29
Blockchain 101 You've heard all the buzz and hype, but you're still not sure what's the big deal with Bitcoin and blockchains? This one page has all the resources you need to get up to speed on the technology and begin to learn why it matters for policy and regulation. What's Bitcoin and the blockchain? Bitcoin is the world's first completely decentralized digital currency, also known as a cryptocurrency. Bitcoin introduced a technology called a blockchain, which is a peer-to-peer distributed ledger of timestamped transactions. Before the invention of Bitcoin, ledgers had to be maintained by central authorities like banks, which kept a single authoritative copy of the ledger. This meant that users that relied on a ledger had to trust the central authority. Bitcoin's use of a blockchain eliminates the need for central authorities and the need to trust them. It does this by allowing each user of the system to maintain their own copy of the ledger and keeping all copies of the ledger verifiably synchronized through a consensus algorithm. Bitcoin explained: https://www.youtube.com/watch?time_continue=35&v=s4g1XFU8Gto Bitcoin is designed to allow its users to hold, send, and receive money online, but distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity, and distributed computingall without the need for central intermediaries. The 10-minute video that follows presents plain English explanation of these concepts and why they have the potential to change the world. How Blockchain Could Change Everything: https://www.youtube.com/watch?v=maW_2QvAXzk

Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

Blockchain 101

You've heard all the buzz and hype, but you're still not sure what's the big deal with Bitcoin and

blockchains? This one page has all the resources you need to get up to speed on the technology

and begin to learn why it matters for policy and regulation.

What's Bitcoin and the blockchain?

Bitcoin is the world's first completely decentralized digital currency, also

known as a cryptocurrency. Bitcoin introduced a technology called a

blockchain, which is a peer-to-peer distributed ledger of timestamped

transactions.

Before the invention of Bitcoin, ledgers had to be maintained by central

authorities like banks, which kept a single authoritative copy of the

ledger. This meant that users that relied on a ledger had to trust the central authority.

Bitcoin's use of a blockchain eliminates the need for central authorities and the need to trust

them. It does this by allowing each user of the system to maintain their own copy of the ledger

and keeping all copies of the ledger verifiably synchronized through a consensus algorithm.

Bitcoin explained: https://www.youtube.com/watch?time_continue=35&v=s4g1XFU8Gto

Bitcoin is designed to allow its users to hold, send, and receive money online, but

distributed ledgers can be used to do much more, including clearing and settlement

of digital asset trading, provisining of identity, and distributed computing—all

without the need for central intermediaries. The 10-minute video that follows

presents plain English explanation of these concepts and why they have the

potential to change the world.

How Blockchain Could Change Everything:

https://www.youtube.com/watch?v=maW_2QvAXzk

Page 2: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

And this short plain-English backgrounder explains the basic concepts in simple to

understand terms.

SOME ADVANCED CONCEPTS

Now that you have the basics, you can delve a bit more in-depth into how the

technology works and what it can do. Below are links to short, plain-language

explainers covering some of the key concepts you'll need to know before you can

understand the policy implications. And BTW, we have many more plain-language

explainers on host of related concepts.

If you want to take a deep dive on the technology and what it means for the world,

we recommend a great book by two Wall Street Journal reporters, The Age of

Cryptocurrency: How Bitcoin and the Blockchain Are Challenging the Global

Economic Order by Paul Vigna & Michael J. Casey. And for an even deeper dive

into the distinction between open and closed blockchain technologies and why

open networks are essential for several exciting use cases, read our report, Open

Matters.

Page 3: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

HOW DOES POLICY AND REGULATION FIT IN?

Traditional ledgers have centralized ledger-keepers (like banks), so it's clear who

are the responsible and regulated parties. But because open and decentralized

blockchains like Bitcoin have no central operators (just like the internet itself),

figuring out who is regulated, if anyone, requires deeper analysis. And because

traditional concepts like "custody of funds" take on new meaning given

technologies like multi-sig, what the technology allows us to do has outpaced what

the law has anticipated, so new policy thinking is in order.

Here are two resources that we recommend to get you up to speed on the

technology and the policy questions it raises:

Is Bitcoin Regulated?

This short backgrounder explains that while the technology itself can't really

be regulated, its users are certainly subject to many different kinds of

regulation.

Page 4: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

Bitcoin: A Primer for Policymakers

This monograph by Jerry Brito & Andrea Castillo presents a high-level

overview of the technology and the regulations its use implicates.

WHAT ARE THE REGULATORY ISSUES?

The top areas of concern for regulators are:

Consumer protection

Financial surveillance and anti-money-laundering

Securities and commodities regulation

Tax compliance

Privacy and identity

Page 5: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

Coin Center has published dozens of plain-language explainers, research reports,

and regulatory and legislative frameworks addressing each of these and other

policy areas. To learn more about each of these specific issues, please visit an

overview of our work.

What is Bitcoin Mining, and

Why is it Necessary? A plain English explanation of Bitcoin mining. From “hash” to “chain” to

“nonce,” learn the terms and become comfortable with the fundamental

process that undergirds a cryptocurrency.

BY PETER VAN VALKENBURGH / December 15, 2014

Why does Bitcoin have “Miners?”

Gold has miners because people want gold and it just so happens, unfortunately,

that most gold is deep in the earth. Bitcoin has miners because people want

bitcoins, but something here seems silly: how did a bunch of bitcoins, the tokens

of a man made invention, end up locked up in circumstances demanding mining?

What’s the point of that?

