Page 79 - FIGI: Security Aspects of Distributed Ledger Technologies
P. 79
369 Shabab (2014) ibid
370 Dika, A (2017) Ethereum Smart Contracts: Security Vulnerabilities and Security Tools, available at http:// bit .ly/ 2XNBtoC;
Rush, T (2016) Smart Contracts are Immutable — That’s Amazing…and It Sucks, available at http:// bit .ly/ 32wxfAB;
Felker, D (2018) Self Destructing Smart Contracts in Ethereum, available at http:// bit .ly/ 2Z1X0GA
371 Felker, D (2018) Self Destructing Smart Contracts in Ethereum, available at http:// bit .ly/ 2Z1X0GA
372 Felker, D (2018) Self Destructing Smart Contracts in Ethereum, available at http:// bit .ly/ 2Z1X0GA .The cods is: function
close() public onlyOwner { //onlyOwner is custom modifier
372 selfdestruct (owner); // `owner` is the owners address}
373 BIS (2017) What is Distributed Ledger Technology?, available at http:// bit .ly/ 30Kf3lf; World Bank Group (2017)
Distributed Ledger Technology (DLT) and Blockchain, available at https:// bit .ly/ 2Go5Zct
374 For an overview of blockchain and DLTs, see Perlman, L (2017) Distributed Ledger Technologies and Financial Inclusion,
available at https:// bit .ly/ 2nyxpBG; and Ramachandran, V & Woodsome, J (2018) Fixing AML: Can New Technology
Help Address the De-risking Dilemma?, available at https:// bit .ly/ 2IKMECI
375 IBM (2018) Blockchain 101, available at https:// ibm .co/ 2HjoNwC; Iansiti, M & Lakhani, K (2017) The Truth About
Blockchain, available at http:// bit .ly/ 2YYRXXu; World Bank Group (2017) Distributed Ledger Technology (DLT) and
Blockchain, available at https:// bit .ly/ 2Go5Zct
376 Martindale, J (2018) What is a Blockchain? Here’s Everything You Need to Know, available at https:// bit .ly/ 2DoWE1J
377 ibid.
378 They also offer authorities a new, and almost real-time, access to data for compliance (RegTech) purposes, while
blockchains such as Bitcoin that create new decentralized currencies may challenge the current supremacy of
governments in managing the national and international economic and monetary systems. On the disruptive
possibilities of DLTs and the implications, see Mills et al. (2016) ibid; UK Government Office for Science (2016) ibid;
Credit Suisse (2016) Blockchain, available at https:// goo .gl/ 1YT6Ci; IBM (2016) ibid; Accenture (2016) Blockchain
Technology: How Banks Are Building a Real-Time Global Payment Network, available at https:// goo .gl/ 5bHSd4.
379 Berke, A (2017) how safe are blockchains? It depends, available at https:// bit .ly/ 2naCjoO
380 There are other challenges, but as noted earlier, these are beyond the scope of this paper.
381 The Development Bank of Singapore Limited (2017) Understanding Blockchain Technology and What it Means for Your
Business, available at https:// go .dbs .com/ 2GRREbX
382 Choi, S; Ko, D & Yli-Huumo, J (2016) Where Is Current Research on Blockchain Technology? – A Systematic Review,
available at http:// bit .ly/ 2XNAMvw
383 Miles, C (2017) Blockchain security: What keeps your transaction data safe?, available at https:// ibm .co/ 2xYQXXq
384 Adopted from Lapointe, C & Fishbane, L (2018) The Blockchain Ethical Design Framework, available at http:// bit .ly/
2O2q2oA
385 Aumasson, JP (2018) Attacking and Defending Blockchains: From Horror Stories to Secure Wallets, available at
https:// ubm .io/ 2LZn6Gv
386 VentureBeat (2019) D-Wave Previews Quantum Computing Platform with Over 5,000 Qubits, available at http:// bit .ly/
2Lsk1PU
387 ID Quantique (IDQ) is provides quantum-safe crypto solutions, designed to protect data for the long-term future. The
company provides quantum-safe network encryption, secure quantum key generation and quantum key distribution
solutions and services to the financial industry, enterprises and government organisations globally. See https:// www
.idquantique .com/
388 Adapted from Choudhury, K (2018) What Blockchain Means for Developing Countries, available at http:// bit .ly/
2Ge7hrW
389 Choudhury, K (2018) What Blockchain Means for Developing Countries, available at http:// bit .ly/ 2Ge7hrW
390 POW originates from early attempts to throttle email spammers by creating an artificial cost to the sender for each
email sent, akin to affixing the cost of a postage stamp on each email. At lower levels the greater effort expended
by the email sender is negligible, but costs become substantial at higher volumes, making the cost spam financially
unattractive to the mass emailer. See Back, A (2002) Hashcash - A Denial of Service Counter-Measure, available at
http:// bit .ly/ 2SowSmL; Microsoft (2016) MS-OXPSVAL]: Email Postmark Validation Algorithm, available at https:// bit .ly/
2FwjoAO.
391 Nadeem, S (2018) How Bitcoin Mining Really Works, available at http:// bit .ly/ 2XPeOIB
Security Aspects of Distributed Ledger Technologies 77