You are on page 1of 24

1

Blockchain

Name

Institutional Affiliations

Course

Date
2

Table of Contents
Blockchain...................................................................................................................................................3
1. Introduction.......................................................................................................................................3
1.1 Bitcoin History from the beginning up to today................................................................................4
1.1.1 The Genesis: Bitcoin and Nakamoto's Whitepaper (2008)........................................................4
1.1.2 The Birth of Bitcoin (2009)...........................................................................................................4
1.1.3 Early Development and Adoption (2009-2013)...........................................................................4
1.1.4 Blockchain Beyond Bitcoin (2014-2016)......................................................................................4
1.1.5 Challenges and Maturity (2017-2018).........................................................................................4
1.1.6 Enterprise Adoption and Diverse Use Cases (2019-Present).....................................................4
1.2 How Cryptocurrency Transactions Work.........................................................................................5
1.2.1 Initiating the Transaction............................................................................................................5
1.2.2 Broadcasting the Transaction......................................................................................................6
1.2.3 Verification by Network Nodes....................................................................................................6
1.2.4 Inclusion in a Block......................................................................................................................7
1.2.5 Consensus and Confirmation.......................................................................................................7
1.2.6 Transaction Execution..................................................................................................................8
1.2.7 Finality...........................................................................................................................................8
1.2.8 Notification....................................................................................................................................8
1.3 Blockchain Block Validation and Transcription...............................................................................8
1.3.1 Beginnings of Blocks.....................................................................................................................9
1.3.2 Block Validation: Promoting Security and Trust.......................................................................9
1.3.3 Making the Validated Block Available on the Blockchain......................................................10
1.4 Is It Safe to Operate in the Blockchain World in Terms of Security?...........................................11
1.4.1 Learning about Blockchain Technology..................................................................................11
1.4.2 Features of Blockchain Security................................................................................................12
1.4.3 Challenges and Weaknesses.......................................................................................................12
1.4.4 Using the blockchain safely........................................................................................................13
1.4.5 Examples of Blockchain Security Successes.............................................................................13
1.5 Types Of Processing And Differences Between Proof Of Stake And Proof Of Work..................15
1.5.1 Proof of Work (PoW).................................................................................................................15
1.5.2 Proof of Stake (PoS)....................................................................................................................15
3

1.6 Proof of Stake and Proof of Work Distinctions...............................................................................15


1.6.1 Consumption of resources..........................................................................................................15
1.6.2 Security........................................................................................................................................16
1.6.3 Decentralization..........................................................................................................................16
1.6.4 Scalability....................................................................................................................................16
1.7 Possible Future Uses That Could Disrupt The Fintech Sector.......................................................16
1.7.1 Digital remittances and payment...............................................................................................16
1.7.2 Asset Tokenization......................................................................................................................16
1.7.3 KYC and Identity Verification..................................................................................................17
1.8 Blockchain Pros and Cons................................................................................................................17
1.8.1 Pros..............................................................................................................................................17
1.8.2 Cons.............................................................................................................................................18
1.9 Conclusion..........................................................................................................................................18
4

Blockchain

1. Introduction

Since its beginnings, blockchain technology, also referred to as the "Internet of Value,"

has seen a remarkable transformation. The blockchain path has been characterized by

inventiveness, difficulties, and disruptive potential, from its humble origins as the underpinning

technology for Bitcoin to its broad acceptance in several sectors today (Nuseir, 2021). This

decentralized and irreversible ledger technology has not only upended conventional banking

institutions but also industries as diverse as governance, supply chain management, and

healthcare. A blockchain is an enticing option for a variety of applications due to its fundamental

concepts of decentralization, transparency, and security. According to Nuseir (2021), it has been

positioned as a technology that has the potential to alter industries and rethink how we deal with

and share information because of its ability to promote trust among untrusted parties, remove

middlemen, and guarantee data integrity.