Not the Best Name

The truth is, bitcoin “mining” is a misnomer. When gold is mined, nothing is

achieved beyond the discovery of new gold. When bitcoins are mined, however, a

valuable service is provided to the Bitcoin network: decentralized transaction

recordation and validation.

Page 6: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

Double Spending

Bitcoin relies on miners to record and validate transactions because of a particular

problem inherent in any system of digital currency: double spending. Double

spending is the high-tech incarnation of counterfeiting. Say, for example, that a

currency user, Alice, has a $5 note and she gives it to Bob. Can Bob be sure that

he’s received $5 rather than a forgery? In the physical world, probably. In the

digital world, probably not.

In the physical world, Alice would have to find paper, ink, and machines capable

of making a convincing duplicate of her $5. The cost of that activity, alongside

moral scruples and the threat of arrest, keeps counterfeiting in check.

In the digital world, however, a computer file version of a $5 note, like an MP3 file

or an MS Word document, can be copied perfectly at effectively no cost. There’s

no way to tell which file is the original, and the ease of copying means counterfeit

currency could rapidly overrun the economy.

To fix this, the inventors of Bitcoin designed a system of network interactions, a

protocol, that checks each putative Bitcoin transfer against a public ledger called

the blockchain. A crook can try and resend already spent bitcoins until they’re blue

in the face; if those transactions don’t check out, however, miners won’t record

them and the community ignores the attempt at fraud.

How Does Mining Work?

Listening for Transactions

Bitcoin miners connect to the Bitcoin network like telephone operators. Miners use

their computers to listen for transaction requests across the entire network and

assemble a list of valid transactions.

Page 7: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

Bitcoins are not sent and received like file attachments in an email. There are no

files at all, only assignments of bitcoins made to various public addresses. Each

public address has a matching private key and only the holder of that key is

capable of digitally signing a new transaction request. Additionally, the request

must have inputs. Inputs are the previous transactions that the sender is using to

fund the new transaction. If you previously received five bitcoins from Alice and

four from Bob, you can list these inputs to fund a new transaction to Cynthia of up

to nine bitcoins in value.

Miners check two things when they hear your request. First they check to make

sure that your digital signature proves that you were actually the recipient of those

inputs. Second, they check to make sure that you’ve not already spent those inputs.

To perform this second check, miners peak at a public database of all valid past

transactions, called the blockchain, to see if those inputs were already used in a

transaction or if they are still available. Copies of this blockchain are stored on the

computers of all Bitcoin users that connect to the network.

Thus, miners are playing the role of bank tellers: inspecting checks, making sure

all the appropriate signatures and account numbers are there, checking the

customer’s ID, and looking for proof that the customer has enough cash-on-hand to

fund the transaction.

Completing a “Block”

If everything checks out, the miner will add the transaction to their personal list of

all valid transactions over the last few minutes. Every few minutes, one miner will

be selected to add their personal list, a block, to the official blockchain, thus

keeping the public record up to date.

To prevent miner’s from fraudulently corrupting the blockchain, the Bitcoin

protocol makes miners compete. A different miner is empowered to write each

Page 8: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

block, roughly every 10 minutes, and only valid blocks will be accepted by the rest

of the mining community. Here’s how that works:

Guess and Check the “Nonce”

A miner’s block will become a part of the chain whenever a majority of the

community of miners agree (A) that the transactions listed by the miner are valid—

no signatures from impersonators and no double spending—and (B) that the miner

correctly guessed a special number, the nonce, that solves a particular math

problem. Miners perform this check by looking at the proposed block’s

particular digital signature. This signature is a computer generated product of

three inputs, (1) the signature of the predecessor block, (2) a list of valid

transactions since that predecessor, and (3) a particular random number, called a

nonce.

To understand it all, we need a bit more information about digital signatures.

Signatures operate by using “hash” functions. At their simplest, hash functions are

math equations that take any given input and create a seemingly random output

that will always correspond to that particular input.

The hash function used by Bitcoin is called SHA256. Using that function, the input

text:

“This is a hash!”

will always output this string of characters:

“dcc67309a9c5c4a6d5434de87dbd4162f745f32b2a6aedf89c89d31d863b022b”

You can try it yourself by visiting an online hash calculator; if you type in “This is

a hash!” without the quotes you’ll get the same specific string of numbers and

letters.

Page 9: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

If a hash function is well written, any change to the inputs will drastically change

the output string, and different inputs would never output the same string. By that

standard, SHA256 is very well written. For example, changing our input “This is a

hash!” even slightly results in entirely different outputs:

“This is a hash!” =

“dcc67309a9c5c4a6d5434de87dbd4162f745f32b2a6aedf89c89d31d863b022b”

“This is a hash?” =

“d43edbde4b15a97e780c1a9e1392b2c4601750fe03db543b3c4c44624d277641”

“This is a hash brown.” =

“5692e888b50c526f7eb95342a6fd56760b2ff95a766414562daa4083bab8bcfc”

Therefore, if the inputs for a new block’s signature are the signature of the

predecessor block and a list of recent transactions, the output will be a unique

string that could only have been made from that exact data. Because it is the

unique product of those inputs, that signature can be used to prove that the

transactions therein described happened in a given order: within the current block

or some previous block. Try and change the order by making up phony past blocks

and the signature will no longer match. This allows the particular beneficiary of a

transfer to prove that they were the first to receive the coins; any subsequent

double spending of those coins is fraud.

