You are on page 1of 15

BLOCKCHAIN FUNDAMENTALS NOTES Cryptographers developed these precursors and

many of the elements of those projects were


DAY 1
incorporated into bitcoin.
Module 1: Evolution and Technology Concepts
Examples:
Fundamentals of Money/Currency
 David Chaum’s DigiCash
A. Money has three fundamental properties:  Wei Dai’s B-money
 A store of value (people can save  Adam Back’s Hash Cash
and use the money later)
The Bitcoin* blockchain solved the third party
 A unit of account (a common base
problem by cryptographically linking blocks of
for pricing and comparison)
transactions together and creating an incentive
 A medium of exchange (a way for
mechanism that rewarded participants who supply
people to use a common currency
the computing power to link blocks in a manner
for buying and selling from one
making it unfeasible to change the ledger.
another)
*Mother of crypto
B. Money also has several important
The Bitcoin White Paper Started It All
attributes:
 Durable (ability to last a long time Blockchain technology was first implemented with
before needing to be replaced) Bitcoin, the first cryptocurrency. The creator of
 Portable (something easily carried Bitcoin and blockchain technology was an unknown
from one place to another) person who goes by the pseudonym Satoshi
 Divisible (something easily divisible Nakamoto. In a white paper, the creator of
into smaller units) Bitcoin describes the value of the blockchain as
 Fungible (one unit is follows:
interchangeable with or the same as
any other unit) “Using digital signatures, hashing, and proof of
work to avoid double spending and fraud, the
A Brief Currency Timeline Bitcoin blockchain enables its participants to
confidently transfer value using Math for validation
Barter  Commodities (precious metals, salt, etc.)
and verification instead of trusted third party.”
 Coins (the original fiat currency)  Paper
(another fiat currency)  Plastic (credit and debit Blockchain, Cryptocurrency, and Bitcoin
cards)  Cryptocurrency (i.e. Bitcoin:
cryptographically secured) The implementation of blockchain was invented in
conjunction with Bitcoin in 2009. Bitcoin is a
Note: Most forms of money still exist today. cryptocurrency, a type of digital currency that is
secured against fraud and theft by means of
Pre-cryptocurrency History
mathematical encryption algorithms.
 There were many attempts dating back to
 Cryptocurrency derives its name from the
the 1980s to create some form of digital
use of cryptography to secure blockchains
cash but none of them eliminated third
without a third party and without having to
party financial institutions.
trust the participants.
 The projects failed for various reasons but
 Cryptocurrency is a new type of money that
mainly because of their reliance on third
anyone in the world can receive, send, and
parties.
earn by voluntarily participating in the
 The lack of trust in third parties is what
respective network.
motivated the cypherpunk movement and
these innovations.

JOONMA
 Bitcoin is the first cryptocurrency and the  No one owns Bitcoin, the public blockchain.
first use case of blockchain technology used Anyone can own Bitcoin, the
as a medium of exchange to store the cryptocurrency.
transfer value.
Bitcoin, Gold, and the Fundamentals of
Cryptocurrency and blockchain development has Money
geometrically evolved because of its open source
 Bitcoin is an excellent medium of exchange
nature. For example, open source code is freely
and store of value – Bitcoin has been called
available code on Github that can be reused for
digital gold (it far surpassed the value of an
other projects without permission.
ounce gold in 2017).
Not all blockchains are the same. A common  Bitcoin is a poor unit of account because of
error is to equate all blockchain technologies to the price volatility. – It would not work as a
Bitcoin blockchain. Newer, next-generation reportable currency and it would skew
blockchains not associated with Bitcoin do not financial statement comparisons.
necessarily share all the attributes of the Bitcoin  Gold is an excellent store of value, a
blockchain. moderate unit of account, and a poor
medium of exchange.
However, there would be no blockchain
technology of any sort without Bitcoin. The Bitcoin, Gold, and the Attributes of Money
better you understand Bitcoin, the better you will
 Bitcoin is highly durable, portable, divisible,
understand how other cryptocurrencies and
and fungible. – One Bitcoin is 100,000,000
blockchains work.
units and millions in value can be
Birth of Bitcoin and the Blockchain transported with one piece of data, the
private key.
October 31, 2008: Bitcoin design whitepaper
 Gold is highly durable and fungible. Gold is
titled “Bitcoin: A Peer-to-Peer Electronic Cash
not easily portable or divisible.
System” is published through a cryptography
 Gold has a 5,000 plus year history and
mailing list by Satoshi Nakamoto.
Bitcoin is less than 10 years old. – Bitcoin
January 3, 2009: Genesis block is mined (this is durability is being proven everyday while
block number 1 of the blockchain). gold is a rare metal that doesn’t oxidize.