It is crucial to comprehend both the blockchain's potential and its limits as we dive deeper

into the technology. This technology has attracted much interest since it promises to improve

security, decrease fraud, and boost efficiency. Scalability issues, regulatory uncertainty, and

privacy risks are just a few of the difficulties it faces (Zook & Grote, 2022). To make educated

judgments about the deployment and acceptance of blockchain, this complexity needs a complete

analysis of its benefits and drawbacks. This in-depth analysis of blockchain technology will look

at its inner workings, historical evolution, and practical applications. It will also look at the

future disruptions it may cause, as well as the moral, legal, and societal issues raised by its

widespread use.
5

1.1 Bitcoin History from the beginning up to today

1.1.1 The Genesis: Bitcoin and Nakamoto's Whitepaper (2008)

Blockchain's history began with the publication of a whitepaper titled "Bitcoin: A Peer-

to-Peer Electronic Cash System" by an unidentified author known only as Satoshi Nakamoto in

October 2008 (Huber & Sornette, 2022). The idea of Bitcoin, a decentralized digital currency,

and the blockchain technology that powers it were outlined in this whitepaper (Chohan, 2022).

The double-spending issue with digital currencies, where the same digital token might be used

more than once, was addressed by the blockchain. The blockchain, which Nakamoto invented, is

a decentralized ledger that will securely and openly record all Bitcoin transactions. Proof-of-

work (PoW) is a method that miners, or network users, use to validate and add transactions to the

blockchain.

1.1.2 The Birth of Bitcoin (2009)

Bitcoin's genesis block, mined by Nakamoto on January 3, 2009, is referred to as "Block

0." This signaled the creation of the first cryptocurrency, and it contained a message hidden

inside the code that alluded to a day's edition of The Times's lead story, "Chancellor on the brink

of second bailout for banks. According to Böhme et al. 2015, this was an unequivocal

declaration of Bitcoin's goal to provide a decentralized alternative to the established financial

system.

1.1.3 Early Development and Adoption (2009-2013)

Blockchain technology was mostly connected to cryptocurrencies in the years after the invention

of Bitcoin. Cypherpunks, cryptography aficionados, and those looking for financial

independence from centralized banking institutions all took an interest in Bitcoin. It served as a

platform for online transactions and even the infamous Silk Road bazaar, which was finally
6

taken down by law authorities. Several alternative cryptocurrencies (altcoins) using different

blockchain technologies came into existence during this time (Huber & Sornette, 2022). One of

the original cryptocurrencies was Litecoin, which was introduced in 2011. These tests and

inventions created the framework for blockchain's application outside of virtual currency.

1.1.4 Blockchain Beyond Bitcoin (2014-2016)

The idea that blockchain may be used for purposes other than cryptocurrencies started to

sink in. Vitalik Buterin introduced the blockchain platform Ethereum in 2014 to facilitate the

development of decentralized apps (dApps) and smart contracts (Mattila, 2016). Turing-

complete scripting was first presented by Ethereum, enabling programmers to create a diverse

variety of applications on its blockchain. A wave of Initial Coin Offerings (ICOs), where new

blockchain companies raised money by issuing tokens on the Ethereum network, resulted from

this development (Chuen et al., 2017). Although this way of raising money was well received

and helped startups raise much money, it also drew regulatory attention owing to the possibility

of fraud and unregistered securities offerings.

1.1.5 Challenges and Maturity (2017-2018)

Interest in and investment in cryptocurrencies and blockchain technologies has increased

in 2017. In December 2017, Bitcoin hit an all-time high price of a little under $20,000, igniting a

media frenzy and investor mania (Chernov & Chernova, 2018). However, a significant market

drop that followed this bull run in 2018 caused a more realistic evaluation of blockchain's

possibilities. Global regulatory organizations started to discuss the legal standing of

cryptocurrencies and initial coin offerings. Governments tried to strike a balance between

innovation, consumer safety, and market stability (Chernov & Chernova, 2018). Meanwhile, as
7

businesses investigated how blockchain may improve transparency, security, and efficiency in

many industries, the market noticed a rising focus on corporate blockchain solutions.

1.1.6 Enterprise Adoption and Diverse Use Cases (2019-Present)

Blockchain technology has developed recently, and a variety of new uses have emerged.

