Menu
Home Explore People Places Arts History Plants & Animals Science Life & Culture Technology
On this page
Privacy and blockchain
Privacy within a type of computer ledger

A blockchain is a decentralized, shared database that records transactions in an immutable ledger, ensuring secure and verifiable pseudonymous ownership. Transactions are validated by network nodes and grouped into "blocks" containing timestamps and previous transaction details, which are then added chronologically and cannot be altered. Popularized by Bitcoin, blockchain technology supports numerous cryptocurrencies and applications. Its decentralization means no single entity controls the data; instead, consensus among network nodes confirms transactions. Advocates emphasize blockchain's potential to enhance data protection and user privacy in response to increasing data breaches and misuse of personal information, making it a promising tool for secure digital transactions.

We don't have any images related to Privacy and blockchain yet.
We don't have any YouTube videos related to Privacy and blockchain yet.
We don't have any PDF documents related to Privacy and blockchain yet.
We don't have any Books related to Privacy and blockchain yet.

Blockchain and Privacy Protection

Private and public keys

A key aspect of privacy in blockchains is the use of private and public keys. Blockchain systems use asymmetric cryptography to secure transactions between users.12 In these systems, each user has a public and private key.13 These keys are random strings of numbers and are cryptographically related.14 It is mathematically impossible for a user to guess another user's private key from their public key.15 This provides an increase in security and protects users from hackers.16 Public keys can be shared with other users in the network because they give away no personal data.17 Each user has an address that is derived from the public key using a hash function.18 These addresses are used to send and receive assets on the blockchain, such as cryptocurrency.19 Because blockchain networks are shared to all participants, users can view past transactions and activity that has occurred on the blockchain.20

Senders and receivers of past transactions are represented and signified by their addresses;21 users' identities are not revealed.22 Public addresses do not reveal personal information or identification;23 rather, they act as pseudonymous identities.24 It is suggested by Joshi, Archana (2018)25 that users do not use a public address more than once;26 this tactic avoids the possibility of a malicious user tracing a particular address' past transactions in an attempt to reveal information.27 Private keys are used to protect user identity and security through digital signatures.28 Private keys are used to access funds and personal wallets on the blockchain;29 they add a layer of identity authentication.30 When individuals wish to send money to other users, they must provide a digital signature that is produced when provided with the private key.31 This process protects against theft of funds.32

Peer-to-peer network

Blockchain technology arose from the creation of Bitcoin.33 In 2008, the creator or creators who go by the alias Satoshi Nakamoto released a paper describing the technology behind blockchains.34 In his paper, he explained a decentralized network that was characterized by peer-to-peer transactions involving cryptocurrencies or electronic money.35 In typical transactions carried out today[when?], users put trust into central authorities to hold their data securely and execute transactions.36

In large corporations, a large amount of users' personal data is stored on single devices, posing a security risk if an authority's system is hacked, lost, or mishandled.37 Blockchain technology aims to remove this reliance on a central authority.38 To achieve this, blockchain functions in a way where nodes or devices in a blockchain network can confirm the validity of a transaction rather than a third party.39 In this system, transactions between users (such as sending and receiving cryptocurrency) are broadcast to every node in the network.40 Before the transaction is recorded as a block on the blockchain, nodes must ensure a transaction is valid.41 Nodes must check past transactions of the spender to ensure he/she did not double spend or spend more funds than they own.42

After nodes confirm a block is valid, consensus protocols such as proof of work and proof of stake are deployed by miners.43 These protocols allow nodes to reach a state of agreement on the order and number of transactions.44 Once a transaction is verified, it is published on the blockchain as a block.45 Once a block is created, it cannot be altered.46 Through blockchain's decentralized nature and elimination of the need for a central authority, user privacy is increased.47 Peer-to-peer networks allow users to control their data, decreasing the threat of third parties to sell, store, or manipulate personal information.48

Cryptographic Methods for Privacy Using Blockchains

Zero-knowledge proofs

A zero-knowledge proof (known as ZKP) is a cryptographic method by which one party (the prover) can prove to another party (the verifier) that a given statement is true, without conveying any information apart from the fact that the statement is indeed true. The "prover" does not reveal any information about the transaction. Such proofs are typically introduced into blockchain systems using ZK-SNARKs in order to increase privacy in blockchains.49 In typical "non-private" public blockchain systems such as Bitcoin, a block contains information about a transaction, such as the sender and receiver's addresses and the amount sent.50 This public information can be used in conjunction with Clustering algorithms to link these "pseudo-anonymous" addresses to users or real-world identities. Since zero-knowledge proofs reveal nothing about a transaction, except that it is valid,51 the effectiveness of such techniques are drastically reduced. A prominent example of a cryptocurrency using ZK proofs is Zcash.

