By William Adams
Introduction
For much of 2016 and 2017, the finance and technology communities were abuzz with the potential of blockchain. Now as the public catches up and blockchain gains the attention of the mainstream media, leaders must quickly grasp the fundamentals of this technology to understand its implications for their businesses.
Following the launch of the cryptocurrency Bitcoin in January 2009, banks and federal regulators moved quickly to understand and possibly harness the power of its underlying technology: the distributed ledger.[1] Since then, words like “ICO,” “mining,” “tokenization,” and “crypto” have become the parlance of newscasters and influencers. And if you have made it this far without needing to look up one of these buzzwords, you are likely among the few who have a general idea of what blockchain is or among the fewer who actually understand this new frontier.
Beneath the noise and away from the allure of the get-rich-quick ICO[2] schemes, rests a new technology that has the potential to change at least some forms of business. In this paper, I set out to define the jargon of the “crypto space,” explain the fundamentals of blockchain technology, and comment on the appropriateness of various frameworks regarding the growth potential of this nascent technology.
TECHNOLOGY OVERVIEW
Background
Blockchain is a type of database that allows users to store information in a safe, yet visible way across a network of participants. The theory behind the database was first presented by Satoshi Nakamoto with the publication of “Bitcoin: A Peer-to-Peer Electronic Cash System” in October 2008.[3] Bitcoin was to function as a digital, alternative form of currency protected through cryptography, hence “cryptocurrency.” The blockchain technology would allow users to accurately track Bitcoin transactions. Thus through the structure of the database, Nakamoto sought to eliminate the need for intermediaries in digital transactions. The theory became a reality when Nakamoto launched Bitcoin a few months later in January 2009. Competing cryptocurrencies have since followed, until today there are over 1500.[4]
Although Bitcoin was not the first digital currency,[5] it has gained popularity because of its ability (via the blockchain it’s built upon) to solve the “double-spend” problem that plagued previous digital payment systems.[6] To understand this problem, contrast the purchasing process in the physical world with its online equivalent. In the physical world, when an individual buys a product or a service—think something as basic as a soda from the convenience store—money is exchanged for the good or service and the transaction is completed. With digital transactions, there is no way for the buyer and the seller to account for the uniqueness of the transaction because the digital representation of the money being exchanged is really just a “digital file that can be duplicated or falsified;”[7] an “information asymmetry” exists.[8] In other words, I could order a new t-shirt online with one copy of the digital file and then use another copy of the same digital file to buy shoes on another website.[9]
Blockchains solve the problem through a governance system known as a “proof-of-work” protocol[10] and a process commonly called “mining.”[11] Understanding how this protocol and process solve the problem requires further explanation of the blockchain itself.
Technology
A blockchain is a digital ledger of transactions that are tracked across a distributed network of computers, called nodes (see Figure 1). Members of the network can look back through the ledger and see every transaction. Each new transaction is contained within a block and, once verified by the rest of the network, is added to the chain.
I think of blockchain like one of those giant group text message chains I’m occasionally added to. I may not have the number of anyone in the group, but I can see every text message sent. In this example, each text message represents a “block” of information, or the individual transactions of the blockchain.
Figure 2: a blockchain is like a group text message chain; even without knowing the identities of the senders, I can still see all the “transactions” or messages by being a part of the “network.”
