Professional Documents
Culture Documents
JOONMA
Bitcoin is the first cryptocurrency and the No one owns Bitcoin, the public blockchain.
first use case of blockchain technology used Anyone can own Bitcoin, the
as a medium of exchange to store the cryptocurrency.
transfer value.
Bitcoin, Gold, and the Fundamentals of
Cryptocurrency and blockchain development has Money
geometrically evolved because of its open source
Bitcoin is an excellent medium of exchange
nature. For example, open source code is freely
and store of value – Bitcoin has been called
available code on Github that can be reused for
digital gold (it far surpassed the value of an
other projects without permission.
ounce gold in 2017).
Not all blockchains are the same. A common Bitcoin is a poor unit of account because of
error is to equate all blockchain technologies to the price volatility. – It would not work as a
Bitcoin blockchain. Newer, next-generation reportable currency and it would skew
blockchains not associated with Bitcoin do not financial statement comparisons.
necessarily share all the attributes of the Bitcoin Gold is an excellent store of value, a
blockchain. moderate unit of account, and a poor
medium of exchange.
However, there would be no blockchain
technology of any sort without Bitcoin. The Bitcoin, Gold, and the Attributes of Money
better you understand Bitcoin, the better you will
Bitcoin is highly durable, portable, divisible,
understand how other cryptocurrencies and
and fungible. – One Bitcoin is 100,000,000
blockchains work.
units and millions in value can be
Birth of Bitcoin and the Blockchain transported with one piece of data, the
private key.
October 31, 2008: Bitcoin design whitepaper
Gold is highly durable and fungible. Gold is
titled “Bitcoin: A Peer-to-Peer Electronic Cash
not easily portable or divisible.
System” is published through a cryptography
Gold has a 5,000 plus year history and
mailing list by Satoshi Nakamoto.
Bitcoin is less than 10 years old. – Bitcoin
January 3, 2009: Genesis block is mined (this is durability is being proven everyday while
block number 1 of the blockchain). gold is a rare metal that doesn’t oxidize.
JOONMA
DAY 2 C. Consensus Mechanism
A process using protocols and algorithms so
Blockchain: Core Components of the
nodes can agree on the same version
Technology
(state) of the blockchain without having to
Note: The core components are described in the know or trust one another.
context of Bitcoin. The combination of a blockchain and a
peer-to-peer network is not inherently
A. The Ledger immutable, secure, or reliable. The
A blockchain itself is the record of all consensus mechanism makes those
transactions attributes possible.
A blockchain is a ledger of transactions, The consensus mechanism is composed of
each of which records a change in the consensus protocol and the consensus
ownership of the native currency of a algorithms.
particular blockchain. Bitcoin is the native This is where the phrase “blockchains are
currency of the Bitcoin blockchain. trustless” comes from. “Without knowing or
Transactions are grouped into a block, trusting” is the magic sauce. With Bitcoin,
added to the blockchain and linked to all the trust is not totally eliminated but is the new
previous blocks with cryptography. Every standard for trustlessness.
block references the previous block with a
hash. Consensus Protocol and Consensus Algorithm
Cryptography is the math used to prove no
The consensus protocol is a set of
data has been changed. This is the basis for
rules governing how the entire
an immutable blockchain.
network operates and all the core
The Bitcoin blockchain, for example,
components. Bitcoin has a protocol.
becomes one version of the truth.
For example, the specification for
valid digital signatures.
B. Peer-to-Peer Network
The consensus algorithm defines
A large number of nodes (computers)
the steps to achieve consensus
connected over the internet in a
using the set of rules, the protocol
decentralized fashion.
For example, verify the digital
A large number of nodes that updates and
signatures of transactions. The
stores the complete synchronized version of
protocol is the rules and the
the blockchain.
algorithm is the instructions to
Every node agrees on one state of the
enforce the rules.
blockchain at any point in time. This allows
anyone to independently verify a
D. Incentive Mechanism
transaction.