January 9, 2009: Version 0.1 is released. Bitcoin and Blockchain: Additional


Characteristics
January 12, 2009: First Bitcoin transaction sent
from Satoshi Nakamoto to Hal Finney.  Peer-to-peer transactions
 No intermediaries or trusted third parties
Bitcoin and Blockchain Characteristics  Public ledger transparency (transactions
 Symbol is BTC. and ownership can be independently
 Each coin has 100,000,000 units, or 8 verified)
decimal places.  Sets the new standard for immutability
 Example of a bitcoin amount is 1.89543145 (best example in history)
BTC.  Eliminates some types of fraud
 Cryptographic, predictable, fixed monetary  No more PCI compliance (as required for
supply of 21,000,000 BTC. credit cards)
 Approximately, 17,000,000 BTC are in  Send a transaction 24/7 without permission
circulation as of April 2018. to anyone in the world

JOONMA
DAY 2 C. Consensus Mechanism
 A process using protocols and algorithms so
Blockchain: Core Components of the
nodes can agree on the same version
Technology
(state) of the blockchain without having to
Note: The core components are described in the know or trust one another.
context of Bitcoin.  The combination of a blockchain and a
peer-to-peer network is not inherently
A. The Ledger immutable, secure, or reliable. The
 A blockchain itself is the record of all consensus mechanism makes those
transactions attributes possible.
 A blockchain is a ledger of transactions,  The consensus mechanism is composed of
each of which records a change in the consensus protocol and the consensus
ownership of the native currency of a algorithms.
particular blockchain. Bitcoin is the native  This is where the phrase “blockchains are
currency of the Bitcoin blockchain. trustless” comes from. “Without knowing or
 Transactions are grouped into a block, trusting” is the magic sauce. With Bitcoin,
added to the blockchain and linked to all the trust is not totally eliminated but is the new
previous blocks with cryptography. Every standard for trustlessness.
block references the previous block with a
hash. Consensus Protocol and Consensus Algorithm
 Cryptography is the math used to prove no
 The consensus protocol is a set of
data has been changed. This is the basis for
rules governing how the entire
an immutable blockchain.
network operates and all the core
 The Bitcoin blockchain, for example,
components. Bitcoin has a protocol.
becomes one version of the truth.
 For example, the specification for
valid digital signatures.
B. Peer-to-Peer Network
 The consensus algorithm defines
 A large number of nodes (computers)
the steps to achieve consensus
connected over the internet in a
using the set of rules, the protocol
decentralized fashion.
 For example, verify the digital
 A large number of nodes that updates and
signatures of transactions. The
stores the complete synchronized version of
protocol is the rules and the
the blockchain.
algorithm is the instructions to
 Every node agrees on one state of the
enforce the rules.
blockchain at any point in time. This allows
anyone to independently verify a
D. Incentive Mechanism
transaction.
 The native currency (bitcoin, for example)
 The network distributes security among
that incentivizes participation to secure the
thousands of computers making it
decentralized network. The issuance of
infeasible for malicious actors to
Bitcoin is part of the consensus mechanism.
compromise the network.
 The Bitcoin blockchain is a permissionless
 Nodes can go offline without affecting the
blockchain because anyone can participate
network. One party is never relied upon for
as a node, a developer, or an end user
any of the benefits of the network which is
without asking anyone for permission.
the value proposition of decentralization.
 Remember: No one owns Bitcoin, the public
blockchain, but anyone can own bitcoin, the
cryptocurrency.