These blocks are timestamped so that every node in the network can view the group text message and determine the order of every text. To prevent troublemakers from tampering with the text messages or blocks, each block is encrypted using a hash function, “a mathematical process that takes input data of any size, performs an operation on it, and returns output data of a fixed size.”[12]
To add a block to the chain, nodes within the network compete to complete a complex mathematical puzzle.[13] The solution to the puzzle can only be achieved through sheer computing power as each node tests different potential solutions until one of the nodes cracks the puzzle; hence many nodes within cryptocurrency networks are composed of powerful servers.[14] Once a solution has been found, the solution is broadcast throughout the network and verified. The verification can take “tens of minutes,” which seems like an eternity in the world of computing, but is a significant decrease from the processing time required for transactions through intermediaries.[15] As soon as a majority of the computing power in the network has reached consensus and verified the solution to the puzzle, the block is added to the end of the chain—becoming the most recent text in our metaphorical group text message—and the node that solved the puzzle is awarded a set amount of the cryptocurrency as a transaction fee or bounty. The rules governing this system and the requirement to solve the puzzle before adding the block with the encrypted transaction are collectively the “proof-of-work” protocol.[16] Because the winner of the competition—the node that solved the puzzle—receives tokens that had not previously been in circulation, this entire competition process is referred to as “mining.”[17] Therefore, each of the competing nodes in the network are often called “miners.”
Joining a network and “cashing out”
Individuals can join a public blockchain network such as the Bitcoin blockchain with relatively basic hardware, however the complexity of the software and its intimidating user interface discourages many non-specialists from participating in the network.[18] Yet with a spare laptop (with at least 150GB of storage and 2GB of RAM), anyone can download the code for the public blockchain she would like to join and begin functioning as a node in the network, helping to verify solutions in the proof-of-work process.[19] If a person is looking to start mining a cryptocurrency, he will need to invest in more powerful, specialized computer servers than the typical “lightweight” verifying nodes.
Like traditional currencies, cryptocurrencies can be exchanged for other cryptocurrencies and for an individual’s own fiat currency. For example, if I’m an American and want to change my Bitcoin into dollars, I can go through an online exchange that will charge me a small fee to exchange my Bitcoin into US dollars. These exchanges are targets for hackers because of their vulnerable position on the border between digital and “concrete” assets but do not have the same security of the immutable ledger.[20]
Inherent characteristics
With this basic understanding of blockchain technology, we can return to blockchain’s initial value proposition and see how it prevents most cases of double-spending.[21] Since every transaction is accounted for within the blockchain, anyone within the network can look back through the ledger and trace the movements of each token. Blockchain is a particularly secure form of database for two reasons: 1) every node in the network has a copy of every transaction in the ledger, and 2) each block contains a portion of the information from the previous block. If hackers were to attempt to change the data, they would need to control over 50 percent of the network’s computing power and alter the block with the information they wanted to change, in addition to all the subsequent blocks in the chain.
Figure 4: simplified composition of a blockchain.[22] Illustration by Matthäus Wander, Wikimedia.
The characteristics of blockchain translate to three inherent strengths for the technology: transparency, security, and relative efficiency. These strengths, in turn, lead to an important result: they establish trust, or a proxy for trust, where trust otherwise doesn’t exist. In other words, they eliminate the need for an intermediary. This outcome worries rent-seeking intermediaries, chief among them the federal government and banks, who currently benefit from the status quo and are threatened by the implications of blockchain.[22] In an early move to stem the threat of cryptocurrencies, over 40 financial institutions have backed their own distributed ledger.[23] The federal government has protested the cryptocurrency advances by dragging its feet. Ironically, such opposition may prove to be to the advantage of cryptocurrency—regulation too early may stymie innovation, even if it creates a “Wild West” landscape for the time being.
Understanding the technology also reveals under which conditions blockchain is not ideal. Some examples include 1) when no intermediary is involved, 2) when transactions are immediate and cannot be verified across the network quickly enough, 3) when data does not need to be redundant, and 4) when outsiders do not need information stored in the database. Finally, blockchain technology is susceptible to one weakness every database faces: if the data originally entered into the database is incorrect, the data generated will also be corrupted—garbage in, garbage out.[24] For blockchain, the immutability of transactions based on incorrect data is irrelevant.
These strengths and limitations inherent in the technology are central to the discussion of where blockchain belongs relative to other technologies. They also indicate which applications of the technology are most likely to succeed.
