Professional Documents
Culture Documents
Inclusion
Unit 1: Mastering
Blockchain Technology for
your Business
Symbols
Definition
Further Reading
Key Message
!
Example
Exercise
Video
1. edition 05/2020
© 2020 Frankfurt School of Finance & Management gGmbH, Adickesallee 32-34, 60322
Frankfurt am Main, Germany
All rights reserved. The user acknowledges that the copyright and all other intellectual
property rights in the material contained in this publication belong to Frankfurt School of
Finance & Management gGmbH. No part of this publication may be reproduced, stored in
a retrieval system or transmitted in any from or by any means, electronic, mechanical,
photocopying, recording or otherwise, without the prior written permission of the publisher.
Violations can lead to civil and criminal prosecution
Content
1 Introduction .........................................................................8
Abbreviations
BTC Bitcoin
LTC Litecoin
PoW Proof-of-Work
Dr. Philipp Giese Dr. Philipp Giese works as Chief Analyst in the core team
Chief Analyst of BTC-ECHO, Germanies leading magazine for crypto
BTC Echo assets, and specializes in research, chart and technology
analysis. Before joining BTC-ECHO, he gained many
years of professional experience as a project manager,
product developer, and technological consultant.
Sven Wagenknecht Sven Wagenknecht is Blockchain expert and editor-in-
Editor-in-chief chief at BTC-Echo. In addition to his studies in political
BTC-Echo science and economics at the University of Münster, this
trained banker has held various positions in a leading
management consultancy and the Federal Ministry of
Economics.
Alex Witt Alex co-founded SWFT Blockchain, a one-stop cross-
CFO and Co-Founder SWFT chain transfer protocol. He was an early investor in
Bitcoin and is actively using blockchain and AI
technologies to solve hard problems.
We are delighted that you have chosen our course on Blockchain Business Strategy to learn about
blockchain technology and how this technology can apply to various business models and processes.
Unit 1 will explain the basics of blockchain and distributed ledger technology (DLT). The focus of this unit
is to understand the basic principles of the technology, its opportunities and limitations.
Unit 2 will deep dive into crypto assets and discuss different forms of cryptocurrencies, how one can
invest in them, how they are stored, and also how they are issued.
Unit 3 will review how blockchain may be implemented to solve business problems and create additional
value via its various use cases.
Each unit ends with a set of multiple-choice exam questions that you can answer online.
The course was created by Christian Hecker, a lecturer at the Frankfurt School of Finance and Management.
Christian has extensive experience in banking and with the theoretical and practical use of new
technologies. Christian has trained professionals in various emerging and developed countries and has held
different banking positions in China, Singapore, India, and Germany.
A team of various blockchain specialists have contributed to this course and have shared their experience
through practical examples.
This Unit will focus on basic aspects of a blockchain, when one should be used, and the various benefits
and limitations of the technology.
Where does blockchain offer added value in finance from a global perspective?
First of all, we would like to use selected examples to show where in the world blockchain
technology, due to its disruptive nature, enables new business models and can provide answers
to current questions and problems.
What are blockchains and distributed ledgers?
A common mistake in understanding blockchain technology is the synonymous use of the terms
distributed ledger and blockchain. Here we would like to create a clear distinction and a better
understanding.
What are the basic components of a blockchain and how do they work?
In order to effectively utilize the benefits and positive features of blockchain and meaningfully
transfer them into use cases, an understanding of the technical origins of these features must be
understood first.
What are Smart Contracts?
Based on the technical characteristics, the combination of blockchain and smart contracts will be
shown and their advantages compared to traditional automation will be presented
What is the current regulation?
Also a consideration of the currently valid and also still outstanding regulations are discussed
What are the strengths and weaknesses of blockchain?
Even the blockchain technology is not a one-size-fits-all solution, so we will look at both the
benefits and limitations of a blockchain solutions
Globally around 1.7 billion people remain unbanked without having any access to financial institutions. They
lack the most basic financial services including having a bank account, no methods to procure a credit or
debit card, or not even have access to loan aids from banks for the most basic services. Most of the
unbanked population live on a wage of less than $5 per day
Over the years, a few service providers have made an attempt to provide alternative financial services and
in-part have also been successful. Vodafone’s M-Pesa - which is a mobile phone-based money transfer,
financing and microfinancing service, launched in 2007 - has been one such venture that is used by almost
2/3rd of Kenya’s population today. However, the network still runs a cash-based service, operates with a
number of intermediaries, and costs for providing such services are high.
Blockchain technology is a concept whose components have been around for years but it gained popularity
with the advent of bitcoin in 2008. More than a decade later, blockchain is being explored for a number of
applications in banking, finance, healthcare, real estate, donations, supply chain, logistics, voting, and
more.
Essentially, blockchain is a decentralized ledger that records any kind of transaction, data, documents, etc.
There is no central authority that controls or approves the recorded data. Instead, only the legitimacy of a
transaction is verified and, through a mechanism called the "consensus mechanism", the transaction is
approved as part of the information held by the participants in the network.
Blockchain enables us to create a ledger that records and stores the digital identities of each individual.
Profiles can be created using biometric data and these digital profiles can then be stored on the blockchain.
Banks and financial institutions, with permission, can access the data and further give them access to bank
accounts. Moreover, this builds a more efficient system for Know Your Customer(KYC) procedures and
further reduces the labour-intensive work of collecting the same data multiple times.