JOONMA
 Because Bitcoin is not a company, there is  A hashing algorithm takes an input of any
no CEO, no employees, no bank account, length information and reduces it to a string
no revenue, no hiring process, and no of characters to a uniform length.
contracts.  Bitcoin uses a hash protocol called SHA-
 Miners versus nodes: A full node downloads 256, which reduces any string of input
and maintains a full coy of the blockchain, information into a 256-character string,
validates blocks, and can relay transactions. known as a hash ID.
 Nodes must also use mining hardware and
Proof-of-Capacity (PoC)
mining software to become a miner. All
miners are nodes but not all nodes are  Another consensus algorithm used in
miners. blockhains that allows mining devices in the
 Miners provide security in the form of network to decide mining rights and
computer equipment that runs a mining validate transactions with the help of their
software with the expectation of reward. available drive space
 The larger the hard drive, the more solution
Consensus Algorithms: Proof of Work VS.
values one can store on the hard drive, the
Proof of Stake
better chances a miner has to meet the
Proof of Work Proof of Stake required hash value from his list, resulting
Miners provide Forgers or validators in a higher possibility of acquiring and
computational power (coin holders) stake gaining the mining prize.
to solve a coins to secure the  It has appeared as an alternative to the
mathematical puzzle. network. They act problems of high energy consumption in
honestly because they PoW consensus and coin hoarding in PoS.
risk losing their stake if
they act dishonestly
and do not follow the Proof-of-Activity (PoA)
rules.  A consensus algorithm used in Blockchain
Resource intensive Uses significantly less
technology that ensures that all
method to secure the resources to secure the
transactions occurring on the network of
network. A block network. Forgers get a
blockchains are genuine and authentic.
reward (bitcoin) is reward for staking the
given to the first miner coins they own.  PoA consensus, which is a combination of
who solves the PoW and PoS, ensures that all miners arrive
challenge of the proof at a consensus.
of work problem.  An attempt to consolidate the best features
Miners also earn of PoW and PoS systems.
transaction fees.  Conditions for a PoA consensus:
Block rewards over Staking rewards over a. Validators have to confirm their real
time can be estimated time can be estimated identities.
on the computing based on the coins b. A candidate must be ready to invest and
power supplied by a staked by one owner to put his reputation at stake. A rigorous
miner to total power of total coins staked by
selection process decreases the danger
all miners. everyone.
of choosing shady validators and
encourages long-term commitment to
The Power of Hashing Algorithms the Blockchain,
c. A method for electing validators must
 Hashing is a process used to encrypt data, be equal to all competitors.
prevent tampering, and verify data has not
been changed.

JOONMA
d. The identity of validators must be Directed Acrylic Graph (DAG)
verified to maintain the integrity of the
 A Digital Ledger Technology (DLT) variation
Blockchain.
that has been presented as a Blockchain
 An example of PoA is Decred
alternative.
Proof-of-Weight (PoWeight)  Due totheir arrangement in a directed
graph, the cooperating nodes of a DAG are
 A consensus algorithm based around the
capable of cross verification.
Algorand consensus model.
 The use of DAG improves the network’s
 In other words, we can say that this is a
scalability and lowers transaction fees by
notable upgrade of the PoS system in
allowing fee-free nano-transactions
which the more tokens one owns, the
 Does not require miners or the underlying
better their chances are to discover more
energy-intensive infrastructure since it
but this whole idea makes the system
achieves consensus without implementing
somewhat biased.
the classic hash-protected PoW.
 Tries to solve such a biased nature of the
 Significant features of DAG:
PoS.
a. Scalability: DAG is well-known for its
 Instead of using your portion of tokens
limitless scalability. In contrast to
owned in the network to reflect your
previously distributed ledgers, DAG
chance of “discovering: the next block,
improves scalability as network grows.
some other weighted value is employed.
b. Compatibility: By implementing
Advantages Disadvantages transaction fee-free strategies, DAG, as
PoWeight is known It has proven a decentralized channel, allows
for its super challenging to get participants to make fast micro or even
scalability and high consumers enthused nano-transactions.
customization. The about the concept c. Resilient: Using the Winternitz one-
fundamental due to a lack of time signature mechanism, DAG makes
algorithm can be incentivization, as the the underlying distributed ledger less
adopted by the protocol does not pay susceptible to quantum computers with
developers to allow users for maintaining
higher level computing characteristics.
for the formation of anode and validating
d. Validation: DAG’s quantum resistance
committees. transactions.
allows for masked authenticated
messaging and parallelly lined
Leased PoS (LPOS) transactions, which is a great way to
transform data using encryption and
 Allows users to lease out their interests to
authentication techniques.
miners. Mining nodes, in return, share some
part of their earnings with the leaser. DAY 3
 A novel way to benefit from mining without
Crypto Terms
really needing to mine.
 Considered to be a more powerful branch Address a unique identifier used to
of PoS as it extends the capabilities of PoS send and receive
and facilitates additional features such as cryptocurrency
balance leasing, passive income Airdrop distributing cryptocurrency
generation, and secure transactions for free as a market strategy
 The Waves platform currently supports Altcoin alternative cryptocurrencies
LPoS to Bitcoin