The native currency (bitcoin, for example)
The network distributes security among
that incentivizes participation to secure the
thousands of computers making it
decentralized network. The issuance of
infeasible for malicious actors to
Bitcoin is part of the consensus mechanism.
compromise the network.
The Bitcoin blockchain is a permissionless
Nodes can go offline without affecting the
blockchain because anyone can participate
network. One party is never relied upon for
as a node, a developer, or an end user
any of the benefits of the network which is
without asking anyone for permission.
the value proposition of decentralization.
Remember: No one owns Bitcoin, the public
blockchain, but anyone can own bitcoin, the
cryptocurrency.
JOONMA
Because Bitcoin is not a company, there is A hashing algorithm takes an input of any
no CEO, no employees, no bank account, length information and reduces it to a string
no revenue, no hiring process, and no of characters to a uniform length.
contracts. Bitcoin uses a hash protocol called SHA-
Miners versus nodes: A full node downloads 256, which reduces any string of input
and maintains a full coy of the blockchain, information into a 256-character string,
validates blocks, and can relay transactions. known as a hash ID.
Nodes must also use mining hardware and
Proof-of-Capacity (PoC)
mining software to become a miner. All
miners are nodes but not all nodes are Another consensus algorithm used in
miners. blockhains that allows mining devices in the
Miners provide security in the form of network to decide mining rights and
computer equipment that runs a mining validate transactions with the help of their
software with the expectation of reward. available drive space
The larger the hard drive, the more solution
Consensus Algorithms: Proof of Work VS.
values one can store on the hard drive, the
Proof of Stake
better chances a miner has to meet the
Proof of Work Proof of Stake required hash value from his list, resulting
Miners provide Forgers or validators in a higher possibility of acquiring and
computational power (coin holders) stake gaining the mining prize.
to solve a coins to secure the It has appeared as an alternative to the
mathematical puzzle. network. They act problems of high energy consumption in
honestly because they PoW consensus and coin hoarding in PoS.
risk losing their stake if
they act dishonestly
and do not follow the Proof-of-Activity (PoA)
rules. A consensus algorithm used in Blockchain
Resource intensive Uses significantly less
technology that ensures that all
method to secure the resources to secure the
transactions occurring on the network of
network. A block network. Forgers get a
blockchains are genuine and authentic.
reward (bitcoin) is reward for staking the
given to the first miner coins they own. PoA consensus, which is a combination of
who solves the PoW and PoS, ensures that all miners arrive
challenge of the proof at a consensus.
of work problem. An attempt to consolidate the best features
Miners also earn of PoW and PoS systems.
transaction fees. Conditions for a PoA consensus:
Block rewards over Staking rewards over a. Validators have to confirm their real
time can be estimated time can be estimated identities.
on the computing based on the coins b. A candidate must be ready to invest and
power supplied by a staked by one owner to put his reputation at stake. A rigorous
miner to total power of total coins staked by
selection process decreases the danger
all miners. everyone.
of choosing shady validators and
encourages long-term commitment to
The Power of Hashing Algorithms the Blockchain,
c. A method for electing validators must
Hashing is a process used to encrypt data, be equal to all competitors.
prevent tampering, and verify data has not
been changed.
JOONMA
d. The identity of validators must be Directed Acrylic Graph (DAG)
verified to maintain the integrity of the
A Digital Ledger Technology (DLT) variation
Blockchain.
that has been presented as a Blockchain
An example of PoA is Decred
alternative.
Proof-of-Weight (PoWeight) Due totheir arrangement in a directed
graph, the cooperating nodes of a DAG are
A consensus algorithm based around the
capable of cross verification.
Algorand consensus model.
The use of DAG improves the network’s
In other words, we can say that this is a
scalability and lowers transaction fees by
notable upgrade of the PoS system in
allowing fee-free nano-transactions
which the more tokens one owns, the
Does not require miners or the underlying
better their chances are to discover more
energy-intensive infrastructure since it
but this whole idea makes the system
achieves consensus without implementing
somewhat biased.
the classic hash-protected PoW.
