Block Chain
Block Chain
UNIT 1 – INTRODUCTION
What is Centralization?
Centralization is an organizational structure that gives the ability of decision-making
responsibilities to higher management. Few selected members are given the authority to
create and determine strategies and goals. It also clarifies the motives and mission of the
organization, which must follow to achieve its goals.
In centralization, the type of organizational structure allows higher management to create the
rules including procedures that are used to communicate with lower-level employees. Lower-
level employees have to obey the rules made by the higher management organization without
doubting the rules and regulations.
What is Decentralization?
Decentralization is an organizational structure where the delegates are assigned to manage the
organization. They are selected by the higher authorities. The selected candidates are mostly
their middle and lower subordinates.
The decentralization type of management helps to organize daily duties. They also take part
in minor decision-making. A lot of responsibilities are given to the middle and lower levels
subordinates.
Because of the well-distributed job roles, the higher management authorities get a chance to
focus more on major business decisions.
Traditional banks use centralized ledgers to track balances. Each bank branch periodically
updates this central ledger, but this ledger is neither public nor auditable. The Bitcoin
protocol changes this paradigm by allowing anyone to read and write directly to the ledger.
Anyone is capable of publishing a Bitcoin transaction. Miners will add that transaction to the
blockchain, and anyone can query the blockchain to check their balances and transaction
history.
2
Decentralized ledger systems use cryptographic algorithms to ensure the integrity and
security of transactions and data. Each block in the blockchain contains a timestamp, a hash
of the previous block, and a set of transactions. Once a block is added to the blockchain, it
cannot be modified without altering the hash of every subsequent block, making it virtually
tamper-proof.
Decentralized ledger systems offer several advantages over centralized systems. They can
provide greater security, as there is no single point of failure or attack. They can also increase
transparency and accountability by allowing all participants to see the same information at
the same time. Additionally, they can reduce costs by eliminating the need for intermediaries
or third-party authorities.
1. Trust: Decentralized ledger systems allow for transactions to be verified and processed in
a trustless environment, meaning that participants do not need to trust one another to transact
securely.
4. Efficiency: Decentralized ledger systems can be more efficient than traditional systems
because they eliminate the need for intermediaries and reduce the time and cost required to
process transactions.
5. Accessibility: Decentralized ledger systems can provide access to financial services and
other applications to individuals who may not have access to traditional financial systems,
such as those in developing countries.
6. Innovation: Decentralized ledger systems have the potential to enable new applications
and business models that were not previously possible, such as decentralized finance (DeFi)
and peer-to-peer marketplaces.
2. Efficiency: Centralized systems can be more efficient than decentralized systems because
they have fewer intermediaries and can be designed for a specific purpose.
3. Familiarity: Centralized systems are familiar to most people, making them easier to use
and understand.
5. Security: Centralized systems can have robust security measures in place to protect against
unauthorized access and data breaches.
2. Cost: Centralized systems can be expensive to set up and maintain, as they require a
significant investment in infrastructure and personnel.
3. Vulnerability: Centralized systems are vulnerable to cyber attacks, data breaches, and
other forms of malicious activity.
5. Control: Centralized systems can be subject to abuse by those who control them, as they
have significant power over the system.
4
1. 51% attacks: In a decentralized system that relies on a blockchain, a 51% attack occurs
when a single entity or group of entities control more than 51% of the network's computing
power. This can allow them to manipulate transactions and potentially double-spend
cryptocurrency.
2. Smart contract vulnerabilities: Smart contracts are used to automate transactions and
enforce rules in decentralized systems, but they can contain vulnerabilities that allow
attackers to exploit the system. These vulnerabilities can include coding errors, logical flaws,
and other issues.
3. Malware and phishing attacks: Decentralized systems can be vulnerable to malware and
phishing attacks, which can trick users into giving away their private keys or other sensitive
information. Once an attacker has access to a user's private key, they can access the user's
account and steal their cryptocurrency.
4. Forks: In a decentralized system that uses a blockchain, a fork occurs when a group of
users splits off from the main network and creates a new blockchain. This can happen for
various reasons, such as a disagreement over the network's rules or a security breach. Forks
can cause confusion and potentially harm the value of the cryptocurrency.
3. Governance issues: Decentralized systems often rely on a governance model that allows
users to vote on changes to the network. However, this model can be vulnerable to
manipulation, centralization, and collusion.
5
4. Smart contract vulnerabilities: Smart contracts are used to enforce rules and automate
transactions in decentralized systems. However, these contracts can contain vulnerabilities
that can be exploited by attackers, leading to the loss of funds or other negative outcomes.
5. Code vulnerabilities: The code that powers decentralized systems can contain
vulnerabilities that can be exploited by attackers. These vulnerabilities can include coding
errors, logical flaws, or other issues.
1. Public ledger: Decentralized systems often rely on a public ledger, such as a blockchain,
to record transactions. While this provides transparency and immutability, it can also expose
personal information and transaction details to anyone with access to the ledger.
3. Malicious actors: Decentralized systems can be vulnerable to malicious actors who use
various tactics to exploit vulnerabilities and steal data or funds. These actors can include
hackers, scammers, and other criminals who seek to profit from the system's weaknesses.
5. Cost: Implementing and maintaining a blockchain network can be costly, particularly for
smaller organizations. This can limit the adoption of blockchain technology and make it more
difficult for it to become widely adopted.
6. Security: While blockchain technology offers many security benefits, it is not immune to
attacks or vulnerabilities. The risk of security breaches can make it more difficult for
organizations to adopt blockchain technology.
7. Technical complexity:- One of the main barriers to blockchain adoption is the technical
complexity of the technology itself. Blockchain involves complex concepts such as
cryptography, consensus algorithms, smart contracts, and distributed ledger. These concepts
require a high level of technical expertise and skills to understand, implement, and maintain.
Moreover, blockchain technology is still evolving and developing, which means that there are
no standardized protocols, frameworks, or best practices for blockchain development and
integration.
10. Skills gap:- A fifth barrier to blockchain adoption is the skills gap that exists in the
market. Blockchain technology requires a diverse and multidisciplinary set of skills and
competencies, such as technical, business, legal, and social skills. However, there is a
shortage of qualified and experienced professionals who can design, develop, and deploy
blockchain solutions. According to a report by LinkedIn, blockchain was the most in-demand
skill in 2020, but there were not enough candidates to meet the demand. This creates a
challenge for organizations to find, attract, and retain talent for their blockchain projects.
11. User adoption:- A sixth barrier to blockchain adoption is the user adoption that depends
on the awareness, understanding, and acceptance of the technology by the end-users.
Blockchain technology is still relatively new and unfamiliar to many people, who may not
fully grasp its benefits, risks, and implications. Moreover, some users may have concerns or
misconceptions about blockchain technology, such as its complexity, security, privacy, or
legality. Therefore, blockchain projects need to educate and engage their users and
stakeholders, and provide them with a user-friendly and intuitive interface and experience.
Blockchain technology has many potential uses across various industries, some of which
include:
1. Cryptocurrencies and digital assets: The most well-known use case for blockchain
technology is cryptocurrencies, such as Bitcoin and Ethereum, which allow for secure,
decentralized, and transparent transactions without the need for intermediaries.
2. Supply chain management: Blockchain technology can be used to improve supply chain
transparency and traceability by creating a decentralized and immutable record of all
transactions and events in the supply chain.
3. Identity verification: Blockchain technology can be used to securely store and verify
identities, which could potentially reduce identity theft and fraud.