JOONMA
All time high the highest or lowest price a Fear of Missing When someone is
(ATH)/All Time cryptocurrency has reached Out (FOMO) concerned that they might
Low (ATL) miss a good buying or
Arbitrage buying and selling the same selling opportunity
asset on two exchanges to Fear, Negative sentiment about
profit from small price Uncertainty, the market, usually spread
differences and Doubt in the media
Bagholder Someone who missed and (FUD)
opportunity to sell at a high Fiat Currency that is
price and now owns low government issued legal
value cryptocurrency tender, unlike
Bear Someone who is pessimistic cryptocurrency
about the market or coin Fork A change in how the
value blockchain operates that
Bitcoin (BTC) A digital currency launched can be backwards
in 2009 that boomed the compatible (soft fork) or not
cryptocurrency market (hard fork)
Block A group of transactions Hardware A physical device used for
made in a blockchain Wallet storing cryptocurrency keys
Blockchain A globally distributed digital (usually USB connected)
record of transactions; Hashing Transforming chunks of
permanent and secure data into unique test strings
Bull Someone who is optimistic that are nearly impossible to
about the market or asset decipher
value Hodl Slang term for ‘hold’, to
Buy the Dip Buying cryptocurrency keep cryptocurrency instead
(BTD) when the price has fallen of selling it
Cold Wallet A digital wallet that is not Hot Wallet A digital wallet that is
connected to the internet connected to the internet
Cryptocurrency A digital currency that uses Initial Coin A method of raising funds
cryptography to secure Offering (ICO) for a new project in
wallets; often decentralized, exchange for a token
though not always Market The total number of coins
Cryptography The method of using code Capitalization in circulation multiplied by
to convert information and individual coin price
communications into an Memory Pool Unconfirmed transactions
unreadable format (Mempool) held until they are picked up
Decentralized No entity holds one control by a node on the network
over the network; anyone Mining Using computer hardware
can join (see ‘node’) and to process and validate
blockchain records are cryptocurrency transactions
stored in many locations Mining Pool Miners combining their
Ethereum A cryptocurrency and mining rig power to increase
decentralized computing the chances of closing the
platform launched in 2015 block and receiving the
Exchange A platform to buy, sell, and reward for it
invest in cryptocurrency. Mining Rig A computer built specifically
Exchanges can be for mining cryptocurrency,
centralized (coinbase) or usually containing high
decentralized (unstoppable) specification components

JOONMA
Mooning When a cryptocurrency’s its own blockchain and
value is rapidly rising in a represents an asset or utility
short period of time Transaction Movement of
Node A computer that connects to (TX) cryptocurrency from one
the cryptocurrency network address to another
and becomes one of the Whale Someone who owns lots of
network participants cryptocurrency
Peer-to-Peer When two entities/devices Whitepaper An authoritative document
(P2P) communicate directly to explain a new
without a third party cryptocurrency
Private Key Secret identifier that proves
ownership of a wallet
Proof of Stake Method used to process Cryptocurrency Wallets
(POS) transactions with miners  A wallet is software that stores private key
having more control based
and their associated public keys and allows
on how much
users to send transactions to the peer-to-
cryptocurrency they hold
peer network and receive cryptocurrency
Proof of Work Method used to process
(POW) transactions, requiring from others.
completion of complex  Cryptocurrency is not actually “stored” in a
mathematical equations by wallet although it is often referred to this
computers way. Wallets may contain more than one
Public Key Generated by the private cryptocurrency depending on the wallet.
key and turned into an Cryptocurrency actually “resides” on a
address generally used to respective blockchain and private keys are
receive cryptocurrency used to change the ownership. The record
Pump and Fraudsters spreading false and the cryptocurrency become one
Dump info to increase a and the same.
cryptocurrency’s value  The Law of private keys: If you control
(pump), then cashing out
your private keys, you own your
(dump)
cryptocurrency and if you do not control
Satoshi The pseudonym given to
your private keys, you do not own your
Nakamoto the person or persons who
created bitcoin (their cryptocurrency.
identity is unknown)  Example: Smartphone apps (Mycelium,
Satoshis The smallest unit of Bitcoin; Edge), online web wallets (blockchain.info),
one Bitcoin equals hardware wallets (Ledger, Trezor)
‘100,000,000 satoshis’
Shilling Spreading false information
to increase the price of a The Push VS. Pull Paradigm Shift
cryptocurrency
Software Wallet A method of storing  In the traditional financial model, the buyer
cryptocurrency keys within gives authority to the sellers to pull money
software files on your from the buyer’s account.
computer or mobile device  Buyers hand over their credit card
Ticker An abbreviation to identify a information for a credit card transaction or
cryptocurrency (for hand over their bank account and routing
example, “BTC” for Bitcoin) numbers for an ACH or wire transaction to
Token Used interchangeably with the seller. This is where PCI compliance
“coin”. Technically, a subset comes in because companies attempt to
of cryptocurrency that has
securely store credit card information for

