<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Business Tech Guides | Blockchain and Cryptocurrency Insights]]></title><description><![CDATA[Providing insights and analyses on the latest trends in blockchain technology and cryptocurrency.]]></description><link>https://eawosika.com</link><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 17:30:32 GMT</lastBuildDate><atom:link href="https://eawosika.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[What Is Progressive Decentralization?]]></title><description><![CDATA[From its early days, decentralization has been web3’s raison d'être—Bitcoin enabled decentralized payments, while Ethereum provided a decentralized computation layer for applications. The success of DAOs (decentralized autonomous organizations) and t...]]></description><link>https://eawosika.com/what-is-progressive-decentralization-web3</link><guid isPermaLink="true">https://eawosika.com/what-is-progressive-decentralization-web3</guid><category><![CDATA[Cryptocurrency]]></category><category><![CDATA[crypto]]></category><category><![CDATA[Blockchain]]></category><category><![CDATA[Ethereum]]></category><category><![CDATA[DAOs]]></category><category><![CDATA[dao-governance]]></category><category><![CDATA[Web3]]></category><category><![CDATA[decentralization]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Wed, 06 Dec 2023 11:41:09 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1701859269262/10a2e7eb-e9ad-4e53-80a7-41361325b42c.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>From its early days, decentralization has been web3’s <em>raison d'être</em>—Bitcoin enabled decentralized payments, while Ethereum provided a decentralized computation layer for applications. The success of DAOs (decentralized autonomous organizations) and the DeFi (decentralized finance) industry further demonstrates how decentralization—facilitated by blockchains—can create novel business models, foster community ownership of protocols, and align the interests of platforms and users. </p>
<p>But, like everything else, decentralization has its drawbacks. For example, traditional companies often start with loose structures, but become centralized over time to foster efficient planning and implementation, focused product vision, and well-defined organizational structures. Decentralization requires removing centralized control while ensuring organizations don't suffer from problems centralization was designed to correct.</p>
<p>For crypto-native businesses, starting out decentralized can be <em>very</em> difficult—if not impossible. This is where <em>progressive decentralization</em>—the idea of decentralizing over time instead of doing it immediately—can help. In this guide, I discuss progressive decentralization, explain what it means for web3 projects, and highlight how different projects across web3 are embracing this concept. </p>
<h2 id="heading-the-meaning-of-progressive-decentralization">The meaning of progressive decentralization</h2>
<p>Progressive decentralization is the process of relinquishing centralized control of a particular resource, system, or organization over time. An example of progressive decentralization is gradually revoking privileged permissions over a protocol and transferring decision-making powers to a distributed network comprising members of the protocol’s community (e.g., users and developers). </p>
<p>Progressive decentralization favors approaching decentralization in phases instead of attempting to achieve sufficient decentralization from the onset. This is important because decentralization, if handled improperly, can create more problems than it solves. For example, without a central actor coordinating economic interactions in a decentralized protocol, users may be forced to pay <a target="_blank" href="https://bitcoinmagazine.com/technical/can-bitcoin-overcome-price-of-anarchy">the price of anarchy</a>.</p>
<h2 id="heading-why-progressive-decentralization-is-crucial-for-web3-projects">Why progressive decentralization is crucial for web3 projects</h2>
<p>Today, early-stage companies adopt the <a target="_blank" href="https://hbr.org/2013/05/why-the-lean-start-up-changes-everything">lean startup methodology</a>—a business model that emphasizes rapid iteration, innovation, and experimentation (instead of complex planning) on the road to product-market fit. Crypto products are no different and must iterate quickly based on user feedback and performance analyses. As a result, many web3 projects tend to rely on small, centralized teams in the early phases to drive efforts at achieving product-market fit and creating sustainable business models. </p>
<p>But just because a web3 project starts out centralized doesn’t mean it must stay that way forever. Progressive decentralization ensures product teams are well-equipped to drive business goals early on while creating processes and infrastructure to support decentralization in the future. This allows protocols—having achieved maturity—to transition into decentralized entities owned and operated by users (with minimal reliance on the founding team to coordinate activities).</p>
<h2 id="heading-how-does-progressive-decentralization-work">How does progressive decentralization work?</h2>
<p>Progressive decentralization can take many forms depending on an organization’s objectives. But first, it helps to understand the benefits of decentralization before looking into strategies for achieving it. Web3 projects can benefit from sufficient decentralization in the following ways:</p>
<p>1. <strong>Resilience and robustness</strong>: Decentralized protocols have historically been harder to disrupt and shut down—whether by nation-states or motivated groups and individuals. That’s because such protocols are designed to operate without single points of failure or choke points that malicious actors can exploit. </p>
<p>2. <strong>Community ownership and participation</strong>: Putting a protocol’s community in charge of operations typically incentivizes users to play active roles in the protocol’s development and future growth. Moreover, access to diverse perspectives and voices means projects can make more informed decisions that benefit the majority of users—not a narrow subset of stakeholders.</p>
<p>3. <strong>Value distribution</strong>: Decentralized networks redistribute more economic value to participants than their centralized counterparts. For example, a decentralized protocol might financially reward external contributors (e.g., developers), or distribute a share of protocol fees to users.</p>
<p>By sharing value with the community, decentralized protocols create a virtuous cycle of sorts:  user commitment and contributor participation increases, directly benefiting the protocol’s growth, which increases the economic value redistributed to community participants. In short, <a target="_blank" href="https://onezero.medium.com/why-decentralization-matters-5e3f79f7638e">decentralized protocols play a positive-sum game</a> that benefits all parties instead of a zero-sum game that solely benefits the business. </p>
<p>4. <strong>Accountable leadership</strong>: In a typical organization, information asymmetries (among other factors) prevent the wider community from holding leaders to account for making certain decisions. Conversely, decentralization increases transparency and accountability, ensuring the community members can <a target="_blank" href="https://eawosika.com/can-daos-bolster-shareholder-activism">hold protocol teams accountable for their actions</a>. </p>
<p>Another benefit of decentralized governance and decision-making is that users are aware of the rationale behind decisions affecting the protocol. This empowers users to make informed decisions about whether to withdraw or lend their support for certain proposals (depending on the extent to which these decisions align with their interests). </p>
<h3 id="heading-a-framework-for-progressive-decentralization"><strong>A framework for progressive decentralization</strong></h3>
<p><img src="https://lh7-us.googleusercontent.com/PctDFFyZ4SaCGQp5O0d69q8QrNt4XVXzfnMXX9XZFAa239Ffe28QrYeZrkCVWrdmhQAJZU4DoiVD4zA16EhivWaBjm19EurqUo5ZHyUBDSY8TsphVB2b8JRFGGTqgFtQTNHEBfHauuetuOw9Y3ZjDuM" alt="A diagram illustrating a framework for progressive decentralization." /></p>
<p>Having explained why decentralization matters, we can now evaluate the different ways in which web3 projects can progressively decentralize:</p>
<h4 id="heading-infrastructure"><strong>Infrastructure</strong></h4>
<p>When building blockchain applications, some elements of the <a target="_blank" href="https://eawosika.com/what-is-the-web3-stack">development stack</a> (e.g., off-chain storage or node infrastructure) may be centralized. Centralized infrastructure can provide efficiency, customizability, ease of use, and cost-effectiveness—things early-stage companies need to build viable products. </p>
<p>But, as a project matures, it becomes necessary to start thinking about decentralizing critical infrastructure. For starters, this can improve fault tolerance, reduce the risk of censorship, and increase reliability for users. Using decentralized infrastructure also prevents platform lock-in and provides more flexibility for development teams when choosing what services to use. </p>
<p>Below are some hypothetical examples of how a web3 project could gradually decentralize its infrastructure:</p>
<ul>
<li><p>A decentralized social networking protocol might move from using centralized databases (e.g., Amazon S3) to using <a target="_blank" href="https://eawosika.com/decentralized-storage-networks">distributed, peer-to-peer storage platforms</a> like Arweave, Filecoin, IPFS, and Ceramic for data storage</p>
</li>
<li><p>A DeFi protocol may use a centralized node provider for blockchain access and later shift to a decentralized infrastructure network comprising different blockchain node providers</p>
</li>
</ul>
<p>That said, progressive decentralization doesn’t apply to base-layer blockchains, like Ethereum and Bitcoin, whose value lies in being sufficiently decentralized from genesis. In comparison, Layer 2 (L2) blockchains (e.g., rollups) may adopt a progressive decentralization model; an example is a centralized sequencer for low-latency execution of transactions before shifting to decentralized sequencing to mitigate censorship and avoid downtime <a target="_blank" href="https://thedefiant.io/arbitrum-outage-2">owing to failure of a centralized sequencer node</a>.  </p>
<h4 id="heading-governance-and-decision-making"><strong>Governance and decision-making</strong></h4>
<p>As explained, building a web3 product demands quick iteration and fast implementation of design decisions in the early stages. Thus it is non-ideal to have a large group of people making decisions about a product at this time (aka “design by committee”). Rather, project teams should be lean and comprise individuals with the experience, expertise, and drive to steer product development forward. </p>
<p>However, once a project achieves some notion of product-market fit (reflected in daily protocol revenue, TVL metrics, etc.), it may start transitioning into community-led governance. Instead of core teams deciding behind closed doors, the decision-making process is public and open to all members of the community. Governance decisions may cover technical aspects of a protocol (e.g., upgrades, freezes/shutdowns, and parameter/variable settings) and non-technical matters (e.g., treasury allocations). </p>
<p>Scaling decentralized governance and crowdsourced decision-making can be difficult, but not if teams channel efforts toward making it work. This may mean documenting internal processes to give context for governance decisions, for example, or using tools that enable members to signal preferences and reach consensus on proposals securely and transparently. </p>
<p>Establishing decentralized governance requires locking away special powers conferred on core team members at the beginning. Community ownership is hardly useful if a powerful minority (e.g., project founders) can override the majority’s wishes. </p>
<p>Furthermore, it is important to give vocal minorities the freedom to exit the protocol if they disagree with a particular decision. This may involve imposing delays on the implementation of governance decisions, which protects users against being forced to accept unfavorable proposals.</p>
<p><img src="https://lh7-us.googleusercontent.com/JqZv83nR2NDJLy6v7JrHnkdYLc3HchTYzvqtM6p-CobIjRRYNJiiADyc7HCn92KdRJVonlkup4KGVk60JzaYIlf3oxjPAlx5K6cOomEih03uHwm3wTQR0MieeYRB_JZWliHckY-jCmJMZJoabDI2z-E" alt="A high-level of DeFi protocol Compound’s decentralized governance mechanism. " class="image--center mx-auto" /></p>
<p><em>A high-level of DeFi protocol Compound’s decentralized governance mechanism. (</em><a target="_blank" href="https://blog.openzeppelin.com/smart-contract-security-guidelines-4-strategies-for-safer-governance-systems"><em>Source</em></a><em>)</em></p>
<h4 id="heading-finances"><strong>Finances</strong></h4>
<p>Web3 promotes the redistribution of the value generated by protocols to those responsible for creating that value (i.e., users and contributors). Therefore, projects need to develop mechanisms that align economic interests of users with the protocol. An example might be airdropping tokens to community members and letting token-holders earn a cut from protocol fees. </p>
<p>Beyond value distribution, protocols must also enshrine processes for the community to (transparently) decide on financial issues, such as allocating funds to protocol development efforts, rewarding core team members and external contributors, etc. Setting up a protocol treasury managed by a multisig wallet (composed of signers elected by the community) is a popular approach among DAOs and DeFi projects. This arrangement promotes auditability and prevents financial mismanagement that can occur in the absence of centralized governance. </p>
<h4 id="heading-human-resources"><strong>Human resources</strong></h4>
<p>For crypto-native businesses, progressive decentralization may involve transitioning from being “lean startups” to “open-source organizations”. This means the project no longer relies exclusively on the efforts of the core team but instead taps into the wider community for individuals to steward technical and non-technical roles. </p>
<p>For this part of progressive decentralization to work, teams need to lay the groundwork early into the project. Core team members can set up roles and internal processes in a way that makes it possible for others to take over responsibilities, for example. Building and collaborating openly can also reduce information asymmetry and reduce the barrier to entry for new contributors.  </p>
<p>This phase of progressive decentralization also requires investing in best practices for <a target="_blank" href="https://opensource.guide/starting-a-project/">running open-source projects</a>. Creating good documentation outlining a project’s objectives, contribution guidelines, and code of conduct (among others) is usually a good place to start. Developing mechanisms rewarding the efforts of contributors (e.g., using a <a target="_blank" href="https://future.com/reputation-based-systems/">reputation system</a>) is also important—incentives can encourage participation where appeals to altruism fall short.<br />Case studies of progressive decentralization in web3 </p>
<h2 id="heading-case-studies-of-progressive-decentralization-in-web3">Case studies of progressive decentralization in web3</h2>
<h3 id="heading-infura">Infura</h3>
<p><a target="_blank" href="https://www.infura.io/">Infura</a> is a great example of how a web3 product with startup roots can progressively decentralize. Initially created as a software-as-a-service (SaaS) platform to provide users and developers with access to blockchain data, Infura is <a target="_blank" href="https://www.infura.io/blog/post/progressive-decentralization-part-2-evolving-din-through-federation">building a decentralized infrastructure network</a> to create a robust and resilient RPC layer for Web3. </p>
<p>“<a target="_blank" href="https://blog.infura.io/post/infuras-path-to-decentralization">Infura’s Path to Decentralization</a>” provides a high-level overview of Infura’s decentralized infrastructure network. Here, Infura’s current service will exist in parallel with selected node infrastructure providers (“Node Operators”)—allowing developers to route RPC calls through multiple points (via “Ingress Operators”) instead of relying on a centralized provider. Not only does this reduce the risk of downtime for dapps, but it also protects end-users against the risk of censorship and discrimination—ideals tightly woven into the fabric of web3. </p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1701859587015/18ebf546-bfc2-46fb-afe2-249c4cd6ae09.png" alt="A diagram illustrating the proposed architecture for Infura's Decentralized Infrastructure Network (DIN)" class="image--center mx-auto" /></p>
<p><em>Proposed architecture of Infura’s Decentralized Infrastructure Network (DIN). (</em><a target="_blank" href="https://www.infura.io/blog/post/progressive-decentralization-part-2-evolving-din-through-federation"><em>source</em></a><em>)</em></p>
<p>Astute readers will notice that Infura’s approach to decentralization resembles infrastructural decentralization, which I discussed earlier. Elements of decentralized governance also exist in the plan—for instance, the task of monitoring and evaluating node operators is handled by a decentralized body of “Watchers” equipped with the power to penalize operators that experience excessive downtime. </p>
<h3 id="heading-uniswap">Uniswap</h3>
<p>One of the first DeFi projects to achieve product-market fit, Uniswap transitioned to community-led governance after <a target="_blank" href="https://blog.uniswap.org/uni">announcing the release of UNI</a>, a governance token endowing holders (including members of the community) to propose and ratify proposals affecting the protocol’s future. And while Uniswap’s core team is still involved with the project, development of future iterations of the protocol have seen greater involvement from members of the community—see this <a target="_blank" href="https://blog.uniswap.org/uniswap-v4-community-contributions">blog post on community contributions to Uniswap V4</a> for an example. </p>
<p>Despite becoming a community-owned product, Uniswap has remained profitable to date and <a target="_blank" href="https://thedefiant.io/uniswap-spot-volume-surpassed-coinbase-in-2023">recently surpassed trading volumes of centralized rival, Coinbase</a>. This demonstrates the viability (and importance) of building sustainable applications without sacrificing web3’s ethos of open-source development and permissionless innovation. </p>
<h3 id="heading-optimism-and-arbitrum">Optimism and Arbitrum</h3>
<p>Optimism and Arbitrum are the biggest Ethereum rollups today (by economic activity). Besides sharing similar technology and infrastructure, both projects have displayed commitment to adopting progressive decentralization in various forms:</p>
<ul>
<li><p>Arbitrum <a target="_blank" href="https://arbitrumfoundation.medium.com/arbitrum-the-next-phase-of-decentralization-e7f8b37b5226">airdropped ARB tokens to community members and contributors</a> earlier this year and formed the Arbitrum DAO to coordinate future protocol development efforts, manage treasury funding and allocation, and provide an open space for discussions on issues affecting the protocol. </p>
</li>
<li><p>Optimism has taken similar steps—<a target="_blank" href="https://optimism.mirror.xyz/gQWKlrDqHzdKPsB1iUnI-cVN3v0NvsWnazK7ajlt1fI">forming the Optimism Collective</a> after announcing the distribution of a governance token (OP) to users, founding team members, and ecosystem contributors. Optimism’s core team has also <a target="_blank" href="https://blog.oplabs.co/decentralization-roadmap/">outlined the protocol’s vision for progressively decentralizing key parts of the infrastructure stack</a> to increase the network’s robustness and security. </p>
</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1701859907602/4f4e9b8f-84c2-489a-9845-bf8a015c93fe.png" alt class="image--center mx-auto" /></p>
<p><em>Optimism’s technical decentralization roadmap. (</em><a target="_blank" href="https://blog.oplabs.co/decentralization-roadmap/"><em>source</em></a><em>)</em></p>
<h3 id="heading-metamask">MetaMask</h3>
<p>MetaMask (a web3 wallet) recently <a target="_blank" href="https://metamask.io/news/latest/metamask-snaps-our-first-step-on-the-road-to-becoming-fully-permissionless/">announced the (beta) release of the Snaps SDK</a>, which will allow developers to build standalone apps (plugins) that users can install to customize and enrich the functionality of MetaMask’s wallet application. Snaps execute in a sandboxed environment—to prevent plugin bugs from compromising the security of assets stored in the main wallet—and can only run scripts approved by end-users. Below are some examples of Snaps from the <a target="_blank" href="https://snaps.metamask.io/">official Snaps directory</a>: </p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1701859878368/a51a1d49-842c-43c9-bbfb-94d5a141515e.png" alt class="image--center mx-auto" /></p>
<p>The “progressive” in <em>progressive decentralization</em> for MetaMask here means certain aspects of the decentralization process will see some centralized control initially. To illustrate, users are currently limited to installing Snaps that have been vetted for security by MetaMask’s in-house team; but the long-term plan—as explained in the announcement post—is to lift this restriction and pave way from permissionless innovation, where anyone can create a Snap and users can install it without relying on MetaMask's approval.</p>
<p>Some would argue decentralization at this layer of web3 isn’t necessary (“you can’t just decentralize <em>everything</em>!”) or possible (“how do you decentralize a primarily user-facing product like a wallet?”). However, as founder, Dan Finlay, <a target="_blank" href="https://metamask.io/news/latest/snaps-in-metamask-stable-and-where-we-go-from-here/">discusses in a post</a>, it is both feasible to decentralize a web3 product like MetaMask—it just takes work—and <em>necessary</em>, especially if we want to avoid reintroducing web2’s walled gardens and lack of user input in product development and application UX. </p>
<p>This form of decentralization also exemplifies the framing of progressive decentralization in crypto-native applications as positive-sum game:</p>
<ol>
<li>MetaMask’s product team can’t ship every feature—even ones with significant demand from users—due to constraints like limited manpower and the need to prioritize safety (an important consideration, given that wallets are responsible for holding valuable assets like tokens and NFTs, and software bugs can cause non-trivial losses); if MetaMask operated as a pure, Big Tech-esque (closed-source) product, the only viable option would be to limit users to the functionality the team is able to provide—but progressive decentralization means it can do better to deliver on web3’s promise of decentralizing digital infrastructure and encouraging <a target="_blank" href="https://eawosika.com/why-composability-matters-for-web3">composable and open innovation</a>. </li>
</ol>
<ol>
<li><p>Using the MetaMask Snaps SDK, any developer can build new features on top of the MetaMask wallet application, and users can install those features to customize the wallet experience. For example, transaction insight Snaps protect against malicious attempts to drain wallets by spoofing legitimate websites, and interoperability Snaps allow users to connect MetaMask with non-EVM (<a target="_blank" href="https://eawosika.com/what-is-the-ethereum-virtual-machine">Ethereum Virtual Machine</a>) blockchains).</p>
</li>
<li><p>With new Snaps-powered functionalities, MetaMask is able to keep users happy without placing additional burdens on its product team to ship more features at a rapid place (which has also has the nice property of reducing the likelihood of software bugs). In return, third-party developers behind various Snaps get access to MetaMask’s impressive user base (100M users and counting), without having to build a rival product from scratch.</p>
</li>
<li><p>Reducing user churn (and adding more users) means more opportunities to sustain or increase MetaMask's usage, which may improve the product's overall bottom-line. With (potentially) increased revenue, MetaMask can improve its core product and even fund other proposals to build new Snaps (e.g., through <a target="_blank" href="https://metamask.io/news/latest/building-an-extensible-world-with-metamask-grants-dao/">MetaMask Grants DAO</a>) that contribute positively to the experience of using MetaMask.</p>
</li>
</ol>
<p><strong><em>In other words, it’s a win-win for everyone involved.</em></strong> </p>
<h2 id="heading-conclusion">Conclusion</h2>
<p>Progressive decentralization is still poorly understood and there’s hardly a one-size-fits-all solution for achieving it; moreover, decentralization—especially when it touches mission-critical components of a protocol’s architecture—can take time to implement <em>safely</em>. Ultimately, web3 projects must approach decentralization in unique ways whilst making sure it doesn’t stifle growth and innovation, or introduce undesirable second-order effects. </p>
<p>This article has provided a useful “minimum viable framework” project leads in web3 can use to guide progressive decentralization efforts. Still, those in search of more comprehensive analyses may want to read <a target="_blank" href="https://a16z.com/2020/01/09/progressive-decentralization-crypto-product-management/"><em>Progressive Decentralization: A Playbook for Building Crypto Applications</em></a>, <a target="_blank" href="https://variant.fund/wp-content/uploads/2022/08/Sufficient-Decentralization-by-Marc-Boiron.docx.pdf"><em>Sufficient Decentralization: A Playbook For Web3 Builders and Lawyers</em></a>, and <a target="_blank" href="https://variant.fund/articles/whole-crypto-catalog-progressive-decentralization/"><em>Whole Crypto Catalog: Progressive Decentralization</em></a>. These are excellent resources for crypto founders, developers, and enterprises thinking about decentralization and provide a more holistic framework for making specific decisions about organizational components. </p>
<p><em>Cover photo by</em> <a target="_blank" href="https://unsplash.com/@alinnnaaaa?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash"><em>Alina Grubnyak</em></a> <em>on</em> <a target="_blank" href="https://unsplash.com/photos/low-angle-photography-of-metal-structure-ZiQkhI7417A?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash"><em>Unsplash</em></a></p>
]]></content:encoded></item><item><title><![CDATA[Why Composability Matters For Web3]]></title><description><![CDATA[Many Web2 developers are familiar with composability—the idea of creating reusable software components that can be used to create distinct applications. Composability has roots in the open-source technology movement and was critical to the Internet's...]]></description><link>https://eawosika.com/why-composability-matters-for-web3</link><guid isPermaLink="true">https://eawosika.com/why-composability-matters-for-web3</guid><category><![CDATA[Blockchain]]></category><category><![CDATA[crypto]]></category><category><![CDATA[Cryptocurrency]]></category><category><![CDATA[Ethereum]]></category><category><![CDATA[THW Web3]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Mon, 02 May 2022 08:33:58 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1651480398808/cTqlJ1Dj-.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Many Web2 developers are familiar with composability—the idea of creating reusable software components that can be used to create distinct applications. Composability has roots in the open-source technology movement and was critical to the Internet's early growth.</p>
<p>Even though it improves on the Web2 Internet, Web3 needs composability to unlock value for users and foster innovation. This article outlines the principles of composability, the benefits of a composable system, and how it fits into the Web3 infrastructure.</p>
<h2 id="heading-what-does-composability-mean">What Does Composability Mean?</h2>
<p>In application development, composability refers to the ability to combine existing components and reassemble them to create new products.</p>
<p>In a composable architecture, every component has a specific use case. Developers can then combine these components and add new functionality to build applications—without having to reinvent the wheel or build from scratch.</p>
<p>As explained earlier, composability was and is a feature of open-source technology. Anyone could create open-license software, which other developers can use in their products, without fear of litigation or patent infringement issues.</p>
<p>The early days of the Internet were built on this idea of collective access to technology. For instance, CERN <a target="_blank" href="https://home.cern/science/computing/birth-web">famously released software</a> for the World Wide Web.</p>
<p>However, Big Tech giants eroded composability to preserve company profits. Companies like Google, Facebook, and Amazon now protect software through overzealous patent protection, data protection, and deliberately engineering products using incompatible tech stacks.</p>
<p>Moreover, Web2 companies lock users into platforms and prevent usage of rival platforms by implementing high switching costs. The result is a fragmented system, where each component cannot be combined to create greater value.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1651479498243/mmJhSZ8zs.JPG" alt="Tweeted explanation of composability.JPG" />
[<a target="_blank" href="https://twitter.com/chriscantino/status/1455555076437778441?lang=en">Image source</a>]</p>
<h3 id="heading-composability-in-blockchain-technology">Composability in Blockchain Technology</h3>
<p>The explosion in decentralized technology (Web3) has triggered a new interest in software composability. As open-source technologies, blockchain applications are highly interoperable and can benefit from existing libraries to create new experiences for users.</p>
<p>In the context of <a target="_blank" href="https://businesstechguides.co/what-is-the-web3-stack">Web3</a>, composability is the ability of blockchain applications, like decentralized exchanges (DEXs), <a target="_blank" href="https://businesstechguides.co/decentralised-applications">decentralized applications</a> (dApps), and decentralized autonomous organizations (DAOs) to communicate and work with each other.</p>
<p>Specifically, composability in blockchain technology means developers can freely use and integrate code from other applications into their products. This is because smart contracts—which control application logic—are open-source and available to the public.</p>
<p>Composability in blockchain technology helps shorten the development cycle for decentralized applications (dApps). Previously, developers would've to develop every feature of an application from the ground up. But composability allows developers to modify code libraries from existing dApps to create new apps, reducing time spent on writing lines of code.</p>
<p>An area of blockchain technology that’s benefitted from composable software is decentralized finance (DeFi). For example, SushiSwap <a target="_blank" href="https://messari.io/asset/sushiswap/profile">launched its decentralized exchange</a> by copying Uniswap's codebase and adding extra features, such as a governance token and liquidity mining.</p>
<p>There are even more examples of composability in Web3, which I explore in the next section.</p>
<h2 id="heading-how-composability-unlocks-value-in-web3">How Composability Unlocks Value in Web3</h2>
<p>Composability is necessary for creating an interoperable system where disparate elements can connect seamlessly. Components of blockchain technology, such as dApps, DEXs, and DAOs, are composable by nature, allowing them to be reassembled, duplicated, or integrated into one another.</p>
<p>Blockchain composability typically occurs at either the smart contract or project level. This allows developers to combine powerful components to design new applications and unlock greater possibilities for users.</p>
<h3 id="heading-syntactic-composability">Syntactic Composability</h3>
<p>Syntactic composability denotes the implementation of several components, such that they can be connected to form entirely new systems. Syntactic composability thrives on three critical components:</p>
<p><strong>Modularity</strong>: Each component in a composable infrastructure must solve a specific problem and do it <em>well</em>. This allows developers to assemble modular components into one product, with various elements handling different tasks.</p>
<p><strong>Autonomy</strong>: Components in a composable architecture must be able to work independently without relying on other components for functionality. It also means each element can be modified without affecting the overall structure</p>
<p><strong>Discoverability</strong>: Composability allows developers to harness repositories of reusable software frameworks and libraries. But these libraries and frameworks must be "discoverable" for others to use. In other words, code must be open-source and available for unrestrained modification and usage.</p>
<p>Ethereum is a classic example of how syntactic composability works in blockchain technology: smart contracts function as reusable elements anyone can use. This means development teams can re-use basic contract code and concentrate on building core infrastructure for dApps.</p>
<p>The Ethereum.org website <a target="_blank" href="https://ethereum.org/en/developers/docs/smart-contracts/composability/">puts it thus</a>:</p>
<blockquote>
<p><em>Smart contracts are public on Ethereum and can be thought of as open APIs. You don't need to write your own smart contract to become a dapp developer, you just need to know how to interact with them. For example, you can use the existing smart contracts of Uniswap, a decentralized exchange, to handle all the token swap logic in your app – you don't need to start from scratch.</em></p>
</blockquote>
<p>Within the Ethereum ecosystem, smart contracts are building blocks that developers can apply to build even more complex applications. The SushiSwap-Uniswap example mentioned earlier shows how different projects can use similar codebases to achieve different objectives.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1651479544440/80JjZ9XPp.JPG" alt="A tweet explaining benefits of composability in Web3.JPG" />
[<a target="_blank" href="https://twitter.com/chriscantino/status/1455555270726225920?s=20&amp;t=wC6hOkA-xEeSvhkpgkdK2A">Image source</a>]</p>
<p>Other blockchain applications also benefit from syntactic composability. For example, a new DAO might find building a bespoke governance system costly and time-intensive. But it can simply use a library of governance tools, like <a target="_blank" href="https://client.aragon.org/">Aragon Client</a>, to bootstrap and scale a usable governance system.</p>
<h3 id="heading-atomic-composability">Atomic Composability</h3>
<p>"Atomicity" is a concept in blockchain technology that introduces the idea of combining multiple actions into <em>one</em> transaction. This transaction can be anything from a token swap between two individuals to smart contract calls.</p>
<p>The principle of atomicity maintains that every action in the transaction must be correct and possible for it to work. If a single part of the transaction fails, then the entire transaction fails as well.</p>
<p>Atomic composability—a combination of atomicity and composability—is, therefore, the idea that a single transaction can involve calls to different smart contracts. The failure of one part of the transaction causes the transaction to fail: the transaction either succeeds together or fails together.</p>
<p>Moreover, atomic composability is possible only if the parts involved in the transaction are hosted on a single same execution layer. It'd be impossible to conduct a complex transaction that involves using dApps running on different chains—say, Ethereum (Layer 1) and Polygon (<a target="_blank" href="https://businesstechguides.co/what-is-layer-2-blockchain">Layer 2</a>).</p>
<p>The best examples of atomic composability come from the DeFi ecosystem. Here are a few examples of atomic composability in action:</p>
<p><strong>Flash Loans</strong></p>
<p>For those who haven't journeyed deep into the weeds of crypto and DeFi, a flash loan may seem like a futuristic concept. However, flash loans follow a simple pattern and work because of atomic composability:</p>
<p>The idea of a flash loan is simple: you borrow and pay back a loan within a single transaction. Flash loans operate on atomic principles, meaning lenders will get their money back if the transaction fails. This paves the way for uncollateralized loans since borrowers cannot (theoretically) default on repayments.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1651479583495/L60h1NE_s.png" alt="An infographic showing the flow of a flash loan.png" />
[<a target="_blank" href="https://academy.shrimpy.io/lesson/what-are-flash-loans">Image source</a>]</p>
<p>Atomic composability means a flash loan can involve different activities executed across different platforms (provided those actions generate enough tokens to repay the loan). Here's an example, taken from arbitrage trading, to explain the concept:</p>
<p>Say a token (MKR) is trading higher on one exchange (Uniswap) than on another exchange (Kyber). The arbitrage trader (Bob) lacks enough funds to buy MKR on Kyber and sell on Uniswap for profit, so he takes out a flash loan.</p>
<p>Here’s the fun part:</p>
<p>Bob can use the loan to buy MKR on Kyber, sell the MKR tokens on Uniswap, take out the profit, and return the initial capital to the lender. And all of these actions happen in a single transaction. If one part fails, then the entire deal falls through and the lender gets their capital.</p>
<p>Taking out a loan in the real world would involve a painful amount of paperwork and lots of time-wasting, hindering efficient arbitrage. Thanks to atomic composability, flash loans make it easier for arbitrage trading to benefit from higher liquidity and generate profits.</p>
<p><strong>Automated Market Makers (AMMs)</strong></p>
<p>Automated market makers (AMMs) are protocols that enable the trustless and automatic trading of crypto tokens. You can think of an AMM as a robotic "portfolio manager" that makes investment decisions based on an analysis of current market conditions.</p>
<p>Yearn is an example of a popular AMM among DeFi enthusiasts. The Yearn AMM can automatically scan different DeFi platforms and move your tokens to where you'll gain the most profit (by earning trading fees, for example).</p>
<p>However, Yearn can only work because of two reasons:</p>
<ol>
<li><p>It can access data about token prices on different DeFi platforms. If each platform protected platform data, the Yearn algorithm wouldn’t be able to compare token prices.</p>
</li>
<li><p>Different components of the DeFi ecosystem can be combined quickly within the same transaction. For example, the Yearn trading bot can use ETH as collateral to borrow DAI stablecoins from MakerDAO, use DAI to earn CRV tokens on Curve, sell CRV for ETH, and return ETH to MakerDAO for collateral.</p>
</li>
</ol>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1651479623792/HVEtTTNBs.jpg" alt="An infographic showing how AMMs work.jpg" />
[<a target="_blank" href="https://cryptorobin.com/what-are-automated-market-makers/">Image source</a>]</p>
<h3 id="heading-decentralized-identity-and-composability"><strong>Decentralized Identity and Composability</strong></h3>
<p>Another application of composability in Web3 is identity management. Currently, identity frameworks are hardly composable since each platform must engineer its system for collecting and managing user identities.</p>
<p>One of Web3's biggest improvements is the ability of users to transfer their identity across dApps. Users can <a target="_blank" href="https://web3.hashnode.com/what-is-decentralized-identity">store identifiers in their wallets</a> and grant read-only access to dApp authentication systems. This means you don't have to remember long passwords or provide the same details to dozens of applications.</p>
<p>This contrasts with the centralized Internet, where different providers cannot share identity information. That's why you have different account information for Facebook, Twitter, LinkedIn, and more—even if the information is, more or less, the same.</p>
<h2 id="heading-obstacles-to-web3-composability">Obstacles to Web3 Composability</h2>
<p>While composability is a noble idea, implementing it can be difficult for many reasons:</p>
<h3 id="heading-security-concerns">Security Concerns</h3>
<p>A big part of blockchain composability derives from the ability of smart contracts to call other contracts. This is what makes complex transactions involving different contracts possible.</p>
<p>However, calling external contracts isn't always the best idea. For instance, calling a malicious contract could lead to exploits, especially <a target="_blank" href="https://quantstamp.com/blog/what-is-a-re-entrancy-attack">re-entrancy attacks</a>.</p>
<p>For composability to become the standard, <a target="_blank" href="https://alchemy.com/blog/a-developers-guide-to-securing-ethereum-smart-contracts">strengthening smart contract security</a> is important. This makes it easier for developers to safely integrate logic from other contracts into their contracts.</p>
<h3 id="heading-intellectual-property-ip-protection">Intellectual Property (IP) Protection</h3>
<p>Up until now, blockchain technology has thrived off the ideals of open-source technology and codebases as "public goods". But there are signs this might change sooner than expected.</p>
<p>After the SushiSwap incident, Uniswap <a target="_blank" href="https://www.coindesk.com/tech/2021/03/23/uniswap-v3-introduces-new-license-to-spoil-future-sushis/?outputType=amp">built a clause</a> into the v3 release of its software to prevent unauthorized usage or forking. Although sensible, such moves may re-introduce the 'walled gardens' of Web2, where organizations prioritize self-preservation over collective growth and innovation.</p>
<p>If projects start to register smart contracts or prevent usage, then composability will die a slow death. As explained earlier, composability requires software to be open-source and available for usage and modification.</p>
<h3 id="heading-inadequate-standardization">Inadequate Standardization</h3>
<p>Composability in blockchain benefits from standards. For instance, Ethereum ensured interoperability by creating standards known as Ethereum Requests for Comments (ERCs) for smart contract interfaces.</p>
<p>The ERC-20 standard, for example, defines how a fungible token should operate. This makes sure it's compatible with other components of the Ethereum ecosystem, such as wallets, DEXs, dApps, and so on.</p>
<p>However, with the explosion of blockchains, it may be difficult to create standards that will ensure the composability and interoperability. It is important to agree on industry standards, lest Web3 becomes a collection of walled gardens itself.</p>
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>Initially, I thought of naming this article, "What Do Orchestras And Web3 Have In Common?". Like an orchestra, Web3 benefits from having disparate but composable elements combine to create new results.</p>
<p>While this article has covered composability extensively, there are more applications of a composable infrastructure in Web3. With time, developers will find ways to adapt pre-existing components to fabricate new systems that provide exceptional functionality.</p>
<p>Whether Web3 will continue to encourage composability remains to be seen, though. Better smart contract security, greater collaboration between development teams, and higher standardization are necessary to create a truly composable Web3 ecosystem.</p>
<p><em>Cover Photo by <a target="_blank" href="https://unsplash.com/@ryanquintal?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Ryan Quintal</a> on <a target="_blank" href="https://unsplash.com/s/photos/building-blocks?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></em></p>
]]></content:encoded></item><item><title><![CDATA[What Is The Web3 Stack?]]></title><description><![CDATA[Web3 is that buzzword everyone's heard about, but rarely understands. In fact, many discredit Web3 simply because they cannot grasp how it differs from Web2.