8
4. Voting systems: Blockchain technology can be used to create secure and transparent
voting systems that are resistant to fraud and manipulation.
5. Smart contracts: Blockchain technology can be used to create and enforce programmable
contracts that automatically execute when certain conditions are met, which can reduce the
need for intermediaries and increase efficiency.
6. Healthcare: Blockchain technology can be used to securely store and share patient data,
improving the efficiency and accuracy of healthcare processes.
7. Gaming and virtual worlds: Blockchain technology can be used to create decentralized
gaming and virtual worlds that allow for secure ownership and exchange of virtual assets.
9
PRIVATE KEY
In the Private key, the same key (secret key) is used for encryption and decryption. In this
key is symmetric because the only key is copied or shared by another party to decrypt the
cipher text. It is faster than public-key cryptography.
When a user wants to receive cryptocurrency or digital assets, they share their public key
(which is also their blockchain address) with the sender. The sender uses this address to send
the cryptocurrency or digital asset to the user's wallet, which is secured by the corresponding
private key.
When a transaction is broadcast to the blockchain network, the public key is used to verify
the transaction and to ensure that the sender has the necessary funds to complete the
transaction. The transaction details are encrypted using the sender's private key, which
ensures that only the intended recipient can access the funds.
PUBLIC KEY
In a Public key, two keys are used one key is used for encryption and another key is used for
decryption. One key (public key) is used to encrypt the plain text to convert it into cipher text
and another key (private key) is used by the receiver to decrypt the cipher text to read the
message.
In blockchain, a private key is a secret cryptographic key that is used to sign and verify
digital transactions. It is generated alongside a public key in a public key cryptography
system, and together they form a unique key pair.
The private key is a string of alphanumeric characters that is kept secret and known only to
the owner of the cryptocurrency or digital asset. It is used to prove ownership and to
authorize the transfer of funds from one address to another. When a user wants to send
cryptocurrency or digital assets to another user, they sign the transaction using their private
key, which generates a digital signature that is broadcast to the blockchain network.
The private key is crucial for securing a user's digital assets, and it is important to keep it safe
and secure. Losing or sharing the private key can result in the loss of funds, as anyone who
has access to the private key can transfer the associated assets to their own wallet.
10
Many blockchain wallets, such as hardware wallets, mobile wallets, and desktop wallets, use
advanced security measures to protect the private keys of their users. These measures can
include encryption, multi-factor authentication, and other security features designed to
prevent unauthorized access to the private key.
DIGITAL SIGNATURE
Digital Signing in Blockchain is a process to verify the user‘s impressions of the transaction.
It uses the private key to sign the digital transaction, and its corresponding public key will
help to authorize the sender. However, in this way, anyone with the sender‘s public key can
easily decrypt the document.
When a user sends a transaction in blockchain, they create a digital signature by applying a
mathematical function to the transaction data using their private key. The resulting signature
is then broadcast to the network along with the transaction data.
Once the signature is received, the blockchain network uses the sender's public key to decrypt
the signature and verify its authenticity. If the signature is valid, the transaction is added to
the blockchain and becomes a part of the permanent ledger. If the signature is invalid, the
transaction is rejected and not added to the blockchain.
The use of digital signatures in blockchain technology provides a high degree of security and
tamper resistance. Since each signature is unique and based on the sender's private key, it is
virtually impossible to forge or tamper with a digital signature without access to the sender's
private key.
12
A hash function takes an input string (numbers, alphabets, media files) of any length and
transforms it into a fixed length. The fixed bit length can vary (like 32-bit or 64-bit or 128-bit
or 256-bit) depending on the hash function which is being used. The fixed-length output is
called a hash. This hash is also the cryptographic byproduct of a hash algorithm. We can
understand it from the following diagram.
In the context of blockchain, hash values are used to represent blocks of transaction data.
Each block in the blockchain network contains a hash value that is generated by applying a
cryptographic hash function to the block's transaction data. The hash value is unique to the
block's transaction data, and any change to the data will result in a different hash value.
Hash values are important for ensuring the security and immutability of the blockchain
network. Since each block's hash value is based on the transaction data of the previous block,
any attempt to alter a block's data will result in a mismatch between the block's hash value
and the hash value stored in the subsequent block. This makes it extremely difficult to alter or
tamper with data on the blockchain without being detected.
Hash values are also used to verify the authenticity of digital assets and to provide a secure
way to store passwords and other sensitive information. By applying a hash function to
sensitive information, the original data is transformed into a unique hash value that can be
stored securely without revealing the original data.
13
SHA-256
A Bitcoin's blockchain uses SHA-256 (Secure Hash Algorithm) hashing algorithm. In 2001,
SHA-256 Hashing algorithm was developed by the National Security Agency (NSA) in the
USA.
Trustlessness and immutability are two key features of blockchain technology that make it
unique and valuable for a wide range of use cases.
Trustlessness refers to the fact that blockchain technology enables secure transactions to take
place without the need for intermediaries or trusted third parties. This is made possible
through the use of a distributed ledger that is maintained by a decentralized network of nodes.
Each transaction is verified and validated by the network, and once it is confirmed, it is
recorded on the blockchain and becomes a permanent part of the ledger. This eliminates the
need for traditional intermediaries such as banks, brokers, or other financial institutions to
facilitate transactions, reducing costs and increasing efficiency.
Immutability — the ability for a blockchain ledger to remain a permanent, indelible, and
unalterable history of transactions — is a definitive feature that blockchain evangelists
highlight as a key benefit. Immutability has the potential to transform the auditing process
into a quick, efficient, and cost-effective procedure, and bring more trust and integrity to the
data businesses use and share every day.
Immutability refers to the fact that once a transaction has been recorded on the blockchain, it
cannot be easily modified or deleted. This is made possible through the use of complex
cryptographic algorithms that secure the data on the blockchain and link each block to the
one before it, creating a chain of blocks that is tamper-proof. As a result, the integrity and
accuracy of the data on the blockchain is maintained, and there is no need for centralized
authorities to manage or oversee the process.
Benefits of immutability
1. Complete Data Integrity — Ledgers that deploy blockchain technology can guarantee the
full history and data trail of an application: once a transaction joins the blockchain, it stays
there as a representation of the ledger up to that point in time. The integrity of the chain can
be validated at any time by simply re-calculating the block hashes — if a discrepancy exists
16
between block data and its corresponding hash, that means the transactions are not valid. This
allows organizations and its industry regulators to quickly detect data tinkering.
This capability allows for a host of time and cost savings — including tracking the
provenance of major bugs, auditing specific application data, backup and restoring database
state changes to retrieve information. Immutability can make the most modern-day data
problems that plague enterprise applications irrelevant.
4. Proof of Fault — Disputes over fault in business are all-too-common. The construction
industry accounts for $1 Trillion dollars in losses as a result of unresolved disputes. While
blockchain won‘t wholly dissolve this massive category of legal proceedings, it could be
leveraged to prevent a majority of disputes related to data provenance and integrity
(essentially proving who did what and at what time).
PROOF OF WORK
Proof of Work (PoW) is a consensus mechanism used in blockchain networks to validate
transactions and secure the network. In a PoW system, miners compete to solve complex
mathematical problems to add a new block to the blockchain. The miner who solves the
problem first and finds the solution adds the new block to the blockchain and receives a
reward in the form of cryptocurrency.
