SlideShare une entreprise Scribd logo
1  sur  35
A M L / C F T
p r i v a c y
b i g d a t a
DIGITALIDENTITY
s e c u r i t y
Redefining
FINTECH
MONEY
Of the 7 billion people alive on the
planet, 1 . 1 B I L L I O N subsist below
the internationally accepted extreme-
poverty line of $1.25 A DAY.
The Economist
IDENTITY
LAW ENFORCEMENT
96 97 98 99 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15
browser
tokens
rewards
WOW
Ripple Protocol
EGold
Bitcoin
Protocol
Ven
Ripple XRP
Litecoin
Linden Dollars
Entropia Universe
QQ
Online
Exchanges
Altcoin Explosion
Regulated
Exchanges
Beenz
Flooz
Colored Coin
Smart Contracts
Ethereum
Square Cash
Amazon Coin
Sovereign Coin
Real Estate
Equities
Derivatives
?
B i t c o i n O p e n S o u r c e P r o t o c o l S o l v e s
D o u b l e S p e n d P r o b l e m v i a O p e n L e d g e r
PEER
PEER PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER PEER
PEER
PEER
PEER
PEER
PEER
PEER
PEER
NO central authority or
financial institution in control
M AT H - E N F O R C E D T R U S T
REVOLUTIONARY
Every transaction that has ever occurred
in the history of the Bitcoin economy is
publicly viewable in the an open ledger
called BLOCKCHAIN.
Privacy without anonymity 
Pseudonymity
REVOLUTIONARY
identity + payment
identity + payment
CONSUMER privacy protected
MERCHANTno chargebacks / fraud
Payment only
PARADIGMS
CHALLENGED
trust security
custody control
A M L / C F TTODAY
- national security and crime deterrence are top public policy
priorities
- unintended consequence → selective inclusion facilitates
fiscal surveillance but creates financial exclusion of
underprivileged
- stick over carrot (heavy hand)
- anonymity and privacy are anathema
TOMORROW
- carrot over stick (lighter hand)
- measure proportion and results
- layered, zero-knowledge, identity systems could meet both
law enforcement and civil liberties goals
I D E N T I T Y
TODAY
- Countries have the monopoly over a person’s identity (mostly,
for fiscal reasons)
- Not all countries have reliable identification systems
- Government-issued IDs are not necessarily effective in
deterring crime/unmistakably identifying humans
TOMORROW
- Alternative identity systems that transcend borders and
facilitate identification of previously disenfranchised persons
- Identity systems that balance both transparency and privacy
(ID3/Windhover Principles)
“ Yo u r I P a d d r e s s i s y o u r
‘ i n t e r n a t i o n a l ’ i d e n t i t y c a r d ”
P R I VA C Y
TODAY
- Radical transparency jeopardizes privacy
- Slowly being eroded via tax compliance regulations, elimination
of secrecy havens, digitization of money
TOMORROW
- Leverage zero-knowledge proof technology → tokenization
(Windhover Principles)
- Privacy without anonymity = pseudonymity (first payment; then,
identity)
B I G D ATA
“With a bit of data mining, my concern is that
[companies & the government] will get a lot of
information. The things people are doing to protect
themselves today are pretty naive compared to the