Because Web3 was a new and rapidly changing field, identifying core components of the develo...]]></description><link>https://eawosika.com/what-is-the-web3-stack</link><guid isPermaLink="true">https://eawosika.com/what-is-the-web3-stack</guid><category><![CDATA[Web3]]></category><category><![CDATA[THW Web3]]></category><category><![CDATA[Blockchain]]></category><category><![CDATA[Ethereum]]></category><category><![CDATA[crypto]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Mon, 25 Apr 2022 07:32:11 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1650871350368/dFXnGbBWn.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Web3 is that buzzword everyone's heard about, but rarely understands. In fact, many <a target="_blank" href="https://businesstechguides.co/why-does-everyone-hate-web3">discredit</a> Web3 simply because they cannot grasp how it differs from Web2.</p>
<p>Because Web3 was a new and rapidly changing field, identifying core components of the development stack used to be difficult. However, it's easier to define the Web3 stack today—especially as blockchain technology continues to improve.</p>
<p>This guide offers an introduction to the Web3 technology landscape. Whether you're planning to build on the Web3 stack, or just curious to see how decentralized technology works under the hood, this is a good place to start.</p>
<h2 id="heading-what-is-web3-and-why-does-it-matter">What is Web3 And Why Does It Matter?</h2>
<p>Before diving into the Web3 stack, it's important to grasp the meaning of Web3. Most of what we know about Web3 comes from this 2014 <a target="_blank" href="https://gavwood.com/dappsweb3.html">article</a> by Gavin Wood, Ethereum co-founder and CEO of Parity Technologies.</p>
<p>For a short introduction to the topic, Web3 is essentially a collection of technologies that power the development of <a target="_blank" href="https://businesstechguides.co/decentralised-applications">decentralized applications</a> (dapps). Among other things, dapps benefit from decentralized control and distributed infrastructure, while offering users more control of identity and value.</p>
<p>Web3 is a vision of a decentralized Internet, built on blockchain technology. The current model of the Internet is highly centralized and more broken than most realize.</p>
<p>For instance, users must deal with <a target="_blank" href="https://cardconnect.com/launchpointe/payment-security/10-biggest-data-breaches">data breaches</a>, vendor lock-in, poor user experience, and so many problems associated with centralized infrastructure.</p>
<p>Web3 aims to solve most—or, at least some—of these problems. By removing power from centralized intermediaries, the Web3 stack promises a better user experience, increased data safety, and failure-resistant services.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1650871382520/1zcVUK3bvC.jpeg" alt="Benefits of Web3 infographic.jpeg" />
[<a target="_blank" href="https://medium.com/fabric-ventures/what-is-web-3-0-why-it-matters-934eb07f3d2b">Image source</a>]</p>
<h2 id="heading-a-casual-introduction-to-the-web3-stack">A Casual Introduction to the Web3 Stack</h2>
<p>Although Web3 is vaguely similar to Web2, such similarities are fleeting. If anything, the Web3 stack is infinitely complex because blockchains—on which Web3 is built—are complex mechanisms.</p>
<p>Nevertheless, we'll attempt a breakdown of the Web3 application architecture. This section will go over the following building blocks of decentralized applications and how these systems combine to power a decentralized web:</p>
<ul>
<li>Blockchains</li>
<li>Smart contracts</li>
<li>Nodes</li>
<li>Infrastructural primitives</li>
<li>Frontend libraries</li>
<li>Communication endpoints</li>
<li>Access points (browsers and wallets)</li>
</ul>
<h3 id="heading-layer-1-blockchains">Layer 1 (Blockchains)</h3>
<p>At the bottom of the Web3 stack are blockchains. A blockchain is a digital ledger of transactions, maintained by a peer-to-peer network of nodes. This ledger also keeps track of on-chain data, such as account balances, smart contract code, and so on.</p>
<p>Beyond operating as a distributed ledger, blockchains also serve as "state transition machines." A <a target="_blank" href="https://en.m.wikipedia.org/wiki/Finite-state_machine">state transition machine</a> can compute an infinite amount of states, but can only be in <em>one</em> state at a time.</p>
<p>The rules governing state transition in a blockchain are defined by the consensus protocol, such as proof-of-work (Bitcoin) or proof-of-stake (Ethereum 2.0). Any transaction that fails to abide by these rules will automatically be rejected, which is why blockchains can function in the absence of a controlling entity.</p>
<p>Blockchains are critical infrastructure for decentralized web, as they facilitate the storage and execution of smart contracts (more on this later). For example, Ethereum—a popular blockchain for dapps—provides an execution environment (the <a target="_blank" href="https://businesstechguides.co/what-is-the-ethereum-virtual-machine">Ethereum Virtual Machine</a>) that allows developers to develop blockchain-based applications.</p>
<p>Other blockchains (state transition machines) useful for executing decentralized applications include:</p>
<ul>
<li>Polkadot</li>
<li>NEAR</li>
<li>Solana</li>
<li>EOS</li>
<li>Binance Smart Chain</li>
<li>Avalanche</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1650871614599/Gg5CrYAUp.jpg" alt="Layer 1 blockchains infographic.jpg" />
[<a target="_blank" href="https://blockchain-comparison.com/blockchain-protocols/">Image source</a>]</p>
<p>Despite their benefits, blockchains often present many problems for applications. For instance, base-layer blockchains have slow processing speeds, limiting the functionality of dapps.</p>
<p>To circumvent this problem, developers have created several scaling solutions to achieve scalability whilst maintaining security and decentralization. These "<a target="_blank" href="https://businesstechguides.co/what-is-layer-2-blockchain">Layer 2</a>" solutions are designed to provide faster transactions and higher throughput to support increased usage.</p>
<p>Examples include:</p>
<ul>
<li>Polygon Network</li>
<li>Optimism</li>
<li>Arbitrum</li>
<li>zkSYNC</li>
</ul>
<h3 id="heading-layer-2-smart-contracts">Layer 2 (Smart Contracts)</h3>
<p>Slightly above blockchains in the Web3 stack are smart contracts. Smart contracts refer to software programs that run on the blockchain.</p>
<p>A smart contract is autonomous, so it can execute operations automatically once the right functions are called. Most smart contracts are also immutable, preventing any alterations to the code once it is deployed on the blockchain.</p>
<p>In the context of Web3, smart contracts function as the backend of an application. The smart contract defines application logic and controls the overall functionality of the application.</p>
<p>Each time a smart contract function is called, it causes a change in the state of the blockchain network. Thereafter, the state change is accepted and broadcasted throughout the network of nodes.</p>
<p>This is where Web3 diverges from Web2. Traditional applications use a client-server approach where the code controlling applications is controlled by a company and can be changed at will.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1650871643061/OJPTJdul6.jpg" alt="Decentralized application architecture.jpg" />
[<a target="_blank" href="https://academy.horizen.io/technology/advanced/guaranteed-execution-with-smart-contracts/">Image source</a>]</p>
<p>Because each smart contract lives on the blockchain, it cannot be deleted or stopped. This means dapps are censorship-resistant and cannot be unilaterally taken down by authorities.</p>
<p>Smart contracts are written in different languages, such as Solidity and Vyper (Ethereum and EVM-compatible chains) or Rust (Solana, NEAR, Polkadot).</p>
<p>To interact with smart contracts, users need to submit a transaction to the network, which is where nodes come into the picture.</p>
<h3 id="heading-layer-3-nodes">Layer 3 (Nodes)</h3>
<p>As explained earlier, a blockchain is essentially a p2p network sustained by globally distributed computers (nodes).</p>
<p>Each node validates transactions and verifies the state of the network. More importantly, nodes can parse on-chain data and send data to the blockchain as well.</p>
<p>For a dapp to connect to the blockchain (and interact with smart contracts), it must connect to a node. Typically, there are different alternatives here:</p>
<ul>
<li>Run a node</li>
<li>Connect to a public node</li>
<li>Use a node provider</li>
</ul>
<p>Each method carries tradeoffs. For instance, running a node might be good from a decentralization standpoint (you can verify data yourself and reduce dependence on intermediaries). However, it can be expensive to run a node—especially as the blockchain continues to grow in size.</p>
<p>For this reason, many blockchain developers opt for node providers like <a target="_blank" href="https://infura.io/">Infura</a> and <a target="_blank" href="https://www.alchemy.com/">Alchemy</a>. Besides reducing overhead costs, node providers handle infrastructure management—allowing you to focus on building your dapp.</p>
<p>Each node runs a client software, which is just a protocol that enables interaction with blockchain data. Ethereum, for example, has different clients including Go Ethereum (Geth), OpenEthereum, and Parity.</p>
<h3 id="heading-layer-4-technological-primitives"><strong>Layer 4 (Technological Primitives)</strong></h3>
<p>Nodes, smart contracts, and blockchains mostly form the underlying structure for blockchain applications. However, another layer of critical infrastructure exists. This includes decentralized file storage, data feeds, and identity management.</p>
<h3 id="heading-decentralized-storage"><strong>Decentralized Storage</strong></h3>
<p>In Web2, 99.9% of application data is stored in a centralized database. Take a Web2 app, like Twitter, for example. Data that users generate—tweets, videos, pictures, likes, and account information—must be stored somewhere.</p>
<p>But centralized data storage is problematic for many reasons. It promotes undue and unauthorized exploitation of user data, exposes personal information to theft, and introduces the risk of censorship.</p>
<p>Since Web3 is designed to correct these problems, it needs an alternative storage system. With built-in security, trustlessness, and transparency, blockchains would be ideal for storing information. However, limits on block sizes make it impractical to store large amounts of data on-chain.</p>
<p>This is where <a target="_blank" href="https://businesstechguides.co/decentralized-storage-networks">decentralized storage networks</a> come into play. A decentralized storage platform distributes files across a peer-to-peer network, ensuring the security and immutability of information. Unlike traditional databases, decentralized storage services are harder to shut down and protect privacy and control of personal information.</p>
<p>Thus, Web3 apps solve the data management problem by integrating with the decentralized storage solutions:</p>
<ul>
<li>Arweave</li>
<li>IPFS</li>
<li>Filecoin</li>
<li>Storj</li>
<li>Sia</li>
</ul>
<h3 id="heading-data-feeds"><strong>Data Feeds</strong></h3>
<p>Dapps are great, but their real-world functionality is often limited. That's because smart contracts that power these applications can only access on-chain data (such as account balances).</p>
<p>For instance, building a decentralized prediction marketplace would be difficult since the dapp cannot extract information about event outcomes.</p>
<p>To solve this problem, blockchain developers use "oracles"—entities that collect real-world information from different sources and feed them to smart contracts. This allows smart contracts to execute based on the inputs they receive.</p>
<p>Using the previous example, you can see why data feeds (i.e., oracles) are important to blockchain applications. By integrating into an oracle service, like <a target="_blank" href="https://chain.link/">Chainlink</a>, the prediction dapp can reward or penalize users based on the accuracy of their predictions.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1650871731742/6InyP5H57.png" alt="Blockchain oracle infographic.png" /></p>
<h3 id="heading-identity-management"><strong>Identity Management</strong></h3>
<p>Using applications requires proving our identity and permission to use the service. In Web2, identity management is centralized—third-party services ask for your personal information in exchange for access.</p>
<p>In Web3, identity management is decentralized. Instead of asking users to hand over personal information, authentication is done via cryptographic keys. To use a dapp, users will only have to connect their wallets or use a wallet-based ID service like <a target="_blank" href="https://www.spruceid.com/">SpruceID</a>.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1650871786067/cebSduUgL.jpeg" alt="decentralized authentication vs traditional authentication.jpeg" /></p>
<h3 id="heading-layer-5-frontend-libraries">Layer 5 (Frontend Libraries)</h3>
<p>Every application has a frontend, an interface from which users can activate the app's functionality. The frontend is also described as user interface (UI) and determines what happens when you interact with different elements.</p>
<p>In developer-speak, the frontend "talks" to the backend and initiates the specific functionality you requested. Let's use Twitter as an example:</p>
<p>Say you want to use the Search box to find an account. As you input the handle, the frontend communicates your request to the backend, which then returns information relevant to your search.</p>
<p>Many Web3 apps are similar to Web2 apps in how their frontend is built. For instance, many blockchain developers use JavaScript-based frameworks, like <a target="_blank" href="https://github.com/NoahZinsmeister/web3-react">React.js</a>, to build out their dapp's front-end.</p>
<p>The main difference lies in how the frontend applications in Web3 communicate with the backend. Because Web3 apps are built on a novel architecture (blockchains), they require different communication protocols.</p>
<h3 id="heading-layer-6-communication-endpoints">Layer 6 (Communication Endpoints)</h3>
<p>The Web2 Internet operates on a model comprising clients and web servers. A client can be a program or protocol that can send or receive information, while the server is responsible for storing and delivering the information.</p>
<p>Each time you visit a website or use an app, you're using a client (like your Chrome browser) to request information from a web server. This communication is governed by the HyperText Transfer Protocol (HTTP).</p>
<p>However, blockchain applications cannot use standard HTTP communication protocols since information is stored differently on blockchain networks. Unlike Web2's client-server infrastructure, blockchains rely on a distributed network of computers serving as mini-servers.</p>
<p>To interact with the blockchain, most dapps use newer communication endpoints, such as the <a target="_blank" href="https://github.com/ethers-io/ethers.js/">ethers.js</a> and <a target="_blank" href="https://github.com/ethereum/web3.js/">web3.js</a> libraries. These libraries help frontend applications interface with the blockchain and perform read/write transactions. This allows users to trigger smart contract functions by using an application's frontend.</p>
<p><strong>APIs</strong></p>
<p>Application Programming Interfaces (APIs) are another communication endpoint for blockchain applications. An API is a protocol that enables disparate systems to interact or “talk” to each other.</p>
<p>In the context of Web3 development, APIs allow dapps to fetch data from the blockchain for use in application logic. For instance, an NFT marketplace app may require NFT metadata, token records, and transaction information to execute specific actions on the frontend.</p>
<p><a target="_blank" href="https://thegraph.com/en/">The Graph</a> is an example of an API blockchain developers can use to retrieve critical blockchain data for applications. It uses ‘Graph Nodes’ to index on-chain information into various categories called ‘subgraphs’—which anyone can query for specific information.</p>
<p>The Graph quickly transforms smart contract events and function calls into information frontend applications can use, improving the overall experience (UI). Many dapps rely on The Graph’s functionality, including Aave, Uniswap, and Decentraland.</p>
<p>Note: There are other useful blockchain APIs, including Alchemy’s <a target="_blank" href="https://www.alchemy.com/nft-api">NFT API</a> and <a target="_blank" href="https://moralis.io/">Moralis API</a>.</p>
<h3 id="heading-layer-7-browsers-and-wallets">Layer 7 (Browsers and Wallets)</h3>
<p>Web3 browsers and wallets serve as entry points for users to interact with decentralized applications.</p>
<h3 id="heading-web3-browsers">Web3 Browsers</h3>
<p>The average blockchain application is usually available as a Web app, so you can only access them via browsers. However, the average browser—say, Google Chrome—cannot interact with a dapp for reasons explained earlier.</p>
<p>To solve these problems, users rely on dapp-specific browsers like <a target="_blank" href="https://brave.com/">Brave</a>, <a target="_blank" href="https://status.im/">Status</a>, and <a target="_blank" href="https://www.opera.com/crypto/next">Opera</a> or browser extensions like <a target="_blank" href="https://metamask.io/">MetaMask</a>. These browsers have native support for parsing blockchain information, so you can read/write transactions from your browser.</p>
<p>For instance, MetaMask is a browser extension that injects web3.js into each webpage, making it possible to fetch on-chain data and also send transactions from your browser.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1650871821508/CPg46Aj13.jpg" alt="Web3 browsers.jpg" />
[<a target="_blank" href="https://thenextweb.com/news/web3-browser-opera-chrome-brave-analysis">Image source</a>]</p>
<h3 id="heading-wallets">Wallets</h3>
<p>While you can easily read blockchain data from your dapp browser, sending transactions requires signing with a private key. As such, wallets are crucial for interacting with blockchain applications.</p>
<p>As explained earlier, calling smart contract functions involves paying a fee to miners responsible for executing the transaction. Wallets allow users to store and send cryptocurrency, making them necessary for interacting with smart contracts.</p>
<p>Some browsers, like MetaMask, also serve as wallets; in this case the browser stores private keys on the device. Each time a user triggers a specific dapp functionality, a confirmation screen will appear in the browser window, asking them to sign the transaction.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1650871835953/mu8vPwoUn.png" alt="Metamask wallet.png" /></p>
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>This list is by no means exhaustive—the Web3 landscape is ever-changing and new tools are always popping up. Nevertheless, the components discussed in this article form the core infrastructure of the Web3 development stack.</p>
<p>Although Web3 technology may seem complex, the stack is important for realizing the vision of decentralization. With these technologies, we can build a better Internet that offers users greater sovereignty and improves the overall experience.</p>
]]></content:encoded></item><item><title><![CDATA[Can DAOs Bolster Shareholder Activism?]]></title><description><![CDATA[In 2014, investor Mark Mobius declared: “Shareholder activism is not a privilege—it is a right and a responsibility.” Essentially, Mobius believed investors ought to be actively involved in company decision-making and use their power to bring about p...]]></description><link>https://eawosika.com/can-daos-bolster-shareholder-activism</link><guid isPermaLink="true">https://eawosika.com/can-daos-bolster-shareholder-activism</guid><category><![CDATA[Blockchain]]></category><category><![CDATA[crypto]]></category><category><![CDATA[Ethereum]]></category><category><![CDATA[Web3]]></category><category><![CDATA[THW Web3]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Mon, 18 Apr 2022 07:09:10 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1650264405796/4RqiisWn9.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In 2014, investor Mark Mobius declared: “Shareholder activism is not a privilege—it is a right and a responsibility.” Essentially, Mobius believed investors ought to be actively involved in company decision-making and use their power to bring about positive change in corporate structures.</p>
<p>Shareholder activism is hardly a new concept. For example, activist investors like <a target="_blank" href="https://en.wikipedia.org/wiki/Carl_Icahn">Carl Icahn</a> attracted significant attention in the 80s for aggressively pushing for change at portfolio companies.</p>
<p>Shareholder activism <a target="_blank" href="https://www.sullcrom.com/2021-us-shareholder-activism-review-and-analysis">has become more popular</a> in recent years, as investors find ways to coordinate and express their views on company issues. Today, activist investors promote positive changes, such as greater institutional commitment to environmental sustainability and diversity and inclusion, financial transparency, and more.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1650264477828/mAbejIIQ5.JPG" alt="Growing rates of shareholder activism infographic.JPG" />
[<a target="_blank" href="https://www.lazard.com/media/452017/lazards-2021-review-of-shareholder-activism_vff.pdf">Image source</a>]</p>
<p>However, the flawed nature of modern corporate governance limits the effectiveness of shareholder activism. Problems such as centralization of decision-making and inadequate participatory mechanisms reduce investor capacity to have their voice heard in corporate settings.</p>
<p>Decentralized autonomous organizations (DAOs) are a new class of institutions that democratize corporate governance. DAOs operate on peer-to-peer protocols (like blockchains) and abandon hierarchical structures in favor of vertical power distribution. With their decentralized nature, DAOs can empower investors and create favorable conditions for shareholder activism.</p>
<p>But, before we go further, let's look at shareholder activism in detail.</p>
<h2 id="heading-what-is-shareholder-activism">What is Shareholder Activism?</h2>
<p>According to Investopedia, a shareholder activist is "a person who attempts to use their rights as a shareholder of a publicly-traded corporation to bring about change within or for the corporation."</p>
<p>The objectives of shareholder activists can vary between the financial (increasing investor dividends) and the non-financial (promoting employment diversity). Whatever the motive, shareholder activism is a major tool for investors to express their views on matters concerning a company.</p>
<p>Mark Mobius, whom we earlier quoted, said of shareholder activism:</p>
<p>"When we invest in a company, we own part of that company and we are partly responsible for how that company progresses. If we believe something is going wrong with the company, then we, as shareholders, must become active and vocal."</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1650264677474/vXLLLSZRE.jpg" alt="Shareholder activism infographic.jpg" />
[<a target="_blank" href="https://www.wallstreetmojo.com/shareholder-activism/">Image source</a>]</p>
<p>Shareholder activism exists because investors cannot always trust company management to act in their best interests. This problem is captured in a strand of political-economic theory known as the "principal-agent problem."</p>
<p>In a principal-agent arrangement, the agent is allowed to make legally binding decisions on behalf of the principal. However, a problem occurs when the interests of the agent aren't aligned with those of the principal. Rogue agents may use their proxy power to authorize decisions that benefit them at the expense of principals.</p>
<p>The principal-agent problem is often on full display in companies where the agent (an elected board of directors) may be at odds with the principal (shareholders). In absence of effective checks, company directors might pursue policies that harm investor interests.</p>
<p>Shareholder activism prevents corporate management from running rampant and executing selfish action (like taking fat compensation packages). However, modern-day shareholder activists need better tools if they are to successfully force change.</p>
<h2 id="heading-the-many-problems-of-traditional-corporate-governance">The Many Problems of Traditional Corporate Governance</h2>
<p>In most cases, investors looking to participate in company decision-making have to wait until the Annual General Meeting (AGM). The AGM is a yearly ritual with the outlined purposes of providing up-to-date information on company activity, enabling discussion, and facilitating voting on important decisions, like mergers or appointments.</p>
<p>AGMs are ideal for shareholder activists because it provides a forum to air concerns and, more importantly, allow them to table or vote on proposals. However, modern-day AGMs fail to deliver on their promises and stifle shareholder participation.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1650264700229/vbPAv7bgx.jpg" alt="Annual-general-meeting.jpg" />
[<a target="_blank" href="https://www.toppr.com/guides/business-law-cs/elements-of-company-law-ii/annual-general-meeting/">Image source</a>]</p>
<p>For starters, the limited timeframe of these yearly meetings makes it impossible for an extended discussion on issues. With mere hours to cover a large agenda, activist investors may be prevented from sparking a debate around pressing matters.</p>
<p>We also have the problem of logistics. Not every investor is able—or willing—to travel miles to a company's HQ to sit through a half-day meeting. Doing so may be sensible for large shareholders, but smaller shareholders may deem the cost too high, leading to <a target="_blank" href="https://www.cnbc.com/amp/2021/10/12/few-individuals-participate-in-shareholder-voting-but-that-may-change.html">massive declines in turnout</a> at shareholder voting sessions.</p>
<p>Companies have tried to solve this problem by introducing proxy voting. Here, investors receive documents outlining issues under consideration, before the meeting. They can choose to vote on these proposals through mail or via the agreed electronic system.</p>
<p>However, proxy voting has flaws. For instance, there's no way for shareholders to verify if votes were correctly counted and ballot results represent the majority's wishes. The notorious case of Procter &amp; Gamble vs Nelson Peltz illustrates this point:</p>
<p>On the heels of its 2017 shareholder meeting, Procter &amp; Gamble <a target="_blank" href="https://www.wsj.com/amp/articles/p-g-board-vote-comes-down-to-the-wire-1507629601">announced</a> that shareholders had voted to reject activist investor Nelson Peltz's bid to join the company's board of directors. However, an independent audit <a target="_blank" href="https://dealbreaker.com/.amp/2017/11/the-hanging-chads-point-in-nelson-peltzs-direction">disputed</a> P&amp;G's claim and instead awarded the victory to Peltz, leading to the latter's <a target="_blank" href="https://www.cnbc.com/amp/2017/12/18/pg-appoints-peltz-to-board-despite-losing-proxy-battle.html">appointment to the board</a>.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1650264720533/ParBFAADg.JPG" alt="Procter-and-Gamble-vs-Nelson Peltz.JPG" />
[<a target="_blank" href="https://www.reuters.com/article/us-procter-gamble-trian-idUSKBN1E92ZA">Image source</a>]</p>
<p>Scenarios like the one described above discourage well-meaning investors from exercising their rights as part owners of a company.</p>
<p>We have seen the major problems with modern-day governance, namely:</p>
<ul>
<li>Annual shareholder meetings are limited avenues for discussion due to their short duration</li>
<li>Logistical costs (time, travel, effort) prevent shareholders, especially retail investors, from participating in meetings</li>
<li>Proxy voting systems are susceptible to mismanagement and may disenfranchise voters</li>
</ul>
<p>These problems exist because the thinking around companies and governance has remained unchanged for years. For example, article 70 of the UK's 1856 <a target="_blank" href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/386364/comm14July1856JointStockCoAct_P1.pdf">Joint Stock Companies Act</a> states:</p>
<p><em>"Once at the least in every year the directors shall lay before the company in general meeting a statement of the income and expenditure for the past year, made up to a date not more than three months before such meeting."</em></p>
<p>What's surprising here is that sections of the 2006 <a target="_blank" href="https://www.legislation.gov.uk/ukpga/2006/46/part/13">UK Companies Act</a> contain very similar provisions. These two laws may have been enacted centuries apart, but they share the same flawed thinking.</p>
<p>Improving corporate governance and enhancing shareholder activism in corporations requires novel solutions that empower stakeholders and facilitate transparent decision-making. As Albert Einstein noted, "we cannot solve our problems with the same thinking that created them."</p>
<p>This is where DAOs come into the picture.</p>
<h2 id="heading-why-shareholder-activism-needs-daos">Why Shareholder Activism Needs DAOs</h2>
<p>A DAO is a collective of individuals who pool resources together to achieve specific objectives. This could be governance (Aragon), provision of financial services (MakerDAO), or in the case of BanklessDAO, media production and education.</p>
<p>DAOs are like companies, except they operate differently. Instead of issuing shares, a DAO sells tokens to prospective members (investors). These tokens confirm holders' membership of the DAO and empower them to participate in governance.</p>
<p>In a DAO, power is distributed across the membership. Every decision must be ratified by the majority of token holders, and no entity can arbitrarily make decisions on behalf of others. Moreover, any member can initiate proposals and seek support from their colleagues.</p>
<p>The rules governing a DAO are encoded into a smart contract and recorded on a transparent and immutable blockchain, preventing any alterations (except when agreed on by the majority). Voting is conducted on-chain, with DAOs allowing stakeholders to cast their votes in an open, decentralized, and secure process.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1650264746716/UF-sj97cg.JPG" alt="DAO voting example.JPG" />
<strong>An example DAO governance process.</strong> [<a target="_blank" href="https://academy.horizen.io/horizen/advanced/dao-decentralized-autonomous-organization/">Image source</a>]</p>
<p>DAOs solve the principal-agent problem by distributing decision-making power across board. There is no board of directors or CEO calling the shots and pulling the strings for private benefits.</p>
<p>More importantly, DAOs streamline corporate governance and make it easier for investors to initiate or weigh in on proposals. DAOs are location-agnostic institutions and mostly operate through online forums and social networks like Discord. This reduces participation barriers, promoting higher stakeholder engagement in discussion and decision-making.</p>
<p>Besides, DAOs encourage members to submit proposals and give feedback regularly—which means no one has to wait months to table important matters before other stakeholders.</p>
<p>The <a target="_blank" href="https://www.coindesk.com/markets/2022/02/07/ethereum-name-service-removes-brantly-millegan-as-steward-over-2016-tweet/">case</a> involving the Ethereum Name Service (ENS) and its Director of Operations Bryant Millegan is a good example of how DAOs make it easier to call for changes in an organization. </p>
<p>After Millegan was accused of homophobia and misogyny over a series of resurfaced tweets, DAO members initiated a proposal for his removal. Here's a screenshot showing the final results of that proposal:</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1650264762400/nRTKF3tZU.JPG" alt="ENS-proposal-to-remove-bryant-millegan.JPG" /></p>
<p>Now, Millegan eventually held on to his position because the majority voted in his favor. But to focus on the failure to remove him is to miss the forest for the trees.</p>
<p>In a traditional organization, a proposal to remove a high-ranking member would've been a drawn-out process doomed to fail. Or, the decision would've been placed in the hands of a board whose decision may fail to reflect the majority's wish. </p>
<p>However, the ENS DAO's flexible governance structure allowed members to initiate a proposal for change. More importantly, it allowed the entire community to coordinate and express their position on the issue <em>seamlessly</em>. </p>
<p>This is why DAOs matter for activist investors.</p>
<p>Finally, it's important to note that the use of on-chain voting in DAOs increases the integrity of shareholder voting. Thus, it becomes difficult for the management to manipulate results to block activist efforts, as P&amp;G did with Nelson Peltz.</p>
<p>Already, voting tools like Snapshot and Tally ease voting on proposals for DAO participants. Since blockchain transactions can be viewed by anyone, voters can verify results for themselves. And cryptographic security mechanisms make information stored on blockchains immune to alteration.</p>
<h2 id="heading-why-dont-we-just-dao-it">Why Don't We Just DAO It?</h2>
<p>The idea of using blockchain technology to improve corporate governance has old origins. In his 2016 <a target="_blank" href="http://www.cii.org/files/09_29_16_laster_remarks.pdf">Council of Institutional Investors Keynote Speech</a>, Vice Chancellor J. Travis Laster called modern shareholder voting a 'daisy-chained system of share ownership', describing blockchain technology as a "superior external solution" to problems confronting corporate governance.</p>
<p>While early experiments at mixing company ownership with blockchains, such as <a target="_blank" href="https://en.m.wikipedia.org/wiki/The_DAO_(organization">The DAO</a>), failed—the industry has matured since then. Today, there are more DAOs than ever, bringing together people from different backgrounds to coordinate and produce value.</p>
<p>If applied correctly, DAOs have the potential to give power back to investors and strengthen their capacity to positively influence company policies. Shareholder activism won't be limited to hedge funds and deep-pocketed investors anymore; retail investors, too, can make their voices heard on issues.</p>
<p>There's still a long road before DAOs become mainstream and provide these benefits. However, if the last years have shown us anything, it's that transformation is starting to happen quickly. With time, DAOs may replace traditional companies—and shareholders will be better off for it.</p>
<p><em>Cover image courtesy of <a target="_blank" href="https://www.fnlondon.com/articles/uk-boards-braced-for-new-golden-age-of-activism-in-wake-of-brexit-and-pandemic-20210622">Financial News</a></em></p>
]]></content:encoded></item><item><title><![CDATA[Governance Is The Holy Grail For DAOs]]></title><description><![CDATA[DAOs are eating the world. Already, there are hundreds of DAOs formed around several causes, from enabling social interaction and providing decentralized finance services to media production.