The mining process requires a significant amount of computing power, as miners must use
their hardware to solve the mathematical problem, which involves guessing a random number
until the correct answer is found. This process is computationally intensive, which makes it
difficult for a single miner to dominate the network or manipulate the blockchain. This is
because the probability of solving the mathematical problem is proportional to the amount of
computing power a miner contributes to the network.
PoW is used in the Bitcoin network and other blockchain networks that require a high level of
security and trust. One of the advantages of PoW is that it is a proven and well-established
consensus mechanism that has been used successfully in Bitcoin for over a decade. However,
17
the high energy consumption associated with PoW has been criticized for being
environmentally unsustainable and for contributing to climate change.
PROOF OF STAKE
Proof of Stake (PoS) is a consensus mechanism used in blockchain networks to validate
transactions and secure the network. In a PoS system, instead of miners competing to solve
complex mathematical problems, validators are selected to add new blocks to the blockchain
based on their stake in the network.
Another advantage of PoS is that it reduces the risk of centralization in the network, as it is
more difficult for a single entity to accumulate a large amount of cryptocurrency and
dominate the network. However, there are some challenges associated with PoS, such as the
potential for a "nothing at stake" problem, where validators may have no disincentive to
participate in multiple forks of the blockchain.
PoS is used in a number of blockchain networks, including Ethereum, Cardano, and Binance
Smart Chain. It is considered to be a promising alternative to PoW and is being actively
researched and developed in the blockchain industry.
Proof-of-stake reduces the amount of computational work needed to verify blocks and
transactions. Under proof-of-work, it kept blockchain secure. Proof-of-stake changes the way
blocks are verified using the machines of coin owners, so there doesn't need to be as much
computational work done. The owners offer their coins as collateral—staking—for the
chance to validate blocks and then become validators.
TOKEN
In blockchain technology, tokens are digital assets that are created and managed on a
blockchain network. They can represent any type of asset or value, such as currency, stocks,
property rights, or even loyalty points. Tokens are used to enable peer-to-peer transactions on
a blockchain, and can be exchanged for other tokens or for fiat currency. A crypto token is a
representation of an asset or interest that has been tokenized on an existing cryptocurrency's
blockchain.
TOKENIZING SHARES
Tokenizing shares refers to the process of creating digital tokens that represent shares in a
company. Tokenized shares can be bought, sold, and traded on a blockchain network, just
like traditional shares in a company. Tokenization provides several benefits, including
increased liquidity, reduced transaction costs, and faster settlement times.
20
Tokenized shares are often issued using smart contracts, which are self-executing contracts
that are encoded on a blockchain. Smart contracts can be programmed to automatically
execute specific actions when certain conditions are met, such as transferring ownership of a
tokenized share when payment is received.
Based on the shares that the custodian holds in reserve, tokens are issued on a blockchain.
The price of each token is pegged to the value of the shares.
The tokens can then be listed on a cryptocurrency exchange where they can be bought and
traded like any other cryptocurrency. Those who hold a stock token gain exposure to the
underlying stock pretty much as if they owned it, including dividend payouts where
applicable. However, they don‘t actually own shares. They own a derivative that is backed by
actual shares.
FUND RAISING
Blockchain technology has provided a new way of fundraising for businesses and startups
called Initial Coin Offerings (ICOs). An ICO is a type of crowdfunding campaign in which a
company creates and issues digital tokens or coins to the public in exchange for investment
funds.
1. Global Reach: With blockchain technology, businesses can access a global pool of
investors without having to go through traditional intermediaries.
2. Transparency: ICOs are transparent and publicly available on the blockchain, which
provides greater transparency and accountability to investors.
3. Lower Fees: ICOs generally have lower fees compared to traditional fundraising methods,
which can help businesses to save costs.
4. Fast and Efficient: The entire ICO process can be completed in a matter of weeks,
compared to months or even years for traditional fundraising methods.
However, ICOs are not without risks. One of the main risks associated with ICOs is the lack
of regulation, which makes it difficult for investors to protect themselves against fraud or
21
scams. Additionally, there is no guarantee that the tokens issued during an ICO will hold their
value, which can result in losses for investors.
The tradeoff is the high cost of having the exchange manage the coins directly. This includes
paying a listing fee for the token, as well as giving up a percentage of the token sales. In
essence, the exchange is loaning out its reputation to the project for financial gain.
This situation differs from when a cryptocurrency exchange chooses to list a project's token.
Based on the exchange's own conditions, an exchange might list a token once it
independently deems the project worth listing.
Regulations may include Know Your Customer (KYC) and Anti-Money Laundering (AML)
requirements. KYC and AML policies ensure that financial services recognize and minimize
risks in accordance with government regulations.
22
HYPERLEDGER
Hyperledger is an open source project created to support the development of blockchain-
based distributed ledgers. Hyperledger consists of a collaborative effort to create the needed
frameworks, standards, tools and libraries to build blockchains and related applications.
1. Hyperledger Fabric: a permissioned blockchain framework that allows for the creation of
smart contracts, asset issuance, and transactions.
2. Hyperledger Sawtooth: a modular and scalable blockchain platform that allows for easy
deployment and management of distributed ledgers.
4. Hyperledger Burrow: a permissioned Ethereum virtual machine that allows for smart
contract execution.
Hyperledger also offers various tools and resources, including development environments,
documentation, and support services, to help developers and enterprises build, deploy, and
manage blockchain solutions.
One of the key benefits of Hyperledger is that it provides a common platform for businesses
and developers to collaborate and build blockchain-based solutions. Hyperledger also offers a
level of trust and security that is important for enterprise use cases, and its modular design
allows for flexibility and scalability.
23
RANSOMWARE
Ransomware attacks involve the encryption of a victim's files or data by a cybercriminal, who
then demands a ransom payment in exchange for the decryption key. Blockchain technology
has been used by attackers to facilitate ransomware attacks in several ways.
One method involves the use of cryptocurrencies, which are based on blockchain technology,
as a means of payment for the ransom. Since cryptocurrency transactions are anonymous and
irreversible, it can be difficult for law enforcement agencies to track and trace the attackers.
Another method involves the use of blockchain-based ransomware. This type of ransomware
is designed to encrypt a victim's data and demand payment in cryptocurrency, with the
promise of providing the decryption key once the payment is received. The attacker may also
threaten to publish the victim's data publicly if the ransom is not paid.
1. Keep your software updated: Regularly update your blockchain software to ensure that it
is equipped with the latest security patches and features.
2. Use strong passwords: Use strong and unique passwords for your blockchain accounts
and change them regularly.
3. Backup your data: Regularly back up your blockchain data to an external hard drive or
cloud storage. This will help you restore your data in case of a ransomware attack.
24
4. Use antivirus software: Use reputable antivirus software to protect your system from
malware and viruses.
5. Educate employees: Educate employees on how to identify and avoid phishing attacks
and other cybersecurity threats. This includes not opening suspicious emails, links or
attachments, and not downloading software or applications from untrusted sources.
7. Have a response plan: Have a ransomware response plan in place, including steps to take
if an attack occurs. This plan should include steps for isolating and containing the affected
systems, notifying stakeholders, and restoring data from backups.
Money laundering is the process of disguising the proceeds of illegal activity as legitimate
funds. Blockchain technology has been touted as a potential solution for reducing money
laundering due to its transparency and immutability. However, it is important to note that
blockchain technology is not inherently immune to money laundering.