Additionally, this would allow unbanked to access global transactions without paying the percentage that
goes towards banking fees, currency conversion, and intermediaries who process cross border transactions.
Virtual currencies would enable instantaneous cross border transactions along with a substantial reduction
in the remittance fees.
Blockchain provides tracking and tracing of the funding allocated by the government. Through blockchain,
one can track if the money actually made it to the end-users. This is because blockchain facilitates an
immutable and transparent ledger that records each step taken. The ledger allows anyone to track the
history of the funds and verify the authenticity of transactions.
Virtual currencies backed by blockchain can be instantaneously transferred via smartphone devices. With
mobile banking and payment solutions, we can accelerate bringing the unbanked in a formal financial
ecosystem. Moreover, blockchain ensures that transactions are secure through cryptographic measures.
This is an innovative approach for merging finance and technology to optimize the results.
By working through the following chapters, you will gain an overview of Distributed Ledger Technology,
particularly in its variant the blockchain. Furthermore, we will go into more details regarding the security and
immutability of the distributed ledgers and smart contracts.
One way to address this effect is to build decentralized infrastructures and information structures. In this
case, there is not one central node but many nodes that are linked to each other. Other nodes are then
often attached below these nodes. Security mechanisms can be built in to prevent compromised
information from being broadcasted, for example, by having a node perform a consistency check before
forwarding information to subsequent nodes. The failure of individual nodes may also lead to the failure of
a subarea, but not to a total failure.
Distributed networks offer another improvement. They form a very balanced network due to their strong
interconnection of the nodes. Data storage and often even the execution of tasks are often carried out in a
distributed manner. Therefore, there are no central structures here, neither in the infrastructure nor in the
handling of the data. This network variant is very robust against manipulations as well as against failures,
since a change of the databases must be carried out at all nodes and each node is able to check incoming
information. The strong networking ensures that the failure of individual nodes is often even compensated
automatically and the integrity of the entire network remains. This is possible, among other things,
because the nodes are equivalent. Therefore, a distributed network forms the basis for peer-2-peer (P2P)
networks in which equivalent nodes can exchange data with each other.
Consensus
The ubiquitous agreement of all parties to follow certain rules (a consensus
algorithm) to maintain a shared public ledger.
Hashgraph: In contrast to a blockchain based solution, there are no blocks of transactions, rather
transactions happen parallel, simultaneously and the order of these transactions and calculated
after the fact with a distributed hash table.
Holochain: Agent-centric approach, rather than data-centric. There is no consensus over the entire
network, rather each agent on the network stores their own localized “blockchain” with a unique
digital signature.
To assure our students don’t run into the same common pitfall we’d like to explicitly state here that Bitcoin
is an example of a cryptocurrency that utilizes blockchain technology. However, blockchain as a technology
and method for storing data within blocks of transactions is independent of Bitcoin, and even cryptocurrency
in general.
In the previous articles, you learned about the concept of distributed and decentralized ledgers and
consensus among peers within networks. Now, we’ll explore the structure of blockchains, their components,
and general functionality/use.
Further Reading
How to Time-Stamp a Digital Document (1991) Link
Satoshi Nakamoto: Bitcoin a peer-to-peer electronic cash system (2008) Link
The Blockchain
A blockchain is a growing list of
data/records, called blocks, which are
linked using a special cryptographic
algorithm. Each block contains a header.
The rest of its size consists of a long list
of transaction/information data.
As a result, we get a feature of blockchains called immutability. Immutability simply means that once
information has been confirmed on the chain, it is nearly impossible to alter the information within that block.
This is great for recordkeeping, timestamping and general fraud detection, and one of the biggest use cases
for blockchains.
As we have illustrated before, hashing is the calculation of a digital fingerprint from an arbitrarily large data
set. In this Process an input of any length, whether it be one character such as the letter ‘z’ or a full sentence
“Mary had a little lamb” or even an entire document, pdf, financial record, the list goes on, and putting that
data into a fixed size string. This ensures that all incoming data has standard formatting. This is done with
a complex mathematical formula called a hash function, but that is a bit too complex for now. All that you
should know is that the input determines the hashed output. For example, ‘z’ might be hashed as “a604d”
and a document might be hashed as “m3s96”. In this scenario, whenever ‘z’ is hashed, it will always result
You can try this yourself by going on https://hashgenerator.de. For this example, the very commonly used
SHA-256 algorithm, will be selected. For this we will create a hash of the phrase: “Blockchain is the future.”
Output:005b40eaff58ce44df9afeb7a26836377916ca90e7c58b41777f74b3ae433ddf
This hash will always be the same if we take the same input. By simply switching from a “.” to an “!” we will
see a completely different result.
The phrase: “Blockchain is the future!”
Output:6dbed968d54eb03318a6a6157d79e704d2739469f5362189c6e1569c3ab5fa4d
This is how data is encrypted within a block. In the case of the Blockchain it is not only our phrase but the
different information that can be stored in a block as explained above.
Additionally, hashed data is deterministic. This means by using the same hashing algorithm and the same
input; the output will always be the same. This results in the already mentioned digital fingerprint. Therefore,
data and their corresponding hash values can be used to prove that the data has not been manipulated.