Tries to solve such a biased nature of the
Significant features of DAG:
PoS.
a. Scalability: DAG is well-known for its
Instead of using your portion of tokens
limitless scalability. In contrast to
owned in the network to reflect your
previously distributed ledgers, DAG
chance of “discovering: the next block,
improves scalability as network grows.
some other weighted value is employed.
b. Compatibility: By implementing
Advantages Disadvantages transaction fee-free strategies, DAG, as
PoWeight is known It has proven a decentralized channel, allows
for its super challenging to get participants to make fast micro or even
scalability and high consumers enthused nano-transactions.
customization. The about the concept c. Resilient: Using the Winternitz one-
fundamental due to a lack of time signature mechanism, DAG makes
algorithm can be incentivization, as the the underlying distributed ledger less
adopted by the protocol does not pay susceptible to quantum computers with
developers to allow users for maintaining
higher level computing characteristics.
for the formation of anode and validating
d. Validation: DAG’s quantum resistance
committees. transactions.
allows for masked authenticated
messaging and parallelly lined
Leased PoS (LPOS) transactions, which is a great way to
transform data using encryption and
Allows users to lease out their interests to
authentication techniques.
miners. Mining nodes, in return, share some
part of their earnings with the leaser. DAY 3
A novel way to benefit from mining without
Crypto Terms
really needing to mine.
Considered to be a more powerful branch Address a unique identifier used to
of PoS as it extends the capabilities of PoS send and receive
and facilitates additional features such as cryptocurrency
balance leasing, passive income Airdrop distributing cryptocurrency
generation, and secure transactions for free as a market strategy
The Waves platform currently supports Altcoin alternative cryptocurrencies
LPoS to Bitcoin
JOONMA
All time high the highest or lowest price a Fear of Missing When someone is
(ATH)/All Time cryptocurrency has reached Out (FOMO) concerned that they might
Low (ATL) miss a good buying or
Arbitrage buying and selling the same selling opportunity
asset on two exchanges to Fear, Negative sentiment about
profit from small price Uncertainty, the market, usually spread
differences and Doubt in the media
Bagholder Someone who missed and (FUD)
opportunity to sell at a high Fiat Currency that is
price and now owns low government issued legal
value cryptocurrency tender, unlike
Bear Someone who is pessimistic cryptocurrency
about the market or coin Fork A change in how the
value blockchain operates that
Bitcoin (BTC) A digital currency launched can be backwards
in 2009 that boomed the compatible (soft fork) or not
cryptocurrency market (hard fork)
Block A group of transactions Hardware A physical device used for
made in a blockchain Wallet storing cryptocurrency keys
Blockchain A globally distributed digital (usually USB connected)
record of transactions; Hashing Transforming chunks of
permanent and secure data into unique test strings
Bull Someone who is optimistic that are nearly impossible to
about the market or asset decipher
value Hodl Slang term for ‘hold’, to
Buy the Dip Buying cryptocurrency keep cryptocurrency instead
(BTD) when the price has fallen of selling it
Cold Wallet A digital wallet that is not Hot Wallet A digital wallet that is
connected to the internet connected to the internet
Cryptocurrency A digital currency that uses Initial Coin A method of raising funds
cryptography to secure Offering (ICO) for a new project in
wallets; often decentralized, exchange for a token
though not always Market The total number of coins
Cryptography The method of using code Capitalization in circulation multiplied by
to convert information and individual coin price
communications into an Memory Pool Unconfirmed transactions
unreadable format (Mempool) held until they are picked up
Decentralized No entity holds one control by a node on the network
over the network; anyone Mining Using computer hardware
can join (see ‘node’) and to process and validate
blockchain records are cryptocurrency transactions
stored in many locations Mining Pool Miners combining their
Ethereum A cryptocurrency and mining rig power to increase
decentralized computing the chances of closing the
platform launched in 2015 block and receiving the
Exchange A platform to buy, sell, and reward for it
invest in cryptocurrency. Mining Rig A computer built specifically
Exchanges can be for mining cryptocurrency,
centralized (coinbase) or usually containing high
decentralized (unstoppable) specification components
JOONMA
Mooning When a cryptocurrency’s its own blockchain and
value is rapidly rising in a represents an asset or utility
short period of time Transaction Movement of
Node A computer that connects to (TX) cryptocurrency from one
the cryptocurrency network address to another
and becomes one of the Whale Someone who owns lots of
network participants cryptocurrency
Peer-to-Peer When two entities/devices Whitepaper An authoritative document
(P2P) communicate directly to explain a new
without a third party cryptocurrency
Private Key Secret identifier that proves
ownership of a wallet
Proof of Stake Method used to process Cryptocurrency Wallets
(POS) transactions with miners A wallet is software that stores private key
having more control based
and their associated public keys and allows
on how much
users to send transactions to the peer-to-
cryptocurrency they hold
peer network and receive cryptocurrency
Proof of Work Method used to process
(POW) transactions, requiring from others.