Businesses from a variety of sectors have realized the potential of blockchain for enhancing data

integrity, lowering fraud, and expediting procedures. These sectors include banking, supply

chain, healthcare, and logistics. Some notable developments and trends in the blockchain space

include DeFi Decentralized Finance, Non-Fungible Tokens, CBDCs or central bank digital

currencies and Interoperability.

DeFi Decentralized Finance; introducing DeFi platforms has changed traditional financial

services. DeFi provides decentralized borrowing, trading, lending, and yield farming so users

may access financial services directly (Möser & Böhme, 2015). Non-Fungible Tokens (NFTs).

NFTs have become incredibly popular for displaying distinctive digital assets, such as works of

art, collectibles, music, and virtual properties. They are purchased and sold on Ethereum-based

blockchain platforms. CBDCs or central bank digital currencies. To enhance payment systems

and financial inclusion, some central banks across the world are investigating the idea of CBDCs

and digitizing their national currencies on blockchain networks: climate change and

sustainability initiatives. Discussions and activities to switch to more environmentally friendly

consensus methods, such as proof-of-stake (PoS), have been sparked by worries about the

adverse environmental effects of PoW blockchains like Bitcoin (Möser & Böhme, 2015).

Interoperability; by facilitating seamless communication and data sharing between various

blockchains, initiatives like Polkadot and Cosmos seek to promote interoperability.


8

1.2 How Cryptocurrency Transactions Work

The use of cryptocurrencies in transactions has revolutionized how we think about and interact

with money in the digital age. Blockchain technology has made these transactions feasible,

giving people around the world a decentralized and secure way to exchange digital assets.

1.2.1 Initiating the Transaction

The choice to transmit a certain quantity of cryptocurrencies to another user or receiver

signals the start of a cryptocurrency transaction. A cryptocurrency wallet, a digital user interface

that enables users to manage their digital assets, is often used for this action. Users begin a

transaction within this wallet by entering the wallet address of the receiver which is a long string

of alphanumeric characters that specifically identify their digital wallet (Mukhopadhyay et al.,

2016). It serves as the last point of the Bitcoin transfer, making sure the money gets to the right

person. Users: Users define the exact amount of bitcoin they desire to transfer in a transaction.

Due to the high degree of divisibility of cryptocurrencies, this might be a fraction of one.

Transaction Fee: A transaction fee is a small sum paid by the sender to encourage miners to

include their transactions in the upcoming block (more on this later). Depending on network

congestion and desired transaction speed, the charge may change.

Digital Signatures: To prove ownership of the bitcoin being delivered, cryptographic signatures

created with the sender's private key are used. These signatures guarantee that a transaction can

only be started by the legitimate owner.

1.2.2 Broadcasting the Transaction

The sender's wallet broadcasts the transaction to the Bitcoin network once the transaction

details have been input and verified. Sharing transaction data with a network of nodes or
9

dispersed computers that uphold the blockchain record is necessary to do this. With this move, a

private transaction becomes a public record.

1.2.3 Verification by Network Nodes

Network nodes start a rigorous process of verification as soon as they receive the

transaction. Their main objective is to make sure the transaction is secure and legitimate

(Mukhopadhyay et al., 2016). This verification procedure includes the following crucial checks:

Correct Formatting: Nodes certify that the transaction follows the predetermined structure and

format for the specific cryptocurrency network. Any modifications to the typical format are

marked as possible problems.

Sufficient Funds: It is essential to make sure that the sender has enough money on hand to cover

the transaction's total cost as well as any related fees. The transaction will be rejected if there is

not enough money.

Digital Signatures: The nodes use the supplied digital signatures to verify the transaction's

legitimacy. To verify that these signatures match the transaction data and are consistent with the

sender's private key, they are decrypted using the sender's public key.

Preventing duplicate spending, or the simultaneous use of the same cash in several transactions,

is one of the main difficulties in digital currency transactions (Mukhopadhyay et al., 2016).

Before approving a transaction, nodes make sure the Bitcoin has not previously been used

elsewhere.