kinds of clever data mining tricks that exist. I’m
worried that a lot of people are doing things that are
leaving a permanent history and will then
inadvertently leave some trace that reveals their actual
identity.
Anonymous
Untraceable
“Invisible to law enforcement and the taxman”
• The entire history of Bitcoin transactions is publicly available.
• “Using an appropriate network representation, it is possible
to associate many public-keys with each other, and with
external identifying information.”
• “Large centralized services such as the exchanges and wallet
services are capable of identifying and tracking
considerable portions of user activity.”
A n A n a l y s i s o f A n o n y m i t y i n t h e
B i t c o i n S y s t e m – B i t c o i n i s N o t
A n o n y m o u s
by Fergal Reid and Martin Harrigan (2011)
• The demonstrated centrality of these services makes it difficult for even highly
motivated individuals— e.g., thieves or others attracted to the anonymity
properties of Bitcoin—to stay completely anonymous, provided they are
interested in cashing out by converting to fiat money (or even other virtual
currencies).
• The increasing dominance of a small number of Bitcoin institutions (most notably
services that perform currency exchange), coupled with the public nature of
transactions and our ability to label monetary flows to major institutions, ultimately
makes Bitcoin unattractive today for high-volume illicit use such as money
laundering.
• A well and fairly regulated virtual currency industry makes it exceedingly difficult
for bad actors to use the system for illicit activities.
A F i s t f u l o f B i t c o i n s
by Sarah Meiklejohn et al (2013)
Anonymous
Untraceable
“Invisible to law enforcement and the taxman”
Myths
enhanced surveillance and control
S E C U R I T Y
TODAY
- role-based access control
- Digital tokens are bearer instruments: lose the key,
lose the asset forever
- Information security risks increase with digitization
TOMORROW
- customer-centric custody and security (via multi-
signature escrow)
A M L / C F T
p r i v a c y
b i g d a t a
DIGITALIDENTITY
s e c u r i t y
Redefining
MUST
WANT
CAN
© 2015 Juan Llanos
WANT – MUST = CAN
RETHINK
REDEFINE
REINVENT
INNOVATE
& Reinvent the World
INFLUENCE
Public Policy
IMPLEMENT
Mandatory Rules
© 2015 Juan Llanos
INNOVATE
IMPLEMENT
Clientelism
Inflexibility
Exclusion
Inequality
© 2015 Juan Llanos
We innovate within
outdated, inflexible,
anachronistic legal and
regulatory frameworks
INNOVATE
INFLUENCE
Disarray
Capture
Recklessness
Chaos
© 2015 Juan Llanos
We innovate and influence
policy to accommodate
our interests, but we really
don’t implement effective
controls.
IMPLEMENT INFLUENCE
Monopoly
Entropy
Ossification
Irrelevance
© 2015 Juan Llanos
We stay where we are
because we don’t have
an innovation-friendly
environment
INNOVATE
& Reinvent the World
INFLUENCE
Public Policy
IMPLEMENT
Mandatory Rules
© 2015 Juan Llanos
Responsible
Evolution
@JuanLlanos
Thank you!