This is done by hashing the data again and comparing the calculated hash with the specified one. If the data
has not been manipulated, the hash values must match.
New transactions are constantly streamed into the blockchain network and then reside in the transaction
pools of the nodes. They can then be picked up again here to form a new block.
Wrap up/understanding:
In Bitcoin, the proof of work only serves as a proof of a performed work, so that not everyone scatters
arbitrary and possibly manipulated blocks into the network. Therefore, contributing blocks is expensive and
so the effort should not be used frivolously to form manipulated blocks that may not be accepted and thus
the computational cost would be wasted. But how does the agreement on the new data status in the network,
the consensus, come about?
This is in the interpretation of the bitcoin blockchain, the fork in the blockchain, which is the longest and into
which therefore the most work has flowed is accepted as "the truth" by all.
Currently, our society relies upon trusted intermediaries for almost everything we do. When we start to
reflect on our daily life, this becomes a bit more obvious. As an example, simply buying bread at the
market requires quite a few intermediaries. For instance, you trust the store that there bread isn’t expired
because of their labels, you trust the bus that you took to the store to be on time because their schedule
said they would, and you trusted your bank to keep an accurate record of the funds in your account to
make sure that you have enough money to buy the bread.
Now this all seems normal to us because we’ve built up relationships with these people, we know our
banker, we know our bus drivers, and we know the bakers, so we can depend on them. However, online
things are a bit different. Interactions are pseudonymous; as there isn’t this inherent need for reliability that
is prevalent in face to face commerce. Blockchain help create trust through transparency in such an
environment where you may not be able to trust the individuals themselves; you can still trust the system
as a whole.
Bitcoin uses a public key to hash a public address; this public address may be temporary or infinite
depending on the way that the public address is hashed. You can think of a public address like a P.O Box
Address or other mailing address, and your private key like the key you have to receive that mail, information
or money within that P.O. Box or mailbox.
The private key then uses a mathematical function to derive a public key out of it. This is an asymmetric
way of creation, meaning, it is impossible to derive the private key from a public key. This is important
because the private key should be kept safe and never be shared, the public key gets shared by the owner.
In contrast to current financial institutions through which its risky to share bank information, the
Bitcoin network’s security protocol protects against malicious actors in both the use of asymmetric
keys and elliptical curves to create rotating addresses. This creates trust in the system to hold users’
funds without having to trust any of the users on the network. These mechanisms allow money/coins
4.4 Corda
Another popular private DLT project is “Corda,” developed by R3. Just like the Hyperledger fabric, Corda
provides a network that maintains a state and then a ledger of all the historical changes to that state. Corda
provides a lock down java virtual machine to run smart contracts and then mutate that state. Corda’s smart
contracts go an extra step in trying to define legally binding terminology around these smart contracts. These
contracts will both be executed in the digital sense and can then be triggered in the real world. Corda
provides a roll back function if an error is made in a unique smart contract and goes against the nature of
immutable blockchain solutions, therefore Corda is seen as DLT but not as blockchain. Instead of having a
massive network of peer nodes, Unlike Bitcoin, for example, transactions and states are not shared with all
participants within a network, but only with those who are part of the transaction. Each participant therefore
only owns the states that are relevant to him. This not only controls the dissemination of sensitive data, but
4.5 Tendermint
In the research field, the Tendermint Blockchain is one of the better-known ones because, in contrast to the
Hyperledger Fabric, it focuses on cooperative use. Therefore, it also belongs to the permissioned consortial
blockchains because administrative tasks are not only carried out by one partner, as in permissioned private
blockchains, but, for example, by voting of the nodes, which were set up by the consortial partners.
The Tendermint project has several ambitious goals and therefore has interesting concepts, making it
suitable for industrial use. Some of these concepts are:
- Smart contracts can be written in any programming language
- Light clients allow IoT devices, smart devices and CPS to be connected directly to the blockchain
as well, so they can be handled as trusted communication endpoints
- Blockchains should be made interoperable through blockchain hubs, which could also solve the
scaling problem by connecting 2 or more tendermint solutions.
Further Reading
Frankfurt School Blockchain Centre: Consensus methods in blockchain
systems Link
The table below shows which are most commonly used and what they stand for:
The system of private and public keys is, if not shared with random people, a very secure means of securing
information. This helps keep users of the network anonymous as in the case of bitcoin where only an
equivalent to our bank account number, the public key, is made public. It needs to be noted though that
depending on the transparency level a blockchain has, possibilities of tracking transactions and connecting
these can reveal information the user might not have wanted to have shared.
3. Trust
Math doesn’t lie. A lack of trust between two parties is the reason why intermediaries around the world exist.
Regulations get developed to level the playing field and to secure the people around the world. Trust is
usually the first buzzword that gets thrown around when talking about Blockchain and DLT.
4. Transparency
More transparency for increased trust. Blockchain, in a transparent algorithmic form, shows every
transaction or information stored from the past. Access to this immutable chain of information increases
trust. The published information can be compared to the information stored in the blockchain giving an
incentive not to conduct malpractice with data or information.
5. Redundancy
On the one hand, redundancy can be a waste of resources. On the other, indestructability of stored data is
ensured.
6. Openness
In a public blockchain, everyone can create a private key to join the network, openness is guaranteed. Some
countries have the problem that many people are not connected to the networks of banking and finance.
