Regulating the Blockchain. An in-depth look at the most pressing legal issues facing these technologies.

Similar documents
CHAPTER Committee Substitute for House Bill No. 729

Wallet Technology. Information Presentation

Body Art Technician License Application

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2001 H 1 HOUSE BILL 635. March 15, 2001

IC Chapter 19. Precious Metal Dealers

Superwallet User Manual

A Bill Regular Session, 2007 SENATE BILL 276

How to Create Your Cryptocurrency Wallet and Add PumaPay Tokens

As Engrossed: S2/1/01. By: Representatives Bledsoe, Borhauer, Bond, Rodgers, Green. For An Act To Be Entitled

LICENSE REQUIRED FOR TATTOO ESTABLISHMENT AND/OR BODY PIERCING ESTABLISHMENT.

imtokenwallet Manual If you have any question, please contact us via our telegram (

Wallet Cryptography 101. Steve Swing Substratum

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL

[Second Reprint] ASSEMBLY, No STATE OF NEW JERSEY. 218th LEGISLATURE INTRODUCED FEBRUARY 8, 2018

Body Art Temporary Technician License

TATTOOIST AND BODY PIERCING APPRENTICE

CITY OF HAMILTON BY-LAW NO

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL

LICENSE AGREEMENT FOR MANAGEMENT 3.0 FACILITATORS

CRYPTOCURRENCY FOR THE FASHION COMMUNITY

TATTOOIST AND BODY PIERCING

PLEASE NOTE: ADDITIONAL DOCUMENTATION ON PAGE 2 MUST BE SUBMITTED WITH THIS APPLICATION. Name Business is Conducted Under (DBA):

14.22 TATTOO AND BODY PIERCING ESTABLISHMENTS.

Restrictions on the Manufacture, Import, and Sale of Personal Care and Cosmetics Products Containing Plastic Microbeads. Overview

House Bill 2587 Sponsored by Representative BARNHART (Presession filed.)

Type of Application (Check One) New Protocol Revised Protocol Project Duration Start Date: End Date:

Session of 2006 No AN ACT

United States Standards for Grades of Cucumbers

TATTOOING, BODY PIERCING, PERMANENT COSMETICS & BRANDING APPLICATION FOR REGISTRATION

GUIDELINES FOR THE IMPLEMENTATION AND ENFORCEMENT OF BOSTON PUBLIC HEALTH COMMISSION S BODY ART REGULATIONS

RESEARCH PERMIT SIGN-OFF SHEET. The attached research application has been reviewed by the individuals below with recommendations as follows:

CHAPTER 114: TATTOO AND BODY PIERCING SERVICES

HOUSE OF REPRESENTATIVES STAFF ANALYSIS REFERENCE ACTION ANALYST STAFF DIRECTOR

THE GOVERNMENT SOCIALIST REPUBLIC OF VIETNAM Independence - Freedom - Happiness No. 79/2012/ND-CP Hanoi, October 05, 2012

A Bill Regular Session, 2013 SENATE BILL 388

E-commerce. E-commerce: Digital Markets and Digital Goods

Logo Usage Licence Agreement For the use of the Responsible Wood and PEFC Trademarks

The Pyidaungsu Hluttaw hereby enacts this law. 2. The following expressions contained in this law shall have the meanings given hereunder:-

ALUTIIQ MUSEUM & ARCHAEOLOGICAL REPOSITORY 215 Mission Road, Suite 101! Kodiak, Alaska 99615! ! FAX EXHIBITS POLICY

BILL 2 (2011): TATTOOS-MINORS: WITHOUT PARENTAL CONSENT A YOUTH MUST BE A MINIMUM OF 16 TO RECEIVE A TATTOO.

The 17 th Western China International Fair 2018

Virginia City Montana ART SHOW application

INSTRUCTIONS FOR SUBMITTING AN APPLICATION FOR TATTOO AND/OR BODY PIERCING BUSINESS LICENSE

agriculture, forestry & fisheries InfoPak English Animal Identification Act (Act No. 6 of 2002) in terms of

In 2014 Antioch Hosts our 5TH Annual Public Art Program REFLECTIONS ON THE CHAIN Artists: Showcase your Artistic Talents

Arraignment Calendar

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF NORTH CAROLINA WESTERN DIVISION

H 7626 S T A T E O F R H O D E I S L A N D

EXHIBITOR APPLICATION

Tattoo Parlours Act 2012 No 32

Be It Enacted by the Legislature of the State of Florida: Page 3 of 33. CODING: Words stricken are deletions; words underlined are additions.

Florida Senate SB 828 By Senator Crist

COSMOS-standard. Labelling Guide. Version 1.4 September 3 rd 2014

BID NO INVITATION TO BID BID FORM

Electra Desktop Wallet Set-Up Guide

This is one of the most frequently cited OSHA standards.