While the infamous DAO hack of 2016 dampened enthusiasm fo...]]></description><link>https://eawosika.com/dao-voting-mechanisms</link><guid isPermaLink="true">https://eawosika.com/dao-voting-mechanisms</guid><category><![CDATA[Blockchain]]></category><category><![CDATA[Web3]]></category><category><![CDATA[crypto]]></category><category><![CDATA[Ethereum]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Thu, 14 Apr 2022 06:25:08 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1649916340580/X7qwesy0B.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>DAOs are eating the world. Already, there are hundreds of DAOs formed around several causes, from <a target="_blank" href="https://www.fwb.help/">enabling social interaction</a> and providing <a target="_blank" href="https://compound.finance/">decentralized finance services</a> to media production.</p>
<p>While the infamous DAO hack of 2016 dampened enthusiasm for blockchain governance, the growth of several projects shows DAOs can become a new force in traditional economies.</p>
<p>But before that can happen, DAOs must solve a teething problem: governance.</p>
<p>Every organization, even decentralized ones, must coordinate to decide on critical issues. The success or failure of any DAO depends on how well it can achieve governance objectives in a secure, transparent, and fair manner.</p>
<h2 id="heading-why-does-governance-matter-for-daos">Why Does Governance Matter For DAOs?</h2>
<p>In traditional organizations, the Board of Directors or a smaller group of C-Suite executives are usually responsible for decision-making. While centralized control promotes efficiency, years of management problems have revealed flaws inherent in traditional governance.</p>
<p>One such flaw is the so-called "principal-agent problem." In economics, the principal-agent problem occurs when the interests of individuals (principals) and representatives deciding on their behalf (agents) are misaligned. For example, directors may chase short-term profits, which benefit them, at the expense of long-term growth that benefits investors.</p>
<p>Decentralized autonomous organizations were formed to democratize decision-making. By distributing power across the organization, DAOs hope to align the interests of members and ensure that no individual or group can pursue selfish objectives.</p>
<p>DAOs primarily achieve this aim by using tokens to facilitate governance. Buying tokens signals a commitment to the DAO, and by extension, fitness to participate in governance.</p>
<p>Holding a DAO token imbues the holder with significant influence on the organization's direction. For example, DAO members can call for changes by submitting a proposal. In other words, a token functions like a share in a traditional company.</p>
<p>Armed with tokens, DAO members can express their opinion on several issues requiring consensus. Usually, DAO voting sessions are executed on-chain, which provides a higher level of transparency and security than regular balloting systems.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1649916386592/wW6hFn0KE.png" alt="Governance tokens in DAOS.png" />
<strong>
Examples of governance tokens. [<a target="_blank" href="https://yourcryptolibrary.com/what-is-a-governance-token/">Image source</a>]</strong></p>
<p>DAO governance can serve some or all of the following purposes:</p>
<p><strong>Asset Management</strong>: DAOs often raise initial capital via token sales, with the remaining funds deposited in a treasury. However, as the DAO grows its user base and cash flow, it needs to manage the allocation of funds for projects.</p>
<p><strong>HR Processes</strong>: Even a DAO needs a group of people to lead certain areas. However, the difference is token holders have full control of the election and ouster of officials. For example, the Ethereum Naming Service (ENS) DAO recently asked members to <a target="_blank" href="https://snapshot.org/#/ens.eth/proposal/0xa9a2dc5a52ea54b478c4c5fea88540622dff7ad5000f8d146dff482c6e6b6055">vote on a proposal</a> for the removal of its director, Brantly Millegan.</p>
<p><strong>Protocol Decisions</strong>: Governance tokens can be used to vote on proposals concerning the operation of a network. For example, members of the TerraDAO <a target="_blank" href="https://www.coindesk.com/markets/2021/11/10/terra-passes-highly-anticipated-proposal-to-burn-nearly-89m-luna/">voted</a> to burn an agreed number of Luna tokens and mint more TerraUSD stablecoins.</p>
<p>Governance is a critical part of DAO infrastructure. Even though these organizations have fluid structures, a decision-making framework is important. Otherwise, it may be impossible to reach a consensus on matters critical to the DAO's growth.</p>
<h2 id="heading-challenges-with-traditional-dao-voting-protocols">Challenges With Traditional DAO Voting Protocols</h2>
<p>Most early DAOs adopted a token-based system of governance ("one token, one vote"). In this system, higher influence on DAO governance required a higher level of financial commitment. This arrangement ensured individuals with a proven commitment to the health of the DAO had greater input in running it.</p>
<p>Token-holder voting systems provide a simple, safe, and transparent way for DAOs to make decisions. Once a proposal is up for discussion, members can cast their "votes" on-chain and verify the results. There are no hidden election processes; everything is right there on the blockchain for everyone to see.</p>
<p>But, as innovative as they are, 1T1V systems may pose problems:</p>
<h3 id="heading-centralization"><strong>Centralization</strong></h3>
<p>In a hypothetical scenario, wealthy individuals can buy up governance tokens to accumulate undue influence within the DAO. If the said individual has less-than-benign intentions, the future of the DAO may be threatened.</p>
<p>This problem was on full display during the Steem-Tron saga of 2020. <em>Decrypt</em> has a much more <a target="_blank" href="https://decrypt.co/38050/steem-steemit-tron-justin-sun-cryptocurrency-war">detailed breakdown</a> of the dispute, but here's a TL;DR version:</p>
<p>Justin Sun, the owner of Tron blockchain, bought social media blockchain Steem. However, community members were unaware of the deal, and understandably, rejected Tron’s takeover of Steem.</p>
<p>Now, Steem is a delegated proof-of-stake protocol where token holders can vote on the selection of "Witnesses". Witnesses are "supernodes" responsible for securing the blockchain and validating transactions on the Steem blockchain.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1649916442327/d4Aoifa2w.jpg" alt="Steem Blockchain Witnesses.jpg" />
[<a target="_blank" href="https://decrypt.co/38050/steem-steemit-tron-justin-sun-cryptocurrency-war">Image source</a>]</p>
<p>Witnesses have an outsized influence, such that anyone who controls the Witnesses controls the network.Thus, Witness selection became the new battleground for Justin Sun and community members opposing the takeover.</p>
<p>In a protracted battle worthy of the Netflix treatment, Sun and hostile Steem holders entered a slugfest to wrest control of the blockchain. Each camp accumulated eye-popping amounts of tokens to secure Witness positions for their preferred representatives. Benefiting from a large war chest, Sun (himself a billionaire) succeeded in electing his Witnesses, effectively taking control of Steem despite overwhelming opposition.</p>
<p>Similar problems have surfaced in EOS, another blockchain where 'Delegates' are elected to validate blocks. Certain individuals <a target="_blank" href="https://www.coindesk.com/tech/2020/02/24/on-eos-blockchain-vote-buying-is-business-as-usual/?outputType=amp">buy tokens</a>, and even <a target="_blank" href="https://www.trustnodes.com/2018/09/29/rampant-collusion-in-eos-exposed-by-huobi-leak">collude with exchanges</a> to use tokens belonging to others, to vote for select representatives.</p>
<p>In these cases, token-based governance degenerates into a form of plutocracy where wealthy elites control power. Which goes against everything that on-chain governance and DAOs promise.</p>
<h3 id="heading-rational-indifference"><strong>Rational Indifference</strong></h3>
<p>If tokens held = voting power, then it follows that DAO members with smaller token holdings may have lower incentives to participate in governance. An individual may see their influence on proposal outcomes as minimal and rationalize refusal to participate in voting.</p>
<p>"Rational indifference", as it's known, can discourage DAO members from active participation, leaving token whales at the helm of governance. This re-introduces the principal-agent problem and negates the essential value-proposition for DAOs: putting power in the hands of every stakeholder.</p>
<p>Rational indifference may also make collusion easier. With little incentive to vote on proposals, DAO members can sell their governance tokens to the highest bidder for voting purposes. Or, they can "lend" their tokens via flash loans and re-acquire them after the other entity might have used them to <a target="_blank" href="https://www.coindesk.com/tech/2020/10/29/flash-loans-have-made-their-way-to-manipulating-protocol-elections/?outputType=amp">influence voting outcomes</a>.</p>
<h3 id="heading-incompetent-leadership"><strong>Incompetent Leadership</strong></h3>
<p>In a DAO, policymaking may be crowdsourced and open to anyone holding governance tokens. While this ensures every stakeholder has input in policies, it may give rise to a kakistocracy—leadership by the least competent—especially if the wrong individuals acquire the lion's share of tokens.</p>
<p>English author Douglas Adams once quipped: "It is a well-known fact that those people who most want to rule people are, ipso facto, those least suited to do it." With governance tokens circulating on the open market, entities can effectively buy their way into power.</p>
<p>Such individuals may not necessarily have the competence or expertise to justify their influence on decision-making. Worse, they may be aligned against the interests of the larger collective in the DAO.</p>
<p>For example, a shadowy investor hoping to profit from shorting a DAO's tokens may deliberately destabilize governance mechanisms. The threat of "dark DAOs", malicious groups coordinating to <a target="_blank" href="https://cryptobriefing.com/build-finance-dao-suffers-governance-takeover-attack/#:~:text=Build%20Finance%20DAO%20was%20targeted,various%20tokens%20that%20were%20stolen.">exhibit undue influence on DAOs through token accumulation</a>, is extensively covered <a target="_blank" href="https://hackingdistributed.com/2018/07/02/on-chain-vote-buying/">here</a>.</p>
<p>This problem, known as the Tragedy of Commons, already exists in traditional economies. And it looks like DAOs may be the next victim of the selfish or unwise behavior of a small group.</p>
<h2 id="heading-can-dao-governance-improve">Can DAO Governance Improve?</h2>
<p>Finding a governance mechanism fit for purpose is a difficult task. The right DAO voting protocol must account for the problems discussed in the preceding section, a task easier said than done.</p>
<p>Nonetheless, there are various experiments in the ecosystem to improve the current governance process. This section will discuss some of these alternatives to traditional 1T1V systems and consider their utility:</p>
<h3 id="heading-1-delegated-votingliquid-democracy">1. Delegated Voting/Liquid Democracy</h3>
<p>Sometimes, DAO members can be indifferent to proposals simply because they don't have the mental bandwidth to understand the issues at stake. Especially if the said individuals treat participation in a DAO as a part-time activity, they may be unwilling to commit the time necessary to decide on important matters.</p>
<p>To mitigate such problems, delegated voting aka "liquid democracy" is a possible solution. Delegated voting is just that—delegating an individual to vote on your behalf. In this case, the delegate is likely a reputable member of the DAO or an individual with proven expertise on the issues under consideration.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1649916475246/aRJsbDNEs.JPG" alt="Delegated voting in Tally.JPG" />
<strong>Delegated voting using Tally. [<a target="_blank" href="https://docs.tally.xyz/user-guides/voting-and-delegation/delegate-votes">Image source</a>]</strong></p>
<p>Aragon is among the high-profile DAOs to use delegated voting to solve governance-related problems. Liquid democracy encourages competent decision-making, since power is linked to their reputation or expertise, not token holdings. Plus, delegated voting may theoretically produce decisions that reflect the wishes of the community.</p>
<p>"But doesn't delegated voting introduce the same issues as coinholder voting?"</p>
<p>Delegated voting can indeed increase the possibility of collusion, bribery, and the infamous principal-agent problem. However, well-designed delegated voting systems can be an improvement on existing voting protocols.</p>
<p>For starters, DAO members can withdraw their delegated powers anytime they wish. This contrasts with corporate governance mechanisms where removing a rogue Board of Directors can prove difficult.</p>
<p>Thus, it becomes near-impossible to coerce individuals or suppress opinions since token holders can choose to exercise their rights. This also keeps delegates accountable to members of the DAO and mitigates the “principal-agent” problem common in traditional governance.</p>
<h3 id="heading-2-holographic-consensus">2. Holographic Consensus</h3>
<p>Holographic consensus is a voting system developed by DAOstack to scale DAO governance. Right now, there are DAOs with thousands of members, and getting members to vote on <em>every</em> proposal can be difficult, if not outright impossible.</p>
<p>The thinking behind <a target="_blank" href="https://medium.com/daostack/holographic-consensus-part-1-116a73ba1e1c">holographic consensus</a> is that attention spans are limited, so only the most important proposals should come up for voting. Proposals deemed unnecessary can be screened out, ensuring that the attention of DAO members is harnessed properly.</p>
<p>Holographic consensus uses a cutting-edge process that combines elements of prediction markets with DAO governance. Here's how that works in practice:</p>
<ul>
<li><p>Governance is facilitated through DAOstack's collective attention token, GEN. Token holders cannot vote on proposals, but they can 'bet' on which proposals are likely to succeed. If the proposal passes, holders get rewarded with more GEN tokens. But if the proposal falls through, their GEN holdings are slashed.</p>
</li>
<li><p>Any DAO member who meets the required specifications can initiate a proposal. Proposals that receive high GEN bets are 'boosted' and pass to the next round. At this stage, proposals with low GEN bets are screened out.</p>
</li>
<li><p>Proposals from Round 1 are voted on by members with voting rights. GEN holders can either make profits or losses on their bets depending on whether their choice proposal passes or not. Afterward, approved proposals are executed and implemented in the DAO.</p>
</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1649916495856/KuDNDlEp4.jpg" alt="Holographic-consensus-DAOstack.jpg" />
[<a target="_blank" href="https://medium.com/daostack/holographic-consensus-part-1-116a73ba1e1c">Image source</a>]</p>
<p>Holographic consensus makes sense for several reasons. It reduces <a target="_blank" href="https://www.polyas.com/election-glossary/voter-fatigue">voter fatigue</a>, which occurs when individuals are required to vote too many times. In HC-enabled governance, DAO members can concentrate on high-stake proposals and quickly decide on them.</p>
<p>Moreover, it prevents malicious individuals from attacking a DAO by initiating nefarious proposals. A would-be attacker needs to boost a proposal, which means spending their money to buy GEN tokens. That increases the cost of attack and may discourage governance attacks on DAOs.</p>
<p>However, there are questions over the perceived usefulness of holographic consensus. Holographic consensus introduces complexity into DAO governance, and members may find the learning curve too steep.</p>
<p>Besides, nothing rules out GEN holders from holding governance tokens. This leaves the door open for bettors to influence the results of the voting. After all, they have everything to lose if their boosted proposal fails to go through.</p>
<h3 id="heading-3-weightedreputation-based-voting">3. Weighted/Reputation-Based Voting</h3>
<p>Earlier, we explored the problem of outsiders, such as crypto whales, buying governance tokens to exercise undue influence in a DAO. In this scenario, someone disinterested in the long-term survival of the collective can accrue enough power to destabilize it for selfish gain.</p>
<p>To prevent this problem, some DAOs are using weighted and/or reputation-based voting systems. These two concepts are somewhat similar, although differences remain.</p>
<p>In weighted voting schemes, the voting power of tokens depends on how long they've been held. Weighted voting schemes incentivize holders to lock up their tokens to improve the utility of their votes.</p>
<p>Weighted voting schemes make it harder to acquire voting power in a DAO. You can't just borrow governance tokens from the market and immediately use them to influence voting results. This won't rule out governance attacks entirely, but it significantly increases the cost of executing one.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1649916546948/FXyrjQE-R.JPG" alt="Weighted voting scheme in Kusama.JPG" />
<strong>Weighted voting in Kusama parachain. [<a target="_blank" href="https://guide.kusama.network/docs/learn-governance/">Image source</a>]</strong></p>
<p>The <a target="_blank" href="https://medium.com/ontologynetwork/using-reputation-in-dao-governance-7307eb3f3827">reputation-based voting system</a> follows a similar pattern. Here, DAO members get a single, non-transferable token specifically for voting on proposals. And the voting power attached to each token is linked to the reputation of its holder.</p>
<p>'Reputation points' can be earned in different ways. A DAO may reward individuals with reputation points according to their membership history. Or, members can earn more reputation points by contributing positively to the organization's growth (for example, by completing tasks).</p>
<p>Reputation voting can ensure individuals with a rich history of participation in the organization acquire great influence. This means an outsider will find it cumbersome to infiltrate the DAO through governance mechanisms.</p>
<p>However, reputation voting may be deemed unfair in certain instances. For example, what if a reputable member suddenly goes rogue and uses their influence in the organization for malicious purposes. Wouldn't reputation systems just re-introduce the Tragedy of Commons?</p>
<p>Because someone acquired reputation points during the early phase of a project doesn't mean they should hold leadership status forever. Especially if their contribution declines, it'd be unfair for genesis members to wield more power than new but active members.</p>
<p>There are two possible solutions here. First, DAOs can make reputation points revocable. If a member is guilty of misconduct, their reputation points should decline to reflect that.</p>
<p>Second, reputation points can be programmed to reduce over time, or even expire. This solves the problem of unfairness and keeps power in DAOs fluid.</p>
<p>Reputation systems have other flaws, though. Anyone can sell their private keys to transfer reputation (reputation points are linked to wallets). Still, it's difficult to form a thriving market around the sale of reputation points, so this is a viable mechanism for promoting effective DAO governance.</p>
<h3 id="heading-4-quadratic-voting">4. Quadratic Voting</h3>
<p>Quadratic voting is a novel governance mechanism that’s <a target="_blank" href="https://vitalik.ca/general/2019/12/07/quadratic.html">gained support</a> from the likes of Ethereum founder Vitalik Buterin. Quadratic voting is appealing because it offers an alternative to coinholder voting and reduces the influence of whales on voting outcomes.</p>
<p>In a quadratic voting scheme, everyone gets one vote once on a proposal. However, they can purchase more “credits” to cast more votes for their preferred option.</p>
<p>"Wait, isn't that essentially what 1T1V systems do?"</p>
<p>Well, not exactly. In a 1T1V system, the cost of additional votes is linear. If you need five extra votes, you just need five more tokens. In a quadratic voting system, the cost of additional voting is quadratic; one vote costs one token, two votes cost four tokens, three votes cost three tokens, and so on.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1649916565146/BwGTg4oRl.png" alt="Quadratic voting in DAOS.png" />
[<a target="_blank" href="https://towardsdatascience.com/what-is-quadratic-voting-4f81805d5a06?gi=b571d3c88b7c">Image source</a>]</p>
<p>Quadratic voting allows individuals to express the extent of their support for a proposal by purchasing vote credits. This makes quadratic voting the DAO version of "putting your money where your mouth is."</p>
<p>At the same time, it reduces the influence of crypto whales in decision-making. From our earlier example, it's obvious that the utility of additional voting decreases, while costs increase. It'd take a lot of money for a dark DAO to acquire enough tokens to distort outcomes.</p>
<p>Of course, that doesn't rule out vote-buying. Quadratic voting even makes token-buying more lucrative since first votes count for a lot.</p>
<p>Projects like Gitcoin DAO alleviate this problem by using stringent identification systems that make it difficult to transfer voting rights. For instance, users have to register a profile with decentralized identity services like Proof of Humanity, BrightID, Ethereum Naming Service (ENS), and Idena.</p>
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>In its current form, DAO governance is far from perfect. But the sector is investing in novel governance mechanisms to achieve higher member participation, equitable distribution of power, and efficient decision-making.</p>
<p>Whether experiments like quadratic voting and holographic consensus will replace traditional coinholder voting is up for debate. Nonetheless, we can expect DAOs to keep reiterating until they find the ideal governance system that promises the most benefits to members and the larger ecosystem.</p>
]]></content:encoded></item><item><title><![CDATA[Ethereum Has A Client Diversity Problem]]></title><description><![CDATA[The launch date for “the Merge” (merging the Beacon Chain with Ethereum Mainnet) is rapidly drawing close. Per the latest stats, the Beacon Chain has over 300,000 validators and more than 10 million ether (ETH) in validator stakings.
Ethereum’s switc...]]></description><link>https://eawosika.com/ethereum-client-diversity-problem</link><guid isPermaLink="true">https://eawosika.com/ethereum-client-diversity-problem</guid><category><![CDATA[Ethereum]]></category><category><![CDATA[Blockchain]]></category><category><![CDATA[Cryptocurrency]]></category><category><![CDATA[crypto]]></category><category><![CDATA[Web3]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Mon, 11 Apr 2022 06:15:44 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1649657292509/HNojefPVo.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The launch date for “the Merge” (merging the Beacon Chain with Ethereum Mainnet) is rapidly drawing close. Per the latest <a target="_blank" href="https://beaconcha.in/">stats</a>, the Beacon Chain has over 300,000 validators and more than 10 million ether (ETH) in validator stakings.</p>
<p>Ethereum’s switch from a proof-of-work to proof-of-stake consensus mechanism has several implications for its future. With the Beacon Chain as a consensus layer, Ethereum PoS promises better network security, energy efficiency, scalability, and decentralization.</p>
<p>However, it also introduces new challenges that could threaten Ethereum’s functionality.</p>
<p>One of those challenges is achieving ideal client diversity. In a decentralized network like Ethereum, diversity of client software is necessary for enhancing network security, functionality, and censorship resistance.</p>
<p>However, current stats show that Ethereum's PoS consensus layer (the Beacon Chain) is lacking in the client diversity department. As we'll find out in this article, centralization of software implementation has critical implications for the Ethereum ecosystem.</p>
<h2 id="heading-eli5-what-does-client-diversity-mean">ELI5: What Does Client Diversity Mean?</h2>
<p>Ethereum is a decentralized peer-to-peer network sustained by a globally distributed collection of nodes (i.e., computers). Each node runs a “client”—this is software that helps nodes to interact with the Ethereum blockchain. Without clients, nodes cannot broadcast and verify transactions, execute smart contracts, or reach consensus on the blockchain state.</p>
<p>Clients are a critical part of Ethereum’s infrastructure, which is why its developers opted for a multi-client arrangement. As opposed to running a single client, nodes are incentivized to run different client implementations—the end goal being that no client should hold a supermajority.</p>
<p>Client diversity simply means having a fair distribution of client software on network nodes. Ideally, no client should power more than 33% of nodes in a decentralized system like Ethereum. Or else, several bad things (which we explore later) can start to happen.</p>
<p>Currently, Ethereum's Beacon Chain doesn't have an equitable spread of client software across nodes running the network. As the chart below shows, the majority client controls &gt; 68% of validators, which can put the system at risk for different reasons.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1649656530480/o9D-KkEfA.jpg" alt="ethereum consensus client diversity.jpg" />
[<a target="_blank" href="https://twitter.com/sproulM_/status/1481109509544513539?t=EEt1NQePGZoDfF11m1_rlg&amp;s=09">Image source</a>]</p>
<p>Client diversity is a hotly debated topic in the Ethereum community. And that's due to its importance to Ethereum's performance, especially in the context of the Merge. The debate also exists because of <a target="_blank" href="https://medium.com/prysmatic-labs/prysmatic-labs-statement-on-client-diversity-c0e3c2f05671">disagreements on how client diversity should be realized</a>.</p>
<p>So, why exactly is client diversity so important? That's what we're about to find out.</p>
<h2 id="heading-the-importance-of-client-diversity">The Importance of Client Diversity</h2>
<p>As a distributed system, Ethereum relies on the network of peer-to-peer nodes to function optimally. In turn, those nodes rely on clients to help them contribute to the network.</p>
<p>Any flaws or bugs in client software will affect a node's participation in the network. If the problem is constrained to one client, then the network can continue to function. Other nodes running alternative clients will manage the blockchain, while the affected nodes can switch to a non-affected client.</p>
<p>The above scenario can only work if, and only if, a small number of nodes are using the affected client software. A case where the majority of nodes run the malicious software could create single points-of-failure and affect the network significantly.</p>
<p>Here are some potential problems that could happen in this case:</p>
<h3 id="heading-restrictions-on-transaction-finality"><strong>Restrictions on Transaction Finality</strong></h3>
<p>Finality in blockchain lingo is a guarantee that transactions cannot be reversed, altered, or canceled. If a blockchain finalizes, committed blocks cannot be revoked.</p>
<p>Finality is what gives Ethereum, and other blockchain networks, their "immutable" quality. Anyone can use Ethereum knowing transactions will be recorded permanently on the chain and cannot be tampered with.</p>
<p>Typically, blockchain networks need the majority of nodes to reach consensus before achieving transaction finality. In the Beacon Chain, at least 2/3 of staked ETH is required to finalize the chain. Anything lower than that, and the chain cannot finalize—putting the system in jeopardy.</p>
<p>So, how does this relate to flawed client software? Well, you have to consider what can cause a situation where nodes are unable to reach consensus.</p>
<p>We could think of different reasons, but the most realistic one is simple: validating nodes are malfunctioning. If 1/3 of validators are inactive, then there wouldn't be a 2/3 supermajority required for Beacon Chain finality.</p>
<p>To remedy the problem, the Beacon Chain activates the Inactivity Leak Mechanism. This mechanism is designed to gradually reduce the stakes of offline validators, allowing the remaining nodes to re-form a two-third majority.</p>
<p>If all goes well, the remaining nodes can achieve consensus and keep the chain running. In this scenario, the heaviest losers are validators who have their ETH stakes slashed.</p>
<h3 id="heading-network-split"><strong>Network Split</strong></h3>
<p>The preceding section explored what could happen if a faulty client powers more than 1/3 of validating nodes. But, that’s only the beginning—worse things can happen, especially if &gt; 1/2 of validators are running the bad client software.</p>
<p>In this case, the Beacon Chain network can split into two separate chains. Both chains will be unable to finalize because half their validators are missing; hence, the Inactivity Leak mechanism will activate.</p>
<p>Deposits belonging to affected validators will get destroyed over a while—three to four weeks, say—until they control less than 1/3 of staked ETH. The result is that the old and new chains will finalize independently, making it hard to merge them later.</p>
<p>To merge both chains, the community would need to agree on the canonical chain—a process likely to be fraught with politics. The reason is simple: asking validators to join another chain would cause them to lose their entire stakes.</p>
<p>A network split would force over half of the community to suffer huge economic losses. To avoid this fate, validators on the discarded chain may decide to continue running the forked chain, splitting the Ethereum community.</p>
<p>This is reminiscent of the events surrounding the DAO hack of 2016 when a faction—disgruntled with the handling of the situation—<a target="_blank" href="https://www.gemini.com/cryptopedia/ethereum-classic-etc-vs-eth">forked the network</a> and created Ethereum Classic. Not only would a split weaken Ethereum, but it could depreciate the price of ether on the market.</p>
<p>To prevent a network split, developers would need to quickly patch the consensus bug <em>before</em> each chain finalizes. Otherwise, it’d become difficult, if not impossible, to ever merge both chains into one canonical chain.</p>
<h3 id="heading-reversing-transactions"><strong>Reversing Transactions</strong></h3>
<p>If a faulty client running &gt; 1/2 of Beacon Chain validators is catastrophic, then a situation where &gt; 2/3 of nodes use the same vulnerable software is Armageddon. A new chain comprising nodes with the affected client will split from the Beacon Chain and—because it has a 2/3 supermajority—finalize independently. At most, developers will have ~ 13 minutes to patch the software before the split chain achieves finality.</p>
<p>This is assuming the developers are nice guys who genuinely love Ethereum. If the developers go rogue—or malicious actors infiltrate the organization—they can hijack the chain and do considerable damage. They could very well rewrite the entire blockchain history (and double-spend funds), censor transactions, or even reverse old transactions.</p>
<p>Even if the bug were an honest mistake, the situation would still be less than ideal. Let’s look at some hypothetical scenarios in this case:</p>
<p><strong>Fix #1</strong></p>
<p>One way to fix this problem is to have nodes accept the bug as the normal behavior of Ethereum. What that means is that unaffected nodes will reproduce the bug and try to join the other chain. Afterward, developer teams can coordinate on a fix, and stakers can update their client software to reflect the change.</p>
<p>But this isn’t an easy solution to implement. First, unaffected nodes will be punished for inactivity even if they acted honestly. Second, this fix only covers trivial errors; severe consensus bugs would make the corrupted chain incompatible with the rest of the network.</p>
<p>This brings us to the second solution.</p>
<p><strong>Fix #2</strong></p>
<p>Another option in this event would be to patch the vulnerable client. However, there’s no way validators running the once-faulty client can safely rejoin the canonical chain without getting penalized. Here’s why:</p>
<p>Due to a large number of validators exiting their stakes on the compromised chain, the Inactivity Leak mechanism will activate. Which means affected validators can lose a lot of money, especially because exits can be painfully slow.</p>
<p>Now, this is the point where I say, “but wait, there’s more!”. Let’s imagine the affected validators successfully exit the bad chain and attempt to rejoin the correct chain. Because they already attested to one chain, any attempt to attest to another <em>unfinalized</em> chain would lead to a slashing of their ETH stakes.</p>
<p>In other words, we have a dilemma on our hands:</p>
<p>If the affected validators voluntarily exit their stakes, they’ll likely get caught up in the inactivity-related slashing. If they try to join the ‘good’ chain immediately (when it hasn’t finalized), their stakes get slashed per protocol rules.</p>
<p>In the end, no one benefits from having this problem happen. Which is why a client controlling more than 2/3 of validating nodes is cause for alarm.</p>
<h2 id="heading-can-ethereum-client-diversity-improve">Can Ethereum Client Diversity Improve?</h2>
<p>By now, the importance of diversity to the health of the Ethereum network should be obvious—especially if we want to keep Ethereum decentralized. But, if the numbers are anything to go by, Ethereum’s Beacon Chain is yet to achieve a fair distribution of clients.</p>
<p>The dominant client, Prysm, controls &gt; 68% of nodes on the Beacon Chain, putting us firmly in Armageddon territory. It may seem alarmist to raise concerns over a single client having a supermajority, but these problems are from being hypothetical.</p>
<p>In August 2020, Medalla (a Beacon Chain tesnet) suffered a major crash. The reason? Nodes running Prysm software malfunctioned due to a clock bug in the client. As a result, Prysm nodes went offline, leaving the chain unable to finalize.</p>
<p>Developers finally fixed the problem hours later, but not before validators lost their stakes due to slashing. If the majority of nodes hadn’t been using the same software, then the problem would have been corrected easily.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1649657558332/zqkWFeKSb.png" alt="Medalla testnet outage.png" />
The Medalla tesnet fluctuated below the 2/3 majority needed for finality. [<a target="_blank" href="https://hackmd.io/@benjaminion/wnie2_200822#Medalla-Meltdown-redux">Image source</a>]</p>
<p>History also shows why client diversity is important. For example, in 2016, hackers <a target="_blank" href="https://blog.ethereum.org/2016/09/22/ethereum-network-currently-undergoing-dos-attack/">targeted Ethereum with a distributed denial-of-service (DDoS) attack</a> by exploiting vulnerabilities in the Go Ethereum (Geth) client. The network survived because nodes could switch to the Parity client which was safe from the attack.</p>
<p>Client diversity is hard to achieve because nodes cannot be unilaterally forced to run a particular client. Moreover, dominant clients usually enjoy first-mover advantages and network effects, making them hard to displace.</p>
<p>Nonetheless, there are various possible solutions for improving software diversity:</p>
<h3 id="heading-protocol-incentives"><strong>Protocol Incentives</strong></h3>
<p>Ethereum’s Casper PoS mechanism, which controls the Beacon Chain, is designed to discourage majority use of a particular client. It incentivizes client diversity through anti-correlation penalties and quadratic inactivity leak fees.</p>
<p><strong>Quadratic Inactivity Leak</strong></p>
<p>If you’ve read the article up until this point, you may be familiar with the quadratic inactivity leak. Typically, validators on the Beacon Chain can get penalized for dishonest activity or failing to perform their duties (e.g. going offline).</p>
<p>Standard inactivity penalties are low (around 1 ETH) and validators will still have most of their stake intact. However, if &gt; 1/3 of validators are inactive, things start to look different. The chain cannot finalize in this situation, which threatens <a target="_blank" href="https://blog.blockstack.org/blockchains-and-consensus-protocols-liveness-and-correctness-are-inseparable/">liveness</a>—an indispensable quality for all distributed systems, not just blockchains.</p>
<p>In a quadratic leak scenario, inactivity fees will increase quadratically until offline validators have their stakes reduced to less than 1/3 of the network. The rationale is that, if anything knocks a large number of validators offline, the chain can still achieve finality.</p>
<p>Remember that we need 2/3 of stakers to reach consensus for the Beacon Chain to finalize? The Inactivity Leak mechanism will ensure that offline nodes hold less than 1/3 of stakings, allowing remaining validators to create the required two-thirds supermajority.</p>
<p>The implication is that if you run the dominant client, your node will likely go offline during the inactivity leak. This means you’ll lose ETH like crazy until the bug gets fixed and liveness is restored to the chain.</p>
<p><strong>Anti-Correlation Penalties</strong></p>
<p>In addition to encouraging software diversity, anti-correlation penalties are designed to prevent the possibility of malicious collusion. The quadratic inactivity leak is a type of anti-correlation penalty, although the punishments discussed in this section are heavier.</p>
<p>The first anti-correlation penalty touches on validators producing bad attestations, i.e., validating malicious transactions. If a majority client experiences a bug that causes validators to give false attestations, they’ll lose 100% of their stakings. In other words, the more nodes that act maliciously, the higher the penalty.</p>
<p>The second anti-correlation penalty touches on validators attesting to an invalid block. This is something we’ve explained earlier, but we’ll look at it again.</p>
<p>If an invalid block is committed to the beacon chain, other nodes will reject it and form a new chain that doesn’t have the block in it. The only option for nodes on the valid chain is to switch to the correct chain; however, this attracts a penalty, as a significant percentage of ETH stakings get slashed.</p>
<p>These incentives are put in place to promote a multi-client culture in Ethereum. As such, validators are encouraged to run minority clients.</p>
<h3 id="heading-running-minority-clients"><strong>Running Minority Clients</strong></h3>
<p>The more obvious step to achieving better client diversity is getting nodes to run different clients. By running different software, validators can ensure Ethereum remains robust, secure, and functional.</p>
<p>Moreover, running a minority client is in your best interests as a validator—especially with anti-correlation penalties and inactivity leak fees. You won’t necessarily escape punishment by running a minority client, but the penalties will be lower.</p>
<p>These are some minority consensus clients you can run:</p>
<ul>
<li>Lodestar</li>
<li>Teku</li>
<li>Nimbus</li>
<li>Lighthouse</li>
</ul>
<p>We’ve focused squarely on consensus clients, i.e. Beacon Chain nodes, in this article. However, Ethereum Mainnet has a similar problem. Per stats, Go Ethereum (Geth) controls &gt; 80% of nodes, with Nethermind, OpenEthereum, and Erigon trailing with low figures.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1649656996592/egzdC05ei.jpg" alt="Ethereum execution client diversity chart.jpg" />
[<a target="_blank" href="https://ethernodes.org/">Image source</a>]</p>
<p>Since the execution layer is as important as the consensus layer, it needs client diversity as well. To solve the problem, nodes on Ethereum Mainnet can run the following execution clients:</p>
<ul>
<li>Hyperledger Besu</li>
<li>Nethermind</li>
<li>Erigon</li>
<li>CoreGeth</li>
</ul>
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>Beyond the immediate security benefits, client diversity can create a richer Ethereum ecosystem. Each client works with different languages, design features, and architectures, inspiring greater innovation and exchange of ideas.</p>
<p>As Ethereum undergoes the biggest change since its inception, it is important to encourage diversity across the network. Only then can it remain a robust and highly functional decentralized system.</p>
<p><strong>References</strong></p>
<ol>
<li><p><a target="_blank" href="https://blog.ethereum.org/2020/01/13/validated-staking-on-eth2-1-incentives/">Validated, staking on eth2: #1 - Incentives</a> </p>
</li>
<li><p><a target="_blank" href="https://dankradfeist.de/ethereum/2022/03/24/run-the-majority-client-at-your-own-peril.html">Ethereum Merge: Run the majority client at your own peril!</a></p>
</li>
<li><p><a target="_blank" href="https://eth2book.info/altair/part2/incentives/diversity#diversity">Eth2book: The Incentive Layer</a></p>
</li>
</ol>
<p><em>Cover image courtesy of Getty Images</em> </p>
]]></content:encoded></item><item><title><![CDATA[Understanding The Ethereum Virtual Machine (EVM)]]></title><description><![CDATA[Beyond enabling the exchange of value, Ethereum also facilitates the creation of “smart contracts.” Smart contracts are self-executing programs that power various applications running on the Ethereum blockchain today.
Non-fungible tokens (NFTs), dece...]]></description><link>https://eawosika.com/what-is-the-ethereum-virtual-machine</link><guid isPermaLink="true">https://eawosika.com/what-is-the-ethereum-virtual-machine</guid><category><![CDATA[Ethereum]]></category><category><![CDATA[Blockchain]]></category><category><![CDATA[crypto]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Mon, 04 Apr 2022 11:21:01 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1649070807931/PpmGWGsqZ.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Beyond enabling the exchange of value, Ethereum also facilitates the creation of “smart contracts.” Smart contracts are self-executing programs that power various applications running on the Ethereum blockchain today.</p>
<p><a target="_blank" href="https://businesstechguides.co/how-can-businesses-use-nfts">Non-fungible tokens (NFTs)</a>, decentralized finance (DeFi) platforms, blockchain games—all of these rely on smart contracts to work. However, smart contracts themselves can only run because the Ethereum Virtual Machine (EVM) exists.</p>
<p>The EVM is a computation engine that facilitates the deployment and operation of smart contracts. Without the EVM, it’d be impossible to execute software programs on the Ethereum protocol. Thus, the EVM is a critical part of Ethereum's core architecture.</p>
<p>This article offers an introduction to the Ethereum Virtual Machine (EVM). We cover the basics of the EVM, including components of its structure—like opcodes and smart contracts.</p>
<h2 id="heading-what-is-the-ethereum-virtual-machine-evm"><strong>What is the Ethereum Virtual Machine (EVM)?</strong></h2>
<p>To understand the Ethereum Virtual Machine, we must explore two concepts first: "virtual machines" and "Turing completeness."</p>
<p><strong>Virtual Machines</strong></p>
<p>Virtual machines are programs that simulate the behavior of a physical computer. A virtual machine has its storage and processing unit and runs as a process on your PC. It's a bit like having a computer running on <em>another</em> computer.</p>
<p>A VM is similar to your average Windows or MacOS software. The difference here is that VMs are designed to perform more high-level functions. Moreover, a VM—unlike a regular OS—has no access to other parts of your computer, like the storage or bandwidth.</p>
<p>If you've played Android games on a PC using an emulator, then a virtual machine may be familiar. While emulators and VMs are significantly different, they are both approximate the powers of hardware and can execute code in a “sandboxed” environment.</p>
<p><strong>Turing Completeness</strong></p>
<p>British Mathematician Alan Turing developed the first Turing Machine—the forerunner of today's computer. A Turing-complete machine can process any computation, no matter how complex, provided it has enough time and resources.</p>
<p>Now, let's tie these ideas together and define the Ethereum Virtual Machine:</p>
<p>The Ethereum Virtual Machine (EVM) is a giant virtual machine that allows for the deployment and execution of code. You only need to install the necessary client software to access the EVM and use it to execute programs on Ethereum. Essentially, the EVM acts as a “world computer” for performing software operations in a decentralized environment.</p>
<p>Devoid of centralized control, the EVM is sustained by several individuals/companies lending computing power to the system in exchange for incentives. Therefore, it is useful for creating censorship-resistant applications that cannot be unilaterally shut down by any party.</p>
<p>The EVM is Turing-complete, as it can be used to perform computations of varying complexity. This is what separates Ethereum from Bitcoin, as the latter is Turing-incomplete, limiting its functionality.</p>
<p>Bitcoin functions primarily as a "distributed ledger", which specifies rules for the transfer of value. In addition to handling the transfer of value, Ethereum (via the EVM) enables the deployment of smart contracts. As a result, Ethereum is described as a “distributed state machine.”</p>
<p>“State” refers to the information about a system at any point in time. In Ethereum, state refers to the addresses, account balances, and smart contract code existing at a specific moment. Each transaction causes a change in Ethereum's state (state transition) that's reflected throughout the network.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1649071012865/Mzzw2dhyz.jpeg" alt="Ethereum virtual machine architecture.jpeg" />
[<a target="_blank" href="https://medium.com/@eiki1212/what-is-evm-ethereum-virtual-machine-f38310130114">Image source</a>]</p>
<h2 id="heading-how-does-the-ethereum-virtual-machine-work"><strong>How Does the Ethereum Virtual Machine Work?</strong></h2>
<p>Here, we'll explore the basic building blocks of the Ethereum Virtual Machine. This is to provide a basic overview of the system, so some heavy technical details may be left out.</p>
<h3 id="heading-opcodes"><strong>Opcodes</strong></h3>
<p>The EVM uses a series of instructions called "opcodes" to execute different tasks. There are 140+ opcodes enabling the execution of different processes in the EVM—hence, Ethereum's description as Turing-complete.</p>
<p>We need opcodes because the EVM cannot interpret instructions written in Solidity, the language used for coding smart contracts. Ergo, smart contract code are converted to opcodes, so they can be executed in the EVM environment.</p>
<p>For example, you can create a smart contract using the <code>CREATE</code> opcode or halt a running contract with the <code>STOP</code> opcode. You can check <a target="_blank" href="https://www.ethervm.io/">here</a> for a detailed overview of opcodes in Ethereum.</p>
<h3 id="heading-gas"><strong>Gas</strong></h3>
<p>Gas is the resource that enables the execution of code in the EVM environment, measured in wei (a unit of ether). Just like you need gas to power your car in real life, the EVM needs gas to execute operations.</p>
<p>Earlier, we mentioned "opcodes"—specific instructions that can be used to perform different operations in the EVM. Gas is simply the amount of computational resources required to perform a particular operation.</p>
<p>Every code execution carries a gas fee, which varies depending on many factors, such as the complexity of the operation and network-wide demand. Gas fees incentivize individuals to lend their computing power to Ethereum. Without gas fees, the EVM wouldn't function as a decentralized computer.</p>
<p>Gas serves another purpose: preventing the execution of malicious actions, like distributed denial-of-service (DDoS) attacks. While the EVM can run almost any computation, it's hard to predict the runtime for every operation.</p>
<p>A well-designed malicious operation can run infinitely, causing the network to lose scarce computing power and eventually crash. Gas fees prevent this problem by forcing malicious actors to pay for every step performed in the computational process.</p>
<p>Before initiating an operation, you must specify a “gas limit”—the maximum amount of gas you're willing to spend on a computation. Once the gas limit is exceeded, the computation halts immediately. Again, this stops anyone from deploying “infinite loop” computations that could threaten the health of Ethereum.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1649071031903/dHmt3-Ags.png" alt="Ethereum gas fee schedule.png" />
An overview of some gas fees in Ethereum. [<a target="_blank" href="https://etherplan.com/2019/09/22/ethereum-classic-gas-system-economics-explained/8789/">image source</a>]</p>
<h3 id="heading-smart-contracts"><strong>Smart Contracts</strong></h3>
<p>Smart contracts are pieces of code that execute once a predefined set of parameters are met. A smart contract uses conditional programming (if y, then x) to perform operations.</p>
<p>Smart contracts are immutable, autonomous, and transparent. These features combined make smart contracts particularly appealing, <a target="_blank" href="https://businesstechguides.co/smart-contracts-limitations">although they are not without flaws</a>.</p>