JOONMA
millions of customers in the case of big box
stores.
 This exposes the buyer to significant risk of
fraud and unauthorized transactions. The
Target, Home Depot, TJ Maxx and other
credit card hacks demonstrate that storing
PII information on behalf of buyers
(customers) is an exercise in futility.
 Funds cannot be stolen from a bitcoin public
address but funds can be easily stolen from
credit cards and bank accounts.
 A cryptocurrency public address does not
 Custody, responsibility, and control can also
need to be secured. A public address with
fall somewhere in the middle of the
$1,000,000 in bitcoin could be posted on a
continuum:
billboard and no one can steal the funds.
a. Centralized crypto exchanges where
 This is one of the most important concepts
trading takes place are akin to financial
in understanding the transformative power
intermediaries.
of blockchain technology and
b. Blockchains that are not fully
cryptocurrencies.
decentralized (permissioned
 Fraud risk in the pull model is eliminated
blockchains) fall in the middle. For
by the paradigm shift to the pull model.
example, a Fortune 500 that deploys its
own blockchain or joins an industry
consortium blockchain like R3. There
The Custody, Responsibility, and Control are no intermediaries but the
Continuum for Assets blockchains are more centralized.
 Traditional financial institutions maintain  True custody, on the left most side of the
custody of their customers’ assets. Custody continuum, only happens when the owner
means they have responsibility and control holds the private key of a fully decentralized
of those assets on behalf of their cryptocurrency like bitcoin.
customers. This is the right side of the DAY 4
continuum.
 Customers (individuals or businesses) Blockchain Process and Technical Controls:
relinquish control to financial institutions Overview
who have custody of their assets. Custody,
 The potential for blockchain to radically
responsibility, and control reverts back to
transform auditing and assurance will be a
the individual or business entity when third
challenge in the process of realizing all the
parties are eliminated by a peer to peer
benefits.
decentralized network like bitcoin.
 The profession will undoubtedly evolved.
 Owning cryptocurrency is synonymous with
This evolution will affect the role of CPA
having custody and therefore 100%
auditors as well as the skill sets necessary
responsibility and control. This is the left
for auditors to remain relevant and
side of the continuum. Someone can have
competitive while continuing to provide
control of an asset and be irresponsible
value.
which is why both of these concepts are
 Assurance has historically been delivered
important.
one-to-one between the auditor and the
audit client. Blockchains may not be
controlled by the audit client yet require

JOONMA
assurance as a substantial tool used for offerings. A production ready end-to-end
producing financial statements. service, and will need updated SOC reports.
 Professional judgment is a major part of the  Auditors will have unique challenges for
CPA value proposition in delivering services user entities who use blockchains because
based on the evaluation of management’s they are not single entity service
estimates. Which are significant basis for organizations in the traditional sense of a
financial statements. Blockchains will not company like Microsoft.
eliminate this professional judgment.  Existing standards cannot be applied to
 Errors and fraud will still exist regardless of blockchains so process and technical
blockchain and sufficient audit evidence still control testing becomes more important
has to be obtained. The risk of off-balance until blockchain standards begin to emerge.
transactions in the form of off-chain
transactions will still occur and have to be
Process Controls and Technical Controls
assessed.
 CPA auditors provide reasonable assurance Process controls are application controls and
that financial statements are fairly stated. manual controls over transaction processing.
When blockchain fulfills the promise of real-
 Organizations have more direct control over
time auditing and eliminates non-value
implementation of these controls related to
activities, test of controls will still be needed
blockchains and cryptocurrencies.
to provide that reasonable assurance.
 Understanding and testing controls is going
to require more technical skills and Technical controls are based on logical
knowledge, which is both a challenge and programming, which is also part of the IT general
an opportunity. Professional skepticism will controls of the IT environment.
be even more important with blockchain
 A public blockchain is not going to have an
technology and CPAs are best poised to
audit, SOC, or lend itself to technical control
provide blockchain assurance.
testing so reliance has to be obtained
directly.
System and Organization Controls  There will likely need to be another solution
layer to aid auditors with technical controls.
 Many companies have outsourced their
For example, mechanized proofs are
managerial services for economic or other
protocols that mathematically prove a
reasons. The companies are called user
smart contract will execute as designed.
entities and the outsource entities are
called service organizations in the context
of SOC. Process Controls
 The AICPA issued SOC guidance for user
Process controls can help mitigate the limitations of
entities to assess how internal controls of
verification.
service organizations affect their financial
reporting and security and privacy of  Maintaining the trail of information is as
information. important as securing assets.
 Service organizations such as Amazon AWS,
Google Cloud Platform, and Microsoft Azure
Process controls are needed to increase the
are single clearly identifiable and auditable
security of using and storing cryptographic assets.
entities.
 These same cloud based service providers  Custody, responsibility, and control of
now have blockchain-as-a-service (BaaS) assets shifts to the end user.

