L4 - Tokenization Flashcards

1
Q

Tokenization

A

Tokenization – the process of issuing tokens that represent an asset where the rules and behaviours governing the asset are encoded in smart contracts. An asset can be fungible or non-fungible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Difference between fungible or non-fungible assets

A

Fungible assets are indistinguishable from their own kind and are mutually interchangeable. Non-fungible assets are not interchangeable and require a unique identification code to distinguish them from other related assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a crypto anchor do?

A

It is embedded or added to the machine. It serves as a root of trust. A crypto anchor enables tamper-proof digital identity of the asset and creates a digital twin on-chain. A Siamese twin.
–> using the private key: to address the machines and control the remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a digital twin enable in terms of compliance?

A

It enables end-to-end audit trails for all transactions & thus full regulatory compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can assets be tokenized?

A

Based on an asset’s crypto ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What two things about an asset can be tokenized?

A
  • the asset itself or the data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Oracle Problem

A

In a nutshell, the oracle problem refers to the conflict between security, authenticity, and trust in third-party oracles for the trustless execution of smart contracts. Oracles retain a high degree of power over smart contracts in how they are executed because the data they provide determines how the smart contracts execute. Therefore, data feeds from third-party sources have substantial influence over the execution of a smart contract, removing its trustless nature as part of a decentralized network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to solve the oracle problem?

A

A decentralized oracle uses a decentralized network of nodes to obtain real-life data from off-chain sources of information and transfer it to smart contracts on-chain. These decentralized oracles are like public libraries with multiple sources of information.

–> In the lecture a hardware key is the solution (turning machines into trusted data sources - by signing outgoing data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Utility tokens

A

A utility token is a crypto token that serves some use case within a specific ecosystem. These tokens allow users to perform some action on a certain network. A utility token is unique to its ecosystem.

The token’s value mainly comes from their utility and the resulting demand. Regulation will come early 2023.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security token

A

An investment contract that represents legal ownership of a physical or digital (mostly financial) asset that has been registered on a blockchain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What were tokens used for in the past?

A
  • crowdfunding of projects
  • existing financial assets
  • -> Now physical assets and related aspects which opens new business models
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Purpose of an object wallet

A
  • ownership
  • incentivization
  • access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Purpose of a machine wallet

A
  • provenance
  • composition energy
  • footprint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

provenance

A

a record of ownership of a work of art or an antique, used as a guide to authenticity or quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

entitlement

A

the fact of having a right to something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Purpose of a car wallet

A
  • entitlement
  • data transactions
  • cyber security
17
Q

What is the policy layer?

A
  • set of rules that perform and log all processes preceding and following transaction approvals. Policies are defined in a domain-specific language and adhere to the human-readable-provisions of various regulators. All policies are secured cryptographically in a dedicated Trusted Execution Environment (TEE)