Ring signatures

Another method of obfuscating the flow of transactions on the public blockchain are Ring signatures, a method used by Monero.

Mixing

Cryptocurrency tumblers can also be used as a method to increase privacy even in a pseudoanonymous cryptocurrency. Additionally, instead of using mixers as an add-on service, the mixing of public addresses can be built-in as a method in the blockchain system, as in Dash.

The popular mixing service Tornado Cash was sanctioned by the US Department of Treasury in early August 2022, who accused it of laundering $455 million in stolen cryptocurrency by the Lazarus Group. The sanctions made it illegal for US citizens, residents and companies to use the service.52 In April 2024, Samourai Wallet a privacy-focused Coinjoin tool that mixes a Bitcoin transaction with other transactions, was targeted by the U.S. Department of Justice, alleging that it enabled money laundering.53

Comparison of Blockchain Privacy Systems

Private blockchains

Private blockchains (or permissioned blockchains) are different from public blockchains, which are available to any node that wishes to download the network. Critics of public blockchains say because everyone can download a blockchain and access the history of transactions, there is not much privacy.54 In private blockchains, nodes must be granted access to participate, view transactions, and deploy consensus protocols.55 Because transactions listed on a private blockchain are private, they ensure an extra layer of privacy.56 Because private blockchains have restricted access and nodes must be specifically selected to view and participate in a network, some[who?] argue that private blockchains grant more privacy to users.57 While private blockchains are considered the most realistic way to adopt blockchain technology into business to maintain a high level of privacy, there are disadvantages.58 For example, private blockchains delegate specific actors to verify blocks and transactions.59 Although some[who?] argue that this provides efficiency and security, concerns have arisen that because control and verification of transactions are in the hands of a central entity, private blockchains are not truly decentralized.60

Hybrid blockchains

Hybrid blockchains allow more flexibility to determine which data remain private and which data can be shared publicly.61 A hybrid approach is compliant with GDPR and allows entities to store data on the cloud of their choice in order to be in compliance with local laws protecting users' privacy. A hybrid blockchain contains some of the characteristics of both private and public blockchains, though not every hybrid blockchain contains the same characteristics. Bitcoin and Ethereum do not share the same characteristics, although they are both public blockchains.62

Use Cases for Privacy Protection

Financial transactions

After Satoshi Nakamoto spurred the creation of blockchain technology through Bitcoin, cryptocurrencies rose in popularity.63 Cryptocurrencies are digital assets that can be used as an alternative form of payment to fiat money.64 In current[when?] financial systems, there exists many privacy concerns and threats.65 Centralization is an obstacle in typical data-storage systems.66 When individuals deposit money, a third party intermediary is necessary.67 When sending money to another user, individuals must trust that a third party will complete this task.68 Blockchain decreases the need for this trust in a central authority. Cryptographic functions allow individuals to send money to other users.69 Because of Bitcoin's widespread recognition and sense of anonymity, criminals have taken advantage of this by purchasing illegal items using Bitcoin.70 Through the use of cryptocurrencies and its pseudonymous keys that signify transactions, illegal purchases are difficult to trace to an individual.71 Due to the potential and security of blockchains, many[which?] banks are adopting business models that use this technology.72

Health care records

In recent years,[when?] more than 100 million health care records have been breached.73 In attempts to combat this issue, solutions often result in the inaccessibility of health records.74 Health providers regularly send data to other providers.75 This often results in mishandling of data, losing records, or passing on inaccurate and old data.76 In some cases, only one copy of an updated health record exists; this can result in the loss of information.77 Health records often contain personal information such as names, social security numbers and home addresses.78 Overall, it is argued by some[according to whom?] that the current[when?] system of transferring health information compromises patient privacy to make records easy to transfer.79