1.2.4 Inclusion in a Block

A block comprises all valid transactions that have successfully made it through the

verification process. Miners, an essential component of the Bitcoin network, are involved in the

process of producing a new block. In networks like Bitcoin, a mechanism known as proof of
10

work (PoW) is used to solve complex mathematical problems for miners. The right to add a new

block to the blockchain and create a new block is given to the first miner to crack the riddle.

1.2.5 Consensus and Confirmation

When a miner successfully creates a block containing the transaction and adds it to the

blockchain, the transaction is confirmed. But for increased security, blockchain networks

frequently demand several confirmations. The transaction has more confirmations with each new

block that is added to the blockchain after the initial one (Peck, 2017). Depending on the

particular blockchain and its consensus method, the amount of confirmations needed may

change.

1.2.6 Transaction Execution

The recipient's wallet notifies the sender of the incoming transaction when it has been

verified and added to the blockchain. The received bitcoin is now available to the receiver and

under their control in their wallet. They are free to decide whether to save it, exchange it, or use

it.

1.2.7 Finality

The irreversibility of Bitcoin transactions is a crucial feature. A transaction becomes

irreversible and permanent once it is approved and recorded on the blockchain. The essential

feature of blockchain technology that makes the transaction history unbreakable and visible is

finality.

1.2.8 Notification

Notifications verifying the transaction's successful conclusion may be sent to the sender

and the recipient. These notifications provide the parties with peace of mind and act as a digital

receipt. Transactions using cryptocurrencies show a stunning confluence of technology,


11

encryption, and money. By offering safe, decentralized, and transparent ways to move digital

assets, they have upended established banking systems. Anyone who wants to take part in this

fast-changing digital economy must comprehend the complexities of Bitcoin transactions, from

their inception through confirmation. According to Peck (2017), the ideas behind cryptocurrency

transactions will stay at the vanguard of innovation as blockchain technology develops and finds

new uses, altering how we conduct financial transactions in the contemporary world.

1.3 Blockchain Block Validation and Transcription

The distributed ledger of blockchain technology, which is known for being decentralized

and tamper-resistant, is meticulously maintained through a process of block validation and

transcription. This essay will examine the complex procedure used to validate and transcribe

blocks inside a blockchain network.

1.3.1 Beginnings of Blocks

In essence, a blockchain is a chain of blocks, each of which is made up of several

transactions. According to the preceding article, the process starts when a user conducts a

transaction on the network. Then, a block of these transactions is created. It is vital to

comprehend the fundamental elements of a block before diving into the validation and

transcribing of these blocks:

Transactions: A block's essential data is represented through transactions. These might be

informational transactions (like those involving bitcoins) or any data pertinent to the objective of

the particular blockchain network.

Block Header: The block header is a crucial element that includes the following fields:

Previous Block's Hash: A chronological chain is formed by connecting each block to the one

before it via its distinct hash. This assures that previously recorded data is unchangeable.
12

Timestamp: The timestamp indicates the time the block was produced, which helps the

blockchain maintain a chronological order.

Merkle Root: To preserve data integrity, a Merkle tree data structure consolidates each

transaction in a block into a single root hash.

Nonce: Miners use the nonce throughout the mining process (Proof of Work) to obtain a hash

that satisfies specific requirements. Validation should be blocked at any cost.

1.3.2 Block Validation: Promoting Security and Trust

A crucial step in a blockchain network is block validation. It is mainly in charge of

establishing the legitimacy and veracity of the data in a block. This validation procedure

comprises several stages that taken collectively guarantee the block's reliability:

Hashing using cryptography: Each transaction in a block is hashed separately. The

transaction's data is used to produce the hash, which is a distinctive alphanumeric string (Peck,

2017). The Merkle root, which is kept in the block header, is created by combining the various

transaction hashes and performing another hashing operation on them.

Proof of Work (PoW) or Consensus Mechanism: In networks like Bitcoin, miners compete by

altering the block's nonce to find solutions to challenging mathematical riddles. This procedure

necessitates a lot of processing power and acts as a check to make sure that only valid blocks are

added to the blockchain. The block is broadcast to the network for validation once a miner has

successfully solved the challenge.