One way that money laundering can occur in blockchain is through the use of anonymous
cryptocurrencies. These cryptocurrencies, such as Monero and Zcash, can provide a high
level of privacy and anonymity, making it difficult to trace the flow of funds. Criminals can
use these cryptocurrencies to launder their illicit proceeds by converting them into a more
established cryptocurrency, such as Bitcoin, and then cashing out the Bitcoin through an
exchange.
Another way that money laundering can occur in blockchain is through the use of "mixers" or
"tumblers." These are services that allow users to mix their cryptocurrency transactions with
others in order to obscure the source and destination of the funds. While mixers can be used
for legitimate purposes, they can also be used to launder funds by mixing illicit transactions
with legitimate ones.
Additionally, criminals can use the anonymity of blockchain to create fake identities and shell
companies in order to move illicit funds without detection. They can also use the
decentralized nature of blockchain to set up illegal marketplaces or to facilitate the purchase
and sale of illegal goods and services.
In summary, while blockchain technology has the potential to help combat money laundering,
it is not a silver bullet solution. It is important for governments and regulatory bodies to work
25
with blockchain companies to develop effective measures to prevent money laundering and
other illicit activities on the blockchain.
Criminals open online accounts with digital currency exchanges, which accept fiat
currency from traditional bank accounts. Then, they start a ‗cleansing‘ process
(mixing and layering), i.e., moving money into the cryptocurrency system by using
mixers, tumblers, and chain hopping (also called cross-currency). Money is moved
from one cryptocurrency into another, across digital currency exchanges — the less-
regulated the better — to create a money trail that is almost impossible to track.
According to the ―Cryptocurrency Anti-Money Laundering Report,‖ criminals also
use theft and gambling to launder cryptocurrencies.
Creation of Dark Web or Dark Market which cause it to exploit users through
hacking.
With a market capitalization of $350 billion, bitcoin is the largest cryptocurrency in
the world. A distinctive feature of bitcoin is that a record of all transactions is held in
a public ledger maintained simultaneously across thousands of computers. As per
bitcoin proponents, the latter are prone to manipulation or hacking.
Cryptocurrency does not have any legal tender. So, it cannot be authorized and can be
subscribed by anyone which results in money laundering.
Since it doesn‘t have regulatory authority, it is easy to trade between countries and
can cause money laundering in disguise of trading.
Cryptocurrency is highly encrypted and cannot be traced easily.
Layering: Cryptocurrencies can be purchased with cash (fiat) or other types of crypto
(altcoin). Online cryptocurrency trading markets (exchanges) have varying levels of
26
Solution/Prevention
Bringing KYC norms into cryptocurrencies.
Bringing Japan Model where they are provided with licenses and can be easily
traceable.
Adhering to FATF guidelines regarding cryptocurrency.
Need to expand capabilities on ways to probe virtual assets and regulate virtual asset
provides to prevent money laundering.
A multi-disciplinary agency to work with public and private partnership is key
tackling criminal finances.
27
CYBER CURRENCIES
Cyber currencies, also known as digital currencies or cryptocurrencies, are a type of currency
that is created and managed using cryptographic techniques, and is often built on top of a
blockchain platform. Examples of popular cyber currencies include Bitcoin, Ethereum, and
Litecoin.
One of the main advantages of cyber currencies is that they are decentralized, meaning that
they are not controlled by any central authority or government. Transactions are recorded on
a public ledger called a blockchain, which is maintained by a network of users who
collectively validate and verify each transaction.
Cyber currencies have several features that make them attractive to users, including:
1. Anonymity: Transactions are often anonymous, meaning that users can transact without
revealing their true identities.
2. Security: Cryptographic techniques are used to secure transactions and protect the privacy
of users.
3. Transparency: Transactions are publicly visible on the blockchain, making it difficult for
fraudulent transactions to go undetected.
However, cyber currencies also have several challenges and risks that need to be addressed,
such as:
1. Volatility: Cyber currencies can be highly volatile, with prices fluctuating rapidly in
response to market conditions.
2. Regulation: There is often a lack of clear regulatory frameworks for cyber currencies,
which can make it difficult for businesses and users to operate legally and safely.
3. Security: Cyber currencies are often the target of hacking and other cyber attacks, which
can result in the loss of funds for users.
28
UNIT 5 – CRYPTOCURRENCY
CRYPTOCURRENCY INTRODUCTION
As of March 2023, there are 22,904 cryptocurrencies in existence.
there are around 20,000 cryptocurrencies available in the Indian crypto market.
In India 11 cryptocurrency exchanges - CoinDCX, BuyUcoin, CoinSwitch Kuber,
Unocoin, Flitpay, Zeb IT Services Pvt Ltd, Secure Bitcoin Traders Pvt Ltd, Giottus
Technologies, Awlencan Innovations India Pvt Ltd (ZebPay), Zanmai Labs (WazirX),
and Discidium Internet Labs.
Cryptocurrency is a digital or virtual currency that uses cryptography for security and
operates independently of a central bank. It is based on a decentralized system, meaning that
transactions are recorded on a public ledger called a blockchain that is maintained by a
network of users.
Cryptocurrencies are often created through a process called mining, which involves using
specialized computers to solve complex mathematical problems and verify transactions on
the blockchain. In exchange for their efforts, miners are rewarded with new units of the
cryptocurrency.
The most well-known cryptocurrency is Bitcoin, which was created in 2009. Since then,
thousands of other cryptocurrencies have been created, including Ethereum, Litecoin, and
Ripple.
One of the main advantages of cryptocurrencies is that they allow for peer-to-peer
transactions without the need for a centralized authority, such as a bank or government. This
makes them ideal for people who want to transact with others without having to go through
traditional financial institutions.
Cryptocurrencies are also often associated with increased security and privacy, as
transactions are encrypted and can be difficult to trace. However, this has also led to concerns
around their use for illegal activities, such as money laundering and terrorism financing.
HISTORY
Cryptocurrency is a relatively new phenomenon that emerged in the late 2000s with the
creation of Bitcoin, the world's first decentralized digital currency. However, the concept of
digital currencies can be traced back to the early 1980s, when cryptographer David Chaum
created the first digital cash system called "eCash."
29
In 2008, an anonymous person or group of people under the pseudonym "Satoshi Nakamoto"
published a whitepaper outlining a new decentralized digital currency called Bitcoin. The
goal was to create a currency that would allow people to make transactions without the need
for a centralized authority, such as a bank or government.
Bitcoin uses a decentralized public ledger called the blockchain to record transactions and
prevent fraud. The blockchain is maintained by a network of users who validate and verify
each transaction, ensuring its authenticity and preventing double-spending.
Bitcoin gained popularity among tech enthusiasts and investors, and its value surged in 2013,
reaching an all-time high of over $1,000. Since then, numerous other cryptocurrencies have
emerged, including Ethereum, Ripple, and Litecoin.
While cryptocurrencies have gained widespread attention and adoption, they have also faced
criticism and regulatory challenges. Concerns around money laundering, terrorist financing,
and market manipulation have led to increased scrutiny and regulation from governments and
financial institutions.
DISTRIBUTED LEDGER
Distributed ledger technology is a platform that uses ledgers stored on separate, connected
devices in a network to ensure data accuracy and security. Blockchains evolved from
distributed ledgers to address growing concerns that too many third parties are involved in
too many transactions.
30
A distributed ledger is a type of database that is spread across multiple nodes or computers on
a network. Each node on the network has a copy of the database, and any changes to the
database are replicated and synchronized across all nodes in real-time.