As blockchain technology has evolved, there has been a growing push to transition health record storage onto the blockchain.80 Rather than having both physical and electronic copies of records, blockchains could allow the shift to electronic health records (EHR).81 Medical records on the blockchain would be in the control of the patient rather than a third party, through the patients' private and public keys.82 Patients could then control access to their health records, making transferring information less cumbersome.83 Because blockchain ledgers are immutable, health information could not be deleted or tampered with.84 Blockchain transactions would be accompanied by a timestamp, allowing those with access to have updated information.85

Legal

The notarization of legal documents protects the privacy of individuals.86 Currently[when?], documents must be verified through a third party or a notary.87 Notarization fees can be high.88 Transferring documents takes time and can lead to lost or mishandled information.89 Many[who?] are pressing for the adoption of blockchain technology for the storage legal documents.90 Documents cannot be tampered with and can be easily accessed by those who are granted permission to access them.91 Information is protected from theft and mishandling.92 Another possible use of blockchain technology is the execution of legal contracts using smart contracts,93 in which nodes automatically execute terms of a contract.94 By using smart contracts, people[who?] will no longer rely on a third party to manage contracts, allowing an increase in privacy of personal information.95

Shipping and logistics

Businesses and individuals may purchase goods which need to be shipped from the seller to the buyer. Shipment of goods is normally accompanied by shipping documents like a bill of lading. Smart bill of lading relies on blockchain technology and buyers do not need to spend more on the issue of these documents. Also with the blockchain technology, goods can be tracked anytime, and the data is updated regularly ensuring real time management of shipments. The buyer and only the party given the shipping contract can view the real time data related to the shipment increasing the privacy of the process.96

Legality of Blockchain and Privacy

GDPR

With the April 2016 adoption of the General Data Protection Regulation in the European Union, questions regarding blockchain's compliance with the act have arisen.97 GDPR applies to those who process data in the EU and those who process data outside the EU for people inside the EU.98 Personal data is "any information relating to an identified or identifiable natural person".99 Because identities on a blockchain are associated with an individual's public and private keys, this may fall under the category of personal data because public and private keys enable pseudonymity and are not necessarily connected to an identity.100 A key part of the GDPR lies in a citizen's right to be forgotten, or data erasure.101 The GDPR allows individuals to request that data associated with them to be erased if it is no longer relevant.102 Due to the blockchain's nature of immutability, potential complications if an individual who made transactions on the blockchain requests their data to be deleted exist.103 Once a block is verified on the blockchain, it is impossible to delete it.104

IRS

Because cryptocurrency prices fluctuate, many[who?] treat the purchase of cryptocurrencies as an investment. By purchasing these coins, buyers hope to later sell them at a higher price. Internal Revenue Service (IRS) has faced struggles since 2018 because many Bitcoin holders do not include revenue from cryptocurrencies in their income reports, especially those who engage in many microtransactions.105 In response to these concerns, IRS issued a notice that people must apply general tax principles to cryptocurrency and treat the purchase of it as an investment or stock.106 IRS has enacted that if people fail to report their income from cryptocurrency, they could be subject to civil penalties and fines.107 In attempts to enforce these rules and avoid potential tax fraud, IRS has called on Coinbase to report users who have sent or received more than $US20,000 worth of cryptocurrency in a year.108 The nature of blockchain technology makes enforcement difficult.109 Because blockchains are decentralized, entities cannot keep track of purchases and activity of a user.110 Pseudonymous addresses make it difficult to link identities with users, being a perfect outlet for people to launder money.111

Blockchain Alliance

Because virtual currencies and the blockchain's protection of identity has proved to be a hub for criminal purchases and activity, FBI and Justice Department created Blockchain Alliance.112 This team aims to identify and enforce legal restrictions on the blockchain to combat criminal activities through open dialogue on a private-public forum.113 This allows law enforcers to fight the illegal exploitation of the technology.114 Examples of criminal activity on the blockchain include hacking cryptocurrency wallets and stealing funds.115 Because user identities are not tied to public addresses, it is difficult to locate and identify criminals.116