TECHNOLOGY LOCATION
Because of its three primary strengths, blockchain has widespread appeal in industries outside cryptocurrency (e.g. finance, healthcare, logistics, real estate, insurance, etc.) as those industries scramble to see if or how blockchain’s strengths influence them. Locating blockchain in relation to other technologies allows us to consider historical analogies that may prove helpful in forecasting blockchain’s impact across the economy. I refute the common conception that blockchain is a disruptive technology, and instead identify two broad technology categories, examining how well blockchain fits within each.
Disruptive technology
Almost daily, we see headlines claiming that blockchain will disrupt one industry or another. While these articles seek to express the potential impact of blockchain by employing the popular verb, disrupt, such use is sloppy. A technology isn’t intrinsically disruptive: rather it can enable disruption as it can enable a company to sustain its competitive advantage. Technology is a component of disruptive innovation, as are the specific business model, resources, process, and priorities of the company built around the new disruption-enabling technology relative to the resources, process, and priorities of the incumbents.[26] Therefore, it is more precise to consider blockchain an enabling technology that may allow startups or established firms to succeed, depending on how they respond to and choose to incorporate or ignore it. This all may seem like splitting semantic hairs, but the implications are important: simply having a cutting-edge technology infrastructure will not equate to market success; more important is how the technology is used.
Blockchain also does not fit the traditional model of disruptive innovation because it doesn’t undercut and replace an incumbent as much as it eliminates the need for an intermediary altogether. In traditional cases of disruptive innovation, such as Toyota, the new entrant offers a lower-end product that attracts the customers least attractive to the incumbent (thus the incumbent cedes this group of customers to the entrant to retain the more desirable customers, those who pay for the higher-end products). As the entrant’s technology and processes improve, the company attracts more and more of the incumbent’s customer base until it has effectively “disrupted” the status quo of the industry. Toyota did not eliminate the intermediary (the car salesman), rather it gave the intermediary a better alternative by not overshooting customer needs.[27]
A similar pattern exists with sharing economy companies, such as Airbnb and Uber (whose status as disruptors is debated, but for our purposes will be considered). While they did employ new technology to disrupt hotels and taxi services initially, they have not eliminated the need for intermediaries, but may have begun to replace them by offering the same service through different means. This brings us to our first great paradox of the blockchain: if someone owns it, they in essence become the intermediary, in which case the inherent strengths of the technology become moot and the company is better off with a traditional database because trust already exists within the owner organization.[28]
Foundational technology
With this dilemma in mind, one solution is to build a product on a public infrastructure rather than attempting to create an independent ecosystem. Imagine, for example, if every website or company tried to create its own Internet. The reason the Internet works is because everyone agrees to use it, a classic example of the network effect. Currently, one major obstacle facing blockchain adoption is no single cryptocurrency or blockchain platform has hit a critical mass of users—how many people do you know who pay for things with Bitcoin?
Nevertheless, the potential is there for one of these platforms to emerge as the public ledger of choice, at which point blockchain could become the foundation of future economies.[29] Hence in Marco Iansiti and Karim R. Lakhani’s January/February 2017 article for Harvard Business Review, they categorize blockchain as a foundational technology like the electrical grid or the Internet, one with “the potential to create new foundations for our economic and social systems.”[30] This opinion is well supported; others have made similar comparisons, most notably the TCP/IP protocol that made email possible.[31]
The attempts to label blockchain as foundational come with the acknowledgement that laying such a foundation will take at least years, if not decades to achieve. Additionally, advocates of this label also admit that “the potential power of this would-be revolution is being actively undercut by the crowd it is attracting, a veritable goon squad of charlatans, false prophets and mercenaries.”[32] That is to say, cryptocurrency is experiencing a bubble that is hindering the meaningful growth of the entire blockchain sector and that meaningful growth won’t come until after the bubble pops.
Niche technology
Classifying blockchain as a niche technology drastically limits the scope of its impact. If blockchain is a niche technology, it likely fits a few, specific use cases but will not see the massive adoption so many are predicting. If this is the right category for blockchain, once its bubble bursts, we will see it consistently used in only a handful of industries.