All miners, however, are capable of writing a signature composed of the previous

block’s signature and the new transaction list very quickly using their powerful

computers. How do we pick a winner at regular intervals to make them compete?

The solution is to ask for a string that will be difficult to generate quickly,

a specific sort of output string, one that starts with a certain number of zeros, like

this:

“0000000000000xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx”

Page 10: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

That long line of zeros at the start of the hash is statistically improbable, like

flipping a coin and getting heads thirteen times in a row. Nonetheless, there is a

particular combination of inputs that will result in a hash output that starts with all

those zeros. The combination will involve a particular random number called the

“nonce” that miners will have to guess.

The miners repeatedly hash their two known inputs (the previous block signature

and the list of new transactions), along with guesses at the random nonce.

Eventually, one miner will happen upon a nonce that will give them a signature

with the requested number of zeros at the start.

Miners that use more powerful computers can make guesses faster, and, like

buying more lottery tickets, these miners will be more likely to win the race to find

a particular hash. This is why miners can compete with each other by investing in

more powerful computers. More tries at the hash equals more blocks written to the

blockchain over time. To prevent blocks from being written too quickly or too

slowly as more or less computing power is used by miners, the protocol is adjusted

every two weeks to demand a longer, harder to guess, or shorter, easier to guess,

string of zeros at the front of the hash. The target for those adjustments is

generation of a new block every ten minutes.

Whenever a miner solves a block by writing a signature with enough zeros, they

broadcast it and the other miners validate the solution and check to make sure that

the transactions listed are all valid. If it all checks out, miners will begin competing

to solve a new block using the last block’s signature as an input.

Rewards

That brings us, at last, to the question of why miners mine. This answer is actually

simple, miners mine because the writer of a new block in the blockchain has

permission from the protocol to give herself a reward of brand new bitcoins, called

a coinbase transaction. That reward started at 50 bitcoins per block. Every four

Page 11: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

years the protocol is adjusted, reducing the reward by half. One day the reward will

be very small, but miners can also be rewarded by collecting fees volunteered by

users that request transactions.

Summary

We’ve discussed why mining is necessary: to stop double spending by creating a

ledger of all transactions, the blockchain. We’ve also learned, in simplified terms,

how mining actually works. In future, we’ll discuss what happens when miners

collaborate to mine blocks, forming mining pools, and discuss the cryptography

involved more thoroughly.

Peter Van Valkenburgh is Director of Research at Coin Center.

What is Multi-Sig, and What Can It

Do?

Multi-sig holds enormous potential: trustless escrow, trustless margin, and robust security for

consumers, businesses, and anyone who holds or wants to hold bitcoins.

BY BEN DAVENPORT / January 1, 2015

Introduction

Bitcoin is stored in “addresses” which are based on public/private ECDSA key

pairs. For most of Bitcoin’s history, each address was based on a single private

key. Even at the time of writing (November 2014), 97% of Bitcoin is stored using

single-key addresses. These addresses (aka “standard addresses”), can be

recognized by the fact that they always start with a “1.” Anyone who knows the

one private key corresponding to a given single-key Bitcoin address can move

those funds — period. It’s often said that possession is nine-tenths of the law, but

with Bitcoin, possession of the private key is the law, since transfers are effectively

Page 12: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

irreversible. As far as the Bitcoin network is concerned, if you possess the private

key for an address, you are authorized to move funds. This black-or-white

nature of single-key storage has led to a number of critical problems for Bitcoin.

Problem: Security

At the simplest level, a single-key Bitcoin wallet is little more than a collection of

private keys which allow the user to spend his or her bitcoin, while attempting to

keep those keys safe from theft. Keys for a single-key wallet are typically

generated and stored on a single machine, using encryption to secure them while

on disk. However, despite taking best practices for securing keys, any machine

which stores a single-key wallet represents a single point of failure. If the wallet

file can be stolen, the encryption can be attacked offline, or the hacker or malware

can simply lie in wait and key-log the user’s password. As Bitcoin has grown more

valuable, existing malware has been re-engineered to specifically target Bitcoin

wallets. It is this fundamental security risk of single-key storage that has led to the

development of elaborate protocols for generating and storing keys completely

offline, in physical vaults (generally referred to as “cold storage” in the industry.)

However, cold storage has its own risks and weaknesses. If the random number

generator (RNG) on the single machine used to generate the key had weaknesses,

funds may be at risk even without any breach of the machine itself. Offline cold

storage solutions do alleviate some security concerns, but at the expense of

introducing significant operational burdens.

Problem: Access Control

How can businesses effectively use Bitcoin? Businesses usually delegate

responsibility for technology integration to their IT staff. But offloading

responsibility for a Bitcoin wallet to the IT department is like leaving a pile of

$100 bills on a table in the middle of the office. Since anyone with access to the

keys can move the money without leaving a trace, if multiple people have access to

the keys, there is no real way to achieve accountability or prevent insider theft.

Bitcoin’s history is littered with insider thefts which are publicly claimed to be

external hacks. The Bitcoin businesses which have successfully avoided theft have

tightly controlled the number of people who have access to the keys. They have

relied on the principals of the businesses to be the ultimate gatekeepers, as well as

using physical safeguards and key-splitting techniques to ensure a single person

Page 13: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

cannot transact on his own. But for larger businesses to embrace Bitcoin, it is not a

tenable solution to require the CEO and CFO to be involved in every transaction.