One of the most well-known examples of a distributed ledger is the blockchain, which is used
as the underlying technology for cryptocurrencies like Bitcoin and Ethereum. In a blockchain,
each block contains a set of transactions that have been validated by network participants,
and each block is cryptographically linked to the previous block, creating a chain of blocks
that contains a complete history of all transactions on the network.
Distributed ledgers offer several advantages over traditional centralized databases. For one,
they are more secure, as data is stored across multiple nodes, making it difficult for any one
entity to tamper with or corrupt the data. Additionally, distributed ledgers are more
transparent, as all participants on the network have access to the same data and can validate
transactions in real-time.
Distributed ledgers are being used in a wide range of applications beyond cryptocurrencies,
including supply chain management, identity verification, and voting systems. By using
distributed ledgers, these applications can benefit from increased security, transparency, and
efficiency.
BITCOIN
Bitcoin is a decentralized digital currency that operates on a peer-to-peer network.
Transactions on the Bitcoin network are validated and verified by network participants called
miners, who are incentivized to participate in the network through a process called mining.
The mining reward is an important aspect of the Bitcoin protocol, as it is used to incentivize
network participation and ensure the security and integrity of the network. When Bitcoin was
first launched in 2009, the mining reward was set at 50 bitcoins per block. However, this
reward is designed to decrease over time, in order to limit the total supply of bitcoins to 21
million.
Every 210,000 blocks, the mining reward is halved, meaning that miners receive half the
amount of bitcoins for verifying transactions. This process is known as the halving, and it is
designed to ensure that the total supply of bitcoins does not exceed 21 million.
Currently, the mining reward is 6.25 bitcoins per block, as the most recent halving occurred
in May 2020. However, as the mining reward continues to decrease over time, it is expected
that transaction fees will become a more significant source of revenue for miners.
In order to stay competitive in the mining process, miners must continually upgrade their
hardware and software to solve mathematical problems more quickly and efficiently. This has
led to the development of specialized mining equipment, such as ASICs (Application-
Specific Integrated Circuits), which are designed specifically for Bitcoin mining.
32
ETHEREUM
The Ethereum blockchain allows developers to create and deploy custom dApps, which can
range from financial applications, such as decentralized exchanges and stablecoins, to gaming
and social media platforms. These dApps can interact with each other through the Ethereum
network, creating a decentralized ecosystem of applications.
One of the key features of Ethereum is its support for smart contracts, which are self-
executing contracts that automatically enforce the terms of an agreement when certain
conditions are met. Smart contracts are written in programming languages such as Solidity
and can be used to automate complex financial transactions and other operations.
The native cryptocurrency of the Ethereum network is Ether (ETH), which is used to pay for
transaction fees and incentivize network participants to validate transactions and create new
blocks.
In addition to its support for dApps and smart contracts, Ethereum has also been used as a
fundraising tool for blockchain-based projects through initial coin offerings (ICOs).
However, ICOs have come under scrutiny from regulators in recent years, and many projects
are now using alternative fundraising methods such as initial exchange offerings (IEOs) and
security token offerings (STOs).
Ethereum Features
Ether: This is Ethereum‘s cryptocurrency.
Smart contracts: Ethereum allows the development and deployment of these types of
contracts.
Ethereum Virtual Machine: Ethereum provides the underlying technology—the
architecture and the software—that understands smart contracts and allows you to
interact with it.
Decentralized applications (Dapps): A decentralized application is called a Dapp
(also spelled DAPP, App, or DApp) for short. Ethereum allows you to create
consolidated applications, called decentralized applications.
Decentralized autonomous organizations (DAOs): Ethereum allows you to create
these for democratic decision-making.
ETHEREUM – CONSTRUCTION
Ethereum is constructed as a decentralized, open-source blockchain platform. It is built on
top of a peer-to-peer network that allows for the creation of decentralized applications
(dApps) and smart contracts.
At its core, Ethereum is a distributed database that stores information about transactions and
contracts on the network. Each node on the network has a copy of the Ethereum blockchain,
which is continually updated as new transactions and blocks are added.
One of the key features of Ethereum is its support for smart contracts, which are self-
executing contracts that are programmed to automatically execute when certain conditions
are met. These contracts are written in Solidity, a programming language specifically
designed for the Ethereum network.
Smart contracts are used to automate a wide range of operations, from financial transactions
to voting systems and supply chain management. They are stored on the Ethereum blockchain
and can be accessed and executed by anyone on the network, making them transparent,
secure, and resistant to censorship.
The native cryptocurrency of the Ethereum network is Ether (ETH), which is used to pay for
transaction fees and incentivize network participants to validate transactions and create new
blocks.
34
The concept of a DAO is based on the idea that organizations can be run in a decentralized
and transparent way, without the need for intermediaries such as banks, lawyers, or other
third parties. This can reduce costs, increase transparency, and provide greater control and
autonomy to members.
One of the most well-known examples of a DAO is The DAO, which was launched on the
Ethereum blockchain in 2016. The DAO was designed as a venture capital fund, allowing
members to invest in promising blockchain-based startups. However, it was also subject to a
high-profile hack, which resulted in the loss of millions of dollars worth of Ether.
Since then, there have been many other attempts at creating successful DAOs, with varying
levels of success. While the concept of a decentralized and autonomous organization has the
potential to revolutionize the way that we organize and govern ourselves, there are still many
challenges to be overcome, including issues of governance, security, and scalability.
Benefits of DAOs
Some of the benefits of this form of management include:
Instead of relying on the actions of one individual (CEO) or a small collection of individuals
(Board of Directors), a DAO can decentralize authority across a vastly larger range of users.
2. Participation. Individuals within an entity may feel more empowered and connected to the
entity when they have a direct say and voting power on all matters. These individuals may
not have strong voting power, but a DAO encourages token holders to cast votes, burn
tokens, or use their tokens in ways they think is best for the entity.
3. Publicity. Within a DAO, votes are cast via blockchain and made publicly viewable. This
requires users to act in ways they feel is best, as their vote and their decisions will be made
publicly viewable. This incentivizes actions that will benefit voters' reputations and
discourage acts against the community.
4. Community. The concept of a DAO encourages people from all over the world to
seamlessly come together to build a single vision. With just an internet connection,
tokenholders can interact with other owners wherever they may live.
Limitations of DAOs
Here are some limitations to the DAO structure.
1. Speed. If a public company is guided by a CEO, a single vote may be needed to decide a
specific action or course for the company to take. With a DAO, every user is given an
opportunity to vote. This requires a much longer voting period, especially considering time
zones and prioritizes outside of the DAO.
36
2. Education. Similar to the issue of speed, a DAO has the responsibility of educating a lot
more people in regards to pending entity activity. A single CEO is much easier to keep
comprised of company developments, while tokenholders of a DAO may have ranging
educational backgrounds, understanding of initiatives, incentives, or accessibility to
resources. A common challenge of DAOs is that while they bring a diverse set of people
together, that diverse set of people must learn how to grow, strategize, and communicate as a
single unit.
3. Inefficiency. Partially summarizing the first two bullets, DAOs run a major risk of being
inefficient. Because of the time needed to administrative educate voters, communicate
initiatives, explain strategies, and onboard new members, it is easy for a DAO to spend much
more time discussing change than implementing it. A DAO may get bogged down in trivial,
administrative tasks due to the nature of needing to coordinate much more individuals.
4. Security. An issue facing all digital platforms for blockchain resources is security. A DAO
requires significant technical expertise to implement; without it, there may be invalidity to
how votes are cast or decisions made. Trust may be broken and users leave the entity if they
can't rely on the structure of the entity. Even through the use of multi-sig or cold wallets,
DAOs can be exploited, treasury reserves stolen, and vaults emptied.