Surprisingly, one of the pioneers of the “blockchain revolution” classifies blockchain as a niche technology. Medici Ventures, a wholly owned subsidiary of Overstock.com, oversees “the company’s investments in firms building solutions leveraging and servicing blockchain technologies.”[33] The firm anticipates that blockchain will have a significant impact in a few key areas and restricts its investments accordingly: capital markets, money and banking, identity, voting, land, and underlying tech.
Medici Framework
Steve Hopkins, General Counsel and Chief Operating Officer at Medici, relies on a simple, two-question framework for assessing potential blockchain investments:
- Is the idea actually a business?
- Does the business need blockchain?
Many entrepreneurs are excited about blockchain’s potential, but do not consider if their use of blockchain will result in a viable, revenue-generating venture or if the business would be successful even without blockchain. Instead, as entrepreneurs and established firms join in the pursuit of blockchain’s white whale, many are quick to think up solutions that are economically infeasible or to bolt on the technology to a structure that fails to optimize blockchain’s intrinsic strengths.
With regards to the first question in the framework, Hopkins gives the example of browser/micropayment platforms like Brave. Such platforms grant users access to an ad-reduced web surfing experience.[34] With the ad-reduced browser, verified advertising partners make micropayments recorded on the platform’s blockchain to ensure that only precisely targeted ads reach the users most likely to benefit from the ad. While the concept sounds compelling by addressing a real user pain point, and although Brave is being developed by Brendan Eich of Mozilla Firefox fame, the numbers may not work out. Like many potential blockchain applications, Brave requires a critical mass before it sees success. Competing against Google, Brave seeks to employ blockchain to displace Google as the intermediary of web services, but Google earns in excess of $95 billion from advertising.[35] Therefore, it is unlikely to cede this core element of its business. Google has maintained such dominance because of its reasonable pricing for advertisers[36] and general reliability for users.[37]
An extreme example of the second question of the framework was the December 21, 2017 name change of Long Island Iced Tea to Long Blockchain.[38] Here is a company in the non-alcoholic drink space whose business model has no real use for a distributed ledger, yet relied on a bit of wordplay to see a temporary jolt in its price. The company hasn’t made its intentions clear whether it would use blockchain to oversee its logistics and distribution, or if the name change indicates a more dramatic change in direction, a “long-jump” as described by Daniel A. Levinthal in “Adaptation on Rugged Landscapes,”[39] but statements from the executive team hint towards the latter option: “Our ultimate goal is to build a portfolio of investments that touch multiple points in the blockchain ecosystem.”[40]
Footnotes
[1] After exploring the technology, the SEC and other regulators have largely taken a passive approach, preferring to let the market run its course. One notable exception to this stance came on July 25, 2017, when the SEC issued guidelines surrounding the use of tokens as a security. https://www.sec.gov/oiea/investor-alerts-and-bulletins/ib_coinofferings
[2] “Initial Coin Offering.” This concept plays off the familiar acronym for “Initial Public Offering” and is essentially a means for a startup built on a blockchain to raise capital by issuing to investors tokens that will have utility within the product once the product is functioning.
[3] Satoshi Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” October 2008, https://bitcoin.org/bitcoin.pdf.
[4] Cryptocurrency Market Capitalizations, “All Cryptocurrencies,” accessed February 7, 2018. https://coinmarketcap.com/all/views/all/
[5] This honor goes to DigiCash, created by David Chaum in 1990. https://bitcoinmagazine.com/articles/quick-history-cryptocurrencies-bbtc-bitcoin-1397682630/
[6] It should be noted that Bitcoin’s solution is not the only viable method for addressing double spending. For another decentralized approach, see Brands, S. (1993, August). Untraceable off-line cash in wallet with observers. In Annual International Cryptology Conference (pp. 302-318). Springer, Berlin, Heidelberg. Traditional payment processors (e.g. banks, credit card companies, PayPal) make their money by auditing transactions to deter potential double-spending. This reliance on third-parties and its associated cost was a major driver of Bitcoin’s development.