Organizations need to be able to define their own internal policies on who can

transact, for how much, and with whose approval. They need the type of

controls that they would be able to have with standard corporate treasury banking

software. One way to achieve such controls is to delegate complete custody of the

business’s Bitcoin to another entity, essentially a Bitcoin bank. But there is also

another way.

The Solution: Multi-sig

Since early 2012, Bitcoin has had an alternative to single-key addresses. Around

that time, a new type of address called pay-to-script-hash (P2SH) was defined and

standardized. P2SH addresses can be recognized by the fact that they begin with a

“3” instead of a “1.” Among the functionality supported by P2SH addresses is the

ability to require multiple private keys in order to transact, known as multi--

signature, or more commonly, multi-sig. A P2SH address can support arbitrary sets

of N keys, any M of which are required to transact — this is commonly referred to

as “M-of-N.” In practice, the blockchain does enforce some limits as to the size of

N, and by far the most typical multi-sig implementations are of the form 2-of-2 or

2-of-3. (Note that using this terminology, a single-key address would be considered

1-of-1.) The easiest real-world analogy for explaining multi-sig is a safe deposit

box with 2 keys, one held by the customer, the other held by the bank. In order to

open the box, both keys are required, making a safe deposit box analogous to a 2--

of-2 multi-sig address.

There are some immediate advantages that can be gained from using multi-sig

technology. First, we can completely eliminate single points of failure by ensuring

that the keys for an address are generated and stored on completely separate

devices. For instance, one key might be generated on the user’s laptop, while the

other is generated on the phone, making it necessary to have both devices in order

to transact. Malware which infects the laptop cannot steal any funds, because it

does not have the key stored on the phone. Secondly, we can achieve redundancy.

In the previous scenario, what happens if the user loses their phone?

If a third key were kept offline in a vault, and a 2-of-3 scheme were used, then the

user could tolerate losing either device, and still manage to recover his funds using

Page 14: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

the remaining device in conjunction with the offline key. Third, we can begin to

address the access control problem. A husband and wife can construct a multi-sig

wallet which requires both of them to transact, while a 3-person partnership can

create a wallet which requires at least 2 of them to be in agreement. Additionally,

entirely new possibilities can be unlocked by multi-sig technologies — consider

the following scenarios.

Trustless Escrow

Alice wants to send Bitcoin to Bob, but only if Bob delivers the merchandise he

has promised. Bob wants to ensure he is paid for his merchandise. They both trust

Trent to adjudicate a dispute but do not wish to trust him with the funds. They

create a 2-of-3 multi-sig address with one key each from Alice, Bob and Trent. If

the transaction goes smoothly, Alice and Bob can jointly release the funds without

Trent’s involvement. If there is a dispute, Trent can adjudicate, and can move the

funds in conjunction with either Alice or Bob. During the course of the transaction,

the Bitcoin is effectively in a kind of limbo, since no one person can move the

funds on his own.

Organizational Limits

A company desires to set up a Bitcoin wallet accessible by 3 of its employees, but

require 2 of them to be involved on any transaction exceeding $5,000. In order to

do so, it creates a 2-of-2 multi-sig address where it holds one key, and an outside

policy-enforcement service holds the other key.

When one of the three employees wishes to transact, he signs the transaction with

the company’s key, authenticates to the service, and requests a co-signature. The

policy service uses the pre-arranged spending limit to determine whether to co-sign

the transaction or to request a secondary approval from one of the other two

employees. The service cannot steal funds, but it can block the company’s ability

to transact. If that is not desirable, the company can instead use a 2-of-3

configuration in which another employee or security officer retains an additional

backup key which allows the company to recover the funds in the case the policy

service becomes uncooperative.

Page 15: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

Trustless Margin

A user wishes to trade on an exchange, but does not wish to entrust full custody to

the exchange, since he does not fully trust their security measures. He establishes a

2-of-2 wallet in which he and the exchange share a single key, and an outside

policy-enforcement service holds the other key. He deposits Bitcoin into the wallet

which the exchange allows him to use as margin for trading, loans or other

purposes. The role of the policy enforcer in this case is to ensure that the customer

cannot withdraw funds while he has outstanding ordersor unsettled trades, while

assuring the customer that the exchange cannot unilaterally steal or lose all funds.

As the above scenarios demonstrate, multi-sig can strongly benefit both individuals

and organizations in improving security, establishing access controls, and enabling

the delegation of partial trust. As exchanges and other businesses begin to enable

customers to deposit without fear of loss, there will be increased consumer

pressure on other businesses to adopt similar technology. And if the risk of loss can

be minimized, there should be substantial benefits to transparency and liquidity

across the entire ecosystem. For these reasons, it is anticipated that the majority of

Bitcoin will, over time, be moved to P2SH multi-sig addresses.

In the traditional world of finance, a custodian is a trusted third party who holds

assets on behalf of another. It’s important to note that with Bitcoin, there is no

longer always a clear custodian of funds. In a 3-of-3 multi-sig wallet where Bank

of America, JP Morgan and State Street each hold 1 key, who is the custodian?

With Bitcoin, final custody lies only with the blockchain, which is, of course,

decentralized itself. As a consequence, lawmakers and regulators will need to

understand this new paradigm as they best determine how to adapt existing

regulations and create new ones.

Ben Davenport is co-founder and chief product officer of BitGo, a leading multi--

sig Bitcoin security company.

Page 16: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

What are Forks, Alt-coins, Meta-

coins, and Sidechains?