Fair information practices

Blockchain has been acknowledged as a way to solve fair information practices, a set of principles relating to privacy practices and concerns for users.117 Blockchain transactions allow users to control their data through private and public keys, allowing them to own it.118 Third-party intermediaries are not allowed to misuse and obtain data.119 If personal data are stored on the blockchain, owners of such data can control when and how a third party can access it. In blockchains, ledgers automatically include an audit trail that ensures transactions are accurate.120

Concerns Regarding Blockchain Privacy

Transparency

Although blockchain technology enables users to control their own data without necessarily relying on third parties, certain characteristics may infringe on user privacy.121 Public blockchains are decentralized and allow any node to access transactions, events and actions of users.122 Block explorers can be used to trace the financial history of a wallet address, which can be combined with OSINT research to develop profiles of criminal actors or potential scamming victims.123

Decentralization

Due to blockchain's decentralized nature, a central authority is not checking for malicious users and attacks.124 Users might be able to hack the system anonymously and escape.125 Because public blockchains are not controlled by a third party, a false transaction enacted by a hacker who has a user's private key cannot be stopped.126 Because blockchain ledgers are shared and immutable, it is impossible to reverse a malicious transaction.127

Private keys

Private keys provide a way to prove ownership and control of cryptocurrency.128 If one has access to another's private key, one can access and spend these funds.129 Because private keys are crucial to accessing and protecting assets on the blockchain, users must store them safely.130 Storing the private key on a computer, flashdrive or telephone can pose potential security risks if the device is stolen or hacked.131 If such a device is lost, the user no longer have access to the cryptocurrency.132 Storing it on physical media, such as a piece of paper, also leaves the private key vulnerable to loss, theft or damage.133

Cases of Privacy Failure

See also: List of cyberattacks

MtGox

In 2014, MtGox was the world's largest Bitcoin exchange at the time; it was located in Tokyo, Japan.134 The exchange suffered the largest blockchain hack of all time.135 During 2014, MtGox held an enormous portion of the Bitcoin market, accounting for more than half of the cryptocurrency at the time.136 Throughout February, hackers infiltrated the exchange, stealing $US450 million in Bitcoin.137 Many in the blockchain community were shocked because blockchain technology is often associated with security. This was the first major hack to occur in the space.138 Although analysts tracked the public address of the robbers by looking at the public record of transactions, the perpetrators were not identified.139 This is a result of the pseudonymity of blockchain transactions.140

DAO Hack

While blockchain technology is anticipated to solve privacy issues such as data breaching, tampering, and other threats, it is not immune to malicious attacks. In 2016, the DAO opened a funding window for a particular project.141 The system was hacked during this period, resulting in the loss of cryptocurrency then worth $US3.6 million from the Ether fund.142 Due to the ever-changing price of cryptocurrencies, the amount stolen has been estimated at $US64-100.143

Coinbase

Coinbase, the largest cryptocurrency exchange in the US that allows users to store, buy, and sell cryptocurrency, has faced multiple hacks since its founding in 2012.144 Users have reported that due to its log-in process that uses personal telephone numbers and email addresses, hackers have targeted the numbers and emails of well-known individuals and CEOS in the blockchain space.145 Hackers then used the email addresses to change the users' verification numbers, consequently stealing thousands of dollars worth of cryptocurrency from Coinbase user wallets.146

By North Korea

See also: Lazarus Group

In January 2022 a report by blockchain analysis company Chainalysis found that state-backed North Korean hackers had stolen nearly $400 million in cryptocurrency in 2021. A UN panel also stated that North Korea has used stolen crypto funds to fund its missile programs despite international sanctions.147148

Privacy vs. Auditing in Blockchains

The introduction of "private" or "anonymous" cryptocurrencies such as ZCash and Monero, highlighted the problem of blockchain auditing, with exchanges and government entities limiting use of those currencies.149 Therefore, as the notions of privacy and auditing in blockchains are contradictory, auditing blockchains with privacy characteristics has become a research focus of the academic community.150