completion of complex Cryptocurrency is not actually “stored” in a
mathematical equations by wallet although it is often referred to this
computers way. Wallets may contain more than one
Public Key Generated by the private cryptocurrency depending on the wallet.
key and turned into an Cryptocurrency actually “resides” on a
address generally used to respective blockchain and private keys are
receive cryptocurrency used to change the ownership. The record
Pump and Fraudsters spreading false and the cryptocurrency become one
Dump info to increase a and the same.
cryptocurrency’s value The Law of private keys: If you control
(pump), then cashing out
your private keys, you own your
(dump)
cryptocurrency and if you do not control
Satoshi The pseudonym given to
your private keys, you do not own your
Nakamoto the person or persons who
created bitcoin (their cryptocurrency.
identity is unknown) Example: Smartphone apps (Mycelium,
Satoshis The smallest unit of Bitcoin; Edge), online web wallets (blockchain.info),
one Bitcoin equals hardware wallets (Ledger, Trezor)
‘100,000,000 satoshis’
Shilling Spreading false information
to increase the price of a The Push VS. Pull Paradigm Shift
cryptocurrency
Software Wallet A method of storing In the traditional financial model, the buyer
cryptocurrency keys within gives authority to the sellers to pull money
software files on your from the buyer’s account.
computer or mobile device Buyers hand over their credit card
Ticker An abbreviation to identify a information for a credit card transaction or
cryptocurrency (for hand over their bank account and routing
example, “BTC” for Bitcoin) numbers for an ACH or wire transaction to
Token Used interchangeably with the seller. This is where PCI compliance
“coin”. Technically, a subset comes in because companies attempt to
of cryptocurrency that has
securely store credit card information for
JOONMA
millions of customers in the case of big box
stores.
This exposes the buyer to significant risk of
fraud and unauthorized transactions. The
Target, Home Depot, TJ Maxx and other
credit card hacks demonstrate that storing
PII information on behalf of buyers
(customers) is an exercise in futility.
Funds cannot be stolen from a bitcoin public
address but funds can be easily stolen from
credit cards and bank accounts.
A cryptocurrency public address does not
Custody, responsibility, and control can also
need to be secured. A public address with
fall somewhere in the middle of the
$1,000,000 in bitcoin could be posted on a
continuum:
billboard and no one can steal the funds.
a. Centralized crypto exchanges where
This is one of the most important concepts
trading takes place are akin to financial
in understanding the transformative power
intermediaries.
of blockchain technology and
b. Blockchains that are not fully
cryptocurrencies.
decentralized (permissioned
Fraud risk in the pull model is eliminated
blockchains) fall in the middle. For
by the paradigm shift to the pull model.
example, a Fortune 500 that deploys its
own blockchain or joins an industry
consortium blockchain like R3. There
The Custody, Responsibility, and Control are no intermediaries but the
Continuum for Assets blockchains are more centralized.