Peter Van Valkenburgh, Coin Center’s Director of Research, clarifies some terminology and

explains some technical concepts from the ever-changing universe of Bitcoin-derived

innovations.

BY PETER VAN VALKENBURGH / December 8, 2015

Perhaps the most exciting aspect of cryptocurrency technology is that it is entirely

open for experimentation—there’s no patent or copyright to license, no university

or corporation from which to seek a job, no exclusive membership fee to pay.

Anyone with a computer and an Internet connection can develop and share her own

currency, her own vision of the future. The openness of this system makes it

vibrant but it also can make it confusing. Forks, alt-coins, meta-tokens, sidechains.

. . what does it all mean? This backgrounder is designed to clarify some

terminology and explain some technical concepts from the ever-changing universe

of Bitcoin-derived innovations.

Forks

Fundamentally, Bitcoin is merely software running across a network of peers that

creates and maintains a shared ledger accounting for holdings of a scarce token.

Bitcoin’s network software is open source, so it can be duplicated and modified.

These modifications can result in software that remains compatible with the

Bitcoin network or that ceases to be compatible. Changes that do not break

compatibility are sometimes referred to as changes to the software’s policy rules.

Changes that do break compatibility will necessarily be changes to the

software’s consensus rules—referring to the rules upon which the entire network

must agree.

An example of a policy rule could be: refuse to relay transactions with fees below

a certain amount. Some examples of the Bitcoin consensus rules are:

Miners of new blocks may only create a certain number of new bitcoins;

currently 25.

Page 17: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

Transactions must have correct ECDSA signatures for the bitcoins being

spent.

Transactions/blocks must be in the correct data format.

Within a single blockchain, a transaction output cannot be double-spent.

Creating any custom modification of the core software is called “forking” the

code. The term “forking” is tricky in the context of cryptocurrencies because it is

also used to refer to a split in the network’s shared ledger—a “fork in the

blockchain.” These are two distinct concepts that can be easily confused.

Running forked software that does not alter the consensus rules does not “fork” the

blockchain; users of such forked software will still agree with the existing Bitcoin

network over the state of transactions on the ledger. By contrast, running forked

software that does alter the consensus rules will result in either a brand new

blockchain or a fork of the Bitcoin blockchain (depending on whether the software

recognizes previously mined blocks in the Bitcoin blockchain as authoritative).

Peers running such new software will recognize an alternative set of confirmed

transactions (as compared with the list of Bitcoin transactions on the Bitcoin

blockchain) on their own network as authoritative.

Alt-coins

Whenever a group of networked peers persist in running a forked version of

Bitcoin with alternative consensus rules, and—therefore—a new alternative

blockchain, these peers will effectively be running a new cryptocurrency. This new

blockchain will account for holdings of a new scarce token often called an “alt-

coin.” Some notable examples of alt-coins forked from Bitcoin’s original code

include Litecoin, Dogecoin, and Peercoin.

Rather than fork a version of Bitcoin software, a developer may also start from

scratch in order to create a new cryptocurrency, selectively borrowing elements of

prior cryptocurrency software or writing the code anew. These cryptocurrencies

will also often be referred to as alt-coins. A notable example of a recent from-

scratch alt-coin is Ethereum.

Page 18: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

Meta-coins

Finally, in order to provide some specific consumer or enterprise service that

would benefit from an open, shared, and irreversible ledger—a blockchain—a

developer could create a protocol that is built on top of an existing cryptocurrency.

By way of example, the Counterparty system is built on top of Bitcoin’s

blockchain. These second-layer systems may also utilize their own provably scarce

token—in the case of Counterparty, XCP—and they may also allow individual

users to create new varieties of that scarce token for his or her own particular

purposes.

Using Counterparty, for example, a person could create tickets to her own concert,

sell those tickets online as unique tokens on the Counterparty protocol, allow

buyers to further sell and resell the ticket-tokens, and then admit to the

performance only those who can verifiably show that they are the final holder of a

ticket-token according to records kept in the Bitcoin blockchain and interpreted by

the Counterparty protocol. This simple use-case (digital ticketing) seems

unextraordinary until one realizes that it is accomplished without a centralized

entity or company, like Telecharge or Ticketmaster, keeping the books and

charging a fee.

In theory, Bitcoins themselves (or tiny fractions thereof) could be used to represent

these hypothetical tickets. Such representative bitcoins are sometimes referred to as

“colored-coins,” because they can be likened to real coins that are painted red and

passed about the room to represent something beyond their nominal value (say,

permission to speak at the meeting). The Bitcoin protocol, however, does not make

it easy to add verifiable notes or rights to a particular bitcoin as it travels across the

blockchain. Instead, it is designed to do one thing well: transmit simple value,

transmit unmarked bitcoins. So, if a ticket seller wanted the ticket to only be

transferable once, or only by authorized resellers (i.e. to prevent scalping), or if the

seller wanted the ticket to be provably scarce, or recallable in the event of some

malfeasance on the part of the holder, then a colored coin use of Bitcoin would be

a poor solution. Counterparty and other such meta-tokens or meta-platforms can

make it easier to create these blockchain-based assets alongside verifiable rights

and limitations, by allowing the user to “color” the meta-token rather than a bitcoin

itself.

Page 19: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

You don’t need a meta-platform to build these tools. Plenty of stand-alone alt-

coins—most notably, Ethereum—have these beyond-Bitcoin features built-in, but

some argue that network effects make building on top of Bitcoin—the original and

still most-used blockchain—a safer bet.