References

  1. "BlockChain Technology: Beyond Bitcoin" (PDF). http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  2. Iansiti, Marco; Lakhani, Karim R. (1 January 2017). "The Truth About Blockchain". Harvard Business Review. ISSN 0017-8012. Retrieved 27 April 2022. https://hbr.org/2017/01/the-truth-about-blockchain

  3. "BlockChain Technology: Beyond Bitcoin" (PDF). http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  4. "BlockChain Technology: Beyond Bitcoin" (PDF). http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  5. "BlockChain Technology: Beyond Bitcoin" (PDF). http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  6. "Blockchain - What it is, and a non-financial use case" (PDF). KTH Royal Institute of Technology. S2CID 27665746. http://kth.diva-portal.org/smash/get/diva2:1121133/FULLTEXT01.pdf

  7. Nofer, Michael; Gomber, Peter; Hinz, Oliver; Schiereck, Dirk (1 June 2017). "Blockchain". Business & Information Systems Engineering. 59 (3): 183–187. doi:10.1007/s12599-017-0467-3. ISSN 1867-0202. S2CID 212620853. /wiki/Doi_(identifier)

  8. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  9. Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014

  10. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  11. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  12. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  13. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  14. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  15. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  16. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  17. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  18. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  19. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  20. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  21. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  22. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  23. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  24. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  25. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  26. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  27. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  28. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  29. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  30. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  31. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  32. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  33. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  34. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  35. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  36. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  37. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  38. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  39. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  40. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  41. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  42. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  43. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  44. Guegan, Dominique (2017). "Public Blockchain versus Private blockhain". Documents de Travail du Centre d'Économie de la Sorbonne.

  45. Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014

  46. "BlockChain Technology: Beyond Bitcoin" (PDF). http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  47. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  48. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  49. Wang, Yunsen (2018). "Designing Confidentiality-Preserving Blockchain-Based Transaction Processing Systems". International Journal of Accounting Information Systems. 30: 1–18. doi:10.1016/j.accinf.2018.06.001. S2CID 52931003. /wiki/Doi_(identifier)

  50. Wang, Yunsen (2018). "Designing Confidentiality-Preserving Blockchain-Based Transaction Processing Systems". International Journal of Accounting Information Systems. 30: 1–18. doi:10.1016/j.accinf.2018.06.001. S2CID 52931003. /wiki/Doi_(identifier)

  51. Wang, Yunsen (2018). "Designing Confidentiality-Preserving Blockchain-Based Transaction Processing Systems". International Journal of Accounting Information Systems. 30: 1–18. doi:10.1016/j.accinf.2018.06.001. S2CID 52931003. /wiki/Doi_(identifier)

  52. Faife, Corin (8 August 2022). "US Treasury bans Tornado Cash mixer for role in crypto money laundering". The Verge. Retrieved 16 August 2022. https://www.theverge.com/2022/8/8/23296778/us-treasury-tornado-cash-crypto-mixer-sanctions-ethereum-north-korea

  53. Sun, Mengqi (24 April 2024). "Crypto Mixer Samourai Wallet's Co-founders Arrested for Money Laundering". Wall Street Journal. ISSN 0099-9660. Retrieved 26 June 2025. https://www.wsj.com/articles/crypto-mixer-samourai-wallets-co-founders-arrested-for-money-laundering-df237a4e

  54. Guegan, Dominique (2017). "Public Blockchain versus Private blockhain". Documents de Travail du Centre d'Économie de la Sorbonne.

  55. Guegan, Dominique (2017). "Public Blockchain versus Private blockhain". Documents de Travail du Centre d'Économie de la Sorbonne.

  56. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  57. Guegan, Dominique (2017). "Public Blockchain versus Private blockhain". Documents de Travail du Centre d'Économie de la Sorbonne.