[7] Chohan, Usman, The Double Spending Problem and Cryptocurrencies (December 19, 2017). Available at SSRN: https://ssrn.com/abstract=3090174 or http://dx.doi.org/10.2139/ssrn.3090174
[8]Erik Bonadonna, Networks II, Course Blog for Cornell University INFO 4220, “Bitcoin and the Double-Spending Problem,” March 29, 2013, accessed February 7, 2018, https://blogs.cornell.edu/info4220/2013/03/29/bitcoin-and-the-double-spending-problem/.
[9] Of course, this assumes that both websites accept the digital file as a form of payment.
[10] Due to the high energy and monetary costs of the proof-of-work protocol, some cryptocurrencies, including Ethereum, have begun switching to an alternative “proof-of-stake” protocol. See Amir Rosic, https://blockgeeks.com/guides/proof-of-work-vs-proof-of-stake/.
[11] The term “mining” is a bit of a misnomer. While a byproduct of the process is that new tokens are brought into circulation and awarded to the “miner,” the coins are really just an incentive for miners to extend the blockchain and process transactions.
[12] Corin Faife, Coindesk, “Bitcoin Hash Functions Explained,” February 19, 2017, accessed February 7, 2018, https://www.coindesk.com/bitcoin-hash-functions-explained/.
[13] Not all nodes in the network compete to solve the puzzle, but all nodes will verify the solution to the puzzle once a potential solution has been found.
[14] To date, some of the largest acquisitions in the crypto space have been hardware, not actual cryptocurrencies. See Stan Higgins, Coindesk, “Maker of First Bitcoin Mining ASIC Acquired in What Could Be Industry’s Largest Sale,” June 8, 2016, accessed January 22, 2018, https://www.coindesk.com/bitcoin-mining-asic-acquired-avalon/.
[15] Chohan [need page number]. See Appendix A
[16] This protocol was first developed in the early 1990s to deter distributed denial of service (DDoS) attacks from flooding email inboxes with spam. See Dwork, Cynthia; Naor, Moni (1993). “Pricing via Processing, Or, Combatting Junk Mail, Advances in Cryptology”. CRYPTO ’92: Lecture Notes in Computer Science No. 740. Springer: 139–147.
[17] The tokens that a miner receives for its work are not in circulation before being mined, but had been written into the program and held in reserve so that when a puzzle was solved so many of the “buried” tokens would be released. The number of tokens released for each additional block changes over time. In the case of Bitcoin, there are currently about 18 million in circulation. Ultimately, this number will reach 21 million, at which point miners will no longer “unearth” new Bitcoin, but rather charge a fee for processing the transaction.
[18] Although step-by-step instructions for setting up a node within a blockchain network, beginning to mine a cryptocurrency, or exchanging a cryptocurrency for a fiat currency are all beyond the scope of this paper, I have included general requirements to make the entire system a little more concrete. https://99bitcoins.com/step-by-step-guide-firing-up-bitcoin-node/
[19] https://bitcoin.org/en/full-node#what-is-a-full-node
[20] https://www.ft.com/content/aa9fdd64-e536-11e7-97e2-916d4fbac0da https://www.bloomberg.com/news/articles/2018-01-28/massive-cryptocurrency-heist-puts-spotlight-on-exchange-security https://blog.sqreen.io/cryptocurrency-exchanges-security/
[21] Some forms of double-spending attacks still work, but in order to work both transactions must occur before the network has time to verify the first transaction. For this reason, blockchain is not optimal for instances when transactions need to be instantaneous or nearly instantaneous. For examples of this potentially harmful double-spending, see Chohan and Bonadonna.