In order to create the initial meta-tokens (XCP) that would travel on the

Counterparty protocol atop the bitcoin blockchain, the protocol’s developers did

something interesting: they enabled any existing bitcoin user to obtain XCP by

provably “burning” or destroying some amount of bitcoin, this is referred to as a

proof-of-burn. The purpose of this setup was to create a fair initial distribution of

XCP tokens, and avoid a situation where Counterparty developers (by selling

XCP) would be enriched—perhaps unfairly—before the platform bore any real

fruit.

Many technologists have praised Counterparty’s use of proof-of-burn as superior

to the typical alt-coin model. In previous alt-coin offerings, a new protocol for

scarce digital assets is unveiled, and the initial tokens are auctioned off to the

highest bidders, much to the profit of developers, and, potentially much to the

detriment of the buyers should the platform not succeed and the value of the tokens

ultimately go to zero. Basing the initial distribution on a proof-of-burn system, by

contrast, does not carry the same promise of quick profits for developers.

Some, however, have felt that the destruction of bitcoins created a dangerous

precedent that could lead to deflation or further abusive mis-uses of Bitcoin.

Additionally, even in a proof-of-burn arrangement the early investors and users can

still lose their entire holdings should the platform fail to materialize. Ultimately,

the desire to allow for new blockchain-based services, a fair initial distribution of

new tokens, and reticence to substantially increasing the functionality of the

bitcoin blockchain culminated in the development of sidechains.

Sidechains

A sidechain is effectively an alt-coin (i.e. a different blockchain keeping track of

the movements of a different batch of scarce tokens), but it has a pegged exchange

rate with Bitcoin. To use the sidechain, a user sends her bitcoins to a special

address on the Bitcoin blockchain, at which point that bitcoin will be immobilized

and a token on the sidechain will be released to a sidechain address that is

Page 20: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

controlled by the same person. The same happens in reverse. A user of the

sidechain can send the sidechain token to a special address that will immobilize the

token and release the corresponding bitcoin on the bitcoin blockchain back into her

control. This “conversion” occurs without trusted intermediaries because it relies

solely on mathematically provable statements (x bitcoins have been sent to y

bitcoin address; x sidechain tokens have been released from y sidechain address).

These are referred to as Simple Payment Verification (SPV) proofs on the two

(bitcoin and sidechain) decentralized networks. Given the fixed conversion rate,

and the automated/deterministic process for conversion, it may be more

appropriate to think of sidechains as new blockchains that the user can simply

move her bitcoins into and out of at will.

The primary downsides to the sidechain approach are technical challenges.

Ensuring that pegged bitcoins can be recovered by honest sidechain users, and

never dishonestly recovered by interlopers, requires a sophisticated technical

arrangement and, for the most secure implementation, minor adjustments to the

Bitcoin protocol itself—something that will ultimately require the political will of

the community to enact.

At least for the present, this describes the full landscape of cryptocurrencies.

Where we go next is uncertain, but that’s the price we pay for permissionless

innovation.

Peter Van Valkenburgh is Director of Research at Coin Center.

Is Blockchain Different than Bitcoin?

Richard Gendal Brown, Chief Technology Officer at R3 CEV, discusses different types of

blockchain innovation.

BY RICHARD GENDAL BROWN / January 20, 2016

To understand this question, it’d be helpful to first think about a much older

revolution in payments technology. . . cash.

Page 21: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

Super-Cash!

Cash has an obvious, yet extraordinary super-power. I can hand it to anybody near

me and value will be transferred instantly, directly, peer-to-peer, person-to-person.

Settlement, with finality, using central bank money. And nobody else need know.

And nobody can stop me.

But this super-power only works at close distance. If I want to transfer value to

somebody in a different town or in a different country, I need to trust other people.

Sure: I could put the cash in an envelope and post it. But even then I’d have to trust

the postal service.

Or I could use a bank. But I’d be trusting them to be good for the money. And I’d

have handed over control: if my name’s on the wrong list, the bank would be

obligated to seize my funds. And if you’re on the wrong list, the bank will refuse to

transfer the money to you…

This is because “digital” money is not the same as physical cash.

And the world’s financial plumbing—payments systems, correspondent banking,

SWIFT, etc.—is a direct consequence of this observation: physical cash really is

fundamentally different to every other form of money: only physical cash is a

bearer instrument. And only physical cash can be transferred without permission –

censorship-resistant.

Or so we thought until Bitcoin. A curious email to an obscure cryptography

mailing list at the end of 2008 said something quite audacious. The email, from the

hitherto unknown Satoshi Nakamoto heralded the arrival of Bitcoin and the advent

of “purely peer-to-peer electronic cash”.

Page 22: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

We all know the story of what happened next.

Except… what many people have missed is that the choice of the word “cash” in

that email was absolutely critical and absolutely deliberate. What this email

announced was the arrival of a digital bearer asset that is censorship resistant.

Digital cash. A digital asset that you can hold outright, with no risk of confiscation,

and which you can transfer to anybody you choose without permission from

anybody else.

And the funny thing is: the architecture of Bitcoin flows almost trivially

(almost…!) from this requirement. Proof-of-work, the peer-to-peer network,

mining, the mining reward, the blockchain. The lot. It’s as if the genius of Bitcoin

was to ask the question.