Validation by Network Nodes: Network nodes independently verify newly mined blocks after

receiving them. This contains several crucial checks:

Block Format: Nodes make sure that the block follows the blockchain network's predetermined

format and structure.


13

Transaction Validity: Every transaction in the block is carefully examined to make sure it

complies with the network's requirements, such as the sender having enough coins, having valid

digital signatures, and not engaging in double-spending.

Proof of Work: Nodes verify that the nonce results in a hash that satisfies the network's

consensus requirements when paired with the other data in the block.

Consensus: Network node consensus is achieved throughout the validation process. Before a

block is added to the blockchain, a majority of nodes must concur that it is genuine. This

consensus procedure must maintain the integrity of the ledger.

1.3.3 Making the Validated Block Available on the Blockchain

A block is added to the blockchain once the network has successfully confirmed it. The

block's data must be permanent and unchangeable, and this transcribing procedure completes that

process:

Block Addition: The validated block is included in the chain of previous blocks on the

blockchain. The block header links it to the chain and the chain to the prior block, forming a

continuous, chronological ledger.

Propagation: Every node in the network receives the newly inserted block. To add the new

block, each node separately updates its copy of the blockchain.

Finality: A block becomes immutable and irrevocable once it is added to the blockchain. It is a

permanent component of the ledger, and each network node stores its data.

Consistency Check: To make sure that all versions of the blockchain are in sync, nodes run

consistency checks regularly. Consensus procedures are used to settle any contradictions.
14

1.4 Is It Safe to Operate in the Blockchain World in Terms of Security?

Blockchain technology has become a game-changing invention with broad applications in

many sectors. Its popularity in financial systems, supply chains, healthcare, and other industries

is due to its promise of decentralization, transparency, and tamper resistance (Bozic, 2016).

However, enormous promise also means considerable scrutiny, particularly when it comes to

security. This article investigates the issue of whether using the blockchain is secure.

1.4.1 Learning about Blockchain Technology

It is crucial to comprehend the fundamentals of blockchain technology before diving into

the security issues. Its important traits include;

Decentralization- blockchain relies on a network of nodes to confirm and record transactions to

operate without a central authority.

Transparency is improved by the fact that all network members can see the transactions that are

recorded in a public ledger.

Data integrity is ensured via immutability, which makes it almost hard to change or remove data

after it has been recorded on a blockchain.

Data security is ensured by cryptographic procedures, which guard against unwanted access.

1.4.2 Features of Blockchain Security

Blockchain networks validate transactions using consensus algorithms like Proof of Work

(PoW) or Proof of Stake (PoS). These techniques make it harder for hostile actors to take over

the network by requiring network users to complete challenging mathematical puzzles or stake

tokens. By using encryption, data on the blockchain is protected from unauthorized access and

modification (Bozic et., 2016) Additionally, in protecting transactions and digital signatures,

cryptographic procedures make it difficult for hackers to tamper with them. Decentralization
15

which is the lack of a central authority makes it difficult for a network to be compromised by a

single point of failure. Control is distributed through decentralization, which lowers

susceptibility. Also, it uses immutable records. A transaction that has been recorded on the

blockchain cannot be changed beyond that point. This immutability guarantees the integrity of

transaction history.

1.4.3 Challenges and Weaknesses

Although blockchain provides strong security, it is not immune to problems and

weaknesses as discuussed below;

51% Attacks: In PoW-based blockchains, the ledger might be manipulated by a single actor

with more than 50% of the network's computing power (Chaudhry & Yousaf, 2018). To do this,

though, is getting more and more expensive.

Smart Contract Vulnerabilities: Smart contracts, which are self-executing contracts written in

code and executed on the blockchain, may have bugs. Chaudhry & Yousaf, (2018) asserts that,

financial losses may arise from exploiting these weaknesses, as demonstrated by events like the

DAO attack

Management of private keys: Users are responsible for carefully securing their private keys.

Access to digital assets is lost when a private key is lost, and there is no way to get them back.

Regulatory and Legal Risks: Because blockchain technology is decentralized, it may present

regulatory and legal difficulties (Sayadi et al., 2018). Globally, governments are still developing

the legal framework for cryptocurrencies and blockchain technology.