SMART CONTRACT
Smart contracts are simply programs stored on a blockchain that run when predetermined
conditions are met. They typically are used to automate the execution of an agreement so that
all participants can be immediately certain of the outcome, without any intermediary's
involvement or time loss.
A smart contract is a self-executing contract with the terms of the agreement between buyer
and seller being directly written into code. Smart contracts are programmed on a blockchain
and automatically enforce the rules and regulations specified within the code.
Smart contracts are designed to automate the execution of contractual obligations and enable
trust and security in the absence of intermediaries. They can be used for a wide range of
applications, including financial transactions, real estate, supply chain management, and
voting systems.
Smart contracts are typically written in a high-level programming language, such as Solidity
for the Ethereum blockchain. Once deployed on the blockchain, they can be accessed and
executed by anyone on the network, making them transparent, secure, and resistant to
censorship.
The benefits of smart contracts include increased efficiency, transparency, and security, as
well as the ability to automate complex processes and reduce the need for intermediaries. For
example, in a real estate transaction, a smart contract could be used to automatically transfer
ownership of a property once certain conditions are met, such as the completion of a building
inspection and the transfer of funds from the buyer to the seller.
However, there are also limitations and challenges associated with smart contracts. These
include issues related to code quality, scalability, and interoperability with other systems.
Additionally, smart contracts are only as good as the code they are written in, and
vulnerabilities or errors in the code can lead to significant losses or other issues.
38
The GHOST protocol is designed to increase transaction throughput and reduce network
congestion by allowing orphaned blocks to be included in the blockchain. Orphaned blocks
are blocks that are not part of the main chain because they were not mined fast enough or
received by nodes too late. In the original Bitcoin protocol, orphaned blocks are simply
discarded, leading to wasted mining efforts and reduced transaction throughput.
The GHOST protocol solves this problem by allowing orphaned blocks to be included in the
blockchain as "uncles." Uncles are blocks that are not part of the main chain but are still valid
and contribute to the security of the network. By including uncles in the blockchain, the
GHOST protocol increases the reward for miners and reduces the risk of network congestion.
The GHOST protocol has been implemented in several cryptocurrencies, including Ethereum
and Litecoin. However, it is important to note that the GHOST protocol is not without its
limitations and challenges. For example, including uncles in the blockchain can lead to
increased complexity and potential security vulnerabilities, and the protocol must be carefully
designed and tested to ensure its effectiveness and security.
VULNERABILITIES (कमजोररयों)
1. 51% Attack: A 51% attack occurs when a single entity or group of entities control more
than 50% of the mining power in a blockchain network. This can allow them to manipulate
transactions, double-spend coins, or even rewrite the entire blockchain.
2. Sybil Attack: A Sybil attack occurs when a single entity creates multiple fake identities
(or nodes) to gain control or influence over a network.
3. Smart Contract Vulnerabilities: Smart contracts are self-executing programs that run on
a blockchain. If a smart contract has a vulnerability or flaw in its code, it can be exploited by
attackers to steal or manipulate funds.
4. Fraud:- Fraud is a vulnerability for any financial system and can happen in online
marketplaces if a platform misappropriates its client‘s funds. It can also occur with initial
coin offering (ICO) scams. With a false ICO, an investor transfers bitcoins to a recipient who
they believe is a legitimate ICO campaign. In reality, the recipient doesn‘t make any
investments and keeps the bitcoin for themselves.
5. Private key security attack:- A private key is a unique code allowing investors to access
their funds and transactions. Private key security attacks involve hackers recovering private
39
keys (or wallet keys) and using them. Unfortunately, tracking criminal activity from a stolen
private key is difficult.
6. Data breach:- Bitcoin marketplaces can experience a data breach where hackers steal
login credentials and use them to transfer bitcoins to themselves. Luckily, sufficient network
protocols can prevent bitcoins from getting lost.
7. Phishing and Social Engineering:- Phishing schemes use false emails or website
interfaces to trick users into giving hackers their login credentials. A hacker could create a
realistic email pretending to be a legitimate company and embed the email with fake
hyperlinks asking users to verify their login information.
Attackers can use social engineering techniques to trick users into giving up their private keys
or other sensitive information. This can be done through phishing attacks, fake ICOs (initial
coin offerings), or other means.
10. Malware and Hacking: Malware and hacking attacks can target cryptocurrency wallets,
exchanges, and other platforms to steal private keys or gain unauthorized access to user
accounts.
11. Insider Threats: Insider threats can come from employees or contractors who have
access to sensitive information or systems. They can use their access to steal funds or
manipulate transactions.
SIDE CHAIN
A sidechain is a separate blockchain that runs independent of Ethereum and is connected to
Ethereum Mainnet by a two-way bridge. The prominent examples of sidechains include the
Liquid Network and RootStock or RSK, which work as Bitcoin's sidechains.
40
A sidechain is a separate blockchain that is connected to a parent blockchain, allowing for the
transfer of assets and data between the two chains. Sidechains are designed to address some
of the limitations of the main blockchain, such as scalability and transaction speed, while still
maintaining the security and trustlessness of the blockchain network.
In a sidechain, users can transfer assets from the parent blockchain to the sidechain, where
they can be used for different purposes, such as faster and cheaper transactions, smart
contract execution, or privacy features. Once the assets are no longer needed on the
sidechain, they can be transferred back to the parent blockchain.
1. Scaling: By offloading some of the transaction volume to a sidechain, the main blockchain
can be relieved of some of the processing burden and can handle more transactions overall.
3. Interoperability: Sidechains can allow for the transfer of assets and data between different
blockchain networks, enabling greater interoperability and collaboration between different
projects.
Pros Cons
The technology underpinning sidechains is well- Sidechains trade off some measure of
established and benefits from extensive research decentralization and trustlesness for
and improvements in design. scalability.
Sidechains support general computation and offer A sidechain uses a separate consensus
EVM compatibility (they can run Ethereum- mechanism and doesn't benefit from
native dapps). Ethereum's security guarantees.
Sidechains use different consensus models to Sidechains require higher trust assumptions
efficiently process transactions and lower (e.g., a quorum of malicious sidechain
transaction fees for users. validators can commit fraud).
NAME COIN
Namecoin (NMC) is a blockchain system and cryptocurrency which allows users to protect
domain name servers (DNS) by embedding them on a distributed ledger. The stated purpose
of Namecoin is to protect free speech by making the Internet resistant to censorship.
Namecoin is a cryptocurrency that was created in 2011 as a fork of the Bitcoin protocol. It
was designed to provide an alternative to the centralized Domain Name System (DNS) by
creating a decentralized domain name registration system.
Namecoin operates on its own blockchain, separate from Bitcoin, but it shares many of the
same technical features, such as proof-of-work mining and a limited supply of coins. The
primary difference is that Namecoin includes a decentralized name registration system, which
allows users to register and manage domain names without relying on a centralized authority.
Namecoin domain names are stored on the blockchain, making them resistant to censorship
and seizure. Users can register and transfer domain names using Namecoin's own name
registration system, which is similar to the traditional DNS but without the need for a
centralized authority. Domain name owners can also associate additional information with
their domains, such as contact information or public keys for encryption.
42
In addition to its domain name system, Namecoin can also be used for other applications that
require decentralized, secure, and censorship-resistant data storage, such as identity
management, file storage, and voting systems.