<p>'Immutability' means a smart contract's code cannot be altered once deployed on the blockchain. Smart contracts are autonomous because they can self-execute without external control. And they are transparent since the rules governing their performance are written in publicly available code.</p>
<p>Some smart contracts are used to create and exchange tokens on the blockchain. ERC-20 tokens, for instance, have a smart contract defining their naming, creation, exchange, total supply, and other attributes.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1649071049352/TwNQJMPLb.png" alt="decentralized application architecture.png" />
[<a target="_blank" href="https://blockgeeks.com/decentralized-applications-development-net-developers/">Image source</a>]</p>
<h3 id="heading-transactions"><strong>Transactions</strong></h3>
<p>A transaction is an instruction from an Ethereum account. An example transaction is sending ether to an address from your wallet. Here, you're instructing the EVM to transfer value from your wallet to another location on the blockchain.</p>
<p>Not every transaction on Ethereum involves the transfer of value; some may transfer arbitrary data. The result of a transaction further depends on the recipient.</p>
<p>A regular, externally owned account (EOA) will simply receive the ether sent. However, a contract account may execute code once the transaction is successful. And, as explained earlier, transactions result in a ‘state transition function’, i.e., a change in Ethereum's state.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1649071061246/0tpvNB3rc.JPG" alt="Diagram explaining transactions in Ethereum.JPG" />
[<a target="_blank" href="https://ethereum.org/en/developers/docs/transactions/">Image source</a>]</p>
<p>These elements make up the core of the EVM's infrastructure.</p>
<h2 id="heading-features-of-ethereum-virtual-machine"><strong>Features of Ethereum Virtual Machine</strong></h2>
<h3 id="heading-deterministic"><strong>Deterministic</strong></h3>
<p>In programming, determinism is the ability of a program to produce the same output for a specific input at every instance. Determinism ensures that developers can design programs to perform specific operations and produce required results, independently.</p>
<p>The EVM is deterministic, so opcodes provide the same results no matter how many times the computation is performed. This is important as Ethereum's smart contract-powered dApps handle high-value transactions and must perform reliably. Or else, users wouldn't be confident to use them without expecting failures.</p>
<h3 id="heading-isolated"><strong>Isolated</strong></h3>
<p>The EVM is isolated, meaning the code has no access to the processes on your computer. You can safely deploy programs in the EVM while protecting your hardware/software from potential problems.</p>
<p>Moreover, smart contracts operate in isolated environments within the EVM. Thus, bugs or hacks that affect a particular smart contract are kept from harming the underlying protocol.</p>
<h3 id="heading-terminable"><strong>Terminable</strong></h3>
<p>The EVM is Turing-complete, so it can theoretically be used to perform any computation if it has the right resources and instructions. However, every computation relies on the gas allocated to it. If the gas runs out, then the operation ceases to run.</p>
<p>In this context, you can see Ethereum as “quasi-Turing complete” or “terminable” since code execution can terminate at specific times. However, this feature is important to ensure programs don't run forever (accidentally or maliciously) and stall the network.</p>
<h2 id="heading-why-is-the-ethereum-virtual-machine-evm-important"><strong>Why is the Ethereum Virtual Machine (EVM) Important?</strong></h2>
<p>The Ethereum Virtual Machine is what makes the execution of smart contracts on the Ethereum protocol possible. These smart contracts underpin <a target="_blank" href="https://businesstechguides.co/decentralised-applications">decentralized applications</a>, tokens, and many of the projects running on the Ethereum blockchain.</p>
<p>Here is a detailed overview of the EVM's functions:</p>
<p><strong>1. Providing a runtime environment for smart contracts</strong></p>
<p>Without the EVM, deploying a smart contract would be futile. The EVM provides a safe, sandboxed environment for the execution of smart contract code.</p>
<p><strong>2. Functioning as a decentralized processing unit</strong></p>
<p>The EVM powers the Ethereum protocol and gives it the programmability necessary to create decentralized applications (dApps) Every transaction or smart contract execution is performed in the EVM.</p>
<p><strong>3. Keeping track of state changes</strong></p>
<p>The EVM monitors changes to Ethereum’s <em>world state</em>. As explained earlier in this article, state in Ethereum-speak refers to a description of the Ethereum protocol at any point in time. Ethereum's state comprises account balances, contract code, contract storage, and more.</p>
<p>Operations, like sending ether, executing code, or creating a contract, ause changes in state. And it is the EVM's job to update the Ethereum network state to reflect those changes.</p>
<h2 id="heading-final-thoughts"><strong>Final Thoughts</strong></h2>
<p>The Ethereum Virtual Machine is at the heart of Ethereum's operation. Without the EVM, Ethereum cannot become an “Internet computer, powering decentralized applications available to users around the world.</p>
<p>However, the EVM still faces many problems, such as poor scalability, that limit its functionality. But <a target="_blank" href="https://businesstechguides.co/what-is-ethereum-2-0">planned upgrades to Ethereum</a>, including sharding, promise to improve the EVM and expand its usage</p>
<p><em>Cover photo by <a target="_blank" href="https://unsplash.com/@dengxiangs?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Choong Deng Xiang</a> on Unsplash.</em></p>
]]></content:encoded></item><item><title><![CDATA[A Beginner's Guide To The Liquid Network]]></title><description><![CDATA[Although Bitcoin has become the world’s most popular cryptocurrency, several problems limit its widespread adoption. The biggest of these problems is Bitcoin’s minimal throughput—the Bitcoin blockchain can process just 5-7 transactions per second. Fo...]]></description><link>https://eawosika.com/what-is-the-liquid-network</link><guid isPermaLink="true">https://eawosika.com/what-is-the-liquid-network</guid><category><![CDATA[Cryptocurrency]]></category><category><![CDATA[crypto]]></category><category><![CDATA[Bitcoin]]></category><category><![CDATA[scalability]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Thu, 31 Mar 2022 05:30:07 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1648704169790/ofMHIymUt.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Although Bitcoin has become the world’s most popular cryptocurrency, several problems limit its widespread adoption. The biggest of these problems is Bitcoin’s minimal throughput—the Bitcoin blockchain can process just 5-7 transactions per second. For context, centralized payment systems like Visa can process <a target="_blank" href="https://usa.visa.com/run-your-business/small-business-tools/retail.html">thousands of transactions</a> within the same timeframe.</p>
<p>Bitcoin’s low transaction speed discourages institutional investors, especially those involved in <a target="_blank" href="https://academy.binance.com/en/articles/what-is-arbitrage-trading">cryptocurrency arbitrage</a>. Retail buyers may also find the lengthy transaction confirmation times off-putting since it harms liquidity and user experience.</p>
<p>The transparent nature of Bitcoin further causes problems for large-scale buyers. Anyone can see address balances and amounts involved in Bitcoin transactions. This puts large orders at risk of front-running and creates privacy concerns for institutional buyers.</p>
<p>Several solutions have been proposed to solve these problems—namely layer-1 and layer-2 solutions.</p>
<p>Layer-1 solutions require rewriting the blockchain protocol to implement changes, such as bigger block sizes or faster block times. While bigger block sizes and faster block times may increase transaction speeds, they tend to affect network decentralization and security. This is why the Bitcoin community rejected the SegWit2X proposal, leading to the hard fork that created Bitcoin Cash.</p>
<p>Layer-2 solutions, however, operate on top of the main blockchain without rewriting the network protocol. <a target="_blank" href="https://businesstechguides.co/what-is-layer-2-blockchain">Layer-2 networks</a> handle transactions off the main chain—hence, they are also known as “off-chain” solutions. To preserve the security and immutability of transactions, transfers executed off-chain are bundled together and added to the main chain.</p>
<p>Popular examples of layer-2 solutions developed for the Bitcoin blockchain include <a target="_blank" href="https://www.rsk.co/">Rootstock</a>, <a target="_blank" href="https://lightning.network/">Lighting Network</a>, and the Liquid Network. This article focuses on the Liquid Network and its implications for the Bitcoin ecosystem.</p>
<h2 id="heading-what-is-the-liquid-network">What Is The Liquid Network?</h2>
<p>The Liquid Network is a sidechain built on the Bitcoin blockchain. Sidechains are layer-2 networks that interact with the main chain via a “two-way peg.” Assets on a sidechain are pegged 1:1 to the value of the native assets they represent, allowing anyone to use their tokens and coins on another blockchain.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1648704213907/9BShVYGff.JPG" alt="Liquid Network Bitcoin sidechain.JPG" />
[<a target="_blank" href="https://docs.blockstream.com/liquid/technical_overview.html#sidechain-basics">Image source</a>]</p>
<p>The Liquid Network is designed to enable fast, private, and secure issuance, transfer, and exchange of cryptocurrencies, stablecoins, digital assets, and security tokens on the Bitcoin blockchain. While Liquid Network operates atop Bitcoin’s base layer, it operates independently and uses different methods to achieve higher throughput and more confidential transactions.</p>
<p>Liquid Network primarily serves institutional investors, exchanges, cryptocurrency traders, and other enterprise clients who desire a higher level of privacy and faster transactions. Retail investors cannot directly use the Liquid Network, except they go through a member of the Liquid Network.</p>
<h2 id="heading-how-does-liquid-network-work">How Does Liquid Network Work?</h2>
<p>Essentially, what Liquid Network does is issue a <a target="_blank" href="https://blog.liquid.com/wrapped-tokens">“wrapped” version of BTC</a> called L-BTC that can be used on its chain. To use Liquid Network, users initiate a “peg-in”, which involves sending BTC to a Lightning Network address on the Bitcoin blockchain. Once the transaction receives 102 confirmations, an equal amount of L-BTC is minted on the Liquid Network and sent to the user’s address.</p>
<p>L-BTC owners are free to use this tokenized BTC however they want on the Liquid Network. They may use it to trade on a Liquid-compatible exchange or buy assets and <a target="_blank" href="https://businesstechguides.co/how-can-businesses-use-nfts">digital collectibles</a> issued on the chain.</p>
<p>If a user wishes to withdraw their BTC, they initiate a “peg-out”, which starts with sending L-BTC to an unretrievable address for burning. Once this transaction receives two separate confirmations, a Lightning Network member sends the original BTC to the user’s address on the Bitcoin blockchain.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1648704291708/rtDxvfqKu.jpg" alt="Liquid Network peg-in and peg-out infographic.jpg" />
[<a target="_blank" href="https://docs.blockstream.com/liquid/technical_overview.html#technical-overview">Image source</a>]</p>
<p>Unlike Bitcoin, Liquid Network uses a different method for generating new blocks. Transactions are bundled together into blocks and signed by the 15 Liquid Network Functionaries. These Functionaries run full nodes and are responsible for validating new transactions and broadcasting new blocks on the chain.</p>
<p>Additionally, Liquid uses Confidential Transactions to increase the privacy of Bitcoin transactions. This feature hides key transaction details, such as the amount transferred, the number of parties involved, and the balances left in users' addresses. However, network validators can still validate transaction amounts, total supply, and wallet balances.</p>
<h2 id="heading-advantages-of-using-liquid-network">Advantages of Using Liquid Network</h2>
<h3 id="heading-faster-transactions"><strong>Faster Transactions</strong></h3>
<p>Liquid Network uses Signed Blocks, which cut down the time it takes to validate and process transactions. New blocks are confirmed in around two minutes, unlike the 10 minutes it takes to add a block to the Bitcoin blockchain.</p>
<p>Liquid's faster transactions make it an ideal choice for arbitrage traders who need to perform cross-exchange trades quickly to make profits. With its long confirmation time, Bitcoin is ill-suited to the needs of such people, as trading advantages can be lost in mere minutes.</p>
<p>Retail investors who want faster transactions without converting their BTC to risky altcoins can transact using L-BTC on supported exchanges. This means they can make transfers and buy assets without delays and still enjoy the security of the Bitcoin blockchain.</p>
<h3 id="heading-greater-privacy"><strong>Greater Privacy</strong></h3>
<p>Satoshi Nakamoto, Bitcoin’s inventor, designed Bitcoin as a public ledger of sorts. This improves transparency since anyone can map transactions to individual addresses and even check wallet balances.</p>
<p>However, Bitcoin’s transparency can cause headaches, especially for entities conducting large-scale transactions. For example, a third party can use information gleaned from analyzing transactions to gain a market advantage, called <a target="_blank" href="https://valid.network/post/financially-exploiting-the-blockchain-with-frontrunning">frontrunning</a>. Frontrunning is disadvantageous to investors and discourages them from adopting Bitcoin.</p>
<p>Liquid Network implements Confidential Transactions to conceal key transaction information from outsiders. As such, only the sending address, receiving address, and transaction fee are recorded on-chain for transparency. The remaining details, such as the asset type and amount, are visible only to the parties involved in the transaction.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1648704349246/sbgB1BPDR.JPG" alt="Confidential Transactions infographic.JPG" />
[<a target="_blank" href="https://docs.blockstream.com/liquid/technical_overview.html#confidential-transactions">Image source</a>]</p>
<h3 id="heading-reduced-transaction-fees"><strong>Reduced Transaction Fees</strong></h3>
<p>A hidden benefit of Liquid’s higher throughput is the lower fees paid on transactions. When the Bitcoin network gets clogged with unconfirmed transactions, miners will charge higher fees to prioritize some transactions. This has caused Bitcoin transaction fees to <a target="_blank" href="https://decrypt.co/52060/the-side-effect-of-bitcoins-bull-run-transactions-now-cost-an-average-of-12">spike in the past</a>, especially during bull runs.</p>
<p>Liquid’s novel consensus mechanism (block signing) increases transaction speed, so users don’t have to pay extra to process transactions quickly. Low Liquid Network fees are ideal for retail and institutional investors wanting to trade BTC without using other blockchains. While new-generation chains may promise lower transaction fees, they cannot offer Bitcoin’s security and liquidity.</p>
<h3 id="heading-trustless-atomic-swaps"><strong>Trustless Atomic Swaps</strong></h3>
<p>Atomic swaps provide a way for people to swap cryptocurrencies without relying on an exchange or another trusted intermediary. Liquid users can conduct trustless, peer-to-peer Atomic Swaps using the open-source Liquid Swap tool.</p>
<p>For example, users can exchange tokenized versions of BTC (L-BTC) and USDT (L-USDT) on the Liquid Network. This can create more liquidity for entities and make it easier to trade BTC for other assets.</p>
<h3 id="heading-issuance-of-assets"><strong>Issuance of Assets</strong></h3>
<p>Liquid Network facilitates the issuance of digital assets, which would be impossible to do on Bitcoin, given the latter’s limited functionality. Users can issue, buy, and exchange the following assets on Liquid: utility tokens, security tokens, stablecoins, and digital collectibles (NFTs).</p>
<h2 id="heading-limitations-of-the-liquid-network">Limitations of the Liquid Network</h2>
<p>The Liquid Network runs a federated system, where 15 Functionaries are responsible for adding new transactions and maintaining the ledger. While this system reduces confirmation time, it is highly centralized and subject to the control of a few parties.</p>
<p>Other concerns relate to Liquid’s single points of failure. Bitcoin is difficult to shut down or hack because there are thousands of nodes (computers) sustaining the network. Liquid relies on just 15 computer hubs, which increases the risk of censorship and malicious attacks.</p>
<h2 id="heading-liquid-network-vs-lightning-network">Liquid Network vs Lightning Network</h2>
<p>Like Liquid, Lightning Network is a layer-2 network operating on top of the Bitcoin blockchain. However, these off-chain solutions have different goals. While Lightning enables Bitcoin micropayments, Liquid focuses on transactions involving large amounts of Bitcoin.</p>
<p>Lightning and Liquid also have different target users. Small businesses have found Lightning Network’s payment channels incredibly useful for processing Bitcoin payments. Conversely, enterprises, such as financial institutions and cryptocurrency exchanges use Liquid to execute private and faster transactions.</p>
<h2 id="heading-who-controls-the-liquid-network">Who Controls the Liquid Network?</h2>
<p>Liquid Network is the brainchild of Blockstream, a blockchain solutions company headed by Adam Back. Back developed Hashcash, which inspired Bitcoin’s proof-of-work consensus, and was one of the few people Satoshi Nakamoto contacted while working on Bitcoin.</p>
<p>While Blockstream created Liquid, the network is run by the Liquid Network Federation. The Liquid Federation comprises 15 validators (“Functionaries”); regular members who can vote on network updates; and nodes that verify the state of the network.</p>
<p>While anyone can run a Liquid node and monitor the network, only the 15 Functionaries running full nodes can create new blocks. This position is regularly rotated among Federation members to achieve some measure of decentralization.</p>
<p>Any Liquid Network Federation member (not necessarily a Functionary) can process peg-in and peg-out transactions (converting BTC to L-BTC). This requires that Federations keep pre-funded wallets on both Bitcoin and Liquid, so users can receive their wrapped or unwrapped assets quickly.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1648704381781/pOQWoCf1c.JPG" alt="Members of the Liquid Network Federation.JPG" />
[<a target="_blank" href="https://blockstream.com/liquid/">Image source</a>]</p>
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>The Liquid Network has emerged as a popular solution for scaling the Bitcoin network and adapting it to enterprise needs. Liquid improves Bitcoin without modifying the underlying protocol and affords users extra functionality without sacrificing security.</p>
<p>Liquid also introduces programmable functionality, tokenization, and interoperability to Bitcoin. This may strengthen it against Ethereum, Solana, Cardano, and other newer rivals and preserve its status as the world’s leading blockchai</p>
]]></content:encoded></item><item><title><![CDATA[Decentralized Storage Could Be Blockchain's Killer Application]]></title><description><![CDATA[The race to find blockchain technology’s killer app is on. Smart contracts, decentralized finance (DeFi), payments networks, non-fungible tokens (NFTs), blockchain-powered social networks are some of the most exciting use-cases coming out of the bloc...]]></description><link>https://eawosika.com/decentralized-storage-networks</link><guid isPermaLink="true">https://eawosika.com/decentralized-storage-networks</guid><category><![CDATA[Blockchain]]></category><category><![CDATA[storage]]></category><category><![CDATA[Web3]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Mon, 28 Mar 2022 07:58:07 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1648453733591/1Jz_Y5Ipn.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The race to find blockchain technology’s killer app is on. Smart contracts, decentralized finance (DeFi), payments networks, <a target="_blank" href="https://businesstechguides.co/how-can-businesses-use-nfts">non-fungible tokens (NFTs)</a>, <a target="_blank" href="https://businesstechguides.co/what-are-decentralized-social-networks">blockchain-powered social networks</a> are some of the most exciting use-cases coming out of the blockchain industry.</p>
<p>But there’s another blockchain use-case that’s (probably) more important than you think: decentralized storage.</p>
<p>The decentralized storage model protects the integrity, accessibility, and security of data by spreading the hosting of files across a peer-to-peer network. Centralized storage systems hold your data in large servers, but this can incur the risk of censorship, data loss, or information theft.</p>
<p>In this article, we explore how decentralized storage works and what benefits it offers. The article also gives a brief overview of popular decentralized storage projects.</p>
<h2 id="heading-what-is-decentralized-storage">What is Decentralized Storage?</h2>
<p>Decentralized storage applications store data on a distributed network run by computers scattered across multiple locations. Nodes collectively store and secure data and are responsible for making files available to owners. For their efforts, nodes on a decentralized storage network are given incentives in form of tokens paid by users.</p>
<p>As is evident, decentralized storage solutions are free from control by a single entity. Instead, peer-to-peer (p2p) nodes sustain the network and keep it operational. Without centralized management, data storages eliminate single points of failure and reduce counterparty risk for users.</p>
<h2 id="heading-how-does-decentralized-storage-work">How Does Decentralized Storage Work?</h2>
<p>Using centralized cloud storage requires uploading your file via the Internet to a server. And if you need it, you send a request to the same server.</p>
<p>Decentralized cloud storage uses a different mechanism for storing data. You still have to upload the data, and can request for it anytime, but how that data gets stored is significantly different from a centralized solution.</p>
<h3 id="heading-encryption"><strong>Encryption</strong></h3>
<p>Data uploaded to a decentralized storage network is automatically encrypted using cryptographic hash mechanisms. Your private key gives you access to the data and prevents non-authorized entities from decrypting the information.</p>
<h3 id="heading-sharding"><strong>Sharding</strong></h3>
<p>Files are split into little pieces and sent to different nodes on the network. Sharding ensures no single node holds the complete dataset, eliminating the problems of censorship and privacy intrusion. With bits of your data spread across the network, no one can read your information or restrict access.</p>
<h3 id="heading-storage"><strong>Storage</strong></h3>
<p>Finally, the sharded bits of your file are sent to several nodes located in different geographical areas. If you need the file, the network retrieves the components from nodes storing it and reassembles it for you to download.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1648453843111/eMORG0cGB.jpg" alt="how decentralized storage works .jpg" />
[<a target="_blank" href="https://www.leewayhertz.com/decentralized-cloud-storage-solution/">Image source</a>]</p>
<h2 id="heading-the-benefits-of-decentralized-storage-networks">The Benefits of Decentralized Storage Networks</h2>
<p>In 2006, British mathematician Clive Humby described data as "the new oil." The prescience of this statement is apparent later, as the growth of eCommerce, Web applications, and IoT/AI have spurred the creation of large amounts of data.</p>
<p>To extract value from data, enterprises invest considerable amounts into data storage and management. A company might decide to build bespoke data centers or rely on cloud storage services provided by Google Drive, DropBox, and Amazon Web Services (AWS).</p>
<p>However, centralized storage of information presents teething problems. Large databases are susceptible to malicious attacks, with <a target="_blank" href="https://www.upguard.com/blog/biggest-data-breaches">hacks resulting in losses</a> every year. And because the information is stored in an external server, owners lose control—they cannot access it if the service provider goes offline or restricts access.</p>
<p>These are just some of the problems that decentralized storage networks were designed to solve. By sharing storage responsibilities among different participants, decentralized storage services provide a robust and secure method of storing information.</p>
<h3 id="heading-data-security"><strong>Data Security</strong></h3>
<p>In today's digital economy, data security is more important than ever. Poor data storage systems often lead to data breaches, identity theft and other problems, which are costly for both companies and users.</p>
<p>Centralized storage services promised to fix data storage problems, but have failed to live up to this promise. For example, a <a target="_blank" href="https://www.bbc.com/news/technology-37232635.amp">hack</a> on Dropbox—one of the world's largest cloud storage companies—led to 68 million passwords getting leaked on the dark web.</p>
<p>Decentralized, peer-to-peer networks are <a target="_blank" href="https://businesstechguides.co/how-does-blockchain-security-work">theoretically safer</a> compared to their centralized networks. That's what makes them ideal for protecting important data from malicious actors.</p>
<p>To attack a decentralized storage service, hackers need to access every node running the protocol. The enormous costs required to pull off this exploit are often enough to discourage hackers from trying to steal your information.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1648453881389/cGzAePtHn.jpg" alt="worlds biggest data breaches.jpg" />
[<a target="_blank" href="https://ojashshrestha1.medium.com/implementation-of-gdpr-with-sql-server-and-azure-sql-database-fe710e177c59">Image source</a>]</p>
<h3 id="heading-privacy"><strong>Privacy</strong></h3>
<p>If it wasn't obvious already, storing sensitive information on a company's server breeds privacy violations of immense proportions. Even if the company encrypts information, the encryption key is still stored on a server. Savvy hackers can steal the encryption keys and access your private information.</p>
<p>Decentralized storage fixes this problem. Data files are split into different bits to protect them from unauthorized viewing. To recreate the file, these bits must be assembled—which is impossible to do without a private key or appropriate permissions.</p>
<h3 id="heading-efficiency"><strong>Efficiency</strong></h3>
<p>On the surface, centralized cloud storage seems efficient. You can easily retrieve files from your Google Drive or Dropbox folder by logging into your account. But a closer look reveals the potential inefficiencies with such centralized data storage and management.</p>
<p>Your information is stored in a handful of data centers around the world. If these systems get knocked offline for any reason, accessing information becomes impossible. A distributed denial-of-service (DDoS) attack is enough to crash seemingly robust networks and block users from using centralized servers.</p>
<p>Since data centers may be clustered in certain areas, users in far-flung corners of the world may find it difficult to retrieve information. They may need to expend more bandwidth just to download information stored on a cloud storage platform.</p>
<p>Decentralized storage services operate on a robust p2p architecture where multiple nodes distributed across different locations hold copies of a file. Even if a few nodes go offline, your information would still be available. These systems are fault-tolerant, so a few nodes malfunctioning cannot affect their operation.</p>
<p>Blockchain-powered storage can theoretically reduce bandwidth usage. The servers storing your files are distributed across the world, and there's the possibility of finding a server close to your region. This makes downloading files easier and shrinks bandwidth usage.</p>
<h3 id="heading-data-integrity"><strong>Data Integrity</strong></h3>
<p>Data integrity is a concept that refers to the ability of data to retain its qualities throughout an entire lifecycle. In other words, files should remain accessible in their original form five, ten, twenty years from now.</p>
<p>Data integrity is difficult to implement with centralized storage systems. This is mainly because traditional storage applies a location-specific approach to storing information.</p>
<p>Say you need to access a particular webpage on this site. You could get it by putting a link to the file path in your browser. Here’s what that link could look like:</p>
<p><em>https://businesstechguides.co/series/blockchain</em></p>
<p>This link points to where the webpage (i.e., the file) is hosted. When you enter the link on a search engine, you’re requesting the data from whatever server (computer) holds it. If the file is in its original location, you should get the webpage.</p>
<p>But what if something happens to the particular server holding the file or the webpage itself gets moved to another location? The data simply becomes unavailable. If you’ve ever encountered a “dead link” (Error 404), it’s because the content you requested no longer exists in that location.</p>
<p>To remedy the problem of data persistence and integrity, decentralized storage systems use a content-specific approach. This method identifies data by its content, not the location. Here’s a link to a webpage stored on the InterPlanetary File System (more on this later):</p>
<p><a target="_blank" href="https://ipfs.io/ipfs/QmWATWQ7fVPP2EFGu71UkfnqhYXDYH566qy47CnJDgvs8u">https://ipfs.io/ipfs/QmWATWQ7fVPP2EFGu71UkfnqhYXDYH566qy47CnJDgvs8u</a></p>
<p>You’ll notice that this link has a long alphanumeric string. That alphanumeric string is called a hash, and hashes are unique to every piece of content. In other words, no two piece of content can have the same hash.</p>
<p>Thus, hashes serve as unique identifiers for data—and we can use them to find information on a decentralized storage network like IPFS. When you enter this link, you’re not asking to be taken to the specific place where the webpage exists. Instead, you’re asking anyone on the network who has a version of the webpage to make it available. </p>
<p>Because hashes are unique to content, it is impossible for anyone to pass off a fake file as genuine. Altering the content would also alter the hash, so you’d end up with a different-looking link from the original. Here’s a link to an altered version of the IPFS webpage included earlier:</p>
<p><a target="_blank" href="https://ipfs.io/ipfs/QmP8CvqzGRgH3WyeVKm8F1Pr6S4PGfuaCx6NVWuc929HWf">https://ipfs.io/ipfs/QmP8CvqzGRgH3WyeVKm8F1Pr6S4PGfuaCx6NVWuc929HWf</a></p>
<p>Notice how the links are different? With decentralized storage, we can make sure data remains accessible forever and remains intact.</p>
<h3 id="heading-lower-costs"><strong>Lower Costs</strong></h3>
<p>Cloud storage companies have to create purpose-built facilities to store information. And running data centers also incurs additional overhead costs, which companies pass on to users in form of higher storage costs.</p>
<p>Decentralized storage options are cheaper because they don't require extensive overhead costs. People are incentivized to lend out unused device storage. Which means users can pay lower fees to store their data.</p>
<h2 id="heading-an-overview-of-decentralized-storage-networks">An Overview of Decentralized Storage Networks</h2>
<p>While decentralized storage is a growing sector, the industry has seen the influx of new entrants promising different benefits. Here are a few decentralized storage networks available today:</p>
<p><strong><a target="_blank" href="https://ipfs.io/">InterPlanetary File System (IPFS)</a></strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1648453910486/609zUre5o.png" alt="IPFS_logo.png" />
[<a target="_blank" href="https://commons.wikimedia.org/wiki/File:IPFS_logo.png">Image source</a>]</p>
<p>Created by Protocol Labs, InterPlanetary File System (IPFS) is a decentralized protocol for storing and accessing data, like files, websites, and applications. IPFS uses <a target="_blank" href="https://docs.ipfs.io/concepts/content-addressing/">content addressing</a> to preserve the integrity of data and ensures long-term data persistence and immutability.</p>
<p><strong><a target="_blank" href="https://filecoin.io/">Filecoin</a></strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1648453924526/ykKNey-3r.jpg" alt="Filecoin-logo.jpg" />
[<a target="_blank" href="https://cryptosrus.com/what-is-filecoin/">Image source</a>]</p>
<p>Filecoin is a blockchain running atop IPFS. While you can upload your data to IPFS for storage, there's no incentive for nodes to keep it around forever. Filecoin ensures your content will always be available by rewarding nodes (called miners) for storing it.</p>
<p>These rewards come from the transaction fees you pay to have the Filecoin network store your information. Filecoin has a proof-of-storage mechanism for verifying that miners store information as requested.</p>
<p><strong><a target="_blank" href="https://www.storj.io/">Storj</a></strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1648453948223/__iACYu3h.png" alt="storj decentralized storage logo.png" />
[<a target="_blank" href="https://www.publish0x.com/take-back-control/storj-a-comprehensive-story-of-moving-a-node-from-europe-to-xknnxkr">Image source</a>]</p>
<p>Storj is a decentralized file-hosting protocol running on the Ethereum blockchain. Nodes running the Storj software sell their hardware space and bandwidth to earn $STORJ tokens.</p>
<p>The Storj network encrypts and fragments files before storing them on a distributed network of nodes. With multiple nodes operating the network, Storj is immune to censorship, data loss, malicious attacks, and service failures.</p>
<p><strong><a target="_blank" href="https://www.arweave.org/">Arweave</a></strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1648453959179/199nKicOd.jpg" alt="arweave decentralized storage solution.jpg" />
[<a target="_blank" href="https://arweave.news/what-is-arweave-ar/">Image source</a>]</p>
<p>Arweave is another decentralized storage network aiming to dethrone traditional cloud storage providers like Google. It allows anyone with extra space to connect their computers (nodes) to the network and store data on behalf of others.</p>
<p>Those who sell storage space on the Arweave Network get paid in the network's native $AR cryptocurrency. This creates an incentive for them to keep those files available for clients. Arweave believes this incentive structure can help create a modern-day Library of Alexandria, which can preserve human information forever.</p>
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>Centralized storage services may have worked for years, but their failings are becoming apparent. Decentralized storage networks running on the blockchain offer a better, cheaper, and more secure mechanism for storing information.</p>
<p>While decentralized storage networks are still in the early growth phase, their use is already picking up. And as demands for efficient data storage spikes, we can expect decentralized storage models to become indispensable for users and enterprises</p>
]]></content:encoded></item><item><title><![CDATA[Are Cross-Chain Bridges Worth The Risk?]]></title><description><![CDATA[Although a fairly new addition to the blockchain ecosystem, cross-chain bridges have exploded in popularity, with their total locked value (TVL) running into billions. Popular blockchain bridges like Arbitrum and Avalanche have also seen token values...]]></description><link>https://eawosika.com/are-cross-chain-bridges-worth-the-risk</link><guid isPermaLink="true">https://eawosika.com/are-cross-chain-bridges-worth-the-risk</guid><category><![CDATA[Blockchain]]></category><category><![CDATA[Web3]]></category><category><![CDATA[Cryptocurrency]]></category><category><![CDATA[crypto]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Mon, 21 Mar 2022 07:22:15 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1647847254555/riMgwXdM-.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Although a fairly new addition to the blockchain ecosystem, cross-chain bridges have exploded in popularity, with their total locked value (TVL) <a target="_blank" href="https://bitcoinist.com/cross-chain-bridges-tvl-rises-89-in-one-month-as-defi-market-soars/#:~:text=September%20which%20was%20brutal%20did,to%20over%20%2414.70%20in%20TVL.">running into billions</a>. Popular blockchain bridges like Arbitrum and Avalanche have also seen token values record significant increases.</p>
<p>The growth of blockchain bridges has a lot to do with growing adoption of decentralized finance (DeFi). Bridges allow users to seamlessly transfer assets between blockchains, increasing liquidity and the ability to leverage tokens for DeFi-related activities.</p>
<p>But there’s <a target="_blank" href="https://cryptobriefing.com/vitalik-buterin-skeptical-of-cross-chain-bridges/">growing concern</a> over widespread use of cross-chain bridges, particularly due to the risks they pose to users. With <a target="_blank" href="https://www.theverge.com/2022/2/3/22916111/wormhole-hack-github-error-325-million-theft-ethereum-solana">hacks on blockchain bridges</a> costing users millions, the functionality of blockchain bridges is a topic that deserves analysis.</p>
<p>In this article, we’ll explore how cross-chain bridges work and what they offer. We’ll also consider examples of blockchain bridges and examine the risks of using cross-chain bridges.</p>
<h2 id="heading-what-is-a-cross-chain-bridge">What is a Cross-Chain Bridge?</h2>
<p>A cross-chain bridge is a protocol that allows different blockchains “talk” with each other. Bridges connect separate blockchains, enabling users to transfer assets, tokens, smart contract information, and other forms of data across platforms.</p>
<p>Interoperability—the ability for different systems to communicate—wasn’t a consideration in the early days of blockchain technology. For example, Bitcoin and Ethereum existed as independent systems, so you couldn’t possibly spend BTC on Ethereum or ETH on Bitcoin.</p>
<p>This contrasts with the legacy financial systems, which operate an interoperable infrastructure. You could swipe your Visa credit card at any point-of-sale system anywhere in the world, without worrying if it supports Visa or not. Spending BTC on Ethereum required going through exchanges, a long, expensive, and risky process.</p>
<p>Cross-chain bridges solved the problem by making it possible to use assets on different blockchains without going off-chain. Note that your BTC doesn’t magically become ETH on Ethereum. Rather the cross-chain bridge enables asset conversion using a lock-mint-burn mechanism, which is explained in the next section.</p>
<h2 id="heading-how-do-cross-chain-bridges-work">How Do Cross-Chain Bridges Work?</h2>
<p>Moving your BTC to Ethereum starts with sending an amount to a specified address on the source blockchain (Bitcoin). This information is relayed to the bridge, triggering the creation of an equal amount of tokens on the other blockchain.</p>
<p>Withdrawing your locked tokens follows the same process. You send the tokens to an address on the non-native blockchain, while your original deposit on the first blockchain is sent to your address.</p>
<p>Here’s an illustration to help you understand:</p>
<p>Suppose you have BTC but need ETH to participate in a DeFi staking program. So, you send 20 bitcoins to the bridge’s address on the Bitcoin blockchain. Once there’s proof of your deposit someone, called a “guardian”, mints 20 <a target="_blank" href="https://academy.binance.com/en/articles/what-are-wrapped-tokens">“wrapped” bitcoins (wBTC)</a> on the Ethereum blockchain. These newly minted tokens are compatible with Ethereum, so you can use them however you like.</p>
<p>If you want to withdraw your locked BTC, you’ll need to send the wBTC to an address on Ethereum for <a target="_blank" href="https://academy.binance.com/en/articles/what-is-a-coin-burn">burning</a>. Later, the guardian unlocks the bitcoins you sent earlier and deposits them in your address on the Bitcoin blockchain.</p>
<p>Popular bridges include:</p>
<ul>
<li>Binance Chain Bridge</li>
<li>Terra Bridge </li>
<li>Anyswap</li>
<li>Arbitrum Bridge</li>
<li>Polygon Bridge </li>
<li>xDAI</li>
<li>Immutable-X</li>
<li>Optimism</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1647846979245/3C5Bf4zwO.png" alt="cross-chain bridges infographic.png" />
<em>Classifications of blockchain bridges. Source: <a target="_blank" href="https://medium.com/1kxnetwork/blockchain-bridges-5db6afac44f8">Medium</a></em></p>
<h2 id="heading-benefits-of-cross-chain-bridges">Benefits of Cross-Chain Bridges</h2>
<p>Cross-chain bridges are popular for helping users move assets between separate blockchains seamlessly. As DeFi continues to boom, cross-chain bridges open up the ecosystem to more individuals. As seen in our previous example, users can convert assets quickly to take advantage of different earning mechanisms like yield farming, staking, and lending.</p>
<p>Cross-chain bridges are also useful for more than just asset transfers, however. With greater interoperability between blockchains, users can switch between platforms to enjoy unique benefits like faster transactions or lower costs.</p>
<p>For example, you can switch from a layer-1 network (Ethereum) to a <a target="_blank" href="https://businesstechguides.co/what-is-layer-2-blockchain">layer-2 network</a> (Polygon) to leverage the latter’s higher throughput and cheap gas fees. Not only does this improve user experience, but it also makes it easier for you to execute blockchain transactions. </p>
<p>Cross-chain bridges make it easier to use a decentralized application (dApp) across different blockchains. </p>
<p>Sometimes, using a particular dApp, such as Aave, on its native blockchain (Ethereum) can be problematic, especially if the network is congested. In this case, using the dApp (Aave) on a faster layer-2 network like Polygon may be better. With a bridge, you can convert to your ETH to MATIC tokens and start using Aave on Polygon.</p>
<h2 id="heading-what-are-the-risks-of-using-cross-chain-bridges">What are the Risks of Using Cross-Chain Bridges?</h2>
<p>That blockchain bridges are revolutionary cannot be denied. However, their design often leaves room for vulnerabilities, which can be exploited at the expense of users. Below is an overview of major problems with cross-chain bridges today:</p>
<h2 id="heading-single-points-of-failurecentralization">Single Points of Failure/Centralization</h2>
<p>Cross-chain bridges vary by design. Centralized bridges rely on one administrator or a small group of entities to manage the minting and burning of tokens. In this case, there’d be one party or a set of trusted individuals (often called “guardians’) responsible for the following function:</p>
<ul>
<li>Holding of assets deposited on the source blockchain</li>
<li>Notifying the bridge of the transaction</li>
<li>Verifying proofs of transaction</li>
<li>Minting and burning wrapped tokens</li>
</ul>
<p>Binance Bridge, managed by the Binance Company, is an example of a highly centralized bridge. With this bridge, users can transfer Binance Coin (BNB) to Binance Chain, Binance Smart Chain, and other blockchains, with Binance managing the entire process.</p>
<p>A slightly centralized bridge, such as Chainswap, uses a group of trusted relayers. Here, the functions are distributed, so any relayer can execute the minting and burning actions on either blockchain. These relayers must stake some tokens before getting approval, and this stake can be slashed if they are guilty of malicious activity.</p>
<p>Centralization creates risks for users, forcing them to trust a company in Binance Bridge’s case or a group of unknown validators in Chainswap’s case. Some would argue that this isn’t a problem: Binance, a reputable company, cannot possibly steal user funds, and platforms like Chainswap have Know-Your-Customer (KYC) requirements for prospective validators.</p>
<p>However, trust counts for little when large amounts of assets. It’s all too easy for a hacker or even malicious insiders to breach a central node or permissioned network and take over the blockchain bridge to steal client funds or mint new tokens without deposits. And there’s the problem of custodians losing their private keys, rendering funds irrecoverable.</p>
<h2 id="heading-poor-liquidity">Poor Liquidity</h2>
<p>Cross-chain bridges have appeal because they provide customers with much-needed liquidity. A user can easily swap unused ETH and convert to BNB for any reason—processing transactions, buying assets, or trading. A bridge breaks down crypto’s walled gardens and permits value to flow between different blockchains.</p>
<p>But not every cross-chain bridge fulfills the vaunted promise of liquidity. To be truly liquid, a bridge must have asset pools on both the native and non-native blockchains to make the lock-mint-burn-release process faster and easier.</p>
<p>Centralized bridges have higher liquidity since the controlling entity has incentives to keep asset pools on multiple platforms. This feat is harder to replicate with decentralized bridges since users have lower incentives to keep funds locked on different blockchains. As a result, users may find swapping assets difficult, negating the usefulness of a bridge.</p>
<h2 id="heading-technical-vulnerabilities">Technical Vulnerabilities</h2>
<p>To reduce reliance on trusted intermediaries, decentralized bridges use smart contracts to manage asset swaps. Users deposit funds in a smart contract, which automatically initiates the minting of wrapped tokens on the other blockchain.</p>
<p>Then users can call the contract’s “burn” function, which burns the tokenized assets and releases the original assets. The entire process is coordinated trustlessly by the smart contract, reducing third-party risk.</p>
<p>However, <a target="_blank" href="https://businesstechguides.co/smart-contracts-limitations">smart contracts have many flaws</a>—for example, they are as secure as developers make them. Many cross-chain bridges rely on the soundness of the smart contract code, not the <a target="_blank" href="https://businesstechguides.co/how-does-blockchain-security-work">security of the blockchain</a>. As such, bridges using poorly written smart contracts are vulnerable to malicious exploits, which presents an even bigger risk for users.</p>
<p>The <a target="_blank" href="https://blog.chainalysis.com/reports/wormhole-hack-february-2022/">$320 million hack on Wormhole</a> (a Solana-Ethereum bridge) exploited a flaw in the smart contract code that allowed the hacker to mint 120,000 wrapped ether (wETH) on Solana without depositing any ETH tokens. In <a target="_blank" href="https://certik.medium.com/qubit-bridge-collapse-exploited-to-the-tune-of-80-million-a7ab9068e1a0">another exploit</a>—this time on Qubit Finance’s Ethereum-BSC bridge—hackers were able to mint 206809 Binance (BNB) coins worth $80 million on the BSC chain without depositing any ETH.</p>
<p>Deficient smart contracts present a greater attack risk vector for cross-chain bridges due to the blockchain’s immutable nature. In fact, some bridges hacked have resorted to begging hackers to return stolen funds. That’s <a target="_blank" href="https://www.reuters.com/technology/crypto-platform-poly-network-says-hacked-funds-returned-2021-08-23/">worked in the past</a>, but counting on unscrupulous individuals to surrender their loot every time is like expecting to see cheese on the moon.</p>
<h2 id="heading-risk-of-censorship">Risk of Censorship</h2>
<p>Cryptocurrency’s raison d’etre is the provision of censorship-resistant money to people. Most public blockchains fulfill this promise as long your tokens live on their native networks. Once you start swapping an asset via bridges, you’re trading off censorship resistance for liquidity.</p>
<p>Let’s imagine you’re using a centralized or permissioned cross-chain bridge. You’ll need to trust the custodian(s) to burn your wrapped tokens and send the original coins to your address on the original blockchain.</p>
<p>But what happens when the “trusted” custodian(s) refuse to stop minting and burning tokens? Your funds will remain locked up forever—and that’s the end.</p>
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>Cross-chain ridges have brought higher interoperability to the blockchain industry and created a better experience for blockchain users and developers. Still, interoperable blockchain platforms have problems to solve, including growing centralization, security risks, liquidity issues, and more.</p>
<p>With improvements to cross-chain bridge architecture, a future where interconnected blockchains form a giant interoperable ecosystem is possible. For now, we must accept that true—and secure—blockchain interoperability is far from being realized.</p>
<p><em>Cover photo courtesy of Cadalyst.com</em></p>
]]></content:encoded></item><item><title><![CDATA[What Is Cryptoeconomics?]]></title><description><![CDATA[Although you may not know it, Bitcoin wasn’t the first attempt at creating a peer-to-peer cash system. Hashcash, Bit Gold, and Digicash are some early examples of digital currencies that never quite took off.