The widespread definition of a public blockchain does not allow for these things and differentiations between
human beings to happen to make it the seventh strength of this technology.
Inaccessibility is a typical problem with new technologies. Everything is built very technically, making it
harder for employees to apply the technology. The private key is a long sensible information string that
always needs to be secured but should not be lost. Losing the private key in a technological environment
like blockchain leads to big problems. No customer service can help with recovering private keys. No one
is responsible. This might be one of the reasons why larger corporations have not yet tried to research in
the direction of blockchain applicability yet.
2. Cost
Different possible cost factors come along with blockchain. First, the most common one would be transaction
costs for transferring currency, information, data etc. through the network. Usually this cost is given to
intermediaries in centralized database networks. Second, the consensus mechanism as discussed in 1.3.5
can create immense power cost. Solutions are being built on top of open blockchains to reduce costs to a
bare minimum.
3. Waste of resource
Mining especially with the PoW algorithm can be a very costly way of securing consensus and integrity in
the ledger. PoW is one of the most secure consensus mechanisms but leaves a bad economic footprint.
New consensus mechanisms are being developed as a solution to this problem. Another way of solving this
problem is to create meaningful calculation algorithms in the PoW system so that the resources are not
wasted for useless calculations. This problem can also be addressed by designing the infrastructure in a
way that allows permissioned blockchain networks to be established, for example, which can use more
efficient consensus mechanisms.
4. Scalability
The decentralized nature of the blockchain requires every single one of the nodes to have the needed
capabilities to secure having an up-to-date ledger. Every block has a size. If that block is filled up with
information every time in a short time frame, the space it needs can become very high. The scalability of a
ledger is a problem that will mostly occur in public blockchain environments. An idea to solve this problem
is to integrate some kind of delegation process where only a few nodes decide on the blocks’ integrity. This
can lead to existing problems databases have.
Scaling debate
Since the blockchain is decentralized and thus controlled equally by all users of the network, regulation can
take place from the inside. The technical background of blockchain technology is very complex and there
5. Rigidity
Since it is possible to update a blockchain it is important to have a system for that. In a public blockchain,
updates have to undergo a certain process. First, a proposal of the desired can be made. The community
will discuss the proposed changes and negotiate the proposal. This can lead to different camps of interest
groups. The goal is to get the majority on board with a change proposal. Miners and nodes will signal through
the download of the respective software which version of the protocol they prefer. At some point in time, the
proposed code will be implemented in the node’s verification.
6. Transparency
This point can be seen in two different perspectives. For one, blockchain might be a way of transferring
money for illegal activities, which, no doubt, is happening even though this is not that much worse than the
usual way of illegal activities. A far more important point is, that the transparency of a network using
blockchain can be very intimidating. Every transaction or update etc. made in the blockchain can be visible
to the rest of the world. This is especially an issue because insurance companies or the government might
be very interested in having a transparent screen of the citizens’ transactions. Therefore, the use cases in
which blockchains should be used have to be very precisely tailored to the needs and prevailing legal
situation.
7. Individual responsibility
Since no one is responsible for a typical blockchain, every user is responsible for one’s actions. As the
private key is giving access to one’s funds on the blockchain, the loss of a private key therefore results in
the inability to access those funds ever again. That’s why the empowerment through financial sovereignty,
1
CCN (2016): Bitcoin Core & Miners Agree on Scaling Roadmap: Hard Fork Code Comes July 2016, Activation in 2017
https://www.ccn.com/bitcoin-core-miners-agree-hard-fork-code-comes-july-2016-activation-in-2017/
Here are the different iterations of blockchain we’ve seen thus far. Please keep in mind that this is not a
hierarchical association, no distribution or type of blockchain is superior, they simply have different use
cases.
Although some prominent blockchains such as the Bitcoin and Ethereum network are quite secure, not all
blockchains are created equally, and there are a few factors to consider when assessing the vulnerability of
a network.
A few things to consider, just as any other software distribution, are the hours spent testing the network
version, debugging, the parties involved, and their level of expertise. These criteria are typically important
factors to review before trusting a newly released version of a network.
Outside of these factors, there are general vulnerabilities that are unavoidable with public blockchains.
Although many of these events are improbable it is important to understand the condition in which a network
attack may be more likely.
Sybil Attack
This form of network attack occurs when a malicious actor attempts to flood the network with clients that
they control in the hope of isolating a certain node from the network. In this case, the target would think they
are connected to the network as a whole when in reality each “network node” they are connected to is
actually the attacker feeding false data to the node.
51% Attack
If one mining entity has more than half of the hashing power in a network with Proof-of -Work Consensus,
a 51% attack can be carried out. The attacker is to compromise or halt transactions due to the consensus
algorithm needing only 51% of participants to agree. As the hashing power in bitcoin is very high by now,
While you should be aware of these systematic vulnerabilities, the more pressing concern for individuals is
on the level between existing infrastructure and blockchain.
For instance, exchanges aren’t necessarily an integral component of any blockchain network, but they are
an essential economic component for anyone buying or selling cryptocurrency. For this reason, these
centralized services that run on a traditional webserver act as gatekeepers and sometimes substitute banks
as a mechanism to store cryptocurrency.