While Namecoin has not achieved the same level of popularity or market capitalization as
some other cryptocurrencies, it is still actively developed and used by a dedicated community
of users and developers.
43
STAKEHOLDERS
Stakeholders in the cryptocurrency ecosystem include a wide range of individuals and
organizations who have an interest in the development, adoption, and regulation of
cryptocurrencies. Here are some examples:
1. Users: Cryptocurrency users are individuals who own, buy, sell, or use cryptocurrencies
for various purposes, such as investments, payments, remittances, and online commerce.
Users play a crucial role in the adoption and growth of cryptocurrencies.
4. Exchanges: Cryptocurrency exchanges are online platforms where users can buy, sell, and
trade cryptocurrencies with fiat currencies or other cryptocurrencies. They are an essential
gateway for users to enter and exit the cryptocurrency ecosystem.
Stakeholder types
ROOTS OF BITCOIN
Bitcoin was first introduced to the world in a whitepaper published in 2008 by an unknown
person or group using the pseudonym Satoshi Nakamoto. The paper, titled "Bitcoin: A Peer-
to-Peer Electronic Cash System," described a new digital currency that would allow for
secure, decentralized transactions without the need for intermediaries like banks or
governments.
The roots of Bitcoin can be traced back to several earlier attempts to create digital currencies.
In the 1980s and 1990s, several pioneering computer scientists and cryptographers, including
David Chaum, Nick Szabo, and Adam Back, proposed various forms of digital currencies and
electronic cash systems. However, these early attempts were hampered by technical
limitations and the lack of a reliable decentralized infrastructure.
4. Taxation: Cryptocurrency exchanges must comply with tax regulations in their respective
jurisdictions. This can involve collecting and remitting taxes on transactions or profits earned
by users.
5. Consumer protection: Cryptocurrency exchanges must ensure that users are protected
from fraud, scams, and other forms of misconduct. This can involve implementing refund
policies, dispute resolution mechanisms, and user education and support programs.
Regulatory landscape: In 2018, the Reserve Bank of India (RBI) banned banks and other
financial institutions from dealing with cryptocurrency exchanges, making it difficult for
exchanges to operate. However, in March 2020, the Supreme Court of India overturned the
ban, allowing cryptocurrency exchanges to resume operations.
Exchange options: There are several cryptocurrency exchanges operating in India, including
CoinDCX, WazirX, and Zebpay. These exchanges allow users to buy, sell, and trade various
cryptocurrencies, and many offer features like mobile apps, margin trading, and staking.
Payment options: Cryptocurrency exchanges in India typically allow users to fund their
accounts using bank transfers, UPI, or other payment methods. However, some exchanges
have faced challenges in processing payments due to the regulatory environment.
Future outlook: The regulatory environment for cryptocurrencies in India is still uncertain,
with ongoing debates around how to regulate and tax these assets. However, many in the
cryptocurrency community are optimistic about the potential for growth and innovation in
India's rapidly evolving digital economy.
46
RBI issued a circular In April 2018 preventing commercial and co-operative banks, small
finance banks, payment banks and NBFC from not only from dealing in virtual currencies
themselves but also directing them to stop providing services to all entities which deal with
virtual currencies. on My 15 2018, The Internet and Mobile Association of India (IMAI) filed
a writ petition in the Supreme Court for withdrawing RBI Circular. Supreme court passed a
decision, quashing the earlier ban imposed by the RBI.
As a next step government introduced Digital currency bill 2019. Under the bill, Mining,
holding, selling, issuing, transferring or using cryptocurrency is punishable with an
imprisonment of up to 10 years . The bill paved the way for the government to introduce its
own digital currency, namely Digital Rupee,' by the Central Bank.
Under the Bill, Cryptocurrency is defined as any information, code, or token which has a
digital representation of value and has utility in a business activity, or acts as a store of value
or a unit of account.
Recently on 29 January 2021, in circular number 2,022, in the E' new bills section under
Legislative business, the Indian government proposed a new bill. The government has listed
the new bill that will prohibit all private cryptocurrencies in India and provide a framework
for creation of an official digital currency to be issued by the Reserve Bank of India. The new
bill to be called as The Cryptocurrency and Regulation of Official Digital Currency Bill
2021, seeks to create a facilitative framework for an official digital currency that will be
issued by the Reserve Bank of India (RBI).
The bill also contains provisions for banning all private cryptocurrencies such as Bitcoin,
Ether, and Ripple but will exempt certain uses and the promotion of the underlying
technology of such tenders. In an RBI booklet on payment systems, the government also
mulled the creation of a digital version of India Rupee.
That being said, cryptocurrencies have been used on the black market for activities like drug
trafficking, money laundering, and other illicit transactions. This is due in part to the
decentralized and pseudonymous nature of cryptocurrencies, which can make it difficult for
authorities to track and regulate their use.
However, it's important to note that many legitimate businesses and individuals also use
cryptocurrencies for legitimate purposes, such as investing, trading, and online transactions.
In terms of the global economy, cryptocurrencies have the potential to disrupt traditional
financial systems by providing new ways to store and transfer value. They also have the
potential to increase financial inclusion by providing access to financial services for people
who are unbanked or underbanked.
However, cryptocurrencies also pose challenges for governments and financial institutions, as
they can be difficult to regulate and monitor. This has led to a range of responses from
different countries, with some embracing cryptocurrencies and others cracking down on their
use.
Overall, cryptocurrencies are a complex and evolving topic, with both benefits and risks for
the global economy. As the technology and regulatory landscape continue to evolve, it will be
important to carefully consider the role of cryptocurrencies in shaping the future of finance.
48
1. Increased transparency: Blockchain technology can provide a single, shared ledger that
records all transactions within a supply chain. This can improve transparency and reduce the
risk of fraud, as all parties can see and verify the authenticity of transactions.
2. Reduced risk: By using smart contracts, blockchain can automate many aspects of supply
chain financing, reducing the risk of errors and delays. Smart contracts can automatically
trigger payments when certain conditions are met, such as the delivery of goods or the
completion of a project.
3. Improved efficiency: Blockchain can help streamline the supply chain financing process
by reducing the need for intermediaries and manual processes. This can help speed up the
process of financing and reduce costs for all parties involved.
4. Enhanced traceability: Blockchain can help track the movement of goods and materials
within a supply chain, providing an immutable record of their origin, quality, and
authenticity. This can be particularly useful for industries like food and pharmaceuticals,
where traceability is critical for safety and compliance.
Global Retail places an order for cardboard boxes with ABC Cartons – a box
manufacturer.
The order is inserted into a blockchain established to manage the transaction.
ABC asks their bank to fund the cost of raw materials to produce the boxes. The bank
agrees and they enter a new block in the chain. The action is also visible to Global.
ABC receives the funds and makes the boxes. They ship them to Global along with
the invoice. The bank has sight of the shipping and billing, which are new blocks in
the chain.
Global receives the boxes and pays ABC. Two more blocks are added to the digital
ledger. ABC and the bank see these actions.
ABC repays the bank, and the bank closes the loan record. (Two more blocks).
Global closes the chain. (Final block).
Trade finance is the process of financing international trade transactions, including the
movement of goods, services, and capital across borders. The traditional methods of trade
50
finance are often slow, expensive, and prone to fraud, with a heavy reliance on paper-based
documentation and intermediaries.
The resulting blockchain-based trade network is designed to improve the trade finance
lending process, helping banks access new markets with new products, while reducing risk
and streamlining cross-border trade for buyers and sellers as they grow their business and
expand into new countries.