Bitcoin worked because Satoshi Nakamoto b...]]></description><link>https://eawosika.com/what-is-cryptoeconomics</link><guid isPermaLink="true">https://eawosika.com/what-is-cryptoeconomics</guid><category><![CDATA[Cryptocurrency]]></category><category><![CDATA[Cryptography]]></category><category><![CDATA[Bitcoin]]></category><category><![CDATA[Ethereum]]></category><category><![CDATA[Blockchain]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Thu, 17 Mar 2022 13:20:56 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1647523056102/qvYX6rwDn.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Although you may not know it, Bitcoin wasn’t the first attempt at creating a peer-to-peer cash system. Hashcash, Bit Gold, and Digicash are some early examples of digital currencies that never quite took off.</p>
<p>Bitcoin worked because Satoshi Nakamoto brilliantly combined incentives that encouraged different parties to sustain the network's security, decentralization, and functionality.</p>
<p>Nakamoto's design inspired "cryptoeconomics", a concept that combines cryptography and economics to create a functional, decentralized peer-to-peer network to secure transactions.</p>
<p>Cryptoeconomics can be hard to grasp, but this article is an ELI5 introduction to the concept. We’ll consider cryptoeconomics in detail and explore its applications in real-world situations.</p>
<h2 id="heading-the-meaning-of-cryptoeconomics">The Meaning of Cryptoeconomics</h2>
<p>Cryptoeconomics is a portmanteau of “cryptography” and “economics.” As defined by the MIT Cryptoeconomics Lab, cryptoeconomics “brings together the fields of economics and computer science to study the decentralized marketplaces and applications that can be built by combining cryptography with economic incentives.”</p>
<p>Cryptoeconomics is how we design rules that incentivize participants in a distributed system to act honestly and <a target="_blank" href="https://businesstechguides.co/how-does-blockchain-security-work">secure the network</a>. Cryptoeconomics is crucial in sustaining decentralized networks like public blockchains and preserving their unique qualities—security, immutability, and censorship resistance.</p>
<p>Many early peer-to-peer networks failed because participants had minimal incentives to sustain the network. Without any rewards for contributing to the p2p network, there was nothing to stop people from trying to attack or game the system.</p>
<p>Satoshi Nakamoto was the first person to devise a system of rewards and punishments to encourage honest behavior. Called “proof-of-work”, Bitcoin’s mechanism required computer nodes called “miners” to invest a valuable resource (electricity) before participating (i.e., adding new transactions to the blockchain).</p>
<p>Honest miners who added valid transactions received a “block reward”, which consisted of newly generated coins and transaction fees. Conversely, dishonest miners lost the block reward but also failed to recoup gains on their investment (electricity).</p>
<p>We’ll dive deeper into the cryptoeconomics of Bitcoin later, but the above summarizes the main goal of cryptoeconomics: incentivizing honest behavior and punishing malicious actors. For now, let’s look at the various components of cryptoeconomics.</p>
<h2 id="heading-components-of-cryptoeconomics">Components of Cryptoeconomics</h2>
<p>It’s easy to conclude cryptoeconomics is just another field of economics. However, while cryptoeconomics borrows from classical economic concepts like game theory, it adds several elements, making it an entirely new field.</p>
<p>This section covers several concepts that underpin cryptoeconomic protocols, especially those found in cryptocurrencies. It’s also important to note that cryptoeconomics applies to other cases aside from cryptocurrencies.</p>
<h3 id="heading-game-theory"><strong>Game Theory</strong></h3>
<p>Game theory is the study of the interaction between rational agents in a system with clearly defined rules and rewards. The assumption is that individuals always protect their self-interest and follow strategies that benefit them. Therefore, the role of game theory is to predict the potential actions of individuals and evaluate the results of those actions on the system.</p>
<h3 id="heading-mechanism-design"><strong>Mechanism Design</strong></h3>
<p>Mechanism design combines both economics and math to create systems that produce desired outcomes. If game theorists study how different players act in a game, then mechanism designers create the game itself.</p>
<p>In the context of cryptoeconomics, mechanism design guides the creation of functional blockchain networks. By understanding how participants may act, we create certain rules that ensure they act how we want, i.e., honestly.</p>
<h3 id="heading-economic-incentives"><strong>Economic Incentives</strong></h3>
<p>Economic incentives refer to the system of rewards that influences the behavior of individuals. Cryptoeconomic protocols use economic incentives to control the actions of nodes in a distributed network.</p>
<p>Here's a brief illustration of economic incentives:</p>
<p>Jack works for XYZ Corp. as an accountant and receives a salary (along with other benefits) as compensation. Now, Jack could use his position to steal money from XYZ Corp, but he doesn't.</p>
<p>That Jack doesn't steal from the company doesn't make him a saint. Heck, Jack could be the greediest person to ever work as an accountant.</p>
<p>However, Jack cannot <em>plausibly</em> steal because of the consequences. Getting caught would cost Jack his job and lead to a loss of income. Jack's employer could sue—more money to be spent on lawyer fees—and put him in jail. Also, Jack will likely find it difficult to get a job after jail, since employers may be unwilling to hire an ex-convict to secure their funds.</p>
<p>The summary here is: Jack has incentives to remain honest regardless of his values. In the same way, blockchain protocols attempt to design economic incentives that promote positive actions among nodes in the network.</p>
<p><strong>Token Engineering</strong></p>
<p>The difference between Bitcoin and other peer-to-peer systems that came before it was the existence of a financial incentive for participation. This incentive was in the form of "tokens"—digital assets that have some value attached to them.</p>
<p>In Bitcoin's case, miners received a certain number of tokens (bitcoins) for validating transactions and securing the chain. Other decentralized networks adopted the same method: rewarding users with tokens for sustaining the system.</p>
<p>But the token itself must be designed to have value, or else it'd be worthless, reducing financial incentives for network participants. This is where token engineering comes in—we must program features into tokens that make them valuable.</p>
<p>Here's an example:</p>
<p>Imagine a city issues tokens that grant the holder access to the Metro Bus. This token has value because it allows you to travel within your city. It's also valuable because other people may want that token and will pay you to use it.</p>
<p>The value of the token also depends on supply and demand. Suppose more people want to use the Metro Bus, but not enough tokens to go around. People will be willing to pay higher amounts to secure the token, increasing its value.</p>
<p>Thus, the Transport Department may deliberately limit the introduction of new tokens to avoid crashing the value of existing units. Additionally, it may raise the requirements necessary to acquire one of the tokens—for example, requiring that holders must be six-figure earners.</p>
<p>Cryptoeconomic protocols may implement similar measures to program value into tokens. This includes designing them for specific uses, capping supply, and raising the bar for ownership.</p>
<p>For example, Bitcoin has value because it's useful for storing value (inflation hedge) and settling transactions (payments). Its value also derives from scarcity (on 21 million bitcoins will ever be mined) and acquisition costs (miners must invest in specialized hardware and electricity)</p>
<h3 id="heading-cryptography"><strong>Cryptography</strong></h3>
<p>Cryptography plays a key role in securing peer-to-peer decentralized networks. On a blockchain, "cryptographic proofs" are necessary for validating information. Without cryptographic proofs, it'd be impossible to verify the truth of transactions and determine if nodes are acting honestly.</p>
<p>Two important cryptographic proofs used in Bitcoin are hashes and digital signatures. Let's look at both concepts in detail:</p>
<h3 id="heading-hashes"><strong>Hashes</strong></h3>
<p>A hash function runs an input of any size and returns an output of fixed size. Here's an example of a hash derived from running "emmanuel" through an <a target="_blank" href="https://passwords-generator.org/sha256-hash-generator">SHA-256 hashing algorithm</a>:</p>
<p>25eaebedfb6ad2b4701c34333231755afb593792844378aebf0117c9e3ef4402</p>
<p>A hash is a one-way function, meaning you cannot determine the input from the output. Using the above example, there's no way you can know the text ("emmanuel") encoded in the hash just by looking at it.</p>
<p>While hashes help protect the confidentiality of information, their usefulness lies in their ability to verify information on a decentralized network.</p>
<p>Because hashes are linked to their inputs, changing the information causes the hash value to change. If I change "emmanuel" to "emmanuelle", the resulting hash looks very different from the original:</p>
<p>fa14cf60ee743d478f76fb1c5ee8c5f3889d58f2b8636c1a11fbdf0ca7f2c863</p>
<p>So, how do hashes apply to the blockchain or, specifically, cryptoeconomics?</p>
<p>Nodes must hash each transaction in a block and, thereafter, combine these hashes into a single hash called the "root hash." This root hash derives from all transactions contained in a block and serves as a "digital fingerprint" for the block.</p>
<p>If the information within a block is altered, then the block's hash will change as well. That way, other nodes can easily notice the alteration attempt and reject the transaction block.</p>
<p>Another use-case for hashes, commonly associated with Bitcoin, is verifying if nodes have done the "work" necessary to add new transactions. Bitcoin requires miners to find a <a target="_blank" href="https://www.investopedia.com/terms/t/target-hash.asp">target hash</a> before adding blocks to the chain. Since. finding this number is incredibly difficult, anyone who does automatically has "proof of work" and can broadcast new transactions on the blockchain.</p>
<h3 id="heading-digital-signatures"><strong>Digital Signatures</strong></h3>
<p>Digital signatures are used to verify the source of information in a decentralized network. Without digital signatures, it'd be difficult to determine who initiated a transaction.</p>
<p>Digital signatures work through a public-private key generation protocol (PGP). When a new blockchain address is created, a "public key" is generated from the address, while the private key is derived from the public key.</p>
<p>Think of the public key as an "ID badge" that you can share to prove your identity. However, the private key is like a bank PIN used to authorize transactions. Like the bank PIN, your private key must be kept secret.</p>
<p>So, how do digital signatures apply to blockchains and cryptoeconomics?</p>
<p>Generating a digital signature requires "signing" a transaction with your private key. Public-private cryptography is structured such that anyone can verify your signature if they know your public key.</p>
<p>The basic rule of any blockchain is: transactions are only valid if signed with the correct private key. With this feature, nodes can easily validate transactions that other nodes submit for addition to the blockchain. Thus, any invalid transactions submitted will be rejected and the dishonest node penalized.</p>
<h2 id="heading-cryptoeconomics-in-action-the-bitcoin-example">Cryptoeconomics in Action: The Bitcoin Example</h2>
<p>As with all concepts, our understanding of cryptoeconomics might benefit from analyzing its real-world applications. Bitcoin was the first successful cryptoeconomic experiment and gave birth to cryptoeconomic research, so we’ll use it in our example:</p>
<p>Before miners can add new transactions, they must solve complex puzzles as “proof of work.” The Bitcoin protocol is pre-programmed to increase the difficulty of those puzzles, so miners must invest in powerful computers, such as Application Specific Information Computer Systems (ASICs).</p>
<p>By nature, ASICs cost a lot, consume huge amounts of electricity, and require specialized cooling options, as they produce considerable heat. If we add equipment costs, electricity costs, and cooling costs, it’s obvious miners are making a considerable investment.</p>
<p>To recoup their investment, miners must try to secure “block rewards” by adding <em>valid</em> transactions to the Bitcoin blockchain. Miners can then sell bitcoins earned through the block reward, take their profit, and reinvest the rest into mining operations. With the current block reward pegged at 6.25 BTC (around $237,000), miners have every incentive to follow the rules.</p>
<p>Bitcoin’s cryptoeconomic design further protects it from outside attacks. To control the Bitcoin consensus mechanism, malicious actors need to control more than 51 percent of the total computing power (hash rate) dedicated to the network. A successful 51 percent attack would allow malicious actors to reverse transactions, block new transactions, and potentially double-spend bitcoins.</p>
<p>However, the costly nature of mining means an attack on Bitcoin requires massive investments in electricity and hardware. An <a target="_blank" href="https://gobitcoin.io/tools/cost-51-attack/">estimate</a> suggests attackers would need to spend around $34 billion on hardware and $23 million on electricity every day.</p>
<p>Perhaps now we see why cryptoeconomics is crucial to Bitcoin’s security and functionality. Bitcoin wouldn’t exist as a decentralized, censorship-resistant, and secure payments network without Satoshi Nakamoto’s brilliant combination of cryptography and economic incentives.</p>
<h2 id="heading-the-value-of-cryptoeconomics">The Value of Cryptoeconomics</h2>
<p>Cryptoeconomics is useful in designing consensus protocols, which help nodes agree on the true state of the blockchain. Bitcoin’s proof-of-work is an excellent example, but other consensus algorithms like <a target="_blank" href="https://businesstechguides.co/proof-of-stake-benefits">proof-of-stake</a> apply a similar principle.</p>
<p>Let’s use <a target="_blank" href="https://businesstechguides.co/what-is-ethereum-2-0">Ethereum’s proof-of-stake system</a> as an example. To add new transactions, nodes (“validators”) must lock some tokens (ether) into a smart contract. This is similar to Bitcoin’s PoW system which requires miners to commit resources, however, validators are committing money, not electricity.</p>
<p>Ethereum’s PoS protocol is designed to select validators randomly based on the size and age of their stakes. If a validator acts dishonestly, the funds in the smart contract are automatically frozen. Dishonest validators also lose the transaction fees paid out on each valid block.</p>
<p>We can also apply cryptoeconomics to designing <a target="_blank" href="https://businesstechguides.co/decentralised-applications">secondary applications that run on the blockchain</a> (decentralized applications). The underlying blockchain protocol developers create tokens necessary for economic incentives and <a target="_blank" href="https://businesstechguides.co/smart-contracts-limitations">smart contracts</a> that power these applications.</p>
<p>An excellent example of an application powered by cryptoeconomics is Augur, a decentralized prediction market. Typically, users bet on certain outcomes and receive profits or gain losses depending on the outcome.</p>
<p>Augur relies on nodes (“reporters”) to feed it the information it uses to determine if a bet is successful or not—and this is where cryptoeconomics comes into the picture. Reporters stake tokens (REP) and earn rewards for reporting truthful outcomes. However, any attempt to report false information leads to a loss of staked tokens.</p>
<p>Decentralized Autonomous Organizations (DAOs) are another use-case for cryptoeconomics. In a DAO, a token allows the holder to contribute work and earn rewards for their participation. To earn greater rewards and increase participation, DAO members must buy more tokens, which is just another example of economic incentives in action.</p>
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>Cryptoeconomics is essential for creating self-sustaining, secure, and useful decentralized networks. By creating incentives, it’s possible to bring together unaffiliated individuals to participate in a peer-to-peer system without a central entity enforcing rules of behavior.</p>
<p>More importantly, the long-term sustainability of a blockchain or blockchain-based project is linked to cryptoeconomics. Without a well-designed system of rewards and penalties, participants have no incentives to keep the network functional and secure.</p>
<p>Cover photo by <a href="https://unsplash.com/@artrachen?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Art Rachen</a> on <a href="https://unsplash.com/s/photos/coin?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></p>
]]></content:encoded></item><item><title><![CDATA[Why Should Businesses Care About The Metaverse?]]></title><description><![CDATA[Beyond its appearance in Neal Stephenson’s Snow Crash, “metaverse” was a largely obscure term. Most people aware of the metaverse pre-2021 had either participated in virtual worlds like Second Life or played extended-reality online games like Roblox,...]]></description><link>https://eawosika.com/importance-of-metaverse-for-businesses</link><guid isPermaLink="true">https://eawosika.com/importance-of-metaverse-for-businesses</guid><category><![CDATA[Meta]]></category><category><![CDATA[Blockchain]]></category><category><![CDATA[Web3]]></category><category><![CDATA[crypto]]></category><category><![CDATA[NFT]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Mon, 14 Mar 2022 10:58:29 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1647253871276/r0Y0v-PtA.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Beyond its appearance in Neal Stephenson’s <em>Snow Crash</em>, “metaverse” was a largely obscure term. Most people aware of the metaverse pre-2021 had either participated in virtual worlds like Second Life or played extended-reality online games like Roblox, Minecraft, or Fortnite.</p>
<p>But then Facebook changed its name to “Meta” in late 2021, reflecting owner Mark Zuckerberg’s dream to “build the Metaverse.” Describing the metaverse as “a shared virtual world where [anyone] can socialize, work, play, and create,” Zuckerberg predicted it'd be the next iteration of the Internet, and committed Facebook’s (now Meta) future to creating it.</p>
<p>With one of the world’s biggest tech giants betting the farm on the metaverse, interest in the concept has skyrocketed. More importantly, businesses are looking for opportunities to tap into the metaverse and harness this technology for bigger profits.</p>
<p>In this article, we’ll explore the meaning of the metaverse and consider opportunities for businesses to leverage this new technology.</p>
<h2 id="heading-what-is-the-metaverse">What is the Metaverse?</h2>
<p>At its most basic, the metaverse is a collection of immersive, three-dimensional (3D) worlds that facilitate virtual interaction between individuals. In a metaverse, people can perform real-world activities—learning, creating, socializing, shopping—in cyberspace.</p>
<p>The metaverse runs on augmented reality (AR), virtual reality (VR), extended reality (XR), artificial intelligence, and spatial computing technologies. Individuals rely on devices, such as smartphones, laptops, IoT devices, and VR/AR products like Google’s Oculus VR headsets or Microsoft’s HoloLens to access the metaverse and interact with it.</p>
<p>Blockchain technology is also crucial to the metaverse. With <a target="_blank" href="https://businesstechguides.co/how-can-businesses-use-nfts">non-fungible tokens (NFTs)</a>, anyone can create unique digital assets, such as avatar skins and accessories, that can be used in a virtual universe. Cryptocurrencies power the metaverse economy and allow users to pay for products or access certain services.</p>
<p>Futurists imagine the metaverse as a giant virtual world, where websites become gateways to virtual spaces. However, what exists currently is the "proto-verse": a group of independent virtual worlds with worlds with different users, access mechanisms, and monetization systems.</p>
<p>Realizing the metaverse dream will transform the Internet into a massive, interoperable virtual realm. Users can seamlessly switch between digital worlds, using their assets on different platforms. For example, an avatar skin bought in Fortnite would be usable on Decentraland.</p>
<p><iframe width="768" height="432" src="https://www.youtube.com/embed/Uvufun6xer8"></iframe>
<em>Facebook announced its metaverse plans last year. Source: YouTube</em></p>
<h2 id="heading-is-the-metaverse-here">Is the Metaverse Here?</h2>
<p>Contrary to public expectation, the metaverse is far from becoming a full-fledged reality. Even Facebook has said it doesn’t expect the technology required to power the metaverse to arrive until the next 10-15 years.</p>
<p>However, we have some examples to show what a metaverse future may look like:</p>
<p><strong>Roblox</strong>: Roblox is a gaming platform that allows users to create and play across virtual worlds. Creators can monetize their games by selling in-game assets to users through Robux, the platform’s virtual currency. This virtual currency can be converted to real money on the Roblox Developer Exchange (DevEx).</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1647254516676/gu6nQNSQX.jpg" alt="Roblox game characters.jpg" />
<em>Virtual gaming platform Roblox has become a runaway hit. Source: Wired.com</em></p>
<p><strong>Fortnite</strong>: Fortnite started life as a free-to-play multiplayer shooting game, quickly gaining popularity for its realistic gameplay. But it’s slowly transforming into a bigger virtual world, with rapper Travis Scott holding a virtual concert on the platform in April 2020.</p>
<p><iframe width="768" height="432" src="https://www.youtube.com/embed/wYeFAlVC8qU"></iframe>
<em>Travis Scott’s “Astronomical” concert was held on Fortnite. Source: YouTube</em></p>
<p><strong>Facebook Horizon and Microsoft Mesh</strong>: Facebook released Horizons Works, a virtual workspace, to compete with Zoom and Microsoft Teams. Using headsets from Facebook-owned Oculus VR, employees can interact, collaborate, and brainstorm without needing to meet physically.</p>
<p>Microsoft launched a competing product, Mesh, signaling the company’s interest in metaverse technology. Like Facebook’s Horizons, Microsoft Mesh can create “digital twins” of physical workspaces, enabling virtual interactions between coworkers.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1647254562765/DWYYX5d8m.jpg" alt="Facebook Horizons Workrooms.jpg" />
<em>Facebook plans to reimagine remote work with Horizon Workrooms. Source: about.fb.com</em></p>
<p><strong>Decentraland and The Sandbox</strong>: Decentraland is a 3D virtual world where anyone can build digital structures, such as theme parks or art galleries, and charge visitors a fee. It runs on the Ethereum blockchain and allows users to buy digital assets as NFTs using its native token ($MANA).</p>
<p>The Sandbox is another gaming metaverse running on the Ethereum blockchain. Like Decentraland, Sandbox users can create and sell unique digital assets as NFTs. Purchases are made using the ecosystem’s native currency ($SAND).</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1647254592996/cnIPUQkX0.jpg" alt="Decentraland virtual world.jpg" />
<em>Players can visit virtual parks in Decentraland. Source: Euronews.com</em></p>
<p><strong>Second Life</strong>: Second Life is one of the oldest and most popular 3D virtual worlds. Launched by Linden Labs in 2003, Second Life lets individuals—represented by avatars—can carry out real-life activities in an immersive virtual world. Users can create, shop, socialize, and do much more in Second Life’s virtual spaces.</p>
<h2 id="heading-why-the-metaverse-matters-for-businesses">Why the Metaverse Matters for Businesses</h2>
<p>While the metaverse is still in its infancy, dismissing it would be economic suicide for any business. Beyond tech giants like Microsoft and Facebook, other large brands have been making forays into the metaverse. For instance, fashion heavyweight Gucci <a target="_blank" href="https://hypebeast.com/2021/5/roblox-gucci-garden-alessandro-michele-archetypes">launched a virtual gallery</a> recently, while JP Morgan recently <a target="_blank" href="https://amp.usatoday.com/amp/6803137001">opened a building in Decentraland</a>.</p>
<p>As an immersive virtual-reality world, the metaverse has a lot of business potential. Here are some benefits of the metaverse for business that every entrepreneur should consider:</p>
<h3 id="heading-profits-from-virtual-products"><strong>Profits from Virtual Products</strong></h3>
<p>The virtual economy is <em>booming</em>. Sales of digital assets on virtual platforms like Decentraland, Fortnite, Roblox, and the Sandbox run into millions of dollars—representing a viable business opportunity. Brands can create virtual lookalikes of real-life products to metaverse residents and unlock new streams of revenue.</p>
<p>The list of companies already selling things in the metaverse is long. Earlier this year, Ralph Lauren launched a collection of wearables and has <a target="_blank" href="https://www.cnbc.com/amp/2022/01/17/ralph-lauren-ceo-says-metaverse-is-way-to-tap-into-younger-shoppers.html">sold over 100,000 pieces</a> already. Other luxury fashion houses, such as <a target="_blank" href="https://www.freethink.com/technology/digital-fashion?amp=1">Gucci</a> and <a target="_blank" href="https://www.nytimes.com/2021/10/04/style/dolce-gabbana-nft.html">Dolce &amp; Gabbana</a>, have also started creating virtual clothing lines.</p>
<p>Even sports apparel makers are getting in on the game. American sportswear giant Nike acquired RTKFT, a company noted for creating virtual products and has <a target="_blank" href="https://www.techtimes.com/amp/articles/269547/20211218/nike-filed-trademark-applications-prepares-enter-metaverse.htm">filed patents</a> that’ll allow it to exclusively sell Nike-themed wearables, like Air Jordan sneakers, in the metaverse.</p>
<p>Smaller businesses can benefit from this trend, too. For example, a glasses manufacturer might offer buyers a pair as an NFT, while encouraging them to buy the real thing. As long as a product can be represented in virtual reality, there’s going to be a market for it.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1647254617891/8-NwfKVUQ.jpg" alt="Gucci virtual shoes.jpg" />
<em>Gucci “Virtual 25” shoes are created exclusively for AR worlds. Source: Deezen.com</em></p>
<h3 id="heading-richer-customer-experiences"><strong>Richer Customer Experiences</strong></h3>
<p>The introduction of eCommerce changed the way people shopped for products. However, customers are quickly outgrowing staid online shopping sites. They want an experiential buying experience where they can <em>feel</em>, <em>see</em>, and <em>touch</em> products before buying.</p>
<p>Companies can provide new ways for consumers to interact with products and services using augmented reality (AR) and virtual reality (VR) technologies. Instead of staring at static images, buyers can <em>use</em> products and see if they like the experience. If an individual feels good trying on virtual glasses, they’re more likely to buy the real product.</p>
<p>Some brands are already <a target="_blank" href="https://www.thestreet.com/crypto/defi/sothebys-launches-nft-marketplace-metaverse">launching virtual malls</a>, where anyone can come in and interact with branded items. Such innovations will greatly accelerate the buyer’s journey, reduce acquisition costs, and increase overall revenues.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1647254717060/4vLdHy7rj.jpg" alt="Virtual mall example.jpg" />
<em>Virtual malls may become the new shopping centers. Source: Datumcorp.com</em></p>
<h3 id="heading-global-reach"><strong>Global Reach</strong></h3>
<p>Just as the Internet broke down geographical boundaries, the metaverse will do the same—but better. An ideal metaverse is a place where <em>anyone</em> can enter and interact with a brand, regardless of their location. For brands, the metaverse facilitates the creation of universally accessible experiences for customers across the world.</p>
<p>Often, global companies will launch different campaigns in various countries to compensate for distance. However, the metaverse world would allow a brand to house its campaigns in one place, which users from different regions can access at any time. It’s global expansion for a fraction of the cost!</p>
<h3 id="heading-better-employee-engagement-and-collaboration"><strong>Better Employee Engagement and Collaboration</strong></h3>
<p>Facebook’s demo of Horizons Workspaces has shown how virtual worlds can transform modern-day workplaces. In a post-COVID era, where remote work is becoming a norm, the metaverse can greatly enhance collaboration between employees.</p>
<p>Instead of staring at a Zoom screen for hours, individuals can collaborate, brainstorm, and discuss in a shared, virtual workspace. The metaverse will create an interactive environment where everyone, irrespective of their location, can connect with each other and share ideas.</p>
<p>For businesses, the use of metaverse in business communications can make collaboration, training employees, and organizing meetings easier.</p>
<p><iframe width="768" height="432" src="https://www.youtube.com/embed/Jd2GK0qDtRg"></iframe>
<em>A demonstration of Microsoft’s VR workplace. Source: YouTube.com</em></p>
<h3 id="heading-improvements-in-product-development"><strong>Improvements in Product Development</strong></h3>
<p>Many products fail to attract meaningful use due to poor product-market fit. While this can be corrected through product testing, current methods are costly and require extensive effort.</p>
<p>The metaverse can solve this problem for companies and ease product testing through the use of "digital twins." According to IBM, a <a target="_blank" href="https://www.ibm.com/blogs/internet-of-things/iot-cheat-sheet-digital-twin/">digital twin</a> is a complex, hyper-realistic virtual representation of a physical object.</p>
<p>Thanks to improvements in VR and AR technology, it’s possible to simulate real-life experiences in the metaverse. This means companies can have individuals test products under development and give useful feedback.</p>
<p>Several high-profile people, including NVIDIA CEO Jensen Huang, have <a target="_blank" href="https://spectrum.ieee.org/jensen-huang-on-the-uber-tragedy-and-why-nvidia-suspended-testing">backed</a> the idea of VR-enabled product testing. And some companies, like Hyundai Motors, have made forays into the field already.</p>
<p>Using Roblox, the South Korean carmaker created <a target="_blank" href="https://www.hyundai.com/worldwide/en/company/newsroom/hyundai-motor-vitalizes-future-mobility-in-roblox-metaverse-space%252C-hyundai-mobility-adventure-0000016713">Hyundai Mobility Adventure</a>, a shared virtual space for people to try out its newest offerings. Visitors, represented by avatars, can test-drive new Hyundai models, robotic vehicles, and other transportation solutions.</p>
<p>Companies can also better understand how users interact with their products using VR-powered testing. By analyzing body language recordings obtained through VR simulations, businesses can gain deeper insights into customer behavior and apply the information to product development.</p>
<p>The wealth of data that can be obtained about consumers is <em>staggering</em>. For instance, a 2018 Stanford Review <a target="_blank" href="https://stanfordvr.com/pubs/2018/protecting-nonverbal-data-tracked-in-virtual-reality/">estimates</a> that VR headsets can collect over two million body language recordings within a 20-minute timeframe.</p>
<h3 id="heading-advertising-opportunities"><strong>Advertising Opportunities</strong></h3>
<p>Every technology brings with it novel techniques for getting products in front of customers. The Internet brought targeted advertising, while outdoor displays brought interactive billboards, drones, etc.</p>
<p>However, businesses need to avoid ruining the user experience with ads. As the public backlash against targeted advertising has shown, intrusive promotions can quickly sour consumer sentiment.</p>
<p>Instead, companies must invest in creating richer experiences and encourage users to participate. An excellent example of customer-centric marketing in the metaverse is Coca-Cola's Friendship Day campaign.</p>
<p>The beverage company <a target="_blank" href="https://www.coca-colacompany.com/news/coca-cola-nft-auction-fetches-more-than-575000">auctioned</a> a "Friendship Box" on OpenSea, which contained several NFTs. This included a themed bubble jacket that the owner could wear in Decentraland, a Friendship Card NFT featuring retro artwork, and a sound visualizer that played the sound of pouring a Coke. The winning bidder also received a real-life fridge stocked with Coca-Cola drinks.</p>
<p>Coca-Cola’s metaverse marketing is different from the in-your-face promotion that irritates consumers and affects marketing performance. As more companies enter the metaverse, those that invest in consumer-centric marketing will come out tops. </p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1647255121738/DUQdWjGjD.jpg" alt="coca-cola friendship box bubble jacket.jpg" />
<em>Coca-Cola's bubble jacket, auctioned as part of its NFT drop. Source: Forbes.com</em></p>
<h2 id="heading-how-can-businesses-enter-the-metaverse">How Can Businesses Enter the Metaverse?</h2>
<p>It’s still early to know if the metaverse will become the latest technology revolution. Nonetheless, entrepreneurs can future-proof their businesses by preparing for a future where the lines between physical and virtual reality are indistinguishable.</p>
<p>Businesses can start their metaverse journey by identifying target demographics and understanding their preferences. Given the flurry of corporate forays into the metaverse, it's possible to borrow ideas from other brands and create a unique experience for a brand's user base.</p>
<p>Finally, as with every investment, understanding the risks of buying into the metaverse is important. There's no telling if the metaverse will take off or not, so caution is advised.</p>
<p><em>Cover photo by <a target="_blank" href="https://unsplash.com/@julientromeur?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Julien Tromeur</a> on <a target="_blank" href="https://unsplash.com/s/photos/metaverse?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></em></p>
]]></content:encoded></item><item><title><![CDATA[CBDCs Are A Very Bad Idea]]></title><description><![CDATA[When Bitcoin launched in 2008 and Ethereum started the altcoin boom through its 2015 ICO, not many people gave this new "digital currencies" much attention. But subsequent increases in the popularity of cryptocurrencies have given everyone, including...]]></description><link>https://eawosika.com/the-risks-of-cbdcs</link><guid isPermaLink="true">https://eawosika.com/the-risks-of-cbdcs</guid><category><![CDATA[Cryptocurrency]]></category><category><![CDATA[crypto]]></category><category><![CDATA[Blockchain]]></category><category><![CDATA[Web3]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Thu, 10 Mar 2022 10:55:03 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1646908935062/f9eBUrZVV.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>When Bitcoin launched in 2008 and Ethereum started the altcoin boom through its 2015 ICO, not many people gave this new "digital currencies" much attention. But subsequent increases in the popularity of cryptocurrencies have given everyone, including governments, a pause.</p>
<p>Now, countries are planning to launch digital versions of their currencies, called central bank digital currencies (CBDCs). While the US is <a target="_blank" href="https://www.usatoday.com/story/money/2022/01/25/fed-digital-us-dollar/9202957002/">mulling a digital dollar</a>, countries like <a target="_blank" href="https://www.dw.com/en/china-heats-up-digital-currency-race-with-e-cny-debut-at-olympics/a-60701261">China</a> and <a target="_blank" href="https://www.coindesk.com/markets/2020/10/21/central-bank-of-bahamas-launches-landmark-sand-dollar-digital-currency/">the Bahamas</a> have piloted CBDCs already. Even less-developed nations have <a target="_blank" href="https://african.business/2021/10/finance-services/nigeria-gears-up-for-enaira/#:~:text=Nigeria%20has%20launched%20Africa's%20first,Buhari%2C%20on%20Monday%2025%20October.">gotten into the game</a>.</p>
<p>If these signs are anything to go by, then CBDCs are inevitable. We're slowly accelerating towards a cashless society, and CBDCs will be the new pillars of the economy.</p>
<p>However, just because something is popular doesn't mean it's necessarily good—and this applies to CBDCs. While many have talked up the benefits of government-backed digital currencies, they leave out crucial information about how these new currencies will work.</p>
<p>And, as they say, the devil is in the details.</p>
<p>This article explores the meaning and implications of CBDCs while touching on the reasons for their popularity. I’ll also consider some of the risks of replacing fiat money with centralized digital currencies.</p>
<h2 id="heading-what-are-cbdcs">What are CBDCs?</h2>
<p>A CBDC is a digital version of a country's currency that’s available for households and businesses to use for payments or storing value. CBDCs are created and issued by a country’s central bank, which is why they are called “Central Bank Digital Currencies.”</p>
<p>CBDCs are backed by the government and pegged to the value of the national currency. This makes a CBDC different from a cryptocurrency, which isn’t backed by any institution or asset. Since CBDCs have “legal tender” status, you can buy goods, pay for services, or settle your taxes with them—things you cannot do with crypto <em>yet</em>.</p>
<p>You can think of CBDCs as “stablecoins,” which are cryptocurrencies that derive value from a real-world asset like the dollar. Stablecoins like Tether (USDT) and Binance USD (BUSD) can be bought and redeemed like regular dollars and offer investors protection against crypto’s volatile price swings.</p>
<p>Like <a target="_blank" href="https://businesstechguides.co/series/cryptocurrency">cryptocurrencies</a>, CBDCs use Distributed Ledger Technology (DLT) to facilitate supply of money and transaction monitoring. Also, central banks may integrate permit payment services with the ledger to facilitate easier transactions.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646909008305/ib0ERXicA.png" alt="an overview of the cbdc system.png" />
<em>An overview of the CBDC ecosystem. Source: Suerf.org</em></p>
<h2 id="heading-why-are-cbdcs-getting-popular">Why are CBDCs Getting Popular?</h2>
<p>The shift towards a cashless society had been slowly happening, well before the COVID-19 pandemic. But, with lockdowns keeping people indoors, the demand for cashless, digital payments systems surged. And then <a target="_blank" href="https://www.theverge.com/2019/6/26/18716326/facebook-libra-cryptocurrency-blockchain-irs-starbucks">Libra happened</a>.</p>
<p>Before its demise, Libra was a cryptocurrency project floated by Mark Zuckerberg-owned Facebook. Unlike other cryptocurrency projects, Libra was the first visible effort by a private company to launch its own currency.</p>
<p>As expected, governments criticized the Libra project and pressured payments providers to withdraw support for Libra payments. While Libra eventually <a target="_blank" href="https://www.cnet.com/personal-finance/crypto/end-of-the-day-for-metas-diem-cryptocurrency-what-you-need-to-know/">died quietly</a>, it forced governments to see the threat of privately controlled currencies to state monopoly of financial systems.</p>
<p>Many world powers started taking the idea of virtual currencies seriously, and the Bahamas launched the world’s first CBDC (the Sand Dollar) in 2020. More countries have since followed suit, including China which <a target="_blank" href="https://blockworks.co/china-debuts-digital-yuan-at-winter-olympics-amid-warnings-from-us-senator/">introduced a “digital yuan”</a> at this year’s Winter Olympics.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646909021813/OmI8MhB1b.jpg" alt="facebook libra digital currency.jpg" />
<em>Facebook’s short-lived Libra project inspired CBDCs. Source: CNN.com</em></p>
<p>This timeline of events reveals the first and most important reason for the existence of CBDCs: increasing government control of money. There may be other reasons for using CBDCs, but that doesn’t change their status as tools of state monetary control.</p>
<p>Supporters of minting tokenized versions of state currencies claim they have other benefits.</p>
<p>For example, digital fiat-backed currencies can simplify payments for individuals and businesses. They’d also promote financial inclusion by allowing unbanked individuals to transact without enduring cumbersome registration processes.</p>
<p>CBDCs can ease the implementation of monetary policies—for example, destroying currency tokens in circulation would be enough to control inflation. Moreover, increased surveillance of money flows in an economy will prevent tax evasion, reduce corruption, and disrupt the funding of illicit activities, like drug trade or terrorism.</p>
<p>However, for all their benefits, CBDCs have many risks that are too serious to be ignored.</p>
<h2 id="heading-the-risks-of-using-cbdcs">The Risks of Using CBDCs</h2>
<p>Cryptocurrencies like Bitcoin (BTC) and Ether became popular because they are anonymous, censorship-resistant, secure, and decentralized. And no one can unilaterally determine the supply of bitcoin or ether, making them a hedge against inflation.</p>
<p>With CBDCs, the rules are different.</p>
<p>These “government-issued cryptocurrencies” belong to the government, and it can set rules for their circulation, use, and availability. Maybe you don’t realize it, but centralized control of digital currencies brings up many problems:</p>
<h3 id="heading-encroachments-on-privacy-rights"><strong>Encroachments on Privacy Rights</strong></h3>
<p>CBDCs will usher in unprecedented levels of spying on the privacy of citizens. Every purchase, every transfer, every payment can and will be logged in a government database for both benign (taxes) and non-benign (financial surveillance) reasons.</p>
<p>Governments will become Big Brother, tracking who is doing what with money in the country. If it wants, a government can easily block certain transactions it deems “illegal.” This could be anything from buying <em>legal</em> marijuana, paying a sex worker, or even remitting money to your family in blacklisted countries.</p>
<p>Cryptocurrencies provide the opportunity to transact directly with any party without anyone interfering. CBDCs threaten to turn this upside down and increase government oversight over monetary exchanges between individuals</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646909045530/bONtTAPkp.jpg" alt="cbdcs will increase surveillance.jpg" />
<em>CBDCs will give rise to “surveillance states.” Source: Expressvpn.com</em></p>
<h3 id="heading-single-points-of-failure"><strong>Single Points of Failure</strong></h3>
<p>Most cryptocurrencies run on public blockchains sustained by distributed networks of computers (nodes). The decentralized nature of a public blockchain network allows it to keep operating even if a few nodes malfunction or suffer attacks.</p>
<p>Hacking a cryptocurrency requires controlling every node running on the network—a difficult, cost-ineffective, and impractical task. That’s why cryptocurrencies like Bitcoin and Ether <a target="_blank" href="https://businesstechguides.co/how-does-blockchain-security-work">have remained secure</a> for <em>years</em>.</p>
<p>CBDCs will be fully centralized and hosted on <a target="_blank" href="https://businesstechguides.co/enterprise-blockchain">private or permissioned blockchains</a>. While these have better transaction speeds, they create single points of failure. Malicious actors only need to breach a few servers, and suddenly, they can control the entire country’s monetary supply.</p>
<p>Perhaps CBDC supporters have forgotten, but decentralization <em>is</em> the point of blockchain technology. A centralized digital currency exacerbates the very problems, like double-spending, which cryptocurrencies were designed to solve.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646909061801/_UoTdg_eh.png" alt="comparison of centralized and decentralized blockchains.png" />
<em>Distributed networks are more robust than centralized systems. Source: Merehead.com</em></p>
<h3 id="heading-increase-in-data-breaches"><strong>Increase in Data Breaches</strong></h3>
<p>To achieve full functionality, CBDCs will likely expand on existing digital payment systems, such as Google Pay, Venmo, and Apple Pay. These apps will integrate into central bank deposits, allowing users to spend and send e-money via apps, chats, and messages.</p>
<p>Big Tech companies will become the new banking institutions, powering transactions all over the world. It’ll also allow service providers to collect your data and store it in centralized databases for corporate use.</p>
<p>Of course, there are downsides to companies harvesting personal data. For instance, companies are often criticized for leaking, selling, and <a target="_blank" href="https://theconversation.com/the-ugly-truth-tech-companies-are-tracking-and-misusing-our-data-and-theres-little-we-can-do-127444">mismanaging user information</a>. Google is particularly notorious for <a target="_blank" href="https://www.tampabay.com/news/2021/05/07/google-selling-users-personal-data-despite-promise-federal-court-lawsuit-claims/">selling user data</a> to advertisers and fueling the ad targeting market.</p>
<p>This goes without saying, but centralized data storages are honeypots for malicious actors. Now, a hack on Google’s servers might probably lead to varying degrees of identity theft. In the future, hackers will steal your identity <em>and</em> your entire wallet balance.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646909074774/5dIrCT91y.jpg" alt="data breaches infographic.jpg" />
<em>Data centers are susceptible to malicious attacks. Source: Le-vpn.com</em></p>
<h3 id="heading-unstable-monetary-policies"><strong>Unstable Monetary Policies</strong></h3>
<p>A purported benefit of CBDCs is that they make it easier to introduce and enforce fiscal policies. Governments can easily mint new currency tokens to counter deflationary trends in the economy. Tax offices will also find it easier to track money flows and deduct taxes automatically.</p>
<p>While all that sounds good in theory, it has several implications for financial stability.</p>
<p>Since central banks control the supply of CBDCs, inflation is a real risk. Heads of central banks, drunk on the <a target="_blank" href="https://africa.businessinsider.com/news/what-is-modern-monetary-theory-understanding-the-alternative-economic-theory-thats/9er9wef">Modern Monetary Theory (MMT)</a> Kool-Aid, can simply press a button and inflate the circulating supply of digital currencies.</p>
<p>This will result in massive hyperinflation, where currencies become worthless and prices go through the roof. You think the <a target="_blank" href="https://www.investopedia.com/terms/h/hyperinflation.asp#:~:text=Hyperinflation%20is%20a%20term%20to,more%20than%2050%25%20per%20month.">runaway inflation</a> in Venezuela and Zimbabwe was bad? Wait till your central bank starts minting currencies at a whim.</p>
<p>If CBDCs allow governments to enforce positive fiscal policies, then they can be used to enforce negative policies as well. Implementing <a target="_blank" href="https://www.investopedia.com/articles/investing/070915/how-negative-interest-rates-work.asp">negative interest rates</a> on currency holders is certainly easier when you can program money however you like it. And that’s just one possibility; we don’t know other policies authorities will force citizens to accept through digital currencies.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646909094548/naSRoHwag.jpg" alt="dollar shrinking to represent inflation.jpg" />
<em>CBDCs may lose their value to inflation. Source: Newsismybusiness.com</em></p>
<h3 id="heading-financial-discrimination"><strong>Financial Discrimination</strong></h3>
<p>A CBDC dramatically increases government control of cash flows in the economy. This may lead to the “weaponization of money,” where the government coerces individuals and businesses by cutting off their money supply.</p>
<p>Currently, political officials have to rely on third parties, such as banks and payments providers, to enforce financial discrimination policies. An example is the Nigerian government <a target="_blank" href="https://www.hrw.org/news/2020/11/13/nigeria-punitive-financial-moves-against-protesters">forcing banks to block donations</a> to #EndSARS movements protesting police brutality.</p>
<p>With CBDCs, national governments can freeze monetary assets without leaning on banks. Criticized the ruling party or organized a protest? Too bad, ‘cause you’re about to get frozen out of the monetary system.</p>
<p>Already, countries like China have <a target="_blank" href="https://africa.businessinsider.com/politics/chinas-social-credit-system-ranks-citizens-and-punishes-them-with-throttled-internet/qbjgc4p">“social credit systems”</a> that determine your access to certain services, based on your political views, shopping habits, online activity, work history, and other attributes. Pairing social credit systems with CBDCs means governments can “punish” those who contravene its rules by stopping them from spending money.</p>
<p>If that sounds like a dystopian nightmare to you, then you’re starting to see the risks of CBDCs.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646909654306/mZiCCwCYL.jpg" alt="marijuana containers on shop shelf.jpg" />
<em>Government can block businesses from selling semi-legal goods like marijuana. Source: NBCNews.com</em></p>
<h3 id="heading-destabilization-of-financial-institutions"><strong>Destabilization of Financial Institutions</strong></h3>
<p>So far, I’ve focused mainly on the problems CBDCs pose to individuals and businesses. But CBDCs are also problematic for banks and other large financial institutions.</p>
<p>The likeliest iteration of a CBDC system is one where the country’s central bank issues digital currencies directly to consumers and secures their deposits. Central banks would replace private banks, destroying the entire commercial banking system.</p>
<p>Even a hybrid approach that puts central banks and commercial banks in control of CBDC supply will still cause problems. Citizens may feel safer keeping their funds with the central bank than private banks, leading to recurring <a target="_blank" href="https://www.investopedia.com/terms/b/bankrun.asp">bank runs</a>. What do you think will happen to the economy when every bank folds up?</p>
<h2 id="heading-what-does-the-future-hold">What Does the Future Hold?</h2>
<p>With around <a target="_blank" href="https://finance.yahoo.com/news/80-central-banks-exploring-cbdc-130000667.html#:~:text=About%2080%25%20of%20central%20banks%20are%20exploring%20use%20cases%20involving,blockchain%20infrastructure%20platform%20Bison%20Trails.">80% of central banks exploring CBDCs</a>, you can expect them to arrive sooner than you expect. And you’ll have no choice but to use them—how else are you going to pay for stuff in a cashless society?</p>
<p>The upside to introducing CBDCs is that the popularity of cryptocurrencies will increase. As people desire censorship-resistant money free of state control, the value of Bitcoin, Ether, and other cryptos will skyrocket.</p>
<p>Instead of killing crypto, CBDCs might just spark mass adoption of cryptocurrencies. To borrow Shakespeare’s famous expression: “All’s well that ends well.”</p>
<p><em>Cover Photo by <a target="_blank" href="https://unsplash.com/@adamnir?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Adam</a> on <a target="_blank" href="https://unsplash.com/s/photos/dollar?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></em></p>
]]></content:encoded></item><item><title><![CDATA[Social Media Networks Are Coming To The Blockchain]]></title><description><![CDATA[What would Twitter, Facebook, or LinkedIn look like if they were on the blockchain?
