Page 79 - FIGI: Security Aspects of Distributed Ledger Technologies
P. 79

369   Shabab (2014) ibid
            370   Dika, A (2017) Ethereum Smart Contracts: Security Vulnerabilities and Security Tools, available at http:// bit .ly/ 2XNBtoC;
                Rush, T (2016) Smart Contracts are Immutable — That’s Amazing…and It Sucks, available at http:// bit .ly/ 32wxfAB;
                Felker, D (2018) Self Destructing Smart Contracts in Ethereum, available at http:// bit .ly/ 2Z1X0GA
            371   Felker, D (2018) Self Destructing Smart Contracts in Ethereum, available at http:// bit .ly/ 2Z1X0GA
            372   Felker, D (2018) Self Destructing Smart Contracts in Ethereum, available at http:// bit .ly/ 2Z1X0GA .The cods is: function
                close() public onlyOwner { //onlyOwner is custom modifier
            372     selfdestruct (owner);  // `owner` is the owners address}
            373   BIS (2017) What is Distributed Ledger Technology?, available at http:// bit .ly/ 30Kf3lf; World Bank Group (2017)
                Distributed Ledger Technology (DLT) and Blockchain, available at https:// bit .ly/ 2Go5Zct
            374   For an overview of blockchain and DLTs, see Perlman, L (2017) Distributed Ledger Technologies and Financial Inclusion,
                available at https:// bit .ly/ 2nyxpBG; and Ramachandran, V & Woodsome, J (2018) Fixing AML: Can New Technology
                Help Address the De-risking Dilemma?, available at https:// bit .ly/ 2IKMECI
            375   IBM (2018) Blockchain 101, available at https:// ibm .co/ 2HjoNwC; Iansiti, M & Lakhani, K (2017) The Truth About
                Blockchain, available at http:// bit .ly/ 2YYRXXu; World Bank Group (2017) Distributed Ledger Technology (DLT) and
                Blockchain, available at https:// bit .ly/ 2Go5Zct

            376   Martindale, J (2018) What is a Blockchain? Here’s Everything You Need to Know, available at https:// bit .ly/ 2DoWE1J
            377   ibid.
            378   They also offer authorities a new, and almost real-time, access to data for compliance (RegTech) purposes, while
                blockchains such as Bitcoin that create new decentralized currencies may challenge the current supremacy of
                governments in managing the national and international economic and monetary systems. On the disruptive
                possibilities of DLTs and the implications, see Mills et al. (2016) ibid; UK Government Office for Science (2016) ibid;
                Credit Suisse (2016) Blockchain, available at https:// goo .gl/ 1YT6Ci; IBM (2016) ibid; Accenture (2016) Blockchain
                Technology: How Banks Are Building a Real-Time Global Payment Network, available at https:// goo .gl/ 5bHSd4.
            379   Berke, A (2017) how safe are blockchains? It depends, available at https:// bit .ly/ 2naCjoO
            380   There are other challenges, but as noted earlier, these are beyond the scope of this paper.
            381   The Development Bank of Singapore Limited (2017) Understanding Blockchain Technology and What it Means for Your
                Business, available at https:// go .dbs .com/ 2GRREbX
            382   Choi, S; Ko, D & Yli-Huumo, J (2016) Where Is Current Research on Blockchain Technology? – A Systematic Review,
                available at http:// bit .ly/ 2XNAMvw
            383   Miles, C (2017) Blockchain security: What keeps your transaction data safe?, available at https:// ibm .co/ 2xYQXXq
            384   Adopted from Lapointe, C & Fishbane, L (2018) The Blockchain Ethical Design Framework, available at http:// bit .ly/
                2O2q2oA
            385   Aumasson, JP (2018) Attacking and Defending Blockchains: From Horror Stories to Secure Wallets, available at
                https:// ubm .io/ 2LZn6Gv
            386   VentureBeat (2019) D-Wave Previews Quantum Computing Platform with Over 5,000 Qubits, available at http:// bit .ly/
                2Lsk1PU
            387   ID Quantique (IDQ) is provides quantum-safe crypto solutions, designed to protect data for the long-term future. The
                company provides quantum-safe network encryption, secure quantum key generation and quantum key distribution
                solutions and services to the financial industry, enterprises and government organisations globally. See https:// www
                .idquantique .com/
            388   Adapted from Choudhury, K (2018) What Blockchain Means for Developing Countries,   available at http:// bit .ly/
                2Ge7hrW
            389   Choudhury, K (2018) What Blockchain Means for Developing Countries, available at http:// bit .ly/ 2Ge7hrW
            390   POW originates from early attempts to throttle email spammers by creating an artificial cost to the sender for each
                email sent, akin to affixing the cost of a postage stamp on each email. At lower levels the greater effort expended
                by the email sender is negligible, but costs become substantial at higher volumes, making the cost spam financially
                unattractive to the mass emailer. See Back, A (2002) Hashcash - A Denial of Service Counter-Measure, available at
                http:// bit .ly/ 2SowSmL; Microsoft (2016) MS-OXPSVAL]: Email Postmark Validation Algorithm, available at https:// bit .ly/
                2FwjoAO.

            391   Nadeem, S (2018) How Bitcoin Mining Really Works, available at http:// bit .ly/ 2XPeOIB



                                                                   Security Aspects of Distributed Ledger Technologies  77
   74   75   76   77   78   79   80   81   82   83   84