  58. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  59. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  60. Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007

  61. Are blockchains compatible with data privacy law? https://www.qmul.ac.uk/media/news/2018/hss/are-blockchains-compatible-with-data-privacy-law.html

  62. Kolb, John; AbdelBaky, Moustafa; Katz, Randy H.; Culler, David E. (5 February 2020). "Core Concepts, Challenges, and Future Directions in Blockchain: A Centralized Tutorial". ACM Computing Surveys. 53 (1): 9:1–9:39. doi:10.1145/3366370. ISSN 0360-0300. S2CID 211041743. https://doi.org/10.1145%2F3366370

  63. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  64. "BlockChain Technology: Beyond Bitcoin" (PDF). http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  65. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  66. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  67. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  68. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  69. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  70. Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.

  71. Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.

  72. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  73. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  74. Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014

  75. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  76. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  77. Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014

  78. Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014

  79. Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014

  80. Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014

  81. Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014

  82. Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014

  83. Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014

  84. Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014

  85. Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014

  86. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  87. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  88. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  89. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  90. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  91. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  92. Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.

  93. Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.

  94. Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.

  95. Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.

  96. "Crucial Factors for Implementing Warehouse Management System - SIPMM Publications". publication.sipmm.edu.sg. 19 December 2021. Retrieved 26 October 2022. https://publication.sipmm.edu.sg/crucial-factors-implementing-warehouse-management-system/#Blockchain_Technology_for_WMS

  97. Berberich, M.; Steiner, M. (2016). "Blockchain Technology and the GDPR: How to Reconcile Privacy and Distributed Ledgers?". European Data Protection Law Review. 2 (3): 422. doi:10.21552/EDPL/2016/3/21. /wiki/Doi_(identifier)

  98. Berberich, M.; Steiner, M. (2016). "Blockchain Technology and the GDPR: How to Reconcile Privacy and Distributed Ledgers?". European Data Protection Law Review. 2 (3): 422. doi:10.21552/EDPL/2016/3/21. /wiki/Doi_(identifier)

  99. Berberich, M.; Steiner, M. (2016). "Blockchain Technology and the GDPR: How to Reconcile Privacy and Distributed Ledgers?". European Data Protection Law Review. 2 (3): 422. doi:10.21552/EDPL/2016/3/21. /wiki/Doi_(identifier)

  100. Berberich, M.; Steiner, M. (2016). "Blockchain Technology and the GDPR: How to Reconcile Privacy and Distributed Ledgers?". European Data Protection Law Review. 2 (3): 422. doi:10.21552/EDPL/2016/3/21. /wiki/Doi_(identifier)

  101. Berberich, M.; Steiner, M. (2016). "Blockchain Technology and the GDPR: How to Reconcile Privacy and Distributed Ledgers?". European Data Protection Law Review. 2 (3): 422. doi:10.21552/EDPL/2016/3/21. /wiki/Doi_(identifier)

  102. Berberich, M.; Steiner, M. (2016). "Blockchain Technology and the GDPR: How to Reconcile Privacy and Distributed Ledgers?". European Data Protection Law Review. 2 (3): 422. doi:10.21552/EDPL/2016/3/21. /wiki/Doi_(identifier)

  103. Berberich, M.; Steiner, M. (2016). "Blockchain Technology and the GDPR: How to Reconcile Privacy and Distributed Ledgers?". European Data Protection Law Review. 2 (3): 422. doi:10.21552/EDPL/2016/3/21. /wiki/Doi_(identifier)

  104. Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

  105. Heroux, Mark (October 2018). "Cryptocurrency: Compliance challenges and IRS enforcement". Tax Adviser. https://www.thetaxadviser.com/issues/2018/oct/cryptocurrency-compliance-challenges-irs-enforcement.html

  106. Heroux, Mark (October 2018). "Cryptocurrency: Compliance challenges and IRS enforcement". Tax Adviser. https://www.thetaxadviser.com/issues/2018/oct/cryptocurrency-compliance-challenges-irs-enforcement.html

  107. Heroux, Mark (October 2018). "Cryptocurrency: Compliance challenges and IRS enforcement". Tax Adviser. https://www.thetaxadviser.com/issues/2018/oct/cryptocurrency-compliance-challenges-irs-enforcement.html

  108. Heroux, Mark (October 2018). "Cryptocurrency: Compliance challenges and IRS enforcement". Tax Adviser. https://www.thetaxadviser.com/issues/2018/oct/cryptocurrency-compliance-challenges-irs-enforcement.html

