Page 74 - FIGI: Security Aspects of Distributed Ledger Technologies
P. 74

safekeeping function). European Securities and Markets Authority (2019) Advice: Initial Coin Offerings and Crypto-
                Assets, available at https:// bit .ly/ 2CXSjFc
            253   As noted by the European Securities and Markets Authority, ESMA See European Securities and Markets Authority
                (2019) Advice: Initial Coin Offerings and Crypto-Assets , available at https:// bit .ly/ 2CXSjFc, these requirements may also
                apply in relation to the initial recording of securities in a book-entry system (notary service), providing and maintaining
                securities accounts at the top tier level (central maintenance service), or providing, maintaining or operating securities
                accounts in relation to the settlement service, establishing CSD links, collateral management.
            254   European Securities and Markets Authority (2019) Advice: Initial Coin Offerings and Crypto-Assets , available at https://
                bit .ly/ 2CXSjFc
            255   Rocco, G (2018) Emptied IOTA Wallets: Hackers Steal Millions Using Malicious Seed Generators, available at http:// bit .ly/
                2SmVlsI
            256   Binance (2019) Binance Launches DEX Testnet for the New Era of Peer-to-Peer Cryptocurrency Trading, available at
                http:// bit .ly/ 2XZJke2
            257   It has online order matching, versus offline matching in centralized exchanges.
            258   Novikov, I (2018) Why Are Crypto Exchanges Hacked So Often?, available at http:// bit .ly/ 2Y2lDC1; CCN (2018) The
                Common Tactics Used to Hack a Cryptocurrency Exchange, available at http:// bit .ly/ 2YgETj0
            259   Rosic, A (2017) 5 High Profile Cryptocurrency Hacks, available at http:// bit .ly/ 32wI8lL
            260   See the Coincheck failure in 2018 of USD 500 million off XEM currency due to failure to use multi-signature wallets.
            261   Attacker effort to obtain 2 of 3 private keys would be substantial. Rosic, A (2017) Paper Wallet Guide: How to Protect
                Your Cryptocurrency, available at http:// bit .ly/ 2xSTF0T
            262   Novikov, I (2018) Why Are Crypto Exchanges Hacked So Often?, available at http:// bit .ly/ 2Y2lDC1
            263   James, H (2018) First Successful Test Blockchain International Distribution Aid Funding, available at http:// bit .ly/
                2LswbZ6
            264   Such as walletgenerator.net and Bitcoinpaperwallet.com create QR codes out of the alphanumeric string to potentially
                generate additional security.
            265   See services such as https:// walletgenerator .net/  which convert addresses into QR codes.
            266   Popular hardware wallets include the Ledger Nano, Trezor One, KeepKey, Archos Safe-T Mini. See https:// trezor .io/ ;
                https:// www .ledger .com/ ; http:// www .archos .com

            267   Helperbit does not require any software download, as the procedure for generating the passphrase takes place on the
                client’s internet browser.
            268   These nodes may be trustless.
            269   As noted below, some newer blockchains design solutions so that some parties can only read the blockchain, while
                others can also sign to add blocks to the chain
            270   Even so, there have been instances where identities of blockchain users have been discovered using transaction graph
                analysis. This uses the transparency of the transaction ledger to reveal spending patterns in the blockchain that allow
                Bitcoin addresses – using IP addresses and IP address de-anonymization techniques - to be bundled by user. Ludwin, A
                (2015) How Anonymous is Bitcoin? A Backgrounder for Policymakers, available at https:// goo .gl/ DJnIvP.
            271   This also depends on the blockchain design. A blockchain can have all of its data encrypted, but signing/creating the
                blockchain wouldn’t necessarily be dependent on being able to read the data. An example may be a digital identity
                blockchain.
            272   Lewis, A (2017) Distributed Ledgers: Shared Control, Not Shared Data, available at https:// goo .gl/ KieCHG.
            273   Ki-yis, D & Panagiotakos, K (2015) Speed-Security Tradeoffs in Blockchain Protocols, available at https:// goo .gl/ Fc2jFt
            273
            274   Ethereum currently manages a maximum of 20 tps, while Bitcoin original only reaches a capacity of 7 transactions per
                second. Bitcoin cash reaches 61 transactions per second (tps). The Visa network reaches 24,000 tps. See Cointelegraph
                (2019) What Is Lightning Network And How It Works, available at http:// bit .ly/ 2XXJsKY
            275   Coined by Vitalik Buterin, Ethereum Founder. NeonVest (2018) The Scalability Trilemma in Blockchain, https:// bit .ly/
                2Y3dEpb
            276   See all of the following. Fischer, M; Lynch, N & Paterson, M (1985) Impossibility of Distributed Consensus with One
                Faulty Process, available at http:// bit .ly/ 2Z1YT6q; Gilbert, S & Lynch, N (2002) Brewer’s Conjecture and the Feasibility



           72    Security Aspects of Distributed Ledger Technologies
   69   70   71   72   73   74   75   76   77   78   79