Page 23: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

But why say this in 2016? This exact same thing could have been said at any point

from 2009 until now. There’s nothing new here. Except, nobody asks the obvious

question:

Who actually wants a censorship resistant digital bearer asset? Well… some people

do, of course. But none of them are banks or corporates. At least, I’ve not yet met a

bank that wants this. So why are so many banks, corporates, VCs and startups

spending so much money in this space?

I think there are two completely distinct reasons and that the world of “blockchain

technology” is actually two completely different worlds—the world of bitcoin and

the world of banks. Each has different opportunities and different likely winners,

and those who don’t realise this might be about to lose a great deal of money. So

let’s look at these two worlds one at a time.

The World of Bitcoin.

We should probably be realistic here. Bitcoin is not the solution to Greece’s crisis

and it won’t immediately bring finance to the world’s poor. But it turns out that

censorship resistance is extremely valuable, even for people who don’t think they

need it.

Because censorship resistance implies openness, it implies permissionless

innovation not just permissionless use. Anybody or anything can connect to an

open network like Bitcoin to own and transfer value. And anything that is open,

standardized, owned by nobody, and useful smells very much like a platform.

And, as with the PC or the Internet, we’ve seen how those stories about open

platforms tend to play out: without a gatekeeper even the scruffiest of garage-based

inventors gets a chance to share their idea with the world. And even if only one in

a million scruffy inventors ever has the genius and the luck to be a Jobs, Gates, or

Musk, we can all expect to benefit massively from the freedom that an open

platform provides.

But notice something else: Bitcoin is worse than existing solutions for all the use-

cases that banks care about. Openness has a cost. It’s expensive. It’s slow. And it’s

“regulatorily difficult.” And this is by design.

Page 24: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

So this makes it doubly interesting. Because it means Bitcoin is probably worse

than existing solutions for all the things most firms care about but vastly better for

one single use-case (open access to value transfer) that could be very useful for

some people–especially innovators.

Isn’t that pretty much the definition of a disruptive innovation? Something that’s

worse for existing use-cases but solves a niche use-case very well? So, if this is

true, we should expect to see adoption of Bitcoin come from the margins, solving

marginal problems for marginal users.

But disruptive innovations have a habit of learning fast and growing. They don’t

stop at the margins and they work their way in and up. So this is why I think so

many of the big-name VCs are so excited about it.

So the incumbents should be keeping a very close eye on what’s going on. If

anything in this space is going to disrupt them, it will probably come from this

world. But it’s perfectly understandable that vanishingly few of them are actually

engaging deeply in this world.

So if Bitcoin isn’t why banks are looking at this space, what are they looking at?

How have so many people convinced themselves that there is something of interest

here that is “separate” to Bitcoin or systems like it?

At this point, it’s customary to observe sagely that “of course, the real genius of

bitcoin was the blockchain; that’s where the value is”. But I’ve discovered

something rather amusing. If you push the people who say this, and ask them what

they actually mean, most of them can’t! And yet… whether they understand why

or not, they are actually on to something.

It comes down to how bitcoin delivers on the design goal of “censorship resistant”

cash. Imagine Bitcoin didn’t already exist and you were asked to design a system

of censorship-resistant digital cash. How would you do it? Well… you couldn’t

build it around a central database: it could be shut down. That doesn’t sound very

censorship resistant. And you couldn’t rely on a network of trusted people around

the globe since they could collaborate to block your transactions. And in any case,

who would control the identity system that helped you be sure these people were

who you thought they were in any case?

Page 25: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

It turns out that the answer is quite unexpected… and it’s something I’d bet almost

all engineers would consider completely mad. The answer is that you get

everybody who fully participates in the system to maintain a full copy of the

ledger. And every time somebody, anywhere in the world, spends some bitcoin,

we’re going to inform everybody who’s maintaining this ledger and they’re going

to store a copy of that transaction too.

Bitcoin essentially runs on a massively replicated, shared ledger. (The trick is in

keeping it consistent, of course…) It sounds insanely inefficient and expensive,

and perhaps it is. But we also have to ask ourselves: inefficient and expensive as

compared to what?

And this leads us to the other world.

The World of Banks

Just look at the state of banking technology today—payments, securities,

derivatives… pick any one. They all follow the same pattern: every bank has built

or bought at least one, usually several, systems to track positions and manage the

lifecycle of trades: core banking systems, securities settlement systems, multiple

derivatives systems and so on. Each of these systems cost money to build and each

of them costs even more to maintain. And each bank uses these systems to build

and maintain its view of the world. And they have to be connected to each other

and kept in sync, usually through reconciliation.

Take even the simplest OTC derivative contract: it is recorded by both sides of the

deal and those two systems have to agree on everything for years. Very costly to

operate.

But what if these firms—that don’t quite trust each other—used a shared system to

record and manage their positions? Now we’d only need one system for an entire

industry… not one per firm. It would be more expensive and complicated to run

than any given bank-specific systems but the industry-level cost and complexity

would be at least an order of magnitude less. One might argue that this is why

industry utilities have been so successful.

But a centralized utility also brings issues: Who owns it? Who controls it? How do

the users ensure it stays responsive to their needs and remains cost-effective?

Page 26: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

The tantalizing prospect of the blockchain revolution is that perhaps it offers a

third way: a system with the benefits of a centralized, shared infrastructure but

without the centralized point of control: if the data and business logic is shared and

replicated, no one firm can assert control, or so the argument goes.

Now, there are lots of unsolved problems: privacy, performance, scalability, does

the technology actually work, might we be walking away from a redundant

(antifragile?) existing model? Who will build these platforms if they can’t easily

charge a fee because of their mutualised nature? Difficult questions.