Contenu connexe

Tendances

A Cyber Security Facade
A Cyber Security FacadeA Cyber Security Facade
A Cyber Security Facade
Bob Fonow
 
Virtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerceVirtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerce
Vijayan Ganapathy
 

Tendances (11)

Ignite - Come imparare ad amare la pirateria e vivere felici
Ignite - Come imparare ad amare la pirateria e vivere feliciIgnite - Come imparare ad amare la pirateria e vivere felici
Ignite - Come imparare ad amare la pirateria e vivere felici
 
Electronic Frontier Foundation - Locational Privacy
Electronic Frontier Foundation - Locational PrivacyElectronic Frontier Foundation - Locational Privacy
Electronic Frontier Foundation - Locational Privacy
 
A Cyber Security Facade
A Cyber Security FacadeA Cyber Security Facade
A Cyber Security Facade
 
2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)
 
Drugs & the Dark Net
Drugs & the Dark NetDrugs & the Dark Net
Drugs & the Dark Net
 
Power Points from Keynote Address at the 30th Annual International Training C...
Power Points from Keynote Address at the 30th Annual International Training C...Power Points from Keynote Address at the 30th Annual International Training C...
Power Points from Keynote Address at the 30th Annual International Training C...
 
Virtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerceVirtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerce
 
RFID and Cash
RFID and CashRFID and Cash
RFID and Cash
 
Blockchain for f Financial Institutions | Asian Development Bank conference
Blockchain for f Financial Institutions | Asian Development Bank conferenceBlockchain for f Financial Institutions | Asian Development Bank conference
Blockchain for f Financial Institutions | Asian Development Bank conference
 
4 REASONS WHY YOUR NATION WILL KILL CASH FOR A DIGITAL CURRENCY
4 REASONS WHY YOUR NATION WILL KILL CASH FOR A DIGITAL CURRENCY4 REASONS WHY YOUR NATION WILL KILL CASH FOR A DIGITAL CURRENCY
4 REASONS WHY YOUR NATION WILL KILL CASH FOR A DIGITAL CURRENCY
 
W3coins
W3coinsW3coins
W3coins
 

Similaire à Madrid - Digital Currency Summit 2015-04-23

DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
Paul Elliott
 

Similaire à Madrid - Digital Currency Summit 2015-04-23 (20)

Business Analysis.pptx
Business Analysis.pptxBusiness Analysis.pptx
Business Analysis.pptx
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
Cryptocurrency - Recommended Coins and Purposes.pdf
Cryptocurrency - Recommended Coins and Purposes.pdfCryptocurrency - Recommended Coins and Purposes.pdf
Cryptocurrency - Recommended Coins and Purposes.pdf
 
How to make money with cryptocurrency in 2022.pdf
How to make money with cryptocurrency in 2022.pdfHow to make money with cryptocurrency in 2022.pdf
How to make money with cryptocurrency in 2022.pdf
 
Cryptocurrency-recommended coins and purposes
Cryptocurrency-recommended coins and purposesCryptocurrency-recommended coins and purposes
Cryptocurrency-recommended coins and purposes
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
 
Security and Crypto-currency: Forecasting the Future of Privacy for Private I...
Security and Crypto-currency: Forecasting the Future of Privacy for Private I...Security and Crypto-currency: Forecasting the Future of Privacy for Private I...
Security and Crypto-currency: Forecasting the Future of Privacy for Private I...
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014
 
A Financial Tech Tsunami Driven by Blockchain AI Crypto Economics
A Financial Tech Tsunami Driven by Blockchain AI Crypto EconomicsA Financial Tech Tsunami Driven by Blockchain AI Crypto Economics
A Financial Tech Tsunami Driven by Blockchain AI Crypto Economics
 
A Strategist's Guide to Blockchain
A Strategist's Guide to BlockchainA Strategist's Guide to Blockchain
A Strategist's Guide to Blockchain
 
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
 
F0312010140044
F0312010140044F0312010140044
F0312010140044
 
Is the world destined to become a cashless society?
Is the world destined to become a cashless society?Is the world destined to become a cashless society?
Is the world destined to become a cashless society?
 
Decentralize all the things
Decentralize all the thingsDecentralize all the things
Decentralize all the things
 
CryptoGold presentation
CryptoGold presentationCryptoGold presentation
CryptoGold presentation
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society Fellowship
 
The Technological Future of Money
The Technological Future of MoneyThe Technological Future of Money
The Technological Future of Money
 
Envisioning the future of money
Envisioning the future of moneyEnvisioning the future of money
Envisioning the future of money
 
The Technological Future of Money
The Technological Future of MoneyThe Technological Future of Money
The Technological Future of Money
 
Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)
Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)
Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)
 

Plus de Juan Llanos

Plus de Juan Llanos (15)

Dubai - GITEX Conference 2017
Dubai - GITEX Conference 2017 Dubai - GITEX Conference 2017
Dubai - GITEX Conference 2017
 
Santiago - Congreso América Digital
Santiago - Congreso América DigitalSantiago - Congreso América Digital
Santiago - Congreso América Digital
 
Buenos Aires - LaBitConf 2016
Buenos Aires - LaBitConf 2016Buenos Aires - LaBitConf 2016
Buenos Aires - LaBitConf 2016
 
United States - TX, CA, CT & IL Verafin FRAMLxpo
United States - TX, CA, CT & IL Verafin FRAMLxpoUnited States - TX, CA, CT & IL Verafin FRAMLxpo
United States - TX, CA, CT & IL Verafin FRAMLxpo
 
Mexico - LaBitConf 2015
Mexico - LaBitConf 2015Mexico - LaBitConf 2015
Mexico - LaBitConf 2015
 