Traditional financial institutions maintain True custody, on the left most side of the
custody of their customers’ assets. Custody continuum, only happens when the owner
means they have responsibility and control holds the private key of a fully decentralized
of those assets on behalf of their cryptocurrency like bitcoin.
customers. This is the right side of the DAY 4
continuum.
Customers (individuals or businesses) Blockchain Process and Technical Controls:
relinquish control to financial institutions Overview
who have custody of their assets. Custody,
The potential for blockchain to radically
responsibility, and control reverts back to
transform auditing and assurance will be a
the individual or business entity when third
challenge in the process of realizing all the
parties are eliminated by a peer to peer
benefits.
decentralized network like bitcoin.
The profession will undoubtedly evolved.
Owning cryptocurrency is synonymous with
This evolution will affect the role of CPA
having custody and therefore 100%
auditors as well as the skill sets necessary
responsibility and control. This is the left
for auditors to remain relevant and
side of the continuum. Someone can have
competitive while continuing to provide
control of an asset and be irresponsible
value.
which is why both of these concepts are
Assurance has historically been delivered
important.
one-to-one between the auditor and the
audit client. Blockchains may not be
controlled by the audit client yet require
JOONMA
assurance as a substantial tool used for offerings. A production ready end-to-end
producing financial statements. service, and will need updated SOC reports.
Professional judgment is a major part of the Auditors will have unique challenges for
CPA value proposition in delivering services user entities who use blockchains because
based on the evaluation of management’s they are not single entity service
estimates. Which are significant basis for organizations in the traditional sense of a
financial statements. Blockchains will not company like Microsoft.
eliminate this professional judgment. Existing standards cannot be applied to
Errors and fraud will still exist regardless of blockchains so process and technical
blockchain and sufficient audit evidence still control testing becomes more important
has to be obtained. The risk of off-balance until blockchain standards begin to emerge.
transactions in the form of off-chain
transactions will still occur and have to be
Process Controls and Technical Controls
assessed.
CPA auditors provide reasonable assurance Process controls are application controls and
that financial statements are fairly stated. manual controls over transaction processing.
When blockchain fulfills the promise of real-
Organizations have more direct control over
time auditing and eliminates non-value
implementation of these controls related to
activities, test of controls will still be needed
blockchains and cryptocurrencies.
to provide that reasonable assurance.
Understanding and testing controls is going
to require more technical skills and Technical controls are based on logical
knowledge, which is both a challenge and programming, which is also part of the IT general
an opportunity. Professional skepticism will controls of the IT environment.
be even more important with blockchain
A public blockchain is not going to have an
technology and CPAs are best poised to
audit, SOC, or lend itself to technical control
provide blockchain assurance.
testing so reliance has to be obtained
directly.
System and Organization Controls There will likely need to be another solution
layer to aid auditors with technical controls.
Many companies have outsourced their
For example, mechanized proofs are
managerial services for economic or other
protocols that mathematically prove a
reasons. The companies are called user
smart contract will execute as designed.
entities and the outsource entities are
called service organizations in the context
of SOC. Process Controls
The AICPA issued SOC guidance for user
Process controls can help mitigate the limitations of
entities to assess how internal controls of
verification.
service organizations affect their financial
reporting and security and privacy of Maintaining the trail of information is as
information. important as securing assets.
Service organizations such as Amazon AWS,
Google Cloud Platform, and Microsoft Azure
Process controls are needed to increase the
are single clearly identifiable and auditable
security of using and storing cryptographic assets.
entities.
These same cloud based service providers Custody, responsibility, and control of
now have blockchain-as-a-service (BaaS) assets shifts to the end user.
JOONMA
If private keys, the digital pen for signing Auditors and accountants have to
transactions, are lost, stolen, or deleted, understand these controls in order to gain
assets will be gone forever. reasonable assurance that blockchains are
working as intended.
