at all. Nobody can stop anyone from using Ripple. Nobody. But banks will KYC all their users just like they do today.” As far as SKUChain goes, according to Zaki Manian, it’s co-founder: “While permissioned Proof of Work is adequate, permissioned byzantine agreement protocols are an enhancement and clearly necessary for running these systems at scale. We think that adopting a BGA protocol for a permissioned ledger is probably a premature optimization relative to figuring out how to make find applications for distributed ledger technologies and then creating ledgers that are sufficiently expressive to capture them.” Source on Codius: https://bitcoinmagazine.com/20985/ripple-discontinues-smart-contract-platform-codius-citing-small-market/ And: http://hyperledger.com/posts/2015-06-25-hyperledger-acquired-by-digital-asset-holdings.html MultiChain, see page 5: http://www.multichain.com/download/MultiChain-White-Paper.pdf
  10. Thanks to Yakov Kofner for his feedback on this slide.
  11. EBA source: EBA Opinion on ‘virtual currencies’ Coinbase source: http://freebeacon.com/national-security/bitcoin-exchange-highlights-to-investors-currencys-ability-to-evade-sanctions/ And: http://freebeacon.com/issues/coinbase-exec-resigns-as-company-faces-criticism/
  12. Santander report: http://santanderinnoventures.com/wp-content/uploads/2015/06/The-Fintech-2-0-Paper.pdf Deutsche Bank report: http://www.dbresearch.com/PROD/DBR_INTERNET_ENPROD/PROD0000000000299039.pdf Celente: http://www.celent.com/reports/it-spending-banking-global-perspective-2
  13. Personal correspondence: July 13, 2015
  14. Personal correspondence: July 14, 2015
  15. Source: https://www.coingecko.com/buzz/16-banks-experimenting-with-blockchain-technology
  16. Source: http://www.ofnumbers.com/wp-content/uploads/2015/04/Permissioned-distributed-ledgers.pdf
  17. Source: https://www.coingecko.com/en
  18. Source: http://www.slideshare.net/teste999/distributed-databases-overview-2722599 And: https://en.wikipedia.org/wiki/Distributed_data_store
  19. More comparisons between git and a “block chain” https://news.ycombinator.com/item?id=9436847 Other relevant comments from user ‘notreddingit’ https://www.reddit.com/r/Bitcoin/comments/3dtyvh/the_no_hands_syndrome/ct8s24q
  20. There may be a couple exceptions to having a token on a private blockchain / distributed ledger: spam mitigation and representation of a receipt.
  21. Source: http://www.ofnumbers.com/2015/06/05/needing-a-token-to-operate-a-distributed-ledger-is-a-red-herring/ Nakamoto was not trying to solve problems for financial institutions. In point of fact, Bitcoin was purposefully designed not to interface with trusted third parties. To enable part of this design, trade-offs were made. Maintaining a decentralization network with Sybil protection has a different cost structure than other less decentralized methods.
  22. Source: https://www.reddit.com/r/ethereum/comments/3avhav/testnet_already_at_30gb/
  23. Image source: http://www.caranddriver.com/features/the-physics-of-clown-cars-feature
  24. Source: http://www.ofnumbers.com/2015/06/05/needing-a-token-to-operate-a-distributed-ledger-is-a-red-herring/
  25. Source: http://www.ofnumbers.com/2015/04/26/what-has-been-the-reaction-to-permissioned-distributed-ledgers/
  26. Source: http://www.ofnumbers.com/wp-content/uploads/2015/04/Permissioned-distributed-ledgers.pdf
  27. Special thanks to Arthur Breitman for his insights on this slide.
  28. Thanks to Robert Sams for his “privatize” comment.
  29. Source: http://www.coindesk.com/state-of-bitcoin-q2-2015-price-gains-amid-euro-crisis/
  30. Source: http://www.coindesk.com/state-of-bitcoin-q2-2015-price-gains-amid-euro-crisis/
  31. Source: http://www.ofnumbers.com/wp-content/uploads/2015/04/Permissioned-distributed-ledgers.pdf
  32. One reviewer had an alternate view: “I'm not really sure which is the priority at the moment. Definitely all crypto systems are against Sin of Commission - you can't forge a transaciton unless you steal someone's key. I would personally see Deletion as harder than Omission, since once something gets into a ledger and has enough confirmations, it is pretty much impossible to reverse at the moment. Omission on the other hand is fairly straightforward for pool.” EBA source: EBA Opinion on ‘virtual currencies’
  33. One other challenge for DLT as shared infrastructure (pipes and storage), if goal is to avoid introducing a controlling central party again, how could governance (for directional drive, Service levels, change management, etc.)? Special thanks to Hyder Jaffrey and Alexandre Callea for their feedback.
  34. Personal correspondence, June 25, 2015
  35. Special thanks to Arthur Breitman for his feedback.
  36. Special thanks to Arthur Breitman for his insights on this slide.
  37. Source: http://insights.venturescanner.com/venture-scanner-sector-maps/
  38. From Todd McDonald, R3CEV, used with permission.
  39. Source: http://insights.venturescanner.com/venture-scanner-sector-maps/
  40. Source: https://newsroom.accenture.com/news/fintech-investment-in-us-nearly-tripled-in-2014-according-to-report-by-accenture-and-partnership-fund-for-new-york-city.htm
  41. Source: http://www.ofnumbers.com/2015/05/29/what-impact-have-various-investment-pools-had-on-bitcoinland/
  42. Source: http://www.ofnumbers.com/2015/05/29/what-impact-have-various-investment-pools-had-on-bitcoinland/ Ransomware: http://www.coindesk.com/fbi-bitcoin-ransom-attack-loss-18-million/
  43. Source: http://www.ofnumbers.com/2015/05/29/what-impact-have-various-investment-pools-had-on-bitcoinland/
  44. Source: http://www.ofnumbers.com/2015/04/22/the-flow-of-funds-on-the-bitcoin-network-in-2015/
  45. Empirically, Bitcoin has gravitated from permissionless to permissioned, yet without the benefit of either and the costs associated with both.
  46. I am a also a visiting research fellow at SKBI: http://skbi.smu.edu.sg/
  47. Source: http://p2sh.info/p2sh-volume#
  48. Source: http://www.blockscan.com/charts_transaction_all
  49. Source: https://www.coinbase.com/charts
  50. Source: http://organofcorti.blogspot.co.uk/ See also: http://www.ofnumbers.com/wp-content/uploads/2015/01/Slicing-data.pdf
  51. Source: http://www.ofnumbers.com/2015/04/22/the-flow-of-funds-on-the-bitcoin-network-in-2015/
  52. From Ernie Teo: Miners’ Incentives and the Decentralized Network
  53. Source: https://tradeblock.com/blog/bitcoin-network-capacity-analysis-part-2-macro-transaction-trends