It’s easy to see why this is an issue. Blockchain is supposed to improve upon the current opaque
intermediaries who have consolidated power, but it seems in some regards they’ve simply provided less
trustworthy substitutes. Now obviously this is an interim step for the technology and the current method of
centralized crypto exchanges is going out of favour in place of decentralized exchanges (DEX). You should
be aware that in this transition period everything blockchain adjacent doesn’t necessarily hold the same
benefits in security and trustworthiness as the blockchain itself.
This lesson of centralized vulnerabilities that happen off-chain can be seen with the long list of crypto
exchange hacks.
February 24, 2014 Mt. Gox based in Japan, at the time largest marketplace for trading
cryptocurrencies, got hacked. Around 740.000 Bitcoins got stolen.
June 13, 2014 A mining pool named GHash.io reached more than half of the bitcoin networks’
hashing power and was therefore able to undergo a 51% attack which didn’t
happen though.
January 4, 2015 A system administrator of the “Bitstamp” exchange got hacked and led the
infiltrators to server access and the ability to access wallets. 18,866 bitcoins were
stolen.
August 2, 2016 A security breach within the exchange “Bitfinex” led to a theft of 119,756 bitcoins.
These were some of the older security breaches. They were followed by more recent events such as June
10, 2018 CoinRail exchange hacked; June 20, 2018 Bithumb exchange hacked; September 18, 2018 Zaif
exchange hacked.
Just as any other technology, blockchain itself is a tool, and it must be used properly to obtain its benefits.
There are many malicious actors, specifically with the platform in such a nascent state that may try to take
advantage of newer or less informed participants. For this reason, it is imperative that you do your own due
diligence before interacting with entities “using blockchain”. It’s also worth noting that having a mentor whom
you trust to help you make any decisions while navigating such a new space may give you additional security
and peace of mind.
2
https://99bitcoins.com/price-chart-history/
An example contract could be for the rights to own a song. Let’s compare this instance to a situation today,
if you were surfing the internet and you saw a website selling a song, how would you know that you’d receive
the song? Maybe you’ve read reviews about that seller, you spend a few minutes comparing different sites
and ultimately decide to trust that site to both deliver you your product and to keep your credit card and
other identifying information safe. Yet, you still have no guarantee that the seller won’t run off with your
money.
Smart contracts change this, in this scenario, the seller of the song will upload the file directly to blockchain
and state within the contract (in code) if someone sends ‘x’ amount of currency to this address then, send
them the song. Once someone sends the proper amount of funds to that address the contract will
automatically execute, and the buyer will receive their goods.
Now this is just a song worth less than a dollar, imagine something more expensive like the deed to a house
or a large amount of currency. Even complex processes such as the payment of an insurance policy against
a deep-sea wreck on container ships, which sends help in the event of a corresponding GPS message and
automatically pays out the insurance sum. Without a smart contract there is no way to assure the other party
will complete their obligations.
Smart Contract
Smart contracts are self-executing contractual agreements with the
transaction conditions being directly integrated into the programming code
that exists across a blockchain network. Within the field of B2B or B2C,
smart contracts could provide significant cost reductions, higher security
standards and minimize human mistakes. .
When money needs to be distributed between several people equally, a central person or entity will
have to perform that task and perfectly divide a sum of some currency to distribute. This person
can act viciously and corrupt the payout in a way that the money now does not get distributed
equally. An argument, that if code performs this task doesn’t hold because code can be altered at
any time with the right access permission.
The same example put into a smart contract which cannot be changed would mean complete
security against corruption or human errors of any kind. Code would be written in a way, to split the
money send to a smart contract perfectly. The smart contract would then send the split amount to
the people that are coded into it as the rightful recipients.
Smart contracts on their own, cannot understand real world data like stock prices etc. Smart contracts can
be part of DAO’s (Decentralized Autonomous Organization). The smart contract on its own is a very
interesting concept but by linking many together DApps (Decentralized Applications) can be created.
3
http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_2.h
tml
4
https://ojphi.org/ojs/index.php/fm/article/view/548/469
Farmers are faced with several intermediaries in the payment process. Smart
contracts can streamline processes and reduce transaction time and cost. Trust
is built by the blockchain infrastructure. AgriDigital5 developed a smart contract
Payments that executes payments to wheat farmers within a specific time frame (one hour)
once the products are delivered. Linking this technology to a mobile money
system would allow fast and secure payments for millions of underserved
farmers.
Smart contracts have the technical potential of providing almost real-time
monitoring for every processing step in a supply chain. Internet of Things (IoT)
Supply Chain devices can support recording data on product movements from a factory to
stores. Inventory tracking, supply chain financing, insurance and risk
management are areas that will benefit from the smart contract technology.
5
AgriDigital Website Link
Key Message
! A smart contract is useful when businesses or individuals want to make a
digital agreement with assurance that the contract will be incorporated in a
database or the respective accounts of all parties.
Currently most parts of our economy are still paper based.
Smart contracts are allowing the digitization of contracts and a high level of
contract automation.
The concept of digital automated smart contracts is not fully matured. As smart contracts insist on a
previously defined and programmed code, this code can also be one of the weak points. Since information
on a blockchain is unchangeable, errors in the program code cannot be changed afterwards. Therefore, in
the context of smart contracts applies: “Code is law.” If we initially assume that unintentional errors occur
during programming, it is also conceivable that backdoors are deliberately programmed in the code.