[22] The Tx_Root, or the Merkle Root, “is a reduced representation of the set of transactions that is confirmed with the block.” The Nonce are arbitrary digits added on to the block to make the proof-of-work more difficult to solve. See https://bitcoin.stackexchange.com/questions/12427/can-someone-explain-how-the-bitcoin-blockchain-works
[23] This concern may explain Jamie Dimon’s criticism of Bitcoin: if he could persuade people to walk away from a new entrant threatening his firm’s position while offering them a comparable alternative, he could possibly avoid being disrupted. Hence his condemnation of Bitcoin and his simultaneous endorsement of blockchain. See http://fortune.com/2017/09/13/jamie-dimon-bitcoin-blockchain/. Since this statement, he has since retreated somewhat, while still emphasizing the underlying blockchain technology: https://www.cnbc.com/2018/01/09/jamie-dimon-says-he-regrets-calling-bitcoin-a-fraud.html. See also https://finance.yahoo.com/news/jpmorgans-farooq-blockchain-will-radical-impact-businesses-220312432.html/
[24] https://www.corda.net/2017/05/r3-secures-largest-ever-investment-distributed-ledger-technology-usd-107-million-40-institutions/
[25] See https://hbr.org/2017/03/how-blockchain-applications-will-move-beyond-finance.
[26] Correspondence with Aticus Peterson, Associate at Rose Park Advisors (https://www.roseparkadvisors.com/). Rose Park is the investment firm founded by Clayton Christensen, the father of “disruptive innovation.”
[27] Clayton M. Christensen, Matt Verlinden, and George Westerman, “Disruption, disintegration and the dissipation of differentiability,” Industrial and Corporate Change, vol. 11, no. 5, 955–993.
[28] The takeaway: when companies say they are exploring utilizing blockchain, dig a little to see if they are actually rebuilding their products on top of a platform like Ethereum, or if they are simply converting their current database to another.
[29] Steps have already been taken in this direction: Overstock.com accepts Bitcoin as a form of payment while IBM and Microsoft Azure have coalesced around Ethereum.
[30] Marco Iansiti and Karim R. Lakhimi, “The Truth about Blockchain,” Harvard Business Review, vol. 95, 1, p. 120.
[31] Steven Johnson, “Beyond the Bitcoin Bubble,” The New York Times Magazine, January 16, 2018.
[32] Ibid.
[33] http://www.mediciventures.com/bio/
[34] https://brave.com/about-ad-replacement/
[35] https://www.sec.gov/Archives/edgar/data/1652044/000165204418000007/goog10-kq42017.htm
[36] Google offers an extremely flexible pricing model. https://www.google.com/adwords/costs/?channel=ha&subid=us-en-ha-g-aw-c-bk_mv_exa_1!o2-201167645-237671285912-kwd-32200984791
[37] One notable exception was the YouTube child exploitation scandal, a scenario Brave could potentially avoid through its partner verification platform. https://www.cnbc.com/2017/11/27/advertisers-put-youtube-ads-on-hold-after-child-exploitation-scandal.html
[38] https://www.bloomberg.com/news/articles/2017-12-21/crypto-craze-sees-long-island-iced-tea-rename-as-long-blockchain
[39] Daniel A. Levinthal, “Adaptation on Rugged Landscapes.” Management Science 43, no. 7 (1997): 934-50. http://www.jstor.org/stable/2634336.
Valuable information. Fortunate me I discovered your website by chance, and I’m shocked why this twist of fate did not took place earlier! I bookmarked it.
“Pretty nice post. I just stumbled upon your
weblog and wanted to say that I’ve truly enjoyed surfing
around your blog posts. After all I will be subscribing to your rss feed and I hope you write
again soon!”
I have tried the hole list. Its really nice to say that all are working very well. Before this i has others list of blog for comment from different website, but the list which they are provided was not good enough. Now i have get the real and quality list. Thank you for this article
I think this post is very helpfull for me……! Thanks for published this with us. I will follow which you provide us. Waiting for next post. Thanks.
This website was… how do I say it? Relevant!! Finally I’ve found something that helped me. Appreciate it!