REACH AND ITS IMPACT ON COSMETICS

Spring 2005 Pollution Prevention Workshop For Healthcare

ASSEMBLY BILL NO Pursuant to Article V, Section I, Paragraph 14 of the New. Jersey Constitution, I am returning Assembly Bill No.

As Introduced. 130th General Assembly Regular Session H. B. No A B I L L

Boise Art Museum 2018 Art in the Park Prospectus WELCOME

1 NORTHEAST 40 STREET,

The First Crypto-Currency For Printing. WHITE PAPER - LITE VERSION

CHAPTER 126 (CORRECTED COPY)

Chapter 67. BODY ART ESTABLISHMENTS (TATTOOING) Established (09-56)

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2017 S 1 SENATE BILL 382. Short Title: Mobile Beauty Salons. (Public)

User Manual Banknotes

Case 1:18-cv KMT Document 1 Filed 08/16/18 USDC Colorado Page 1 of 14 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO

The City of Jacksonville presents

SUTTER COUNTY DEVELOPMENT SERVICES DEPARTMENT

BITCOIN TRANSACTION MALLEABILITY THEORY IN PRACTICE

FINAL DRAFT UGANDA STANDARD

ASSEMBLY, No STATE OF NEW JERSEY. 216th LEGISLATURE PRE-FILED FOR INTRODUCTION IN THE 2014 SESSION

INSTRUCTIONS FOR SUBMITTING AN APPLICATION FOR TATTOO AND/OR BODY PIERCING APPLICANT LICENSE

IMPORT AND EXPORT OF CURRENCY NOTES AND COINS, FOREIGN EXCHANGE, GOLD, SILVER, JEWELLERY AND SECURITIES ETC.

WASHABLE NOSE, EAR & EYEBROW TRIMMER

EXHIBITION GUIDELINES

Assembly Amendment to Senate Bill No. 193 (BDR ) Proposed by: Assembly Committee on Commerce and Labor

As Reported by the Senate Commerce and Labor Committee. 130th General Assembly Regular Session Sub. H. B. No

REACH AND ITS IMPACT ON COSMETICS

EXHIBITOR APPLICATION

As Introduced. 129th General Assembly Regular Session H. B. No A B I L L

KoC03of. 510(k) SUMMARY. Lexington International, LLC LaserComb. Submitter's Contact Information. Name: David Michaels, Managing Director JAN

Senate Bill No. 193 Senator Hardy. Joint Sponsors: Assemblymen Hardy and Stewart

STUDENT HAIR COMPETITIONS

Product Information File & Cosmetic Product Safety Report

PRECISION PERSONAL GROOMER

CITY OF COKATO ORDINANCE NO. AN ORDINANCE REGULATING TATTOO AND BODY PIERCING ESTABLISHMENTS

JOHN DUANE MOLTZEN (DOB: 02/14/1979) Summons Warrant TH AVE Order of Detention

Connecticut 4-H Smart Shopper Workbook. Name: Age: Club:

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF MISSOURI EASTERN DIVISION ) ) ) ) ) ) ) ) )

HOUSE BILL lr1954 A BILL ENTITLED. State Board of Cosmetologists Licensing Hair Braiders, Cosmetology Assistants, and Microdermabrasion

ST. NINIAN S RC PRIMARY SCHOOL

University of Wisconsin-Madison Hazard Communication Standard Policy Dept. of Environment, Health & Safety Office of Chemical Safety

COSMOS-standard. Labelling Guide

Management Information Systems

little treasures 2019

化妆品监督管理条例. Regulations concerning the Supervision and Administration over Cosmetics (Draft) Translated by Chemlinked

CSR, Sustainability, Ethics & Governance

Transcription:

Regulating the Blockchain An in-depth look at the most pressing legal issues facing these technologies.

Presenters Brian Klein, Baker Marquart Elijah Alper, WilmerHale Dana Syracuse, BuckleySandler Patrick Murck, Pillsbury and the Berkman Center for Internet & Society Reuben Grinberg, Davis Polk Byron Rooney, Davis Polk Peter Van Valkenburgh, Coin Center

Agenda Peter: Multi-sig Applications and Consumer Protection. Brian: 18 USC 1960: The Most Important Criminal Statute You ve Never Heard Of Elijah: BSA Regulation and FinCEN's Choice to Classify all Bitcoin Activities as Money Transmission. Dana: How Regulatory Issues Differ Between Consumer and Enterprise Business Models. Patrick: UCC Article 9 and Bitcoin Fungibility Reuben and Byron: Facilitating Securities Transactions with Blockchain: a Regulatory Case Study.

When does a company actually control virtual currency? What are cryptocurrency transactions? And how do multi-sig and n-lock transactions work? Peter Van Valkenburgh

First, forget what you think you know about bitcoin (keys, blockchains etc.). Here s how a transaction actually works...