Back in 2016 hackers were able to steal 3.6 million units of the
cryptocurrency Ether from DAO (decentralized autonomous
organization). At the time of the attack, this corresponded to a value of
more than 50 million US dollars. all this was only possible through an
error or a back door in the program code.
A further disadvantage is the expense that must be incurred if the contract conditions change. What
happens, for example, if the conditions of the ordered good are not in accordance with the contract? How
does a smart contract recognize this exactly?
6.5 Oracles
Blockchains and smart contracts are not able to access data from outside their network. When it comes to
real-world use cases, i.e. regarding insurance or supply chains, a smart contract often needs access to data
in electronical form which is relevant to the contractual terms. Oracles allow blockchains to interact with off-
chain data. They feed a blockchain with real-world data such as payment transactions or weather data.
If a predefined value is satisfied, the Smart Contract is triggered and therefore executes the predefined
algorithm. This in turn automatically triggers an event on the blockchain. The main task of an Oracle is,
therefore, to make external data available to the smart contract in a secure and trustworthy manner. Oracles
are provided by third-party providers.
6
https://www.zeit.de/digital/internet/2016-06/the-dao-blockchain-ether-hack
A good use case for oracles is insurance claims. There is quite a lot of data that has to be retrieved to make
a fully informed decision on how much to pay a claimant, as well as how this instance should affect their
monthly premium, With the proper authorization a smart contract using the necessary oracles could take in
data, make decisions and execute on those decisions all without human supervision.
To implement oracles, however, you need to know which different types there are and how to distinguish
between them. First, a distinction can be made between the source of the information which means that
there are both software and hardware oracles. Software oracles handle information data that stems from
online sources like train delays, temperature, prices of goods, etc. The oracle extracts the required
information and pushes it into the smart contract. Hardware oracles get the needed information directly from
the physical world, for example from RFID sensors in the supply chain industry. The next distinction
concerns the direction of information, i.e. whether a smart contract receives or passes or forwards
information. Inbound oracles provide date from the external world. Outbound oracles provide smart
contracts with the ability to send data to the outside world, for example, you have rented a house and the
code for the door is only automatically sent after payment has been received. The last one is consensus-
based oracles where the information comes from human consensus and prediction markets.
The main challenge with oracles is that people need to trust these sources of information whether they come
from an IoT device like sensors or a website. For further security, a combination of different oracles may be
used.
An alternative to oracles is the light-client concept implemented by some blockchains, such as Tendermint.
This concept allows CPS, smart devices, IoT devices or even web frontends and apps to be provided with
an identifier from the respective blockchain. This identifying factor (signature, certificate, etc.) is used to sign
recorded information (e.g., scanning a barcode) directly on the device, in other words, the source, and to
send it to the blockchain it uses the blockchain communication protocols. The identifier and the
communication protocol, which is now part of the end device, makes it part of the blockchain infrastructure.
In this way, the blockchain can see where the information comes from.
Oracle-problem
A certain type of oracle would be to have a decentralized mechanism where
an oracle collects information to feed to the smart contracts from thousands
of sources which must previously agree to make sure decentralization, if
wanted, is given at any time.
7.1.1 Germany
The BaFin defines Bitcoin and other virtual currencies as: “digital representation of value that is not created
by a central bank or authority and does not have to have a connection to legal means of payment. Virtual
currencies are used by natural and legal persons as a means of exchange and can be transferred, stored
or traded electronically". BaFin has classified Bitcoins as financial instruments in the alternative of units of
account pursuant to § 1 Paragraph 11 Sentence 1 of the German Banking Act. Units of account are
comparable to foreign currencies, but do not correspond to legal tender. This legal classification applies in
principle to all cryptocurrencies. The sole use of digital currencies for participation in the economic cycle in
exchange transactions is not subject to authorization. Similarly, the purchase or sale of purchased or self-
generated units of cryptocurrencies are generally not subject to authorization.
Bundesbank President Weidmann warns against digital currencies. Although there is still no financial risk
from cryptocurrencies, the unstable value and exchange rate fluctuations are a major shortcoming. So far
one does not see any need to intervene and he does not consider a ban on cryptocurrencies to be
necessary. For private investors however, he sees an extremely large risk due to the strong volatility7.
7.1.2 Europe
The Vice-President of the European Central Bank (ECB) Vitor Constâncio even called the Bitcoin a "tulip,"
alluding to the speculative tulip bubble of the 17th century. Other members warned against tax evasion,
crime and capital flight, which are favored by the anonymity of digital currencies. ECB President Mario
Draghi found milder words in a conversation with the European Parliament. He asserted that the virtual
currency has only a limited impact on the European economy and does not yet pose a threat. Also, Bitcoin
is not yet "mature" enough to be regulated by the ECB. Above all, it is not in the power of the European
- Possible loss of money on the platform: Online trading platforms can go bankrupt and do not have deposit
protection, such as a bank. In addition, there have been countless hacker attacks in which vast amounts of
virtual coins have been stolen.
- Theft from one's wallet (digital wallet): The virtual wallets on a smartphone or computer can be stolen or
robbed just like normal wallets.
- Lack of security for virtual transactions: In contrast to conventional banking transactions, transactions on
the blockchain are irreversible.