Understanding technical controls will also
Questions that auditors, accountants, and clients
require working with technical experts like
should ask in developing and assessing process
controls: developers who design and implement
these controls.
Who should have access to
cryptocurrencies?
Blockchain technical controls that need to be
Who should be responsible for recording understood and assessed include these:
and capturing the transactions? Consensus mechanism: Proof of Work
How should cryptocurrency be secured but or proof of Stake
on our use case? Block size and transactions throughput:
What kind of physical security should be How many megabytes
used to backup private keys? Cryptographic algorithms used: ECDSA,
What exchanges should be used to buy and SHA256
sell cryptocurrency? Transaction validation parameters:
Who is responsible for deciding when to buy Valid signatures
and sell? Mining difficulty: Hashing or computing
Who has and should have read and write needed to solve blocks
permission for permissioned blockchains?
Standard infrastructure controls such as
These are only a few of the controls relating to the
virus checking schedules, 0-day exploit
security that an entity would need to address.
remediation, maintenance schedules,
Comprehensive process controls should include the capacity and backup management still have
following: to be managed.
A distributed ledger node within a private
Private key storage and backup
blockchain is still a combination of data and
management
software running on one or more servers,
Physical and environmental security: safes,
often within a virtual private network (VPN).
door access controls
IT general controls will continue to apply to
Cryptographic asset controls: who has
the operational environment.
access and from where
Implementation of multi-sig wallets: N-of-M
signers to send funds Responsibility Controls
Password managers to delegate access to
Who is responsible for controls with so
wallets and exchanges
many different blcockchain solutions
Access to read and write to ledgers which
available?
may or may not be the same as sending
A public permissionless blockchain is
cryptocurrencies
not a company; there is no CEO and no
employees. It is a decentralized
Technical Controls platform; therefore, responsibility for
controls is spread among the
The existence of blockchain technology in
participants, such as the nodes, miners,
an organization does not remove the need
and developers.
for knowledge of the technical controls
A consortium permissioned blockchain
within it.
is more formal in nature and made up
JOONMA
of members who are granted Blockchain Benefits, Values, and
permission; however, the responsibility Opportunities
for controls is still shared and spread
New applications of blockchain allow one
among the members.
party to prove information without
revealing it. Organizations reduce risk by
Accounting Aspect not having to store information and
Holdings of a cryptocurrency meet the accountants get the value of verifying all
kinds of information in the same way.
definition of an intangible asset. If
Blockchain eliminates reconciliation
cryptocurrencies are held for sale in the
ordinary course of business, then the entity because transaction settlement time
approaches zero and entities will have one
applies the inventories standard.
version of the truth with shared ledgers.
All aspects of supply chain form source to
Initial Recognition and Measurement final product will be linked and therefore
An intangible asset is recognized when: verifiable.
- it is probable that future economic Accountants and auditors will have better
benefits that are attributable to the tools and provide greater value added
asset will flow to the entity; and services.
- the cost of the asset can be measures
reliably Blockchain Benefits and Value
If an intangible asset is acquired in a
Increased transactional trust
business combination, then these criteria
Reduced fraud, increased security
are assumed to be met. If an intangible
Frictionless, low cost transactions, and
asset is acquired in a separate acquisition,
faster processing times
then the probability criterion is assumed to
Independent verification
be met and the reliable measurement
Owner-controlled assets
criterion is usually met.
1. Censorship Resistance
Censorship is the suppressor of
speech and information.
Public blockchains like Bitcoin are
censorship resistant.
There is no third party or centralized
control which can “censor” the
network.
Any parties with the ability to censor
can and will use it for their own
benefit. The power and control to
JOONMA
censor usually resides with a few Based on the algorithm that returns either
people or organizations. a true or false output, there are three parts
to ZKP:
2. Borderless a. If the prover’s statement is true, the
Borders are geographical verifier will know if it is true.
boundaries for sovereign states and b. If the prover’s statement is false, the
legal jurisdictions. verifier cannot be fooled.