1.4.4 Using the blockchain safely

The adoption of best practices is necessary for operating correctly on the blockchain:
16

Protect private keys and wallet credentials with secure wallet management. Use secure software

or hardware wallets. For increased security, use multi-signature authentication.

Due Diligence: Research blockchain initiatives, exchanges, and smart contracts in-depth before

engaging in transactions or investments. Avoid swindles and unproven ventures.

Stay Informed: Keep abreast with blockchain news, security recommendations, and new

dangers. It is essential to be aware of safe operations.

Select Reputable Exchanges: When trading cryptocurrencies, select exchanges with robust

security protocols that have a good reputation. Azbeg et al., (2021) hold that, for account access,

enable two-factor authentication (2FA). Before implementing smart contracts, check them for

flaws in the code and vulnerabilities. For increased security, think about formal verification

techniques. Back up your wallet's data and private keys regularly. Backups should be kept in

safe, off-line places.

Phishing Caution: Be wary of phishing efforts. Verify website addresses and avoid providing

vital information on unreliable websites.

1.4.5 Examples of Blockchain Security Successes

In the blockchain industry, there have been significant security lapses and difficulties, yet

there have also been success stories:

Bitcoin: Since its launch in 2009, Bitcoin, the first cryptocurrency based on a blockchain, has

functioned safely. It has a solid track record for security and has resisted many attacks.

Ethereum 2.0: With Ethereum 2.0, PoS will replace PoW as the dominant consensus algorithm

on Ethereum, the second-largest blockchain by market capitalization (Azbeg et al., 2021). This

improvement seeks to boost security while using less energy.


17

DeFi Projects: Decentralized Finance (DeFi) initiatives have garnered billions of dollars in

value, demonstrating confidence in the security of blockchain technology. This achievement has

been made possible via open governance and audited smart contracts.

Supply Chain: To improve traceability and lower fraud, supply networks are using blockchain

technology. Maintaining the integrity of supply chain data depends on the security of these

networks.

How we think about security in the digital era has fundamentally altered because of

blockchain technology. It offers a strong defense against a variety of conventional cyber threats

because of its decentralized and cryptographic properties. It is not a miracle cure, and

weaknesses and difficulties remain to be resolved. In the end, the safety of using a blockchain

depends on several variables, including user behavior, the particular blockchain network being

utilized, and the overall regulatory landscape (Azbeg et al., 2021).Users and businesses may

operate safely on the blockchain and take advantage of its disruptive potential while minimizing

risks by following best practices, remaining educated, and exercising caution. Despite its

difficulties, blockchain still marks a significant advancement in the search for safe and open

digital transactions and data management. The blockchain ecosystem is well-positioned to keep

enhancing security precautions and extending its uses across many sectors through continued

research, development, and teaching.

1.5 Types Of Processing And Differences Between Proof Of Stake And Proof Of Work

Specific consensus mechanisms govern how transactions are handled, and new blocks are

added to the blockchain, which is how blockchain technology works. Proof of Work (PoW) and

Proof of Stake (PoS) are two popular consensus procedures.


18

1.5.1 Proof of Work (PoW)

The first and best-known consensus technique is PoW, which is prominently employed in

Bitcoin. To validate and add new blocks to the blockchain, miners must solve challenging

mathematical riddles( Bentov et al., 2016). The first miner to solve the riddle successfully

transmits the new block to the network as the other miners compete to do so. This method uses a

lot of computer power and consumes much energy. PoW is praised for its security since it would

be costly and time-consuming to change a transaction in a block without also changing all the

subsequent blocks in the chain.

1.5.2 Proof of Stake (PoS)

Alternative consensus mechanisms, such as PoS, are employed in several blockchain

projects, including Polkadot, Cardano, and Ethereum. In PoS, the number of cryptocurrency

tokens that players "stake" or lock up as collateral determines which individuals are picked to

build new blocks and validate transactions (Gaži et al., 2019). The amount of bitcoin a

participant wagers determines their likelihood of getting selected as a validator. PoS is said to be

more energy-efficient than PoW since it doesn't need mining, which uses many resources.