- Strong exchange rate fluctuations for cryptocurrencies: Bitcoin and other digital currencies show strong
price fluctuations. It is pointed out that the rapid rise could be followed by an equally rapid decline.
- The danger of criminal abuse: The lack of regulation and supervision makes it possible to use digital
currencies for criminal transactions, such as money laundering. Should even stock exchanges or trading
platforms be blocked over time, innocent Bitcoin users could also be affected by this danger.
- Possible tax payments: For example, transactions with digital currencies may also be subject to value-
added or capital gains taxes. Depending on the holding period and local tax law, the respective tax
obligations differ9.
7.1.3 USA
In December 2017, the SEC (Securities and Exchange Commission) published a statement on
cryptocurrencies and ICO's (Initial Coin Offerings). In this statement, the SEC declared cryptocurrencies as
"Items of Inherent Value," such as gold or foreign exchange, designed to facilitate purchases, sales or other
transactions. Bitcoin itself is a purely digitally available object, but the generation, such as gold mining,
8
CNBC (2017): Cryptocurrencies like bitcoin are not 'mature' enough to regulate, ECB -chief Mario Draghi says:
https://www.cnbc.com/2017/10/19/cryptocurrencies-are-not-mature-enough-ecb-chief-mario-draghi.html
9
EBA (2014): EBA Opinion on ‘virtual currencies: https://www.eba.europa.eu/documents/10180/657547/EBA-Op-2014-
08+Opinion+on+Virtual+Currencies.pdf
7.1.4 Japan
Japan has long been one of the centers of Bitcoin. With the collapse of the Mt. Gox online exchange in
2014, Japan had the largest trading center in the world at the beginning of the boom and thus also the first
major investors. As a result of the collapse, the financial supervisory authorities were forced to draw up
regulations for digital currencies at an early stage. Instead of opposing the new technology, banks and
supervisors decided to adopt the digital currencies and make Japan's financial industry, the world leader in
this sector. This process culminated in April 2017 in the full acceptance of Bitcoin, and the associated
approval as a legal tender. Japanese customers can now pay with Bitcoin in hundreds of stores and retail
chains. In October 2017, the Japanese financial outlook announced minimum conditions for exchanges and
online trading platforms, which they control themselves. The regulators want to put the stock exchanges on
healthier feet to create more trust in general and, above all, to prevent fraud. Thanks to this open approach
and government backing, banks are now also investing massively in financial start-ups in the blockchain
and cryptocurrency sectors.
Nevertheless, Haruhiko Kuroda, Chairman of the Bank of Japan, described the development of Bitcoin at
10
SEC (2017): Statement on Cryptocurrencies and Initial Coin Offerings: https://www.sec.gov/news/public-statement/statement-clayton-2017-12-
11
7.1.5 China
When it comes to regulations in the area of cryptocurrencies, China is one of the pioneers and initiators.
Due to the great interest in cryptocurrencies and the immensely growing capital flows, the Chinese
regulatory authorities CSRC (Chinese Securities Regulatory Commission) and the PBoC (People's Bank of
China) played it safe, and in September issued a ban on ICOs without further ado. Shortly thereafter, the
country's trading platforms were also closed. However, this does not mean that the currency or possession
is illegal. Whoever owns Bitcoin can keep the cryptocurrency or exchange it with other users11. However,
organized trading on Internet platforms is no longer possible at present, nor is the exchange of the digital
currency for Chinese yuan. On the three largest exchanges, OKCoin, BTCC, and Huobi, about 90% of global
trading took place at that time.
Meanwhile, the share of the global trading volume is only about 7%11. The reason for these strong
interventions is not yet clear. Basically, China wants to reduce the influence of Bitcoin on its economy. The
Chinese authorities have promised that they could issue licenses for trading platforms in the future and that
systematic trade can be resumed. However, it is not yet clear which requirements the operators will have to
meet. Financial circles suspect that Beijing wants to ensure that the state knows exactly who owns or sells
how much Bitcoins and when. Investors had used Bitcoins to avoid strict capital outflow regulations when
shifting money out of the country. The central bank could want to prevent this with new guidelines. In
addition, it has been assumed since 2016 that China is developing its own digital currency and would,
therefore, like to reduce the influence of the already existing cryptocurrencies. The Chinese authorities are
also taking a tough stance when it comes to mining. The digital finance regulator has urged local authorities
to exert pressure on mining companies to persuade them to exit in an orderly manner. This was expressed
using averaging by the local authorities to the mining data centers, with the request to reduce electricity
consumption. Furthermore, documents are circulating which name different possibilities of how miners could
be persuaded to give up. Measures of tightening the environmental regulations, an increase of taxes and
electricity prices are mentioned (read more). Due to this prohibition, many mining companies relocate their
headquarters to other countries with low electricity costs, such as Thailand, Russia or Canada. If the
measures do not bear fruit as desired, a complete ban on mining will even be considered. This would be a
severe setback considering that more than two thirds of the world's mining output come from China.