São Paulo - Regulatory Roundtable
São Paulo - Regulatory RoundtableSão Paulo - Regulatory Roundtable
São Paulo - Regulatory Roundtable
 
Rio de Janeiro - LaBitConf 2014
Rio de Janeiro - LaBitConf 2014Rio de Janeiro - LaBitConf 2014
Rio de Janeiro - LaBitConf 2014
 
Las Vegas - InsideBitcoins 2014-10-05
Las Vegas - InsideBitcoins 2014-10-05Las Vegas - InsideBitcoins 2014-10-05
Las Vegas - InsideBitcoins 2014-10-05
 
Quito - Congreso CIRPLA 2014
Quito - Congreso CIRPLA 2014Quito - Congreso CIRPLA 2014
Quito - Congreso CIRPLA 2014
 
Dubai - The Capital Club in Dubai (Cointalks)
Dubai - The Capital Club in Dubai (Cointalks)Dubai - The Capital Club in Dubai (Cointalks)
Dubai - The Capital Club in Dubai (Cointalks)
 
New York - Digital Currencies, Remittances & Financial Inclusion - MFCNY even...
New York - Digital Currencies, Remittances & Financial Inclusion - MFCNY even...New York - Digital Currencies, Remittances & Financial Inclusion - MFCNY even...
New York - Digital Currencies, Remittances & Financial Inclusion - MFCNY even...
 
Buenos Aies - LaBitConf 2013
Buenos Aies - LaBitConf 2013Buenos Aies - LaBitConf 2013
Buenos Aies - LaBitConf 2013
 
Abu Dhabi - 5th Annual Financial Crimes Conference
Abu Dhabi - 5th Annual Financial Crimes ConferenceAbu Dhabi - 5th Annual Financial Crimes Conference
Abu Dhabi - 5th Annual Financial Crimes Conference
 
Washington - TEDxMidAtlantic 2013
Washington - TEDxMidAtlantic 2013Washington - TEDxMidAtlantic 2013
Washington - TEDxMidAtlantic 2013
 
New York - Virtual Currencies Compliance Conference
New York - Virtual Currencies Compliance ConferenceNew York - Virtual Currencies Compliance Conference
New York - Virtual Currencies Compliance Conference
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Madrid - Digital Currency Summit 2015-04-23