Maybe you haven't thought about it, but the concept of blockchain-based social networks has been gaining steam for a while now. And for good reason.
While modern soci...]]></description><link>https://eawosika.com/what-are-decentralized-social-networks</link><guid isPermaLink="true">https://eawosika.com/what-are-decentralized-social-networks</guid><category><![CDATA[Blockchain]]></category><category><![CDATA[social media]]></category><category><![CDATA[Web3]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Mon, 07 Mar 2022 15:48:43 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1646668033475/G62rc5JcU.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>What would Twitter, Facebook, or LinkedIn look like if they were on the blockchain?</p>
<p>Maybe you haven't thought about it, but the concept of blockchain-based social networks has been gaining steam for a while now. And for good reason.</p>
<p>While modern social networks have done a lot to enable human interaction, their infrastructure and operations leave much to be desired. Widespread censorship, arbitrary algorithm changes, privacy violations, intrusive ads, and undue exploitation of creators are some complaints leveled against legacy social networks.</p>
<p>Can blockchain technology correct the ills of centralized social networks? Well, many people think so. The idea is that blockchains can help create decentralized social media networks that are user-controlled, censorship-resistant, and private.</p>
<p>In this article, we look at decentralized social networks and their implications. We'll also consider challenges preventing We3 social media platforms from gaining mass adoption.</p>
<h2 id="heading-the-problem-with-legacy-social-networks">The Problem With Legacy Social Networks</h2>
<p>When social platforms like Facebook, YouTube, and Twitter launched, they opened up new opportunities for human interaction. People could communicate across borders, exchange information, build communities, and distribute content seamlessly.</p>
<p>The revolutionary nature of social networks is evident in their astounding growth figures. Large social networks have billions of users combined—Facebook (2.91 billion), Twitter (290.5 million), and YouTube (2 billion).</p>
<p>Modern social networks wield enormous power in society. For instance, <a target="_blank" href="https://www.forbes.com/sites/petersuciu/2021/06/24/americans-spent-more-than-1300-hours-on-social-media/">studies</a> show that people are spending significant portions of their lives online. As such, social networks can significantly influence our views and behaviors through the content they feed us.</p>
<p>With great power, they say, comes great responsibility. However, social media companies have opted to prioritize profits ahead of user experience, safety, and wellbeing.</p>
<p>They <a target="_blank" href="https://www.seattletimes.com/opinion/social-medias-algorithms-lead-us-down-dark-divisive-rabbit-holes/">implement algorithms that promote negative content</a> to provoke user activity. They <a target="_blank" href="https://blog.malwarebytes.com/privacy-2/2020/04/how-social-media-mine-data-sell-personal-information-for-profit/">harvest user data</a> and sell it to advertisers, who then populate our feeds with intrusive ads. They may even <a target="_blank" href="https://www.digitaltrends.com/social-media/facebook-reads-messenger-messages/">snoop on messages</a> transferred between individuals.</p>
<p>But that's not all.</p>
<p>Social media companies earn huge profits from user-generated content but hoard a large percentage of this money. Worse, content creators can be <a target="_blank" href="https://whatis.techtarget.com/definition/deplatform">de-platformed</a> without warning, leading individuals to lose their means of livelihood.</p>
<p>Moreover, vague content moderation policies and centralized control have made it pretty easy for social media companies to arbitrarily censor users. This is why major platforms like Twitter and Facebook have been criticized heavily for a perceived attack on free speech rights and suppression of opinion.</p>
<p>The centralized storage of user data by social media networks is another problem worth noting. In recent years, we’ve seen hackers breach some of the world’s biggest platforms, stealing enormous amounts of personal information. Not only does this increase the risk of identity theft, but it also makes for an unsafe online experience.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646667449673/2SluWKKKY.jpg" alt="biggest data breaches infographic.jpg" />
<em>Social networks have seen large data breaches in recent years. Source: Visualcapitalist.com</em> </p>
<h2 id="heading-what-are-decentralized-social-networks">What Are Decentralized Social Networks?</h2>
<p>Decentralized social networks are content creation and distribution platforms running on the blockchain. Many of these platforms attempt to correct the problems of Web2 social networks as highlighted in the previous section.</p>
<p>So, how might a Web3 social media application work? Thankfully, we have enough examples of blockchain-based social networks to show us how these platforms may change how we interact in the future.</p>
<p><a target="_blank" href="https://steem.com/">Steemit</a>, blockchain's answer to Medium, is a content curation platform that allows users to earn cryptocurrency based on the views their content gets. Readers can also tip content creators using the platform's native token ($STEEM).</p>
<p>A decentralized version of Twitter may make it impossible to delete or modify tweets. Once the information is live on the blockchain, no one—not even platform owners—can take it down.</p>
<p>This is how <a target="_blank" href="https://peepeth.com/welcome">Peepeth</a>, a Twitter-like service running on the Ethereum blockchain works. By design, posts (called "peeps") cannot be deleted or altered once published. Such solutions will likely reduce censorship and prevent the stifling of opinion rife on centralized social networks.</p>
<p>Web3 social networks may reward users for their time through watch-to-earn, learn-to-earn, play-to-earn, and other incentive programs. Some may even allow users to monetize their data and exchange it for crypto—as opposed to companies solely profiting from user data.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646667860647/V7zkHBrwJ.jpg" alt="social media decentralized alternatives.jpg" />
<em>Some decentralized alternatives to popular social media apps. Source: Twitter.com</em></p>
<h2 id="heading-why-blockchain-technology-is-perfect-for-social-media">Why Blockchain Technology is Perfect for Social Media</h2>
<p>There are many reasons people want a blockchain-based version of Twitter or LinkedIn. But what really makes the blockchain ideal for running social media applications?</p>
<p>Let's start with the basics. Blockchains are distributed across multiple computers in a peer-to-peer system that's difficult to shut down or hack. To take down a blockchain like Ethereum, you'd need to find a way to <a target="_blank" href="https://ethernodes.org/">control thousands of nodes</a> running the network.</p>
<p>With blockchain technology, we can build robust social applications that can run forever without interruptions. Dictators would be unable to censor public opinion by <a target="_blank" href="https://privacyhub.cyberghostvpn.com/privacyhub/countries-ban-social-media/">banning social media</a> applications. Neither would server crashes stop billions of people from interacting like <a target="_blank" href="https://www.theguardian.com/technology/2021/oct/05/facebook-outage-what-went-wrong-and-why-did-it-take-so-long-to-fix">Facebook's crash</a> did late last year.</p>
<p>We've already discussed the censorship-resistant nature of Web3 social media networks, but it bears mentioning again. Blockchain-based social networks are decentralized, meaning a small group of people cannot decide what can or cannot be said online.</p>
<p>Web3 social platforms would rely on <a target="_blank" href="https://www.forbes.com/sites/forbestechcouncil/2021/12/10/how-decentralized-identity-is-reshaping-privacy-for-digital-identities/?sh=5f2aa3043226">decentralized identity</a>, you wouldn't need to reveal sensitive information, like your email address or location, when creating a social media account. You'd only need to connect your digital wallet to prove your identity—and that's it.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646667471857/hJ-WXzQuB.jpeg" alt="decentralized authentication vs traditional authentication.jpeg" />
<em>Users won’t need to submit personal information for social media logins</em>. <em>Source: Coingeek.com</em></p>
<p>We could use blockchain-powered cryptography to encrypt messages, enabling secure and private peer-to-peer communication. No one would read messages between you and your buddies, so you'd feel safer sharing what you like in chats.</p>
<p>A discussion of the benefits of running social networks on the blockchain would be incomplete without discussing token economics. Many decentralized online social networks have native tokens, which members buy to unlock features, tip creators, or access certain services.</p>
<p>The token economy creates as much value for users as it does for platform owners. In some cases, especially when social networks operate as Decentralized Autonomous Organizations (DAOs), tokens give holders the power to vote on the direction of the project. This users-as-members system makes people more committed to the network and ensures its long-term survival.</p>
<p>Users can tokenize content and sell it to other members of the community. For example, <a target="_blank" href="https://mirror.xyz/">Mirror</a> is a Web3-native publisher that allows writers to mint their articles as <a target="_blank" href="https://businesstechguides.co/how-can-businesses-use-nfts">non-fungible tokens (NFTs)</a> and sell them.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646667492289/m8rkzK0xo.png" alt="nft article on mirror.png" />
<em>Mirror users can sell articles as NFTs. Source: Medium</em></p>
<p>Influencers and content creators could further maximize earnings by creating subscription-based content. Using built-in micropayment systems like <a target="_blank" href="https://businesstechguides.co/blockchain-is-eating-the-world-monthly-roundup-1">Lightning Network</a>, content creators would be able to create steady streams of income instead of relying on platform owners for earnings.</p>
<p>Because blockchain projects are (mostly) open-source, users can inspect the algorithms used to control our social media feeds. No longer will Big Tech implement secret algorithms built to exploit user attention or promote divisive and harmful content.</p>
<p>Decentralized social networks spread the hosting of user data across multiple nodes (computers) instead of storing them on a central server. This makes it harder for anyone to aggregate and sell your data, while protecting it from hackers.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646667746227/W1o5QKBlI.png" alt="benefits of blockchain for social media.png" />
<em>Benefits of decentralized media networks. Source: Disruptordaily.com</em></p>
<h2 id="heading-challenges-of-decentralized-social-networks">Challenges of Decentralized Social Networks</h2>
<p>Decentralized social networks get a lot of hype, but they are not without downsides. As we have seen, the very features that make blockchain technology ideal can also create problems.</p>
<p>Censorship-resistant social applications are good until people start to spread dangerous messages. It would be difficult, if not downright impossible, to moderate such harmful content and protect users.</p>
<p>While decentralized social media networks <a target="_blank" href="https://businesstechguides.co/how-does--security-work">promise security and failure-resistant operation</a>, low transaction speeds may harm user experience. Imagine having to wait 10-15 minutes for your tweet to go live on the blockchain. Or waiting for 20-30 minutes for your YouTube video to upload because the network is clogged.</p>
<p>The immutable nature of blockchains would erase the ability to control your online activity. Today, you can delete a tweet, edit a Reddit post, or trash old Facebook pictures that may harm your reputation.</p>
<p>In a decentralized social media landscape, your reputation <em>lives</em> on the blockchain. There's no deleting tweets or archiving old LinkedIn posts that you'd rather not have a future employer see.</p>
<p>Every information that's put on the blockchain is permanent, always there for everyone to check.</p>
<p>However, the biggest problem with decentralized social media networks has to do with the technology itself. To replace centralized client-server systems, blockchain networks need to solve several design issues.</p>
<p>On-chain data storage is one of those problems. Blockchains were primarily developed to run applications with minimal data requirements. For example, the only information stored on the Bitcoin blockchain, or even a DeFi platform, is data related to transactions and user balances—which is negligible at best.</p>
<p>Social media apps require larger data storage, given the amount of data users generate. Have you wondered why your Twitter or WhatsApp seems to take up more space the more you use it? It's because you're creating <em>more</em> data—creating posts, uploading images, streaming videos, etc.</p>
<p>To truly scale and accept more users, decentralized social networks would need innovative solutions to solve blockchain data storage issues. Potential solutions include storing data off-chain on decentralized servers like Arweave, InterPlanetary File System (IPFS), and Filecoin.</p>
<p>Another interesting solution is using blockchains, like <a target="_blank" href="https://www.deso.org/">Deso</a>, built specifically for social media applications. These blockchain networks typically have better on-chain storage, faster transaction speeds, and other features necessary for scaling social media applications.</p>
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>Decentralized social media networks are undoubtedly one of the most exciting applications of blockchain technology yet. Blockchain-powered social applications could create a safer, private, valuable, and better experience for users and fix the broken system we have currently.</p>
<p>However, there's still a long way to go before a decentralized Twitter becomes widely accepted. Issues, such as poor scalability, data privacy, and on-chain storage, must be addressed fully before Web3 social media becomes a reality. </p>
<p>Cover Photo by <a href="https://unsplash.com/@unarchive?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Jeremy Bezanger</a> on <a href="https://unsplash.com/s/photos/social-networks?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></p>
]]></content:encoded></item><item><title><![CDATA[The Truth About Bitcoin's Energy Usage]]></title><description><![CDATA[Bitcoin gets a bad rap for many reasons. It's a Ponzi scheme. It's a tool for money launderers. It's a volatile asset that's useless as a store of value. It has no intrinsic value, and people buying it are suffering from Tulipmania.
But the most endu...]]></description><link>https://eawosika.com/the-truth-about-bitcoin-energy-usage</link><guid isPermaLink="true">https://eawosika.com/the-truth-about-bitcoin-energy-usage</guid><category><![CDATA[Cryptocurrency]]></category><category><![CDATA[crypto]]></category><category><![CDATA[Blockchain]]></category><category><![CDATA[Bitcoin]]></category><category><![CDATA[Web3]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Thu, 03 Mar 2022 14:13:36 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1646315330308/mPa-SNiUH.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Bitcoin gets a bad rap for many reasons. It's a <a target="_blank" href="https://jacobinmag.com/2022/01/cryptocurrency-scam-blockchain-bitcoin-economy-decentralization">Ponzi scheme</a>. It's a tool for money launderers. It's a volatile asset that's useless as a store of value. It has no intrinsic value, and people buying it are <a target="_blank" href="https://www.crypto51.app/">suffering from Tulipmania</a>.</p>
<p>But the most enduring criticism of Bitcoin, and cryptocurrency in general, ties back to its energy consumption. Bitcoin is a transparent system, so it's easy to calculate how much power it consumes by checking the <a target="_blank" href="https://www.blockchain.com/charts/hash-rate">hash rate</a>, i.e., the amount of computing power required to sustain the network.</p>
<p>Armed with this data, anti-Bitcoiners extrapolate the cryptocurrency's current and future energy consumption, all of them arriving at the same conclusion:</p>
<p>Bitcoin will destroy the Earth's climate and roll back years of gains in sustainability.</p>
<p>There's no doubt Bitcoin's proof-of-work consensus mechanism uses considerable energy. I explained in a <a target="_blank" href="https://businesstechguides.co/proof-of-stake-benefits">recent article</a> why the crypto industry may benefit by shifting away from proof-of-work to more efficient consensus protocols.</p>
<p>However, the number of high-profile stories I've seen on the topic triggered a desire to do more research. I was curious to see how many claims concerning Bitcoin's energy consumption check out. </p>
<p>It turns out that the issue of Bitcoin's power usage is hardly black and white. More importantly, Bitcoin critics often allow biases to influence their opinions on the matter. </p>
<p>This article isn't an all-out defence of Bitcoin's energy consumption. Still, I believe it is important to examine the discussion from all angles, separate myth from fact, and encourage an honest appraisal from all parties involved.</p>
<h2 id="heading-how-does-bitcoin-work">How Does Bitcoin Work?</h2>
<p>To understand why Bitcoin uses up a ton of energy, we need to understand how the Bitcoin blockchain works and why it's useful. Those who skip this step are apt to describe Bitcoin as "dirty money" and consider miners as people who burn energy and pollute the environment to enrich their pockets.</p>
<p>The Bitcoin blockchain is a public record of transactions stored across a peer-to-peer network of computers. A common analogy for the Bitcoin blockchain is an accounting ledger.</p>
<p>The difference here is that a) thousands of computers (nodes) hold a copy of the ledger b) the ledger is append-only, so you cannot remove or alter transactions c) the majority of nodes in the network must approve a transaction before you can add it to the distributed ledger.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646315906151/9z7dadJyc.jpg" alt="how blockchain transactions work.jpg" />
<em>The cycle of a Bitcoin transaction. Source: Intellipaat.com</em></p>
<p>With our little Bitcoin 101 lesson out of the way, let's analyze how and why the Bitcoin network uses energy.</p>
<p>Except you live under a rock, "Bitcoin mining" is a term you're likely familiar with. Mining is the process of packaging new transactions and adding them to the blockchain.</p>
<p>Miners are a crucial part of the Bitcoin system, as they keep the system running. They are also responsible for securing the network by validating transactions and <a target="_blank" href="https://www.investopedia.com/terms/d/doublespending.asp#:~:text=Double%2Dspending%20occurs%20when%20someone,t%20adequately%20protected%20and%20secured.">preventing double-spending</a>.</p>
<p>By design, mining is a computing-intensive activity. Mining nodes must solve cryptographic puzzles for the right to add new transactions. Think of it as a lottery where you must "pay to play."</p>
<p>To increase their ability to solve these puzzles, miners invest in more powerful, energy-hungry computers. The investment makes sense, given that whoever wins the lottery gets to earn 6.25 BTC (around $250,000).</p>
<p>Bitcoin's energy usage, therefore, comes from the mining of new transaction blocks. Note this fact as it will come up later in this piece.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646313088821/M-nCilB1F.jpg" alt="bitcoin mining rig.jpg" />
<em>A Bitcoin mining operation in Russia. Source: Bloomberg.com</em></p>
<h2 id="heading-why-does-bitcoin-mining-consume-so-much-energy">Why Does Bitcoin Mining Consume So Much Energy?</h2>
<p>If you've come this far, then you may be asking, "why?" Why did Satoshi Nakamoto design Bitcoin to consume so much power? Was Nakamoto secretly hoping to singlehandedly trigger the climate Armageddon?</p>
<p>Here’s the thing: Bitcoin's computing-intensive nature is a feature, not a bug. By requiring miners to expend a valuable resource, Satoshi's PoW mechanism reduced the possibility of illicit behavior.</p>
<p>If a miner tried to add bad transactions to the Bitcoin blockchain, other nodes would reject it, meaning no block rewards. A dishonest miner would not only waste money spent on electricity but also lose out on those cool 6.25 BTC up for grabs.</p>
<p>Bitcoin is difficult, if not outrightly impossible, to hack because of its PoW structure. A would-be hacker needs to simultaneously <a target="_blank" href="https://businesstechguides.co/how-does-blockchain-security-work">control at least 51% of nodes</a>, which would require a massive amount of resources.</p>
<p>Put simply, hacking Bitcoin is expensive—which explains why it has remained secure for years, even with no central body controlling it.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646313116356/ld6PabvkT.JPG" alt="cost of 51 percent attack on Bitcoin.JPG" />
<em>Per-hour cost of a 51% attack on popular PoW blockchains. Source: crypto51.app</em></p>
<p>A much-talked benefit of Bitcoin is its status as a "decentralized means of exchanging value." Bitcoin is decentralized because it is free from centralized control; unlike the dollar or euro, no one controls the supply of bitcoins in the economy.</p>
<p>This quality makes Bitcoin a hedge against inflation since no one can say, "Hey, let's produce more bitcoins." However, many fail to realize how Satoshi's genius was instrumental in turning Bitcoin into the world's first widely accepted decentralized currency.</p>
<p>Imagine you're Satoshi Nakamoto, and you just created the first viable, non-state currency. You need a way to introduce new units of the currency into circulation. But you also need to ensure that tiny minority doesn’t hoard the lion's share of coins.</p>
<p>The solution? You create a mechanism where new coins are created only after individuals expend a valuable resource (electricity). As a result, those responsible for creating these new units, i.e., miners, cannot hoard bitcoins because they need money to cover electricity bills.</p>
<p>You also add a <a target="_blank" href="https://www.bitpanda.com/academy/en/lessons/what-does-mining-difficulty-mean/">feature</a> that adjusts the difficulty of creating new currency units according to the number of miners competing for the prize. This keeps supply stable and ensures your new "Internet money" retains a finite supply, much like real money.</p>
<p>In a nutshell, proof-of-work is the reason Bitcoin has value. Once you understand this fact, it becomes easier to see why Bitcoin is considered "digital gold."</p>
<p>Gold is valuable because of the difficulty associated with producing it. Gold needs to be extracted—a resource-intensive activity—before undergoing refining and eventual conversion into gold bars.</p>
<p>Miners cannot control all the gold since they have to cover the costs of extraction. And the resource-intensive nature of gold mining increases scarcity and inflates gold's value.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646313147382/0Vaf2TpBa.jpg" alt="photo of gold mining operation.jpg" />
<em>Gold derives value from the difficulty of mining it. Source: Financial Times</em></p>
<p>As we can see, Bitcoin's PoW consensus—and its power consumption—isn't as unnecessary as critics have us believe. This point is important because debates around Bitcoin's energy consumption mostly follow the same line of argument:</p>
<p><em>Bitcoin shouldn't be allowed to use electricity because it's useless “virtual money”.</em></p>
<p>Sure, people won't come out directly to say an asset with a billion-dollar market cap is "useless," but you can notice the bias by reading between the lines. For example, here's an excerpt from an article on Bitcoin's environmental impact from <a target="_blank" href="https://www.theguardian.com/technology/2018/jan/17/bitcoin-electricity-usage-huge-climate-cryptocurrency">The Guardian</a>:</p>
<p><em>“Burning huge amounts of electricity isn’t incidental to bitcoin: instead, it’s embedded into the innermost core of the currency, as the operation known as “mining”. In simplified terms, bitcoin mining is a competition to waste the most electricity possible by doing pointless arithmetic quintillions of times a second.”</em></p>
<p>Our friendly author here is obviously parroting the same "Bitcoin is useless, so let's stop mining" line. Such people have never taken the time to understand how the Bitcoin protocol works and why proof-of-work is an integral part of the system.</p>
<h2 id="heading-common-misconceptions-about-bitcoins-energy-consumption">Common Misconceptions About Bitcoin's Energy Consumption</h2>
<p>The Bitcoin community has gotten used to seeing common misconceptions about the crypto asset pushed by media pundits. However, some of these misconceptions—especially those related to Bitcoin's energy use—are baffling since some quick research would reveal the truth.</p>
<p>Let's look at some popular claims about Bitcoin and see if they hold up under rigorous examination:</p>
<h3 id="heading-myth-1-bitcoins-energy-usage-rises-with-transactions"><strong>Myth 1: Bitcoin's Energy Usage Rises With Transactions</strong></h3>
<p>Critics caution against the mass adoption of Bitcoin, saying that a rise in Bitcoin transactions would adversely <a target="_blank" href="https://www.vice.com/amp/en/article/ywbbpm/bitcoin-mining-electricity-consumption-ethereum-energy-climate-change">affect the environment</a>. The thinking is that energy consumption is tied to the validation of transactions on the Bitcoin blockchain.</p>
<p>If only people would take Bitcoin 101 before writing misleading articles!</p>
<p>Validating Bitcoin transactions is a simple task your cheap home PC can perform. Mining, which involves bundling transactions and broadcasting them on the blockchain, is what increases Bitcoin's energy requirements.</p>
<p>So, no, Bitcoin's energy usage won't skyrocket if it becomes a widely accepted currency in the future. Even if that were the case, the growth of <a target="_blank" href="https://businesstechguides.co/what-is-layer-2-blockchain">Layer 2 solutions</a> like Lightning Network capable of bundling thousands of transactions into one would solve the problem.</p>
<h3 id="heading-myth-2-bitcoin-will-remain-inefficient-forever"><strong>Myth 2: Bitcoin Will Remain Inefficient Forever</strong></h3>
<p>Environmental do-gooders like to rail against Bitcoin because they believe the cryptocurrency will continue to burn energy forever. Their reasoning is based on questionable research, including a <a target="_blank" href="https://escholarship.org/content/qt8vf573nb/qt8vf573nb.pdf">debunked study</a> that <a target="_blank" href="https://www.researchgate.net/publication/328581842_Bitcoin_emissions_alone_could_push_global_warming_above_2C">claimed</a> Bitcoin would cause the Earth's temperature to "rise by two degrees Celsius."</p>
<p>A closer look reveals a glaring flaw in this argument: these claims extrapolate Bitcoin's future energy usage from current consumption figures. Which is just poor reasoning if you asked me.</p>
<p>We've already established that mining accounts for most Bitcoin's energy usage. However, mining won't continue to consume copious amounts of energy forever.</p>
<p>Mining is lucrative currently because of the associated block rewards (6.25 BTC or $268,000 at the time of writing). Thus, miners are incentivized to buy powerful Graphical Processing Units (GPUs) and Application-Specific Information Computers (ASICs) to increase their chances of mining new blocks.</p>
<p>Bitcoin's proof-of-work mechanism is designed to reduce the block reward every 210,000 blocks (roughly four years). Known as "the Halving", this process explains why block rewards have dropped from 50 BTC to the current 6.25 BTC.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646313217830/6iQaoPLHa.png" alt="bitcoin halving chart.png" />
<em>Historical halvings of Bitcoin’s block reward. Source: <a target="_blank" href="https://twitter.com/chartsbtc?lang=en">@ChartsBTC</a></em></p>
<p>Per calculations, the next halving will occur in 2024, reducing block rewards to 3.125 BTC. Although it's hard to know the precise time, we can expect the block reward to eventually drop to 0.</p>
<p>Miners will continue to mine transaction blocks, but their earnings will come from transaction fees, not block rewards. The lucrativeness of Bitcoin mining will drop, meaning no one would bother investing in high-grade computing power for mining.</p>
<p>If miners reduce their power use in the future, then it follows that Bitcoin will become efficient. Anyone saying Bitcoin will become the sole trigger of the climate change crisis clearly doesn't have the facts right.</p>
<h3 id="heading-myth-3-bitcoin-mining-causes-environmental-pollution"><strong>Myth 3: Bitcoin Mining Causes Environmental Pollution</strong></h3>
<p>Several statistics concerning Bitcoin's perceived pollution base their calculations on the energy consumption of Bitcoin miners. Bitcoin uses so much energy, so it must be polluting the environment—right?</p>
<p>In reality, things aren't as straightforward.</p>
<p>For starters, high energy consumption doesn’t equal high pollution. You cannot simply estimate pollution figures without knowing the precise mix of energy sources used.</p>
<p>Here's an illustration:</p>
<p>Two companies, XAZ Corp. and XYZ Inc. use 15 terawatts and 10 terawatts of energy annually. While XAZ Corp. uses solar energy, XYZ Inc. uses fossil fuels (crude oil).</p>
<p>To the average individual, XYZ Inc. is more "energy-efficient" since it burns less energy. But the truth is XAZ Corp. has a lower carbon footprint since it uses a renewable and cleaner source of energy.</p>
<p>The same concept applies to Bitcoin mining. Until anyone can reliably confirm what kind of energy miners prefer, calling Bitcoin "dirty money" is a logical overreach.</p>
<p>Perhaps it's important to note that miners have historically favored regions with large supplies of renewable power.</p>
<p>China became the <a target="_blank" href="https://www.aljazeera.com/gallery/2018/1/17/inside-the-world-of-chinese-bitcoin-mining">world's mining capital</a> because several inland regions there had excess amounts of hydrothermal energy. Other mining hotspots, including <a target="_blank" href="https://www.theguardian.com/world/2018/feb/13/how-iceland-became-the-bitcoin-miners-paradise">Iceland</a> and <a target="_blank" href="https://techcrunch.com/2022/02/11/how-texas-is-becoming-a-bitcoin-mining-hub/">Texas</a> are popular among miners because they also offer access to cheap, eco-friendly power.</p>
<p>Because electricity accounts for 60-70% of mining costs, miners have to look for the cheapest sources of power. As such, it's safe to believe Bitcoin mining could single-handedly drive the renewable power industry.</p>
<p>Not so dirty now, is it?</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646313298863/8g2jLyzg_.jpg" alt="american-public-power-association-eIBTh5DXW9w-unsplash.jpg" />
<em>Bitcoin miners prefer cheap sources of energy, like wind power. Photo by <a target="_blank" href="https://unsplash.com/@publicpowerorg?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">American Public Power Association</a> on <a target="_blank" href="https://unsplash.com/s/photos/wind-farm?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></em></p>
<h3 id="heading-myth-4-bitcoin-mining-is-useless-and-wasteful"><strong>Myth 4: Bitcoin Mining Is Useless and Wasteful</strong></h3>
<p>There’s something we need to understand about the Bitcoin energy debate. Most arguments are less about Bitcoin's power use and more about whether using so much energy is justified.</p>
<p>After all, the fiat banking system consumes similar amounts of power—think of the energy used by ATMs, bank buildings, and other key players. Still, you don't see anyone calling the dollar "dirty money."</p>
<p>The first section of this article has explained how mining helps Bitcoin achieve the decentralization, security, and scarcity needed for a store of value. However, there are even more reasons why Bitcoin's resource intensiveness is an acceptable tradeoff.</p>
<p>Bitcoin miners are maintaining and securing a payments system processing billions of dollars annually—without any pulling strings in the background. Moreover, the Bitcoin blockchain is a final settlement layer, meaning transactions are fast, irreversible, and secure.</p>
<p>With Bitcoin, anyone can send and receive money from anywhere in the world, as long as they have an Internet connection. For the millions of unbanked individuals, Bitcoin is their only chance at sidestepping cumbersome regulations and <a target="_blank" href="https://www.nasdaq.com/articles/how-bitcoin-improves-financial-access-and-inclusion-2021-06-21">participating in the global monetary system</a>.</p>
<p>Bitcoin is revolutionary, and mining is a critical part of its infrastructure.</p>
<p>Some may point to more efficient consensus algorithms like proof-of-stake or proof-of-authority. However, these consensus mechanisms often trade-off decentralization and security for faster transactions.</p>
<p>No matter how you slice and dice it, Bitcoin's energy intensiveness is a necessary evil if we hope to create a secure, inclusive, and independent monetary system.</p>
<h2 id="heading-final-words">Final Words</h2>
<p>As we have seen, Bitcoin’s energy use has been exaggerated and inaccurately framed by individuals bent on discrediting its value. If the mainstream media’s anti-crypto propaganda machine continues to run, then you can expect more articles painting Bitcoin as the biggest threat to the Earth’s survival.</p>
<p>Bitcoin believers know that arguing about the cryptocurrency's energy use is missing the forest for the trees. Yes, Bitcoin may be resource-intensive—but the value it provides is more than enough justification for its energy consumption. </p>
]]></content:encoded></item><item><title><![CDATA[Blockchain Is Eating The World (Monthly Roundup #1)]]></title><description><![CDATA[In 2011, venture capitalist and a16z partner Marc Andreessen claimed software was “eating the world.”
