Page 70 - FIGI: Security Aspects of Distributed Ledger Technologies
P. 70

160   In many jurisdictions and following BIS leads, FMIs must maintain certain standards with respect to risk management
                and operations, have adequate safeguards and procedures to protect the confidentiality of trading information,
                have procedures that identify and address conflicts of interest, require minimum governance standards for boards of
                directors, designate a chief compliance officer, and disseminate pricing and valuation information.
            161   European Securities and Markets Authority (2019) Advice: Initial Coin Offerings and Crypto-Assets , available at https://
                bit .ly/ 2CXSjFc
            162   See examples thereof in ITU-T Focus Group Digital Currency including Digital Fiat Currency (2019) Reference
                Architecture and Use Cases Report, available at www .itu .int
            163   Coindesk (2015) What the 'Bitcoin Bug' Means: A Guide to Transaction Malleability, available at http:// bit .ly/ 2O3cpW4
            164   This is similar to but not ‘double spending. van Wirdum, A (2015)The Who, What, Why and How of the Ongoing
                Transaction Malleability Attack, available at http:// bit .ly/ 2xRZc7I
            165   ibid. The Mt. Gox hacked followed the following sequence: (i) the attacker deposits Bitcoins in a Mt. Gox wallet; (ii) the
                attacker requests withdrawal of the coins and the exchange initiates a transaction; (iii) the attacker modifies the TXID
                and the transaction is included in the blockchain; (iv) After the attacker receives the coins, the attacker complains to
                the exchange that the coins were not received; (v) After the exchanged searches but cannot find the exact transaction
                ID, the exchange reissues another send
            166   Bitcoin News (2015) Transaction Malleability: MtGox’s Latest Woes, available at http:// bit .ly/ 2GkwHnN
            167   See BIP 66, available at http:// bit .ly/ 2SxoLVn ; Bitcoin Transaction Malleability, available at
            167   http:// bit .ly/ 2SrbZaD and also BIP 141, available at http:// bit .ly/ 2LpCVal
            168   BitDegree (2019) What is SegWit and How it Works Explained, available at http:// bit .ly/ 2YgzSHc
            169   StackExchange (2018) Why Was Transaction Malleability Fix Required for Lightning Network?, available at http:// bit .ly/
                2XXIbnd
            170   Ambcrypto (2018) SegWit Fixed the Transaction Malleability Problem on Bitcoin and Litecoin, says Bitcoin Proponent,
                available at http:// bit .ly/ 2GiJ1VI; See also Zcash, available at http:// bit .ly/ 30I8dg5
            171   In essence, the recipient of funds (such as from an exchange) complains to the sender that a transaction had not
                occurred and requests a resend of the funds. The target, after checking for the original TXID and being unable to find it,
                resends the same amount again to the attacker. This problem is solved by senders searching for both the original TXID
                and equivalents. The attack is described well here: http:// bit .ly/ 2O3cpW4 and here: http:// bit .ly/ 2YgzSHc. See also a
                technical analysis of Transaction: SF Bitcoin Devs Seminar: Transaction Malleability: Threats and Solutions, available at
                http:// bit .ly/ 2y0cIWN; See also BIP 62, available at http:// bit .ly/ 2Y0sE6f

            172   For example, a multi-signature smart contract calling for a payment from one party to another should the local weather
                drop below a certain temperature on a certain date will need to use an oracle to retrieve the daily temperature details
                from an external data source, such as through the use of an API provided by a weather source.
            173   Image source:  https:// www .smartcontract .com/
            174   See https:// www .oraclize .it/  which redirects to https:// provable .xyz/
            175   ‘Oraclize purports to solve the ‘walled garden’ limitation — it provides a secure connection between smart contracts
                and the external world, enabling both data-fetching and delegation of code execution. The data (or result) is delivered
                to the smart contract along with a so-called ‘authenticity proof’, a cryptographic guarantee proving that such data
                (or result) was not tampered with. By verifying the validity of such authenticity proof, anybody at any time can verify
                whether the data (or result) delivered is authentic or not.’ Oraclize (2017) Authenticity Proofs Verification: Off-chain vs
                On-chain, available at http:// bit .ly/ 2XO0FLH
            176   ‘‘TLSnotary’ allows a client to provide evidence to a third party auditor that certain web traffic occurred between
                himself and a server. The evidence is irrefutable as long as the auditor trusts the server’s public key.’ TLSNotary (2014)
                TLSnotary – a Mechanism for Independently Audited Https Sessions, available at http:// bit .ly/ 2SqOYon
            177   http:// bit .ly/ 2XSUCWn
            178   http:// bit .ly/ 30Dq081
            179   http:// bit .ly/ 2LukqS2
            180   http:// bit .ly/ 30DkH8H
            181   https:// intel .ly/ 2xUvOOo
            182   http:// bit .ly/ 2GiUEM6





           68    Security Aspects of Distributed Ledger Technologies
   65   66   67   68   69   70   71   72   73   74   75