Smart contracts are a key feature of blockchain technology that can automate many of the
processes involved in trade finance. Smart contracts are self-executing contracts with the
terms of the agreement between buyer and seller being directly written into lines of code.
This automation can reduce the time and cost of executing trade finance transactions.
In addition, blockchain technology can facilitate faster and more efficient financing by
providing real-time visibility into the movement of goods and the status of transactions. This
can help reduce the risk of delays and errors, and improve the overall efficiency of trade
finance.
Pursue new revenue streams through new financing products and alternatives to
letters of credit
51
Offer banking services to small and medium enterprises (SMEs) and companies that
would traditionally use open account trading
Gain deep insights into client financial positions and transaction histories
Reduce operating costs by digitizing slow and cumbersome paper processes
Employ blockchain security attributes to demonstrate greater visibility and control of
their transactions, thereby positively affecting the bank‘s capital adequacy position
Speed financing approval processes and trading cycles
Access trade finance products and services offered by participating banks more
readily than through traditional routes
Reduce the risk of non-payment or late payment by a new buyer
Track all steps in a trade deal end-to-end
Expand reach and grow business through access to global markets
Speed business processes with digitization and automation
Permissioned blockchains are private blockchain networks that are restricted to a specific
group of participants who are authorized to access and validate transactions. Unlike public
blockchains, where anyone can join and participate in the network, permissioned blockchains
are controlled by a central authority, which sets the rules and regulates access to the network.
2. Transparency:- Users within a permissionless network can access all types of information
(except private keys). Because the very nature of a decentralized network is to eschew central
authority figures, transparency of transactions in a permissionless network is valued.
4. Tokens:- Permissionless blockchains allow the utilization of tokens or digital assets. These
typically serve as incentives for users to take part in the network. Tokens and assets can
either increase in value or decrease in value over time, depending on the market.
53
54
INTERNET OF THINGS
IoT stands for the Internet of Things. It refers to a network of physical devices, vehicles,
home appliances, and other items embedded with electronics, sensors, software, and
connectivity that enable them to connect and exchange data with each other and with other
systems over the internet. The IoT allows devices to collect and share data, interact with their
environment, and automate tasks to improve efficiency, convenience, and productivity.
Examples of IoT devices include smart home devices like thermostats and cameras, wearable
fitness trackers, smart medical devices, and industrial equipment used in factories and
logistics operations.
2. Smart Contracts: Smart contracts can be used to automate the process of exchanging data
and value between IoT devices. For example, a smart contract could be created to
automatically transfer funds from one device to another when a certain condition is met.
3. Asset Tracking: Blockchain can be used to track and manage assets in real-time. This is
particularly useful in industries such as logistics and transportation where it is important to
know the exact location and condition of goods at all times.
5. Identity Management: Blockchain can be used to create secure and decentralized identity
systems for IoT devices. This can help prevent unauthorized access and ensure that devices
are communicating with trusted parties.
6. Automotive Industry:- Digitization has swept across all sectors of the industry, and the
automotive industry is no exception. Today, automotive companies are leveraging IoT-
enabled sensors to develop fully automated vehicles. The automotive industry is further
inclined to connecting IoT enabled vehicles with Blockchain tech to allow multiple users to
exchange crucial information easily and quickly. Also, the industry is readily exploiting
Blockchain IoT use cases that can transform autonomous cars, smart parking, and automated
traffic control for the better.
7. Pharmacy Industry:- One of the biggest challenges of the pharmaceutical sector is the
increasing incidence of counterfeit medicines. Thanks to Blockchain IoT, the pharmacy
55
industry is now capable of countering this issue. Blockchain IoT allows all the stakeholders
involved in the drug manufacturing process to be responsible and update the Blockchain
network with relevant information in real-time.
For instance, Telstra, an Australian telecommunication and media company, provides smart
home solutions.
providers and other authorized parties on a need-to-know basis. This can help reduce the risk
of data breaches and improve privacy.
3. Identity management: Blockchain can be used to create a secure and immutable identity
system for patients, healthcare providers, and other stakeholders in the healthcare ecosystem.
This can help prevent identity theft, fraud, and other forms of misuse of personal information.
4. Clinical trials: Blockchain can be used to improve the efficiency, transparency, and
security of clinical trials, by providing a tamper-proof and auditable record of all trial data,
from recruitment to analysis. This can help reduce the risk of data manipulation and increase
the trust of participants and regulators.
5. Research and analytics: Blockchain can be used to create a shared and secure platform
for medical research and analytics, where data can be contributed, accessed, and analyzed by
researchers, institutions, and other stakeholders, with appropriate privacy protections and
incentives. This can help accelerate medical discoveries, improve population health, and
create new business models and opportunities.
57
Blockchain technology has the potential to transform the domain name service (DNS)
industry by providing a secure, decentralized, and tamper-proof system for domain name
registration, management, and resolution. Here are some of the blockchain applications in the
DNS space:
58
2. Smart contracts for domain name management: Blockchain can be used to create smart
contracts for domain name management, which can automate the process of updating and
transferring domain names, and enforce rules and conditions for domain name ownership and
use. This can help reduce administrative costs, increase transparency, and improve security.
The data included in the DNS zone files, i.e. the domain name configurations, could therefore
be distributed on a Blockchain. Each player (registries, registrars) could directly interact with
this Blockchain to manage the domain names. This is the idea of the DNS on Blockchain.
59
FUTURE OF BLOCKCHAIN
According to a forecast by research firm Gartner, by 2026 the business value added by
blockchain will increase to over $360 billion. Then, by 2030, that will increase to more than
$3.1 trillion. With current and future trends, blockchain is predicted to make a big revolution
in the coming decades.
Here are some potential developments and trends in the future of blockchain:
4. Privacy and security: Privacy and security will remain important considerations in the
future of blockchain, as blockchain-based systems and applications handle sensitive data and
assets. As such, there will be a growing need for privacy-enhancing technologies, such as
zero-knowledge proofs and homomorphic encryption, and for security-focused protocols and
standards, such as proof-of-stake and sharding.
5. New use cases and applications: As blockchain technology evolves and becomes more
widely adopted, it is likely to create new use cases and applications that are currently
unimaginable. These could include blockchain-based identity systems, decentralized social
networks, autonomous organizations, and more.
6. Finance – Banking:- In 2021, El Salvador was one of the first countries to accept Bitcoin
as a legal tender. Due to global inflation and rising costs of money transfers between financial
intermediaries. Many researchers think that developing countries are likely to accept
cryptocurrencies soon. In addition, another promising area for blockchain development trends
is national cryptocurrencies. It can work in conjunction with existing traditional currencies.
This currency helps users to make transactions without depending on any third parties. It also
allows central banks to control the circulating supply.
60
7. Medical:- Blockchain can be used to develop applications to manage patient data, control
drug supply, automate medical examination and treatment transactions, and more.
In particular, concerns about the production and distribution of counterfeit vaccines have
been resolved. Because blockchain will be an effective tool to verify the authenticity of
vaccine shipments and track vaccine distribution. IBM is one of the pioneers when it comes
to leveraging blockchain to develop a vaccine delivery system.
8. Marketing:- Blockchain will be a useful technology in this area. Because it can monitor
and measure the effectiveness of advertising campaigns, minimizing cases of advertising
fraud. Blockchain technology helps in automatic censorship, removing virtual accounts, and
verifying advertising engagement. In addition, it can help collect data on customer behavior
and psychology.