Every cryptocurrency transaction is an answer to a previous challenge and the creation of a new challenge.

These are NOT transactions: Please send five bitcoin to my friend Dana. Please send address xya42g00 five bitcoin. Here are the keys to these five bitcoins.

Every cryptocurrency transaction is an answer to a previous challenge and the creation of a new challenge.

This is a transaction: This is my proof that I have the answer (5) to the challenge (3+2=?) which previously locked bitcoins z. Creation of new challenge. { } Answer to previous challenge. Now make bitcoins z only spendable by whoever can prove that they have answer to new challenge (2+2=?).

The Cryptocurrency Network Evaluates Answers and (if correct) Records New Challenges. Previous Challenge: 3+2=? Public Blockchain User Answers Challenge: 5 User Can set new challenge: 2+2=? Public Blockchain

Now, whoever can answer the new challenge can spend the bitcoin. New challenge: 2+2=? Public Blockchain The answer is 4! Now here s my new challenge...

Instead of a math challenge and answer: 4+4+? 8! We can make the challenge use digital signatures (used for authentication online) with matching public-private keys. What is digital signature of the private key matching this public key (address)? Digital signature that could only have been made by person with private key!

This is also a transaction: This is a signature made with private key x that matches address y which previously locked bitcoins z. Creation of new challenge. { } Answer to previous challenge. Now make bitcoins z only spendable by person who can sign with private key a that matches address b.

If someone else tells you the address that matches their private key, you can send them bitcoins. Previous Challenge: Sign with Key x that Matches Address Y Public Blockchain User Answers Challenge: Signature of Key x User Can set new challenge: Sign with Key a that matches Address b Public Blockchain

Now, whoever can answer the new challenge can spend the bitcoin. User Answers Challenge: Signature of Key x User Can set new challenge: Sign with Key a that matches Address b Public Blockchain I have key a! That means I now control those bitcoins.

KEYS COINS

KEYS COINS EXAMPLE: keys that had no prior transactions using them as the challenge. These are keys to nothing!

KEYS = something that might be needed to control coins.

What is MULTI-SIG?

This is a multi-sig transaction: same as before This is the digital signature of key x that matches address y which previously locked bitcoins z. Creation of new challenge. { } Answer to previous challenge. Now make bitcoins z only spendable by person(s) who can sign with two of of the following three keys that match address b.

MULTI-SIG transactions create challenges where M of N keys are needed to spend bitcoins.

15 of 15 keys needed. 2 of 3 keys needed. M of N? 1 of 1 key needed. 3 of 5 keys needed.

This is a 1 of 9 in real life!

What is N-LOCK?

This is an n-lock transaction: same as before This is my proof that I have key x that matches address y which was previously sent bitcoins z. Creation of new challenge. { } Answer to previous challenge. Now make bitcoins z only spendable by person who can prove that they have key a that matches address b after this date in the future.

N-LOCK transactions create challenges where bitcoins can only be spent after a certain amount of time.

N-lock is like giving someone a future-dated check.

The world of possible wallets: Hosted Software Multi-sig Multi-sig with KRS Multi-sig with N-lock

Hosted Wallet Bitcoins locked with simple one key challenge statement, wallet provider generates key and stores it for user in data center, user can request transactions on website. Public Blockchain Hosted Wallet Inc. User

Software Wallet Bitcoins locked with simple one key challenge statement, wallet provider writes software that user runs on her own computer, user generates key and stores it for herself. Public Blockchain User Software Wallet Inc.

Multi-sig Wallet Bitcoins locked with 2 of 3 multisig challenge statement, wallet provider generates one key and stores it for user, user generates and stores other two keys. Public Blockchain User Multisig Wallet Inc.

Multi-sig Wallet Transactions Public Blockchain User Multisig Wallet Inc. Public Blockchain User Multisig Wallet Inc.

Multi-sig Wallet with KRS Public Blockchain X User X Multisig Wallet Inc. Key Recovery Service Inc.

Multi-sig Wallet with N-lock Public Blockchain User If after 10 days, then move balance to 1 key address. [key signatures] N-lock transaction X Multisig Wallet Inc.

So when is the user bearing the risk and when is the company?

Hosted Wallet Public Blockchain Hosted Wallet Inc. User RISK / CONTROL Software Wallet Public Blockchain User RISK / CONTROL Software Wallet Inc.

Multi-sig Wallet (user 2 keys) Public Blockchain User RISK / CONTROL Multisig Wallet Inc.

Multi-sig Wallet (company has 2 keys) Public Blockchain User Multisig Wallet Inc. RISK / CONTROL

Multi-sig Wallet with KRS LEGEND Contract Public Blockchain Multisig Wallet Inc. User RISK / CONTROL Key Recovery Service Inc. RISK / CONTROL

Multi-sig Wallet with N-lock Public Blockchain User RISK / CONTROL AFTER 10 DAYS If after 10 days, then move balance to 1 key address. [key signatures] N-lock transaction Multisig Wallet Inc.