Using Twitter and Apple as examples, Andreesen argued that software providers would displace legacy institutions and create new business models. Of ...]]></description><link>https://eawosika.com/blockchain-is-eating-the-world-monthly-roundup-1</link><guid isPermaLink="true">https://eawosika.com/blockchain-is-eating-the-world-monthly-roundup-1</guid><category><![CDATA[Blockchain]]></category><category><![CDATA[Cryptocurrency]]></category><category><![CDATA[crypto]]></category><category><![CDATA[Web3]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Mon, 28 Feb 2022 14:44:06 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1646055870721/JlW1s6nwd.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In 2011, venture capitalist and a16z partner Marc Andreessen <a target="_blank" href="https://future.a16z.com/software-is-eating-the-world/">claimed</a> software was “eating the world.”</p>
<p>Using Twitter and Apple as examples, Andreesen argued that software providers would displace legacy institutions and create new business models. Of course, he was right.</p>
<p>Today, blockchain is eating the world.</p>
<p>Across multiple industries, blockchain technology is disrupting age-long corporate structures and creating business models that are decentralized, secure, and efficient. Already, the number of <a target="_blank" href="https://businesstechguides.co/enterprise-blockchain">enterprises expected to adopt blockchain technology</a> is growing everyday.</p>
<p>Even with these facts, many outsiders still doubt the blockchain's transformational value.</p>
<p>That’s why I've decided to start a monthly roundup of the best blockchain-based projects. Perhaps by seeing the various applications of blockchain technology, we can start taking this industry seriously.</p>
<p>The series will highlight various real-world solutions using blockchain technology. As much as possible, these roundups will cover novel use-cases beyond the usual (NFTs, DeFi, cryptocurrencies, etc.).</p>
<p>Also, I plan to highlight products with utility (read: sensible products), so you probably won’t see a <a target="_blank" href="https://nsfw.app/">“blockchain meets OnlyFans” app</a> on the list.</p>
<p>Let's go!</p>
<h2 id="heading-statushttpsstatusim"><a target="_blank" href="https://status.im/">Status</a></h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646055989687/vEuXyNIpX.png" alt="Status messaging app and Web3 browser.png" />
Source: Status.im</p>
<p>Today’s social network users have to face centralization, censorship, loss of privacy, lax security, and many more ills. Many have since launched several blockchain-based social platforms to correct these problems and provide users with a better experience.</p>
<p>Social networks running on the blockchain promise greater decentralization, security, privacy, and censorship resistance. And that’s what makes Status truly unique.</p>
<p>Status is an all-in-one solution comprising a secure messaging app, cryptocurrency wallet, and Web3 browser.</p>
<p>Messages sent on Status’ private messenger use end-to-end encryption, meaning nobody can snoop on messages. The app’s peer-to-peer infrastructure further prevents centralization and protects users from censorship.</p>
<p>Anyone can join Status without giving up confidential information, like email addresses, phone numbers, or bank accounts. Users can also send money in chats via the integrated wallet, making payments faster and cheaper.</p>
<p>Status Wallet is a non-custodial option for safeguarding ERC-20 and ERC-721 tokens. Meanwhile, the native browser serves as a gateway to the decentralized Internet, allowing users to access decentralized applications (dApps), exchanges, games, and more.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646056115952/wrYpSwoN5.png" alt="Status messaging app and crypto wallet app interface.png" />
Source: Status.im</p>
<p>Status is free and open-source, although users must purchase the Status Network Token ($SNT) to run certain applications. SNT tokens incentivizes users to sustain the network and gives holders voting power on major network proposals.</p>
<h2 id="heading-pledgecamphttpspledgecampcom"><a target="_blank" href="https://pledgecamp.com/">Pledgecamp</a></h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646056165301/Evbgqnj5w.png" alt="Pledgecamp crowdfunding app logo.png" />
Source: Pledgecamp.com</p>
<p>Crowdfunding has been the rage ever since Kickstarter and Indiegogo launched, growing to a billion-dollar industry in recent years. Although crowdfunding has provided a way for people to back their favorite projects, there are problems with current crowdfunding models.</p>
<p>Perhaps the biggest of these problems is accountability. Crowdfunding platforms have little mechanisms for enforcing accountability, leaving project founders to act as they please. Often, there’s nothing backers can do if projects are <a target="_blank" href="https://money.cnn.com/2012/12/18/technology/innovation/kickstarter-ship-delay/index.html">delayed</a> or <a target="_blank" href="https://slidebean.com/story/biggest-kickstarter-fails">fail to ship products</a> as promised.</p>
<p>Pledgecamp solves this problem by applying blockchain technology to the crowdfunding process. The platform uses <a target="_blank" href="https://businesstechguides.co/smart-contracts-limitations">smart contracts</a> to control the allocation of funds to project creators. Instead of getting paid in full upfront, creators must satisfy project milestones before having more money released to them.</p>
<p>Pledgecamp allows project backers to track funds and monitor progress of their favorite projects. And if the project team fails to deliver? Funds locked in escrow are reallocated to donors, while the errant creators suffer sanctions.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646056257698/YPMWF-vnC.PNG" alt="Pledgecamp backer protection infographic.PNG" />
Source: Pledgecamp.com</p>
<p>Pledgecamp is a self-sustaining dApp ecosystem running on Ethereum, with its native token (Pledge Coin). Users support projects by buying Pledge Coin, but they can also earn PLG by offering services, like marketing, to project creators, or sharing valuable information via the Knowledge Center.</p>
<p>Beyond the security and transparency it offers, Pledgecamp makes crowdfunding more inclusive. Kickstarter is only available to project creators in just 25 countries and users must have a bank account. This cuts off many people from crowdfunding campaigns—namely, users living in unsupported countries and unbanked individuals.</p>
<p>Blockchain technology allows people to <a target="_blank" href="https://businesstechguides.co/web-3-0-for-businesses">transact seamlessly and securely across borders</a>. As a result, anyone can launch or fund a project from any corner of the world with Pledgecamp.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646056293504/UjaLZJhZ6.png" alt="Pledgecamp crowdfunding app benefits.png" />
Source: Pledgecamp.com</p>
<h2 id="heading-numbershttpswwwnumbersprotocolio"><a target="_blank" href="https://www.numbersprotocol.io/">Numbers</a></h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646056539516/Mw4eDOZne.PNG" alt="Numbers protocol application.PNG" />
Source: Numbersprotocol.io</p>
<p>A budding photographer takes a great picture and uploads it to Instagram. Within minutes, that image is floating around the Internet without anyone crediting them for their work.</p>
<p>Copyright infringement and piracy is a big concern for photographers, with <a target="_blank" href="https://pdnonline.com/photography-business/copyright-law/how-many-photos-are-stolen-every-day/">statistics</a> claiming up to 2.5 billion unlicensed images are stolen daily. While stock photography (Shutterstock, iStockPhoto) has reduced unlawful use of images, problems still persist.</p>
<p>Numbers is a decentralized photo network seeking to give creators more control over their work, while restoring faith in digital media. It has been <a target="_blank" href="https://techcrunch.com/2021/01/12/numbers-protocols-blockchain-camera-capture-app-safeguards-the-integrity-of-photos/">featured on TechCrunch</a> and counts Binance and Protocol Labs as investors.</p>
<p>Numbers prevents image theft by securing images with blockchain technology. Details such as who owns the image and when and where it was taken are  encoded into the certification seal and stored on the blockchain.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646056605132/zEVS3uwq1.png" alt="Numbers protocol application.png" />
Source: Numbersprotocol.io</p>
<p>The Numbers product ecosystem also includes the Capture app, a “blockchain camera” that automatically generates on-chain metadata for images. Users can turn these great photos into non-fungible tokens (NFTs) and sell them on Capture Club, a marketplace for photo NFTs.</p>
<p>For creators, Numbers is the perfect solution for securing ownership of images and protecting intellectual property (IP) rights. Users also benefit since they can verify the history and authenticity of images, potentially reducing image fakery and photo manipulation.</p>
<p>Numbers has a native ERC-20 token ($NUM) which users buy to use the various services. For example, users can register copyrights as well as buy, gift, and sell NFTs using their $NUM tokens.</p>
<h3 id="heading-blockcertshttpswwwblockcertsorg"><a target="_blank" href="https://www.blockcerts.org/">Blockcerts</a></h3>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646056719004/FwXjuy_-V.png" alt="Blockcerts application.png" />
Source: Blockcerts.org</p>
<p>Blockcerts is an open standard for creating, issuing, and verifying digital certificates on the blockchain. Blockcerts ("blockchain certificates) can be used to issue academic degrees, certificates, recognition of accomplishments, and many more.</p>
<p>If you applied for a job today and submitted your certificate, employers would need to check its veracity by contacting the school. And that itself is a long, problematic process.</p>
<p>With Blockcerts, users truly own their records and can share them with anyone, including potential employers. Employers can verify the validity of Blockcerts for free using the <a target="_blank" href="https://www.blockcerts.org/">Universal Verifier</a>.</p>
<p>Blockcerts is simple to use. To illustrate, let's imagine a university (Hogwarts) needs issue a Blockcert to Bob:</p>
<p>Hogwarts University invites Bob to receive a blockchain credential. Bob sends his blockchain address.  Then Hogwarts University hashes the credential on the blockchain.</p>
<p>Bob gets a blockchain credential from Hogwarts University, which he shares with a prospective employer. The employer enters Bob's certificate URL into the Universal Verifier and gets confirmation of the credential's authenticity similar to the image below:</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646058071522/Fff4E3_UF.PNG" alt="Blockcerts certificate example.PNG" />
Source: <a target="_blank" href="https://blockcerts.learningmachine.com/certificate/5c447c71572d518e9dad57c4e91f9929">Hylandcredentials.com</a> </p>
<p>Thanks to the <a target="_blank" href="https://businesstechguides.co/how-does-blockchain-security-work">blockchain's immutability</a>, Blockcerts cannot be altered—lest they become invalid. Plus, the Universal Verifier can show important details about the credential such as:</p>
<ul>
<li>The date of issuance (transaction date)</li>
<li>The issuing institution</li>
<li>The issuer's public key</li>
<li>The transaction ID</li>
<li>Certificate validity</li>
</ul>
<p>Blockcerts also offers users a wallet to store and share their credentials. Blockcerts are verifiable for a lifetime, so users can still own records even if the institution isn't around anymore. </p>
<p>Here is a <a target="_blank" href="https://www.hylandcredentials.com/new-about-3/examples/">list of demo Blockcerts credentials</a> you can verify to see how it works. </p>
<h2 id="heading-lightning-pizzahttpslnpizza"><a target="_blank" href="https://ln.pizza/">Lightning Pizza</a></h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646056750701/yZWWgIVW6.PNG" alt="Lightning Pizza application.PNG" />
Source: LN.Pizza</p>
<p>On May 22 2010, Laszlo Hanyecz <a target="_blank" href="https://www.independent.co.uk/life-style/gadgets-and-tech/bitcoin-pizza-sell-crypto-jeremy-sturdivant-b1854212.html?amp">bought</a> two Papa John’s pizzas for 10,000 BTC in what is considered the first real-world transaction involving Bitcoin. With Bitcoin trading over $39,000 now, Laszlo’s stash (worth $41 at the time) would sell for $390 million now.</p>
<p>The event is entrenched in cryptocurrency lore, inspiring <a target="_blank" href="https://academy.bit2me.com/en/what-is-bitcoin-pizza-day/#:~:text=Since%20then%20every%20May%2022,for%2010%2C000%20BTC%20in%202010.">Bitcoin Pizza Day</a>, and an app for ordering pizza using—yes, you guessed it—Bitcoin. The Lightning Pizza app allows U.S. residents order Domino’s pizza from any location and pay with BTC.</p>
<p>You’re probably asking, “what is world-changing about a pizza delivery app?” While Lightning Pizza may seem trivial, the <a target="_blank" href="https://lightning.network/">Lightning Network</a> on which it operates is anything but.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646056797798/HShE8-DSn.jpg" alt="Lightning Network logo.jpg" />
Source: Coinscreed.com</p>
<p>Lightning Network is a <a target="_blank" href="https://businesstechguides.co/what-is-layer-2-blockchain">Layer 2 scaling solution</a> built on top of the Bitcoin Network. Lightning allows users to conduct transactions off the main Bitcoin blockchain, making cryptocurrency payments faster and cheaper.</p>
<p>Say you need to buy coffee at Joe’s shop downtown with Bitcoin. Some would describe Bitcoin payments as impractical, given the high transaction costs and long confirmation times.</p>
<p>However, Lightning ensures your payment to Joe doesn’t go through the main Bitcoin blockchain. Instead, the money moves through a peer-to-peer, off-chain channel which you create at the start of the transaction.</p>
<p>Here's an illustration of a Lightning payments channel works:</p>
<p>At the start of the transaction with Joe, you create a two-way payment channel and deposit some bitcoins. This channel uses multisignature technology, meaning funds deposited cannot be moved without two keys signing the transaction.</p>
<p>Think of the channel as a smart contract since it prevents one party from unilaterally moving funds. Every time you buy coffee from Joe’s Shop, both of you sign off on a transaction paying the business.</p>
<p>Once the initial deposit is exhausted, both parties can close the channel and have the final transaction recorded on the Bitcoin blockchain. Only the last transaction is recorded, meaning you can conduct multiple Bitcoin transactions without heavy transaction fees.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646058543749/1FdlYblwa.png" alt="Lightning Network explained infographic.png" />
Source: Dignited.com </p>
<p>Lightning Network channels can process millions of micropayments per second and may revolutionize online payments. Here’s a chart comparing the Lightning Network to other payment solutions:</p>
<p>Micropayments have many uses, especially for small businesses, as Lightning Pizza shows. But we can also apply the technology to online businesses.</p>
<p>Specifically, digital content creators can use micropayment channels to accept small payments (tips, subscription fees) from fans. A good example is <a target="_blank" href="https://tippin.me/">Tipping.me</a>, a Lightning-based browser extension which anyone can use to tip their favorite content creators on Twitter.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1646056987157/YhSLdNU_8.png" alt="Lightning network vs Bitcoin vs Visa.png" />
Source: Bitcoin Magazine</p>
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>Blockchain technology continues to evolve, with more use-cases appearing. These new solutions promise many benefits—for businesses and consumers—and show that blockchain technology is beyond cryptocurrencies and NFTs. </p>
<p>Got any blockchain project(s) you want to see reviewed? Drop your thoughts in the comment section or reach out to me with your suggestions!</p>
<p><em>Cover image courtesy of <a target="_blank" href="https://www.venafi.com/blog/how-do-certificate-chains-work">Venafi.com</a></em></p>
]]></content:encoded></item><item><title><![CDATA[Is Bitcoin A Legal Investment?]]></title><description><![CDATA[The year is 2008, and a pseudonymous individual named Satoshi Nakamoto has just created the world's first cryptocurrency, Bitcoin. He calls it "an electronic, peer-to-peer cash system" designed to allow people exchange value freely without relying on...]]></description><link>https://eawosika.com/is-bitcoin-legal-investment</link><guid isPermaLink="true">https://eawosika.com/is-bitcoin-legal-investment</guid><category><![CDATA[Bitcoin]]></category><category><![CDATA[Cryptocurrency]]></category><category><![CDATA[crypto]]></category><category><![CDATA[Blockchain]]></category><category><![CDATA[Web3]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Thu, 24 Feb 2022 07:34:56 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1645688032201/6RJ82cENQ.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The year is 2008, and a pseudonymous individual named Satoshi Nakamoto has just <a target="_blank" href="https://bitcoin.org/bitcoin.pdf">created</a> the world's first cryptocurrency, Bitcoin. He calls it "an electronic, peer-to-peer cash system" designed to allow people exchange value freely without relying on middlemen.</p>
<p>Except for crypto-punks, computer geeks, and random Joes, not many people give this new magic Internet money any attention. That is, until <a target="_blank" href="https://www.investopedia.com/articles/forex/121815/bitcoins-price-history.asp">the value of Bitcoin skyrockets</a>, so much that random Joes become millionaires overnight.</p>
<p>Now, it's 2022. Everyone is getting on the crypto bandwagon, and you don't want to miss out. Yes, you missed crypto's initial bull runs—but don't the Chinese say the best time to plant a tree was 20 years ago, and the second best time is now?</p>
<p>However, Bitcoin’s classification is unclear, so you’re unsure if investing in Bitcoin is legal or not.</p>
<p>Are Bitcoin investments legal? What are the legal risks of investing in Bitcoin? What is the current regulatory framework around cryptocurrencies, including Bitcoin?</p>
<p>This article answers these questions and details what you should know before putting your cash in Bitcoin investments.</p>
<h2 id="heading-analysis-of-bitcoin-investment-regulations-around-the-world">Analysis of Bitcoin Investment Regulations Around The World</h2>
<p>Given its nature as a decentralized digital asset, Bitcoin's legal status was always going to cause major debate. Thirteen years after Bitcoin's arrival, governments and regulators haven't reached a consensus on its classification.</p>
<p>However, as more people continue to buy Bitcoin, governments worldwide are starting to take notice, leading to increased regulation. This next section covers the legal status of Bitcoin in several countries:</p>
<h3 id="heading-usa">USA</h3>
<p>Ownership of cryptocurrencies like Bitcoin in the US is growing, with <a target="_blank" href="https://triple-a.io/crypto-ownership/">statistics</a> putting American crypto users at 27 million—one of the highest in the world. According to a <a target="_blank" href="https://www.pewresearch.org/fact-tank/2021/11/11/16-of-americans-say-they-have-ever-invested-in-traded-or-used-cryptocurrency/">recent study</a> from Pew Research Center, 16% of Americans say they have invested, traded or used crypto is 16%, up from 1% as found in a <a target="_blank" href="https://www.pewresearch.org/internet/2016/12/19/new-modes-of-payment-and-the-cashless-economy/">2015 study</a>.</p>
<p>Bitcoin investments are not illegal in the USA, although the regulatory framework is hardly streamlined. Legalese on Bitcoin's status varies among financial regulators in the US, so let's look at some of them.</p>
<p>In 2014, the Internal Revenue Service (IRS) released a <a target="_blank" href="https://www.irs.gov/pub/irs-drop/n-14-21.pdf">notice</a> announcing the classification of Bitcoin as a property. As a result, investors  must pay capital gains tax on profits realized from transactions involving Bitcoin. The upside here is that your tax bill will reduce if you sold Bitcoin at a loss.</p>
<p>The IRS has increased regulatory oversight over Bitcoin investments in recent years. For example, it <a target="_blank" href="https://fortune.com/2020/09/28/the-irs-is-adding-a-cryptocurrency-question-to-form-1040-for-2020/">announced</a> in 2020 that individuals would need to disclose Bitcoin-related transactions on Form 1040.</p>
<p>You won't have to pay taxes if you simply buy Bitcoin with fiat and hold it in your wallet. This is known as HODLing in crypto-speak and means leaving your coins to rise in value.</p>
<p>The IRS is only interested in <em>transactions</em> involving your Bitcoin. So if you exchanged crypto for dollars, traded it on an exchange, or paid for goods with Bitcoin, then you need to disclose such activity on your tax form.</p>
<p>The Commodities and Futures Trading Commission (CFTC) classifies Bitcoin as a "commodity," just like gold or crude oil. The CFTC's position on Bitcoin is <a target="_blank" href="https://www.cftc.gov/sites/default/files/idc/groups/public/documents/file/labcftc_primercurrencies100417.pdf">contained in a 2017 report</a>, where the Commission limits its oversight activities to futures, options, and derivatives involving Bitcoin.</p>
<p>Although CFTC has <a target="_blank" href="https://www.cftc.gov/LearnAndProtect/AdvisoriesAndArticles/watch_out_for_digital_fraud.html">warned</a> against the risks of investing in cryptocurrencies, it is open to supporting innovation in the sector. The Commission has since <a target="_blank" href="https://www.cftc.gov/PressRoom/PressReleases/8196-20">said</a> it would promote "responsible innovation in digital assets," while cracking down on "those who break the rules."</p>
<p>True to its word, the CFTC <a target="_blank" href="https://www.cftc.gov/PressRoom/PressReleases/8412-21">went after BitMex exchange</a> for failing to register its cryptocurrency derivatives trading platform. The result was a court order asking BitMex to pay $100 million in fines.</p>
<p>The BitMex saga is a lesson for any would-be Bitcoin investors in the US. Before you start trading Bitcoin options, futures, and derivatives has CFTC approval to avoid legal exposure.</p>
<p>The Securities and Exchange Commission (SEC) shares the same sentiments with the IRS about Bitcoin, classifying the digital asset as a property. Former SEC Chair Jay Clayton <a target="_blank" href="https://www.investopedia.com/news/sec-chair-says-bitcoin-not-security/#:~:text=SEC%20Chair%20Jay%20Clayton%20has,are%20replacements%20for%20sovereign%20currencies%E2%80%A6&amp;text=Bitcoin%2C%20which%20has%20never%20sought,the%20SEC%20to%20classify%20securities.">went on record in 2018</a>, saying "Bitcoin is not a security and should not be taxed as such."</p>
<p>However, it is important to note that the SEC <a target="_blank" href="https://www.sec.gov/news/public-statement/statement-clayton-2017-12-11">considers</a> other cryptocurrencies distributed through an Initial Coin Offering (ICO) as securities. This means you'll have to pay security tax on <a target="_blank" href="https://businesstechguides.co/what-is-ethereum-2-0">Ethereum</a>, Ripple, Stellar, Cardano, Polkadot, and other altcoins.</p>
<p>The Financial Industry Regulatory Authority (FINRA) doesn't regulate the investment of Bitcoin and other investments. However, it <a target="_blank" href="https://www.finraarbitrationattorney.com/does-finra-cover-bitcoin-cryptocurrencies/#:~:text=In%20this%20respect%2C%20FINRA%20does,investors%20invest%20safely%20in%20cryptocurrency.">regulates</a> the activities of brokers handling Bitcoin investments on behalf of investors.</p>
<p>Understanding FINRA's role in Bitcoin investments is crucial for potential investors, especially those who wish to invest using sophisticated financial instruments. Because the agency supervises cryptocurrency brokers, you can file a complaint if you lose money due to your broker's actions or inactions.</p>
<p>FINRA cannot help if your crypto broker isn't adequately registered. It is up to you to confirm if the broker or brokerage firm handling your Bitcoin investments has a FINRA licence.</p>
<h3 id="heading-united-kingdom">United Kingdom</h3>
<p>As with the United States, the United Kingdom has never said buying Bitcoin is illegal. However, UK citizens are liable to <a target="_blank" href="https://www.gov.uk/hmrc-internal-manuals/cryptoassets-manual/crypto20050">pay tax on Bitcoin holdings</a>—this may be income tax or capital gains tax.</p>
<p>The tax you pay depends on what transactions you make with cryptocurrencies. Those considered to be making an income are subject to income tax laws, while anyone making capital gains pay capital gains tax.</p>
<p>For example, you must pay tax when you 'dispose' of Bitcoin, like you would do for any capital asset. This means you are liable to pay capital gains tax when you sell, trade, spend, or gift Bitcoin.</p>
<p>Her Majesty's Revenue and Customs (HMRC) will charge an income tax if you're getting returns from your Bitcoin investment. So, if you're earning dividends from staking, lending, or <a target="_blank" href="https://www.coindesk.com/learn/what-is-yield-farming-the-rocket-fuel-of-defi-explained/">yield farming</a>, an income tax payment is in order.</p>
<p>UK investors who wish to invest in Bitcoin trading derivatives like their US counterparts are, unfortunately, out of luck. This is because of a <a target="_blank" href="https://www.fca.org.uk/news/press-releases/fca-bans-sale-crypto-derivatives-retail-consumers">Financial Conduct Authority (FCA) ban on the sale of cryptocurrency derivatives</a> to retail investors issued last year.</p>
<p>Citing the complex nature of cryptocurrency derivatives as reason for the ban, the FCA said it was "protecting investors" with the law. However, commentators are <a target="_blank" href="https://cointelegraph.com/news/uk-s-fca-crypto-derivatives-ban-may-push-retail-investors-to-riskier-grounds">concerned</a> the ban will push investors to consider riskier, unregulated alternatives.</p>
<p>Another note for UK Bitcoin investors: check if an exchange has FCA approval before trading on it. The agency has a <a target="_blank" href="https://register.fca.org.uk/s/search?predefined=U">list of unregistered exchanges</a> and <a target="_blank" href="https://www.fca.org.uk/news/news-stories/consumer-warning-binance-markets-limited-and-binance-group">placed restrictions on Binance</a> last year for failing to register properly.</p>
<p>The FCA has <a target="_blank" href="https://www.fca.org.uk/news/news-stories/fca-warns-consumers-risks-investments-advertising-high-returns-based-cryptoassets">said in the past</a> that cryptocurrency investors  are unlikely to have access to redress mechanisms if anything happens with their investment. Consider this carefully before you "buy the dip" and load up on Bitcoin.</p>
<h3 id="heading-india">India</h3>
<p>India has been in a dance of sorts with Bitcoin for a long time. The Reserve Bank of India (RBI) banned the sale, investment, and trading of Bitcoin and other cryptocurrencies in 2018. In a widely circulated announcement, the country's apex banker warned financial institutions against facilitating crypto-related transactions.</p>
<p>Things took a new turn after the Supreme Court of India <a target="_blank" href="https://www.hindustantimes.com/india-news/supreme-court-ends-rbi-s-ban-on-banks-dealing-in-cryptocurrency/story-Q99whSgHNG01oGOX7FyTxN_amp.html">overturned the ban</a> in 2020, allowing Indians to buy, sell, and hold Bitcoin. However, the RBI hasn't stopped its drive to regulate Bitcoin investments and has drafted a new set of rules to guide the sector.</p>
<p>For instance, it recently announced a 30% income tax on all crypto holdings. Interestingly, the apex bank <a target="_blank" href="https://cointelegraph.com/news/crypto-tax-doesn-t-legalize-trading-says-indian-tax-department-chief/amp">said</a> the tax doesn’t mean Bitcoin trading is legal in India.</p>
<p>Key people in the RBI have shown <a target="_blank" href="https://www.hindustantimes.com/business/bitcoin-ethereum-or-nft-will-never-become-legal-tender-finance-secretary-101643802047075-amp.html">marked opposition</a> to Bitcoin and other cryptoassets. This includes the RBI Deputy Director, T. Rabi Sankar, who <a target="_blank" href="https://techcrunch.com/2022/02/15/india-central-bank-cryptocurrency-ponzi-banning/">called cryptocurrencies "a Ponzi scheme"</a> earlier this year and called for a total ban.</p>
<p>As of now, there's no law saying Bitcoin investments are illegal in India. Still, it's better to exercise caution when investing—especially if the RBI continues its dogged opposition to cryptocurrencies. While another outright ban is unlikely, consider withdrawing your money if signs point to another asset freezing attempt.</p>
<h3 id="heading-europe">Europe</h3>
<p>Much like other regions, the European Union has found it difficult to reach consensus on the nature of Bitcoin investments. The most notable EU legislation on Bitcoin is a 2015 ruling from the European Court of Justice (ECJ) exempting the purchase of cryptocurrencies from Value Added Tax (VAT).</p>
<p>Beyond the ECJ ruling, countries in the EU have different laws regulating investments in Bitcoin and cryptoassets.</p>
<p>In France, <a target="_blank" href="https://news.bloombergtax.com/daily-tax-report-international/france-wont-tax-crypto-to-crypto-trades-but-will-hit-gains-cashed-out">cryptocurrency gains are taxed</a> only when converted to fiat money, i.e., "cashing out". This means you don't have to pay taxes on gains from trading Bitcoin for other cryptocurrencies.</p>
<p>In Austria, anyone holding Bitcoin as a non-business asset is required to <a target="_blank" href="http://publications.ruchelaw.com/news/2017-12/guidance-taxation-bitcoin-cryptocurrency.pdf">pay gains tax</a> on profits realized during the one-year "speculative period." Bitcoin investors can avoid paying taxes if they hold their assets for more than a year.</p>
<p>The <a target="_blank" href="https://www.winheller.com/en/banking-finance-and-insurance-law/bitcoin-trading/bitcoin-and-tax.html">same law applies in Germany</a>, where capital gains on cryptocurrency are tax-free after a holding period of at least one year.</p>
<p>Things are a bit different in Malta. Here, the government recognizes Bitcoin as "a unit of account, medium of exchange, or a store of value" and <a target="_blank" href="https://news.bitcoin.com/eight-countries-that-dont-tax-your-bitcoin-gains/#:~:text=Malta,at%20the%20rate%20of%2035%25.">exempts long-term holders from capital gains tax or VAT</a>.</p>
<p>Maltese residents must pay taxes on day-to-day cryptocurrency trading, though. Regulators consider crypto trades similar to day trading in stocks, which makes such transactions taxable as business income.</p>
<h3 id="heading-africa">Africa</h3>
<p>Africa has one of the highest rates of cryptocurrency users in the world, with <a target="_blank" href="https://www.reuters.com/business/crypto-trading-thrives-nigeria-despite-official-disapproval-2021-10-12/">countries like Nigeria</a> boasting some of the fastest-growing cryptocurrency trading communities in the world. Despite this, regulation has been unclear in many areas.</p>
<p>South Africa is one of the few African countries with <a target="_blank" href="https://www.nichemarket.co.za/blog/money-talks/tax-cryptocurrency-south-africa">clear policy on cryptocurrency-related investments</a>. While Bitcoin isn't considered legal tender in the country, the South African Revenue Service (SARS) treats Bitcoin as an intangible asset and taxes profits realized on acquiring or selling units of Bitcoin.</p>
<p>Nigeria, Africa's most populous country and the world's largest Bitcoin market after the US, <a target="_blank" href="https://www.cbn.gov.ng/Out/2021/CCD/Volume%203%20Number%202%20CBN%20Update%20February%202021.pdf">restricted banks from processing crypto-related transactions</a> and warned against dealing with financial institutions involved in cryptocurrencies.</p>
<p>However, the move has done little to stop citizens, many of whom have <a target="_blank" href="https://www.coindesk.com/policy/2021/02/09/bitcoin-cant-be-stopped-nigerians-look-to-p2p-exchanges-after-crypto-ban/?outputType=amp">turned to peer-to-peer exchanges</a> to buy, sell, and trade Bitcoins and other altcoins.</p>
<h3 id="heading-asia">Asia</h3>
<p>Like India, many of Asia's biggest nations have taken a tough stance on <a target="_blank" href="https://businesstechguides.co/proof-of-stake-benefits">cryptocurrencies</a>, including Bitcoin.</p>
<p>China <a target="_blank" href="https://www.cnbc.com/amp/2021/07/06/china-cracks-down-on-crypto-related-services-in-ongoing-war-on-bitcoin.html">cracked down on crypto</a> last year, banning Bitcoin mining and the trading of digital assets in all its regions. Russia has since copied China's example, <a target="_blank" href="https://www.reuters.com/business/finance/russian-cbank-proposes-banning-cryptocurrencies-crypto-mining-2022-01-20/">proposing to ban cryptocurrency mining and trading</a> in the country.</p>
<p>Ironically, both China and Russia are among <a target="_blank" href="https://www.pymnts.com/cbdc/2022/the-evolving-cbdc-and-crypto-regulatory-landscape-in-china-russia-and-the-us/amp/">countries working on Central Bank Digital Currencies (CBDCs)</a>. CBDCs are government-issued cryptocurrencies, backed by a central bank.</p>
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>As we have seen, investing in Bitcoin is not illegal in most countries. However, investors must understand current regulations to avoid breaking the law, especially concerning paying taxes.</p>
<p>It goes without saying, but don't invest in Bitcoin money you cannot afford to lose. Bitcoin is a volatile asset that rarely promises consistent returns, so be careful to research well before investing.</p>
]]></content:encoded></item><item><title><![CDATA[Why Does Everyone Hate Web3?]]></title><description><![CDATA[Web3 gets a lot of criticism. And I mean a lot.
There's even a movement dedicated to curating the hardest-hitting criticisms of Web3 on the Internet.
With all the flak Web3 gets online and offline, you have to wonder:
Why does everyone hate Web3?