1.6 Proof of Stake and Proof of Work Distinctions

1.6.1 Consumption of resources

In PoS, mining processes need a large amount of computing and energy usage while in PoS

resource-intensive mining is not involved thus it uses much less energy.

1.6.2 Security

PoW is Known for its strong security since it would take a tremendous amount of computing

labor to attack the network but PoS security depends on validators' financial investment in the

network, as it becomes less safe if the majority of validators engage in destructive behavior.
19

1.6.3 Decentralization

PoW is generally seen as more decentralized because mining is open to anybody with the

necessary gear (Bentov et., 2016); while PoS validators must possess a sizable quantity of

cryptocurrency, because it has the potential to become increasingly centralized.

1.6.4 Scalability

PoW has scalability issues, which frequently results in longer transaction processing times while

PoS allows for speedier transaction validation and improved scalability by selecting validators

based on their stake.

1.7 Possible Future Uses That Could Disrupt The Fintech Sector

Thanks to the disruptive potential of blockchain technology, the financial industry has

experienced a spectacular transition. Blockchain, which was first recognized as the foundational

technology for cryptocurrencies like Bitcoin, has found a variety of uses across the financial

services industry, altering established procedures and opening the door for new ones.

1.7.1 Digital remittances and payment

A new age of digital payments and international transfers has begun, thanks to blockchain

technology. For instance, the XRP Ledger from Ripple is proof of the potential of blockchain

technology. This blockchain-based technology makes cross-border transactions quick and

affordable. Banks and financial organizations have adopted this technology to speed up

international transfers and cut expenses.

1.7.2 Asset Tokenization

The tokenization of physical assets is one of the most significant applications of

blockchain technology. This invention enables the representation of assets like real estate,

corporate shares, and artwork as digital tokens on a blockchain. Platforms like tZERO have used
20

blockchain to provide fractional ownership, more liquidity, and easier trading. Financial markets

stand to gain significantly from this democratization of asset ownership.

1.7.3 KYC and Identity Verification

Another financial application that has gained interest is blockchain-based identity

verification. For instance, SelfKey provides a platform for decentralized identity management.

Users may securely maintain and exchange their identification information, which improves

Know Your Customer (KYC) and Anti-Money Laundering (AML) compliance processes' speed

and security.

1.8 Blockchain Pros and Cons

1.8.1 Pros

Smart Contracts- Smart contracts are self-executing contracts with predefined rules.

Blockchain enables their automation, leading to Efficiency. Smart contracts automate complex

processes, reducing the need for intermediaries and speeding up transactions (Niranjanamurthy et

al., 2019). Accuracy; Automation eliminates human errors and ensures contract terms are

executed precisely.

Auditing Efficiency- Auditors can easily verify transactions, increasing accountability

and trust in financial systems.

Cost Efficiency- Blockchain offers cost-saving benefits. Blockchain reduces

transaction fees by eliminating intermediaries in various processes, such as cross-border

payments. Efficient Settlement: Faster settlement times translate into lower operational costs for

financial institutions.
21

1.8.2 Cons

Privacy Concerns- Contrary to popular belief, blockchain is not entirely anonymous. While

transactions are pseudonymous (associated with cryptographic addresses), tracing and analyzing

transaction patterns is possible. This has raised concerns about user privacy.

Limited Adoption- While blockchain technology has gained attention and interest, it has yet to

be widely adopted. This is due to various factors, including the complexity of implementation,

regulatory uncertainties, and the lack of interoperability between different blockchain networks.

Energy Consumption- Many blockchain networks, especially those that use proof-of-work

consensus mechanisms like Bitcoin and Ethereum, consume massive amounts of energy

(Niranjanamurthy et al., 2019). The mining process, integral to these networks, requires powerful

computers to solve complex mathematical puzzles, leading to a substantial carbon footprint.