Who are the companies in these categories?

Hosted Wallet Companies Hosted Wallet Bitcoins locked with simple one key challenge statement, wallet provider generates key and stores it for user.

Software Wallet Companies Software Wallet Bitcoins locked with simple one key challenge statement, wallet provider writes software that user runs on her own computer, user generates key and stores it for herself.

Multi-sig Companies Multi-sig Wallet Bitcoins locked with 2 of 3 or other multisig challenge statement, wallet provider retains at least one key and stores it for user, user stores other two keys or uses KRS.

Multi-sig N-lock Companies Multi-sig N-lock Wallet Bitcoins locked with 2 of 2 multisig challenge statement, wallet provider generates and stores one key, user generates and stores second key. Additional N-Lock transaction signed by both will refund all bitcoin back to user in future.

What happens if the company is hacked?

What if hacked? Hosted Wallet: Company s keys may be stolen, if so user s bitcoin is also stolen. Hosted Wallet Bitcoins locked with simple one key challenge statement, wallet provider generates key and stores it for user. Examples:

What if hacked? Software Wallet: Company does not have keys on their servers, hackers have nothing to steal. Software Wallet Bitcoins locked with simple one key challenge statement, wallet provider writes software that user runs on her own computer, user generates key and stores it for herself. Examples:

What if hacked? Multi-sig Wallet: Company s key may be stolen, but one key of three is insufficient to steal the bitcoin. User can move bitcoin to new wallet with her two keys. Multi-sig Wallet Bitcoins locked with 2 of 3 multisig challenge statement, wallet provider generates one key and stores it for user, user generates and stores other two keys. Examples:

What if hacked? Multi-sig N-Lock Wallet: Company s key may be stolen, but insufficient to steal bitcoin. Hacker could block user from transacting, but user regains full control at end of n-lock. Multi-sig N-lock Wallet Bitcoins locked with 2 of 2 multisig challenge statement, wallet provider generates and stores one key, user generates and stores second key. Additional N-Lock transaction signed by both will refund all bitcoin back to user in future. Examples:

What about multi-sig companies that have M of N (e.g. 2 of 3) keys? or have a partner company that along with them has sufficient keys to transact without the user?

The company or companies are effectively a hosted wallet. They can be hacked & bitcoin stolen.

The best way to draw the line between companies that do hold bitcoin and those that don t is...

asking whether the company can unilaterally transact, or prevent transactions...

and if they can prevent, is there a reasonable timelimit (n-lock) that safely returns full control to the user?

Additionally, we should wonder...

Are wallets the only use case for multi-sig?

ESCROW INTERNAL CONTROLS ARBITRATION Not even close. METERING MARGIN/HEDGING SHARED ACCOUNTS

Problem: We don t want to regulate any of these uses as money transmission. But it s hard to draft an exemption that would cover all possible non-money transmission uses. ESCROW INTERNAL CONTROLS ARBITRATION METERING MARGIN/HEDGING SHARED ACCOUNTS

Solution: When properly set up, none of the providers of these tools will have the unilateral ability to execute, and those able to prevent will be reasonably time-limited. ESCROW INTERNAL CONTROLS ARBITRATION METERING MARGIN/HEDGING SHARED ACCOUNTS

Therefore, a definition like this: Control of Virtual Currency means possession of sufficient credentials or authority on a network to execute unilaterally* or prevent indefinitely** virtual currency transactions. * thus excluding multi-sig minority key holders Ensures that companies at risk and in control are included: ** thus excluding key holders who offer n-lock refunds And that innovative and lowrisk companies are not:

Please visit coincenter.org to learn more.

18 USC 1960 The Most Important Criminal Statute You ve Never Heard Of

18 U.S. Code 1960 - Prohibition of unlicensed money transmitting businesses (a) Whoever knowingly conducts, controls, manages, supervises, directs, or owns all or part of an unlicensed money transmitting business, shall be fined in accordance with this title or imprisoned not more than 5 years, or both....

18 U.S. Code 1960 (b) As used in this section (1) the term unlicensed money transmitting business means a money transmitting business which affects interstate or foreign commerce in any manner or degree and (A) is operated without an appropriate money transmitting license in a State where such operation is punishable as a misdemeanor or a felony under State law, whether or not the defendant knew that the operation was required to be licensed or that the operation was so punishable; (B) fails to comply with the money transmitting business registration requirements under section 5330 of title 31, United States Code, or regulations prescribed under such section; or (C) otherwise involves the transportation or transmission of funds that are known to the defendant to have been derived from a criminal offense or are intended to be used to promote or support unlawful activity;