  109. Heroux, Mark (October 2018). "Cryptocurrency: Compliance challenges and IRS enforcement". Tax Adviser. https://www.thetaxadviser.com/issues/2018/oct/cryptocurrency-compliance-challenges-irs-enforcement.html

  110. Heroux, Mark (October 2018). "Cryptocurrency: Compliance challenges and IRS enforcement". Tax Adviser. https://www.thetaxadviser.com/issues/2018/oct/cryptocurrency-compliance-challenges-irs-enforcement.html

  111. Heroux, Mark (October 2018). "Cryptocurrency: Compliance challenges and IRS enforcement". Tax Adviser. https://www.thetaxadviser.com/issues/2018/oct/cryptocurrency-compliance-challenges-irs-enforcement.html

  112. Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.

  113. Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.

  114. Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.

  115. Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.

  116. Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.

  117. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  118. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  119. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  120. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  121. Primavera De Filippi (2018). "The Interplay between Decentralization and Privacy: The Case of Blockchain Technologies". Journal of Peer Production (9). /wiki/Primavera_De_Filippi

  122. Primavera De Filippi (2018). "The Interplay between Decentralization and Privacy: The Case of Blockchain Technologies". Journal of Peer Production (9). /wiki/Primavera_De_Filippi

  123. "Follow the Bitcoin With Python, BlockExplorer and Webhose.io". bellingcat. 15 September 2017. Retrieved 16 August 2022. https://www.bellingcat.com/resources/2017/09/15/follow-bitcoin-python-blockexplorer-webhose-io/

  124. Primavera De Filippi (2018). "The Interplay between Decentralization and Privacy: The Case of Blockchain Technologies". Journal of Peer Production (9). /wiki/Primavera_De_Filippi

  125. Primavera De Filippi (2018). "The Interplay between Decentralization and Privacy: The Case of Blockchain Technologies". Journal of Peer Production (9). /wiki/Primavera_De_Filippi

  126. Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.

  127. Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.

  128. Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.

  129. Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.

  130. Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.

  131. Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.

  132. Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.

  133. Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.

  134. Li, X (2017). "A survey on the security of blockchain systems". Future Generation Computer Systems. 107: 841–853. arXiv:1802.06993. doi:10.1016/j.future.2017.08.020. S2CID 3628110. /wiki/ArXiv_(identifier)

  135. Li, X (2017). "A survey on the security of blockchain systems". Future Generation Computer Systems. 107: 841–853. arXiv:1802.06993. doi:10.1016/j.future.2017.08.020. S2CID 3628110. /wiki/ArXiv_(identifier)

  136. Li, X (2017). "A survey on the security of blockchain systems". Future Generation Computer Systems. 107: 841–853. arXiv:1802.06993. doi:10.1016/j.future.2017.08.020. S2CID 3628110. /wiki/ArXiv_(identifier)

  137. Li, X (2017). "A survey on the security of blockchain systems". Future Generation Computer Systems. 107: 841–853. arXiv:1802.06993. doi:10.1016/j.future.2017.08.020. S2CID 3628110. /wiki/ArXiv_(identifier)

  138. Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.

  139. Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.

  140. Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.

  141. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  142. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  143. Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf

  144. Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.

  145. Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.

  146. Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.

  147. "North Korea hackers stole $400m of cryptocurrency in 2021, report says". BBC News. 14 January 2022. Retrieved 4 February 2022. https://www.bbc.com/news/business-59990477

  148. "North Korea stole a record $400 million in cryptocurrency last year, researchers say". NBC News. Retrieved 4 February 2022. https://www.nbcnews.com/tech/security/north-korea-stole-record-400-million-cryptocurrency-last-year-research-rcna12080

  149. "Bittrex to Delist 'Privacy Coins' Monero, Dash and Zcash". https://www.yahoo.com/now/bittrex-delist-privacy-coins-monero-183110456.html

  150. Chatzigiannis, Panagiotis; Baldimtsi, Foteini; Chalkias, Konstantinos (2021). SoK: Auditability and Accountability in Distributed Payment Systems. ACNS 2021. doi:10.1007/978-3-030-78375-4_13. https://link.springer.com/chapter/10.1007%2F978-3-030-78375-4_13