JOONMA
 If private keys, the digital pen for signing  Auditors and accountants have to
transactions, are lost, stolen, or deleted, understand these controls in order to gain
assets will be gone forever. reasonable assurance that blockchains are
working as intended.
 Understanding technical controls will also
Questions that auditors, accountants, and clients
require working with technical experts like
should ask in developing and assessing process
controls: developers who design and implement
these controls.
 Who should have access to
cryptocurrencies?
Blockchain technical controls that need to be
 Who should be responsible for recording understood and assessed include these:
and capturing the transactions?  Consensus mechanism: Proof of Work
 How should cryptocurrency be secured but or proof of Stake
on our use case?  Block size and transactions throughput:
 What kind of physical security should be How many megabytes
used to backup private keys?  Cryptographic algorithms used: ECDSA,
 What exchanges should be used to buy and SHA256
sell cryptocurrency?  Transaction validation parameters:
 Who is responsible for deciding when to buy Valid signatures
and sell?  Mining difficulty: Hashing or computing
 Who has and should have read and write needed to solve blocks
permission for permissioned blockchains?
 Standard infrastructure controls such as
These are only a few of the controls relating to the
virus checking schedules, 0-day exploit
security that an entity would need to address.
remediation, maintenance schedules,
Comprehensive process controls should include the capacity and backup management still have
following: to be managed.
 A distributed ledger node within a private
 Private key storage and backup
blockchain is still a combination of data and
management
software running on one or more servers,
 Physical and environmental security: safes,
often within a virtual private network (VPN).
door access controls
 IT general controls will continue to apply to
 Cryptographic asset controls: who has
the operational environment.
access and from where
 Implementation of multi-sig wallets: N-of-M
signers to send funds Responsibility Controls
 Password managers to delegate access to
 Who is responsible for controls with so
wallets and exchanges
many different blcockchain solutions
 Access to read and write to ledgers which
available?
may or may not be the same as sending
 A public permissionless blockchain is
cryptocurrencies
not a company; there is no CEO and no
employees. It is a decentralized
Technical Controls platform; therefore, responsibility for
controls is spread among the
 The existence of blockchain technology in
participants, such as the nodes, miners,
an organization does not remove the need
and developers.
for knowledge of the technical controls
 A consortium permissioned blockchain
within it.
is more formal in nature and made up

JOONMA
of members who are granted Blockchain Benefits, Values, and
permission; however, the responsibility Opportunities
for controls is still shared and spread
 New applications of blockchain allow one
among the members.
party to prove information without
revealing it. Organizations reduce risk by
Accounting Aspect not having to store information and
 Holdings of a cryptocurrency meet the accountants get the value of verifying all
kinds of information in the same way.
definition of an intangible asset. If
 Blockchain eliminates reconciliation
cryptocurrencies are held for sale in the
ordinary course of business, then the entity because transaction settlement time
approaches zero and entities will have one
applies the inventories standard.
version of the truth with shared ledgers.
 All aspects of supply chain form source to
Initial Recognition and Measurement final product will be linked and therefore
 An intangible asset is recognized when: verifiable.
- it is probable that future economic  Accountants and auditors will have better
benefits that are attributable to the tools and provide greater value added
asset will flow to the entity; and services.
- the cost of the asset can be measures
reliably Blockchain Benefits and Value
 If an intangible asset is acquired in a
 Increased transactional trust
business combination, then these criteria
 Reduced fraud, increased security
are assumed to be met. If an intangible
 Frictionless, low cost transactions, and
asset is acquired in a separate acquisition,
faster processing times
then the probability criterion is assumed to
 Independent verification
be met and the reliable measurement
 Owner-controlled assets
criterion is usually met.