  • 1. A M L / C F T p r i v a c y b i g d a t a DIGITALIDENTITY s e c u r i t y Redefining
  • 2.
  • 4.
  • 5. Of the 7 billion people alive on the planet, 1 . 1 B I L L I O N subsist below the internationally accepted extreme- poverty line of $1.25 A DAY. The Economist
  • 7.
  • 8. 96 97 98 99 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 browser tokens rewards WOW Ripple Protocol EGold Bitcoin Protocol Ven Ripple XRP Litecoin Linden Dollars Entropia Universe QQ Online Exchanges Altcoin Explosion Regulated Exchanges Beenz Flooz Colored Coin Smart Contracts Ethereum Square Cash Amazon Coin Sovereign Coin Real Estate Equities Derivatives ? B i t c o i n O p e n S o u r c e P r o t o c o l S o l v e s D o u b l e S p e n d P r o b l e m v i a O p e n L e d g e r
  • 11. Every transaction that has ever occurred in the history of the Bitcoin economy is publicly viewable in the an open ledger called BLOCKCHAIN. Privacy without anonymity  Pseudonymity
  • 15. CONSUMER privacy protected MERCHANTno chargebacks / fraud Payment only
  • 17. A M L / C F TTODAY - national security and crime deterrence are top public policy priorities - unintended consequence → selective inclusion facilitates fiscal surveillance but creates financial exclusion of underprivileged - stick over carrot (heavy hand) - anonymity and privacy are anathema TOMORROW - carrot over stick (lighter hand) - measure proportion and results - layered, zero-knowledge, identity systems could meet both law enforcement and civil liberties goals
  • 18. I D E N T I T Y TODAY - Countries have the monopoly over a person’s identity (mostly, for fiscal reasons) - Not all countries have reliable identification systems - Government-issued IDs are not necessarily effective in deterring crime/unmistakably identifying humans TOMORROW - Alternative identity systems that transcend borders and facilitate identification of previously disenfranchised persons - Identity systems that balance both transparency and privacy (ID3/Windhover Principles)
  • 19. “ Yo u r I P a d d r e s s i s y o u r ‘ i n t e r n a t i o n a l ’ i d e n t i t y c a r d ”
  • 20. P R I VA C Y TODAY - Radical transparency jeopardizes privacy - Slowly being eroded via tax compliance regulations, elimination of secrecy havens, digitization of money TOMORROW - Leverage zero-knowledge proof technology → tokenization (Windhover Principles) - Privacy without anonymity = pseudonymity (first payment; then, identity)
  • 21. B I G D ATA “With a bit of data mining, my concern is that [companies & the government] will get a lot of information. The things people are doing to protect themselves today are pretty naive compared to the kinds of clever data mining tricks that exist. I’m worried that a lot of people are doing things that are leaving a permanent history and will then inadvertently leave some trace that reveals their actual identity.
  • 22. Anonymous Untraceable “Invisible to law enforcement and the taxman”
  • 23. • The entire history of Bitcoin transactions is publicly available. • “Using an appropriate network representation, it is possible to associate many public-keys with each other, and with external identifying information.” • “Large centralized services such as the exchanges and wallet services are capable of identifying and tracking considerable portions of user activity.” A n A n a l y s i s o f A n o n y m i t y i n t h e B i t c o i n S y s t e m – B i t c o i n i s N o t A n o n y m o u s by Fergal Reid and Martin Harrigan (2011)
  • 24. • The demonstrated centrality of these services makes it difficult for even highly motivated individuals— e.g., thieves or others attracted to the anonymity properties of Bitcoin—to stay completely anonymous, provided they are interested in cashing out by converting to fiat money (or even other virtual currencies). • The increasing dominance of a small number of Bitcoin institutions (most notably services that perform currency exchange), coupled with the public nature of transactions and our ability to label monetary flows to major institutions, ultimately makes Bitcoin unattractive today for high-volume illicit use such as money laundering. • A well and fairly regulated virtual currency industry makes it exceedingly difficult for bad actors to use the system for illicit activities. A F i s t f u l o f B i t c o i n s by Sarah Meiklejohn et al (2013)
  • 25. Anonymous Untraceable “Invisible to law enforcement and the taxman” Myths enhanced surveillance and control
  • 26. S E C U R I T Y TODAY - role-based access control - Digital tokens are bearer instruments: lose the key, lose the asset forever - Information security risks increase with digitization TOMORROW - customer-centric custody and security (via multi- signature escrow)
  • 27. A M L / C F T p r i v a c y b i g d a t a DIGITALIDENTITY s e c u r i t y Redefining
  • 28. MUST WANT CAN © 2015 Juan Llanos WANT – MUST = CAN
  • 30. INNOVATE & Reinvent the World INFLUENCE Public Policy IMPLEMENT Mandatory Rules © 2015 Juan Llanos
  • 31. INNOVATE IMPLEMENT Clientelism Inflexibility Exclusion Inequality © 2015 Juan Llanos We innovate within outdated, inflexible, anachronistic legal and regulatory frameworks
  • 32. INNOVATE INFLUENCE Disarray Capture Recklessness Chaos © 2015 Juan Llanos We innovate and influence policy to accommodate our interests, but we really don’t implement effective controls.
  • 33. IMPLEMENT INFLUENCE Monopoly Entropy Ossification Irrelevance © 2015 Juan Llanos We stay where we are because we don’t have an innovation-friendly environment
  • 34. INNOVATE & Reinvent the World INFLUENCE Public Policy IMPLEMENT Mandatory Rules © 2015 Juan Llanos Responsible Evolution