Und...]]></description><link>https://eawosika.com/why-does-everyone-hate-web3</link><guid isPermaLink="true">https://eawosika.com/why-does-everyone-hate-web3</guid><category><![CDATA[Web3]]></category><category><![CDATA[Blockchain]]></category><category><![CDATA[Cryptocurrency]]></category><category><![CDATA[NFT]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Mon, 21 Feb 2022 07:21:23 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1645427112695/bgCJrWjXu.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Web3 gets a lot of criticism. And I mean <em>a lot</em>.</p>
<p>There's even a <a target="_blank" href="https://yesterweb.org/no-to-web3/index.html">movement</a> dedicated to curating the hardest-hitting criticisms of Web3 on the Internet.</p>
<p>With all the flak Web3 gets online and offline, you have to wonder:</p>
<p>Why does everyone hate Web3?</p>
<h2 id="heading-understanding-web3-criticism">Understanding Web3 Criticism</h2>
<p>Web3 is the <a target="_blank" href="https://businesstechguides.co/web-3-0-for-businesses">vision of a decentralized Internet</a>, where control users—not Silicon Valley behemoths—control their data. The concept <a target="_blank" href="http://gavwood.com/dappsweb3.html">originated in a 2014 paper</a> by Ethereum co-founder, Gavin Woods, and has come to signify a user-owned Internet that allows everyone to communicate and exchange value without relying on trusted intermediaries.</p>
<p>The Web3 technology stack includes <a target="_blank" href="https://businesstechguides.co/decentralised-applications">decentralized applications (dApps)</a>, <a target="_blank" href="https://businesstechguides.co/how-does-blockchain-security-work">blockchains</a>, cryptocurrencies, and smart contracts.</p>
<p>If Web3 is so revolutionary, why does it trigger vitriolic criticism from some of the biggest names in technology?</p>
<p>The simple truth is Web3 is the kind of lightning-rod topic that's bound to draw reactions—whether from bullish supporters and fiery critics. As a result, everyone is trying to ride the coattails of Web3 criticism to Internet superstardom.</p>
<p>"Everyone" here includes <a target="_blank" href="https://www.nytimes.com/2022/02/10/opinion/nft-crypto-bitcoin-blockchain.html">The New York Times</a>, Signal co-founder <a target="_blank" href="https://moxie.org/2022/01/07/web3-first-impressions.html">Moxie Marlinspike</a>, socialist publication <a target="_blank" href="https://jacobinmag.com/2022/01/crypto-blockchain-daos-decentralized-power-capitalism">Jacobin Magazine</a>, and leading tech publications like <a target="_blank" href="https://techcrunch.com/2021/12/14/the-irrational-exuberance-of-web3/amp/">TechCrunch</a> and <a target="_blank" href="https://www.vox.com/platform/amp/recode/22907072/web3-crypto-nft-bitcoin-metaverse">Vox</a>.</p>
<p>Of course, there's more <a target="_blank" href="https://www.digfingroup.com/web3/">here</a>, <a target="_blank" href="https://www.stephendiehl.com/blog/web3-bullshit.html">here</a>, <a target="_blank" href="https://ez.substack.com/p/nobody-cares-about-decentralization?utm_source=url">here</a>, and <a target="_blank" href="https://blog.mollywhite.net/blockchains-are-not-what-they-say/">here</a>.</p>
<p>Critics not only target Web3, but also attack the building blocks of the technology. Which means you'll find the Financial Times <a target="_blank" href="https://www.ft.com/content/83a14261-598d-4601-87fc-5dde528b33d0">calling crypto a Ponzi scam</a>, CNET <a target="_blank" href="https://www.cnet.com/news/nfts-dont-make-sense-but-that-wont-stop-them/">saying NFTs don't make sense</a>, or The Verge <a target="_blank" href="https://www.theverge.com/2018/3/7/17091766/blockchain-bitcoin-ethereum-cryptocurrency-meaning">describing blockchains as "meaningless</a>".</p>
<p>I could dig for more links, but you get the idea—Web3 is gaining steam, and many people don't like it.</p>
<p>Now, some of these people have good reasons for criticizing Web3. The technology is relatively new, with many kinks to work out, yet evangelists describe it as the greatest technological revolution since the arrival of the Internet.</p>
<p>I'd be mad, too. In fact, I recently <a target="_blank" href="https://businesstechguides.co/smart-contracts-limitations">criticized smart contracts</a> in a recent article, highlighting their design flaws and limited real-world applications.</p>
<p>But here's the thing:</p>
<p>Technology <em>always</em> evolves, so I expect the introduction of <em>smarter</em> smart contracts, <a target="_blank" href="https://businesstechguides.co/nervos-network-is-uniquely-positioned-to-accelerate-blockchain-scalability">scalable blockchains</a>, and <a target="_blank" href="https://businesstechguides.co/proof-of-stake-benefits">environmentally sustainable cryptocurrencies</a>. That's why I remain bullish on Web3 and its ability to remake the Internet into a better place for all.</p>
<p>However, some people are dead-set against the technology and believe it offers no solutions or creates new problems. These people are the focus of the article.</p>
<p>After going through a long list of anti-Web3 material online, I have a good idea of the various profiles of Web3 haters. This next section discusses the different types of people who hate Web3 and their reasons for criticizing the technology.</p>
<p>Let's dig in, shall we?</p>
<h2 id="heading-the-hard-nosed-journalist">The Hard-Nosed Journalist</h2>
<p>I'll start with our good friend here—the hard-nosed journalist. Trained to be straight as a ruler and report news without fear or favor, the hard-nosed journalist takes no prisoners on the job.</p>
<p>You can expect the hard-nosed journalist to ask the tough questions, criticize anything and everything, and provide independent, against-the-grain commentary on societal issues.</p>
<p>All of that is good. In fact, I wager the world would be worse off without journalists. We'd probably never know about Watergate, Guantanamo Bay, the CIA’s involvement in the drug trade, or Big Tech's desire to monopolize the Internet if journalists hadn’t risked their lives to find out the truth.</p>
<p>However, it's become the unspoken rule in journalism that bad news gets more coverage than good news. Good news may inspire people, but it's the bad news that drives clicks and keeps the lights on.</p>
<p>People <a target="_blank" href="https://www.psypost.org/2020/03/negative-news-evokes-stronger-psychophysiological-reactions-than-positive-news-56180?amp=1">love bad news</a>, and the media ruthlessly <a target="_blank" href="https://thehill.com/opinion/technology/587261-media-love-bad-news-you-dont-have-to?amp">exploits this negativity bias</a> to attract more eyeballs. That explains why so many stories and op-eds in mainstream media concerning Web3-related concepts like cryptocurrency and blockchain technology are intensely negative.</p>
<p>It makes economic sense to give readers negative news about a sector if that's what they want.</p>
<p>Take for example this story from The Guardian about <a target="_blank" href="https://amp.theguardian.com/technology/2021/dec/28/how-australias-far-right-uses-cryptocurrencies-to-monetise-hate-online">right-wing extremists raising funds with crypto</a>. Or this one from Wired about <a target="_blank" href="https://www.wired.com/story/russian-hackers-bitcoin/amp">Russian hackers using Bitcoin</a> to fund operations.</p>
<p>There's nothing wrong about journalists seeking to highlight the dark side of Web3. Given the rate of criminal activity—ICO fraud, hacks, exit scams, Ponzi schemes, money laundering, et al—that happens in the industry, we need people to call out bad actors.</p>
<p>But when an entire industry consistently gets negative coverage, we need to question the fairness and balance of journalists.</p>
<p>It gets worse when journalists try to undermine the entire Web3 industry on the basis of some malicious actors. They literally act like criminals aren't <a target="_blank" href="https://www.wired.com/insights/2014/02/changing-technology-affects-security/">early adopters of new technology</a>. Whether it's <a target="_blank" href="https://www.creditplus.co.uk/blog/perfect-crime-history-getaway-car-6993817/">cars</a>, <a target="_blank" href="https://www.washingtonpost.com/archive/politics/1988/07/11/message-is-out-on-beepers/58840caa-523e-413b-9224-60ad94d7803f/">pagers</a>, or <a target="_blank" href="https://www.occrp.org/en/investigations/402-cell-phones-ideal-for-crime">cell phones</a>, criminals are always one of the first groups to recognize the potential of new innovations.</p>
<p>I suspect journalists know the danger of biased reporting, but the need to attract readers overrules the desire to comply with journalist ethics.</p>
<p>So, next time you see an anti-Web3 article from one of 'em hard-nosed journalists, my advice is to take it with a pinch of salt (I prefer ice-cream). <a target="_blank" href="https://www.coindesk.com/markets/2016/01/27/dont-listen-to-the-mainstream-media-on-bitcoin-or-blockchain/?outputType=amp">Do not listen to the media on blockchain or Bitcoin or anything remotely related to Web3</a>.</p>
<h2 id="heading-the-contrarian">The Contrarian</h2>
<p>The Cambridge Dictionary defines a contrarian as "someone such as a writer or politician who likes to disagree with other people and express opinions that are unpopular."</p>
<p>Put simply, a contrarian is someone who likes going against prevalent thinking. This doesn't mean the contrarian's take on issues is particularly correct. If anything, public rejection of the contrarian's ideas is proof that those ideas lack merit.</p>
<p>But contrarians don't need to be correct about anything. So long as they can produce unpopular opinions, their share of public attention is guaranteed. Again, people love the negative stuff—and contrarians give them loads of it.</p>
<p>Contrarians are always against popular things or ideas. The contrarian is the type of person who said the Internet was overhyped in 2000, predicted the death of hybrid cars, and dismissed the idea of exploring Mars.</p>
<p>Web3 has been riding the hype curve since last year, so I can understand the intense reactions the topic triggers in contrarians.</p>
<p>There's no shortage of contrarians trying to <a target="_blank" href="https://www.merriam-webster.com/words-at-play/break-the-internet">break the Internet</a> by criticizing Web3 in articles and blog posts. Some of it, like <a target="_blank" href="https://moxie.org/2022/01/07/web3-first-impressions.html">this one</a> from Moxie Marlinspike, try to address real issues in Web3 <em>constructively</em>.</p>
<p>The rest are simply ego-boosting, click-baity articles poorly disguised as informed commentary. Once an article starts with something like <a target="_blank" href="https://www.stephendiehl.com/blog/web3-bullshit.html">"Web3 Is Bullshit"</a> or <a target="_blank" href="https://ez.substack.com/p/nobody-cares-about-decentralization">"Nobody Cares About Decentralization,"</a> you can bet the author is desperately trying to be contrarian.</p>
<p>I have no problems with contrarians. After all, our capitalist thrives because people can contribute to a diverse marketplace of ideas.</p>
<p>That doesn't mean I regard them highly, either.</p>
<p>People seem to forget how easy it is to criticize. As Dale Carnegie said: "Any fool can criticize, complain, and condemn—and most fools do." It's much harder to fix things and build products that offer consumers a better experience, something many in Web3 are trying to do.</p>
<p>No one would care about Web3 if the current Internet was oh-so-good. Are there problems with Web3? Yes. But there are people—smart people, I must add—working to solve these problems.</p>
<p>Contrarians offer no value beyond showing us what the problems are. It’s an intellectually lazy act that’s no different from idealistic teenagers scrawling “Society is fucked” on crappy t-shirts.</p>
<h2 id="heading-the-doomsday-prophet">The Doomsday Prophet</h2>
<p>Merriam-Webster defines doomsday prophets as "people who predict that bad things will happen." What it fails to add is that some doomsday prophets are people <em>paid</em> to predict bad things will happen.</p>
<p>Doomsday prophets, or pessimists, have always exploited negativity bias to their advantage. People like Nobel Laureate Paul Krugman built an entire career on <a target="_blank" href="https://news.yahoo.com/paul-krugman-always-wrong-never-173530058.html">issuing alarming predictions that never materialized</a>.</p>
<p>Now, the same doomsday prophets have turned their attention to cryptocurrencies, blockchains, and everything related to Web3.</p>
<p>Guess who's leading the pack? <a target="_blank" href="https://www.investopedia.com/news/what-paul-krugmans-problem-bitcoin/">Paul Krugman</a>. The same man who said "the Internet would fizzle out" in 2005, and <a target="_blank" href="https://www.snopes.com/fact-check/paul-krugman-internets-effect-economy/">predicted</a> that "the Internet's effect on the economy would be no greater than fax machines."</p>
<p>The doomsday prophet is the kind of person who says <a target="_blank" href="https://www.sciencedaily.com/releases/2018/10/181029130951.htm">Bitcoin will cause the Earth's temperature to rise by two degrees celsius</a> based on calculations done with questionable data. Thankfully, we still have rational people who can <a target="_blank" href="https://escholarship.org/uc/item/8vf573nb">debunk these wild theories</a> and show that, yes, things are not all doom-and-gloom.</p>
<p>Doomsday prophets <a target="_blank" href="https://www.wired.com/2011/11/mf-bitcoin/amp">predicted</a> "the fall of Bitcoin'' in 2011 and <a target="_blank" href="https://amp.ft.com/content/b4be7d8e-9c73-11e2-9a4b-00144feabdc0">declared</a> Bitcoin ''a bubble ready to pop'' in 2013. In 2022, yet another prophet of doom <a target="_blank" href="https://www.pcmag.com/opinions/web3-will-fail-because-you-cant-solve-politics-with-technology">says Web3 will fail</a> because "you can't solve politics with technology."</p>
<p>You'd think doomsday prophets would have learned a thing or two about predictions, but what do you know?</p>
<p>As the popularity of Web3 increases, you can expect <a target="_blank" href="https://www.theguardian.com/technology/2021/oct/13/bitcoin-could-trigger-financial-meltdown-warns-bank-of-england-deputy">more</a>, <a target="_blank" href="https://news.law.fordham.edu/jcfl/2021/03/26/taming-the-crypto-bear-why-cryptocurrencies-will-cause-the-next-recession-and-how-to-soften-the-blow/">more</a>, <a target="_blank" href="https://theweek.com/articles/983641/cryptocurrency-cause-next-financial-crisis">more</a>, and <a target="_blank" href="https://www.theatlantic.com/technology/archive/2022/02/future-internet-blockchain-investment-banking/621480/">more</a> doomsday predictions about crypto, blockchains, <a target="_blank" href="https://businesstechguides.co/how-can-businesses-use-nfts">NFTs</a>, and Web3 to circulate online. But no one is fooled about the motive behind these predictions: to gain attention and drive buzz.</p>
<h2 id="heading-the-luddite">The Luddite</h2>
<p>According to the Oxford Dictionary, a Luddite is "someone who dislikes new technology." The Luddite is a different flavor of Web3 critic, one who hates the tech because he is a) resistant to new technology b) unwilling to learn anything.</p>
<p>Compared to their 19th century counterparts, modern-day Luddites are found in the highest echelons of society. A person could be the CEO of a hedge fund and be a Luddite without anyone knowing.</p>
<p>However, you can smell a Luddite by their marked criticism of new technology. These are the people who ask generic questions like, "What problems does this technology solve?" even if the topic has been discussed repeatedly.</p>
<p>Of course, a week or two of research should solve this problem. But, alas,  the Luddite's hatred of new technology is too deeply ingrained for him to consider the possibility that this technology <em>might</em> have some benefits.</p>
<p>Luddites are resistant to technology for many reasons. But the most enduring is the threat new technology poses to their jobs, and by extension, their lives.</p>
<p>The original Luddites <a target="_blank" href="https://www.encyclopedia.com/history/encyclopedias-almanacs-transcripts-and-maps/luddites-destroy-woolen-machines">destroyed machinery</a> during the Industrial Revolution to protect their manual jobs. Modern-day Luddites want to destroy Web3 because it threatens to overturn the broken economic structure that enriches them.</p>
<p>You can see it in the way legacy institutions routinely <a target="_blank" href="https://www.verdict.co.uk/indian-central-bank-deputy-chief-says-cryptocurrency-is-worse-than-ponzi-schemes/">describe cryptocurrencies as Ponzi schemes</a>, <a target="_blank" href="https://www.bis.org/publ/qtrpdf/r_qt2112b.htm">dismiss decentralized finance (DeFi)</a>, or <a target="_blank" href="https://www.forbes.com/sites/jasonbloomberg/2017/05/31/eight-reasons-to-be-skeptical-about-blockchain/?sh=2ea25c3f5eb1">deride blockchain technology</a>.</p>
<p>I totally get it. If something like AI writing software threatened my job, downplaying its importance would be my Life Mission.</p>
<p>However, acting this way is rarely ideal. A better strategy would be to look into strategies for adapting to new technological trends and positioning for future survival.</p>
<p>In a capitalist society, change is inevitable; new ideas always replace old ideas. Television killed cinemas, news websites killed newspapers, and iPods killed mp3 players. On and on it goes.</p>
<p>This process of <a target="_blank" href="https://www.investopedia.com/terms/c/creativedestruction.asp">"creative destruction"</a> is what fuels innovation in the 21st century and moves society forward. Legacy institutions trying to protect their businesses by spreading FUD (Fear, Uncertainty, and Doubt) concerning Web3 is like trying to stop a moving train instead of getting on it. </p>
<p>Some blue-chip companies like JP Morgan have <a target="_blank" href="https://fortune.com/longform/jpmorgan-chase-tech-blockchain/amp/">made a U-turn on blockchain technology</a>, crypto, and the wider Web3 revolution. Still, you can expect more Wall Street types to resist Web3 and throw everything they have at it.</p>
<p>The catch? Web3 isn't going anywhere soon. And like those Luddites of yore, modern-day Luddites will have no choice to adapt or lose out.</p>
<h2 id="heading-the-soapbox-speaker">The Soapbox Speaker</h2>
<p>Throughout the 19th and 20th centuries, public speakers would stand on soapboxes (discarded crates) at street corners and attempt to garner support for a specific cause. Some of history's greatest thought leaders and revolutionaries got their start in soapboxing.</p>
<p>Soapboxing has carried over into the 21st century, but the mechanics have changed. For example, Donald Trump proved the power of rallying supporters around particular issues by riding the waves of American anti-immigrant phobia and white nationalism to the White House.</p>
<p>From failing politicians to environmental do-gooders, there's no shortage of people using Web3 as leverage to garner supporters.</p>
<p>Politicians like Elizabeth Warren would have you believe that <a target="_blank" href="https://www.theblockcrypto.com/amp/linked/116692/sen-elizabeth-warren-says-crypto-is-the-new-shadow-bank">cryptos are threatening the financial system</a> and should be regulated to death. A simple history lesson, however, shows crypto was designed to <a target="_blank" href="https://bitcoin.org/bitcoin.pdf">solve our broken financial system</a> and ensure things like the 2008 financial crisis never happen again.</p>
<p>In similar fashion, so-called environmental activists score relevancy points by painting blockchains and cryptocurrencies as the world's no. 1 environmental problem. That's when you see articles <a target="_blank" href="https://www.cgdev.org/blog/bitcoin-mining-bad-world-limited-options-addressing-problem">like this</a> saying Bitcoin mining will destroy the Earth and accelerate the climate change apocalypse.</p>
<p>Perhaps some due diligence will show Bitcoin miners have resorted to <a target="_blank" href="https://www.coindesk.com/policy/2021/10/11/bitcoin-mining-is-reshaping-the-energy-sector-and-no-one-is-talking-about-it/?outputType=amp">using renewable sources of energy</a>, like wind farms and hydroelectric plants. Moreover, are we going to pretend like the banking system doesn't consume similar amounts of energy?</p>
<p>I suspect our friendly soapboxers here know the truth, but then that's not enough to gain new supporters. They must show relevancy, and Web3 is the newest bull to sacrifice for the goal.</p>
<h2 id="heading-the-final-word">The Final Word</h2>
<p>I don't doubt that Web3 has many problems. But the constant barrage of <em>extreme</em> criticisms I see on the Internet everyday are baffling and show the human tendency to resist innovation for often selfish reasons.</p>
<p>Perhaps in the future, people will learn not to fear what they don't understand. For now, you can expect people to keep hating on Web3 and reaping the rewards.</p>
<p>Not that it should bother true believers in Web3 technology. I mean, there's a long list of people who <a target="_blank" href="https://thenextweb.com/news/newsweek-1995-buy-books-newspapers-straight-intenet-uh">predicted</a> that the Internet would never take off.</p>
<p>It takes years, decades even, for people to see the potential in technology. Some are lucky to discover it early, while others fail to see until it's here.</p>
<p>Will Web3 fail or succeed? Only time will tell.</p>
<p>In the meantime, you can wait for the next anti-Web3 article and laugh at those desperately trying to stop a change whose time has come.</p>
<p>WAGMI.</p>
]]></content:encoded></item><item><title><![CDATA[Will Proof-of-Stake Save Cryptocurrency's Future?]]></title><description><![CDATA[Since Bitcoin's launch in 2008, Proof-of-Work has been the de facto consensus mechanism for many blockchains. The security and decentralisation of PoW is unrivalled, which is why it remained the industry standard for years.
However, research reveals ...]]></description><link>https://eawosika.com/proof-of-stake-benefits</link><guid isPermaLink="true">https://eawosika.com/proof-of-stake-benefits</guid><category><![CDATA[Blockchain]]></category><category><![CDATA[Cryptocurrency]]></category><category><![CDATA[crypto]]></category><category><![CDATA[Web3]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Thu, 17 Feb 2022 12:02:16 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1645098568217/jz3FjpJjQ.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Since Bitcoin's launch in 2008, Proof-of-Work has been the de facto consensus mechanism for many blockchains. The security and decentralisation of PoW is unrivalled, which is why it remained the industry standard for years.</p>
<p>However, research reveals an ugly fact about Satoshi Nakamoto's consensus protocol: </p>
<p>Proof-of-Work cannot work any longer—at least if we want to cryptocurrencies to become widely accepted.</p>
<p>In light of the problems with Proof-of-Work, a new consensus algorithm called Proof-of-Stake has become the popular choice for newer blockchains. Proof-of-Stake blockchains promise faster transactions, higher scalability, a lower carbon footprint, among other benefits.</p>
<p>This article attempts to make sense of the Proof-of-Stake vs Proof-of-Work debate and why it matters. We'll consider the potential benefits of a PoS blockchains and risks associated with this novel consensus mechanism.</p>
<h2 id="heading-the-problem-with-proof-of-work">The Problem With Proof-of-Work</h2>
<p>Last month, the <a target="_blank" href="https://energycommerce.house.gov/committee-activity/hearings/hearing-on-cleaning-up-cryptocurrency-the-energy-impacts-of-blockchains">US Congress held its first hearing</a> on the topic of regulating cryptocurrencies. The question before the House Committee on Energy and Commerce was simple: How do we make cryptocurrency environmentally sustainable?</p>
<p>It is no longer news that the <a target="_blank" href="https://www.bbc.com/news/technology-56012952">electricity consumption of cryptocurrency</a> is comparable to many countries. If anything, high energy usage and its attendant environmental impact is the major complaint levelled against cryptocurrencies like Bitcoin and Ethereum.</p>
<p>The blockchain technology powering Bitcoin, Ethereum, and dozens of altcoins relies on a Proof-of-Work consensus mechanism to secure the system and prevent malicious actions, such as double-spending of funds.</p>
<p>Proof-of-Work (PoW) is the original solution developed by Bitcoin's original founder, Satoshi Nakamoto, to confirm the validity of transactions in the absence of a trusted intermediary.</p>
<p>An explanation of the PoW mechanism would fit into an entire article, so we'd stick to the basics here.</p>
<p>PoW consensus systems require network participants to solve complex cryptographic equations before validating new blocks and adding them to the blockchain. Also called mining, this activity demands enormous computing power from miners.</p>
<p>Because the network rewards whoever solves the problem first, miners can invest in higher computing power to increase their chances of getting mining rewards. Unsurprisingly, this leads to greater energy consumption, which is why criticism of cryptocurrency's energy usage is rife.</p>
<h2 id="heading-what-is-proof-of-stake">What is Proof-of-Stake?</h2>
<p>Proof-of-Stake (PoS) is an alternative consensus mechanism that fixes many issues with the PoW system. Created in 2012 by Sunny King and Scott Nadal, the developers behind Peercoin, Proof-of-Work is used by blockchain networks including Solana and Cardano, with Ethereum <a target="_blank" href="https://businesstechguides.co/what-is-ethereum-2-0">planning to join the party</a> soon.</p>
<p>Here's a basic ELI5 introduction to Proof-of-Stake:</p>
<p>Unlike Proof-of-Work, the Proof-of-Stake system doesn't require network participants to solve cryptographic problems before adding a new block. Rather, the system relies on "validators" who stake funds for the right to confirm new blocks.</p>
<p>The selection of validators is one of the biggest differences between Proof-of-Work and Proof-of-Stake.</p>
<p>A pseudorandom process is used in Proof-of-Stake validator selection to choose who gets to validate a new set of transactions. Other factors like the size and age of the stake also influence who ends up as a validator in this system.</p>
<p>In a Proof-of-Stake blockchain, validators receive transaction fees, but don't get rewards for confirming blocks. As a result, there's little reason to expend excessive computing power since it's not a race-to-the-finish like Proof-of-Work systems.</p>
<h2 id="heading-benefits-of-proof-of-stake-consensus">Benefits of Proof-of-Stake Consensus</h2>
<p>A Proof-of-Stake system is a better proposition for Bitcoin and other cryptocurrencies, especially if the energy consumption problem is to be solved. As explained already, the Proof-of-Stake protocol uses less energy and is considered greener.</p>
<p>Network participants receive rewards according to funds staked, not computing power spent on solving cryptographic equations. With regulators and the wider community questioning cryptocurrency's viability due to high energy usage, PoS may well be crypto's trump card.</p>
<p>But the advantages of Proof-of-Work go beyond making cryptocurrencies greener. A benefit of Proof-of-Stake systems that rarely comes up in discussions is their promotion of decentralisation.</p>
<p>Current Proof-of-Work mechanisms reward miners with the greatest computing power. As such, large mining collectives invest in high-grade Graphical User Interfaces (GUIs) and Application Specific Information Computing Systems (ASICS) to increase their chances of earning block rewards.</p>
<p>The result is a highly centralised system where a few rich individuals and organisations control access to the blockchain. Satoshi imagined the blockchain as a decentralised system, so the inherent centralisation in PoW creates problems for the future of cryptocurrencies.</p>
<p>In a PoS network, literally anyone can stake funds for the right to validate transactions. Plus, validators don't need expensive computers when server-grade devices will perform the task. The system is open to a larger collection of participants, which promotes decentralisation and improves network security.</p>
<p>Despite claims to the contrary, Proof-of-Stake improves  <a target="_blank" href="https://businesstechguides.co/how-does-blockchain-security-work">blockchain security</a>. In fact, PoS networks disincentivise malicious activity better than traditional Proof-of-Work consensus mechanisms.</p>
<p>Imagine someone tries to validate a wrong transaction to game the PoW system. While other node operators can quickly spot the problem and reject the block, the bad actor never gets punished.</p>
<p>With a PoS system, anyone who validates a wrong transaction risks losing money they staked. The smart contract is programmed to automatically freeze funds if malicious activity like validating bad transactions is detected.</p>
<p>A PoS system would also disincentivise a 51% attack. A <a target="_blank" href="https://businesstechguides.co/how-does-blockchain-security-work">51% attack</a> occurs when bad actors take over more than half (or 51%) of nodes on a blockchain. In this situation, such people can alter the blockchain ledger for nefarious purposes, like double-spending funds.</p>
<p>Controlling 51% of validators on a PoS blockchain requires locking up over half of the total cryptocurrencies in a smart contract. This is impractical for many reasons.</p>
<p>First, hackers would need to spend <em>their</em> money to take over the network. Second, they risk losing the money staked even if they obtain control since the smart contract automatically freezes funds of bad actors. Lastly, no one is likely to attack a system that holds 51% of their money, as it would affect the value of the currency.</p>
<p>Perhaps the biggest upside to adopting Proof-of-Work blockchains is the scalability they promise. For starters, a PoS network is likely to have more node operators since the barrier to entry is low.</p>
<p>Besides, there are no complex calculations to solve before confirming blocks—so validation of transactions is faster. This will exponentially increase the throughput on blockchains and help them scale to accept more users.</p>
<p>An increase in throughput is excellent for cryptocurrencies since <a target="_blank" href="https://businesstechguides.co/nervos-network-is-uniquely-positioned-to-accelerate-blockchain-scalability">poor scalability</a> is a huge stumbling block to their adoption. Already, Proof-of-Stake coins like Solana and Cardano are proving popular because of their lower gas fees.</p>
<h2 id="heading-risks-of-using-proof-of-stake-in-blockchain">Risks of Using Proof-of-Stake in Blockchain</h2>
<p>A section of the blockchain community, particularly <a target="_blank" href="https://www.investopedia.com/terms/b/bitcoin-maximalism.asp">Bitcoin maximalists</a>, believe Proof-of-Stake will fail. While this view may be extreme, the disadvantages of Proof-of-Stake certainly need to be discussed.</p>
<p>Some believe a Proof-of-Stake blockchain is centralised because it allocates power to participants based on the quantity of the tokens they hold. As such, anyone can buy up a large amount of cryptocurrency to increase their chances of getting selected as validators.</p>
<p>This would end up concentrating validation capacity in a few hands, which is the same problem Proof-of-Work systems face.</p>
<p>Besides, PoS systems are relatively new and data on their reliability is scarce. In contrast, PoW blockchains have been the industry standard since Satoshi went live with Bitcoin in 2012.</p>
<p>Many also criticise Proof-of-Stake for the perceived barriers to entry it creates. This has to do with the high fees demanded by Proof-of-Stake blockchains to approve validators.</p>
<p>Ethereum 2.0 requires prospective validators to pay 32 ETH (around $96,000 at current market prices). Solana requires even higher fees—between <a target="_blank" href="https://medium.com/@laine_sa/running-a-solana-validator-lessons-tips-6e6d08c0c589">5,000 SOL</a> and <a target="_blank" href="https://solanacompass.com/staking/how-much-do-solana-validators-make">50,000 SOL</a> per various sources. Binance Smart Chain, which uses just 21 validators, asks for 10,000 BNB (around $4,200,000).</p>
<p>Still, it's important to say here that it's possible for different individuals to combine funds into a "stake pool." Stake pools allow individuals to contribute towards a particular validator and receive a share of the rewards. Services like <a target="_blank" href="https://stakefi.ankr.com/liquid-staking">ANKR</a> and <a target="_blank" href="https://rocketpool.net/">Rocketpool</a> already provide these services.</p>
<h2 id="heading-bottom-line">Bottom Line</h2>
<p>Is Proof-of-Stake the key to scaling cryptocurrencies and revolutionising the future of money? Yes. All the signs to the growing need for a scalable, secure, and efficient infrastructure for crypto, which Proof-of-Stake offers. </p>
<p>Proof-of-Stake cryptos would promote faster transactions, which may encourage more businesses to accept cryptocurrency payments. So, yes, you can now <a target="_blank" href="https://thenextweb.com/news/buying-coffee-bitcoin-cryptocurrency/amp">buy coffee with crypto</a>!</p>
<p>More importantly, staking will improve access to blockchain networks and advance mass adoption. Even institutional investors may be willing to buy crypto now that it has long-term sustainability and better chances of mass adoption.</p>
<p>While it has flaws, Proof-of-Stake remains the best bet for future of cryptocurrencies. If crypto is to achieve widespread adoption, become environmentally sustainable, and scale to accept more users, moving to PoS blockchains is a no-brainer.</p>
]]></content:encoded></item><item><title><![CDATA[How Does Blockchain Security Work, Anyway?]]></title><description><![CDATA[Blockchain is disrupting every industry. From retail giants (Walmart) to legacy financial institutions (JP Morgan), the pool of enterprises interested in blockchain technology continues to grow.
However, a key concern for individuals and businesses c...]]></description><link>https://eawosika.com/how-does-blockchain-security-work</link><guid isPermaLink="true">https://eawosika.com/how-does-blockchain-security-work</guid><category><![CDATA[Blockchain]]></category><category><![CDATA[Web3]]></category><dc:creator><![CDATA[Emmanuel A.]]></dc:creator><pubDate>Mon, 14 Feb 2022 11:19:04 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1644836993241/QvojXiaoL.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Blockchain is disrupting every industry. From retail giants (<a target="_blank" href="https://hbr.org/2022/01/how-walmart-canada-uses-blockchain-to-solve-supply-chain-challenges#:~:text=Walmart%20has%20long%20been%20known%20as%20a%20leader%20in%20supply%20chain%20management.&amp;text=Then%20Walmart%20Canada%20pioneered%20a,70%20third%2Dparty%20freight%20carriers.">Walmart</a>) to legacy financial institutions (<a target="_blank" href="https://www.finextra.com/newsarticle/37862/jp-morgan-uses-blockchain-to-improve-global-transfers">JP Morgan)</a>, the pool of <a target="_blank" href="https://businesstechguides.co/enterprise-blockchain">enterprises interested in blockchain technology</a> continues to grow.</p>
<p>However, a key concern for individuals and businesses considering using blockchain technology is security. Sure, the blockchain allows for seamless transfer and receipt of assets and data—but are these transactions secure?</p>
<p>And it's not just CTOs and CEOs who want assurances of blockchain security. Individuals trading cryptocurrencies, NFTs, and more, want to know if their digital assets are secure.</p>
<p>If there's no central entity controlling and securing the decentralised ledger, then how is the blockchain secured?</p>
<p>That's what we're about to find out in this article.</p>
<h2 id="heading-how-do-blockchains-work">How Do Blockchains Work?</h2>
<p>The blockchain is a distributed ledger technology that records all transactions conducted by participants in the network. Blockchain networks are sustained by a group of computers (called nodes) distributed across the world. Each node can initiate transactions or validate new transactions, which is why blockchain networks are seen as "peer-to-peer" systems.</p>
<p>Not all blockchains are the same. Public blockchains like Bitcoin and Ethereum are "permissionless" since anyone with a computer and Internet connection can join the network. Private (permissioned) blockchains, however, can only be joined upon authorization by the controlling entity. Later, we'll see why the distinction in blockchain types is important for security.</p>
<p>Blockchain's description as a "decentralised" system comes from the absence of a single authority controlling it. In other words, every participant in the network has as much power as the next.</p>
<p>Each new transaction gets added to a block, which is then added to the blockchain. Once other nodes agree to the transaction's validity, the new block is added to other blocks, creating a chain—hence the name. The process of nodes agreeing to the state of each transaction is called "consensus".</p>
<h2 id="heading-how-is-blockchain-security-achieved">How is Blockchain Security Achieved?</h2>
<p>Blockchains are extremely secure, making them ideal for transactions requiring high levels of data integrity and safety. For example, blockchains can be used to <a target="_blank" href="https://www.firmofthefuture.com/content/how-blockchain-makes-payments-faster-and-secure/">securely transfer money</a>, <a target="_blank" href="https://charitydigital.org.uk/topics/topics/how-charities-can-use-blockchain-8886">track charity donations</a>, <a target="_blank" href="https://www.frontiersin.org/articles/10.3389/fbloc.2019.00005/full">safeguard records</a>, and <a target="_blank" href="https://www.investopedia.com/news/how-blockchain-technology-can-prevent-voter-fraud/">conduct voting</a>.</p>
<p>Blockchain security is achieved through a mix of cryptography, game theory, consensus mechanisms, and failure-resistant design. Let’s delve into each element to see how it contributes to securing the blockchain.</p>
<h3 id="heading-cryptographic-hashing">Cryptographic Hashing</h3>
<p>Blockchains are “immutable” because they prevent the alteration of transactions on the network. These transactions could be anything from the exchange of digital assets to the transfer of digital data.</p>
<p>We have cryptographic hashing to thank for blockchain’s immutability and data security. Hashing involves an algorithm (a “hash function”) generating a fixed output (hash) from a data input of any size. In most blockchains, the hash is an alphanumeric string of fixed length.</p>
<p>Because a hash is dependent on block data, hashes serve as unique identifiers for blocks on the chain. Running the same data through the hash function will produce the same hash no matter how many times you perform the operation.</p>
<p>A change in a block’s data automatically triggers the generation of a new hash. Which is why it’s easy to know if a block containing transactions has been altered.</p>
<p>Moreover, each block’s hash contains the hash of the previous block—blockchains are described as “hash-linked lists” for this reason. Changing a block’s hash requires changing the preceding block’s hash, and the one before that, up until the first block in the chain.</p>
<p>Not only does rewriting blocks require massive computing power, it’s prone to failure. Other nodes will detect the alterations (each one holds a copy of the blockchain’s history) and reject the newly added blocks.</p>
<p>Hashing ensures funds spent in one transaction cannot be used again, preventing the <a target="_blank" href="https://www.gemini.com/cryptopedia/double-spending-problem-crypto">“double-spending” problem</a> in cryptocurrency. That can only happen if someone rewrote the blockchain's history—and that’s extremely difficult like we’ve seen.</p>
<h3 id="heading-public-key-cryptography">Public-Key Cryptography</h3>
<p>Beyond protecting the immutability of blockchains, cryptography is useful for safeguarding blockchain wallets. Wallets are used to store digital assets, including cryptocurrencies, <a target="_blank" href="https://businesstechguides.co/how-can-businesses-use-nfts">non-fungible tokens (NFTs)</a>, or any other items created and transferred on the blockchain.</p>
<p>When users create a wallet, they get a public key and private key. The private key is to your wallet what a password is to your bank account. Every transaction must be signed with a private key to prove ownership of the assets.</p>
<p>The existence of a private key means that no one can gain access to your wallet and move funds and other assets without your approval. It also serves the ultimate proof of ownership since malicious actors cannot transact with assets they don't own.</p>
<h3 id="heading-consensus-algorithms">Consensus Algorithms</h3>
<p>Consensus algorithms allow participants on the blockchain to agree on the validity of transactions and the true state of the blockchain. In other words, consensus is what makes the blockchain ledger a reliable and secure record of information.</p>
<p>In a blockchain network, every node must confirm the validity of each transaction. This makes it harder for anyone to perform malicious activity and get away with it.</p>
<p>Moreover, nodes must agree on a single, shared history of the blockchain. No two versions of a blockchain can exist, making it impossible to alter records without getting noticed. Besides,  controlling the consensus mechanism is made difficult by blockchain’s decentralisation and lack of a single point of failure.</p>
<p>Blockchain networks use different consensus mechanisms. For example, Bitcoin and Ethereum 1.0 use a <a target="_blank" href="https://www.coindesk.com/learn/2020/12/16/what-is-proof-of-work/">Proof-of-Work</a> system, while <a target="_blank" href="https://businesstechguides.co/what-is-ethereum-2-0">Ethereum 2.0</a>, Solana, Cardano and many new blockchains use a <a target="_blank" href="https://academy.binance.com/en/articles/proof-of-stake-explained">Proof-of-Stake</a> system.</p>
<h3 id="heading-cryptoeconomics-game-theory">Cryptoeconomics (Game Theory)</h3>
<p>When Satoshi Nakamoto designed the first blockchain, there was the question of how to ensure network participants act honestly. Remember the blockchain is decentralised, meaning there's no one to wield the big stick and prevent malicious activity.</p>
<p>Enter cryptoeconomics.</p>
<p>Cryptoeconomics is based on game theory, a field of study that attempts to predict the interactions between different participants in a situation with defined rules and outcomes. When applied to blockchain networks, game theory can be used to encourage honest activity by providing adequate incentives.</p>
<p>Cryptoeconomics works differently depending on the blockchain. Bitcoin uses a Proof-of-Work system where nodes (called miners) must expend some resource (electricity, in this case) before confirming transactions. This rule is enforced by asking miners to solve complex equations in exchange for the right to add new transactions to the blockchain.</p>
<p>The computing-intensive nature of Bitcoin mining disincentivises malicious activity. Any would-be malicious actor has to spend enormous time and money (on electricity) on dishonest activity (like confirming invalid transactions). Even then, the chances of success are horribly slim.</p>
<p>Moreover, dishonest miners lose block rewards for confirming valid transactions. Now, our hapless hacker will waste electricity <em>and</em> lose money in the process of attacking the Bitcoin blockchain.</p>
<p>New-generation blockchains like Ethereum 2.0, Solana, and Cardano use the Proof-of-Stake system. The PoS system mirrors PoW in how it punishes bad behaviour and rewards honest activity.</p>
<p>Nodes must “stake” some cryptocurrency before validating transactions, which raises the barrier to entry. If nodes (called validators) confirm valid transactions, they receive cryptocurrency rewards. But should they broadcast an invalid transaction, and other nodes reject it, they lose both the staked funds and their expected rewards.</p>
<h2 id="heading-common-blockchain-security-issues">Common Blockchain Security Issues</h2>
<p>While blockchain security is impressive, it doesn't rule out the possibility of a breach. Here are the most common threats to blockchain security:</p>
<h3 id="heading-51-attacks">51% Attacks</h3>
<p>If a group of hackers manage to control a significant amount of the computing power (at least 51 percent) in a blockchain network, then they could take over the entire blockchain. Known as a 51% attack, this is the most realistic scenario in which a blockchain can be hacked in theory.</p>
<p>However, it's difficult to orchestrate a 51% attack for reasons we discussed under “cryptoeconomics.”Bitcoin has <a target="_blank" href="https://bitnodes.io/">15,000+ nodes</a> (computers) running on its blockchain, while Ethereum has <a target="_blank" href="https://etherscan.io/nodetracker">2,000+ nodes</a>. The sheer amount of resources to take over half of either network makes a 51% attack impractical and costly.</p>
<p>It's important to point out that Bitcoin and Ethereum benefit from a robust network. Smaller blockchains running fewer nodes are more susceptible to attacks since breaching the network requires less investment. <a target="_blank" href="https://cointelegraph.com/news/bitcoin-sv-rocked-by-three-51-attacks-in-as-many-months/amp">Bitcoin SV</a>, <a target="_blank" href="https://bitquery.io/blog/attacker-stole-807k-etc-in-ethereum-classic-51-attack">Ethereum Classic</a>, <a target="_blank" href="https://cointelegraph.com/news/bitcoin-gold-blockchain-hit-by-51-attack-leading-to-70k-double-spend">Bitcoin Gold</a>,<a target="_blank" href="https://www.ccn.com/privacy-coin-verge-succumbs-to-51-attack-again/">Verge</a>, and <a target="_blank" href="https://medium.com/coinmonks/vertcoin-vtc-is-currently-being-51-attacked-53ab633c08a4">Vertcoin</a> are some notable blockchains to have suffered 51% attacks in the past.</p>
<p>Private blockchains have a higher security risk than private blockchains because they have less participants. While controlled access improves security, an inside attacker can easily wrest control of the blockchain. This is an important consideration for companies who may be considering using private blockchains for enterprise-level transactions.</p>
<h3 id="heading-distributed-denial-of-service-ddos-attacks">Distributed Denial-of-Service (DDoS) Attacks</h3>
<p>A distributed denial-of-service attack happens when cybercriminals disrupt a blockchain network by overloading it with transactions. Most blockchain networks have a defined transaction limit and will crash if the limit is exceeded.</p>
<p>While many believe blockchain networks are immune to DDoS attacks, this is untrue. Solana is a prime example of how malicious actors can bring down a blockchain with a DDoS attack.</p>
<p>On September 14, 2021, the blockchain network was <a target="_blank" href="https://cointelegraph.com/news/solana-and-arbitrum-knocked-offline-while-ethereum-evades-attack">flooded with up to 400,000 transactions per second</a> in a coordinated DDoS attack. Validators couldn’t keep up, causing unconfirmed transactions to clog the network and knock the system offline.</p>
<h3 id="heading-attacks-on-blockchain-connected-systems">Attacks on Blockchain-Connected Systems</h3>
<p>Outside of a 51% attack or DDoS hack, the means of attacking a blockchain are few and far in between. In fact, most of the hacks reported in the news aren't attacks on the blockchain <em>per se</em>.</p>
<p>Rather, hackers often exploit vulnerabilities at the point of contact between the blockchain and the outside world. Think third-party applications, software clients, and other means of interacting with the blockchain.</p>
<p>Here are some examples:</p>
<ul>
<li><strong>Hot Wallet Hacks</strong></li>
</ul>
<p>Many <a target="_blank" href="https://selfkey.org/list-of-cryptocurrency-exchange-hacks/">attacks on cryptocurrency exchanges</a> have targeted "hot wallets" (Internet-connected storages) used to store cryptocurrencies. Ideally, exchanges should transfer assets to a "cold wallet", which is an offline storage to protect them. But that rarely happens, making these assets ripe pickings for sophisticated crypto-thieves.</p>
<ul>
<li><strong>Stolen Wallet Keys</strong></li>
</ul>
<p>A user's private keys could also be compromised and used to transfer assets without their knowledge. Classic tactics like <a target="_blank" href="https://www.keepnetlabs.com/crypto-phishing-techniques/">phishing</a> have proved surprisingly effective for getting users to unwittingly part with their private keys. This gives bad actors unlimited access to wallets, enabling them to steal crypto and other assets.</p>
<ul>
<li><strong>Smart Contract Code Exploitation</strong></li>
</ul>
<p>Bugs in smart contracts can allow hackers to breach blockchain-based <a target="_blank" href="https://businesstechguides.co/decentralised-applications">decentralised applications (dApps)</a>. In such cases, it's the security of the smart contract—not the blockchain itself—that's suspect. The recent <a target="_blank" href="https://www.youtube.com/watch?v=gF8rl6E6JnY">Wormhole hack</a> is a prime example of how poor smart contract code can cause problems.</p>
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>Blockchains remain one of the most secure options for transferring assets and data. When the right elements—cryptography, cryptoeconomics, and consensus—are in place, breaching a blockchain network is next to impossible.</p>
<p>However, not all blockchains are made equal. Everything from the consensus algorithm and cryptoeconomic structure to the size of its network can impact blockchain security.</p>
<p>Finally, users of blockchain-connected applications like crypto exchanges and dApps must understand that these services do not benefit from the blockchain's security. Therefore, it’s important to implement other measures to make them secure.</p>
]]></content:encoded></item></channel></rss>