The Four Characteristics of the Bitcoin


Blockchain (and many other public
blockchains)

The benefits, value, and opportunity of blockchain


technology also come from these characteristics.

1. Censorship Resistance
 Censorship is the suppressor of
speech and information.
 Public blockchains like Bitcoin are
censorship resistant.
 There is no third party or centralized
control which can “censor” the
network.
 Any parties with the ability to censor
can and will use it for their own
benefit. The power and control to

JOONMA
censor usually resides with a few  Based on the algorithm that returns either
people or organizations. a true or false output, there are three parts
to ZKP:
2. Borderless a. If the prover’s statement is true, the
 Borders are geographical verifier will know if it is true.
boundaries for sovereign states and b. If the prover’s statement is false, the
legal jurisdictions. verifier cannot be fooled.
 Public blockchains, like Bitcoin, have c. The verifier does not learn the
no borders political, geographical, information and privacy is maintained.
or otherwise.  Example: Zcash was the first
 It is the first global financial cryptocurrency to implement zk-SNARKs,
network, operated the same for an adaptation of the ZKP.
everyone everywhere.  A Zcash transaction can be validates but will
not reveal the sender, recipient, or the
3. Neutral amount being transferred.
 Neutral is impartiality and the  Private blockchains (permissioned) offer
absence of bias. privacy and confidentiality but ZKPs provide
 Public blockchains like Bitcoin are an additional security layer.
neutral, operate on predefined  Catalyst for Wall Street adoption.
protocols and algorithms.  Benefits are both financial and non-
 Central bank policy is influenced by financial.
a few decision makers with geo-  Privacy (individual and institutional).
political motives.  Verification of identity KYC and anti-money-
laundering (AML) rules.
4. Open
 Open is freely accessible and Domain-specific Applications
without restrictions.
 Blockchain is transforming the following
 Public blockchains like Bitcoin are
domains into the best use cases of
based on the open source
technology:
innovation model.
 Innovation happens rapidly,
a. Supply Chain
developers can access code without
 One of the most complex and
permission.
inefficient markets with many
intermediaries
Zero-Knowledge Proof  The most important challenges in
supply chains include these:
 ZKP
 Payments
 One of the most important concepts in non-
 Legal/contracts
financial use cases with blockchain.
 Customs
 Process in which one party (prover) proves
 Provenance
information to another party (verifier)
 Dispute resolution
without revealing the information.
 International trade complicates
 If the prover does not know the
issues even more.
information, it must be guessed.
 Supply chain could be the best
 The chance of repeatedly guessing correctly
blockchain use case.
approaches zero so the proof is probabilistic
not absolute.  Cost reduction, social and
environment effects, and more.

JOONMA
 Provenance is the chain and record  Blockchain will give people control
of ownership. of their own identities.
 It is the most important concept for  The identity holder chooses what
supply chain transformation. data to share with whom. A
 The manufacturing process from company would request certain data
source to final destination can be an and the identity owner grants
immutable record. permission to access only the
 Consumers are demanding to know requested data via a wallet or an
the source materials, processes, app.
environmental impact, ethics, and  An otherwise expensive KYC AML
more. process for banks can be monetized
 This demand will force when they sell verifications of
transparency. identities of mutual customers.
 Blockchain will add value by proving
who, what, when, where, and why
c. Distributed Cloud Storage and
at every step.
Retrieval
 This will reduce direct costs and
significant time. Characteristics:
 Push supply chains where
 Transaction ledger with
companies forecast, produce goods
public/private key encryption, and
and wait for sales, will shift to pull
cryptographic hash functions for
demand chains where goods are
security.
produced when sold.
 Encrypted data that only the owner
 The shift to a pull demand chain is
has access to.
the next evolution in just-in0time
 Chunked and distributed data.
(JIT) manufacturing.
 High availability of data/files even if
 Manufacturing supply will move in
a significant part of the network is
tandem with market demand.
down.

b. Digital Identity and KYC


d. Prediction Markets
 ZKPs and the concept of verifying
 Are currently betting markets that
information without revealing it will
incentivize specific behavior.
radically change identity
 Improve decision-making.
management.
 Use cases include sporting events and
 Financial institutions have to verify
contract settlement.
personally identifiable information
 The “wisdom of the crowd” gives value
(PII) for KYC regulations.
to prediction markets.
 All other vendors for consumers and
 Widespread use of this application will
businesses alike manage some level
strengthen efficiencies, decrease costs,
of PII.
and provide a high degree of security to
 The same PII gets saved over and
the market.
over again in centralized databases
that are giant attack silos.
 Identity theft for both consumers
and businesses costs billions Industry-specific Applications
annually. a. Healthcare c. Accounting
 Identity is controlled by institutions b. Tax d. Legal
and not by the identity holder.