But see: this has nothing to do with funny internet money, bitcoin or censorship-

resistant digital cash. It’s a completely different world.

Two Revolutions for the Price of One

The blockchain revolution is so fascinating because it could actually be two

completely different revolutions… both profound in their implications:

Censorship-resistant digital cash providing a new platform for open,

permissionless innovation driven from the margins. And industry-level systems of

record driving efficiencies for incumbents.

Neither of these are “sure things”… they are both high risk speculative bets… but

they’re also very different bets.

Richard Gendal Brown is Chief Technology Officer at R3 CEV. The views shared

here don’t necessarily represent R3’s positions, strategies or opinions.

What is Ethereum?

Vitalik Buterin, creator of Ethereum, explains what this new technology is and what the

vision of a shared world computing platform could one day make possible.

BY VITALIK BUTERIN / March 9, 2016

Page 27: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

In a nutshell, Ethereum is a new innovation in computing built from technologies

and concepts originally pioneered in Bitcoin. Bitcoin is widely understood as a

system for generating a shared world ledger that securely records bitcoin balances.

Ethereum uses many of the same systems (such as blockchains and peer-to-peer

networking) in order to generate a shared world computing platform that can

flexibly but securely run any application users want to code (shared ledgers like

Bitcoin included). To better understand what that means, let’s first go back to the

beginning.

Satoshi Nakamoto’s development of Bitcoin in 2009 has often been hailed as a

radical development in money and currency, being the first example of a digital

asset that simultaneously has no backing or “intrinsic value” and no centralized

issuer or controller. However, another, arguably more important, part of the

Bitcoin experiment is the underlying blockchain technology as a tool of distributed

consensus, and attention has already greatly shifted to this piece of the puzzle.

Commonly cited alternative applications of blockchain technology include using

on-blockchain digital assets to represent custom currencies and financial

instruments (“colored coins”), the ownership of an underlying physical device

(“smart property”), non-fungible assets such as domain names (“Namecoin”), as

well as more complex applications involving having digital assets being directly

controlled by a piece of code implementing arbitrary rules (“smart contracts”) or

even blockchain-based “decentralized autonomous organizations” (DAOs).

Prior to Ethereum, there were already many projects that were trying to use

blockchain technology for some of these applications. However, they were all very

limited, restricting themselves to supporting only one or a few specific

applications. The core idea behind Ethereum that allowed it to get past those

limitations was this: instead of having many blockchain protocols, each supporting

a few applications, or even one blockchain protocol supporting a large list of

applications, we can have a blockchain protocol with a built-in programming

language, allowing any application to be written on top, and its rules enforced by

the blockchain. This way, the protocol can not only support all of the applications

that have been developed so far, but also newer ones that will be created in the

future that we have not yet imagined – allowing developers to innovate on top of

blockchain technology with far less effort and far more speed than was possible

before.

Page 28: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

Whereas Bitcoin is sometimes described as a “world wide ledger”, albeit restricted

to recording the balances of one specific currency, Ethereum can be viewed as a

“world computer”: a place where anyone can upload and run programs that are

guaranteed to be executed exactly as written on a highly robust and decentralized

consensus network consisting of thousands of computers around the world. The

same blockchain technology as in Bitcoin and other systems is used as the base,

and the security of the computation is guaranteed by the same kinds of

cryptography and economic incentives, but the ability to execute code opens to

developers a much larger world of possibilities.

To give a specific example, consider the case of someone using Slock, an

Ethereum-enabled internet-of-things platform, in order to rent their bicycle. The

owner would put a Slock (“smart lock”) on their bicycle, and register a smart

contract (a kind of computer program) to the Ethereum blockchain. After that

point, anyone could send some amount of cryptocurrency to the contract, and the

contract would automatically forward the coins to the owner and register a record

stating that the sender is allowed to access the lock for, say, three hours. The user

would then be able to send a cryptographically signed message to the lock with

their smartphone, opening the lock—at least for the duration for which the record

on the blockchain remains valid. This is all done without involving any centralized

payment processors, servers or other third parties, including the Slock company

itself. So, someone using such a lock can be confident that it will keep working

even if the manufacturer shuts down, that it will not suddenly start charging very

high fees, and that their private transaction details are not all in the hands of one

party.

Other applications include financial contracts of various kinds, ranging from

simple digitization of real world assets (gold, stocks, etc.) to various forms of

derivatives, more secure replacements for internet infrastructure (such as DNS and

certificate authorities), methods for managing one’s online identity without relying

on a centralized provider that effectively has the “backdoor keys” to your online

life, and much more. Alongside over 100 applications in all of these areas that are

being built by startups around the world, Ethereum technology is also being

actively explored by financial institutions, banking consortia such as R3, as well as

firms such as Samsung, Deloitte, RWE and IBM, with applications ranging from

simplifying and automating trade finance to tracking merchant loyalty points and

gift cards to creating decentralized markets for electricity trading in mind.

Page 29: Blockchain 101 - Rossdale CLE · 2017-08-22 · distributed ledgers can be used to do much more, including clearing and settlement of digital asset trading, provisining of identity,

Effectively, Ethereum aims to take the promise of decentralization, openness and

security that is at the core of blockchain technology and bring it to almost anything

that can be computed.

Vitalik Buterin is the creator of Ethereum, co-founder of Bitcoin Magazine, and

longstanding developer and researcher of cryptocurrencies and blockchain

technologies.