L5 - Crypto Asset Custody Flashcards

1
Q

Types of digital assets

A
Security tokens
Stablecoins
Utility tokens
E-money tokens
Cryptocurrencies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Before modern key storage

A

HSM technology..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Traditional asset custodians

A
  • custodians are like vaults holding assets in both electronic and physical form
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital asset custodians

A
  • primary role of safekeeping digital assets

- safe key management (by holding the private key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the private key made out of?

A

Two very large secret prime numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the public key made out of?

A

The product of those two very large prime numbers used to make the private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can cold wallets be costly

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an HSM?

A

Hardware security module

  • physical device that safeguards digital keys
  • facilitates encryption, decryption, signing and verification
  • private key is generated within a secure device from which it cannot be extracted without damaging the device
  • the private key is never exposed, even to the holder of the device, and therefore cannot be copied or hacked.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the access gateway into decentralized economy.

A

Non-custodial wallets are the access gateway as users interact directly with smart contracts and not through another middleman.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Seed phrase how long

A

12-24 words generated by the crypto wallet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the seed phrase?

A

Like a master password. As long as it exists you can access your funds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is the seed phrase the same as the private key?

A

No the private key allows to sign transactions. The seed phrase allows access to wallet and all private keys in wallet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does MPC minimize?

A

The single point of compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is MPC

A

Multi-party computation
Multiple servers host the private key together
Avoids a single point of failure
Enables a custodial solution that is online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pros of centralised custody

(exchange hosted wallets)

A
  • high convenience and operability

- ease of access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cons of centralised custody

(exchange hosted wallets)

A

Ease of access but huge counterparty risks with the exchange

  • exchange hacks
  • mixing of client assets and no clear separation
  • counterparty risk of insolvency.
17
Q

pros of centralised custody (third-party custody)

A
  • clearly defined functions and controls
  • institutional-level technology and security
  • transparency
  • regulatory compliance
18
Q

cons of centralised custody (third-party custody)

A
  • fee

- counterparty risk as the custodian is exposed to potential hacks

19
Q

pros decentralised custody (self-custody /non-custodian wallet)

A
  • 100% control over digital assets
  • free
  • secure
20
Q

cons of decentralised custody (self-custody /non-custodian wallet)

A
  • when access to assets is lost, the assets become irretrievable
  • holds responsibility for assets, asset management, and associated risks
  • requires expertise in digital assets
  • more susceptible to hacking or loss of assets
21
Q

Hardware wallet level of security and ease of use

A

security: high

ease of use: medium

22
Q

Software wallet level of security and ease of use

Application installed on a device, such as a smartphone or computer

A

security: medium

ease of use: high

23
Q

Web wallet level of security and ease of use

accessed through an internet browser. Quick transaction and high availability

A

security: low

ease of use: high

24
Q

Custodial wallet level of security and ease of use

A

security: high

ease of use: depends on the custodian

25
Q

Largest hacks and exploits

A

Mt. Gox was a bitcoin exchange based in Shibuya, Tokyo, Japan.Launched in 2010, it was handling over 70% of all bitcoin (BTC) transactions worldwide by early 2014, when it abruptly ceased operations amid revelations of its involvement in the loss/theft of hundreds of thousands of bitcoins, then worth hundreds of millions in US dollars.

Mt. Gox private key was unencrypted and it would appear that it was stolen via a copied wallet.dat
file, either by hacking or perhaps through an insider.

Once the file was hacked, the hacker(s) were able to access and cipher bitcoins gradually from the wallets associated with Mt. Gox’s
private keys without the hack being detected.

26
Q

What provides a legal framework for

crypto-asset markets to develop within the EU?

A

Markets in Crypto-assets (MiCA) Regulation

27
Q

Why do we need regulation?

A
  • regulatory initiatives lower barriers to market entry
  • institutions need more security and clarity.
  • helps healthy and sustainable market growth
28
Q

In Germany Digital Asset regulations falls under the authority of

A

BaFin.