JOONMA
Industry-specific Applications: Healthcare

Efficient and accurate compliance with the Drug


Supply Chain Security Act is a current, real-world
example of blockchain disruption of this industry.
 Electronic health records (EHR)  This is the journal entry Company A and
 New interfaces that enable patient data Company B have to make in their respective
sharing accounting systems:
 High availability of accurate information

Industry-specific Applications: Accounting

 The ownership and the transactional history


becomes one and the same.
 Bank reconciliations become obsolete,
transaction clearing is essentially reduced
to time zero.
 In the traditional model, entities keep their Industry-specific Applications: Tax
own version of events in their own
accounting system. In the blockchain  There are two sides of taxation:
model, entities will have a shared version of a. Taxpayer compliance
the truth. b. Revenue collection (tax authorities)
 For example, a vendor customer  Some state-level tax authorities in the US
relationship will share one version of are accepting bitcoin and likely other
transactions and potentially eliminate cryptocurrencies.
reconciliation.  Taxpayer compliance and tax authority
 Accountants have a greater opportunity for collections will eventually merge.
value added services as non-value added  Cryptocurrency sales tax and use case:
tasks are automated or eliminated. - Sales tax is remitted in real time.
 Currently, the Bitcoin blockchain is an - Sales tax is remitted on per sale basis.
immutable ledger but it is not inherently a - Taxpayer compliance is automatic.
double entry accounting system.  Arizona, Georgia, and Illinois have bills in
 A blockchain is more like a single entry various stages for accepting Bitcoin and
system recording only the “cash” side of the other cryptocurrencies for tax payments.
journal entry between two parties.
 “Triple entry accounting” is a term to
describe double entry accounting plus Industry-specific Applications: Legal
blockchain, with blockchain as the third Blockchain-enabled Ricardian contracts is a hybrid
entry. method for both computer execution and human
interpretation of contracts.
Industry-specific Applications: Accounting
 Smart contracts have the potential to
Journal Entry
revolutionize the practice of law:
 Blockchains are inherently a single entry a. Powered by Ethereum (blockchain 2.0)
system. The following is a bitcoin b. Eliminate the need for human-based
transaction sent from Company A to contract execution
Company B for a $1,000 computer. This is c. User defined programs that run on the
the entry on the blockchain: blockchain

JOONMA
 Provability of service process – GPS-linked Summary of Benefits, Values, and
process servers can now prove that service Opportunities
was performed and record interactions
 Blockchain will fundamentally replace
 Payment for the use of intellectual property
existing domains, industries, and business
– Proof of Play (PoP) can now be irrevocably
models.
recorded on the blockchain and musicians
 Supply chain is complex and will likely take
will be better paid
decades to transform, whereas a
 Land registry and deed management –
decentralized marketplace is ready to use
Titles recorded on a blockchain cannot be
but needs adoption.
changed without use of the owners private
 Accounting needs more development to
key
realize the full potential of blockchain
 Chain of evidence custody – Transport and
relating to double entry accounting.
storage of evidence can now be fully
 The number of cases is infinite and the best
documented
use cases probably have not been
developed yet.
Business Use Case: Decentralized
Marketplaces

 Marketplaces and bidding sites like eBay are


centralized.
 These platforms have the following issues:
- Charge significant transaction fees
- Charge listing fees
- Transactions conducted by the third
party (eBay)
- No reward for user loyalty
 A decentralized escrow-based marketplace
can solve all of these issues.
 A decentralized peer-to-peer marketplace
- Charges low or no transaction or listing
fees
- Is P2P, no third party
- May reward users with platform profits
- Facilitates buyer sending
cryptocurrency to an escrow (smart
contract) and seller releasing funds
after receiving goods or services
 Examples: Open Bazaar and Syscoin
 Agreements recorded as clockchain based
Ricardian contracts
 Payment made in Bitcoin, Bitcoin Cash, or
Zcash
 Escrow-based
 Moderators for problem resolution

JOONMA

You might also like