8.7 Introduction to Digital Assets Flashcards
The three basic elements of distributed ledger technology (DLT)
digital ledger
a participant network
a consensus mechanism to confirm new entries
digital ledger
a database that can be shared over a network among a potentially unlimited number network participants (nodes).
–> Each network participant has an identical copy of the database, which includes a verified record of all transactions.
—-> In order to add a new transaction entry to the ledger, a consensus must be reached among participants
the two parts of the consensus mechanism to confirm new entries
- the new transaction is validated
- this decision is confirmed when network participants agree to accept a common version of the updated ledger.
To verify the identities of network participants, what does DLT use?
cryptography
Once encrypted, data is unusable by anyone outside the network
The various features of DLT ensure a high level of network security and database integrity.
A distributed ledger’s records are immutable (i.e., unchangable), transparent, and accessible by all network participants with nearly real-time updates.
Cryptography is used to secure all data within the blockchain
Blockchain
a popular type of digital ledger where information (e.g., ownership changes) is recorded sequentially in blocks that are linked (chained) together
Cryptography is used to secure all data within the blockchain
The steps involved in adding a transaction to the blockchain are:
- Buyer and seller agree to the transaction
- A block is created to record the transaction information and sent to all of the network’s nodes
- Authorized member verify the new transaction’s details and identify any related previous transactions
- The verified data is combined with data from previous transactions in a new block
- The new block is added to the ledger and, using a secure link (known as a hash), it is chained to other blocks containing transaction data
- The transaction is considered complete and the new block becomes part of the updated ledger
DLT has many potential applications in the financial such as?
it allows for the creation and exchange of financial assets over peer-to-peer (P2P) networks with permanent ownership records that can be instantly updated to reflect the latest transactions.
With DLT, it is possible to use smart contracts that execute automatically when specified terms are met.
–> This is particularly relevant for contingent claims and debt covenants.
offers the potential benefits of greater transparency, more accurate record keeping, and a faster ownership transfer process
The main drawbacks of DLT
it is not fully secure, which raises data privacy concerns
it consumes massive amounts of energy.
Consensus protocols
needed to prevent network participants from acting maliciously to create false records
The two main consensus protocols
Proof of Work (PoW)
Proof of Stake (PoS).
Proof of Work (PoW)
the most popular consensus protocol for digital assets
Computers on the network, known as miners, compete to solve complex algorithmic puzzles that are created whenever a transaction occurs.
A transaction is only added to the blockchain when a puzzle is solved and the successful miner can prove their solution to other network participants.
solving these puzzles requires immense amounts of computational power, so miners are motivated by the prospect of earning cryptocurrency if they are successful.
Proof of Stake (PoS).
network participants become eligible to validate transactions by pledging a certain amount of their capital. After pledging a stake, a participant may be chosen to verify the veracity of a transaction and choose the block that it will be included in. A proposed block is accepted if a majority of other validators attest to its validity.
As with the PoW protocol, participants are motivated to perform this service because they are compensated with digital assets (e.g., cryptocurrency, tokens)
Validators control access to the network and serve as a check against the potential for malicious actors acquiring control of a majority of the network’s computational power.
A permissionless network
open to any user who wishes to make transactions.
Any transactions that have been added to the blockchain can be seen by all network members because all nodes have a copy of the permanent ledger.
Once participants become members of a permissionless network, they are eligible to perform all network functions.
advantage of a permissionless network
One advantage of permissionless networks is that transacting parties do not need to know, or even trust, each other.
Transactions are verified when a consensus is reached among a majority of members.
This lack of a centralized authority responsible for validating transactions ensures that permissionless networks cannot be brought down by a single point of failure
Bitcoin is one of many cryptocurrencies that uses a permissionless DLT network.
Permissioned networks
allow varying levels of access.
Membership in permissioned networks is limited and restrictions can be placed on a member’s ability to participate in the validation process and they may only be able to view the selective details of transactions.
The rules governing a permissioned network are overseen by a centralized organization and relatively few members are required to validate transactions.
Compared to a permissionless network, this structure is faster and more cost-effective, as less processing power and bandwidth are required.
Types of Digital Assets
Digital assets can be classified into two broad categories — cryptocurrencies and tokens.
Cryptocurrencies
The most common digital assets are cryptocurrencies, which may be issued by private organizations, companies, and even individuals.
used to store and transfer value and can be exchanged almost instantaneously without requiring the services of an intermediary.
Because they are not backed by a monetary authority (i.e., central bank), many cryptocurrencies are subject to self-imposed limits in order to maintain their value. Despite these limits, cryptocurrencies tend to be highly volatile assets, due in part to their lack of clear fundamentals.