Public blockchains, like Bitcoin, have c. The verifier does not learn the
no borders political, geographical, information and privacy is maintained.
or otherwise. Example: Zcash was the first
It is the first global financial cryptocurrency to implement zk-SNARKs,
network, operated the same for an adaptation of the ZKP.
everyone everywhere. A Zcash transaction can be validates but will
not reveal the sender, recipient, or the
3. Neutral amount being transferred.
Neutral is impartiality and the Private blockchains (permissioned) offer
absence of bias. privacy and confidentiality but ZKPs provide
Public blockchains like Bitcoin are an additional security layer.
neutral, operate on predefined Catalyst for Wall Street adoption.
protocols and algorithms. Benefits are both financial and non-
Central bank policy is influenced by financial.
a few decision makers with geo- Privacy (individual and institutional).
political motives. Verification of identity KYC and anti-money-
laundering (AML) rules.
4. Open
Open is freely accessible and Domain-specific Applications
without restrictions.
Blockchain is transforming the following
Public blockchains like Bitcoin are
domains into the best use cases of
based on the open source
technology:
innovation model.
Innovation happens rapidly,
a. Supply Chain
developers can access code without
One of the most complex and
permission.
inefficient markets with many
intermediaries
Zero-Knowledge Proof The most important challenges in
supply chains include these:
ZKP
Payments
One of the most important concepts in non-
Legal/contracts
financial use cases with blockchain.
Customs
Process in which one party (prover) proves
Provenance
information to another party (verifier)
Dispute resolution
without revealing the information.
International trade complicates
If the prover does not know the
issues even more.
information, it must be guessed.
Supply chain could be the best
The chance of repeatedly guessing correctly
blockchain use case.
approaches zero so the proof is probabilistic
not absolute. Cost reduction, social and
environment effects, and more.
JOONMA
Provenance is the chain and record Blockchain will give people control
of ownership. of their own identities.
It is the most important concept for The identity holder chooses what
supply chain transformation. data to share with whom. A
The manufacturing process from company would request certain data
source to final destination can be an and the identity owner grants
immutable record. permission to access only the
Consumers are demanding to know requested data via a wallet or an
the source materials, processes, app.
environmental impact, ethics, and An otherwise expensive KYC AML
more. process for banks can be monetized
This demand will force when they sell verifications of
transparency. identities of mutual customers.
Blockchain will add value by proving
who, what, when, where, and why
c. Distributed Cloud Storage and
at every step.
Retrieval
This will reduce direct costs and
significant time. Characteristics:
Push supply chains where
Transaction ledger with
companies forecast, produce goods
public/private key encryption, and
and wait for sales, will shift to pull
cryptographic hash functions for
demand chains where goods are
security.
produced when sold.
Encrypted data that only the owner
The shift to a pull demand chain is
has access to.
the next evolution in just-in0time
Chunked and distributed data.
(JIT) manufacturing.
High availability of data/files even if
Manufacturing supply will move in
a significant part of the network is
tandem with market demand.
down.
JOONMA
Industry-specific Applications: Healthcare
JOONMA
Provability of service process – GPS-linked Summary of Benefits, Values, and
process servers can now prove that service Opportunities
was performed and record interactions
Blockchain will fundamentally replace
Payment for the use of intellectual property
existing domains, industries, and business
– Proof of Play (PoP) can now be irrevocably
models.
recorded on the blockchain and musicians
Supply chain is complex and will likely take
will be better paid
decades to transform, whereas a
Land registry and deed management –
decentralized marketplace is ready to use
Titles recorded on a blockchain cannot be
but needs adoption.
changed without use of the owners private
Accounting needs more development to
key
realize the full potential of blockchain
Chain of evidence custody – Transport and
relating to double entry accounting.
storage of evidence can now be fully
The number of cases is infinite and the best
documented
use cases probably have not been
developed yet.
Business Use Case: Decentralized
Marketplaces
JOONMA