1.9 Conclusion

Unquestionably, blockchain is having an impact on the finance industry. Blockchain has

opened up new possibilities while solving enduring problems through applications like digital

payments, asset tokenization, and smart contracts. The adaptability and disruptive potential of

blockchain remain at the forefront as the fintech sector changes. Stakeholders must adequately

use this technology, taking into account both its advantages and disadvantages, to spur

innovation and improve financial services in the future. A new age of financial technology

marked by trust, transparency, and efficiency has arrived, thanks to blockchain.

Blockchain technology, which is frequently hailed as the foundation of cryptocurrencies, has

already significantly impacted the fintech industry. Its voyage is still far from over, however.

The blockchain's revolutionary potential is still developing, and its following disruptions in

fintech are expected to alter the financial environment significantly.


22
23

References

Azbeg, K., Ouchetto, O., Jai Andaloussi, S., & Fetjah, L. (2021). An overview of blockchain

consensus algorithms: Comparison, challenges and future directions. Advances on Smart

and Soft Computing: Proceedings of ICACIn 2020, 357-369.

Bentov, I., Gabizon, A., & Mizrahi, A. (2016, February). Cryptocurrencies without proof of

work. In International conference on financial cryptography and data security (pp. 142-

157). Berlin, Heidelberg: Springer Berlin Heidelberg.

Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, technology, and

governance. Journal of economic Perspectives, 29(2), 213-238.

Bozic, N., Pujolle, G., & Secci, S. (2016). A tutorial on blockchain and applications to secure

network control-planes. 2016 3rd Smart Cloud Networks & Systems (SCNS), 1-8.

Chaudhry, N., & Yousaf, M. M. (2018, December). Consensus algorithms in blockchain:

Comparative analysis, challenges and opportunities. In 2018 12th International

Conference on Open Source Systems and Technologies (ICOSST) (pp. 54-63). IEEE.

Chernov, A., & Chernova, V. (2018). Global blockchain technology market analysis-current

situations and forecast. Economic and Social Development: Book of Proceedings, 143-

152.

Chohan, U. W. (2022). A history of bitcoin. Available at SSRN 3047875.

Chuen, D. L. K., Guo, L., & Wang, Y. (2017). Cryptocurrency: A new investment

opportunity?. The journal of alternative investments, 20(3), 16-40.

Gaži, P., Kiayias, A., & Zindros, D. (2019, May). Proof-of-stake sidechains. In 2019 IEEE

Symposium on Security and Privacy (SP) (pp. 139-156). IEEE.


24

Huber, T. A., & Sornette, D. (2022). Boom, bust, and bitcoin: bitcoin-bubbles as innovation

accelerators. Journal of Economic Issues, 56(1), 113-136.

Mattila, J. (2016). The blockchain phenomenon–the disruptive potential of distributed consensus

architectures (No. 38). ETLA working papers.

Möser, M., & Böhme, R. (2015). Trends, tips, tolls: A longitudinal study of Bitcoin transaction

fees. In Financial Cryptography and Data Security: FC 2015 International Workshops,

BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised

Selected Papers (pp. 19-33). Springer Berlin Heidelberg.

Mukhopadhyay, U., Skjellum, A., Hambolu, O., Oakley, J., Yu, L., & Brooks, R. (2016,

December). A brief survey of cryptocurrency systems. In 2016 14th annual conference

on privacy, security and trust (PST) (pp. 745-752). IEEE.

Niranjanamurthy, M., Nithya, B. N., & Jagannatha, S. J. C. C. (2019). Analysis of Blockchain

technology: pros, cons and SWOT. Cluster Computing, 22, 14743-14757.

Nuseir, M. T. (2021). Potential impacts of blockchain technology on business practices of bricks

and mortar (B&M) grocery stores. Business Process Management Journal, 27(4), 1256-

1274.

Peck, M. E. (2017). Blockchains: How they work and why they'll change the world. IEEE

spectrum, 54(10), 26-35.

Sayadi, S., Rejeb, S. B., & Choukair, Z. (2018, November). Blockchain challenges and security

schemes: a survey. In 2018 Seventh International Conference on Communications and

Networking (ComNet) (pp. 1-7). IEEE.

Zook, M., & Grote, M. H. (2022). Blockchain financial geographies: Disrupting space, agency

and scale. Geoforum.

You might also like