11
Forbes (2017): Bitcoin Regulation In China Still Unclear, But Chinese Exchanges Thrive Overseas:
https://www.forbes.com/sites/leonhardweese/2017/11/29/bitcoin-regulation-in-china-still-unclear-but-chinese-exchanges-thrive-
overseas/#6c8601566487
With this being said there has been a recent push towards establishing stable cryptocurrencies that hold
their value regardless of external pressures on the market as a whole. To learn more about these stablecoins
visit: https://fitznerblockchain.consulting/stablecoins
- the respective participants are not aware of their counterparties and the online platform does not
act as a representative of the participants but in its own name,
- the economic advantages and disadvantages of the transactions affect the participants (transaction
costs) who transfer money to platform accounts or transfer virtual currencies to their addresses,
and
- the platform is obliged to account to the participants for the execution of the transactions and to
transfer acquired currency units of digital currencies.
If there is no financial commission transaction, a multilateral trading system is an option. This brings together
the interests of many people in buying and selling financial instruments within the system according to
defined rules and leads to a contract for these financial instruments. A trading platform in the technical sense
is not required. Whether the contract is subsequently settled in the system is irrelevant.
It is also possible to have platforms with a regionally structured list of persons or companies offering
cryptocurrencies for sale or purchase. This is the investment and contract brokerage.
Mostly these manipulations involve the use of social media to attract buyers. Mostly, cryptocurrencies with
a low market valuation are affected the most. Even the supposedly large digital currencies are not safe from
manipulation. A look at the price development of the cryptocurrency "Bitcoin Cash" also suggests fraudulent
behavior
Crypto exchanges and crypto markets are not yet regulated in many countries of the world; therefore, such
manipulations are not illegal. Nevertheless, they show the considerable risks associated with this new sector
of the financial industry, especially for uninformed private investors. One possibility is to regulate trading
platforms until they have to close, such as in China. Due to the global nature of Bitcoin, however, the result
is usually only a migration of the transaction volume to stock exchanges in other countries. Given these
facts, it can be said that there is still a great need for action on the part of the regulatory authorities, especially
about the transparency of transactions and the prevention of manipulation. Due to the lack of a central
control unit, the regulation of the network is largely left to the participants themselves.
Another existential characteristic of the BCT is its distributed structure. Redundancies and reliability are
also offered by other distributed technologies such as cloud solutions, but in BCT the distributed
infrastructure and databases play a very special role. New information is only persisted in the network when
there is agreement on it. By implication, this means that not one party is involved in the generation of a new
state, but every partner in the network. This creates, among other things, a data democracy. One partner
is no longer at the mercy of the statements of another, but all are always involved in the persistence of the
new data state.
The enabled transparency is one of the most common features of BCT used in logistics related use cases.
Combined with the properties that the data cannot be manipulated and is available in a distributed manner,
transparency creates high business values. Often the industries are not initially comfortable with the idea of
opening up their data silos and sharing their data with others. But there are also many pioneers who
discover the added value and see their business relationships as partnerships. From this perspective,
transparency can ensure that the supplier is better prepared for orders or that the subcontractor can adjust
its capacities on time. It can even go so far that the available transparency ensures that audits are carried
out automatically.
One of the newer application areas for blockchains are self sovereign identities. Here, the distributed and
tamper-proof structure of data storage in blockchains are also used. Digital identities can be confirmed in
these scenarios without an intermediary being involved or all of the entity's data being shared on the
network.
The aspect of newly enabled automation is not always obvious and often the question arises here if these
automations wouldn't work without blockchain? The answer is yes they can. BUT if the blockchain is used
to persist, then all of its properties can be claimed in this context as well. The inputs are documented, the
process of automation itself is secured and also the calculated result. It is this traceability that provides the
added value in contrast to conventional digitalization and research.
Is an blockchain based solution even necessary? If for example, everything is being handled out of one
institution today and the way of doing business won’t severely change in that area, then implementing a
blockchain inside that central area probably won’t add value to the existing system. Having a whole lot of
transparency installed or any of the other points discussed before isn’t necessary when being handled solely
by one entity.
Large data is currently still a problem. Big data chunks are nowadays hard to implement into a blockchain.
Decentralisation and consensus algorithms hinder the usage of large amounts of data usage with
blockchain. Generally speaking, blockchains are rather inefficient and costly at storing data and sometimes
may not be the best solution for large amounts of data storage.
Although BCT is based on a distributed infrastructure and offers redundant data storage as well as reliability,
all incoming data must be put into a sequence, the chain of blocks. This creates a systematic bottleneck
that prevents a trivial solution for higher information rates and limits the scalability and also the ability to
function in realtime. This in turn ends in the scalability trilemma, which involves the following three aspects
defined by Vitalik Buterin:
Security
Scalability concerns the ability to process transactions on any given network. If public blockchains are to
be usable by the masses, then they must be able to handle a scenario in which there are millions of users
on the network.
Security pertains to the immutability of the ledger and its general resistance to attacks such as 51% attacks,
Sybil attacks, DDoS attacks etc.
It can easily be said that two of these properties come with the expense of the third. Bitcoin and Ethereum
for example are built on a huge decentralization basis with very high security at the expense of scalability.
The trilemma issue will surely be solved with future innovation within the space, but no one knows for sure,
when that will happen. There are plans for Ethereum to switch to a proof of stake model that will help with
these aforementioned issues although the timeline is also a bit ambiguous. Learn more about these
developments here: https://fitznerblockchain.consulting/ethereum-2-0
www.fs.de/e-campus
E-Mail: e-campus@fs.de
Phone: +49 (0)69 154008-624
Fax: +49 (0)69 154008-4624